Question 1
Question
Network Segmentation is the breaking up of a large network into smaller networks.
Question 2
Question
What causes LAN traffic on the network (Choose three)
Question 3
Question
What functions does routers provide?
Answer
-
They break up broadcast domains.
-
Routers do not break up collision domains.
-
Routers provide packet switching and packet filtering.
-
Routers provide internetwork communication.
Question 4
Question
The diagram shows a group of networks connected to a router. How many collision domains and broadcast domains totaled?
Answer
-
There are 2 broadcast domains and 7 collision domains.
-
There are 2 broadcast domains and 8 collision domains.
-
There are 3 broadcast domains and 8 collision domains.
Question 5
Question
Bridges are software based and Switches are hardware based (ASICs)
Question 6
Question
What statements best defined the OSI Model?
Answer
-
It is a hierarchical design and it divides the network communication process into smaller and simpler components thus aiding component development, design and troubleshooting.
-
It allows multiple-vendor development through standardization of network components and allows various types of network hardware and software to communicate.
-
Any changes in one layer can affect the other layer process.
-
It prevents changes in one layer from affecting other layers, so it does not hamper development.
Question 7
Question
The OSI is not a physical model but rather a blueprint set of guidelines that application developers can use to create and implement applications that run on a network. It also provides a framework for creating and implementing networking standards, devices and internetworking schemes.
Question 8
Question
The OSI model is divided into two groups, one is the top three upper layers (Application, Presentation, Session) which define how the applications within the end stations will communicate with each other. The bottom four layers (Transport, Network, Data Link, Physical) define how data is transmitted end to end.
Question 9
Question
What does the application layer's function in the OSI model?
Answer
-
Provides Dialog control and keeps different applications' data separate.
-
Presents data and handles processing such as encryption, compression, and translation services.
-
Provides logical addressing which routers use for path determination.
-
Provides a user interface. Also is associated with File, print, message, database, and application services. Applications do not reside in the application layer but rather interfaces with application layer protocols.
Question 10
Question
Application layer protocols involve HTTP, FTP, DNS, IMAP, Telnet, SSH, POP, SMTP, SMNP, and LDAP.
Question 11
Question
What is the function of the Presentation layer?
Answer
-
Is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities.
-
It segments and reassembles data into a data stream It also responsible for providing mechanisms for multiplexing upper layer applications, establishing sessions, and tearing down virtual circuits. Its finally hides details of any network-dependent information from the higher layers by providing transparent data transfer.
-
The layer presents data to the Application layer and is responsible for data translation and code formatting. Data encryption and compression are additional functions of this layer.
Question 12
Question
Since the Presentation layer is essentially a translator and provides coding and conversion functions, an example of this data transfer technique is converting EBCDIC to ASCII format.
Question 13
Question
In the OSI model what are the functions of the Session layer?
Answer
-
This layer of the OSI Model is where users actually communicate to the computer. Its also responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist.
-
This layer of the OSI Model segments and reassembles data into a data stream. Its also responsible for providing mechanisms for multiplexing upper layer applications, establishing sessions, and tearing down virtual circuits.
-
This layer of the OSI model is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities. This layer also provides a dialog control between devices or nodes. It coordinates communication between systems by offering three different modes: Simplex, Half Duplex, and Full Duplex. This layer basically keeps different applications' data separate from other applications' data.
Question 14
Question
What functions and services does the Transport Layer of the OSI model offer?
Answer
-
This layer manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that this layer must transport traffic between devices that are not locally attached.
-
This layer segments and reassembles data into a data stream. It provides end to end data transport services and can establish a logical connection between the sending host and destination host on an internetwork. Examples are TCP and UDP.
-
This layer provides the physical transmission of the data and handles error notification, network topology and flow control. It formats the message into pieces each called a data frame.
Question 15
Question
Flow control is data integrity maintained at the Transport layer. It prevents a sending host on one side of the connection from overflowing the buffers in the receiving host.
Question 16
Question
What is connection-oriented communication?
Answer
-
Its a connection that guarantees a way to establish communication through certain entities that provide retransmission of data.
-
Its an established session (Virtual Circuit) that is setup from the transmitting sender and receiving host using what is called a three-way-handshake or call setup. Data is then transferred until finished then a call termination takes place to tear down the virtual circuit.
