1. Which of the following is an example of a network layer (layer 3) protocol in the five-layer TCP/IP model?
Answers
·
IP
·
TCP
·
UDP
·
Ethernet
Explanation: Within
the TCP/IP paradigm, the network layer is in charge of both the routing and the
logical addressing of packets. The Internet Protocol, sometimes known as IP, is
an example of a network layer protocol. It is responsible for managing the
addressing of devices on a network as well as the routing of data packets.
2. Which of these is an
example of something that works on the application layer (layer 5 of the
five-layer TCP/IP model)?
Answers
·
UDP
·
An ethernet cable
·
A router
·
A browser
Explanation: Communication
between different software programs is handled by the fifth tier of the TCP/IP
paradigm, which is called the application layer. The Hypertext transmission
Protocol (HTTP) is an example of an application layer protocol. Other examples
of application layer protocols include the File Transfer Protocol (FTP) and the
Simple Mail Transfer Protocol (SMTP), both of which are used for the
transmission of files and the delivery of email.
3. Which layer of the
five layer TCP/IP model deals with cabling and connectors?
Answers
·
The physical layer
·
The application layer
·
The transport layer
·
The network layer
Explanation: The
five-layer TCP/IP model does not have a one-to-one mapping with the OSI model;
nevertheless, if we examine the physical layer of the OSI model, it correlates
to the lower-level functions such as cabling and connections. The OSI model
does not have a one-to-one mapping with the TCP/IP model. In the TCP/IP model,
these functions are often included in the Network Interface layer, which is
sometimes referred to as the Link layer or the Data Link layer. Unlike the OSI
model, which divides its levels specifically into five categories, the TCP/IP
model does not.
4. Which level of the
TCP/IP five-layer model does a router operate on?
Answers
·
The transport layer
·
The network layer
·
The data link layer
·
The application layer
Explanation: Routers
function at the third level of the TCP/IP five-layer paradigm, which is
referred to as the Network layer. The Network layer is in charge of logical
addressing, routing, and the transmission of data packets across the various
networks. It also handles the forwarding of data packets. Routers make
judgments based on IP addresses in order to identify the next hop for a packet
as it makes its way from the source to the destination across several networks.
5. On which layer are
Ethernet standards and some wireless technologies operating?
Answers
·
The network layer
·
The data link layer
·
The physical layer
·
The transport layer
Explanation: The OSI model has two layers, and the second one is called the Data Link layer. Ethernet standards and certain wireless technologies operate on this layer. This layer is often referred to as the Network Interface layer when discussing the TCP/IP concept and its environment. At this layer, framing, addressing, and access to the physical transmission medium are commonly handled by Ethernet for wired networks and wireless technologies such as Wi-Fi. Ethernet is used for wired networks.
6. Which of these allows
connections from many devices and inspects the contents of ethernet protocol
data?
Answers
·
A cable
·
A hub
·
A switch
·
A collision domain
Explanation: It is presumably a switch that both permits connections to be made from a variety of devices and examines the contents of data sent via the Ethernet protocol. Switches are responsible for the forwarding of Ethernet packets based on the MAC addresses of the devices they are connected to and function at the Data Link layer (Layer 2) of the OSI model. In contrast to hubs, which send data to all of the devices that are connected to them, switches selectively advance frames just to the device that the frame was meant for. Some more sophisticated switches additionally have the capacity to examine and filter traffic depending on the contents of the Ethernet frames. This feature is found in some of those switches.
7. What does LAN stand
for?
Answers
·
Local area network
·
Locally available network
·
Large area network
·
Little area network
Explanation: The
abbreviation for "Local Area Network" is "LAN." It is a
network that is restricted to a very small geographic region, such a single
building or a school, and is not accessible outside of those boundaries. Local
area networks, or LANs, are often used to link computers and other devices to
one another inside a particular place for the purpose of sharing resources such
as files, printers, and internet access.
8. What's a router?
Answers
·
A physical layer device that prevents
crosstalk
·
A device that knows how to
forward data between independent networks.
