IT 212 Mod 1 Quiz

pdf

School

Butler Community College *

*We aren’t endorsed by this school

Course

212

Subject

Computer Science

Date

Apr 3, 2024

Type

pdf

Pages

33

Uploaded by ChefFogDinosaur5

Report
IT 212 Module 1 Quiz - NP6.0 Candidate: Marques Townsend (mtownz11) Date: 1/14/2024, 11:12:25 PM • Time Spent: 45:14 Score: 91% Passing Score: 65% Question 1. Correct Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true? Routers use DNS to resolve MAC addresses of diskless workstations into IP addresses based on the information contained in other routers' routing tables. Diskless workstations use ARP to ask a server for an IP address. ICMP lets routers bypass the general network broadcast by providing a dynamic table of IP- to-MAC address mappings. Hosts use ARP to resolve known IP addresses into MAC addresses. Explanation ARP lets hosts resolve known IP addresses into MAC addresses by broadcasting requests to the network. DNS is used to map hostnames to IP addresses. ARP is used to map IP addresses to MAC addresses. Diskless workstations use BOOTP to discover their IP address, the server's IP address, and the boot files they should use. ICMP notifies routers of problems on the network and undeliverable packets.
References 2.3.3 Address Resolution Protocol (ARP) 2.3.5 Network Communication Process Facts 3.5.2 Network Adapter Facts q_network_comm_arp_02_np6.question.fex Question 2. Correct Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol enables message exchange between systems? POP3 ICMP IMAP4 SMTP Explanation Simple Mail Transfer Protocol (SMTP) specifies how messages are exchanged between email servers. Email clients use POP3 and IMAP4 to download email messages from email servers. ICMP (Internet Control Message Protocol) is used with ping and traceroute to communicate network information. References 2.4.1 TCP/IP Protocols 2.4.3 Explore Network Services 2.4.4 Network Port and Protocol Facts 2.4.5 Common Ports q_network_protocol_facts_smtp_02_np6.question.fex
Question 3. Correct Which of the following terminates individual wires from a 25-pair or 100-pair cable using female RJ45 ports? Horizontal cross connect 66 block 110 block Patch panel Explanation A patch panel is a device that typically connects individual stranded wires into female RJ45 connectors. For example, you might connect four pairs of wires from a punch down block to a port on the patch panel. On the patch panel, you then connect drop cables (cables with RJ45 connectors) to the patch panel on one end and a computer on the other end. Use 66 and 110 blocks to connect individual wires within a wiring closet. These punch down blocks connect the individual wires together, but they do not terminate in RJ45 connectors. A horizontal cross connect connects IDFs on the same floor. References 3.3.5 Wiring Distribution Facts q_wire_distribution_patch_np6.question.fex Question 4. Correct In the OSI model, which of the following functions are performed at the Application layer? (Select two.) Enabling of communication between network
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
clients and services. Communication setup, maintenance, and teardown. Device control for data transmission rates. Standard setting for sending and receiving signals. Integration of network functionality into the host operating system. Explanation The Application layer enables network services and integrates network functionality into the host operating system. Applications actually run above the OSI Application layer. The setup, maintenance, and teardown of communication happens at the Session layer. The Data Link layer controls the rate of data transmission between hosts (flow control). The Physical layer sets standards for sending and receiving electrical signals between devices. References 2.2.2 OSI Model Facts q_osi_application_np6.question.fex Question 5. Correct Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more than once.
Presentation layer Application Data Link layer Network Application layer Application Session layer Application Network layer Internetwork Transport layer Transport Keyboard Instructions Explanation
The TCP/IP model maps to the OSI model as follows: The Application layer corresponds to the OSI model's Session, Presentation, and Application layers. The Transport layer matches the OSI model's Transport layer. The Internetwork layer is comparable to the OSI model's Network layer. The Network layer (sometimes called the Link layer) corresponds to the OSI model's Physical and Data Link layers. References 2.2.5 OSI Layers Facts q_osi_layers_tcpip_np6.question.fex Question 6. Correct Which of the following terms identifies the wiring closet in the basement or ground floor that typically includes the demarcation point? MDF Horizontal cross connect IDF 110 block Explanation The main distribution frame (MDF) is the main wiring point for a building. The MDF is typically located on the bottom floor or basement. The LEC typically installs the demarc to the MDF. An