Internetworking Basics

Description

Chapter 2 of the Cisco Data Center objectives
sirhulk1
Quiz by sirhulk1, updated more than 1 year ago
sirhulk1
Created by sirhulk1 almost 11 years ago
143
0

Resource summary

Question 1

Question
Network Segmentation is the breaking up of a large network into smaller networks.
Answer
  • True
  • False

Question 2

Question
What causes LAN traffic on the network (Choose three)
Answer
  • Too many hosts in a broadcast or collision domains.
  • Broadcast storms.
  • High network bandwidth.
  • Adding hubs for connectivity to the network.

Question 3

Question
What functions does routers provide?
Answer
  • They break up broadcast domains.
  • Routers do not break up collision domains.
  • Routers provide packet switching and packet filtering.
  • Routers provide internetwork communication.

Question 4

Question
The diagram shows a group of networks connected to a router. How many collision domains and broadcast domains totaled?
Answer
  • There are 2 broadcast domains and 7 collision domains.
  • There are 2 broadcast domains and 8 collision domains.
  • There are 3 broadcast domains and 8 collision domains.

Question 5

Question
Bridges are software based and Switches are hardware based (ASICs)
Answer
  • True
  • False

Question 6

Question
What statements best defined the OSI Model?
Answer
  • It is a hierarchical design and it divides the network communication process into smaller and simpler components thus aiding component development, design and troubleshooting.
  • It allows multiple-vendor development through standardization of network components and allows various types of network hardware and software to communicate.
  • Any changes in one layer can affect the other layer process.
  • It prevents changes in one layer from affecting other layers, so it does not hamper development.

Question 7

Question
The OSI is not a physical model but rather a blueprint set of guidelines that application developers can use to create and implement applications that run on a network. It also provides a framework for creating and implementing networking standards, devices and internetworking schemes.
Answer
  • True
  • False

Question 8

Question
The OSI model is divided into two groups, one is the top three upper layers (Application, Presentation, Session) which define how the applications within the end stations will communicate with each other. The bottom four layers (Transport, Network, Data Link, Physical) define how data is transmitted end to end.
Answer
  • True
  • False

Question 9

Question
What does the application layer's function in the OSI model?
Answer
  • Provides Dialog control and keeps different applications' data separate.
  • Presents data and handles processing such as encryption, compression, and translation services.
  • Provides logical addressing which routers use for path determination.
  • Provides a user interface. Also is associated with File, print, message, database, and application services. Applications do not reside in the application layer but rather interfaces with application layer protocols.

Question 10

Question
Application layer protocols involve HTTP, FTP, DNS, IMAP, Telnet, SSH, POP, SMTP, SMNP, and LDAP.
Answer
  • True
  • False

Question 11

Question
What is the function of the Presentation layer?
Answer
  • Is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities.
  • It segments and reassembles data into a data stream It also responsible for providing mechanisms for multiplexing upper layer applications, establishing sessions, and tearing down virtual circuits. Its finally hides details of any network-dependent information from the higher layers by providing transparent data transfer.
  • The layer presents data to the Application layer and is responsible for data translation and code formatting. Data encryption and compression are additional functions of this layer.

Question 12

Question
Since the Presentation layer is essentially a translator and provides coding and conversion functions, an example of this data transfer technique is converting EBCDIC to ASCII format.
Answer
  • True
  • False

Question 13

Question
In the OSI model what are the functions of the Session layer?
Answer
  • This layer of the OSI Model is where users actually communicate to the computer. Its also responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist.
  • This layer of the OSI Model segments and reassembles data into a data stream. Its also responsible for providing mechanisms for multiplexing upper layer applications, establishing sessions, and tearing down virtual circuits.
  • This layer of the OSI model is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities. This layer also provides a dialog control between devices or nodes. It coordinates communication between systems by offering three different modes: Simplex, Half Duplex, and Full Duplex. This layer basically keeps different applications' data separate from other applications' data.

Question 14

Question
What functions and services does the Transport Layer of the OSI model offer?
Answer
  • This layer manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that this layer must transport traffic between devices that are not locally attached.
  • This layer segments and reassembles data into a data stream. It provides end to end data transport services and can establish a logical connection between the sending host and destination host on an internetwork. Examples are TCP and UDP.
  • This layer provides the physical transmission of the data and handles error notification, network topology and flow control. It formats the message into pieces each called a data frame.

Question 15

Question
Flow control is data integrity maintained at the Transport layer. It prevents a sending host on one side of the connection from overflowing the buffers in the receiving host.
Answer
  • True
  • False

Question 16

Question
What is connection-oriented communication?
Answer
  • Its a connection that guarantees a way to establish communication through certain entities that provide retransmission of data.
  • Its an established session (Virtual Circuit) that is setup from the transmitting sender and receiving host using what is called a three-way-handshake or call setup. Data is then transferred until finished then a call termination takes place to tear down the virtual circuit.

