2024-2025 NET + n10-008 Practice Exam with Answers (202 Solved Questions)
Study smarter with 2024-2025 NET + n10-008 Practice Exam with Answers, using real past exam questions for effective revision.
Chloe Martinez
Contributor
4.8
32
about 2 months ago
Preview (28 of 93)
Sign in to access the full document!
NET + n10-008 100%
VERIFIED ANSWERS
2024/2025 CORRECT
Which of the following organizations developed the Open Systems
Interconnection
(OSI) model?
A. International Telecommunication Union (ITU-T)
B. Comité Consultatif International Télégraphique et Téléphonique (CCITT)
C. American National Standards Institute (ANSI)
D. Institute of Electrical and Electronics Engineers (IEEE)
E. International Organization for Standardization (ISO)
E. ISO developed and published the OSI model to serve as a conceptual model for
software and hardware developers. The ITU-T, formerly known as the CCITT,
coordinates the development and advancement of international telecommunication
networks and services. ANSI is a private organization that administers and coordinates
a United States-based standardization and conformity assessment system. The IEEE
publishes standards that define data link and physical layer standards. These standards
are referred to collectively as the 802 series
At which of the following layers of the Open Systems Interconnection (OSI) model
do the
protocols on a typical local area network (LAN) use media access control (MAC)
addresses
to identify other computers on the network?
A. Physical
B. Data link
VERIFIED ANSWERS
2024/2025 CORRECT
Which of the following organizations developed the Open Systems
Interconnection
(OSI) model?
A. International Telecommunication Union (ITU-T)
B. Comité Consultatif International Télégraphique et Téléphonique (CCITT)
C. American National Standards Institute (ANSI)
D. Institute of Electrical and Electronics Engineers (IEEE)
E. International Organization for Standardization (ISO)
E. ISO developed and published the OSI model to serve as a conceptual model for
software and hardware developers. The ITU-T, formerly known as the CCITT,
coordinates the development and advancement of international telecommunication
networks and services. ANSI is a private organization that administers and coordinates
a United States-based standardization and conformity assessment system. The IEEE
publishes standards that define data link and physical layer standards. These standards
are referred to collectively as the 802 series
At which of the following layers of the Open Systems Interconnection (OSI) model
do the
protocols on a typical local area network (LAN) use media access control (MAC)
addresses
to identify other computers on the network?
A. Physical
B. Data link
NET + n10-008 100%
VERIFIED ANSWERS
2024/2025 CORRECT
Which of the following organizations developed the Open Systems
Interconnection
(OSI) model?
A. International Telecommunication Union (ITU-T)
B. Comité Consultatif International Télégraphique et Téléphonique (CCITT)
C. American National Standards Institute (ANSI)
D. Institute of Electrical and Electronics Engineers (IEEE)
E. International Organization for Standardization (ISO)
E. ISO developed and published the OSI model to serve as a conceptual model for
software and hardware developers. The ITU-T, formerly known as the CCITT,
coordinates the development and advancement of international telecommunication
networks and services. ANSI is a private organization that administers and coordinates
a United States-based standardization and conformity assessment system. The IEEE
publishes standards that define data link and physical layer standards. These standards
are referred to collectively as the 802 series
At which of the following layers of the Open Systems Interconnection (OSI) model
do the
protocols on a typical local area network (LAN) use media access control (MAC)
addresses
to identify other computers on the network?
A. Physical
B. Data link
VERIFIED ANSWERS
2024/2025 CORRECT
Which of the following organizations developed the Open Systems
Interconnection
(OSI) model?
A. International Telecommunication Union (ITU-T)
B. Comité Consultatif International Télégraphique et Téléphonique (CCITT)
C. American National Standards Institute (ANSI)
D. Institute of Electrical and Electronics Engineers (IEEE)
E. International Organization for Standardization (ISO)
E. ISO developed and published the OSI model to serve as a conceptual model for
software and hardware developers. The ITU-T, formerly known as the CCITT,
coordinates the development and advancement of international telecommunication
networks and services. ANSI is a private organization that administers and coordinates
a United States-based standardization and conformity assessment system. The IEEE
publishes standards that define data link and physical layer standards. These standards
are referred to collectively as the 802 series
At which of the following layers of the Open Systems Interconnection (OSI) model
do the
protocols on a typical local area network (LAN) use media access control (MAC)
addresses
to identify other computers on the network?
A. Physical
B. Data link
C. Network
D. Transport
B. The Ethernet (or IEEE 802.3) protocol at the data link layer uses MAC addresses to
idenitify computers on the local network. MAC addresses are coded into the firmware of
physical network interface adapters by the manufacturer. The physical layer deals with
signals and is not involved in addressing. The IP protocol at the network layer has its
own addressing system. The transport layer protocols are not involved in addressing.
Which layer of the Open Systems Interconnection (OSI) model is responsible for
the logical
addressing of end systems and the routing of datagrams on a network?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
C. Network layer protocols (such as IP) contain headers that specify logical addresses
for end system communication and route datagrams across a network. The physical
layer defines standards for physical and mechanical characteristics of a network. The
data link layer uses media access control (MAC) or hardware addresses, not logical
addresses. The transport layer uses port numbers, not logical addresses. Session layer
protocols create and maintain a dialogue between end systems. Presentation layer
protocols are responsible for the formatting, translation, and presentation of information.
The application layer provides an entry point for applications to access the protocol
stack and prepare information for transmission across a network.
On a TCP/IP network, which layers of the Open Systems Interconnection (OSI)
model contain
protocols that are responsible for encapsulating the data generated by an
D. Transport
B. The Ethernet (or IEEE 802.3) protocol at the data link layer uses MAC addresses to
idenitify computers on the local network. MAC addresses are coded into the firmware of
physical network interface adapters by the manufacturer. The physical layer deals with
signals and is not involved in addressing. The IP protocol at the network layer has its
own addressing system. The transport layer protocols are not involved in addressing.
Which layer of the Open Systems Interconnection (OSI) model is responsible for
the logical
addressing of end systems and the routing of datagrams on a network?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
C. Network layer protocols (such as IP) contain headers that specify logical addresses
for end system communication and route datagrams across a network. The physical
layer defines standards for physical and mechanical characteristics of a network. The
data link layer uses media access control (MAC) or hardware addresses, not logical
addresses. The transport layer uses port numbers, not logical addresses. Session layer
protocols create and maintain a dialogue between end systems. Presentation layer
protocols are responsible for the formatting, translation, and presentation of information.
The application layer provides an entry point for applications to access the protocol
stack and prepare information for transmission across a network.
On a TCP/IP network, which layers of the Open Systems Interconnection (OSI)
model contain
protocols that are responsible for encapsulating the data generated by an
C. Network
D. Transport
B. The Ethernet (or IEEE 802.3) protocol at the data link layer uses MAC addresses to
idenitify computers on the local network. MAC addresses are coded into the firmware of
physical network interface adapters by the manufacturer. The physical layer deals with
signals and is not involved in addressing. The IP protocol at the network layer has its
own addressing system. The transport layer protocols are not involved in addressing.
Which layer of the Open Systems Interconnection (OSI) model is responsible for
the logical
addressing of end systems and the routing of datagrams on a network?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
C. Network layer protocols (such as IP) contain headers that specify logical addresses
for end system communication and route datagrams across a network. The physical
layer defines standards for physical and mechanical characteristics of a network. The
data link layer uses media access control (MAC) or hardware addresses, not logical
addresses. The transport layer uses port numbers, not logical addresses. Session layer
protocols create and maintain a dialogue between end systems. Presentation layer
protocols are responsible for the formatting, translation, and presentation of information.
The application layer provides an entry point for applications to access the protocol
stack and prepare information for transmission across a network.
