Friday , November 8 2024
Breaking News

CS402: Computer Communications and Networks Certification Final Exam Answers

  • ISO standards.
  • a protocol.
  • an RFC.
  • a standar
  • Anycast
  • Broadcast
  • Multicast
  • Unicast
  • Two layers
  • Five layers
  • Two columns with matching layers.
  • Five columns with matching layers.
  • Anywhere on Earth
  • In your city
  • In your house
  • Within 10 meters of one another
  • Internet
  • LAN
  • PAN
  • WAN
  • Bus
  • Ring
  • Star
  • Tree
  • A database of Internet services
  • A numeric linking system used by your text
  • A numeric listing of TCP/IP protocols
  • A tracking system for network development requirements
  • Application
  • Internet
  • Transport
  • VoIP
  • Network
  • Presentation
  • Session
  • Transport
  • It is authenticate
  • It is bidirectional.
  • It is connectionless.
  • It is unreliable.
  • HTML.
  • JavaScript.
  • Jav
  • XML.
  • Application
  • Internet
  • Network
  • Transport
  • Application
  • Communication
  • Presentation
  • Session
  • Application
  • Internet
  • Network Interface
  • Transport
  • Application, physical, session, transport, network, data link, presentation.
  • Application, presentation, network, session, transport, data link, physical.
  • Application, presentation, session, transport, network, data link, physical.
  • Physical, data link, network, transport, session, presentation, application.
  • MTP
  • POP
  • SMTP
  • SNMP
  • ADU.
  • layer.
  • socket.
  • telnet.
  • identify spam.
  • be in binary format.
  • allow audio/video transmissions.
  • support only one format in a single message.
  • It utilizes UDP.
  • It allows web access.
  • It answers with multi-line replies.
  • It relies on the client-server model.
  • Bit stuffing for asynchronous lines
  • Character stuffing for synchronous lines
  • CRC for error detection
  • CRC for error ion
  • An ADU
  • A bit
  • A datagram
  • A packet
  • Socket address and socket family
  • Socket message and socket header
  • Socket stream and datagram socket
  • Socket type and address domain
  • contains no-cache.
  • contains no-transform.
  • allows client information.
  • contains the date, server, and content information.
  • allows client information.
  • contains the data file content information.
  • contains the status and content information.
  • contains the date, server, and content information.
  • route the IP packet to the destination.
  • translate computer hostnames to IP addresses.
  • translate IP addresses to computer hostnames.
  • automatically assign IP address to network device.
  • Reliable, message-oriented
  • Reliable, character-oriented
  • Unreliable, message-oriented
  • Unreliable, character-oriented
  • The message
  • The source address
  • The address of the sender
  • The address of the recipient
  • Frame Relay.
  • ICMP.
  • IPX.
  • TIP
  • Bits
  • Data
  • Packets
  • Segments
  • one bit flips.
  • a group of bits flip.
  • two consecutive bits flip.
  • most bits in the segment flip.
  • 1
  • 3
  • 5
  • 7
  • Application
  • Network
  • Physical
  • Transport
  • datagram.
  • frame.
  • packet.
  • router.
  • IPv6 is disable
  • Server option is disable
  • The IP address is not available in DHCP scope.
  • The IP address for the DNS Server is not available in scope option.
  • 2
  • 8
  • 64
  • 128
  • 1
  • 2
  • 4
  • 8
  • BGP.
  • EIGRP.
  • OSPF.
  • RIP.
  • A firewall is a type of middlebox device.
  • Middlebox devices operate only in the network layer.
  • Middlebox devices are routers that process, modify, and forward IP packets.
  • Middlebox devices act as network hubs that forward data to multiple devices.
  • Calculate MTU
  • Determine protocol
  • Determine destination
  • Generate an error message
  • a checksum.
  • traffic control.
  • a port number.
  • a user passwor
  • Coaxial
  • Optical fiber
  • Plenum cable
  • Twisted pair
  • Algorithms
  • Hashing
  • Primitives
  • Time-sequence diagrams
  • ALOH
  • CSMA/C
  • CSMA/C
  • VTCSM
  • 1-persistent.
  • 2-persistent.
  • 3-persistent.
  • 4-persistent.
  • The physical layer uses the port number to deliver traffi
  • The physical layer changes the value of a bit being transmitted due to electromagnetic interference.
  • The physical specifies the shared protocols and interface methods used by hosts in a communications network.
  • The physical layer provides the mechanism for opening, closing, and managing a session between end-user application processes.
  • bit.
  • channel.
  • frame.
  • packet.
  • Data link
  • Network
  • Session
  • Transport
  • Anycast
  • Broadcast
  • Multicast
  • Point-to-point transport
  • Public cloud
  • Private cloud
  • Platform as a service
  • Software as a service
  • IaaS, SaaS
  • PaaS, IaaS
  • SaaS, PaaS
  • SaaS, IaaS
  • Checksum
  • Hashing
  • Parity
  • Primitive
  • protocol.
  • RFC.
  • standard.
  • W3C publication.
  • connection-oriented characteristics
  • error detection
  • fixed-length frames
  • media access control
  • Bus
  • Ring
  • Star
  • Tree
  • Different types of devices enable all hosts to exchange information.
  • Information sent on computer networks always reaches its destination.
  • Protocols are the processes that occur in the computer networks.
  • Protocols are used to make phone calls over computer networks.
  • Compressed
  • Error-free
  • Reliable
  • Unreliable
  • user authorization.
  • transmission of long messages.
  • the transfer of data frames from one node to another.
  • bit transmission between nodes attached to the same physical transmission channel.
  • 3
  • 5
  • 7
  • 9
  • Application
  • Internet
  • Routing
  • Session
  • Client
  • Server
  • TCP
  • UDP
  • Reverse
  • Resource
  • Robust
  • Zone
  • ADU.
  • layer.
  • socket.
  • telnet.
  • IP address.
  • HTTP protocol.
  • document location.
  • web server details.
  • Network
  • Peer-to-peer
  • Routing
  • Switching
  • Username
  • Number of packets
  • Format of the packets
  • Encoding of the packets
  • Authorization, establish a connection, mail transfer
  • Mail transfer, authorization, connection termination
  • Authentication, mail transfer, connection termination
  • Establish a connection, mail transfer, connection termination
  • Connection-oriented, flow control, and multiplexing
  • Data encoding, frame error checking, and session support
  • Frame fragmentation, file sharing, and network management
  • Remote file access, data encryption, and media access control
  • even parity.
  • Internet checksums.
  • error-correcting codes.
  • cyclical redundancy check.
  • address.
  • CIDR.
  • interface.
  • netmask.
  • Collisions do not occur on CSMA/CD.
  • All systems jam the network, and then all begin transmitting again.
  • Hosts involved in a collision send an RTS signal indicating a time frame in which to retransmit.
  • Hosts involved in the collision send a jam signal, and then run an algorithm before retransmitting.
  • CSMA/CA
  • CSMA/CD
  • Frame ring
  • Token ring
  • 16 bits
  • 32 bits
  • 48 bits
  • 64 bits
  • IPv6 is disabled.
  • Server option is disabled.
  • The IP address is not available in DHCP scope.
  • The IP address for the DNS Server is not available in scope option.
  • 12
  • 14
  • 16
  • 28
  • ICMP
  • FTP
  • TCP
  • UDP
  • Bit
  • Datagram
  • Fragment
  • Packet
  • SCTP
  • TCP
  • Telnet
  • UDP
  • its reliability.
  • being connectionless.
  • its unlimited message size.
  • its user authentication method.
  • autoconfigure addresses.
  • determine the packet is too big.
  • determine the address is unreachable.
  • determine transmission time is exceeded.
  • ARP
  • DHCP
  • DNS
  • RARP
  • a virus is spread.
  • the packet is lost in transmission.
  • the checksum algorithm detects an error.
  • the information becomes corrupted by a non-transmission error.
  • It replaces the IP address.
  • t is assigned by the IETF.
  • It is composed of two parts.
  • It does not have to be unique
  • cannot be lost.
  • can be modified.
  • can be duplicated.
  • can suffer transmission errors.
  • IHL.
  • Source address.
  • Destination address.
  • TTL or Hop Limit.
  • Data compression
  • Data fragmentation
  • Data reassembly
  • Data reorganization
  • LAN devices
  • MAC addresses
  • NBMA networks
  • Point-to-point links
  • concurrent processing.
  • preventing packet loss.
  • delaying transmissions.
  • creating recovery messages.
  • Data link
  • Physical
  • Session
  • Transport
  • could be responsible for destination unreachable error messages?
  • hop limit exceeded in transit
  • beyond the scope of source address
  • erroneous header field encountered
  • fragment reassembly time exceeded
  • Buffer control
  • Sliding window
  • Traffic avoidance
  • Congestion control
  • Big endian
  • Character stuffing
  • MAC padding
  • Reverse lookup
  • Azure, EC2
  • EC2, Azure
  • Deep Blue, EC2
  • Deep Blue, Azure
  • Client-server
  • Client-queue-client
  • Client-server three-tier model
  • Peer-to-Peer
  • IP
  • LCP
  • NCP
  • SIP
  • DNS lookup.
  • user authentication.
  • IP packet forwarding.
  • connection establishment.
  • Checks the digital signature
  • Performs network address translation
  • Store the state information about the packet
  • Forwards the data packets between computer networks
  • Bluetooth
  • Coaxial cable
  • Optical fiber
  • Wireless network
  • application layer.
  • data link layer.
  • physical layer.
  • transport layer
  • Authorization
  • Closure
  • Handshaking
  • Transmission
  • HTML.
  • HTTP.
  • Unicode.
  • XML.
  • segment is lost.
  • checksum result is invalid.
  • transmission error is random.
  • data transmission is bidirectional.
  • one bit flips.
  • a group of bits flip.
  • using UDP instead of TCP.
  • most bits in the segment flip
  • coaxial
  • plastic
  • STP twisted pair
  • UTP twisted pair
  • Cisco standards.
  • IEEE.
  • RFC.
  • vendor device manual.
  • Application
  • Internet
  • Presentation
  • Session
  • Extension header
  • MTU
  • TTL
  • UDP
  • Application
  • Data link
  • Network
  • Transport
  • CyberGate
  • SGMP
  • SSH
  • TACACS+
  • Data link
  • Network
  • Physical
  • Transport
  • Data compression
  • Data fragmentation
  • Data reassembly
  • Data reorganization
  • Token ring
  • Alternating bit protocol
  • Address routing protocol
  • Asynchronous transport mode
  • DHCP
  • DNS
  • HTML
  • XML
  • data link layer.
  • network layer.
  • transport layer.
  • physical layer.
  • Application
  • Network
  • Physical
  • Transport
  • hop limit exceeded in transit
  • beyond the scope of source address
  • erroneous header field encountered
  • fragment reassembly time exceeded
  • 192.168.0.1
  • 192.168.1.1/24
  • 192.168.1.1 255.255.255.0
  • 255.255.255.0

About Clear My Certification

Check Also

KOTLIN CERTIFICATION

Kotlin Professional Certification

Kotlin Professional Certification Kotlin is a statically-typed programming language created by JetBrains, known for its …

Leave a Reply

Your email address will not be published. Required fields are marked *