banner



Which Logical Address Is Used For Delivery Of Data To A Remote Network?

This course covers configuring  and implementation of LAN networks.

IT6201 Data Communications and Networking 1

Question1

Correct

Mark ane.00 out of 1.00

Flag question

Question text

In cobweb optic meda, the signals are represented as patterns of .

Question2

Correct

Mark one.00 out of 1.00

Flag question

Question text

Which statement is correct about network protocols?

Select one:

They are only required for exchange of message between devices on remote network

They all office in the network access layer of TCP/IP

They define how letters are exchanged between the sources and the destination

Network protocols define the type of hardware that is used and how it is mounted in racks

Feedback

Question3

Correct

Marking one.00 out of 1.00

Flag question

Question text

Which two message timing mechanisms are used in data communication? (Choose two.)

Select one or more:

response timeout

encapsulation

encoding

flow control

formatting

Feedback

Questioniv

Correct

Marking 1.00 out of 1.00

Flag question

Question text

Which logical accost is used for commitment of data to a remote network?

Select one:

source MAC address

source IP address

destination MAC address

destination IP address

Feedback

Questionfive

Right

Mark i.00 out of 1.00

Flag question

Question text

A  address is defined as a reserved address that routes packets back to the host

Questionhalf dozen

Right

Mark 1.00 out of i.00

Flag question

Question text

Which 2 statements are true of the deterministic admission method?(Choose ii.)

Select one or more:

The throughput is predictable

Each device has to transmit earlier passing the token to the next device

Devices take turns transmitting

It is a very efficient method because in that location are no collisions

The order of transmission is dictated past the node that asks first for the token

Feedback

Questionvii

Correct

Marker 1.00 out of one.00

Flag question

Question text

What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)

Select one or more:

delivery options

message size

data encoding

media selection

connector specifications

finish-device installation

Feedback

Question8

Right

Mark 1.00 out of one.00

Flag question

Question text

What type of commitment uses data link layer addresses?

Select 1:

local delivery

remote delivery

local and remote delivery

remote delivery using routers

Feedback

Question9

Correct

Mark i.00 out of ane.00

Flag question

Question text

What is the purpose of protocols in data communications?

Select one:

determining the electronic specifications to enable the communication

specifying the bandwidth of the aqueduct or medium for each type of communication

providing the rules required for a specific type of communication to occur

specifying the device operating systems that volition support the communication

Feedback

Question10

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two components are added to the PDU at the network access layer? (Choose ii.)

Select one or more:

frame header

IP header

Trailer

TCP header

HTTP header

Feedback

Question11

Right

Marker 1.00 out of 1.00

Flag question

Question text

Which two factors influence the method that is used for media access control? (Choose two.)

Select one or more:

how connectedness between nodes appears to the data link layer

how the IP protocol forwards the bundle to the destination

how signals are encoded past the NICs on end devices

how data is generated by finish devices applications

how nodes share the media

Feedback

Question12

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which is a function of the Logical Link Control (LLC) sublayer?

Select one:

to accept segments and package them into data units that are called packets

to provide data link layer addressing

to define the media access processes that are performed by the hardware

to identify which network layer protocol is being used

Feedback

Question13

Correct

Mark 1.00 out of one.00

Flag question

Question text

What is an advantage of using standards to develop and implement protocols?

Select one:

Standard provide flexibility for manufacturers to create devices that comply with unique requirements

A detail protocol can only exist implemented by 1 manufacturer

Different manufacturers are complimentary to utilise different requirements when implementing a protocol

Products from different manufacturers can interoperate successfully

Feedback

Questionxiv

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What will a network administrator utilise to modify a configuration on a Cisco router?

Select one:

the Windows command prompt

Windows Explorer

IOS

a DHCP server

Feedback

Questionxv

Correct

Marking 1.00 out of 1.00

Flag question

Question text

What control will forbid all unencrypted passwords from displaying in apparently text in a configuration file?

Select one:

(config) # service password-encryption

(config) # enable cloak-and-dagger Encrypted_Password

(config) # enable secret Secret_Password

(config)# enable password secret

(config-line) # countersign undercover

Feedback

Question16

Right

Marker one.00 out of i.00

Flag question

Question text

Which two statements are true regarding the user EXEC mode? (Choose 2.)

Select one or more than:

Global configuration style can be accessed by entering the enable command

Interfaces and routing protocols tin can be configured

This is the default mode on an unconfigured router when first powered up.

Just some aspects of the router configuration can be viewed

All router commands are available

Feedback

Question17

Right

Mark 1.00 out of 1.00

Flag question

Question text

What are the parts of an IPv4 address? (Choose two.)

Select one or more than:

Subnet mask

Host

Network

Next hop

Broadcast

Questionxviii

Correct

Mark ane.00 out of ane.00

Flag question

Question text

Which bulletin delivery pick is used when all devices need to receive the aforementioned message simultaneously?

Select one:

multicast

unicast

duplex

circulate

Feedback

Question19

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which organization develops the 802 family of standard for wired and wireless LANs and MANs?

Select one:

IANA

ISO

ISOC

IEEE

ITU-T

Feedback

Question20

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What happens when two devices on the aforementioned subnet are communicating?

Select one:

The information link layer addresses are added to the IP header

The sending device will use ARP to make up one's mind the IP address of the receiver

The host portion of the IP addresses will be different

The frame volition be sent to the default gateway for delivery to the receiving device


Feedback

Question2

Correct

Marking 1.00 out of 1.00

Flag question

Question text

The TCP/IP application layer effectively consists of which iii OSI layers?