On a TCP/IP network, which layers of the Open Systems Interconnection (OSI)
model contain
protocols that are responsible for encapsulating the data generated by an
D. Transport
B. The Ethernet (or IEEE 802.3) protocol at the data link layer uses MAC addresses to
idenitify computers on the local network. MAC addresses are coded into the firmware of
physical network interface adapters by the manufacturer. The physical layer deals with
signals and is not involved in addressing. The IP protocol at the network layer has its
own addressing system. The transport layer protocols are not involved in addressing.
Which layer of the Open Systems Interconnection (OSI) model is responsible for
the logical
addressing of end systems and the routing of datagrams on a network?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
C. Network layer protocols (such as IP) contain headers that specify logical addresses
for end system communication and route datagrams across a network. The physical
layer defines standards for physical and mechanical characteristics of a network. The
data link layer uses media access control (MAC) or hardware addresses, not logical
addresses. The transport layer uses port numbers, not logical addresses. Session layer
protocols create and maintain a dialogue between end systems. Presentation layer
protocols are responsible for the formatting, translation, and presentation of information.
The application layer provides an entry point for applications to access the protocol
stack and prepare information for transmission across a network.
On a TCP/IP network, which layers of the Open Systems Interconnection (OSI)
model contain
protocols that are responsible for encapsulating the data generated by an
application,
creating the payload for a packet that will be transmitted over a network?
(Choose all
that apply.)
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
B, C, D. Before the payload data generated by an application can be transmitted over a
TCP/ IP network, the system must encapsulate it by applying protocol headers and
footers at three layers of the OSI model. The data link layer applies a header and footer
to create an Ethernet frame. The network layer applies a header to create an IP
datagram. The transport layer applies a TCP or UDP header to create a segment or
datagram. The other model layers are involved in the payload transmission process, but
they do not encapsulate the payload.
What layer of the Open Systems Interconnection (OSI) model is responsible for
translating
and formatting information?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
creating the payload for a packet that will be transmitted over a network?
(Choose all
that apply.)
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
B, C, D. Before the payload data generated by an application can be transmitted over a
TCP/ IP network, the system must encapsulate it by applying protocol headers and
footers at three layers of the OSI model. The data link layer applies a header and footer
to create an Ethernet frame. The network layer applies a header to create an IP
datagram. The transport layer applies a TCP or UDP header to create a segment or
datagram. The other model layers are involved in the payload transmission process, but
they do not encapsulate the payload.
What layer of the Open Systems Interconnection (OSI) model is responsible for
translating
and formatting information?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
Loading page 4...
F. The presentation layer implements functions that provide formatting, translation, and
presentation of information. No other layers of the OSI model translate and format
application data.
Which of the following devices typically operates at the network layer of the Open
Systems
Interconnection (OSI) model?
A. Proxy server
B. Hub
C. Network interface adapter
D. Router
D. A router connects networks at the network layer of the OSI model. Proxy servers
operate at the application layer. Network interface adapters operate at both the data link
and the physical layers. Hubs are physical layer devices.
Which layer of the Open Systems Interconnection (OSI) model provides an
entrance point to
the protocol stack for applications?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
G. The application layer provides an entry point for applications to access the protocol
stack and prepare information for transmission across a network. All other layers of the
OSI model reside below this layer and rely on this entry point.
Which layer of the Open Systems Interconnection (OSI) model is responsible for
dialogue
presentation of information. No other layers of the OSI model translate and format
application data.
Which of the following devices typically operates at the network layer of the Open
Systems
Interconnection (OSI) model?
A. Proxy server
B. Hub
C. Network interface adapter
D. Router
D. A router connects networks at the network layer of the OSI model. Proxy servers
operate at the application layer. Network interface adapters operate at both the data link
and the physical layers. Hubs are physical layer devices.
Which layer of the Open Systems Interconnection (OSI) model provides an
entrance point to
the protocol stack for applications?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
G. The application layer provides an entry point for applications to access the protocol
stack and prepare information for transmission across a network. All other layers of the
OSI model reside below this layer and rely on this entry point.
Which layer of the Open Systems Interconnection (OSI) model is responsible for
dialogue
Loading page 5...
control between two communicating end systems?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
E. The session layer is responsible for creating and maintaining a dialogue between end
systems. This dialogue can be a two-way alternate dialogue that requires end systems
to take turns transmitting, or it can be a two-way simultaneous dialogue in which either
end system can transmit at will. No other layers of the OSI model perform dialogue
control between communicating end systems
Some switches can perform functions associated with two layers of the Open
Systems Interconnection
(OSI) model. Which two of the following layers are often associated with network
switching? (Choose all that apply.)
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
B, C. The primary function of a switch is to process packets based on their media
access control (MAC) addresses, which makes it a data link layer device. However,
many switches can also perform routing functions based on IP addresses, which
operate at the network layer.
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
E. The session layer is responsible for creating and maintaining a dialogue between end
systems. This dialogue can be a two-way alternate dialogue that requires end systems
to take turns transmitting, or it can be a two-way simultaneous dialogue in which either
end system can transmit at will. No other layers of the OSI model perform dialogue
control between communicating end systems
Some switches can perform functions associated with two layers of the Open
Systems Interconnection
(OSI) model. Which two of the following layers are often associated with network
switching? (Choose all that apply.)
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
B, C. The primary function of a switch is to process packets based on their media
access control (MAC) addresses, which makes it a data link layer device. However,
many switches can also perform routing functions based on IP addresses, which
operate at the network layer.
Loading page 6...
At which layer of the Open Systems Interconnection (OSI) model are there TCP/IP
protocols
than can provide either connectionless or connection-oriented
services to applications?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
D. There are two types of transport layer protocols: connection-oriented and
connectionless. Connection-oriented protocols guarantee the delivery of data from
source to destination by creating a connection between the sender and the receiver
before any data is transmitted. Connectionless protocols do not require a connection
between end systems in order to pass data. The physical layer does not use
connectionless or connection-oriented protocols; it defines standards for transmitting
and receiving information over a network. The data link layer provides physical
addressing and final packaging of data for transmission. The network layer is
responsible for logical addressing and routing. The session layer is responsible for
creating and maintaining a dialogue between end systems. The presentation layer is
responsible for the formatting, translation, and presentation of information. The
application layer provides an entry point for applications to access the protocol stack
and prepare information for transmission across a network.
Which of the following layers of the Open Systems Interconnection (OSI) model
typically
have dedicated physical hardware devices associated with them? (Choose all that
apply.)
A. Physical
B. Data link
protocols
than can provide either connectionless or connection-oriented
services to applications?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
D. There are two types of transport layer protocols: connection-oriented and
connectionless. Connection-oriented protocols guarantee the delivery of data from
source to destination by creating a connection between the sender and the receiver
before any data is transmitted. Connectionless protocols do not require a connection
between end systems in order to pass data. The physical layer does not use
connectionless or connection-oriented protocols; it defines standards for transmitting
and receiving information over a network. The data link layer provides physical
addressing and final packaging of data for transmission. The network layer is
responsible for logical addressing and routing. The session layer is responsible for
creating and maintaining a dialogue between end systems. The presentation layer is
responsible for the formatting, translation, and presentation of information. The
application layer provides an entry point for applications to access the protocol stack
and prepare information for transmission across a network.
Which of the following layers of the Open Systems Interconnection (OSI) model
typically
have dedicated physical hardware devices associated with them? (Choose all that
apply.)
A. Physical
B. Data link
Loading page 7...
C. Network
D. Transport
E. Session
F. Presentation
G. Application
A, B, C. The physical layer of the OSI model is associated with hubs, cables, and
network interface adapters. The data link layer is associated with bridges and switches.
The network layer is associated with routers. The transport, session, presentation, and
application layers are typically not associated with dedicated hardware devices.
