Exam #2 - Networking Foundations

Nội dung: Mạng căn bản - Số câu: 15 - Yêu cầu đạt: 13/15 câu

Jul 27, 2023 - 18:43
Jul 28, 2023 - 16:41
 447

1. If you wanted a lightweight protocol to send real‐time data over, which of these would you use?

A. TCP
B. HTTP
C. ICMP
D. UDP

2. What part of the campus area network includes the end devices and provides them with access to the outside world and to the Intranet data center through the enterprise core?

A. Intranet data center
B. Enterprise campus
C. Enterprise core
D. Enterprise WAN edge

3. Which of these services would be considered a storage as a service solution?

A. Microsoft Azure
B. iCloud
C. Google Compute
D. DropLeaf

4. The UDP headers contain which of the following fields?

A. Source address, destination address, checksum, length
B. Destination port, source port, checksum, length
C. Flags, source port, destination port, checksum
D. Length, checksum, flags, address

5. Which of these protocols would be used to communicate with an IoT device?

A. HTTP
B. Telnet
C. SMTP
D. ICMP

6. What order, from bottom to top, does the TCP/IP architecture use?

A. Network Access, Network, Transport, Application
B. Link, Internet, Transport, Application
C. Physical, Network, Session, Application
D. Data Link, Internet, Transport, Application

7. What are the three steps in the TCP handshake as described by the flags set?

A. SYN, SYN/URG, RST
B. RST, SYN, ACK
C. SYN, SYN/ACK, ACK
D. SYN, SYN/ACK, ACK/URG

8. If you were looking for the definitive documentation on a protocol, what would you consult?

A. Request for comments
B. Manual pages
C. Standards
D. IEEE

9. The PDU for TCP is called a ______________.

A. Packet
B. Datagram
C. Frame
D. Segment

10. Which header field is used to reassemble fragmented IP packets?

A. Source address
B. IP identification
C. Don't fragment bit
D. Acknowledgment field

11. Which protocol is necessary to enable the functionality of traceroute?

A. HTTP
B. SNMP
C. ICMP
D. IP

12. What is a MAC address used for?

A. Addressing systems over a VPN
B. Addressing systems on the local network
C. Addressing systems through a tunnel
D. Addressing systems over a VPN

13. If you were to see the subnet mask 255.255.252.0, what CIDR notation (prefix) would you use to indicate the same thing?

A. /23
B. /22
C. /21
D. /20

14. Which of these addresses would be considered a private address (RFC 1918 address)?

A. 172.128.10.5
B. 9.10.10.7
C. 172.20.128.240
D. 250.28.17.10

15. Which network topology are you most likely to run across in a large enterprise network?

A. Ring topology
B. Bus topology
C. Full mesh
D. Star‐bus hybrid

Cảm xúc của bạn?

like

dislike

love

funny

angry

sad

wow