CDC 3c251 Vol. 3

  • OSI Model
  • Ethernet Standards
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Barrym07
B
Barrym07
Community Contributor
Quizzes Created: 3 | Total Attempts: 870
| Attempts: 240 | Questions: 76
Please wait...
Question 1 / 76
0 %
0/100
Score 0/100
1. (401)What device is a combination transmitter/receiver in a single package?

Explanation

A transceiver is a device that combines the functions of both a transmitter and a receiver in a single package. It is commonly used in telecommunications and networking to transmit and receive signals over a network. Transceivers are essential components in various devices such as radios, wireless communication systems, and computer networks. They enable bidirectional communication by converting incoming signals into a format that can be understood by the receiving device and transmitting outgoing signals in a compatible format.

Submit
Please wait...
About This Quiz
Networking Quizzes & Trivia

CDC 3C251 Vol. 3 quiz assesses knowledge on networking devices and their functions within OSI model layers. It covers transceivers, NICs, repeaters, and hubs, essential for understanding physical and data link connections in network setups.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. (403)The device that receives a digital signal and regenerates the signal along the next leg of the medium is a...

Explanation

A repeater is a device that receives a digital signal and amplifies or regenerates it before sending it along the next leg of the medium. This is done to overcome signal degradation and ensure that the signal quality is maintained over longer distances. Unlike bridges, brouters, and gateways, which are used for different purposes in network communication, a repeater specifically focuses on signal regeneration and amplification.

Submit
3. (411)What topology has the stations connected in the form of a circle?

Explanation

A ring topology has the stations connected in the form of a circle. In this type of network, each station is connected to exactly two other stations, forming a closed loop. Data is transmitted in one direction around the ring, and each station receives the data and passes it along to the next station until it reaches the intended destination. This topology is commonly used in local area networks (LANs) and allows for efficient data transmission and easy expansion of the network.

Submit
4. (411)What topology combines two or more different physical topologies in a single network?

Explanation

not-available-via-ai

Submit
5. (413)What data communication protocol is based on bits and the position of the bits?

Explanation

Bit-oriented is the correct answer because this data communication protocol is based on the manipulation and positioning of individual bits. It focuses on the transmission and reception of binary data, where each bit's position and value are crucial for communication. This protocol ensures accurate and reliable data transmission by considering the bits' order and arrangement.

Submit
6. (417)What address uses a 128 bit addressing scheme?

Explanation

IPv6 addresses use a 128-bit addressing scheme, which allows for a significantly larger number of unique addresses compared to IPv4. This is necessary due to the increasing number of devices connected to the internet. IPv6 addresses are written in a hexadecimal format and are separated by colons.

Submit
7. (422)What LAN impairment error occurs when frames that are larger than the maximum size the network protocol requires are received?

Explanation

The LAN impairment error that occurs when frames that are larger than the maximum size the network protocol requires are received is called "Giant". This error happens when a frame exceeds the maximum size allowed by the network protocol, causing issues in the transmission and processing of the data.

Submit
8. (402)What device provides the physical, electrical, and electronic connections to the network media?

Explanation

A network interface card (NIC) provides the physical, electrical, and electronic connections to the network media. It is a hardware component that is installed in a computer or device to allow it to connect to a network. The NIC acts as an interface between the computer and the network, allowing data to be transmitted and received over the network. It provides the necessary connections, such as Ethernet or Wi-Fi, to establish a network connection and enable communication between devices.

Submit
9. (403)A repeater with more than one output port is a...

Explanation

A repeater with more than one output port is a hub. A hub is a networking device that allows multiple devices to connect to a network. It receives data from one port and broadcasts it to all other ports, essentially acting as a multi-port repeater. Therefore, a hub is the correct answer in this case.

Submit
10. (411)What topology consists of cable segments from each computer connected to a centralized component?

Explanation

not-available-via-ai

Submit
11. (414)Which TCP/IP Application layer protocol is a terminal emulation protocol used to log on to remote hosts?

Explanation

Telnet is a TCP/IP Application layer protocol that allows users to log on to remote hosts and access them as if they were directly connected to the local machine. It provides terminal emulation, allowing users to interact with the remote host's command-line interface. Telnet is commonly used for remote administration, troubleshooting, and accessing network devices. It is a simple and lightweight protocol that transmits data in clear text, making it less secure compared to other protocols like SSH.

Submit
12. (414)Which TCP/IP Application layer protocol is an automated means of assigning a unique IP address to every device on a network?

Explanation

DHCP is an automated means of assigning a unique IP address to every device on a network. It allows devices to obtain an IP address, subnet mask, default gateway, and other network configuration settings automatically. This eliminates the need for manual IP address assignment, making it easier to manage and scale networks. TFTP is a file transfer protocol, SMTP is used for email transmission, and HTTP is used for web communication, so they are not directly related to assigning IP addresses.