At which layer of the Open Systems Interconnection (OSI) model is there a
protocol that
adds both a header and footer to the information that is passed down from an
upper layer,
thus creating a frame?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
B. The only layer with a protocol (such as Ethernet) that adds both a header and a
footer is the data link layer. The process of adding the headers and footers is known as
data encapsulation. All other protocol layers that encapsulate data add just a header.
Identify the layer of the Open Systems Interconnection (OSI) model that controls
the addressing,
transmission, and reception of Ethernet frames, and also identify the media
access control
method that Ethernet uses.
D. Transport
E. Session
F. Presentation
G. Application
A, B, C. The physical layer of the OSI model is associated with hubs, cables, and
network interface adapters. The data link layer is associated with bridges and switches.
The network layer is associated with routers. The transport, session, presentation, and
application layers are typically not associated with dedicated hardware devices.
At which layer of the Open Systems Interconnection (OSI) model is there a
protocol that
adds both a header and footer to the information that is passed down from an
upper layer,
thus creating a frame?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
B. The only layer with a protocol (such as Ethernet) that adds both a header and a
footer is the data link layer. The process of adding the headers and footers is known as
data encapsulation. All other protocol layers that encapsulate data add just a header.
Identify the layer of the Open Systems Interconnection (OSI) model that controls
the addressing,
transmission, and reception of Ethernet frames, and also identify the media
access control
method that Ethernet uses.
Loading page 8...
A. Physical layer; Carrier Sense Multiple Access with Collision Detection
(CSMA/CD)
B. Physical layer; Carrier Sense Multiple Access with Collision Avoidance
(CSMA/CA)
C. Data link layer; CSMA/CD
D. Data link layer; CSMA/CA
C. The Ethernet protocol that handles the addressing, transmission, and reception of
frames operates at the data link layer. Each frame includes hardware addresses that
identify the sending and receiving systems on the local network. Ethernet uses the
CSMA/CD media access control method. Physical layer specifications include the
transmission of signals in the form of electrical or light pulses to represent binary code,
not frames. CSMA/CA is a data link layer media access control method used by
wireless LAN protocols, but not Ethernet.
At which layer of the OSI model do you find the protocol responsible for the
delivery of data
to its ultimate destination on an internetwork?
A. Data link
B. Network
C. Session
D. Application
B. On a TCP/IP network, the Internet Protocol (IP) at the network layer is the protocol
responsible for the delivery of data to its final destination. Data link layer protocols are
only concerned with communication between devices on a Local Area Network (LAN) or
between two points connected by a Wide Area Network (WAN) link. The session and
application layers are not involved in the actual delivery of data
Which of the following is not a protocol operating at the network layer of the OSI
model?
A. IP
B. ICMP
(CSMA/CD)
B. Physical layer; Carrier Sense Multiple Access with Collision Avoidance
(CSMA/CA)
C. Data link layer; CSMA/CD
D. Data link layer; CSMA/CA
C. The Ethernet protocol that handles the addressing, transmission, and reception of
frames operates at the data link layer. Each frame includes hardware addresses that
identify the sending and receiving systems on the local network. Ethernet uses the
CSMA/CD media access control method. Physical layer specifications include the
transmission of signals in the form of electrical or light pulses to represent binary code,
not frames. CSMA/CA is a data link layer media access control method used by
wireless LAN protocols, but not Ethernet.
At which layer of the OSI model do you find the protocol responsible for the
delivery of data
to its ultimate destination on an internetwork?
A. Data link
B. Network
C. Session
D. Application
B. On a TCP/IP network, the Internet Protocol (IP) at the network layer is the protocol
responsible for the delivery of data to its final destination. Data link layer protocols are
only concerned with communication between devices on a Local Area Network (LAN) or
between two points connected by a Wide Area Network (WAN) link. The session and
application layers are not involved in the actual delivery of data
Which of the following is not a protocol operating at the network layer of the OSI
model?
A. IP
B. ICMP
Loading page 9...
C. IGMP
D. IMAP
D. Internet Protocol (IP), Internet Control Message Protocol (ICMP), and Internet Group
Message Protocol (IGMP) are all network layer protocols. Internet Message Access
Protocol (IMAP) is a mail protocol that operates at the application layer.
Ed is a software developer who has been given the task of creating an application
that
requires guaranteed delivery of information between end systems. At which layer
of the Open
Systems Interconnection (OSI) model does the protocol that provides the
guaranteed delivery
run, and what type of protocol must Ed use?
A. Data link layer; connectionless
B. Network layer; connection-oriented
C. Transport layer; connection-oriented
D. Application layer; connectionless
C. A connection-oriented transport layer protocol, such as Transmission Control
Protocol (TCP), provides guaranteed delivery of data for upper layer applications.
Connectionless protocols do not guarantee delivery of information and therefore are not
a good choice. Guaranteed delivery of information is generally not a function of the data
link, network, or application layer.
Which of the following devices operates only at the physical layer of the Open
Systems Interconnection
(OSI) model?
A. Hub
B. Bridge
C. Switch
D. Router
D. IMAP
D. Internet Protocol (IP), Internet Control Message Protocol (ICMP), and Internet Group
Message Protocol (IGMP) are all network layer protocols. Internet Message Access
Protocol (IMAP) is a mail protocol that operates at the application layer.
Ed is a software developer who has been given the task of creating an application
that
requires guaranteed delivery of information between end systems. At which layer
of the Open
Systems Interconnection (OSI) model does the protocol that provides the
guaranteed delivery
run, and what type of protocol must Ed use?
A. Data link layer; connectionless
B. Network layer; connection-oriented
C. Transport layer; connection-oriented
D. Application layer; connectionless
C. A connection-oriented transport layer protocol, such as Transmission Control
Protocol (TCP), provides guaranteed delivery of data for upper layer applications.
Connectionless protocols do not guarantee delivery of information and therefore are not
a good choice. Guaranteed delivery of information is generally not a function of the data
link, network, or application layer.
Which of the following devices operates only at the physical layer of the Open
Systems Interconnection
(OSI) model?
A. Hub
B. Bridge
C. Switch
D. Router
Loading page 10...
A. A hub functions only at the physical layer by forwarding all incoming signals out
through all of its ports. Bridges and switches operate at the data link layer by selectively
propagating incoming data. Routers operate at the network layer by connecting local
area networks (LANs) and propagating only the traffic intended for another network,
based on IP addresses
Alice is a network administrator designing a new Local Area Network (LAN). She
needs to
determine the type of cabling and the network topology to implement. Which
layers of the
Open Systems Interconnection (OSI) model apply to cabling and topology
elements?
A. Physical and data link layers
B. Data link and network layers
C. Network and transport layers
D. Transport and application layers
A. The physical layer defines the mechanical and electrical characteristics of the cables
used to build a network. The data link layer defines specific network (LAN or WAN)
topologies and their characteristics. The physical layer standard that Alice will
implement is dependent on the data link layer protocol she selects. The network,
transport, and application layers are not concerned with cables and topologies.
Which layers of the Open Systems Interconnection (OSI) model do not have
protocols in the
TCP/IP suite exclusively dedicated to them? (Choose all that apply.)
A. Physical
B. Data link
C. Network
D. Transport
E. Session
through all of its ports. Bridges and switches operate at the data link layer by selectively
propagating incoming data. Routers operate at the network layer by connecting local
area networks (LANs) and propagating only the traffic intended for another network,
based on IP addresses
Alice is a network administrator designing a new Local Area Network (LAN). She
needs to
determine the type of cabling and the network topology to implement. Which
layers of the
Open Systems Interconnection (OSI) model apply to cabling and topology
elements?
A. Physical and data link layers
B. Data link and network layers
C. Network and transport layers
D. Transport and application layers
A. The physical layer defines the mechanical and electrical characteristics of the cables
used to build a network. The data link layer defines specific network (LAN or WAN)
topologies and their characteristics. The physical layer standard that Alice will
implement is dependent on the data link layer protocol she selects. The network,
transport, and application layers are not concerned with cables and topologies.
