Which Logical Address Is Used For Delivery Of Data To A Remote Network?
This course covers configuring and implementation of LAN networks.
IT6201 Data Communications and Networking 1
Question1
Correct
Mark ane.00 out of 1.00
Flag question
Question text
In cobweb optic meda, the signals are represented as patterns of .
Question2
Correct
Mark one.00 out of 1.00
Flag question
Question text
Which statement is correct about network protocols?
Select one:
They are only required for exchange of message between devices on remote network
They all office in the network access layer of TCP/IP
They define how letters are exchanged between the sources and the destination
Network protocols define the type of hardware that is used and how it is mounted in racks
Feedback
Question3
Correct
Marking one.00 out of 1.00
Flag question
Question text
Which two message timing mechanisms are used in data communication? (Choose two.)
Select one or more:
response timeout
encapsulation
encoding
flow control
formatting
Feedback
Questioniv
Correct
Marking 1.00 out of 1.00
Flag question
Question text
Which logical accost is used for commitment of data to a remote network?
Select one:
source MAC address
source IP address
destination MAC address
destination IP address
Feedback
Questionfive
Right
Mark i.00 out of 1.00
Flag question
Question text
A address is defined as a reserved address that routes packets back to the host
Questionhalf dozen
Right
Mark 1.00 out of i.00
Flag question
Question text
Which 2 statements are true of the deterministic admission method?(Choose ii.)
Select one or more:
The throughput is predictable
Each device has to transmit earlier passing the token to the next device
Devices take turns transmitting
It is a very efficient method because in that location are no collisions
The order of transmission is dictated past the node that asks first for the token
Feedback
Questionvii
Correct
Marker 1.00 out of one.00
Flag question
Question text
What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)
Select one or more:
delivery options
message size
data encoding
media selection
connector specifications
finish-device installation
Feedback
Question8
Right
Mark 1.00 out of one.00
Flag question
Question text
What type of commitment uses data link layer addresses?
Select 1:
local delivery
remote delivery
local and remote delivery
remote delivery using routers
Feedback
Question9
Correct
Mark i.00 out of ane.00
Flag question
Question text
What is the purpose of protocols in data communications?
Select one:
determining the electronic specifications to enable the communication
specifying the bandwidth of the aqueduct or medium for each type of communication
providing the rules required for a specific type of communication to occur
specifying the device operating systems that volition support the communication
Feedback
Question10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two components are added to the PDU at the network access layer? (Choose ii.)
Select one or more:
frame header
IP header
Trailer
TCP header
HTTP header
Feedback
Question11
Right
Marker 1.00 out of 1.00
Flag question
Question text
Which two factors influence the method that is used for media access control? (Choose two.)
Select one or more:
how connectedness between nodes appears to the data link layer
how the IP protocol forwards the bundle to the destination
how signals are encoded past the NICs on end devices
how data is generated by finish devices applications
how nodes share the media
Feedback
Question12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which is a function of the Logical Link Control (LLC) sublayer?
Select one:
to accept segments and package them into data units that are called packets
to provide data link layer addressing
to define the media access processes that are performed by the hardware
to identify which network layer protocol is being used
Feedback
Question13
Correct
Mark 1.00 out of one.00
Flag question
Question text
What is an advantage of using standards to develop and implement protocols?
Select one:
Standard provide flexibility for manufacturers to create devices that comply with unique requirements
A detail protocol can only exist implemented by 1 manufacturer
Different manufacturers are complimentary to utilise different requirements when implementing a protocol
Products from different manufacturers can interoperate successfully
Feedback
Questionxiv
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What will a network administrator utilise to modify a configuration on a Cisco router?
Select one:
the Windows command prompt
Windows Explorer
IOS
a DHCP server
Feedback
Questionxv
Correct
Marking 1.00 out of 1.00
Flag question
Question text
What control will forbid all unencrypted passwords from displaying in apparently text in a configuration file?
Select one:
(config) # service password-encryption
(config) # enable cloak-and-dagger Encrypted_Password
(config) # enable secret Secret_Password
(config)# enable password secret
(config-line) # countersign undercover
Feedback
Question16
Right
Marker one.00 out of i.00
Flag question
Question text
Which two statements are true regarding the user EXEC mode? (Choose 2.)
Select one or more than:
Global configuration style can be accessed by entering the enable command
Interfaces and routing protocols tin can be configured
This is the default mode on an unconfigured router when first powered up.
Just some aspects of the router configuration can be viewed
All router commands are available
Feedback
Question17
Right
Mark 1.00 out of 1.00
Flag question
Question text
What are the parts of an IPv4 address? (Choose two.)
Select one or more than:
Subnet mask
Host
Network
Next hop
Broadcast
Questionxviii
Correct
Mark ane.00 out of ane.00
Flag question
Question text
Which bulletin delivery pick is used when all devices need to receive the aforementioned message simultaneously?
Select one:
multicast
unicast
duplex
circulate
Feedback
Question19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
Select one:
IANA
ISO
ISOC
IEEE
ITU-T
Feedback
Question20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What happens when two devices on the aforementioned subnet are communicating?
Select one:
The information link layer addresses are added to the IP header
The sending device will use ARP to make up one's mind the IP address of the receiver
The host portion of the IP addresses will be different
The frame volition be sent to the default gateway for delivery to the receiving device
Feedback
Question2
Correct
Marking 1.00 out of 1.00
Flag question
Question text
The TCP/IP application layer effectively consists of which iii OSI layers?