Submit
13. (415)What is a group of computers and associated devices that share a common communications line within a small geographic?

Explanation

A local area network (LAN) is a group of computers and associated devices that share a common communications line within a small geographic area. This network is typically confined to a building or a campus and is used to facilitate communication and resource sharing among the devices connected to it. Unlike a wide area network (WAN) or a metropolitan area network (MAN), a LAN has a smaller coverage area and is usually privately owned and operated by an organization. A virtual private network (VPN) is a technology that allows users to securely access a private network over a public network, but it is not specifically related to a group of computers sharing a common communications line within a small geographic area.

Submit
14. (422)What LAN impairment error occurs when network nodes in the same domain transmit at the same time?

Explanation

Collision is the correct answer because it refers to the LAN impairment error that occurs when network nodes in the same domain transmit at the same time. When multiple devices attempt to transmit data simultaneously, a collision can occur, resulting in data corruption and loss. This collision is detected by the devices involved, and they take necessary steps to resolve it, such as waiting for a random period of time before retransmitting the data.

Submit
15. (404)What is a device that subdivides a network into smaller logical pieces, or segments?

Explanation

A switch is a device that subdivides a network into smaller logical pieces or segments. It operates at the data link layer of the OSI model and uses MAC addresses to forward data packets to the appropriate destination. Unlike a hub, which broadcasts data to all connected devices, a switch intelligently routes data only to the specific device it is intended for, improving network efficiency and security. Therefore, a switch is the correct answer to this question.

Submit
16. (404)What is the time a switch takes to figure out where to forward a data unit called?

Explanation

Latency refers to the time it takes for a switch to determine the appropriate destination for a data unit. It is the delay that occurs as the switch processes and forwards the data. The switch needs to analyze the data packet and make a decision on where to send it based on its destination address. This process takes a certain amount of time, which is known as latency.

Submit
17. (406)What is a router's strength?

Explanation

A router's strength lies in its intelligence. This refers to its ability to analyze and make decisions based on data packets it receives, allowing it to efficiently direct network traffic. The intelligence of a router enables it to determine the best path for data transmission, manage network congestion, and prioritize certain types of traffic. This ensures that data is delivered accurately and efficiently, optimizing network performance.

Submit
18. (414)Which network protocol has DOD chosen as its standard to govern the flow of information?

Explanation

The correct answer is TCP/IP. The Department of Defense (DOD) has chosen TCP/IP as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows computers to communicate with each other over the internet. It provides reliable and secure transmission of data, ensuring that information is delivered accurately and efficiently. TCP/IP is widely used and has become the standard protocol for internet communication.

Submit
19. (416)What network model is a centralized model for data storage, security, running applications, and network administration?

Explanation

A client-server network model is a centralized model for data storage, security, running applications, and network administration. In this model, there are dedicated servers that store and manage data, run applications, and handle security measures. Clients, on the other hand, are devices that connect to the servers to access the resources and services provided. This model allows for efficient management and control of the network, ensuring that data and applications are centrally managed and accessed by authorized users.

Submit
20. (417)What address is a 32-bit number?

Explanation

A 32-bit number is the format used for Internet Protocol version 4 (IPv4) addresses. IPv4 addresses are used to identify devices on a network and are made up of four sets of numbers separated by periods. Each set can range from 0 to 255, resulting in a total of approximately 4.3 billion unique addresses. However, due to the rapid growth of the internet, the number of available IPv4 addresses is now limited, leading to the development and adoption of IPv6, which uses a 128-bit number format.

Submit
21. (407)Based on a specific input address, which Local Area Network (LAN) switch has the lowest delay and should be considered for supporting real-time applications?

Explanation

A cut-through switch is the best choice for supporting real-time applications because it has the lowest delay. Cut-through switches forward packets as soon as the destination address is received, without waiting for the entire packet to be received. This reduces the delay in transmitting data, making it ideal for real-time applications that require quick and efficient data transfer. Hybrid switches, fragment-free switches, and store and forward switches have higher delays compared to cut-through switches, making them less suitable for real-time applications.

Submit
22. (408)When tributary units are grouped together they form...

Explanation

When tributary units are grouped together, they form a tributary unit group (TUG). This implies that multiple tributary units are combined or assembled into a single group or entity called a TUG. The TUG serves as a higher-level unit that encompasses and manages the individual tributary units within it.

Submit
23. (410)What topology defines the layout of network's devices and media?