Which layers of the Open Systems Interconnection (OSI) model do not have
protocols in the
TCP/IP suite exclusively dedicated to them? (Choose all that apply.)
A. Physical
B. Data link
C. Network
D. Transport
E. Session
Loading page 11...
F. Presentation
G. Application
E, F. In the TCP/IP suite, the functions of the session layer are primarily implemented in
the transport layer protocols: Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP). The presentation layer functions are often implemented in application
layer protocols, although some functions, such as encryption, can also be performed by
transport or network layer protocols.
The protocols at which layer of the Open Systems Interconnection (OSI) model
use port
numbers to identify the applications that are the source and the destination of the
data in
the packets?
A. Application
B. Presentation
C. Transport
D. Network
. Transport layer protocols, such as Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP), have header fields that contain the port numbers of the
applications that generated the data in the packet and which will receive it. The
application, presentation, and network layers do not use port numbers.
Which of the following is a correct listing of the Open Systems Interconnection
(OSI) model
layers, in order, from top to bottom?
A. Physical, data link, transport, network, session presentation, application
B. Application, session, presentation, transport, network, data link, physical
C. Presentation, application, transport, session, network, physical, data link
D. Session, application, presentation, transport, data link, network, physical
E. Application, presentation, session, transport, network, data link, physical
G. Application
E, F. In the TCP/IP suite, the functions of the session layer are primarily implemented in
the transport layer protocols: Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP). The presentation layer functions are often implemented in application
layer protocols, although some functions, such as encryption, can also be performed by
transport or network layer protocols.
The protocols at which layer of the Open Systems Interconnection (OSI) model
use port
numbers to identify the applications that are the source and the destination of the
data in
the packets?
A. Application
B. Presentation
C. Transport
D. Network
. Transport layer protocols, such as Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP), have header fields that contain the port numbers of the
applications that generated the data in the packet and which will receive it. The
application, presentation, and network layers do not use port numbers.
Which of the following is a correct listing of the Open Systems Interconnection
(OSI) model
layers, in order, from top to bottom?
A. Physical, data link, transport, network, session presentation, application
B. Application, session, presentation, transport, network, data link, physical
C. Presentation, application, transport, session, network, physical, data link
D. Session, application, presentation, transport, data link, network, physical
E. Application, presentation, session, transport, network, data link, physical
Loading page 12...
E. The correct order of the OSI model layers, from top to bottom, is application,
presentation, session, transport, network, data link, physical.
At which of the Open Systems Interconnection (OSI) model layers do switches
and bridges
perform their basic functions?
A. Physical
B. Data link
C. Network
D. Transport
B. Switches and bridges are involved in Local Area Network (LAN) communications only
and therefore primarily at the data link layer. They are not primarily associated with the
physical, network, or transport layers, although some switches include network layer
routing capabilities
On a TCP/IP network, flow control is a function implemented in protocols
operating at
which layer of the Open Systems Interconnection (OSI) model?
A. Presentation
B. Session
C. Transport
D. Network
C. Flow control is a process that adjusts the transmission rate of a protocol based on
the capability of the receiver. If the receiving system becomes overwhelmed by
incoming data, the sender dynamically reduces the transmission rate. In the TCP/IP
protocol suite, Transmission Control Protocol (TCP) is responsible for implementing flow
control. TCP runs at the transport layer. None of the other layers listed have TCP/IP
protocols that provide flow control.
Which layer of the Open Systems Interconnection (OSI) model defines the
medium, network
presentation, session, transport, network, data link, physical.
At which of the Open Systems Interconnection (OSI) model layers do switches
and bridges
perform their basic functions?
A. Physical
B. Data link
C. Network
D. Transport
B. Switches and bridges are involved in Local Area Network (LAN) communications only
and therefore primarily at the data link layer. They are not primarily associated with the
physical, network, or transport layers, although some switches include network layer
routing capabilities
On a TCP/IP network, flow control is a function implemented in protocols
operating at
which layer of the Open Systems Interconnection (OSI) model?
A. Presentation
B. Session
C. Transport
D. Network
C. Flow control is a process that adjusts the transmission rate of a protocol based on
the capability of the receiver. If the receiving system becomes overwhelmed by
incoming data, the sender dynamically reduces the transmission rate. In the TCP/IP
protocol suite, Transmission Control Protocol (TCP) is responsible for implementing flow
control. TCP runs at the transport layer. None of the other layers listed have TCP/IP
protocols that provide flow control.
Which layer of the Open Systems Interconnection (OSI) model defines the
medium, network
Loading page 13...
interfaces, connecting hardware, and signaling methods used on a network?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
A. The physical layer of the OSI model defines the standards for the physical and
mechanical characteristics of a network, such as cabling (copper and fiber), connecting
hardware (hubs and switches), and signaling methods (analog and digital). All of the
other layers are not involved in the mechanical characteristics of the network.
Which of the OSI model layers is responsible for syntax translation and
compression or
encryption?
A. Data link
B. Network
C. Session
D. Presentation
E. Application
D. The presentation layer provides a syntax translation service that enables two
computers to communicate, despite their use of different bit-encoding methods. This
translation service also enables systems using compressed or encrypted data to
communicate with each other
Which layer of the Open Systems Interconnection (OSI) model is responsible for
transmitting
signals over the network medium?
A. Physical
B. Data link
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
A. The physical layer of the OSI model defines the standards for the physical and
mechanical characteristics of a network, such as cabling (copper and fiber), connecting
hardware (hubs and switches), and signaling methods (analog and digital). All of the
other layers are not involved in the mechanical characteristics of the network.
Which of the OSI model layers is responsible for syntax translation and
compression or
encryption?
A. Data link
B. Network
C. Session
D. Presentation
E. Application
D. The presentation layer provides a syntax translation service that enables two
computers to communicate, despite their use of different bit-encoding methods. This
translation service also enables systems using compressed or encrypted data to
communicate with each other
Which layer of the Open Systems Interconnection (OSI) model is responsible for
transmitting
signals over the network medium?
A. Physical
B. Data link
Loading page 14...
C. Network
D. Transport
E. Session
F. Presentation
G. Application
A. The physical layer of the OSI model defines the functions specific to the network
medium and the transmission and reception of signals. All of the other layers are
implemented in software and do not physically send or receive signals.
Specify the layer of the Open Systems Interconnection (OSI) model at which the
Internet Protocol
(IP) operates and whether it is connection-oriented
or connectionless.
A. Network; connection-oriented
B. Network; connectionless
C. Transport; connection-oriented
D. Transport; connectionless
B. IP is a connectionless protocol that operates at the network layer of the OSI model.
There are no connection-oriented protocols at this layer. The protocols at the transport
layer include Transmission Control Protocol (TCP), which is connection-oriented, and
User Datagram Protocol (UDP), which is connectionless.
An Ethernet network interface adapter provides functions that span which two
layers of the
Open Systems Interconnection (OSI) model?
A. Physical and data link
B. Data link and network
C. Network and transport
D. Transport and application
D. Transport
E. Session
F. Presentation
G. Application
A. The physical layer of the OSI model defines the functions specific to the network
medium and the transmission and reception of signals. All of the other layers are
implemented in software and do not physically send or receive signals.
Specify the layer of the Open Systems Interconnection (OSI) model at which the
Internet Protocol
(IP) operates and whether it is connection-oriented
or connectionless.
A. Network; connection-oriented
B. Network; connectionless
C. Transport; connection-oriented
D. Transport; connectionless
B. IP is a connectionless protocol that operates at the network layer of the OSI model.
There are no connection-oriented protocols at this layer. The protocols at the transport
layer include Transmission Control Protocol (TCP), which is connection-oriented, and
User Datagram Protocol (UDP), which is connectionless.
An Ethernet network interface adapter provides functions that span which two
layers of the
Open Systems Interconnection (OSI) model?