Select one:
Application, network, data link
Application, presentation, session
Application, session, transport
Application, transport, network
Question3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The 8-bit binary value for 41 is
Question4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A client is downloading a large file from a server using FTP. Many of the segments are lost during transit. What will well-nigh likely happen?
Select 1:
The FTP server responds to the client with a smaller window size in the TCP header.
The FTP client responds to the server with a smaller window size in the TCP header.
The FTP client responds to the customer with an increased window size in the TCP header.
The FTP session continues with no alteration in window size, and the missing segment is requested again afterward the residual of the file is downloaded.
The FTP server responds to the client with an increased window size in the TCP header.
The FTP session is immediately terminated.
The FTP session continues, only the outcome is a decadent file that must be downloaded again.
Question5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What 3 protocols do electronic mail users and servers use to process email? (Choose three.)
Select one or more:
IMAP4
DNS
SMTP
DHCP
POP3
Questionsix
Correct
Marking 1.00 out of 1.00
Flag question
Question text
The shortest compressed format of the IPv6 address 2001: 0DB8:0000:1470:0000:0000:0000:0200 is
Question7
Correct
Mark 1.00 out of one.00
Flag question
Question text
A network administrator notices that the default gateway devices sends an ICMP Redirect message to the workstation when the workstation tries to connect to file server on another network. What is the purpose for this ICMP message?
Select ane:
The default gateway does not know a road to the destination
The network topology has changed and a new road toward the file server is available
The default gateway is overwhelmed past network traffic and the request is redirected to another router
To notify the workstation, that some other router on the same network, is the meliorate default-gateway to attain the remote server
Feedback
Question8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which argument is truthful about an interface that is configured with the IPv6 accost command?
Select one:
A global unicast IPv6 accost is dynamically configured on the interface
Whatever IPv4 addresses that are assigned to the interface are replaced with an IPv6 accost
IPv6 traffic-forwarding is enable on the interface
A link-local IPv6 address is automatically
Feedback
Questionnine
Correct
Mark one.00 out of 1.00
Flag question
Question text
What is an advantage that UDP has over TCP?
Select i:
Low overhead
Reordering of segments
Reliable delivery
Advanced flow control
Question10
Correct
Mark one.00 out of i.00
Flag question
Question text
A user is unable to admission the visitor server from a computer. On issuing the ipconfig command, the user finds that the IP accost of the calculator is displayed as 169.254.0.2. What type of address is this?
Select one:
loopback
private
experimental
link-local
Feedback
Question11
Right
Mark one.00 out of 1.00
Flag question
Question text
The last host address on the 10.15.25.0/24 network is
Question12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the purpose of using a source port number in a TCP communication?
Select one:
to keep rail of multiple conversations betwixt devices
to notify the remote device that the conversation is over
to enquire for a non received segment
to assemble the segments that arrived out of lodge
Feedback
Questionthirteen
Correct
Marking 1.00 out of 1.00
Flag question
Question text
What does UDP do when receiving messages that are more than than one datagram in length?
Select one:
UDP requests retransmission of the datagrams in the right lodge before passing to the application.
UDP reassembles that data in the order it was received and passes it to the awarding.
UDP transmissions are limited to a single datagram.
UDP places the datagrams into the right order before passing them to the application.
Questionxiv
Right
Mark 1.00 out of 1.00
Flag question
Question text
What range of ports tin either be used by TCP or UDP to place the requested service on the destination device or as a client source port?
Select i:
0 to 49151
49152 to 65535
1024 to 49151
0 to 1023
Questionfifteen
Right
Mark i.00 out of 1.00
Flag question
Question text
Which awarding utilize UDP as the transport layer protocol?
Select one:
Telnet
HTTP
DHCP
DNS queries
SMTP
Feedback
Questionxvi
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement accurately describes public IP addresses?
Select i:
Public addresses cannot be used within a individual network
Public addresses can be duplicated but within a local network
Public IP addresses must exist unique across the entire Internet
Public IP addresses are only required to be unique within the local network
Network administrators are costless to select whatsoever public addresses to use for network devices that access the Internet
Feedback
Question17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which number or set of numbers represents a socket?
Select 1:
01-23-45-67-89-AB
21
192.168.ane.1:80
10.1.1.15
Feedback
Question18
Right
Mark 1.00 out of ane.00
Flag question
Question text
Which TCP header field specifies the number of bytes that tin can be accepted before an acknowledgement is required?
Select one:
Checksum
Window size
Acknowledgement number
Header length
Question19
Right
Mark 1.00 out of ane.00
Flag question
Question text
What is a characteristic of UDP?
Select 1:
Expectational acknowledgements
Period command
Windowing
Reliable delivery
Connectionless
Question20
Right
Mark ane.00 out of ane.00
Flag question
Question text
What is assigned by the transport layer to identify an awarding or service?
Select ane:
Packet
Port
Segment
MAC accost
IP address
Which Logical Address Is Used For Delivery Of Data To A Remote Network?,
Source: https://www.amaoedleaks.com/2021/01/it6201-data-communications-and.html
Posted by: danielswhimmight77.blogspot.com
0 Response to "Which Logical Address Is Used For Delivery Of Data To A Remote Network?"
Post a Comment