Explanation

Physical topology refers to the actual physical layout of devices and media in a network. It describes how the devices are physically connected to each other and to the network media, such as cables or wireless connections. This includes the arrangement of devices, the types of cables used, and the location of devices within the network. In contrast, logical topology refers to the way in which data flows within the network, regardless of the physical layout. The star and hybrid topologies are examples of physical topologies, where devices are connected to a central hub or a combination of different topologies, respectively.

Submit
24. (411)What topology consists of devices connected to a common, shared cable?

Explanation

The correct answer is bus. In a bus topology, all devices are connected to a common cable called the bus. This cable acts as a shared communication medium, allowing devices to transmit and receive data. Each device on the bus can access the data transmitted by other devices, making it a simple and cost-effective solution for small networks. However, if the bus cable fails, the entire network can be affected.

Submit
25. (417)What is the physical address of any device on the network?

Explanation

A MAC address is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment. It is a hardware address that is physically assigned to the device and remains constant, regardless of the network it is connected to. Unlike IP addresses, MAC addresses are not assigned by a network administrator and cannot be changed. Therefore, the MAC address is the physical address of any device on the network.

Submit
26. (421)What test equipment provides a capability for digital network diagnostics and developing communications software?

Explanation

A protocol analyzer is a type of test equipment that is specifically designed to provide digital network diagnostics and develop communications software. It is used to capture, analyze, and decode network traffic, allowing users to troubleshoot network issues and develop and test communication protocols. It can also provide insights into network performance, identify errors or anomalies in data transmission, and assist in optimizing network efficiency.

Submit
27. (422)What LAN impairment error occurs when an internet protocol (IP) data unit smaller than 28 bytes is received?

Explanation

An undersize packet error occurs when an IP data unit smaller than 28 bytes is received. This error indicates that the received packet is too small to be processed or interpreted correctly by the network devices. It can lead to data loss or corruption as the packet may not contain all the necessary information required for proper communication.

Submit
28. (405)What network device is a combination of networking hardware and software that connect two dissimilar kinds of networks?

Explanation

A gateway is a network device that combines both hardware and software to connect two different types of networks. It acts as an interface between these networks, allowing communication and data transfer between them. Unlike other devices like switches or repeaters, a gateway is specifically designed to handle the conversion and routing of data between dissimilar networks, making it the correct answer in this scenario.

Submit
29. (406)What is the oldest routing protocol?

Explanation

RIP, or Routing Information Protocol, is considered the oldest routing protocol. It was developed in the early 1980s and was one of the first routing protocols used in computer networks. RIP uses a distance-vector algorithm to determine the best path for data packets to travel through a network. It has a maximum hop count of 15, which limits its scalability in larger networks. Despite its limitations, RIP is still used in some small networks today.

Submit
30. (416)What network model enables users to share resources, files, and printers in a decentralized way?

Explanation

Peer-to-peer network model enables users to share resources, files, and printers in a decentralized way. In this model, each device on the network can act as both a client and a server, allowing users to directly connect and share resources without the need for a central server. This model is commonly used in file-sharing applications and allows for greater flexibility and scalability compared to other network models.

Submit
31. (406)What is the routing protocol of internet backbones?

Explanation

The correct answer is Border Gateway Protocol (BGP). BGP is the routing protocol used in internet backbones. It is responsible for exchanging routing information between autonomous systems (AS) and is designed to provide scalability, stability, and security in large-scale networks. BGP allows routers to make informed decisions about the best path for data packets to travel across different networks, ensuring efficient and reliable routing on the internet backbone.

Submit
32. (413)What data communication protocol uses characters and symbols (character code set) to govern the flow and format of information between systems?

Explanation

Character-oriented data communication protocol uses characters and symbols (character code set) to govern the flow and format of information between systems. This means that the protocol focuses on the transmission and interpretation of individual characters, allowing for easy understanding and compatibility between different systems. Unlike bit-oriented protocols that focus on the transmission of individual bits, character-oriented protocols provide a higher level of abstraction and are commonly used in applications that require the transmission of human-readable data. Routing and the Internet are not specifically related to the use of characters and symbols in data communication protocols.

Submit
33. (414)Which TCP/IP Application layer protocol is used to send and receive files via TCP/IP?

Explanation

The correct answer is File Transfer Protocol (FTP). FTP is a TCP/IP application layer protocol that is used to transfer files between a client and a server on a network. It provides a simple and standardized way to send and receive files, allowing users to upload, download, and manage files on remote servers. FTP uses TCP as its transport protocol, ensuring reliable and secure file transfer over the network.

Submit
34. (414)Which protocol is a simpler way to transfer files between computers but is simpler or more trivial than FTP?

Explanation

TFTP is a simpler way to transfer files between computers compared to FTP. It is considered more trivial because it lacks some of the advanced features and functionalities of FTP. TFTP is primarily used for simple file transfers and is commonly used in scenarios where simplicity and efficiency are more important than advanced capabilities.