·
A physical layer device that allows
connections for many computers at once
·
A more advanced version of a switch
Explanation: A
networking device known as a router is used to link two or more separate
networks together. It functions on what the OSI model refers to as Layer 3,
which is the Network layer. Data packets are sent from one network to another
via routers, which are also responsible for finding the most efficient route
for the data to take and for making choices based on logical addressing, such
as IP addresses. They are very important in the process of guiding the flow of
data traffic on both the internet and local networks. A local network may be
connected to the internet via the use of routers, which then makes it possible
for devices on the local network to interact with devices on other networks.
9. Which of these is a
server?
Answers
·
A device operating on the data link
layer that connects many devices together inspects ethernet protocol data
·
Something providing data
to something requesting the data
·
A device that forwards data between
multiple networks
· Something receiving data from something providing data
10. What kind of wiring
is in cables that communicate in voltage changes that are received by the
receiving device as ones and zeros?
Answers
·
Gold
·
Fiber
·
Aluminum
·
Copper
Explanation: It
seems as if you are describing the wiring that is used in Ethernet connections,
which send data via changes in voltage that represent binary digits (ones and
zeros). Baseband signaling is the term used to describe this kind of
communication.
Wiring in Ethernet cables is commonly of the "twisted
pair" kind, which involves twisting together two separate pairs of
insulated copper wires. Unshielded Twisted Pair, also known as UTP, and
Shielded Twisted Pair, also known as STP, are the most prevalent varieties. The
design of twisted pairs helps to limit electromagnetic interference caused by
sources outside of the network.
In Ethernet, the voltage fluctuations on the cable are used to represent the binary data that is being transferred (either a 0 or a 1) Utilizing a technique known as Manchester encoding or variants such as 4B/5B encoding are two examples of these variations. This makes it possible to transmit digital signals across the wires, which in turn makes it easier for devices inside a network to communicate with one another and share data.
11. What modulation type
is used for computer networks?
Answers
·
Line coding
·
Line crimping
·
Simplex communication
·
RJ45
Explanation: In
contrast to analog communication systems, modulation does not play the same
role in computer networks as it does in the conventional sense. In its place,
digital data is often delivered via the use of a variety of encoding and
modulation methods. In computer networks, particularly wired Ethernet networks,
the modulation method known as Manchester encoding is the one that is utilized
the most often.
The Manchester encoding technique is a kind of digital
encoding in which each bit is represented by a change in voltage level that
takes place in the midst of a bit period. This facilitates clock recovery and
guarantees a balanced number of transitions, which makes it simpler for the
receiver to synchronize with the data that is being received.
Commonly used modulation algorithms for wireless computer
networks include Quadrature Amplitude Modulation (QAM). Modulating the
amplitude and phase of the carrier signal in QAM accomplishes the transmission
of multiple bits in each symbol. This is done.
Therefore, even though conventional modulation is not a word that is often associated with computer networks, a wide variety of encoding and modulation strategies are used in order to ensure the reliable transmission of digital data.
12. What is the
difference between full duplex and half duplex?
Answers
·
Full duplex allows
communications in two directions at the same time; half duplex means that only
one side can communicate at a time.
·
Half duplex occurs when hubs are in
use; full duplex occurs when switches are in use.
·
Full duplex is slower than half
duplex.
·
Full duplex is a form of simplex
communications.
13. The ____________
consists of devices and means of transmitting bits across computer networks.
Answers
·
modulation
·
physical layer
·
network layer
·
data link layer
Explanation: The "physical layer" of a computer network refers to the hardware and protocols used to move data packets throughout the network. The physical layer is the lowest layer in both the OSI model and the TCP/IP model. Its responsibility is to deal with the physical connection between devices, which includes the transmission and receipt of raw bit streams across a physical medium such as cables or wireless connections.
14. What is the most
common type of cabling used for connecting computing devices?
Answers
·
VGA Cable
·
SATA Cable
·
Power Cable
·
Twisted Pair Cable
Explanation: Unshielded
Twisted Pair (UTP) cable is the form of wiring that is used the most often in
the process of connecting computers and other electronic devices to local area
networks (LANs). UTP cables are quite popular for usage in Ethernet
connections. This includes the most common varieties of Ethernet cable, such as
Cat5e, Cat6, Cat6a, and Cat7.
