Network III.

Network III.

University

49 Qs

quiz-placeholder

Similar activities

XII TKJ - Administrasi Infrastruktur Jaringan

XII TKJ - Administrasi Infrastruktur Jaringan

University

44 Qs

NET1L - Lesson 2 (Basic Device Configuration - IP Addressing)

NET1L - Lesson 2 (Basic Device Configuration - IP Addressing)

University

44 Qs

ITS Networking Domain 2 Network Infrastructures Review

ITS Networking Domain 2 Network Infrastructures Review

11th Grade - University

50 Qs

COM411 Class Test 1

COM411 Class Test 1

University

50 Qs

Routing and Switching

Routing and Switching

University

54 Qs

JARINGAN KOMPUTER

JARINGAN KOMPUTER

University

50 Qs

Konsentrasi Keahlian TKJ

Konsentrasi Keahlian TKJ

12th Grade - University

53 Qs

CS8591-Computer Networks

CS8591-Computer Networks

University

45 Qs

Network III.

Network III.

Assessment

Quiz

Computers

University

Medium

Created by

Judit Horváth

Used 1+ times

FREE Resource

49 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Source Address field name from IPv4 is kept in IPv6.

The Version field from IPv4 is not kept in IPv6.

The Destination Address field is new in IPv6.

The Header Checksum field name from IPv4 is kept in IPv6.

The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

Answer explanation

The IPv6 packet header fields are as follows: Version, Traffic Class, Flow Label, Payload Length, Next Header, Hop Limit, Source Address, and Destination Address. The IPv4 packet header fields include the following: Version, Differentiated Services, Time-to-Live, Protocol, Source IP Address, and Destination IP Address. Both versions have a 4-bit Version field. Both versions have a Source (IP) Address field. IPv4 addresses are 32 bits; IPv6 addresses are 128 bits. The Time-to-Live or TTL field in IPv4 is now called Hop Limit in IPv6, but this field serves the same purpose in both versions. The value in this 8-bit field decrements each time a packet passes through any router. When this value is 0, the packet is discarded and is not forwarded to any other router.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed

The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

255.255.255.192

255.255.255.252

255.255.255.240

255.255.255.0

255.255.255.224

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What characteristic describes identity theft?

the use of stolen credentials to access private data

software on a router that filters traffic based on IP addresses or applications

software that identifies fast-spreading threats

a tunneling protocol that provides remote users with secure access into the network of an organization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.240

255.255.255.0

255.255.255.248

255.255.255.224

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three commonly followed standards for constructing and installing cabling? (Choose three.)

cost per meter (foot)

cable lengths

connector color

pinouts

connector types

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. What is wrong with the displayed termination?

The woven copper braid should not have been removed.

The wrong type of connector is being used.

The untwisted length of each wire is too long.

The wires are too thick for the connector that is used.

Answer explanation

When a cable to an RJ-45 connector is terminated, it is important to ensure that the untwisted wires are not too long and that the flexible plastic sheath surrounding the wires is crimped down and not the bare wires. None of the colored wires should be visible from the bottom of the jack.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?

IMAP

FTP

SSH

Telnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?