Submit
35. (414)Which TCP/IP Application layer protocol is a simple protocol used to synchronize the clocks of computers on a network?

Explanation

Network Time Protocol (NTP) is a TCP/IP Application layer protocol used to synchronize the clocks of computers on a network. It allows computers to maintain accurate time synchronization by exchanging time information between clients and servers. NTP uses a hierarchical system of time sources, where lower-level servers synchronize with higher-level servers, ultimately obtaining time from highly accurate reference clocks. This ensures that all devices on the network have a consistent and accurate time, which is crucial for various network operations and services that rely on synchronized timekeeping. DHCP, SNMP, and PING are not specifically designed for clock synchronization.

Submit
36. (423)When using the trace route utility, round-trip delay is displayed in...

Explanation

When using the trace route utility, the round-trip delay is displayed in milliseconds. This is because milliseconds are commonly used to measure the time it takes for a packet to travel from the source to the destination and back. The trace route utility sends out packets with increasing time-to-live (TTL) values, and each router along the path responds with an ICMP time exceeded message. By measuring the time it takes for these messages to return, the trace route utility can estimate the round-trip delay in milliseconds.

Submit
37. (402)What layers of the open system interconnection (OSI) model do network interface cards (NIC) belong?

Explanation

Network interface cards (NIC) belong to the Physical layer and Data Link layer of the OSI model. The Physical layer is responsible for the physical transmission of data over the network, including the electrical, mechanical, and physical specifications of the network interface. The Data Link layer is responsible for the reliable transmission of data between two directly connected nodes, providing error detection and correction, as well as flow control. NICs handle both the physical connection to the network (Physical layer) and the data transmission between devices (Data Link layer).

Submit
38. (414)Which TCP/IP Network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address?

Explanation

ARP (Address Resolution Protocol) is the correct answer because it is the TCP/IP Network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve IP addresses to MAC addresses by broadcasting an ARP request on the local network and receiving an ARP reply from the device with the corresponding MAC address. This allows devices to communicate with each other at the data link layer using MAC addresses.

Submit
39. (419)What is Not a recommendation for planning networks using variable length subnet masking (VLSM)?

Explanation

Re-addressing the entire network is not a recommendation for planning networks using variable length subnet masking (VLSM). VLSM allows for the allocation of different subnet masks within a network, which means that re-addressing the entire network is not necessary. Instead, it is recommended to start with the shortest mask, aim to use contiguous subnets where possible, and choose one or more available subnets and subnet further.

Submit
40. (422)What is a good indication of how well any two nodes can access the transmission media and transmit and receive data along the link or path in a reliable manner?

Explanation

Round-trip delay is a good indication of how well any two nodes can access the transmission media and transmit and receive data along the link or path in a reliable manner. Round-trip delay refers to the time it takes for a packet to travel from the sender to the receiver and back again. A lower round-trip delay indicates that the communication between the nodes is efficient and reliable, while a higher delay may indicate network congestion or other issues that can affect the transmission of data. Therefore, round-trip delay is a key metric to consider when evaluating the performance of a network connection.

Submit
41. (425)What protocol allows products from different vendors to be managed by a single network management application?

Explanation

SNMP is a protocol that allows products from different vendors to be managed by a single network management application. It provides a standardized way for devices to communicate and exchange information, regardless of the manufacturer. This allows network administrators to monitor and control various devices, such as routers, switches, and servers, using a single management system. SNMP enables centralized management and simplifies the task of monitoring and troubleshooting a network by providing a unified interface for different devices.

Submit
42. (403)What can be used to extend the size of a network?

Explanation

Active Hubs can be used to extend the size of a network. Active Hubs are devices that amplify and regenerate signals, allowing them to extend the distance over which data can be transmitted. They receive data signals from one device and then transmit them to all other devices connected to the hub. This allows for the expansion of a network by connecting multiple devices to the hub, thereby extending the network's reach.

Submit
43. (408)What Synchronous Optical Network (SONET) devices are configured to split SONET traffic and copy individual channels on two or more output links?

Explanation

A Drop-and-repeat node (D+R) is a Synchronous Optical Network (SONET) device that is configured to split SONET traffic and copy individual channels on two or more output links. This means that the D+R node can take the incoming SONET traffic and duplicate specific channels onto multiple output links, allowing for redundancy and improved reliability in the network. This feature is useful in scenarios where high availability and fault tolerance are required.

Submit
44. (414)Which TCP/IP Network layer protocol provides messaging that can help with troubleshooting?