The fact that these cables are made up of twisted pairs of insulated copper wires, as well as the fact that they are simple to set up, all contribute to their widespread use. Additionally, their capacity to enable high-speed data transmission contributes to their popularity. UTP cables are used not just for wired Ethernet connections but also for the purpose of connecting devices that are part of a local network. These devices include printers, PCs, and network switches.
15. Which of the
following are category types of Twisted Pair Ethernet cable? (Select all that
apply)
Answers
·
Foiled Twisted Pair (FTP).
·
USB cable
·
Unshielded Twisted Pair
(UTP).
·
Shielded Twisted Pair
(STP).
16. How many octets are
there in a MAC address?
Answers
·
4
·
5
·
8
·
6
Explanation: A
MAC address, which stands for "Media Access Control," is made up of
six octets, which are also referred to as bytes or pairs of hexadecimal
numbers. A different section of the MAC address is represented by each octet,
and the total length of the address is 48 bits. It is common practice to write
the format as six pairs of hexadecimal numbers separated by colons or hyphens
(for example, 00:1A:2B:3C:4D:5E).
17. What address is used
for Ethernet broadcasts?
Answers
·
FF:FF:FF:FF:FF:FF
·
FF:FF:FF:FF:FF:00
·
00:00:00:00:00:00
·
11:11:11:11:11:11
Explanation: When
transmitting data over Ethernet, broadcasts make use of a unique MAC (Media
Access Control) address that is referred to as the broadcast address. In
Ethernet, the broadcast address is denoted by the destination address field
being filled entirely with binary 1s (or hexadecimal Fs), whichever is
appropriate. In hexadecimal notation, the precise address for broadcasting is
represented as FF:FF:FF:FF:FF:FF. When a frame is sent to this address by a
device, it is meant to be received by all devices that are on the same network
segment as the sending device.
18. What is a cyclical
redundancy check?
Answers
·
A way for two computers to synchronize
their clocks.
·
A technique that allows for multiple
logical LANs to operate on the same equipment.
·
A mathematical calculation
used to ensure that all data arrived intact.
·
The actual data being transported by
an Ethernet frame.
Explanation: A
Cyclical Redundancy Check, often known as a CRC, is a kind of error-detecting
code that is frequently used in the error detection processes of network
communication and storage. It is a sort of hash function that requires a data
block as an input and returns a string of bits with a specified length; this
string is known as the CRC value.
When it comes to networking, CRC is often used as a tool
for checking the data's integrity after it has been transferred. The CRC value
for the data is computed by the sender, who then adds it at the end of the
message that is sent. When the message is received, the CRC value is
recalculated by the receiver, and this new value is compared to the CRC value
that was sent. If the numbers are the same, this indicates that the data is
most likely accurate; if they are not, there may be some mistakes.
The CRC is a straightforward and effective method for error
detection; but, unlike more complicated codes, it does not allow error repair.
The Data Link layer of the OSI model is one of the most popular places for its
use, notably in protocols like Ethernet.
19. Which of the
following are ways for transmitting data at the Ethernet level? (Select all
that apply)
Answers
·
Unicast
·
Duplex
·
Broadcast
· Multicast
20. Which of the
following are parts of an Ethernet frame? (Select all that apply)
Answers
·
Data payload
·
EtherType field
·
Broadcast
·
Preamble
21 Which protocol provides
mechanisms ensuring data is reliably delivered?
Answers
·
Dynamic
Host Configuration Protocol (DHCP)
·
Transmission Control Protocol (TCP)
·
User
Datagram Protocol (UDP)
·
Internet
Protocol (IP)
Explanation: The Transmission Control
Protocol, often known as TCP, is the protocol that provides the procedures
necessary to ensure the consistent transmission of data over computer networks.
TCP is responsible for establishing and maintaining connections, as well as
assuring the reliable and orderly transport of data between applications
running on devices that are part of a network. It runs at the Transport layer
(Layer 4) of the OSI model, which is the fourth tier of the model. The transfer
Control Protocol (TCP) achieves reliable data transfer by using protocols and
procedures such as acknowledgment, retransmission, and flow control.