Question 17
Question
What is windowing?
Answer
-
Windowing controls how information is passed through the network using a transmitting technique that controls data flow.
-
Windows are used to control the amount of outstanding, unacknowledged data segments. The size of the window controls how much data is transferred from one end of the device to the other.
Question 18
Question
A feature of Windowing that ensures reliable data segment delivery from the transmitting machine to the receiving machine is called "Positive Acknowledgement with Retransmission". This technique is used by the receiving machine to send acknowledgement message to the sender when it receives data.
Question 19
Question
During windowing once the sender transmits data segments it sets a timer and waits for the acknowledgment before sending the next round of segments. If the timer expires without an acknowledgement then it retransmits if the timer expires without an acknowledgement from the receiving host.
Question 20
Question
What best describes the Network layer?
Answer
-
This layer transmits bits into bytes and bytes into frames. It provides the physical transmission of the data and handles error notification, network topology and flow control.
-
This layer communicates directly with the various types of actual communication media. It specifies the electrical , mechanical , procedural and functioning requirements for activating, maintaining, deactivating a physical link between end systems. This is where you find the DTE and DCE specifications.
-
This layer manages device addressing, tracks the location of the devices on the network., and determines the best way to move data, which means that the Network layer must transport traffic between devices that aren't locally attached. Two types of packets in this layer are routed protocols and routing protocols.
Question 21
Question
What is a routing protocol?
Answer
-
Routing protocols are used to transport user data through the internetwork. They are assigned to an interface and determine the method of packet delivery.
Examples are IP and IPv6.
-
Routing Protocols are used to update neighboring router about the networks connected to all routers within the internetwork. Examples of routing protocols are OSPF, RIP, EIGRP, and RIPv2
Question 22
Question
What is a routed protocol?
Answer
-
Routed Protocols are used to update neighboring router about the networks connected to all routers within the internetwork. Examples of routing protocols are OSPF, RIP, EIGRP, and RIPv2
-
Routed protocols are used to transport user data through the internetwork. They are assigned to an interface and determine the method of packet delivery.
Examples are IP and IPv6.
Question 23
Question
What are the functions of the Data Link Layer?
Answer
-
Its the layer where users actually communicates with the computer. Applications do not reside in this layer but it interfaces with application protocols. Examples are HTTP, DNS, SMTP, SMNP, Telnet, SSH, Print, database and application services.
-
Its the layer that is responsible for setting up, managing and then tearing down sessions between Presentation layer entities. It coordinates communication between systems and services by offering three modes: Simplex, Half Duplex, and Full Duplex.
-
This layer provides the physical transmission of the data and handles error notification, network topology, and flow control. This layer also ensures messages being delivered to the assigned device via hardware addresses with the devices examples of Switches and Bridges.
Question 24
Question
Bridges reside in layer 2 which are hardware-based devices using ASIC integration (Application Specific Integrated Circuits)
Question 25
Question
What are the two sublayers at the Data Link layer? (Choose two)
Answer
-
Media Access Control (802.3) defines how packets are placed on the media. Physical addressing is defined here as well as logical topologies which is the signal path through a physical topology. Provides error notification, and optional flow control.
-
802.1Q is an IEEE standard that supports layer 2 virtual local area networks. The standard defines a system of VLAN tagging for Ethernet frames.
-
Logical Link Control (LLC) 802.2 is responsible for identifying Network layer protocols and then encapsulating them. An LLC header tells the Data Link layer what to do with a packet once a frame is received.
Question 26
Question
Transparent Bridging on Layer 2 is when a filter table on a switch or bridge is built, the device will forward frames only to the segment where the destination hardware address is located. If the destination device is on the same segment as the frame the layer 2 device will block the frame from going to any other segments. If the destination is on a different segment then the frame can be transmitted only to that segment.
Question 27
Question
When a switch interface receives a frame with a destination hardware address that isn't found on the filter table, it will forward the frame to all connected segments.
Question 28
Question
What functions are performed from the Physical Layer of the OSI Model?
Answer
-
Physical Layer sends and receives bits.
-
This layer specifies the electrical, mechanical, procedural, and functional requirements for activating, maintaining, and deactivating a physical link between end systems.
