1 / 18

Quiz

Quiz. Chapter 7 LAN Communications Protocols. Number#1. In terms of IP addressing, what is the purpose of a subnet mask? Allows for IP routing Breaks the IP address into a network segment address and node address Increases the number of stations that can be on the network All of the above

floyd
Download Presentation

Quiz

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Quiz Chapter 7 LAN Communications Protocols

  2. Number#1 • In terms of IP addressing, what is the purpose of a subnet mask? • Allows for IP routing • Breaks the IP address into a network segment address and node address • Increases the number of stations that can be on the network • All of the above • None of these

  3. Number#2 What is the meaning of an IP address where the node (host) section is all 0’s? A) Broadcast address B) Multi-cast address C) Network segment address D) Nothing, it’s a normal node address E) None of these

  4. Number#3 • How are MAC addresses resolved from IP addresses? • ARP • DHCP • RARP • The MAC address is part of the IP address • MAC addresses cannot be resolved from IP addresses

  5. Number#4 • What functionality does UDP bring to IP? • Nothing, UDP is an optional protocol • UDP provides a connection oriented protocol for use over IP • UDP provides port numbers for connectionless communication • UDP provides requisite error checking and flow control • An alternative to RIP

  6. Number#5 Which protocol resolves TCP/IP domain host names (i.e. www.yahoo.com) to IP addresses? A) ARP B) BOOTP C) DHCP D) DNS E) APAR

  7. Quiz Chapter 8 Advanced TCP/IP Networks Design

  8. Number#1 Classful address are broken apart on _________ boundaries. A) Bit B) Word C) Octet D) Stream E) None of these

  9. Number#2 Class C network addresses are sometimes referred to as a _________ addresses A) /8 B) /16 C) /24 D) /32 E) none of these

  10. Number#3 The division of an IP address into a network number and host number is accomplished through the use of a A) Node ID B) Router table C) Gateway protocol D) Subnet mask E) Protocol Bridge

  11. Number#4 A host ID of all ones is called the _________ address A) Multicast B) Broadcast C) Simulcast D) Gateway E) None of these

  12. Number#5 A routing protocol that is able to accommodate variable length subnet masks is A) OSPF B) RIP C) IGRP D) All of these E) None of these BCCCABCDCC

  13. Quiz Chapter 9 LAN OS & Remote Access

  14. Number#1 • Which of the following are not steps in the authentication process? • Identification • Authorization • Proof of Identification • All of these are steps in the authentication process • none of these

  15. Number#2 Which of the following NOSs offers powerful capabilities, is the most expensive, and is complicated to install? A) DOS-based LAN B) Client/server NOS C) Peer-to-peer NOS D) client-to-client NOS E) all of these

  16. Number#3 Which of the following is not an advantage of client/server network operating systems? A) provide fast service B) offer reliable performance C) are easy to install and configure D) offer good security capabilities E) all of these are advantages

  17. Number#4 Which of the following remote LAN access categories is often referred to as SOHO? A) technical support B) telecommuting C) mobile computing D) corporate computing E) none of these

  18. Number#5 Which of the following security related procedures for remote access computing would ensure that an intercepted password would not be usable? A) password assignment and management B) intrusion responses C) dial-back systems D) encryption E) none of these

More Related