Explanation

ICMP is a TCP/IP network layer protocol that provides messaging for troubleshooting purposes. It is used to send error messages and operational information about network conditions. ICMP messages can be used to diagnose network connectivity issues, identify problems with routers or hosts, and determine the status of network devices. It is commonly used by network administrators and technicians to troubleshoot and resolve network problems.

Submit
45. (415)What type of network enables a group of two or more computer systems to communicate over the public internet?

Explanation

A Virtual Private Network (VPN) enables a group of computer systems to communicate over the public internet by creating a secure and encrypted connection. It allows users to access and share data remotely while maintaining privacy and security. VPNs are commonly used by businesses to connect remote offices or remote workers to the main office network, as well as by individuals to secure their internet connections and protect their online activities from prying eyes.

Submit
46. (405)What type of gateway might include remote access servers that allow dial-up connectivity to a Local Area Network (LAN)?

Explanation

An LAN gateway is the correct answer because it includes remote access servers that allow dial-up connectivity to a Local Area Network (LAN). This type of gateway serves as a bridge between the LAN and external networks, providing secure access for remote users to connect to the LAN using dial-up connections.

Submit
47. (409)Because of its cost, Asynchronous Transfer Mode (ATM) is rarely used on small local area networks (LAN). What technology is better suited for LANs?

Explanation

ATM is rarely used on small LANs due to its high cost. Gigabit Ethernet, on the other hand, is a technology that provides high-speed data transmission and is better suited for LANs. It offers a data transfer rate of 1 gigabit per second, which is significantly faster than Fast Ethernet and Ethernet. Gigabit Ethernet is more cost-effective and provides better performance, making it the preferred choice for LANs.

Submit
48. (414)Which TCP/IP Application layer protocol is a utility that can verify that TCP/IP is installed and communicating with the network?

Explanation

PING is a utility that sends a message to a specific IP address or domain name and waits for a response. It is commonly used to test network connectivity and verify if TCP/IP is installed and functioning correctly. PING sends a series of small packets to the target address and measures the time it takes for the packets to be sent and received. If a response is received, it confirms that the network is properly configured and communication is established. Therefore, PING is the correct answer for this question.

Submit
49. (415)The interconnection of several networks of computer resources in a city into a single larger network is a...

Explanation

A metropolitan area network (MAN) is the correct answer because it refers to the interconnection of several networks of computer resources in a city into a single larger network. A LAN is a network that covers a small area, such as a home or office. A WAN is a network that spans a large geographical area, such as multiple cities or countries. A VPN is a secure private network that allows users to access a network remotely. Therefore, a MAN best describes the scenario where multiple networks in a city are interconnected into a larger network.

Submit
50. (420)How does a cable scanner identify crossover and straight-through cables?

Explanation

A cable scanner identifies crossover and straight-through cables by providing wiring maps at both ends of the cable. This means that it can determine the specific wiring configuration of the cable, allowing it to differentiate between crossover and straight-through cables. By comparing the wiring maps at each end, the scanner can identify any differences in the wiring pattern, which indicates whether the cable is a crossover or straight-through cable.

Submit
51. (401)What device operates at the physical layer of the Open System Interconnection (OSI) model and is used in Ethernet networks to connect which device to a fiber or copper cable?

Explanation

A transceiver is a device that operates at the physical layer of the OSI model and is used in Ethernet networks to connect a device to a fiber or copper cable. It combines both transmitter and receiver functions, allowing data to be transmitted and received over the network. This device converts electrical signals into optical signals for transmission over fiber cables or into electrical signals for transmission over copper cables. Thus, a transceiver plays a crucial role in connecting devices to the network infrastructure.

Submit
52. (421)What component of a protocol analyzer stores all frames based on the user configuration inputs?

Explanation

A protocol analyzer is a tool used to capture and analyze network traffic. The buffer component of a protocol analyzer stores all frames based on the user configuration inputs. This means that the buffer is responsible for storing the captured network traffic for further analysis. The buffer allows the user to specify the amount of data to be stored, ensuring that no frames are lost during the analysis process.

Submit
53. (424)Which network management function obtains the utilization and error rates of network devices and provides statistical data about the network?

Explanation

Performance management is the correct answer because it involves obtaining the utilization and error rates of network devices and providing statistical data about the network. This function is responsible for monitoring and analyzing the performance of network devices and ensuring that they are operating at optimal levels. It helps in identifying any performance issues or bottlenecks in the network and allows for proactive measures to be taken to optimize network performance.

Submit
54. (412)What is an advantage of a logical ring topology?

Explanation

In a logical ring topology, there are no collisions because data is transmitted in a sequential manner. Each node has a dedicated time slot to transmit data, ensuring that there is no interference or collision between different nodes. This advantage allows for efficient and reliable communication within the network.