22. Select the right order of the
TCP/IP Five-layer network model.
Answers
·
Physical Layer > Data Link Layer >
Network Layer > Transport Layer > Application Layer.
·
Physical
Layer > Application Layer > Data link Layer > Network Layer >
Transport Layer
·
Physical
Layer > Network Layer > Data link Layer > Transport Layer >
Application Layer
· Physical Layer > Data link Layer > Transport Layer > Network Layer > Application Layer
23. Which layer in the Transmission
Control Protocol/Internet Protocol (TCP/IP) model does IP use?
Answers
·
Network
·
Physical
·
Transport
·
Data
link
24. What type of cable communicates
binary data by changing the voltage between two ranges?
Answers
·
Copper
·
Fiber
·
Silver
·
Gold
Explanation: Digital signaling is often linked with the sort of
cable that can transfer binary data by varying the voltage between two ranges.
This form of cable is prevalent in a variety of communication systems,
including Ethernet, and may be found in both of these contexts. Non-Return to
Zero encoding is a common name for this kind of communication, which also goes
by that acronym.
For the purpose of communicating binary 0s and 1s, for
instance in Ethernet communication carried out via twisted pair wires, the
voltage on the connection is altered. The particular voltage levels are
determined by the encoding system that is being used, which may be the
Manchester encoding or one of its variations, such as the 4B/5B encoding.
Alterations in voltage assist in the transmission and interpretation of digital
data that is sent over the wire.
25. What is a network with only a
single device at each end of the link called?
Answers
·
A point to point connection
·
A
twisted pair network
·
A
switching hub
·
A
collision domain
Answers
·
Client
·
Switch
·
Router
·
Hub
Explanation: A router is a device that
works at Layer 3 of the TCP/IP architecture and is responsible for the
forwarding of data. Routers are devices in networks that function at the
Network layer and are in charge of directing data traffic across various
networks based on logical addressing (such as IP addresses). Routers are
classified as operating at the Network layer. They are responsible for
determining how data packets should be sent from one network to another across
linked networks in order to facilitate communication between devices that are
located on separate subnets or networks.
27. Which of the following is
something that requests data from a server?
Answers
·
Hub
·
Router
·
Client
·
Switch
Explanation: The term
"client" is normally reserved for referring to anything that makes a
request for data from a server. A client is the piece of hardware or software
that makes requests for services or resources from a server in an architecture
that employs a client-server model. Clients may take the form of either devices
or applications. Clients may be anything from personal computers and mobile
phones to smartphones and any other device or software application that
requires certain services or data from a server. On the other hand, the server
is the piece of hardware or software that, in response to requests made by
clients, delivers the services or resources that the clients have requested.
28. Which type of communication does
a telephone use?
Answers
·
Full duplex
·
Twisted
·
Half
Duplex
·
Simplex
Explanation: The term
"full-duplex" refers to the kind of communication that is generally
used by telephones. Full-duplex communication enables both the caller and the
receiver to speak and listen simultaneously, simulating the flow of a real
conversation between the two parties. In "half-duplex" communication,
on the other hand, communication may go in both ways, but not at the same time.
This contrasts with "full-duplex" communication. Participants in a
system using half-duplex communication take turns sending and receiving
information. Full-duplex communication, which is used in telephones, makes it
possible to have discussions that are more natural and participatory.
29. Fill in the blank: There will
almost always be some troubleshooting data available through_____.
Answers
·
Stop
LEDs
·
Wire
lights
·
Port
lights
·
Action
LEDs
Explanation: Through the system logs, there will usually always
be some data that may be used for troubleshooting.
30. Fill in the blank: The most
common data link layer protocol for wired connections is _____.
Answers
·
UDP
·
BGP
·
TCP
·
Ethernet
Explanation: Ethernet is the data link
layer protocol that is used the most often for wired connections.
31. What does the letter B represent
in a Media Access Control (MAC) address?