-
This layer identifies the interface between the data terminal equipment (DTE) and the data communication equipment (DCE). The DCE is usually located at the service provider and DTE is the attached device.
-
This layer provides end to end connection using voltage standards.
Question 29
Question
Hubs are called multi-port repeaters.
Question 30
Question
What are the functions and advantages of Routers? (Choose three)
Answer
-
Routers perform packet switching, filtering and path selection.
-
Routers break up broadcast domains and reduce broadcast traffic.
-
Routers do not break up collision domains
-
Routers facilitate internetwork communications.
Question 31
Question
What is Ethernet?
Answer
-
Ethernet is a trademark for a family of Ethernet technologies for Local Area Networks (LANs) was introduced in 1980 and standardized in 1985 as IEEE 802.3
-
Ethernet is a contention based media access method that allows all hosts on a network to share the same bandwidth of a link.
-
Ethernet is a protocol that provides end to end delivery method.
Question 32
Question
What is a cut-through method in Ethernet?
Answer
-
Cut-Through is a Ethernet architecture switching device technology. A cut-through device begins forwarding a frame after examining only the first part of its header
-
Cut-Through is a Ethernet architecture switching device technology. A cut-through device will buffer the entire frame before forwarding it .
Question 33
Question
What is Store and Forward technology?
Answer
-
Store and Forward is an Ethernet switch architecture technology that begins to forward a data packet once it reads the header part of the frame.
-
Store and Forward is an Ethernet switch architecture technology that will first buffer the entire frame before making a forwarding decision.
Question 34
Question
Congestion Avoidance are flow control techniques that monitor network traffic loads in an effort to anticipate and avoid congestion at common network bottlenecks.
Question 35
Question
What is RFC 1918 Private Addressing for Class A ?
Answer
-
10.0.0.0 - 10.255.255.255 range using 10.0.0.0/8
-
172.16.0.0 - 172.31.255.255 range using 172.16.0.0/20
-
192.168.0.0 - 192.168.255.255 range using 192.168.0.0/16
Question 36
Question
What is RFC 1918 Private Addressing for Class B ?
Answer
-
10.0.0.0 - 10.255.255.255 range using 10.0.0.0/8
-
172.16.0.0 - 172.31.255.255 range using 172.16.0.0/20
-
192.168.0.0 - 192.168.255.255 range using 192.168.0.0/16
Question 37
Question
What is RFC 1918 Private Addressing for Class C ?
Answer
-
10.0.0.0 - 10.255.255.255 range using 10.0.0.0/8
-
172.16.0.0 - 172.31.255.255 range using 172.16.0.0/20
-
192.168.0.0 - 192.168.255.255 range using 192.168.0.0/16
Question 38
Answer
-
Its a 32 bit decimal-dotted network address
-
Its a 64 bit colon-delimited hexadecimal address
-
Its a 128 bit colon-delimited hexadecimal address
Question 39
Question
How many fields in an IPv6 address?
Answer
-
There are sixteen 8 bit fields separated by colon in hexadecimal format
-
There are thirty two 8 bit fields separated by colon in hexadecimal format
-
There are eight 16 bit fields separated by a delimited colon in hexadecimal format
Question 40
Question
What are the rules of leading zeros and shortening representation of IPv6
Question 41
Question
Is there a Time to live (TTL) in IPv6?
Question 42
Question
What are some features of IPv6 ? (Choose three)
Answer
-
IPv6 provides three address types which are unicast (address for a single interface), multicast (one to many), anycast (one to nearest)
-
IPv6 address types are global, reserved, link-local, and site-local.
-
IPv6 has a 32 bit colon-delimited hexadecimal.
-
Every IPv6 enabled interface contains at least one loopback and one link-local address.
Question 43
Question
What is Link-Local address for IPv6?
Answer
-
Dynamically created on all IPv6 interfaces by using a specific link-local prefix (FE80::/10) and a 64-bit interface identifier.
-
one to nearest IPv6 address type.
-
All anycast nodes should provide uniform service.
Question 44
Question
What are three reasons to migrate from IPv4 to IPv6.
Answer
-
Hosts can be assigned an IP address with the use of DHCP
-
IPv6 can provide enough IP addresses to assign more than 4 million IP addresses to every person on earth.
-
IPv6 eliminates the requirement for NAT.
-
Hosts can be assigned without the use of DHCP.