Submit
55. (424)Which network management element is a type of node connected to the network such as a switch, router, computer, or printer?

Explanation

A managed device refers to a type of node that is connected to a network, such as a switch, router, computer, or printer. These devices can be monitored, controlled, and managed by a network management system. They play a crucial role in network management as they provide the necessary data and information to the management system, allowing administrators to effectively monitor and control the network infrastructure.

Submit
56. (412)What is NOT an advantage of a logical bus topology?

Explanation

A logical bus topology does not eliminate collisions. In a logical bus topology, all nodes share the same communication channel, and when two or more nodes transmit data at the same time, collisions occur. However, collision detection and collision avoidance mechanisms can be implemented to minimize the impact of collisions. Therefore, the statement "There are no collisions" is not an advantage of a logical bus topology.

Submit
57. (421)What component of a protocol analyzer discards frames based on its definition or activates a trigger based on the trigger definition?

Explanation

A protocol analyzer is a tool used to capture and analyze network traffic. One of the main tasks of a protocol analyzer is to filter the captured frames based on certain criteria. This filtering component, known as a filter, allows the user to define specific conditions or rules that determine which frames should be discarded and which should be captured for further analysis. By activating the filter, the protocol analyzer can discard frames that do not meet the specified criteria or activate a trigger to capture frames that match the trigger definition.

Submit
58. (425)What is the purpose of the community name that is used with network management systems (NMS)?

Explanation

The purpose of the community name that is used with network management systems (NMS) is to authenticate Simple Network Management Protocol (SNMP) requests. The community name serves as a password or authentication credential that allows the NMS to communicate with SNMP agents on network devices. By providing the correct community name, the NMS can verify its identity and establish a secure connection to monitor and manage the devices on the network.

Submit
59. (422)What LAN impairment error occurs when an internet protocol (IP) data unit larger than 65,535 bytes is received?

Explanation

When an internet protocol (IP) data unit larger than 65,535 bytes is received, it is considered an "Oversize packet" error. This error occurs when the received data unit exceeds the maximum size allowed for IP packets, which is determined by the maximum transmission unit (MTU) of the network. Oversize packets can cause network congestion, packet loss, and degraded performance.

Submit
60. (420)How is the Optical Time-Domain Reflectometer (OTDR) used to measure signal loss?

Explanation

The correct answer is "It should not be used." This suggests that the Optical Time-Domain Reflectometer (OTDR) is not an appropriate tool for measuring signal loss. The OTDR is commonly used to measure the length of a fiber optic cable and identify any faults or breaks in the cable. However, it is not designed specifically for measuring signal loss. Therefore, it is not recommended to use the OTDR for this purpose.

Submit
61. (425) When the network management software is first installed, what type of alarm threshold value is loaded into the management information base?

Explanation

When the network management software is first installed, default values are loaded into the management information base. This means that the software comes with predefined threshold values for various alarms. These default values are set by the software manufacturer and can be modified by the network administrator according to their specific requirements.

Submit
62. (405)What type of gateway can restrict the kind of access local area network (LAN) users have to the internet, and vice versa?

Explanation

An internet gateway is a type of gateway that can restrict the kind of access local area network (LAN) users have to the internet, and vice versa. It acts as a bridge between the LAN and the internet, controlling the flow of data and allowing only authorized access. It can enforce security policies, filter content, and block certain websites or services to ensure that the LAN users have restricted access to the internet. Additionally, it can also restrict external access to the LAN, providing a secure network environment.

Submit
63. (420)When using the cable scanner wire-map feature, what action is required to prevent false readings?

Explanation

To prevent false readings when using the cable scanner wire-map feature, it is necessary to connect an injector at the end of the cable being tested. This injector helps to ensure that the signal being sent through the cable is properly received and accurately detected by the scanner. By connecting the injector, any potential signal loss or interference can be minimized, leading to more reliable and accurate readings from the wire-map feature.

Submit
64. (408)What synchronous optical network (SONET) device aggregates or splits SONET traffic at various speeds so as to provide access to SONET without demultiplexing the SONET signal stream?

Explanation

An Add/Drop multiplexer (ADM) is a synchronous optical network (SONET) device that aggregates or splits SONET traffic at various speeds. It allows access to SONET without the need to demultiplex the SONET signal stream. This means that it can add or drop specific channels or signals from the SONET network without interfering with the rest of the traffic. ADMs are commonly used in telecommunications networks to efficiently manage and distribute SONET traffic.

Submit
65. (408)An OC-12's electrical signal is the same as a Synchronous Transport Signal level-12 (STS-12) frame and equal to what Synchronous Transport Modules (STM) frame?

Explanation

An OC-12's electrical signal is the same as a Synchronous Transport Signal level-12 (STS-12) frame, which is equivalent to an STM-4 frame.