Answers
·
9
·
10
·
15
·
11
Explanation: When writing a Media
Access Control (MAC) address, the letter "B" is equivalent to the
hexadecimal number 11, and vice versa. The notation used to write MAC addresses
is typically hexadecimal, and the values 10-15 in base-16 are represented by the
letters A through F. MAC addresses are always expressed in hexadecimal.
Therefore, the number 11 in hexadecimal represents the letter B in decimal
notation. For instance, the number 11 is represented by the "2B" in
the MAC address "00:1A:2B:3C:4D:5E," where "2B" is the
value of the third pair of hexadecimal digits.
32. Where in an ethernet frame will
you find a Virtual Local Area Network (VLAN) header?
Answers
·
Before the EtherType field
·
Frame
Check Sequence
·
Preamble
·
Payload
Explanation: The 802.1Q tag of an Ethernet packet is normally
where the information on the Virtual Local Area Network (VLAN) header may be
located. To determine which VLAN the Ethernet frame belongs to, an 802.1Q tag
is appended to the frame before it is sent across the network. Within the
Ethernet frame, it is inserted in the gap that exists between the source MAC
address and the EtherType/length field.
The frame contains information such as the VLAN ID, which is
included inside the VLAN header. This VLAN ID identifies the particular VLAN to
which the frame belongs. Because of the availability of the VLAN tag, it is
possible to divide a network into a number of different virtual LANs, each of
which may have its own VLAN ID. This results in an improvement in the network's
structure and administration.
Shuffle Q/A 1
Answers
·
Physical
·
Data
link
·
Transport
·
Network
Answers
·
Cross Talk
·
Multicast
·
Duplex
·
Preamble
Explanation: The phenomenon known as "crosstalk"
occurs when an electrical pulse that is occurring on one wire is mistakenly
detected on another wire that is located nearby. Crosstalk is a kind of
electromagnetic interference that occurs when the signals sent on one
communication channel interfere with the signals transmitted on a neighboring
channel. also in wired networks where several cables run in close proximity, it
may cause to signal deterioration and influence the overall performance of a
communication system. This is also true in wireless networks. To reduce the
amount of interference caused by crosstalk in communication cables, proper
cable shielding and twisted pair topologies are used.
35. Multiple systems try to send
data at the same time. The electrical pulses sent across the cable interfere
with each other. What type of network segment is being used?
Answers
·
Wide
Area Network (WAN)
·
Subnet
·
Local
Area Network (LAN)
·
Collision domain
Answers
·
Server
·
Switch
·
Router
·
Hub
Answers
·
Cross
talk
·
Duplex
·
Simplex
·
Ethernet
Answers
·
Hub
·
Patch
Panel
·
Router
·
Switch
Answers
·
Internet
Protocol (IP)
·
Transmission
Control Protocol (TCP)
·
Ethernet
·
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Before
sending any data, a device that uses the CSMA/CD protocol "listens"
to the channel that is being used for communication. If there are no
obstructions in the channel, the broadcast will continue. If two devices try to
transmit at the same time and a collision occurs, CSMA/CD will identify the
collision and start a backoff period before the devices try to communicate
again. This will prevent further collisions from occurring. Full-duplex
communication is used often in modern Ethernet networks; hence, CSMA/CD cannot
be used in these kinds of environments.
Answers
·
The
last octet of a Media Access Control (MAC) address
·
The
first three octets of a Media Access Control (MAC) address
·
The
first octet of a Media Access Control (MAC) address
·
The
fourth octet of a Media Access Control (MAC) address
This
component of the MAC address is referred to as the Organizationally Unique
Identifier (OUI), and it is responsible for determining the manufacturer. You
are able to seek for OUI information in databases that are open to the public
and are made accessible by organizations such as the IEEE (Institute of
Electrical and Electronics Engineers). You are able to discover the
manufacturer associated with a MAC address by using search tools or databases
that look up MAC addresses online and enable you to enter the OUI.
Answers
·
Destination Media Access Control (MAC) address
·
Payload
·
Frame
Check Sequence
·
EtherType
field
Answers
·
True
·
False
Answers
· True
·
False
Answers
·
Simplex
·
Half
Duplex
·
Partial
·
Full
Duplex
45. What is the most common plug
used with twisted pair network cables?