intermediate distribution frame (IDF) is a smaller wiring distribution point within a building. IDFs are typically located on each floor directly above the MDF, but you can place additional IDFs on each floor as necessary. A horizontal cross connect joins wiring closets on the same floor. A smart jack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc. Use 66 and 110 blocks to connect individual wires within a wiring closet. References 3.3.5 Wiring Distribution Facts q_wire_distribution_mdf_np6.question.fex Question 7. Correct You have a small network that uses a switch to connect multiple devices. Which physical topology are you using? Mesh Star Bus Ring Explanation A switch creates a network with a physical star topology. The physical star topology uses a logical bus topology and sends messages to all the devices connected to the hub. A mesh topology is a series of point-to-point links between devices. A ring topology uses a central device called an MSAU. A bus topology connects all devices to a trunk cable. References 2.1.5 Network Topologies 2.1.6 Network Topology Facts 5.1.1 Ethernet Architecture 5.3.1 Troubleshoot Physical Network Topology
5.3.2 Physical Network Topology Troubleshooting Facts 5.3.3 Troubleshoot the Link Status 5.3.4 Link Status Troubleshooting Facts q_network_topo_phys_star_02_np6.question.fex Question 8. Correct Which of the following connectors is used with Ethernet 100BaseTX networks? RJ45 GG45 BNC ST Explanation RJ45 connectors are used with Ethernet 100BaseTX networks. RJ11 connectors are used with phone, dial-up internet, and DSL modem connections. BNC connectors are used with coaxial cable. GG45 connectors are used with Cat 7 cables and support 10-Gbps Ethernet (10GBASE-T). References 3.1.2 Twisted Pair Facts q_twisted_pair_rj45_np6.question.fex Question 9. Correct You have a network that occupies all three floors of a building. The WAN service provider has installed the line in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor.
What would you use to connect the wiring closets together? Vertical cross connect Horizontal cross connect Smart jack Demarc extension Explanation A vertical cross connect joins the main distribution frame (MDF) on the main floor to intermediate distribution frames (IDFs) on upper floors. Cabling runs vertically (up and down) between the MDF and the IDFs. A horizontal cross connect joins IDFs on the same floor. Cabling runs horizontally (sideways) between the IDFs. A smart jack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc. A demarc extension extends the demarcation point from its original location to another location within the building. The demarc extension typically consists of a single wire bundle that attaches to the existing demarc and supplies a termination point to a different location. You might need a demarc extension if your network occupies an upper floor of a building. The LEC typically installs the demarc on the MDF on the bottom floor, and you'll need to install an extension to place the demarc on the IDF on your floor. References 3.3.2 Cable Construction Facts q_twisted_pair_cons_vertical_np6.question.fex Question 10. Correct Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Which of the following network topologies should you implement? Full mesh Bus Star Partial mesh Explanation In a partial mesh topology, only some redundant paths exist. A partial mesh topology is more practical and less expensive than a full mesh topology. In a full mesh topology, every device has a point-to-point connection with every other device. This provides full redundancy, but it's expensive and impractical. A star topology connects network devices to the network with a single patch cable. A patch cable failure makes the connected device unavailable. A bus topology has a single point of failure. If there's a break in the network media, the network becomes unavailable. References 2.1.5 Network Topologies 2.1.6 Network Topology Facts 5.3.1 Troubleshoot Physical Network Topology 5.3.2 Physical Network Topology Troubleshooting Facts 5.3.3 Troubleshoot the Link Status 5.3.4 Link Status Troubleshooting Facts q_network_topo_part_mesh_np6.question.fex Question 11. Correct Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated?
Cat 3 Cat 5 Cat 6 Cat 5e Explanation Cat 6 cables include a solid plastic core that keeps the twisted pairs separated and prevents the cable from being bent too tightly. Cat 3, Cat 5, and Cat 5e don't include a solid plastic core that keeps the twisted pairs separated. References 3.1.2 Twisted Pair Facts q_twisted_pair_cat6_np6.question.fex Question 12. Correct You've implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but they don't host services of their own. Which type of network do you have? Client-server Peer-to-peer Intranet Extranet Explanation