Question 17

Question
What is windowing?
Answer
  • Windowing controls how information is passed through the network using a transmitting technique that controls data flow.
  • Windows are used to control the amount of outstanding, unacknowledged data segments. The size of the window controls how much data is transferred from one end of the device to the other.

Question 18

Question
A feature of Windowing that ensures reliable data segment delivery from the transmitting machine to the receiving machine is called "Positive Acknowledgement with Retransmission". This technique is used by the receiving machine to send acknowledgement message to the sender when it receives data.
Answer
  • True
  • False

Question 19

Question
During windowing once the sender transmits data segments it sets a timer and waits for the acknowledgment before sending the next round of segments. If the timer expires without an acknowledgement then it retransmits if the timer expires without an acknowledgement from the receiving host.
Answer
  • True
  • False

Question 20

Question
What best describes the Network layer?
Answer
  • This layer transmits bits into bytes and bytes into frames. It provides the physical transmission of the data and handles error notification, network topology and flow control.
  • This layer communicates directly with the various types of actual communication media. It specifies the electrical , mechanical , procedural and functioning requirements for activating, maintaining, deactivating a physical link between end systems. This is where you find the DTE and DCE specifications.
  • This layer manages device addressing, tracks the location of the devices on the network., and determines the best way to move data, which means that the Network layer must transport traffic between devices that aren't locally attached. Two types of packets in this layer are routed protocols and routing protocols.

Question 21

Question
What is a routing protocol?
Answer
  • Routing protocols are used to transport user data through the internetwork. They are assigned to an interface and determine the method of packet delivery. Examples are IP and IPv6.
  • Routing Protocols are used to update neighboring router about the networks connected to all routers within the internetwork. Examples of routing protocols are OSPF, RIP, EIGRP, and RIPv2

Question 22

Question
What is a routed protocol?
Answer
  • Routed Protocols are used to update neighboring router about the networks connected to all routers within the internetwork. Examples of routing protocols are OSPF, RIP, EIGRP, and RIPv2
  • Routed protocols are used to transport user data through the internetwork. They are assigned to an interface and determine the method of packet delivery. Examples are IP and IPv6.

Question 23

Question
What are the functions of the Data Link Layer?
Answer
  • Its the layer where users actually communicates with the computer. Applications do not reside in this layer but it interfaces with application protocols. Examples are HTTP, DNS, SMTP, SMNP, Telnet, SSH, Print, database and application services.
  • Its the layer that is responsible for setting up, managing and then tearing down sessions between Presentation layer entities. It coordinates communication between systems and services by offering three modes: Simplex, Half Duplex, and Full Duplex.
  • This layer provides the physical transmission of the data and handles error notification, network topology, and flow control. This layer also ensures messages being delivered to the assigned device via hardware addresses with the devices examples of Switches and Bridges.

Question 24

Question
Bridges reside in layer 2 which are hardware-based devices using ASIC integration (Application Specific Integrated Circuits)
Answer
  • True
  • False

Question 25

Question
What are the two sublayers at the Data Link layer? (Choose two)
Answer
  • Media Access Control (802.3) defines how packets are placed on the media. Physical addressing is defined here as well as logical topologies which is the signal path through a physical topology. Provides error notification, and optional flow control.
  • 802.1Q is an IEEE standard that supports layer 2 virtual local area networks. The standard defines a system of VLAN tagging for Ethernet frames.
  • Logical Link Control (LLC) 802.2 is responsible for identifying Network layer protocols and then encapsulating them. An LLC header tells the Data Link layer what to do with a packet once a frame is received.

Question 26

Question
Transparent Bridging on Layer 2 is when a filter table on a switch or bridge is built, the device will forward frames only to the segment where the destination hardware address is located. If the destination device is on the same segment as the frame the layer 2 device will block the frame from going to any other segments. If the destination is on a different segment then the frame can be transmitted only to that segment.
Answer
  • True
  • False

Question 27

Question
When a switch interface receives a frame with a destination hardware address that isn't found on the filter table, it will forward the frame to all connected segments.
Answer
  • True
  • False

Question 28

Question
What functions are performed from the Physical Layer of the OSI Model?
Answer
  • Physical Layer sends and receives bits.
  • This layer specifies the electrical, mechanical, procedural, and functional requirements for activating, maintaining, and deactivating a physical link between end systems.
  • This layer identifies the interface between the data terminal equipment (DTE) and the data communication equipment (DCE). The DCE is usually located at the service provider and DTE is the attached device.
  • This layer provides end to end connection using voltage standards.

Question 29

Question
Hubs are called multi-port repeaters.
Answer
  • True
  • False

Question 30

Question
What are the functions and advantages of Routers? (Choose three)
Answer
  • Routers perform packet switching, filtering and path selection.
  • Routers break up broadcast domains and reduce broadcast traffic.
  • Routers do not break up collision domains
  • Routers facilitate internetwork communications.

