Q1. Which protocol resolves MAC addresses from TCP/IP addresses?
Q2. Which TCP/IP protocols operate at the Host-Host layer? (Choose two)
Q3. What is the maximum distance of a 10 Base2 Network?
Q4. A packet that is destined for all nodes on a network is known as what?
Q5. Place the following in the correct order of data encapsulation for the sending node.
Encapsulates this packet or datagram into a frame with the MAC address
Packages it as a message to send to the receiver
Sends the frame across the wire as individual bits
Data encapsulation takes the data from the user
Encapsulates the segment inside a packet or datagram with the network addressing information
Q6. If your network diagnostic tool identifies a problem with the logical addressing, what layer of the OSI model would you be troubleshooting?
Q7. The Session layer protocols include: (Choose three)
Q8. You have the following binary number: 10110011. Which two of the following are equivalent to this?
Q9. The core layer of Cisco’s hierarchical model is the backbone of the internetwork. Which of the following is not characteristic of the Core layer?
Q10. Assume that a building has 100 devices attached to the same Ethernet. These users are migrated on to two separate Ethernet segment, each with 50 devices, with a transparent bridge in between. List two benefits for this configuration.
Less chances for collisions on the two smaller segments, allowing for greater bandwidth throughput, and maximum size of the network can be increased.
Q11. Which of the following functions does ICMP perform? (Select one)
Provides MAC addresses
Reports UDP error
Delivers IP error messages
Q12. Which of the following are advantages to using the Open Systems Interconnection (OSI) model? (Select two)
The OSI model facilitates modular engineering
The OSI model reduces complexity
The OSI model forces complete standardization of designs
The OSI model dictates exactly where physical processes take place
Q13. Place the following steps of data encapsulation in sequence, from first to last
The MAC address is appended to the upper layer information, and the package is converted to frames
Segments are broken into packets, and another header is added
Data is created from user information
The information is converted to bits, and a signal is encoded onto the medium
A segment is created by placing a header in front of the data
(Select the best sequence from the choices below)
4, 2, 1, 5, 3
3, 5, 2, 1, 4
5, 2, 1, 3, 4
5, 2, 1, 4, 3
Q14. What does the term “Base” indicate in 100BaseT?
The maximum distance
The type of wiring used
The LAN switch method using CSMA/CD
A signaling method using half duplex
Q16. The process of HTTP asking TCP to send some data and make sure that it is received correctly is an example of what?
The OSI model
All of the above
Q17. Which of the following describe Ethernet addresses that can be used to communicate with more than one device at a time?
Q18. What is the OUI of the MAC address 01:AB:4D:F2:89:10
Q19. Each answer lists two types of devices used in a 100Base-TX network. If these devices were connected with UTP Ethernet cables, which pair of devices require a straight – through cable?
PC and Router
PC and a switch
Hub an Switch
Router and Hub
Wireless access point (Ethernet port) and switch
Q20. What layer of Cisco’s hierarchical model is responsible for providing end users with access to the internetwork?
Q21. What takes place when a collision occurs on an Ethernet network? (Choose the 3 best answers.)
Every device stops transmitting for a short time.
A jam signal is sent to notify devices of a collision
A collision signal is sent to notify devices of a collision
A random back-off algorithm starts
Q22. The Transport layer is divided into two different protocols according to the reliability of data transfer. Select two protocols.
Q23. Which connector does a UTP cable use?
Q24. Which of the following are not valid flags in IP header? (Choose all that apply)
Q25. The _________________________ field in the TCP header is used to tell the receiver the next byte of data that the sender of the packet expects to receive.