Ask Computer Network & Security Expert

1. Network administrators and support personnel commonly use the _ utility to verify connectivity between two network end points.

A. Path

B. Transport

C. Ping

D. SYN

2. A _ spans multiple geographic areas and is usually connected by common telecommunication carriers.

A. WAN

B. LAN

C. MAN

D. SAN

3. Network administrators typically configure a router directly through the port known as the port located on the back of the router.

A. console

B. Aux

C. Serial

D. Fast Ethernet

4. A _ is an intermediary device that operates at layer 3 of the OSI reference model. It interprets the Network layer protocol and moves packets based on the layer 3 addresses.

A. Personal Computer

B. Switch

C. Hub

D. Router

5. The OSI model layer defines transmission of light over a fiber optic cable.

A. Transport

B. Physical

C. Data Link

D. Network

6. Which term below is used to prioritize traffic in network systems?

A. Fault-tolerance

B. QoS

C. Security

D. Scalability

7. Which answer below describes a converged network?

A. One Local Area Network connected to another

B. One Wide Area Network connected to another

C. A network that is currently out of service

D. A network that can carry many different types of traffic

8. A (n) _ address identifies both a network and a host, so you can route communications through large networks, including the Internet.

A. Port

B. ARP

C. IP

D. MAC

9. A ___ is contained within one company or department and located in a single geographic area, usually a campus, building or part of a building.

A. SAN

B. MAN

C. WAN

D. LAN

10.   Which layer has both a header and trailer used in its encapsulation?

A. Presentation

B. Internet

C. Network Access

D. Physical

11.   Which one of the following pieces of equipment is not an end device in a network environment?

A. IP Phone

B. Router

C. Personal Computer

D. Server

12.   In _ communications, devices can send or receive signals, but not both at the same time.

A. half-duplex

B. full-duplex

C. duplex

D. wire-duplex

13.   Which of the following terms is another name for a physical numeric address?

A. IP address

B. MAC layer address

C. PROM address

D. Port address

14.   The PDU at the nehwork access layer is called a(n)

A. Segment

B. Datapack

C. Frame

D. Packet

15.   Which is the user prompt or enable prompt below:

A. Route r>

B. Routerff

C. Router(Config)ff

D. Router(£nable)>

16. How do you saw changes to the configuration file?

A. Copy run start

B. Copy start run

C. Copy flash start

D. Copy run nwam

17. In TCP/IP the Network Access includes the following OSt layers.

A. Network and Data Link

B. Network and Transport

C. Data Link and Physical

D. Session and Transport

18. After creating data with a software application, the first step of Data Encapsulation is?

A. Frame Headers and trailers added

B. Bit Transmission

C. Segmentation

D. Packet creation and network header

19. What command do you use to enter global configuration mode?

A. global conf

B. term global conf

C. con f global

D. configure terminal

20. Which of the following describes the OS[ Physical Layer?

A. Handles Link control and uses the MAC address on the NIC

B. Translates, encrypts or prepares data from the Application Layer for network transmission

C. Provides the electrical transmission of data

D. Establishes, maintains and manages sessions between applications

21.  For the OSI network model list all 7 layers of the QSI model in order from top to bottom.

22. Complete the table below for the 4 layers of the TCP/IP model. The 1st layer is done for you. 

TCP/IP Layer Name

PDU TYPE

AODRESStNG USED

 

Application

Data

None

 

 

 

 

 

 

 

 

 

23. Name 3 main components of any modern day network.

24. Describe the role of protocols In network communications.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91301118
  • Price:- $15

Priced at Now at $15, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As