Search Header Logo

Network III.

Authored by Judit Horváth

Computers

University

Used 1+ times

Network III.
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

49 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Source Address field name from IPv4 is kept in IPv6.

The Version field from IPv4 is not kept in IPv6.

The Destination Address field is new in IPv6.

The Header Checksum field name from IPv4 is kept in IPv6.

The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

Answer explanation

The IPv6 packet header fields are as follows: Version, Traffic Class, Flow Label, Payload Length, Next Header, Hop Limit, Source Address, and Destination Address. The IPv4 packet header fields include the following: Version, Differentiated Services, Time-to-Live, Protocol, Source IP Address, and Destination IP Address. Both versions have a 4-bit Version field. Both versions have a Source (IP) Address field. IPv4 addresses are 32 bits; IPv6 addresses are 128 bits. The Time-to-Live or TTL field in IPv4 is now called Hop Limit in IPv6, but this field serves the same purpose in both versions. The value in this 8-bit field decrements each time a packet passes through any router. When this value is 0, the packet is discarded and is not forwarded to any other router.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed

The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

255.255.255.192

255.255.255.252

255.255.255.240

255.255.255.0

255.255.255.224

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What characteristic describes identity theft?

the use of stolen credentials to access private data

software on a router that filters traffic based on IP addresses or applications

software that identifies fast-spreading threats

a tunneling protocol that provides remote users with secure access into the network of an organization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.240

255.255.255.0

255.255.255.248

255.255.255.224

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three commonly followed standards for constructing and installing cabling? (Choose three.)

cost per meter (foot)

cable lengths

connector color

pinouts

connector types

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. What is wrong with the displayed termination?

The woven copper braid should not have been removed.

The wrong type of connector is being used.

The untwisted length of each wire is too long.

The wires are too thick for the connector that is used.

Answer explanation

When a cable to an RJ-45 connector is terminated, it is important to ensure that the untwisted wires are not too long and that the flexible plastic sheath surrounding the wires is crimped down and not the bare wires. None of the colored wires should be visible from the bottom of the jack.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?

IMAP

FTP

SSH

Telnet

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers