Networking Internetworking Online Test
Finish Quiz
0 of 20 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
Information
Networking Internetworking Online Test. Networking Question and Answers in English. Networking Internetworking Online mock test paper is free for all students and Very Helpful for Exam Preparation. Networking Internetworking Online Quiz. Networking Online Mock test for Internetworking Topic. Here we are providing Networking Internetworking Online Test Series in English. Check Networking Mock Test Series 2024-2024.
This paper has 30 questions.
Time allowed is 30 minutes.
The Networking online Mock Test Exam is Very helpful for all students. Now Scroll down below n click on “Start Quiz” or “Start Test” and Test yourself.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 20 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Answered
- Review
-
Question 1 of 20
1. Question
Which layer 1 devices can be used to enlarge the area covered by a single LAN segment?
- Switch
- NIC
- Hub
- Repeater
- RJ45 transceiver
Correct
Not that you really want to enlarge a single collision domain, but a hub (multiport repeater) will provide this for you.
Incorrect
Not that you really want to enlarge a single collision domain, but a hub (multiport repeater) will provide this for you.
-
Question 2 of 20
2. Question
Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs operate at layer _____. Word processing operates at layer _____.
Correct
Routers operate at layer 3. LAN switches operate at layer 2. Ethernet hubs operate at layer 1. Word processing applications communicate to the Application layer interface, but do not operate at layer 7, so the answer would be none.
Incorrect
Routers operate at layer 3. LAN switches operate at layer 2. Ethernet hubs operate at layer 1. Word processing applications communicate to the Application layer interface, but do not operate at layer 7, so the answer would be none.
-
Question 3 of 20
3. Question
Which of the following describe router functions?
Correct
Routers provide packet switching, packet filtering, internetwork communication, and path selection.
Incorrect
Routers provide packet switching, packet filtering, internetwork communication, and path selection.
-
Question 4 of 20
4. Question
Why does the data communication industry use the layered OSI reference model?
- It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
- It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
- It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.
- It encourages industry standardization by defining what functions occur at each layer of the model.
Correct
The main advantage of a layered model is that it can allow application developers to change aspects of a program in just one layer of the layer model’s specifications.
Advantages of using the OSI layered model include, but are not limited to, the following:
It divides the network communication process into smaller and simpler components, thus aiding compo- nent development, design, and troubleshooting;
it allows multiple-vendor development through standardization of network components;
it encourages industry standardization by defining what functions occur at each layer of the model;
it allows various types of network hardware and software to communicate;
and it prevents changes in one layer from affecting other layers, so it does not hamper development.
Incorrect
The main advantage of a layered model is that it can allow application developers to change aspects of a program in just one layer of the layer model’s specifications.
Advantages of using the OSI layered model include, but are not limited to, the following:
It divides the network communication process into smaller and simpler components, thus aiding compo- nent development, design, and troubleshooting;
it allows multiple-vendor development through standardization of network components;
it encourages industry standardization by defining what functions occur at each layer of the model;
it allows various types of network hardware and software to communicate;
and it prevents changes in one layer from affecting other layers, so it does not hamper development.
-
Question 5 of 20
5. Question
A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
Correct
A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers.
Incorrect
A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers.
-
Question 6 of 20
6. Question
What are the decimal and hexadecimal equivalents for the binary number 10110111?
Correct
You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128 + 32 + 16 + 4 + 2 + 1 = 183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By add- ing up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.
Incorrect
You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128 + 32 + 16 + 4 + 2 + 1 = 183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By add- ing up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.
-
Question 7 of 20
7. Question
What is the purpose of flow control?
Correct
Flow control allows the receiving device to control the transmitter so the receiving device’s buffer does not overflow.
Incorrect
Flow control allows the receiving device to control the transmitter so the receiving device’s buffer does not overflow.
-
Question 8 of 20
8. Question
Which three statements are true about the operation of a full-duplex Ethernet network?
1. There are no collisions in full-duplex mode.
2. A dedicated switch port is required for each full-duplex node.
3. Ethernet hub ports are preconfigured for full-duplex mode.
4. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.
5. The host network card and the switch port must be capable of operating in full-duplex mode.Correct
Full-duplex means you are using both wire pairs simultaneously to send and receive data. You must have a dedicated switch port for each node, which means you will not have collisions. Both the host network card and the switch port must be capable and set to work in full-duplex mode.
Incorrect
Full-duplex means you are using both wire pairs simultaneously to send and receive data. You must have a dedicated switch port for each node, which means you will not have collisions. Both the host network card and the switch port must be capable and set to work in full-duplex mode.