Submit
66. (418)How many subnet bits are required to support 85 subnets on a Class B network?

Explanation

To support 85 subnets on a Class B network, seven subnet bits are required. In a Class B network, the default subnet mask is 255.255.0.0, which provides for 16,384 hosts. By adding seven subnet bits, the subnet mask becomes 255.255.254.0, allowing for 128 subnets (2^7) with 128 hosts each. This provides enough subnets to support the required 85 subnets.

Submit
67. (421)What protocol analyzer test window provides information concerning the bandwidth utilization and the number of connections that are related to specific nodes?

Explanation

The correct answer is "Connection statistics." The connection statistics test window in a protocol analyzer provides information about the bandwidth utilization and the number of connections related to specific nodes. This window allows users to analyze the performance and usage of connections in a network, providing valuable insights into network traffic and resource utilization.

Submit
68. (424)Which network management function provides the capability to initialize, operate, and shutdown managed devices?

Explanation

Configuration management is the network management function that provides the capability to initialize, operate, and shutdown managed devices. This involves tasks such as setting up initial configurations, managing device settings and parameters, and controlling device operations. By having effective configuration management, network administrators can ensure that devices are properly configured and functioning as intended, allowing for efficient and reliable network operations.

Submit
69. (414)Which TCP/IP Network layer protocol provides information about how and where data should be delivered, including the data's source and destination addresses?

Explanation

The correct answer is Internet Protocol (IP). IP is responsible for providing information about how and where data should be delivered, including the source and destination addresses. It is a network layer protocol that ensures the proper routing and delivery of data packets across different networks. IP addresses are used to uniquely identify devices on a network and facilitate the transmission of data between them.

Submit
70. (423)Jabbers manifest themselves on a LAN as...

Explanation

Jabbers manifest themselves on a LAN as collisions. A collision occurs when two or more devices on the network attempt to transmit data simultaneously, resulting in a disruption and loss of data. Jabbers are a type of malfunctioning device that continuously transmits data without adhering to the network's rules, causing collisions and degrading network performance.

Submit
71. (413)What data communication protocol ensures that the receiving station can distinguish information from garbage?

Explanation

High-Level Data Link Control (HDLC) is a data communication protocol that ensures the receiving station can distinguish information from garbage. HDLC uses a frame structure, which includes a start and end flag, to mark the beginning and end of a frame. This helps the receiving station identify and extract the correct data from the transmission, while ignoring any noise or garbage data. HDLC also provides error detection and correction mechanisms to ensure data integrity and reliability during transmission.

Submit
72. (420)What cable impairments can be detected by a time-domain reflectometer (TDR)?

Explanation

A time-domain reflectometer (TDR) is a device used to detect cable impairments by sending electrical pulses along a cable and measuring the reflections that occur when the pulses encounter any impedance changes. Kinks in a cable can cause impedance changes and result in reflections that can be detected by a TDR. Similarly, an open circuit or break in the cable will cause a reflection that can be detected. Corroded connectors can also cause impedance changes and reflections that a TDR can identify. Therefore, the correct answer is "Kinks, Opens, and Corroded connectors."

Submit
73. (420)What type of cable property changes can be detected by a time-domain reflectometer (TDR) to identify problems?

Explanation

A time-domain reflectometer (TDR) can detect changes in impedance to identify problems in cables. Impedance refers to the opposition that a cable presents to the flow of electrical current. Any changes in impedance can indicate issues such as breaks, bends, or faults in the cable. By measuring the reflected signals from the cable, a TDR can analyze the impedance changes and pinpoint the location of the problem. Therefore, impedance is the correct answer as it is the property that a TDR can detect and analyze to identify cable issues.

Submit
74. (422)What is the first LAN impairment error that occurs when bits are missing in one or more octets in a frame?

Explanation

Alignment errors occur when the bits in one or more octets of a frame are missing, causing the frame to be misaligned. This means that the frame is not properly synchronized with the receiving device's clock, leading to data corruption and potential loss of information. Alignment errors can occur due to various reasons such as electrical interference, faulty cabling, or incorrect configuration of network devices.

Submit
75. (413)What data communication protocol uses character control or 'handshaking' to link and represent information?

Explanation

Binary synchronous protocol is a data communication protocol that uses character control or 'handshaking' to link and represent information. This protocol ensures reliable and error-free transmission of data by using start and stop bits to mark the beginning and end of each character. It also includes error checking mechanisms and acknowledgments to ensure data integrity. Overall, binary synchronous protocol provides a robust and efficient way to transmit data over a communication link.

Submit
76. (421)What protocol analyzer test window reports errors that occur at the physical layer such as bad frame check sequence (FCS), short frames, and jabbers?

