CP1402 FINAL EXAM PREP QUESTIONS AND ANSWERS
Switches make forwarding decisions based on:
A. MAC address
B. IP address
C. Random allocation
D. Nothing; switches forward all frames on all ports - CORRECT ANSWER✅✅✅A. MAC address
Which of the following is a public IP address?
A. 10.110.15.1
B. 172.24.50.240
C. 192.168.10.38
D. 128.14.42.70 - CORRECT ANSWER✅✅✅D. 128.14.42.70
The process of adding a header to the data inherited from the layer above is called?
A. Segmenting
B. Encapsulation
C. Fragmenting
D. Appending - CORRECT ANSWER✅✅✅B. Encapsulation
What physical network topology consist of all connected devices connecting to one central device, such
as a switch?
A. Bus topology
B. Ring topology
C. Hub topology
D. Star topology - CORRECT ANSWER✅✅✅D. Star topology
Which of the following is not a broadcast address
A. 10.0.0.127/24
,B. 10.0.0.127/25
C. 10.0.0.127/26
D. 10.0.0.127/27 - CORRECT ANSWER✅✅✅A. 10.0.0.127/24
Analog signals are boosted by:
A. Switches
B. Hubs
C. Repeaters
D. Amplifiers - CORRECT ANSWER✅✅✅D. Amplifiers
What is the name for the protocol data unit (PDU) of the data link layer
A. Packet
B. Data
C. Bit
D. Frame - CORRECT ANSWER✅✅✅A. Packet
Text that has been scrambled by an encryption algorithm is known as:
A. Ciphertext
B. Cryptotext
C. Secret text
D. Private text - CORRECT ANSWER✅✅✅A. Ciphertext
Devices generally connect to a network via a port on their _______________(NIC)
A. Network intelligence card
B. Network interconnection card
C. Network and internet card
D. Network interface card - CORRECT ANSWER✅✅✅D. Network interface card
, Which of the following is a document that is sent as a request to vendors to submit a proposal for a
product or service that your company wants to purchase?
A. Memorandum of understanding
B. Statement of work
C. Request for quote
D. Request for proposal - CORRECT ANSWER✅✅✅D. Request for proposal
Which of the following is not one of the disadvantages of peer to peer networks?
A. They lack scalability
B. They are not necessarily secure
C. They are impractical for connecting large numbers of components
D. They centralise user account logins - CORRECT ANSWER✅✅✅D. They centralise user account
logins
The trailer of the ethernet frame:
A. Signals to the receiving node that the bytes following are the actual frame
B. Provides the MAC address of the. Source and destination nodes
C. Specifies the transport layer protocol carried in the frame
D. Ensures that the data received by the destination exactly matches the data issued from the source -
CORRECT ANSWER✅✅✅D. Ensures that the data received by the destination exactly matches the
data issued from the source
Which of the following method used by a switch results in the fewest errors?
A. Cut through
B. Fragment free
C. Store-and-forward
D. Token based - CORRECT ANSWER✅✅✅C. Store-and-forward
In networking, a socket referee to a combination of ____________ and ______________.
A. Domain name, IP address
Switches make forwarding decisions based on:
A. MAC address
B. IP address
C. Random allocation
D. Nothing; switches forward all frames on all ports - CORRECT ANSWER✅✅✅A. MAC address
Which of the following is a public IP address?
A. 10.110.15.1
B. 172.24.50.240
C. 192.168.10.38
D. 128.14.42.70 - CORRECT ANSWER✅✅✅D. 128.14.42.70
The process of adding a header to the data inherited from the layer above is called?
A. Segmenting
B. Encapsulation
C. Fragmenting
D. Appending - CORRECT ANSWER✅✅✅B. Encapsulation
What physical network topology consist of all connected devices connecting to one central device, such
as a switch?
A. Bus topology
B. Ring topology
C. Hub topology
D. Star topology - CORRECT ANSWER✅✅✅D. Star topology
Which of the following is not a broadcast address
A. 10.0.0.127/24
,B. 10.0.0.127/25
C. 10.0.0.127/26
D. 10.0.0.127/27 - CORRECT ANSWER✅✅✅A. 10.0.0.127/24
Analog signals are boosted by:
A. Switches
B. Hubs
C. Repeaters
D. Amplifiers - CORRECT ANSWER✅✅✅D. Amplifiers
What is the name for the protocol data unit (PDU) of the data link layer
A. Packet
B. Data
C. Bit
D. Frame - CORRECT ANSWER✅✅✅A. Packet
Text that has been scrambled by an encryption algorithm is known as:
A. Ciphertext
B. Cryptotext
C. Secret text
D. Private text - CORRECT ANSWER✅✅✅A. Ciphertext
Devices generally connect to a network via a port on their _______________(NIC)
A. Network intelligence card
B. Network interconnection card
C. Network and internet card
D. Network interface card - CORRECT ANSWER✅✅✅D. Network interface card
, Which of the following is a document that is sent as a request to vendors to submit a proposal for a
product or service that your company wants to purchase?
A. Memorandum of understanding
B. Statement of work
C. Request for quote
D. Request for proposal - CORRECT ANSWER✅✅✅D. Request for proposal
Which of the following is not one of the disadvantages of peer to peer networks?
A. They lack scalability
B. They are not necessarily secure
C. They are impractical for connecting large numbers of components
D. They centralise user account logins - CORRECT ANSWER✅✅✅D. They centralise user account
logins
The trailer of the ethernet frame:
A. Signals to the receiving node that the bytes following are the actual frame
B. Provides the MAC address of the. Source and destination nodes
C. Specifies the transport layer protocol carried in the frame
D. Ensures that the data received by the destination exactly matches the data issued from the source -
CORRECT ANSWER✅✅✅D. Ensures that the data received by the destination exactly matches the
data issued from the source
Which of the following method used by a switch results in the fewest errors?
A. Cut through
B. Fragment free
C. Store-and-forward
D. Token based - CORRECT ANSWER✅✅✅C. Store-and-forward
In networking, a socket referee to a combination of ____________ and ______________.
A. Domain name, IP address