Question 31

Question
What is Ethernet?
Answer
  • Ethernet is a trademark for a family of Ethernet technologies for Local Area Networks (LANs) was introduced in 1980 and standardized in 1985 as IEEE 802.3
  • Ethernet is a contention based media access method that allows all hosts on a network to share the same bandwidth of a link.
  • Ethernet is a protocol that provides end to end delivery method.

Question 32

Question
What is a cut-through method in Ethernet?
Answer
  • Cut-Through is a Ethernet architecture switching device technology. A cut-through device begins forwarding a frame after examining only the first part of its header
  • Cut-Through is a Ethernet architecture switching device technology. A cut-through device will buffer the entire frame before forwarding it .

Question 33

Question
What is Store and Forward technology?
Answer
  • Store and Forward is an Ethernet switch architecture technology that begins to forward a data packet once it reads the header part of the frame.
  • Store and Forward is an Ethernet switch architecture technology that will first buffer the entire frame before making a forwarding decision.

Question 34

Question
Congestion Avoidance are flow control techniques that monitor network traffic loads in an effort to anticipate and avoid congestion at common network bottlenecks.
Answer
  • True
  • False

Question 35

Question
What is RFC 1918 Private Addressing for Class A ?
Answer
  • 10.0.0.0 - 10.255.255.255 range using 10.0.0.0/8
  • 172.16.0.0 - 172.31.255.255 range using 172.16.0.0/20
  • 192.168.0.0 - 192.168.255.255 range using 192.168.0.0/16

Question 36

Question
What is RFC 1918 Private Addressing for Class B ?
Answer
  • 10.0.0.0 - 10.255.255.255 range using 10.0.0.0/8
  • 172.16.0.0 - 172.31.255.255 range using 172.16.0.0/20
  • 192.168.0.0 - 192.168.255.255 range using 192.168.0.0/16

Question 37

Question
What is RFC 1918 Private Addressing for Class C ?
Answer
  • 10.0.0.0 - 10.255.255.255 range using 10.0.0.0/8
  • 172.16.0.0 - 172.31.255.255 range using 172.16.0.0/20
  • 192.168.0.0 - 192.168.255.255 range using 192.168.0.0/16

Question 38

Question
What is IPv6?
Answer
  • Its a 32 bit decimal-dotted network address
  • Its a 64 bit colon-delimited hexadecimal address
  • Its a 128 bit colon-delimited hexadecimal address

Question 39

Question
How many fields in an IPv6 address?
Answer
  • There are sixteen 8 bit fields separated by colon in hexadecimal format
  • There are thirty two 8 bit fields separated by colon in hexadecimal format
  • There are eight 16 bit fields separated by a delimited colon in hexadecimal format

Question 40

Question
What are the rules of leading zeros and shortening representation of IPv6
Answer
  • You can suppress all leading zeroes in IPv6 with double colons
  • You can only suppress on set of leading zeroes in IPv6 with double colons

Question 41

Question
Is there a Time to live (TTL) in IPv6?
Answer
  • There is a Time to Live (TTL) in IPv6 which the maximum is 255
  • The Time to Live (TTL) has been renamed to hop-count which is the default is 64 and can go up to 255.

Question 42

Question
What are some features of IPv6 ? (Choose three)
Answer
  • IPv6 provides three address types which are unicast (address for a single interface), multicast (one to many), anycast (one to nearest)
  • IPv6 address types are global, reserved, link-local, and site-local.
  • IPv6 has a 32 bit colon-delimited hexadecimal.
  • Every IPv6 enabled interface contains at least one loopback and one link-local address.

Question 43

Question
What is Link-Local address for IPv6?
Answer
  • Dynamically created on all IPv6 interfaces by using a specific link-local prefix (FE80::/10) and a 64-bit interface identifier.
  • one to nearest IPv6 address type.
  • All anycast nodes should provide uniform service.

Question 44

Question
What are three reasons to migrate from IPv4 to IPv6.
Answer
  • Hosts can be assigned an IP address with the use of DHCP
  • IPv6 can provide enough IP addresses to assign more than 4 million IP addresses to every person on earth.
  • IPv6 eliminates the requirement for NAT.
  • Hosts can be assigned without the use of DHCP.
Show full summary Hide full summary

Similar

Open Systems Interconnect (OSI) Model
sirhulk1
TCP/IP and the DoD Model
sirhulk1
Cisco 3 Layer Model
sirhulk1
Computational Conversions
sirhulk1
101 most frequently used Spanish Words
Niat Habtemariam
Chemistry Quiz General -3
lauren_johncock
IT - The Online World
Summir
PHR Sample Questions
Elizabeth Rogers8284
Carbohydrates
kevinlinkovoor
An Inspector Calls - Quotes and Context
James Holder
Family in the park
Eleuterio Caicedo Valencia