In a client-server network, hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources. In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts, and each host is in charge of controlling access to those resources. An intranet is a private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network. An extranet is a private network that uses internet technologies, but whose resources are made available to external (but trusted) users. For example, you might create a website on a private network that only users from a partner company can access. References 2.1.4 Networking Facts q_intro_network_client_server_np6.question.fex Question 13. Incorrect Match each TCP/IP layers with its function. Breaks the data into pieces. Transport
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Prepares the data to be sent. Application Adds physical addresses. Internet Link Adds logical addresses. Link Internet Keyboard Instructions Explanation The Application layer prepares data to be sent through the network. The Transport layer breaks data into pieces called segments, adding sequencing and control information. The Internet layer converts segments into packets, adding logical network and device addresses. The Link layer converts packets into frames, adding physical device addressing information and a frame check sequence footer for error detection. It also converts the frames into bits (0s and 1s) for transmission across the transmission media. References 2.3.2 Data Encapsulation Facts q_data_encapsulation_tcpip_02_np6.question.fex Question 14. Correct
Which of the following are included as part of the Data Link layer specifications? (Select two.) Physical topology Digital data conversion Data transmission between hosts Physical network device identification Cable and connector specifications Explanation The Data Link layer controls device identification on networks, as well as how messages travel through the network (the logical topology). The other functions listed here are performed by the Physical layer. References 2.2.2 OSI Model Facts q_osi_datalink_02_np6.question.fex Question 15. Correct What is the basic purpose of the OSI Physical layer? Define when devices have access to the LAN. Coordinate rules for sending and receiving electrical signals. Define how physical network devices are identified on a network. Maintain a list of known networks and neighboring routers.
neighboring routers. Explanation The OSI Physical layer sets standards for sending and receiving electrical signals between devices. The Data Link layer defines how physical network devices are identified on a network and when devices have access to the LAN. The Network layer maintains a list of known networks and neighboring routers. References 2.2.2 OSI Model Facts q_osi_physical_02_np6.question.fex Question 16. Incorrect Which of the following BEST describes how a switch functions? It connects multiple cable segments (or devices) and forwards frames to the appropriate segment. It connects multiple segments of different architectures. It translates frames and forwards them to the appropriate segment. It connects multiple cable segments (or devices) and broadcasts frames to all of its ports. It connects multiple segments of different architectures. It translates frames and broadcasts them to all of its ports. Explanation Switches have multiple ports and can connect multiple segments or devices. The switch forwards frames to the appropriate port. They function similarly to a hub, except instead of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
sending packets to all ports, switches send packets only to the destination computer's port. A bridge is a device that connects two (or more) media segments on the same subnet. It filters traffic between both segments based on the MAC address in the frame. References 3.6.2 Network Device Facts q_network_devices_switch_01_np6.question.fex Question 17. Correct Which of the following hardware devices regenerate a signal out of all connected ports without examining the frame or packet contents? (Select two.) Router Repeater Bridge Switch Hub Explanation A hub and a repeater send received signals out of all other ports. These devices do not examine the frame or packet contents. Switches and bridges use the MAC address in a frame for forwarding decisions. A router uses the IP address in a packet for forwarding decisions. References 3.6.2 Network Device Facts q_network_devices_hub_01_np6.question.fex
Question 18. Correct You're installing network wiring for a new Ethernet network at your company's main office building. The project specifications call for Cat 5e UTP network cabling and RJ45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Cat 3 network cable in storage. Upon closer inspection, it appears very similar to the Cat 5e wiring. To finish the project, should you use the Cat 3 cabling as a substitute for the Cat 5e cabling? No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing crosstalk and supporting higher data rates. No. The sheath surrounding Cat 5e cabling is much thicker than the Cat 3 sheath, creating an extra layer of shielding that reduces crosstalk and supports higher data rates. No. Cat 5e cabling uses a thicker copper wire than Cat 3 cabling, enabling higher data transmission rates. Yes. You can use Cat 3 cabling as a substitute for Cat 5e cabling since they're electrically identical. Explanation While Cat 3 and Cat 5e cabling may appear physically similar, they're electrically different. Cat 5e cabling is twisted much more tightly than Cat 3 cabling. This reduces crosstalk and enables Cat 5e wiring to support much faster data transmission rates. References 3.1.2 Twisted Pair Facts q_twisted_pair_cat5e_np6.question.fex Question 19. Correct