A. Physical and data link
B. Data link and network
C. Network and transport
D. Transport and application
Loading page 15...
A. An Ethernet network interface adapter functions at the data link layer by
encapsulating network layer data for transmission over the network. It provides physical
layer functions by providing the connection to the network medium and generating the
appropriate signals for transmission. Network interface adapters do not operate at the
network, transport, or application layer.
Which of the following protocols operate at the application layer of the Open
Systems Interconnection
(OSI) model? (Choose all that apply.)
A. HTTP
B. SNMP
C. ICMP
D. IGMP
E. UDP
A, B. Hypertext Transfer Protocol (HTTP) and Simple Network Management Protocol
(SNMP) operate at the application layer. Internet Control Message Protocol (ICMP) and
Internet Group Management Protocol (IGMP) both operate at the network layer. User
Datagram Protocol (UDP) operates at the transport layer
Which layer of the Open Systems Interconnection (OSI) model would be
responsible for
converting a text file encoded using EBCDIC on the sending system into ASCII
code, when
required by the receiving system?
A. Application
B. Presentation
C. Session
D. Physical
B. The presentation layer of the OSI model is responsible for translating different kinds
of syntax, including text-encoding systems, such as EBCDIC and ASCII. The
application, session, and physical layers do not perform this function.
encapsulating network layer data for transmission over the network. It provides physical
layer functions by providing the connection to the network medium and generating the
appropriate signals for transmission. Network interface adapters do not operate at the
network, transport, or application layer.
Which of the following protocols operate at the application layer of the Open
Systems Interconnection
(OSI) model? (Choose all that apply.)
A. HTTP
B. SNMP
C. ICMP
D. IGMP
E. UDP
A, B. Hypertext Transfer Protocol (HTTP) and Simple Network Management Protocol
(SNMP) operate at the application layer. Internet Control Message Protocol (ICMP) and
Internet Group Management Protocol (IGMP) both operate at the network layer. User
Datagram Protocol (UDP) operates at the transport layer
Which layer of the Open Systems Interconnection (OSI) model would be
responsible for
converting a text file encoded using EBCDIC on the sending system into ASCII
code, when
required by the receiving system?
A. Application
B. Presentation
C. Session
D. Physical
B. The presentation layer of the OSI model is responsible for translating different kinds
of syntax, including text-encoding systems, such as EBCDIC and ASCII. The
application, session, and physical layers do not perform this function.
Loading page 16...
Which of the following protocols operates at the network layer of the OSI model,
but
does not encapsulate data generated by an upper layer protocol for transmission
over
the network?
A. IP
B. UDP
C. ARP
D. ICMP
E. TCP
D. Internet Control Message Protocol (ICMP) operates at the network layer by sending
operational and error messages. It does not encapsulate upper layer protocol data.
Internet Protocol (IP) operates at the network layer, but it does encapsulate transport
layer protocol data. Transmission Control Protocol (TCP) and User Datagram Protocol
(UDP) are transport layer protocols that encapsulate upper layer protocol data. Address
Resolution Protocol (ARP) does not encapsulate upper layer protocol data, but it is a
data link layer protocol.
A client on a TCP/IP network is attempting to establish a session with a server.
Which of the
following correctly lists the order of the TCP flags raised in the Transmission
Control Protocol
(TCP) session establishment messages?
A. SYN, ACK, SYN, ACK
B. SYN, SYN, ACK, ACK
C. SYN/ACK, SYN/ACK
D. SYN, SYN/ACK, ACK
D. The TCP connection establishment exchange is a three-way handshake that uses
TCP flags to specify the message type for each frame. The first frame contains a SYN
but
does not encapsulate data generated by an upper layer protocol for transmission
over
the network?
A. IP
B. UDP
C. ARP
D. ICMP
E. TCP
D. Internet Control Message Protocol (ICMP) operates at the network layer by sending
operational and error messages. It does not encapsulate upper layer protocol data.
Internet Protocol (IP) operates at the network layer, but it does encapsulate transport
layer protocol data. Transmission Control Protocol (TCP) and User Datagram Protocol
(UDP) are transport layer protocols that encapsulate upper layer protocol data. Address
Resolution Protocol (ARP) does not encapsulate upper layer protocol data, but it is a
data link layer protocol.
A client on a TCP/IP network is attempting to establish a session with a server.
Which of the
following correctly lists the order of the TCP flags raised in the Transmission
Control Protocol
(TCP) session establishment messages?
A. SYN, ACK, SYN, ACK
B. SYN, SYN, ACK, ACK
C. SYN/ACK, SYN/ACK
D. SYN, SYN/ACK, ACK
D. The TCP connection establishment exchange is a three-way handshake that uses
TCP flags to specify the message type for each frame. The first frame contains a SYN
Loading page 17...
flag from the client; the second frame contains the SYN and ACK flags from the server;
and the last frame contains an ACK flag from the client.
Which of the following is the Maximum Transmission Unit (MTU) size for an
Ethernet
frame?
A. 512
B. 1024
C. 1500
D. 1518
C. The MTU is the largest amount of data (in bytes) that a protocol operating at a given
layer of the OSI model can transmit in one packet. The MTU does not include any
header and footer fields supplied by that protocol. For Ethernet, the maximum frame
size is 1518 bytes, which includes 18 bytes of header and footer fields. Therefore, the
MTU for Ethernet is 1500 bytes. Protocols operating at other OSI model layers can have
different MTUs. For example, the ty
Which of the following Transmission Control Protocol (TCP) control bits is set to
1 to initiate
the termination of a session?
A. SYN
B. URG
C. FIN
D. END
E. PSH
C. The termination phase of a TCP connection begins when either the client or the
server sends a message containing the FIN control bit with a value of 1. The other
control bits listed have nothing to do with the connection termination procedure, and
there is no END bit.
and the last frame contains an ACK flag from the client.
Which of the following is the Maximum Transmission Unit (MTU) size for an
Ethernet
frame?
A. 512
B. 1024
C. 1500
D. 1518
C. The MTU is the largest amount of data (in bytes) that a protocol operating at a given
layer of the OSI model can transmit in one packet. The MTU does not include any
header and footer fields supplied by that protocol. For Ethernet, the maximum frame
size is 1518 bytes, which includes 18 bytes of header and footer fields. Therefore, the
MTU for Ethernet is 1500 bytes. Protocols operating at other OSI model layers can have
different MTUs. For example, the ty
Which of the following Transmission Control Protocol (TCP) control bits is set to
1 to initiate
the termination of a session?
A. SYN
B. URG
C. FIN
D. END
E. PSH
C. The termination phase of a TCP connection begins when either the client or the
server sends a message containing the FIN control bit with a value of 1. The other
control bits listed have nothing to do with the connection termination procedure, and
there is no END bit.
Loading page 18...
An electrician installing a new light fixture accidentally severs one of the LAN
cables running
through the dropped ceiling space. With which topology would the severed cable
cause the
greatest amount of disturbance to the network?
A. Bus
B. Star
C. Logical ring
D. Mesh
A. A cable break in a bus topology would split the network into two halves, preventing
the nodes on one side of the break from communicating with those on the other. In
addition, both halves of the network would be left with one unterminated end, which
would prevent the computers on each side of the break from communicating effectively.
A cable break in a star or logical ring topology would only interrupt the connection of a
single computer to the network. The mesh topology is not often used for LANs, but
redundant network connections are a characteristic of mesh networks, which means
that a single cable break would have no effect on the network.
Which of the following statements about a wired Local Area Network (LAN) is
true?
A. Wired LANs support only the star topology.
B. Wired LANs support only the star and bus topologies.
C. Wired LANs support only the star and ring topologies.
D. Wired LANs can support ring, bus, or star topologies.
A wired LAN is a group of computers within a small area, connected by a common
network medium. A wired LAN can be configured using a ring, bus, or star topology.