-
Question 9 of 20
9. Question
Which of the following are types of flow control?
- Buffering
- Cut-through
- Windowing
- Congestion avoidance
Correct
Incorrect
-
Question 10 of 20
10. Question
What are two purposes for segmentation with a bridge?
- To add more broadcast domains.
- To create more collision domains.
- To add more bandwidth for users.
- To allow more broadcasts for users.
Correct
Bridges break up collision domains, which allow more bandwidth for users.
Incorrect
-
Question 11 of 20
11. Question
How does a host on an Ethernet LAN know when to transmit after a collision has occurred?
- In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
- In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
- You can improve the CSMA/CD network by adding more hubs.
- After a collision, the station that detected the collision has first priority to resend the lost data.
- After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
Correct
Once transmitting stations on an Ethernet segment hear a collision, they send an extended jam signal to ensure that all stations recognize the collision. After the jamming is complete, each sender waits a predetermined amount of time, plus a random time. After both timers expire, they are free to transmit, but they must make sure the media is clear before transmitting and that they all have equal priority.
Incorrect
Once transmitting stations on an Ethernet segment hear a collision, they send an extended jam signal to ensure that all stations recognize the collision. After the jamming is complete, each sender waits a predetermined amount of time, plus a random time. After both timers expire, they are free to transmit, but they must make sure the media is clear before transmitting and that they all have equal priority.
-
Question 12 of 20
12. Question
Which of the following types of connections can use full duplex?
- Hub to hub
- Switch to switch
- Host to host
- Switch to hub
- Switch to host
Correct
Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-point connection between two devices capable of running full duplex. Switches and hosts can run full duplex between each other, but a hub can never run full duplex.
Incorrect
Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-point connection between two devices capable of running full duplex. Switches and hosts can run full duplex between each other, but a hub can never run full duplex.
-
Question 13 of 20
13. Question
Acknowledgments, sequencing, and flow control are characteristics of which OSI layer?
Correct
A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted and received reliably. A reliable connection is defined by a virtual circuit that uses acknowledgments, sequencing, and flow control, which are characteristics of the Transport layer (layer 4).
Incorrect
A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted and received reliably. A reliable connection is defined by a virtual circuit that uses acknowledgments, sequencing, and flow control, which are characteristics of the Transport layer (layer 4).
-
Question 14 of 20
14. Question
Which fields are contained within an IEEE Ethernet frame header?
- Source and destination MAC address
- Source and destination network address
- Source and destination MAC address and source and destination network address
- FCS field
Correct
An Ethernet frame has source and destination MAC addresses, an Ether-Type field to identify the Network layer protocol, the data, and the FCS field that holds the answer to the CRC.
Incorrect
-
Question 15 of 20
15. Question
What type of RJ45 UTP cable do you use to connect a PC’s COM port to a router or switch console port?
Correct
To connect to a router or switch console port, you would use an RJ45 UTP rolled cable.
Incorrect
To connect to a router or switch console port, you would use an RJ45 UTP rolled cable.
-
Question 16 of 20
16. Question
How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use?
Correct
Fiber-optic cable provides a more secure, long-distance cable that is not susceptible to EMI interference at high speeds.
Incorrect
Fiber-optic cable provides a more secure, long-distance cable that is not susceptible to EMI interference at high speeds.
-
Question 17 of 20
17. Question
Segmentation of a data stream happens at which layer of the OSI model?
Correct
The Transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments.
Incorrect
The Transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments.
-
Question 18 of 20
18. Question
When data is encapsulated, which is the correct order?
Correct
The encapsulation method is data, segment, packet, frame, bit.
Incorrect
The encapsulation method is data, segment, packet, frame, bit.
-
Question 19 of 20
19. Question
Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?
- Half-duplex Ethernet operates in a shared collision domain.
- Half-duplex Ethernet operates in a private collision domain.
- Half-duplex Ethernet has higher effective throughput.
- Half-duplex Ethernet has lower effective throughput.
Correct
Unlike full duplex, half-duplex Ethernet operates in a shared collision domain, and it has a lower effective throughput than full duplex.
Incorrect
Unlike full duplex, half-duplex Ethernet operates in a shared collision domain, and it has a lower effective throughput than full duplex.
-
Question 20 of 20
20. Question
What type of RJ45 UTP cable is used between switches?
Correct
To connect two switches together, you would use a RJ45 UTP crossover cable.
Incorrect
To connect two switches together, you would use a RJ45 UTP crossover cable.