Question 19. Correct Which of the following hardware devices links multiple networks and directs traffic between networks? Hub Repeater Router Bridge Explanation A router is a device that links multiple networks and directs traffic between networks. Each network linked by routers has its own unique identifier called the network number or network address. A hub and a repeater send received signals out all other ports. These devices do not examine the frame or the packet contents. Bridges learn addresses by copying the MAC address of the source device and placing it into the MAC address table. References 3.6.6 Internetwork Device Facts q_internetwork_devices_router_np6.question.fex Question 20. Correct Which of the following features does UDP provide? (Select two.) Data packet sequencing Packet acknowledgement Lost packet retransmission Connectionless datagram services
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Low overhead Explanation UDP is a connectionless protocol used by applications that need low overhead and don't require guaranteed delivery. TCP provides data packet sequencing, packet acknowledgement, and lost packet retransmission. References 2.4.4 Network Port and Protocol Facts q_network_protocol_facts_udp_np6.question.fex Question 21. Correct You're adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You'd like to run your Ethernet cables in this area. Which type of cable must you use? STP cables Cat 5e or Cat 6a cables Plenum-rated cable Fiber optic cables Explanation Plenum-rated cable is fire resistant and non-toxic. You must use plenum-rated cable to wire in air spaces used by heating and air conditioning systems. Cat 5e cables provide better EMI protection than Cat 5 cables, and Cat 6a cables are an improvement over Cat 6 specifications. However, neither of these qualities are a requirement for use in a ceiling area. If an area has a lot of EMI, you might consider using STP or fiber optic cables, but this isn't
If an area has a lot of EMI, you might consider using STP or fiber optic cables, but this isn't a requirement in a ceiling area. Typically, you can avoid EMI sources by re-routing cables. References 3.1.2 Twisted Pair Facts q_twisted_pair_plenum_np6.question.fex Question 22. Correct Which of the following functions are performed by the OSI Transport layer? (Select three.) Consistent data formatting between dissimilar systems End-to-end flow control Data segmentation and reassembly Packet formatting for delivery through the medium Path identification and selection Media access control, logical topology, and device identification Reliable message delivery Explanation The Transport layer is responsible for breaking upper-layer data into segments and allowing reliable communication through end-to-end flow control, error detection, and error correction. Message transmission through a medium is performed at the Physical layer. Media access, logical topology, and device identification occur at the Data Link layer. Path identification and selection is a function of the Network layer. Data formatting is performed at the Presentation layer.
Data formatting is performed at the Presentation layer. References 2.2.2 OSI Model Facts q_osi_transport_02_np6.question.fex Question 23. Correct You have a large TCP/IP network and want to keep a host's real-time clock synchronized. Which protocol should you use? FTP SMTP SNMP NTP Explanation Network Time Protocol (NTP) keeps computers' clocks synchronized. SMTP is used to send mail between email servers. SNMP lets network administrators set up alerts to monitor the state of a network. FTP (File Transfer Protocol) provides a generic method for transferring files. References 2.4.1 TCP/IP Protocols 2.4.3 Explore Network Services 2.4.4 Network Port and Protocol Facts 2.4.5 Common Ports q_network_protocol_facts_ntp_np6.question.fex Question 24. Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 24. Correct At which layer of the OSI model do hubs operate? Physical Internet Data Link Layer 3 Explanation Hubs operate at Layer 1, or the Physical layer of the OSI model. References 3.6.2 Network Device Facts q_network_devices_physical_np6.question.fex Question 25. Correct You're an application developer, and you're writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability? UDP FTP TCP SIP Explanation In this scenario, you should write the application to use Transmission Control Protocol (TCP). TCP guarantees delivery through error checking and acknowledgments.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
FTP provides a generic method for transferring files. It can protect access to files by requiring usernames and passwords. UDP is a host-to-host protocol like TCP, but it doesn't acknowledge that each packet was transmitted. SIP is an open-source VoIP protocol. References 2.4.4 Network Port and Protocol Facts q_network_protocol_facts_tcp_02_np6.question.fex Question 26. Correct TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back? SYN/RST ACK SYN/ACK RST Explanation If Computer 1 sends a SYN packet to Computer 2, Computer 2 receives the packet and sends a SYN/ACK packet to Computer 1. Computer 1 receives the SYN/ACK packet and replies back with an ACK packet, and the connection is complete. A SYN flag is used to start a connection between hosts. An ACK acknowledges the receipt of a packet. An RST resets a connection. References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
2.3.7 Three-Way Handshake and TCP Flags Facts q_tcp_flags_syn_ack_np6.question.fex Question 27. Correct You've implemented a network where each device provides all other devices on the network with access to shared files. Which type of network do you have? Peer-to-peer Client-server Polling Multiple access Explanation In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts, and each host is in charge of controlling access to those resources. In a client/server network, hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources. Polling is a media access method where a single device grants permission to other devices to access the network. Multiple access describes a media access method where each device determines when the medium is free. References 2.1.4 Networking Facts q_intro_network_peer_to_peer_np6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 28. Correct During TCP/IP communication between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right. Transport layer Segments Network layer Packets Data Link layer Frames Physical layer Bits Keyboard Instructions Explanation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Encapsulation is the process of breaking a message into packets, adding controls and other information, and transmitting the message through the transmission media. The following is the five-step data encapsulation/decapsulation process used by the OSI model: Upper layers prepare the data to be sent through the network. The Transport layer breaks the data into pieces called segments, adding sequencing and control information. The Network layer converts the segments into packets, adding logical network and device addresses. The Data Link layer converts packets into frames, adding physical device addressing information. The Physical layer converts the frames into bits for transmission across the transmission media. References 2.2.2 OSI Model Facts q_osi_tcpip_np6.question.fex Question 29. Correct Which term does the OSI model use that's different from the TCP/IP model in reference to the terms frame, packet, and segment? HTTP Protocol data unit (PDU) Session Presentation Explanation The OSI model uses the term protocol data unit (PDU) instead of the terms frame, packet,
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
and segment. The Presentation and Session layers are Layers 5 and 6 of the OSI model, respectively, and do not correspond to the use of frame, packet, and segment in the TCP/IP model. HyperText Transfer Protocol (HTTP) is the protocol in the Application layer that supports web requests. References 2.3.2 Data Encapsulation Facts q_data_encapsulation_pdu_np6.question.fex Question 30. Correct Which of the following describes the point where the service provider's responsibility to install and maintain wiring and equipment ends and the customer's begins? Demarc Punch down block IDF Vertical cross connect Explanation When you contract with a local exchange carrier (LEC) for data or telephone services, they install a physical cable and a termination jack on your premises. The demarcation point (demarc) is the line that marks the boundary between the Telco equipment and the private network or telephone system. Typically, the LEC is responsible for all the equipment on one side of the demarc, and the customer is responsible for all the equipment on the other side of the demarc. A punch down block is a block used to connect individual copper wires together. While the demarc might terminate in a punch down block, punchdown blocks are used within other locations at the customer site. An intermediate distribution frame (IDF) is a smaller wiring distribution point within a
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