Which of the following is an example of a hybrid topology?
A. A workstation with two network interface cards, one of which is connected to a
star network
and one to a bus network
cables running
through the dropped ceiling space. With which topology would the severed cable
cause the
greatest amount of disturbance to the network?
A. Bus
B. Star
C. Logical ring
D. Mesh
A. A cable break in a bus topology would split the network into two halves, preventing
the nodes on one side of the break from communicating with those on the other. In
addition, both halves of the network would be left with one unterminated end, which
would prevent the computers on each side of the break from communicating effectively.
A cable break in a star or logical ring topology would only interrupt the connection of a
single computer to the network. The mesh topology is not often used for LANs, but
redundant network connections are a characteristic of mesh networks, which means
that a single cable break would have no effect on the network.
Which of the following statements about a wired Local Area Network (LAN) is
true?
A. Wired LANs support only the star topology.
B. Wired LANs support only the star and bus topologies.
C. Wired LANs support only the star and ring topologies.
D. Wired LANs can support ring, bus, or star topologies.
A wired LAN is a group of computers within a small area, connected by a common
network medium. A wired LAN can be configured using a ring, bus, or star topology.
Which of the following is an example of a hybrid topology?
A. A workstation with two network interface cards, one of which is connected to a
star network
and one to a bus network
Loading page 19...
B. Four Ethernet switches connected using a bus topology
C. Four workstations, each with a separate network connection to each of the
other three
D. Four Ethernet switches, each with a separate network connection to each of
the other
three
B . A hybrid topology is a network that uses two or more of the basic topologies,
connected together so that each workstation can communicate with all of the other
workstations. Connecting four switches to a bus topology combines four-star networks
in such a way that the workstations are all interconnected. Connecting a single
workstation to a star and a bus network enables that workstation to access both
networks, but it does not enable other workstations to access both topologies. Four
workstations, each with a separate connection to the other three, is a mesh network
topology, not a hybrid. Four connected switches expands the star topology, but it does
not create a hybrid topology
Which type of network is typically confined to a small area, such as a single
room, floor,
or building?
A. WAN
B. LAN
C. MAN
D. CAN
B. A Local Area Network (LAN), as the name implies, is a group of computers contained
within a small geographic area. WANs (Wide Area Networks) connect LANs that are
geographically distant. MANs (Metropolitan Area Networks) are not confined to a small
area; they are typically larger than a LAN but smaller than a WAN. A Campus Area
Network (CAN) typically includes a group of adjacent buildings, such as those of a
corporation or university.
C. Four workstations, each with a separate network connection to each of the
other three
D. Four Ethernet switches, each with a separate network connection to each of
the other
three
B . A hybrid topology is a network that uses two or more of the basic topologies,
connected together so that each workstation can communicate with all of the other
workstations. Connecting four switches to a bus topology combines four-star networks
in such a way that the workstations are all interconnected. Connecting a single
workstation to a star and a bus network enables that workstation to access both
networks, but it does not enable other workstations to access both topologies. Four
workstations, each with a separate connection to the other three, is a mesh network
topology, not a hybrid. Four connected switches expands the star topology, but it does
not create a hybrid topology
Which type of network is typically confined to a small area, such as a single
room, floor,
or building?
A. WAN
B. LAN
C. MAN
D. CAN
B. A Local Area Network (LAN), as the name implies, is a group of computers contained
within a small geographic area. WANs (Wide Area Networks) connect LANs that are
geographically distant. MANs (Metropolitan Area Networks) are not confined to a small
area; they are typically larger than a LAN but smaller than a WAN. A Campus Area
Network (CAN) typically includes a group of adjacent buildings, such as those of a
corporation or university.
Loading page 20...
Which type of network connects Local Area Networks (LANs) in distant
locations?
A. WAN
B. LAN
C. MAN
D. CAN
A. WANs (Wide Area Networks) connect LANs that are geographically distant. A LAN
(Local Area Network), as the name implies, is a group of computers, not other LANs,
and it is contained within a small area. MANs (Metropolitan Area Networks) connect
LANs in a single metropolitan area; they are not confined to a small area. A MAN is
typically larger than a LAN but smaller than a WAN. A Campus Area Network (CAN)
typically includes a group of adjacent buildings, such as those of a corporation or
university
Which of the following topologies requires the installation of terminating
resistors at two
locations?
A. Bus
B. Star
C. Ring
D. Mesh
A. A bus topology requires terminating resistors at each end of the bus, to remove
signals as they reach the end of the cable and prevent them from reflecting back in the
other direction and interfering with newly transmitted signals. Star, ring, and mesh
topologies do not require terminating resistors
Which of the following topologies is used by the majority of new Ethernet
networks
installed today?
A. Bus
B. Virtual ring
locations?
A. WAN
B. LAN
C. MAN
D. CAN
A. WANs (Wide Area Networks) connect LANs that are geographically distant. A LAN
(Local Area Network), as the name implies, is a group of computers, not other LANs,
and it is contained within a small area. MANs (Metropolitan Area Networks) connect
LANs in a single metropolitan area; they are not confined to a small area. A MAN is
typically larger than a LAN but smaller than a WAN. A Campus Area Network (CAN)
typically includes a group of adjacent buildings, such as those of a corporation or
university
Which of the following topologies requires the installation of terminating
resistors at two
locations?
A. Bus
B. Star
C. Ring
D. Mesh
A. A bus topology requires terminating resistors at each end of the bus, to remove
signals as they reach the end of the cable and prevent them from reflecting back in the
other direction and interfering with newly transmitted signals. Star, ring, and mesh
topologies do not require terminating resistors
Which of the following topologies is used by the majority of new Ethernet
networks
installed today?
A. Bus
B. Virtual ring
Loading page 21...
C. Mesh
D. Hierarchical star
D. Virtually all of the new Ethernet networks installed today use the star or the
hierarchical star topology, with one or more switches functioning as a cabling nexus
Alice has constructed a five-node
failover cluster in which all five servers are connected to
a hard disk array using a dedicated Fibre Channel network. Which of the
following terms
describes this network arrangement?
A. SAN
B. PAN
C. WAN
D. MAN
A. A storage area network (SAN) is a network that is dedicated to carrying traffic
between servers and storage devices. A Personal Area Network (PAN) provides
communication among devices associated with a single person, such as smartphones.
A Wide Area Network (WAN) is a network that connects devices or networks at different
geographic locations. A Metropolitan Area Network (MAN) is a type of WAN that
connects devices within a limited geographic area.
Which of the following is not a technology typically used for a personal area
network (PAN)?
A. Bluetooth
B. Z-Wave
C. NFC
D. SDWAN
D. A Software-Defined Wide Area Network (SDWAN) is a technology that automates
the configuration of WAN routers based on the current mix of traffic. It is therefore not
suitable for use on a PAN. Bluetooth, Z-Wave, and near-field communication (NFC) are
D. Hierarchical star
D. Virtually all of the new Ethernet networks installed today use the star or the
hierarchical star topology, with one or more switches functioning as a cabling nexus
Alice has constructed a five-node
failover cluster in which all five servers are connected to
a hard disk array using a dedicated Fibre Channel network. Which of the
following terms
describes this network arrangement?
A. SAN
B. PAN
C. WAN
D. MAN
A. A storage area network (SAN) is a network that is dedicated to carrying traffic
between servers and storage devices. A Personal Area Network (PAN) provides
communication among devices associated with a single person, such as smartphones.
A Wide Area Network (WAN) is a network that connects devices or networks at different
geographic locations. A Metropolitan Area Network (MAN) is a type of WAN that
connects devices within a limited geographic area.
Which of the following is not a technology typically used for a personal area
network (PAN)?
