Saturday , December 21 2024
Breaking News

CS402: Computer Communications and Networks Certification Final Exam Answers

  • ISO standards.
  • a protocol.
  • an RFC.
  • a standar
  • Anycast
  • Broadcast
  • Multicast
  • Unicast
  • Two layers
  • Five layers
  • Two columns with matching layers.
  • Five columns with matching layers.
  • Anywhere on Earth
  • In your city
  • In your house
  • Within 10 meters of one another
  • Internet
  • LAN
  • PAN
  • WAN
  • Bus
  • Ring
  • Star
  • Tree
  • A database of Internet services
  • A numeric linking system used by your text
  • A numeric listing of TCP/IP protocols
  • A tracking system for network development requirements
  • Application
  • Internet
  • Transport
  • VoIP
  • Network
  • Presentation
  • Session
  • Transport
  • It is authenticate
  • It is bidirectional.
  • It is connectionless.
  • It is unreliable.
  • HTML.
  • JavaScript.
  • Jav
  • XML.
  • Application
  • Internet
  • Network
  • Transport
  • Application
  • Communication
  • Presentation
  • Session
  • Application
  • Internet
  • Network Interface
  • Transport
  • Application, physical, session, transport, network, data link, presentation.
  • Application, presentation, network, session, transport, data link, physical.
  • Application, presentation, session, transport, network, data link, physical.
  • Physical, data link, network, transport, session, presentation, application.
  • MTP
  • POP
  • SMTP
  • SNMP
  • ADU.
  • layer.
  • socket.
  • telnet.
  • identify spam.
  • be in binary format.
  • allow audio/video transmissions.
  • support only one format in a single message.
  • It utilizes UDP.
  • It allows web access.
  • It answers with multi-line replies.
  • It relies on the client-server model.
  • Bit stuffing for asynchronous lines
  • Character stuffing for synchronous lines
  • CRC for error detection
  • CRC for error ion
  • An ADU
  • A bit
  • A datagram
  • A packet
  • Socket address and socket family
  • Socket message and socket header
  • Socket stream and datagram socket
  • Socket type and address domain
  • contains no-cache.
  • contains no-transform.
  • allows client information.
  • contains the date, server, and content information.
  • allows client information.
  • contains the data file content information.
  • contains the status and content information.
  • contains the date, server, and content information.
  • route the IP packet to the destination.
  • translate computer hostnames to IP addresses.
  • translate IP addresses to computer hostnames.
  • automatically assign IP address to network device.
  • Reliable, message-oriented
  • Reliable, character-oriented
  • Unreliable, message-oriented
  • Unreliable, character-oriented
  • The message
  • The source address
  • The address of the sender
  • The address of the recipient
  • Frame Relay.
  • ICMP.
  • IPX.
  • TIP
  • Bits
  • Data
  • Packets
  • Segments
  • one bit flips.
  • a group of bits flip.
  • two consecutive bits flip.
  • most bits in the segment flip.
  • 1
  • 3
  • 5
  • 7
  • Application
  • Network
  • Physical
  • Transport
  • datagram.
  • frame.
  • packet.
  • router.
  • IPv6 is disable
  • Server option is disable
  • The IP address is not available in DHCP scope.
  • The IP address for the DNS Server is not available in scope option.
  • 2
  • 8
  • 64
  • 128
  • 1
  • 2
  • 4
  • 8
  • BGP.
  • EIGRP.
  • OSPF.
  • RIP.
  • A firewall is a type of middlebox device.
  • Middlebox devices operate only in the network layer.
  • Middlebox devices are routers that process, modify, and forward IP packets.
  • Middlebox devices act as network hubs that forward data to multiple devices.
  • Calculate MTU
  • Determine protocol
  • Determine destination
  • Generate an error message
  • a checksum.
  • traffic control.
  • a port number.
  • a user passwor
  • Coaxial
  • Optical fiber
  • Plenum cable
  • Twisted pair
  • Algorithms
  • Hashing
  • Primitives
  • Time-sequence diagrams
  • ALOH
  • CSMA/C
  • CSMA/C
  • VTCSM
  • 1-persistent.
  • 2-persistent.
  • 3-persistent.
  • 4-persistent.
  • The physical layer uses the port number to deliver traffi
  • The physical layer changes the value of a bit being transmitted due to electromagnetic interference.
  • The physical specifies the shared protocols and interface methods used by hosts in a communications network.
  • The physical layer provides the mechanism for opening, closing, and managing a session between end-user application processes.
  • bit.
  • channel.
  • frame.
  • packet.
  • Data link
  • Network
  • Session
  • Transport
  • Anycast
  • Broadcast
  • Multicast
  • Point-to-point transport
  • Public cloud
  • Private cloud
  • Platform as a service
  • Software as a service
  • IaaS, SaaS
  • PaaS, IaaS
  • SaaS, PaaS
  • SaaS, IaaS
  • Checksum
  • Hashing
  • Parity
  • Primitive
  • protocol.
  • RFC.
  • standard.
  • W3C publication.
  • connection-oriented characteristics
  • error detection
  • fixed-length frames
  • media access control
  • Bus
  • Ring
  • Star
  • Tree
  • Different types of devices enable all hosts to exchange information.
  • Information sent on computer networks always reaches its destination.
  • Protocols are the processes that occur in the computer networks.
  • Protocols are used to make phone calls over computer networks.
  • Compressed
  • Error-free
  • Reliable
  • Unreliable
  • user authorization.
  • transmission of long messages.
  • the transfer of data frames from one node to another.
  • bit transmission between nodes attached to the same physical transmission channel.