Answers
·
Registered
Jack 35
·
Registered Jack 45
·
Registered
Jack 11
·
Registered
Jack 46
Answers
·
Transport
·
Data
Link
·
Physical
·
Network
47. Fill in
the blank: MAC address stands for ____ address
Answers
·
Media Access Control
·
Maximum Allowable Cost
·
Message Authentication Check
·
Memory Access Controller
Explanation: The abbreviation for "Media Access Control" address is "MAC address."
48. Which layer in the
Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible
for defining a common way to interpret signals so network devices can
communicate?
Answers
·
Data link
·
Application
·
Transport
·
Network
Explanation: The "Link layer" or "Network Interface layer" is the TCP/IP model layer that is responsible for providing a standard mechanism to interpret signals so that network devices may interact with one another. This is done at the "Link layer." In the OSI model, this layer corresponds to both the Data Link layer (Layer 2) and the Physical layer (Layer 1). It discusses the hardware-specific specifics of how signals are conveyed across the network medium and how devices on the same network understand these signals. It also discusses how signals are received by devices on the same network. The framing, addressing, and error-checking procedures that are required for dependable communication on a local network segment are encapsulated in the Link layer of the networking stack.
49. Which protocol do
routers use to determine the optimal path to forward traffic?
Answers
·
User Datagram Protocol (UDP)
·
Transmission Control Protocol (TCP)
·
Border Gateway Protocol
(BGP)
· Internet Protocol (IP)
50. True or false: The
TCP provides mechanisms to ensure that data is reliably delivered.
Answers
·
True
·
False
Explanation: True.
The Transmission Control Protocol, often known as TCP, is responsible for
providing the procedures that guarantee the accurate delivery of data. The
Transmission Control Protocol (TCP) is a connection-oriented protocol that
ensures the secure and sequential transfer of data between different devices on
a network. Acknowledgment methods, retransmission of lost or damaged packets,
and flow control are used in order to accomplish this goal. Flow control is
utilized in order to govern the pace of data transfer between the sender and
the receiver.
51. Which layer of the
network model includes specifications for cables and connectors and how signals
are sent over these connections?
Answers
·
Data link
·
Network
·
Physical
·
Transport
Explanation: The "Physical layer" of a network model is the layer that contains the requirements for cables and connectors, as well as the manner in which signals are sent across these connections, and it is called "Physical layer." The Physical layer is the lowest layer in both the OSI model and the TCP/IP model. This layer deals with the physical transmission of raw bits across a physical channel and is the lowest layer in both models. Specifications for cables and connections, as well as voltage levels and the physical features of the transmission medium, are included in this document.
52. You have installed a
device at the physical layer. All of the systems you connect to this device
will talk to each other at the same time. What have you installed?
Answers
·
Client
·
Hub
·
Server
·
Router
Explanation: If you have installed a device at the physical layer and all of the systems that are linked to this device are able to communicate with each other simultaneously, it is probable that you have installed a hub. A hub is a fundamental networking device that links numerous devices to one another inside a local area network (LAN). It works at the physical layer of the OSI model and is part of the OSI model. However, it is essential to keep in mind that hubs function in a shared environment, which may result in the occurrence of possible collisions and a decrease in the effectiveness of network communication. Because of their superior performance and ability to prevent collisions, switches have largely replaced hubs as the device of choice in contemporary network configurations.
53. Which section in an
ethernet frame contains the data from higher layers, such as Internet Protocol
(IP) and the transport and application layers?
Answers
·
Payload
·
Frame Check Sequence
·
Preamble
·
EtherType
Explanation: The part of an Ethernet frame known as the "Data" or "Payload" field is the portion that stores the information coming from higher levels. These higher layers include the Internet Protocol (IP), the transport layer, and the application layer. The encapsulated data from higher-layer protocols is included in the payload of an Ethernet frame, which comes after the Ethernet header in an Ethernet frame. Information from protocols such as IP, TCP, and UDP, as well as data from application layers, may be carried in the payload.