Select one:

Application, network, data link

Application, presentation, session

Application, session, transport

Application, transport, network

Question3

Correct

Mark 1.00 out of 1.00

Flag question

Question text

The 8-bit binary value for 41 is

Question4

Correct

Mark 1.00 out of 1.00

Flag question

Question text

A client is downloading a large file from a server using FTP. Many of the segments are lost during transit. What will well-nigh likely happen?

Select 1:

The FTP server responds to the client with a smaller window size in the TCP header.

The FTP client responds to the server with a smaller window size in the TCP header.

The FTP client responds to the customer with an increased window size in the TCP header.

The FTP session continues with no alteration in window size, and the missing segment is requested again afterward the residual of the file is downloaded.

The FTP server responds to the client with an increased window size in the TCP header.

The FTP session is immediately terminated.

The FTP session continues, only the outcome is a decadent file that must be downloaded again.

Question5

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What 3 protocols do electronic mail users and servers use to process email? (Choose three.)

Select one or more:

IMAP4

DNS

SMTP

DHCP

POP3

Questionsix

Correct

Marking 1.00 out of 1.00

Flag question

Question text

The shortest compressed format of the IPv6 address 2001: 0DB8:0000:1470:0000:0000:0000:0200 is

Question7

Correct

Mark 1.00 out of one.00

Flag question

Question text

A network administrator notices that the default gateway devices sends an ICMP Redirect message to the workstation when the workstation tries to connect to file server on another network. What is the purpose for this ICMP message?

Select ane:

The default gateway does not know a road to the destination

The network topology has changed and a new road toward the file server is available

The default gateway is overwhelmed past network traffic and the request is redirected to another router

To notify the workstation, that some other router on the same network, is the meliorate default-gateway to attain the remote server

Feedback

Question8

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which argument is truthful about an interface that is configured with the IPv6 accost command?

Select one:

A global unicast IPv6 accost is dynamically configured on the interface

Whatever IPv4 addresses that are assigned to the interface are replaced with an IPv6 accost

IPv6 traffic-forwarding is enable on the interface

A link-local IPv6 address is automatically

Feedback

Questionnine

Correct

Mark one.00 out of 1.00

Flag question

Question text

What is an advantage that UDP has over TCP?

Select i:

Low overhead

Reordering of segments

Reliable delivery

Advanced flow control

Question10

Correct

Mark one.00 out of i.00

Flag question

Question text

A user is unable to admission the visitor server from a computer. On issuing the ipconfig command, the user finds that the IP accost of the calculator is displayed as 169.254.0.2. What type of address is this?

Select one:

loopback

private

experimental

link-local

Feedback

Question11

Right

Mark one.00 out of 1.00

Flag question

Question text

The last host address on the 10.15.25.0/24 network is

Question12

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of using a source port number in a TCP communication?

Select one:

to keep rail of multiple conversations betwixt devices

to notify the remote device that the conversation is over

to enquire for a non received segment

to assemble the segments that arrived out of lodge

Feedback

Questionthirteen

Correct

Marking 1.00 out of 1.00

Flag question

Question text

What does UDP do when receiving messages that are more than than one datagram in length?

Select one:

UDP requests retransmission of the datagrams in the right lodge before passing to the application.

UDP reassembles that data in the order it was received and passes it to the awarding.

UDP transmissions are limited to a single datagram.

UDP places the datagrams into the right order before passing them to the application.

Questionxiv

Right

Mark 1.00 out of 1.00

Flag question

Question text

What range of ports tin either be used by TCP or UDP to place the requested service on the destination device or as a client source port?

Select i:

0 to 49151

49152 to 65535

1024 to 49151

0 to 1023

Questionfifteen

Right

Mark i.00 out of 1.00

Flag question

Question text

Which awarding utilize UDP as the transport layer protocol?

Select one:

Telnet

HTTP

DHCP

DNS queries

SMTP

Feedback

Questionxvi

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement accurately describes public IP addresses?

Select i:

Public addresses cannot be used within a individual network

Public addresses can be duplicated but within a local network

Public IP addresses must exist unique across the entire Internet

Public IP addresses are only required to be unique within the local network

Network administrators are costless to select whatsoever public addresses to use for network devices that access the Internet

Feedback

Question17

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which number or set of numbers represents a socket?

Select 1:

01-23-45-67-89-AB

21

192.168.ane.1:80

10.1.1.15

Feedback

Question18

Right

Mark 1.00 out of ane.00

Flag question

Question text

Which TCP header field specifies the number of bytes that tin can be accepted before an acknowledgement is required?

Select one:

Checksum

Window size

Acknowledgement number

Header length

Question19

Right

Mark 1.00 out of ane.00

Flag question

Question text

What is a characteristic of UDP?

Select 1:

Expectational acknowledgements

Period command

Windowing

Reliable delivery

Connectionless

Question20

Right

Mark ane.00 out of ane.00

Flag question

Question text

What is assigned by the transport layer to identify an awarding or service?

Select ane:

Packet

Port

Segment

MAC accost

IP address

Which Logical Address Is Used For Delivery Of Data To A Remote Network?,

Source: https://www.amaoedleaks.com/2021/01/it6201-data-communications-and.html

Posted by: danielswhimmight77.blogspot.com

0 Response to "Which Logical Address Is Used For Delivery Of Data To A Remote Network?"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel