38-366: 67-132 Flashcards

1
Q

If a router cannot determine the next hop for a packet, the router will:
A. Forward the packet to the default route.
B. Send the packet back to the packet’s source.
C. Broadcast the packet.
D. Store the packet in the memory buffer.

A

A. Forward the packet to the default route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
In which physical network topology is each computer connected to a central point?
A. Star
B. Mesh
C. Ring
D. Bus
A

A. Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)
A. Token ring
B. Ethernet
C. Dial-up
D. Leased line
A

C. Dial-up

D. Leased line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A private network that allows members of an organization to exchange data is an:
A. Extranet
B. Ethernet
C. Intranet
D. Internet
A

C. Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Security is a concern on wireless networks due to:
A. The radio broadcast access method.
B. Spread spectrum issues.
C. Frequency modulation issues.
D. The potential for cross-talk.
A

A. The radio broadcast access method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A characteristic of the mesh topology is that it:
A. Uses a central hub.
B. Cannot use wired connections.
C. Uses redundant paths.
D. Cannot use wireless connections.
A

C. Uses redundant paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
To protect a network when it is connected to the Internet, you should use a:
A. Bridge
B. Firewall
C. Switch
D. Router
A

B. Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One purpose of a perimeter network is to:
A. Make resources available to the intranet.
B. Link campus area networks (CANs).
C. Link local area networks (LANs).
D. Make resources available to the Internet.

A

D. Make resources available to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which protocol can be used to encrypt packets on the Internet?
A. SNMP
B. HTTPS
C. TFTP
D. HTTP
A

B. HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
The service that resolves fully qualified domain names (FQDN) to IP addresses is:
A. Windows Internet Name Service (WINS).
B. Domain Name Service (DNS).
C. Internet Service Provider (ISP).
D. Address Resolution Protocol (ARP).
A

B. Domain Name Service (DNS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
DRAG DROP -
Order the layers of the OSI model:
Select and Place:
- Application
- Data link
- Network
- Physical
- Presentation
- Session
- Transport
A

Layer:

1: Physical
2: Data link
3: Network
4: Transport
5: Session
6: Presentation
7: Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If a router is installed so that it separates a DHCP server from its clients, the clients will:
A. Immediately lose connectivity to all segments.
B. Be unable to obtain their leases from the server.
C. Immediately lose connectivity to the local segment.
D. Receive an immediate renewal of their lease.

A

B. Be unable to obtain their leases from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following services masks internal IP addresses from outside the network?
A. DHCP
B. WINS
C. NAT
D. DNS
A

C. NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The query protocol used to locate resources on a network is:
A. User Datagram Protocol (UDP).
B. Lightweight Directory Access Protocol (LDAP)
C. Tracert
D. Telnet.

A

B. Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tracert is used to:
A. Manage routing tables dynamically.
B. Manage session-oriented connections between nodes.
C. Report the route taken by packets across an IP network.
D. Report the shortest route between different networks.

A

C. Report the route taken by packets across an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
In which OSI layer does routing occur?
A. Transport
B. Network
C. Data Link
D. Physical
A

B. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
What type of record does DNS use to find a mail service?
A. Service (SRV) DNS record
B. Canonical (CNAME) DNS record
C. Mail Exchanger (MX) DNS record
D. Host (A) DNS record
A

C. Mail Exchanger (MX) DNS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The default gateway address identifies the:
A. Device that will connect the computer to the local network.
B. Device that will connect the computer to a remote network.
C. Server that will provide name services for the computer.
D. Server that will authenticate the user of the computer.

A

B. Device that will connect the computer to a remote network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
How many bits are there in an Internet Protocol version 6 (IPv6) address?
A. 32
B. 64
C. 128
D. 256
A

C. 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which of the following is a public IP address?
A. 10.156.89.1
B. 68.24.78.221
C. 172.16.152.48
D. 192.168.25.101
A

B. 68.24.78.221

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
What is the minimum cabling requirement for a 100BaseTX network?
A. Category 3 UTP cable
B. Category 5 UTP cable
C. Category 6 UTP cable
D. Multimode fiber cable
A

B. Category 5 UTP cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)
A. Establishing network speed parameters
B. Verifying the client's patch level
C. Negotiating algorithms to use
D. Exchanging key information
A

C. Negotiating algorithms to use

D. Exchanging key information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HOTSPOT -
You are trying to access a music sharing service on the Internet. The service is located at the IP address 173.194.75.105. You are experiencing problems connecting.
You run a trace route to the server and receive the output shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

A

Router

Successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
21DA:D3:0:2F3B:2AA:FF:FE28:9C5A is a valid IPv6 unicast address
FE80::2AA:FF:FE28:9C5A is a valid IPv6 address
21DA::02AA:::FF:FE28:9C5A is a valid IPv6 address

A

Yesy
Yes
No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
IPsec can be used to secure network communications between two mahines
IPsec can be used to secure network communications between two networks
IPsec network traffic is always encrypted

A

Yesy
Yes
No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The process of replicating a zone file to multiple DNS servers is called “zone replication”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Zone transfer
B. Zone synchronization
C. Start of authority
D. No change is needed

A

A. Zone transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
DRAG DROP -
Match each IP address to its corresponding IPv4 address class.
To answer, drag the appropriate IP address from the column on the left to its IPv4 address class on the right. Each IP address may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:
IP addresses
133.234.23.2
224.100.20.3
201.111.22.3
64.123.12.1

Class A:
Class B:
Class C:
Class D:

A

Class A: 64.123.12.1
Class B: 133.234.23.2
Class C: 201.111.22.3
Class D: 224.100.20.3

28
Q
Which DNS record type specifies the host that is the authority for a given domain?
A. NS
B. MX
C. CNAME
D. SOA
A

D. SOA

29
Q
DRAG DROP -
Match each protocol to its description.
To answer, drag the appropriate protocol from the column on the left to its description on the right. Each protocol may be used once, more than once, or not at all.
Each correct match is worth one point.
Select and Place:
Protocols:
TCP
ICMP
ARP
UDP
IGM

connectionless, message-based protocol with best-effort service:
connection-orinted protocol with guaranteed service:
resolves IP addresses to MAC addresses:

A

connectionless, message-based protocol with best-effort service: UDP
connection-orinted protocol with guaranteed service: TCP
resolves IP addresses to MAC addresses: ARP

30
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

The TCP/IP model has four layers, which correspond with the OSI model’s seven layers.
The TCP/IP application layer corresponds with the top four layers of the OSI model.
The TCP/IP transport and Internet layers correspond with layers 3 and 4 of the OSI model.

A

Yes
No
Yes

31
Q

This question requires that you evaluate the underlined text to determine if it is correct.
All session data is “encrypted between all machines” while using telnet.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Not encrypted
B. Encrypted between any Windows machines
C. Encrypted only to any non-Windows machines
D. No change is needed

A

A. Not encrypted

32
Q
Which protocol is a transport layer protocol?
A. FTP
B. IP
C. UDP
D. ASCII
A

C. UDP

33
Q

This question requires that you evaluate the underlined text to determine if it is correct.
IPv4 multicast addresses range from “192.168.0.0 to 192.168.255.255”.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
A. 127.0.0.0 to 127.255.255.255
B. 172.16.0.0 to 172.31.255.255
C. 224.0.0.0 to 239.255.255.255
D. No change is needed

A

C. 224.0.0.0 to 239.255.255.255

34
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The four IEEE standards, 802.11a, b, g, and n, are collectively known as “mobile ad hoc” networks.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. WiMAX
B. Bluetooth
C. WiFi
D. No change is needed

A

C. WiFi

35
Q

A university has network links between various locations. Where would a T3 connection be appropriate?
A. Server to network in the main campus server room
B. Main campus to a large satellite campus
C. Computer lab PC to lab printer
D. Library laptop PC to Internet

A

A. Server to network in the main campus server room

36
Q

HOTSPOT -
You cannot get to any site on the Internet or on the school’s intranet. Your school uses DHCP.
You check your network settings, which are configured as shown in the following image:
You need to change the settings to access websites.
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:
have a default gateway address of 192.168.1.1 / have a default gateway address of 192.168.13.13 / obtain an IP address automatically
obtain DNS server address automatically / set Preferred DNS server to Nothing / set Altermate DNS server to 192.168.13.13

A

Automaticly

Automaticly

37
Q

DRAG DROP -
Match each network type to its corresponding definition.
To answer, drag the appropriate network type from the column on the left to its definition on the right. Each network type may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:

Extranet
Internet
Intranet

a network that allows controlled access for apecific business or educational purposes
a network that allows access only to users within an organization
a system of interconnected networks

A

a network that allows controlled access for apecific business or educational purposes: Extranet
a network that allows access only to users within an organization: Intranet
a system of interconnected networks: Internet

38
Q

DRAG DROP -
Match the VPN connection type to the corresponding definition.
To answer, drag the appropriate VPN term from the column on the left to its definition on the right. Each term may be used once, more than once, or not at all.
Each correct match is worth one point.
Select and Place:

Point-to-Point Protocol
SSL VPN
Layer 2 Tunneling Protocol
Site-to-Site VPN

allows a remote user to connect to a private network from anywhere on the Internet
securely connects two potions of a private network or two private networks
creates an unecrypted connection between two network devices

A

allows a remote user to connect to a private network from anywhere on the Internet: SSL VPN
securely connects two potions of a private network or two private networks: Site-to-Site VPN
creates an unecrypted connection between two network devices: Layer 2 Tunneling Protocol

39
Q

DRAG DROP -
Match each set of characteristics to the corresponding 802.11 standard.
To answer, drag the appropriate set of characteristics from the column on the left to its 802.11 standard on the right. Each set may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:

Frequency range: 2.4-2.485 Ghz Data rate: 11 Mbps
Frequency range: 2.4-2.485 Ghz Data rate: 54 Mbps
Frequency range: 2.4-2.485 Ghz or 5.1-5.8 Ghz Data rate: 65-600 Mbps
Frequency range: 5.1-5.8 Ghz Data rate: 54 Mbps

  1. 11a
  2. 11b
  3. 11g
  4. 11n
A
  1. 11a: Frequency range: 5.1-5.8 Ghz Data rate: 54 Mbps
  2. 11b: Frequency range: 2.4-2.485 Ghz Data rate: 11 Mbps
  3. 11g: Frequency range: 2.4-2.485 Ghz Data rate: 54 Mbps
  4. 11n: Frequency range: 2.4-2.485 Ghz or 5.1-5.8 Ghz Data rate: 65-600 Mbps
40
Q

You work at a coffee shop. Your supervisor asks you to help set up a computer network.
The network needs to have the following items:
✑ A public facing web server
✑ A Wi-Fi network for customers
✑ A private network for the point of sale terminals
✑ An office PC
✑ A file/print server
✑ A network printer
You need to set up a perimeter network to protect the network.
Which two items should you include in the perimeter network? (Choose two.)
A. Network printer
B. Web server
C. File server
D. Wi-Fi network
E. Point of sale terminals

A

A. Network printer

B. Web server

41
Q

DRAG DROP -
Match the networking topologies to their corresponding characteristics.
To answer, drag the appropriate topology from the column on the left to its characteristic on the right. Each topology may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:

Star
Mesh
Ring

Each computer is connected by a single cable
Each workstation acts as a repeater
Each computer is connected to every other computer
There is a central connectivity device
The number of connections equals the total number of computers minus one
Each node is connected to exactly two other nodes

A

Each computer is connected by a single cable: Star
Each workstation acts as a repeater: Ring
Each computer is connected to every other computer: Mesh
There is a central connectivity device: Star
The number of connections equals the total number of computers minus one: Star
Each node is connected to exactly two other nodes: Ring

42
Q
Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.)
A. Network Policy and Access Services
B. Routing and Remote Access Services
C. Remote Administration
D. DirectAccess
A

A. Network Policy and Access Services

B. Routing and Remote Access Services

43
Q
What are two characteristics of fiber optic cable? (Choose two.)
A. Conducts electricity
B. Requires metal conduit
C. Supports splicing
D. Requires a polish for end connectors
A