building. IDFs are typically located on each floor directly above the main distribution frame (MDF), although additional IDFs can be added on each floor as necessary. A vertical cross connect connects the IDF to the MDF on a different floor. References 3.3.2 Cable Construction Facts q_twisted_pair_cons_demarc_np6.question.fex Question 31. Correct At which OSI layer does a router operate to forward network messages? Network Data Link Transport Physical Explanation A router uses the logical network address specified at the Network layer to forward messages to the appropriate LAN segment. A bridge, on the other hand, uses the MAC address and works at the Data Link layer. References 3.6.2 Network Device Facts q_network_devices_network_np6.question.fex Question 32. Correct Which of the following tasks is associated with the Session layer? Port number assignment
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Port number assignment Data block breakdown Connection establishment IP address assignment Explanation Connection establishment is controlled through Session layer protocols. The Transport layer breaks down data into blocks called segments. It then appends a port number to identify which top-layer application needs to receive the data on the destination device. One very important thing that happens at the Network layer is IP address assignment. References 2.2.2 OSI Model Facts q_osi_session_np6.question.fex Question 33. Correct How do switches and bridges learn where devices are located on a network? When a frame enters a port, the destination MAC address is copied from frame header. When a frame enters a port, the source IP address is copied from the frame header. When a frame enters a port, the destination IP address is copied from the frame header. When a frame enters a port, the source MAC address is copied from the frame header.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Explanation Bridges and switches learn addresses by copying the MAC address of the source device and placing it into the MAC address table. The port number that the frame entered is also recorded in the table and associated with the source MAC address. The switch or the bridge cannot record the destination MAC address because it does not know the port that is used to reach the destination device. References 3.6.2 Network Device Facts q_network_devices_mac_np6.question.fex Question 34. Correct You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the internet. Since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. Which type of network hardware should you implement to prevent this from happening again? Firewall Hub Router Switch Explanation A firewall's role is to provide a barrier between an organization's network and a public network, such as the internet. The firewall's job is to prevent unauthorized access to the organization's private network. To do this, the firewall examines incoming packets and determines whether they should be allowed to enter based on a set of rules defined by the network administrator. Routers offer some packet-based access control, but it is not as extensive as what a full-
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Routers offer some packet-based access control, but it is not as extensive as what a full- fledged firewall provides. Hubs are not sufficient for managing the interface between a trusted and an untrusted network. Switches use the MAC address in a frame for forwarding decisions. References 3.6.6 Internetwork Device Facts q_internetwork_devices_firewall_01_np6.question.fex Question 35. Incorrect Workstation3 has started communicating with Workstation2. It sends a frame to the default gateway. Identify the Layer 2 and Layer 3 addresses used by the Cisco 2600 router to forward the data to Workstation2 by dragging the corresponding address from the list on the left to its location on the right.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Layer 2 source address 080046987654 000b5f2a2222 Layer 3 source address 192.168.10.12 192.168.11.11 Layer 2 destination address 000b5f2a2222 080046987654 Layer 3 destination address 192.168.11.11 192.168.10.12 Keyboard Instructions Explanation The Cisco 2600 router is the default gateway. When it receives a frame from Workstation3, it examines the Layer 3 address in the packet to locate the destination device. Then it creates a new frame and modifies the source and destination Layer 2 addresses (MAC addresses) as follows: The source Layer 2 address is the gateway's own MAC address on the same segment as the destination device, which is 000b5f2a2222. The destination Layer 2 address is the MAC address of the destination device, which is 080046987654. The source and destination Layer 3 addresses (IP addresses) do not change. The source IP address is the IP address of Workstation3, which is 192.168.11.11. The destination IP address is the IP address of Workstation2, which is 192.168.10.12.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The destination IP address is the IP address of Workstation2, which is 192.168.10.12. References 2.3.5 Network Communication Process Facts q_network_comm_address_02_np6.question.fex Copyright © 2024 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights reserved.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help