  • 3
  • 5
  • 7
  • 9
  • Application
  • Internet
  • Routing
  • Session
  • Client
  • Server
  • TCP
  • UDP
  • Reverse
  • Resource
  • Robust
  • Zone
  • ADU.
  • layer.
  • socket.
  • telnet.
  • IP address.
  • HTTP protocol.
  • document location.
  • web server details.
  • Network
  • Peer-to-peer
  • Routing
  • Switching
  • Username
  • Number of packets
  • Format of the packets
  • Encoding of the packets
  • Authorization, establish a connection, mail transfer
  • Mail transfer, authorization, connection termination
  • Authentication, mail transfer, connection termination
  • Establish a connection, mail transfer, connection termination
  • Connection-oriented, flow control, and multiplexing
  • Data encoding, frame error checking, and session support
  • Frame fragmentation, file sharing, and network management
  • Remote file access, data encryption, and media access control
  • even parity.
  • Internet checksums.
  • error-correcting codes.
  • cyclical redundancy check.
  • address.
  • CIDR.
  • interface.
  • netmask.
  • Collisions do not occur on CSMA/CD.
  • All systems jam the network, and then all begin transmitting again.
  • Hosts involved in a collision send an RTS signal indicating a time frame in which to retransmit.
  • Hosts involved in the collision send a jam signal, and then run an algorithm before retransmitting.
  • CSMA/CA
  • CSMA/CD
  • Frame ring
  • Token ring
  • 16 bits
  • 32 bits
  • 48 bits
  • 64 bits
  • IPv6 is disabled.
  • Server option is disabled.
  • The IP address is not available in DHCP scope.
  • The IP address for the DNS Server is not available in scope option.
  • 12
  • 14
  • 16
  • 28
  • ICMP
  • FTP
  • TCP
  • UDP
  • Bit
  • Datagram
  • Fragment
  • Packet
  • SCTP
  • TCP
  • Telnet
  • UDP
  • its reliability.
  • being connectionless.
  • its unlimited message size.
  • its user authentication method.
  • autoconfigure addresses.
  • determine the packet is too big.
  • determine the address is unreachable.
  • determine transmission time is exceeded.
  • ARP
  • DHCP
  • DNS
  • RARP
  • a virus is spread.
  • the packet is lost in transmission.
  • the checksum algorithm detects an error.
  • the information becomes corrupted by a non-transmission error.
  • It replaces the IP address.
  • t is assigned by the IETF.
  • It is composed of two parts.
  • It does not have to be unique
  • cannot be lost.
  • can be modified.
  • can be duplicated.
  • can suffer transmission errors.
  • IHL.
  • Source address.
  • Destination address.
  • TTL or Hop Limit.
  • Data compression
  • Data fragmentation
  • Data reassembly
  • Data reorganization
  • LAN devices
  • MAC addresses
  • NBMA networks
  • Point-to-point links
  • concurrent processing.
  • preventing packet loss.
  • delaying transmissions.
  • creating recovery messages.
  • Data link
  • Physical
  • Session
  • Transport
  • could be responsible for destination unreachable error messages?
  • hop limit exceeded in transit
  • beyond the scope of source address
  • erroneous header field encountered
  • fragment reassembly time exceeded
  • Buffer control
  • Sliding window
  • Traffic avoidance
  • Congestion control
  • Big endian
  • Character stuffing
  • MAC padding
  • Reverse lookup
  • Azure, EC2
  • EC2, Azure
  • Deep Blue, EC2
  • Deep Blue, Azure
  • Client-server
  • Client-queue-client
  • Client-server three-tier model
  • Peer-to-Peer
  • IP
  • LCP
  • NCP
  • SIP
  • DNS lookup.
  • user authentication.
  • IP packet forwarding.
  • connection establishment.
  • Checks the digital signature
  • Performs network address translation
  • Store the state information about the packet
  • Forwards the data packets between computer networks
  • Bluetooth
  • Coaxial cable
  • Optical fiber
  • Wireless network
  • application layer.
  • data link layer.
  • physical layer.
  • transport layer
  • Authorization
  • Closure
  • Handshaking
  • Transmission
  • HTML.
  • HTTP.
  • Unicode.
  • XML.
  • segment is lost.
  • checksum result is invalid.
  • transmission error is random.
  • data transmission is bidirectional.
  • one bit flips.
  • a group of bits flip.
  • using UDP instead of TCP.
  • most bits in the segment flip
  • coaxial
  • plastic
  • STP twisted pair
  • UTP twisted pair
  • Cisco standards.
  • IEEE.
  • RFC.
  • vendor device manual.
  • Application
  • Internet
  • Presentation
  • Session
  • Extension header
  • MTU
  • TTL
  • UDP
  • Application
  • Data link
  • Network
  • Transport
  • CyberGate
  • SGMP
  • SSH
  • TACACS+
  • Data link
  • Network
  • Physical
  • Transport
  • Data compression
  • Data fragmentation
  • Data reassembly
  • Data reorganization
  • Token ring
  • Alternating bit protocol
  • Address routing protocol
  • Asynchronous transport mode
  • DHCP
  • DNS
  • HTML
  • XML
  • data link layer.
  • network layer.
  • transport layer.
  • physical layer.
  • Application
  • Network
  • Physical
  • Transport
  • hop limit exceeded in transit
  • beyond the scope of source address
  • erroneous header field encountered
  • fragment reassembly time exceeded
  • 192.168.0.1
  • 192.168.1.1/24
  • 192.168.1.1 255.255.255.0
  • 255.255.255.0

About Clear My Certification

Check Also

Information Technology Management Professional CertificatioN

Information Technology Management Professional Certification

Information Technology Management Professional Certification Information Technology Management involves overseeing and directing the use of …

Leave a Reply

Your email address will not be published. Required fields are marked *