A. Bluetooth
B. Z-Wave
C. NFC
D. SDWAN
D. A Software-Defined Wide Area Network (SDWAN) is a technology that automates
the configuration of WAN routers based on the current mix of traffic. It is therefore not
suitable for use on a PAN. Bluetooth, Z-Wave, and near-field communication (NFC) are
Loading page 22...
all short-range wireless technologies that are capable of providing communications
between PAN devices.
Which of the following network topologies are used by Wireless Local Area
Networks
(WLANs)? (Choose all that apply.)
A. Ad hoc
B. Bus
C. Infrastructure
D. Star
A, C. WLANs can use the ad hoc topology, in which devices communicate directly with
each other, or the infrastructure topology, in which the wireless devices connect to an
access point. The bus and star topologies are used by wired networks only.
Which of the following cabling topologies was used by the first Ethernet
networks?
A. Bus
B. Ring
C. Star
D. Mesh
A. The first Ethernet networks used a physical layer implementation commonly known
as Thick Ethernet or 10Base5. The network used coaxial cable in a bus topology. Later
Ethernet standards use twisted pair cable in a star topology. Ethernet has never used a
ring or mesh topology
On an Ethernet network using the star topology, which of the following devices
can function
as the cabling nexus that forms the figurative center of the star? (Choose all that
apply.)
A. Hub
B. Router
between PAN devices.
Which of the following network topologies are used by Wireless Local Area
Networks
(WLANs)? (Choose all that apply.)
A. Ad hoc
B. Bus
C. Infrastructure
D. Star
A, C. WLANs can use the ad hoc topology, in which devices communicate directly with
each other, or the infrastructure topology, in which the wireless devices connect to an
access point. The bus and star topologies are used by wired networks only.
Which of the following cabling topologies was used by the first Ethernet
networks?
A. Bus
B. Ring
C. Star
D. Mesh
A. The first Ethernet networks used a physical layer implementation commonly known
as Thick Ethernet or 10Base5. The network used coaxial cable in a bus topology. Later
Ethernet standards use twisted pair cable in a star topology. Ethernet has never used a
ring or mesh topology
On an Ethernet network using the star topology, which of the following devices
can function
as the cabling nexus that forms the figurative center of the star? (Choose all that
apply.)
A. Hub
B. Router
Loading page 23...
C. Switch
D. Access Point
A, C. A hub or a switch can function as the cabling nexus at the center of an Ethernet
star topology. Each of the devices on the network is connected by a cable to a hub or
switch. Routers are used to connect networks to each other; they cannot function as the
center of a star topology
Which of the following cabling topologies provides the greatest number of
redundant paths
through the network?
A. Star
B. Ring
C. Mesh
D. Bus
C. A mesh topology is one in which every node is directly connected to every other
node, therefore providing complete redundancy through the network. In a star topology,
each node is connected to a central nexus, providing each with a single path to the rest
of the network. In a ring topology, each node is connected to two other nodes, providing
two possible paths through the network. In a bus topology, nodes are chained together
in a line, providing no redundancy.
Which of the following Ethernet physical layer options does not use the star
topology?
A. 10Base2
B. 10Base-T
C. 100Base-TX
D. 1000Base-T
A. 10Base2 is the physical layer specification for Thin Ethernet, which uses coaxial
cable in a bus topology. 10Base-T, 100Base-TX, and 1000Base-T all use twisted pair
cable in a star topology
D. Access Point
A, C. A hub or a switch can function as the cabling nexus at the center of an Ethernet
star topology. Each of the devices on the network is connected by a cable to a hub or
switch. Routers are used to connect networks to each other; they cannot function as the
center of a star topology
Which of the following cabling topologies provides the greatest number of
redundant paths
through the network?
A. Star
B. Ring
C. Mesh
D. Bus
C. A mesh topology is one in which every node is directly connected to every other
node, therefore providing complete redundancy through the network. In a star topology,
each node is connected to a central nexus, providing each with a single path to the rest
of the network. In a ring topology, each node is connected to two other nodes, providing
two possible paths through the network. In a bus topology, nodes are chained together
in a line, providing no redundancy.
Which of the following Ethernet physical layer options does not use the star
topology?
A. 10Base2
B. 10Base-T
C. 100Base-TX
D. 1000Base-T
A. 10Base2 is the physical layer specification for Thin Ethernet, which uses coaxial
cable in a bus topology. 10Base-T, 100Base-TX, and 1000Base-T all use twisted pair
cable in a star topology
Loading page 24...
Which of the following network types are typically wireless? (Choose all that
apply.)
A. WAN
B. PAN
C. SAN
D. WLAN
B, D. Personal area networks (PANs) connect devices associated with a single person,
such as smartphones, and are nearly always wireless. Wireless Local Area Networks
(WLANs) are wireless by definition. Wide Area Networks (WANs) typically span long
distances and are typically wired, at least in part. Storage area networks (SANs) require
high performance levels and are nearly always wired.
Dense Wave Division Multiplexing (DWDM) is a signaling technology that has
become a
popular choice in the construction of which of the following types of provider
links?
A. Digital Subscriber Line (DSL)
B. Metro-optical
C. Satellite
D. Cable
B. DWDM has become a popular technology in the construction of metro-optical
networks because it addresses some of the scalability and cost restrictions of other
optical technologies, such as Synchronous Optical Networks (SONETs). DSL, satellite,
and cable providers do not typically use DWDM.
Which of the following statements is true about the differences between a peer-
to-peer network and a client-server network?
A. Peer-to-peer networks are inherently less secure than client-server networks.
B. Peer-to-peer networks are illegal, while client-server
networks are legal.
C. On peer-to-peer networks, every workstation is capable of authenticating
apply.)
A. WAN
B. PAN
C. SAN
D. WLAN
B, D. Personal area networks (PANs) connect devices associated with a single person,
such as smartphones, and are nearly always wireless. Wireless Local Area Networks
(WLANs) are wireless by definition. Wide Area Networks (WANs) typically span long
distances and are typically wired, at least in part. Storage area networks (SANs) require
high performance levels and are nearly always wired.
Dense Wave Division Multiplexing (DWDM) is a signaling technology that has
become a
popular choice in the construction of which of the following types of provider
links?
A. Digital Subscriber Line (DSL)
B. Metro-optical
C. Satellite
D. Cable
B. DWDM has become a popular technology in the construction of metro-optical
networks because it addresses some of the scalability and cost restrictions of other
optical technologies, such as Synchronous Optical Networks (SONETs). DSL, satellite,
and cable providers do not typically use DWDM.
Which of the following statements is true about the differences between a peer-
to-peer network and a client-server network?
A. Peer-to-peer networks are inherently less secure than client-server networks.
B. Peer-to-peer networks are illegal, while client-server
networks are legal.
C. On peer-to-peer networks, every workstation is capable of authenticating
Loading page 25...
users.
D. On a peer-to-peer network, all workstations must share their resources.
C. A peer-to-peer network calls for each workstation to maintain accounts for
authenticating users that access their shared resources. On a client-server network,
authentication is centralized. Peer-to-peer networks can be more difficult to administer
than client-server networks, but they are not inherently less secure. Peer networks
sharing copyrighted content on the Internet are illegal, but it is not illegal to share private
resources on a peer-to-peer network. Workstations on a peer-to-peer network are not
required to share their resources, but they are capable of it.
Why does DSL (Digital Subscriber Line) technology support faster data
transmissions than a
standard Public Switched Telephone Network (PSTN) modem connection?
A. DSL uses a separate control circuit that provides clear channels for data.
B. DSL does not perform Cyclic Redundancy Check (CRC) functions and
therefore has less overhead.
C. DSL performs only a single analog-to-digital conversion.
D. DSL uses a higher frequency range.
D. DSL technology provides higher data rates because it uses frequency ranges that
are higher than the standard voice spectrum. DSL connections use 10 kHz and above,
whereas the standard voice spectrum uses 300 Hz to 4 kHz. DSL does not use
separate control circuits and does not perform CRC functions. Also, DSL technology is
strictly digital and does not require an analog-to-digital conversion.
