1 Which of the following types of networks pass a token sequentially to each host? (Choose two.)

Ethernet
*Token Ring
*FDDI
Frame Relay
ISDN

2 Which of the following are ways that bandwidth is commonly measured? (Choose three.)

GHzps
*kbps
*Mbps
Nbps
MHzps
*Gbps

3 Which of the following are typical features that determine throughput? (Choose two.)

types of passwords used on servers
type of Layer 3 protocol used
*network topology
length of the network cable
*number of users on the network

4 Which protocols are commonly part of the application layer of the TCP/IP model? (Choose three.)

*FTP
*DNS
UDP
TCP
*HTTP

5 Which of the following are data link layer encapsulation details? (Choose two.)

*Packets are put into frames.
Data is packaged into a packet.
Data is segmented into segments.
Data is converted for Internet travel.
*An address is added to identify the directly connected device.

6 Which device is used to connect LANs that are geographically separated?

hub
bridge
*router
repeater

7 Which of the following is the Layer 4 PDU?

bit
frame
packet
*segment

8 What is important to remember about the data link layer of the OSI model when considering Peer to Peer communication? (Choose three.)

It links data to the transport layer.
It encapsulates frames into packets.
*It provides a service to the network layer.
*It encapsulates the network layer information into a frame.
*Its header contains a physical address which is required to complete the data link functions.
It encodes the data link frame into a pattern of 1s and 0s (bits) for transmission on the medium.

9 Which of the following is true regarding network bandwidth?

Bandwidth is free.
*Bandwidth has capacity limits.
Bandwidth never increases.
Bandwidth is not a key factor in analyzing network performance.

10 Which of the following is the official name for the address assigned to each network interface card (NIC) by its manufacturer?

NIC address
*MAC address
IP address
Source Address

11 Which physical network topology uses a single backbone cable and connects all hosts directly to this cable?

ring
star
*bus
mesh

12 Which OSI and TCP/IP layer appears in both models yet has different functions in each?

transport
session
*application
Internet
physical

13 Which of the following topologies are considered logical topologies? (Choose two.)

bus
*token-passing
star
mesh
*broadcast
hierarchical

14 During the data encapsulation process, how is the data broken down by the transport layer?

packets
*segments
data bits
frames

15 Which of the following describe a LAN? (Choose two.)

*operates within a limited geographical area
provides dial-up connectivity
uses serial interfaces to allow operation at lower speeds
*connects physically adjacent devices
ensures single access to specialty hosts

16 Which of the following are considered valid types of VPNs? (Choose three.)

internal
* intranet
external
*extranet
local
*access

17 Which of the following physical topologies connects all cables to a central point of concentration?

ring
*star
mesh
bus

18 Refer to the figure. What is the maximum possible throughput obtained end to end on this network when the user on Lab A communicates with the user on LAB D?

The maximum possible throughput is based on the largest connection, the T3.
*The maximum possible throughput is based on the smallest connection, the T1.
There is not enough data to determine the maximum possible throughput.
The maximum possible throughput is the T1 plus T3 speed divided by 2.

19 What is the name of the Layer 1 PDU?

segment
packet
frame
*bit

20 Which layer of the TCP/IP model encapsulates TCP segments into packets?

application
transport
*internet
network
physical

21 Which layer of the TCP/IP model deals with quality-of-service issues such as reliability, flow control, and acknowledgement?

application
internet
* transport
network

22 From the following list, choose the data packaging type that is created at the data link layer during the data encapsulation process.

packets
segments
data bits
* frames

23 Refer to the following list. Choose the correct order of data encapsulation when a device sends information.
segments
bits
packets
data
frames


1 – 3 – 5 – 4 – 2
2 – 1 – 3 – 5 – 4
2 – 4 – 3 – 5 – 1
4 – 3 – 1 – 2 – 5
*4 – 1 – 3 – 5 – 2
3 – 5 – 1 – 2 – 4

Kaynak: Cisco Curr v3.1
belgesi-1231

Belgeci

Share
Published by
Belgeci

Recent Posts

Gıdalarda Kirlilik Tayini

  01. Sütte Kirlilik Tayini    01.01. Yöntemin Prensibi   Süte dışarıdan bulaşmış olabilecek kirliliklerin…

2 saat ago

Önsöz

İnsan atalarıyla niye övünür? İnsanlık evrimine katkıları nedeniyle olmalı, değil mi? Gariptir ama bizim Türk-İslamcılarımız…

14 saat ago

Başarıyı Engelleyen Tepkiler

İyi şeyleri engelleyen sözler esasında saymakla bitmez. Bu sözlerden bazıları bir virüs gibi bulaşıcıdır. Kırıcı…

1 gün ago

Servet-i Fünun Döneminin Önemli Sanatçıları

SERVET-İ FÜNUN DÖNEMİNİN ÖNEMLİ SANATÇILARI TEVFİK FİKRET (1867-1915): Şairin, Batılı sanat anlayışını benimsemesindeki en önemli…

2 gün ago

Servet-i Fünun Edebiyatı ve Genel Özellikleri

  SERVET-İ FÜNUN EDEBİYATI (EDEBİYAT-I CEDİDE) (1896-1901) Servet-i Fünun veya Edebiyat-ı Cedide devri, Türk edebiyatında…

2 gün ago

Fecr-i ati Edebiyatı

FECRİ ATİ EDEBİYATI   Servet-i fünun edebiyatının devamı niteliğinde olan fecr-i ati topluluğu,1909 yılında ortaya…

3 gün ago