solved & updated
Switches make forwarding decisions based on:
A. MAC address
B. IP address
C. Random allocation
D. Nothing; switches forward all frames on all ports - ANSWER-A. MAC address
Which of the following is a public IP address?
A. 10.110.15.1
B. 172.24.50.240
C. 192.168.10.38
D. 128.14.42.70 - ANSWER-D. 128.14.42.70
The process of adding a header to the data inherited from the layer above is
called?
A. Segmenting
B. Encapsulation
C. Fragmenting
D. Appending - ANSWER-B. Encapsulation
What physical network topology consist of all connected devices connecting to
one central device, such as a switch?
A. Bus topology
B. Ring topology
C. Hub topology
D. Star topology - ANSWER-D. Star topology
Which of the following is not a broadcast address
A. 10.0.0.127/24
,B. 10.0.0.127/25
C. 10.0.0.127/26
D. 10.0.0.127/27 - ANSWER-A. 10.0.0.127/24
Analog signals are boosted by:
A. Switches
B. Hubs
C. Repeaters
D. Amplifiers - ANSWER-D. Amplifiers
What is the name for the protocol data unit (PDU) of the data link layer
A. Packet
B. Data
C. Bit
D. Frame - ANSWER-A. Packet
Text that has been scrambled by an encryption algorithm is known as:
A. Ciphertext
B. Cryptotext
C. Secret text
D. Private text - ANSWER-A. Ciphertext
Devices generally connect to a network via a port on their _______________(NIC)
A. Network intelligence card
B. Network interconnection card
C. Network and internet card
D. Network interface card - ANSWER-D. Network interface card
Which of the following is a document that is sent as a request to vendors to
submit a proposal for a product or service that your company wants to purchase?
A. Memorandum of understanding
B. Statement of work
C. Request for quote
D. Request for proposal - ANSWER-D. Request for proposal
Which of the following is not one of the disadvantages of peer to peer networks?
A. They lack scalability
B. They are not necessarily secure
C. They are impractical for connecting large numbers of components
D. They centralise user account logins - ANSWER-D. They centralise user
account logins
, The trailer of the ethernet frame:
A. Signals to the receiving node that the bytes following are the actual frame
B. Provides the MAC address of the. Source and destination nodes
C. Specifies the transport layer protocol carried in the frame
D. Ensures that the data received by the destination exactly matches the data
issued from the source - ANSWER-D. Ensures that the data received by the
destination exactly matches the data issued from the source
Which of the following method used by a switch results in the fewest errors?
A. Cut through
B. Fragment free
C. Store-and-forward
D. Token based - ANSWER-C. Store-and-forward
In networking, a socket referee to a combination of ____________ and
______________.
A. Domain name, IP address
B. IP address, port number
C. IP address, MAC address
D. MAC address, port number - ANSWER-B. IP address, port number
What does a statement of work document do?
A. It documents in detail the work that must be completed for a particular object,
and includes specifies such as task, deliverables, standards, payments schedule,
and work timeline.
B. It documents the intentions of two or more parties to enter into a binding
agreement, or contract and is sometimes used between an informal handshake
and the legally binding signatures on contracts
C. It is a legally binding contract or part of a contract that defines in plain
languages and in measurable terms, the aspects of a service provided to a
customer, such as the service provided by ISP.
D. It is a contract that defines the terms of future contracts between parties, such
as payment terms or arbitration arrangements - ANSWER-A. It documents in
detail the work that must be completed for a particular object, and includes
specifies such as task, deliverables, standards, payments schedule, and work
timeline.
What is the name of the GUI front end that is available for the Nmap utility?
A. GUINmap
B. Zenmap