C. Supports splicing

D. Requires a polish for end connectors

44
Q

HOTSPOT -
Identify the network cable type and connector in the following graphic:
czarne, czarne, szary, zielony, szary, niebieski, zielony, szary, czerwony, czerwony
Use the drop-down menus to select the answer choice that answers each question. Each correct selection is worth one point.
Hot Area:

Connector type: RJ45 / Rj11 / FDDI
Cable type: Ethernet / Cat3 / Fiber Optic

A

RJ45 ethernet cable

45
Q
Which Microsoft network service can you use to establish a connection to a corporate LAN without any user action?
A. VPN
B. Remote Desktop
C. DirectAccess
D. Nap
A

C. DirectAccess

46
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

With a recursive DNS query, the DNS server will contact any other DNS servers it knows about to resolve the request
When an iterative qquery cannot be resolved from local data, such as local zone filter or a cache of previous queries, the query needs to be escalated to a root DNS server
A DNS server makes an iterative query as it tries to find names outside of its local domain when it is not configured qith a forwarder

A

No
No
Yes

47
Q

DRAG DROP -
Match the IPv4 address type to the corresponding definition.
To answer, drag the appropriate definition from the column on the left to the address type on the right. Each definition may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:

asigned to a single network interface located on a specific subnet on the network and used for one-to-one communications
assigned to the variable portion of an IPv4 address that is used to identify a network node’s interface on a subnet
assigned to one or more network interfaces located on various subnets on the network and used for one-to-many communications
assigned to all network interface located on a subnet on the network and used for one-to-everyone-on-a-subnet communications

Multicast
Broadcast
Unicast

A

Multicast: assigned to one or more network interfaces located on various subnets on the network and used for one-to-many communications
Broadcast: assigned to all network interface located on a subnet on the network and used for one-to-everyone-on-a-subnet communications
Unicast: asigned to a single network interface located on a specific subnet on the network and used for one-to-one communications

48
Q

This question requires that you evaluate the underlined text to determine if it is correct.
A “secondary zone” is the first DNS zone to which all updates for the records that belong to that zone are written.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Primary zone
B. Stub zone
C. Conditional forwarding zone
D. No change is needed.

A

A. Primary zone

49
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

The tracert command displays router addresses that are traversed between a source and a destination
The trace command and determines packet loss between a source and a destination
The tracert command can display a list of routers being used for all active connections

A

Yes
No
No

50
Q

You are setting up a network computer game.
You need to open up ports on your firewall so your friends can join the network.
Which command displays the ports that your computer is listening for?
A. nslookup
B. nbtstat
C. ping
D. netstat

A

D. netstat

51
Q
DRAG DROP -
Match the TCP ports to the corresponding service.
To answer, drag the appropriate port number from the column on the left to its service on the right. Each port number may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:
Ports:
80
53
25
21
443

SMTP
FTP
HTTPS

A

SMTP: 25
FTP: 21
HTTPS: 443

52
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

0:0:0:0:0:0:0:1 is the Loopback address for IPv6
FEC0::9C5A is a valid Site-Local IpPv6 address
FE80::F856:02AA is a valid Link-Local (APIPA) IPv6 address

A

Yes
No
Yes

53
Q

This question requires that you evaluate the underlined text to determine if it is correct.
When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the “10.0.0.0 -10.0.0.255” range.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. 127.0.0.0-127.0.0.255
B. 169.254.0.0-169.254.255.255
C. 192168.100.0 -192.168.100.255
D. No change is needed

A

B. 169.254.0.0-169.254.255.255

54
Q
A node within a local area network (LAN) must have which two of the following? (Choose two.)
A. Username and password
B. Share name
C. NIC
D. IP address
E. Table of all network nodes
A

C. NIC

D. IP address

55
Q

HOTSPOT -
You are configuring a wireless network with the Wireless Network Properties that are shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:

To manually select which network to connect to, you should uncheck: Connect automatically when this network is in range / Connect to a more preferred network if available / Connect even if the network is not broadcasting its name (SSID)
The [answer] security type requires certificates for its encryptions: WPA-Enterprise / WPA2-Personat / 802.1X

A

Connect automatically when this network is in range

802.1X

56
Q

This question requires that you evaluate the underlined text to determine if it is correct.
“A/anvirtual private network (VPN)” protects a network’s perimeter by monitoring traffic as it enters and leaves.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Extranet
B. Firewall
C. Intranet
D. No change is needed