Explanation

The Media Access Control (MAC) node statistics in a protocol analyzer test window report errors that occur at the physical layer, such as bad frame check sequence (FCS), short frames, and jabbers. This feature allows the user to monitor and analyze the performance of the MAC layer, which is responsible for controlling access to the network medium. By examining the MAC node statistics, network administrators can identify and troubleshoot issues related to physical layer errors, ensuring the smooth operation of the network.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 14, 2009
    Quiz Created by
    Barrym07
Cancel
  • All
    All (76)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(401)What device is a combination transmitter/receiver in a single...
(403)The device that receives a digital signal and regenerates the...
(411)What topology has the stations connected in the form of a circle?
(411)What topology combines two or more different physical topologies...
(413)What data communication protocol is based on bits and the...
(417)What address uses a 128 bit addressing scheme?
(422)What LAN impairment error occurs when frames that are larger than...
(402)What device provides the physical, electrical, and electronic...
(403)A repeater with more than one output port is a...
(411)What topology consists of cable segments from each computer...
(414)Which TCP/IP Application layer protocol is a terminal emulation...
(414)Which TCP/IP Application layer protocol is an automated means of...
(415)What is a group of computers and associated devices that share a...
(422)What LAN impairment error occurs when network nodes in the same...
(404)What is a device that subdivides a network into smaller logical...
(404)What is the time a switch takes to figure out where to forward a...
(406)What is a router's strength?
(414)Which network protocol has DOD chosen as its standard to govern...
(416)What network model is a centralized model for data storage,...
(417)What address is a 32-bit number?
(407)Based on a specific input address, which Local Area Network (LAN)...
(408)When tributary units are grouped together they form...
(410)What topology defines the layout of network's devices and media?
(411)What topology consists of devices connected to a common, shared...
(417)What is the physical address of any device on the network?
(421)What test equipment provides a capability for digital network...
(422)What LAN impairment error occurs when an internet protocol (IP)...
(405)What network device is a combination of networking hardware and...
(406)What is the oldest routing protocol?
(416)What network model enables users to share resources, files, and...
(406)What is the routing protocol of internet backbones?
(413)What data communication protocol uses characters and symbols...
(414)Which TCP/IP Application layer protocol is used to send and...
(414)Which protocol is a simpler way to transfer files between...
(414)Which TCP/IP Application layer protocol is a simple protocol used...
(423)When using the trace route utility, round-trip delay is displayed...
(402)What layers of the open system interconnection (OSI) model do...
(414)Which TCP/IP Network layer protocol provides the service of...
(419)What is Not a recommendation for planning networks using variable...
(422)What is a good indication of how well any two nodes can access...
(425)What protocol allows products from different vendors to be...
(403)What can be used to extend the size of a network?
(408)What Synchronous Optical Network (SONET) devices are configured...
(414)Which TCP/IP Network layer protocol provides messaging that can...
(415)What type of network enables a group of two or more computer...
(405)What type of gateway might include remote access servers that...
(409)Because of its cost, Asynchronous Transfer Mode (ATM) is rarely...
(414)Which TCP/IP Application layer protocol is a utility that can...
(415)The interconnection of several networks of computer resources in...
(420)How does a cable scanner identify crossover and straight-through...
(401)What device operates at the physical layer of the Open System...
(421)What component of a protocol analyzer stores all frames based on...
(424)Which network management function obtains the utilization and...
(412)What is an advantage of a logical ring topology?
(424)Which network management element is a type of node connected to...
(412)What is NOT an advantage of a logical bus topology?
(421)What component of a protocol analyzer discards frames based on...
(425)What is the purpose of the community name that is used with...
(422)What LAN impairment error occurs when an internet protocol (IP)...
(420)How is the Optical Time-Domain Reflectometer (OTDR) used to...
(425) When the network management software is first installed, what...
(405)What type of gateway can restrict the kind of access local area...
(420)When using the cable scanner wire-map feature, what action is...
(408)What synchronous optical network (SONET) device aggregates or...
(408)An OC-12's electrical signal is the same as a Synchronous...
(418)How many subnet bits are required to support 85 subnets on a...
(421)What protocol analyzer test window provides information...
(424)Which network management function provides the capability to...
(414)Which TCP/IP Network layer protocol provides information about...
(423)Jabbers manifest themselves on a LAN as...
(413)What data communication protocol ensures that the receiving...
(420)What cable impairments can be detected by a time-domain...
(420)What type of cable property changes can be detected by a...
(422)What is the first LAN impairment error that occurs when bits are...
(413)What data communication protocol uses character control or...
(421)What protocol analyzer test window reports errors that occur at...
Alert!

Advertisement