Which DSL (Digital Subscriber Line) technology can adjust its transmission
speed based on line conditions?
A. HDSL
B. IDSL
C. RADSL
D. VDSL
D. On a peer-to-peer network, all workstations must share their resources.
C. A peer-to-peer network calls for each workstation to maintain accounts for
authenticating users that access their shared resources. On a client-server network,
authentication is centralized. Peer-to-peer networks can be more difficult to administer
than client-server networks, but they are not inherently less secure. Peer networks
sharing copyrighted content on the Internet are illegal, but it is not illegal to share private
resources on a peer-to-peer network. Workstations on a peer-to-peer network are not
required to share their resources, but they are capable of it.
Why does DSL (Digital Subscriber Line) technology support faster data
transmissions than a
standard Public Switched Telephone Network (PSTN) modem connection?
A. DSL uses a separate control circuit that provides clear channels for data.
B. DSL does not perform Cyclic Redundancy Check (CRC) functions and
therefore has less overhead.
C. DSL performs only a single analog-to-digital conversion.
D. DSL uses a higher frequency range.
D. DSL technology provides higher data rates because it uses frequency ranges that
are higher than the standard voice spectrum. DSL connections use 10 kHz and above,
whereas the standard voice spectrum uses 300 Hz to 4 kHz. DSL does not use
separate control circuits and does not perform CRC functions. Also, DSL technology is
strictly digital and does not require an analog-to-digital conversion.
Which DSL (Digital Subscriber Line) technology can adjust its transmission
speed based on line conditions?
A. HDSL
B. IDSL
C. RADSL
D. VDSL
Loading page 26...
C. Rate-Adaptive Digital Subscriber Line (RADSL) technology can adjust its rate of
transmission based on line conditions. High-bit-rate Digital Subscriber Line (HDSL),
Very highrate Digital Subscriber Line (VDSL), and Internet Digital Subscriber Line
(IDSL) do not use
rate adaptive transmission.
Ed has been hired by a private company to connect two remote sites with a Wide
Area Network (WAN). Each of these sites has more than 200 users, and they all
need to constantly
transfer files across the WAN. One of the sites has a customer database that is
accessed by both sites at all hours of the day. Access to the database and other
information is time
sensitive and constant. The company estimates that their aggregate bandwidth
needs to be approximately 40 Mbps. Management says that they need to
guarantee access to this
information and that money is not a factor in the WAN implementation. Which
WAN technology should Ed recommend for this scenario?
A. A standard modem-to-modem connection
B. A T-3 dedicated leased line
C. A cable television (CATV) connection
D. An ADSL (Asymmetrical Digital Subscriber Line) connection
B. For this scenario, the best of the options given is a dedicated leased line connection.
This is because the bandwidth requirements are constant, and the data transfer rates
are high. To support the 40 Mbps data rate, Ed should recommend a T-3 dedicated
leased line, running at 44.735 Mbps. Standard modem connections, CATV, and ADSL
connections are all too slow.
Which of the following Wide Area Network (WAN) technologies uses broadband
signaling?
A. Digital Subscriber Line (DSL)
B. Synchronous Optical Network (SONET)
transmission based on line conditions. High-bit-rate Digital Subscriber Line (HDSL),
Very highrate Digital Subscriber Line (VDSL), and Internet Digital Subscriber Line
(IDSL) do not use
rate adaptive transmission.
Ed has been hired by a private company to connect two remote sites with a Wide
Area Network (WAN). Each of these sites has more than 200 users, and they all
need to constantly
transfer files across the WAN. One of the sites has a customer database that is
accessed by both sites at all hours of the day. Access to the database and other
information is time
sensitive and constant. The company estimates that their aggregate bandwidth
needs to be approximately 40 Mbps. Management says that they need to
guarantee access to this
information and that money is not a factor in the WAN implementation. Which
WAN technology should Ed recommend for this scenario?
A. A standard modem-to-modem connection
B. A T-3 dedicated leased line
C. A cable television (CATV) connection
D. An ADSL (Asymmetrical Digital Subscriber Line) connection
B. For this scenario, the best of the options given is a dedicated leased line connection.
This is because the bandwidth requirements are constant, and the data transfer rates
are high. To support the 40 Mbps data rate, Ed should recommend a T-3 dedicated
leased line, running at 44.735 Mbps. Standard modem connections, CATV, and ADSL
connections are all too slow.
Which of the following Wide Area Network (WAN) technologies uses broadband
signaling?
A. Digital Subscriber Line (DSL)
B. Synchronous Optical Network (SONET)
Loading page 27...
C. Integrated Services Digital Network (ISDN)
D. Cable television (CATV)
D. CATV networks use broadband signaling, which enables many signals to occupy the
same channel. DSL and ISDN do not use broadband signaling. SONET is a physical
layer standard that defines fiber-optic connections.
Ed has been hired by a private company to connect two remote sites with a Wide
Area Network
(WAN). Each of these sites has more than 200 users, and they all need to
constantly transfer files across the WAN. One of the sites has a customer
database that is accessed by both sites at all hours of the day. Access to the
database and other information is time sensitive and constant. The company
estimates that their aggregate bandwidth needs to be approximately 40 Mbps.
Management says that they need to guarantee access to this
information and that money is not a factor in the WAN implementation. Which
WAN technology should Ed recommend for this scenario?
A. A standard modem-to-modem connection
B. A T-3 dedicated leased line
C. A cable television (CATV) connection
D. An ADSL (Asymmetrical Digital Subscriber Line) connection
B. For this scenario, the best of the options given is a dedicated leased line connection.
This is because the bandwidth requirements are constant, and the data transfer rates
are high. To support the 40 Mbps data rate, Ed should recommend a T-3 dedicated
leased line, running at 44.735 Mbps. Standard modem connections, CATV, and ADSL
connections are all too slow.
Ralph is an employee of a company that offers the option to telecommute from
home. As a telecommuting employee, he needs to connect to the company
network to access client
information, transfer files, and send email through a Virtual Private Network (VPN)
connection. Ralph is investigating the different Wide Area Network (WAN)
D. Cable television (CATV)
D. CATV networks use broadband signaling, which enables many signals to occupy the
same channel. DSL and ISDN do not use broadband signaling. SONET is a physical
layer standard that defines fiber-optic connections.
Ed has been hired by a private company to connect two remote sites with a Wide
Area Network
(WAN). Each of these sites has more than 200 users, and they all need to
constantly transfer files across the WAN. One of the sites has a customer
database that is accessed by both sites at all hours of the day. Access to the
database and other information is time sensitive and constant. The company
estimates that their aggregate bandwidth needs to be approximately 40 Mbps.
Management says that they need to guarantee access to this
information and that money is not a factor in the WAN implementation. Which
WAN technology should Ed recommend for this scenario?
A. A standard modem-to-modem connection
B. A T-3 dedicated leased line
C. A cable television (CATV) connection
D. An ADSL (Asymmetrical Digital Subscriber Line) connection
B. For this scenario, the best of the options given is a dedicated leased line connection.
This is because the bandwidth requirements are constant, and the data transfer rates
are high. To support the 40 Mbps data rate, Ed should recommend a T-3 dedicated
leased line, running at 44.735 Mbps. Standard modem connections, CATV, and ADSL
connections are all too slow.
Ralph is an employee of a company that offers the option to telecommute from
home. As a telecommuting employee, he needs to connect to the company
network to access client
information, transfer files, and send email through a Virtual Private Network (VPN)
connection. Ralph is investigating the different Wide Area Network (WAN)
Loading page 28...
25 more pages available. Scroll down to load them.
Preview Mode
Sign in to access the full document!
100%
Study Now!
XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
AI Assistant
Document Details
Subject
Network Plus Certification