A

B. Firewall

57
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The loopback address of your computer is “127.0.0.1”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. 10.0.1.1
B. 169.254.0.5
C. 192168.1.1
D. No change is needed

A

D. No change is needed

58
Q

You run the ipconfig command. The output is shown in the following image:
From these settings, you can tell that the computer:
A. Will have limited Internet access
B. Will have full Internet access
C. Will not be able to access the Internet
D. Will not be able to access the local network

A

A. Will have limited Internet access

59
Q
Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

D. 802.11n

60
Q
What is the bit rate for a North American T3 circuit?
A. 6.312 Mbit/s
B. 44.736 Mbit/s
C. 274.176 Mbit/s
D. 400.352 Mbit/s
A

B. 44.736 Mbit/s

61
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

Dynamic Routing provides the ability to add networks automatically by learning them from other RIP routers
Dynamic Routing provides the ability to automatically remove routers from the routing table when other RIP neighbors delete them
Dynamic Routing provides te ability to select the best route based on routing metrics

A

yes
yes
yes

62
Q
Which feature of Category 5e STP cable reduces external interference?
A. Crosstalk
B. Shielding
C. Length
D. Twisting
A

D. Twisting

63
Q

What are three advantages of VLANs? (Choose three.)
A. They can logically address packets by using IP.
B. They require a router to connect to VLANs on another switch.
C. They compartmentalize a network and isolate traffic.
D. They are efficient because a single switch can implement only a single VLAN.
E. They act as though they are on the same LAN regardless of physical location.

A

B. They require a router to connect to VLANs on another switch.
C. They compartmentalize a network and isolate traffic.
E. They act as though they are on the same LAN regardless of physical location.

64
Q

DRAG DROP -
Match the OSI layer to its corresponding description.
To answer, drag the appropriate OSI layer from the column on the left to its description on the right. Each OSI layer may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:

Data Link
Network
Session
Application

It provides network services directly to the user’s application. TELNET, SMTP and NTP operate on this layer
It controls daiogue between source and destination nodes. RPC and NETBIOS operate on this layer
It relies on upper layers for reliable delivery and sequencing. IPX, X.25, and NLSP operate to this layer
It ensures that reassembled bits are in the correct order, and it reqiuests retransmission of frames if an error occurs. Switches and WAPs operate on this layer
It is responsible for path determination and delivery of packets, but does not guarantee delivery. ICMP, RIP and ARP operate on this layer
It checks for errors by adding CRC to the frame. Bridges and NICs operate on this layer

A

It provides network services directly to the user’s application. TELNET, SMTP and NTP operate on this layer: Application
It controls daiogue between source and destination nodes. RPC and NETBIOS operate on this layer: Session
It relies on upper layers for reliable delivery and sequencing. IPX, X.25, and NLSP operate to this layer : Network
It ensures that reassembled bits are in the correct order, and it reqiuests retransmission of frames if an error occurs. Switches and WAPs operate on this layer: Data Link
It is responsible for path determination and delivery of packets, but does not guarantee delivery. ICMP, RIP and ARP operate on this layer: Network
It checks for errors by adding CRC to the frame. Bridges and NICs operate on this layer: Data Link

65
Q

HOTSPOT -
You receive a call from a family member who is unable to connect to a game server.
You learn that the server’s IP is 172.16.2.11.
To help, you ping the server and receive the information shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:

The server [ans] your ping requests: did not return / did return / may or may not have returned
The server status is [ans] up. / down / unknown

A

did not return

unknown

66
Q

DRAG DROP -
Match each address type to its appropriate range.
To answer, drag the appropriate address type from the column on the left to its range on the right. Each address type may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:

Loopback addresses
Multicast addresses
Private network addresses

  1. 0.0. - 127.255.255.255
  2. 18.0.0 - 192.168.255.255
  3. 0.0.0 - 239.255.255.255
A
  1. 0.0. - 127.255.255.255: Loopback addresses
  2. 18.0.0 - 192.168.255.255: Private network addresses
  3. 0.0.0 - 239.255.255.255: Multicast addresses