Presentation is loading. Please wait.

Presentation is loading. Please wait.

2 nd Session M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 1 Quiz Chapter 7 LAN Communications Protocols.

Similar presentations


Presentation on theme: "2 nd Session M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 1 Quiz Chapter 7 LAN Communications Protocols."— Presentation transcript:

1 2 nd Session M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 1 Quiz Chapter 7 LAN Communications Protocols

2 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 2 In terms of IP addressing, what is the purpose of a subnet mask? A)Allows for IP routing B)Breaks the IP address into a network segment address and node address C)Increases the number of stations that can be on the network D)All of the above E)None of these Number#1

3 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 3 What is the meaning of an IP address where the node (host) section is all 0’s? A) Broadcast address B) Multi-cast address C) Network segment address D) Nothing, it’s a normal node address E) None of these Number#2

4 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 4 How are MAC addresses resolved from IP addresses? A)ARP B)DHCP C)RARP D)The MAC address is part of the IP address E)MAC addresses cannot be resolved from IP addresses Number#3

5 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 5 What functionality does UDP bring to IP? A)Nothing, UDP is an optional protocol B)UDP provides a connection oriented protocol for use over IP C)UDP provides port numbers for connectionless communication D)UDP provides requisite error checking and flow control E)An alternative to RIP Number#4

6 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 6 Which protocol resolves TCP/IP domain host names (i.e. to IP addresses? A) ARP B) BOOTP C) DHCP D) DNS E) APAR Number#5

7 2 nd Session M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 7 Quiz Chapter 8 Advanced TCP/IP Networks Design

8 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 8 Classful address are broken apart on _________ boundaries. A) Bit B) Word C) Octet D) Stream E) None of these Number#1

9 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 9 Class C network addresses are sometimes referred to as a _________ addresses A) /8 B) /16 C) /24 D) /32 E) none of these Number#2

10 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 10 The division of an IP address into a network number and host number is accomplished through the use of a A) Node ID B) Router table C) Gateway protocol D) Subnet mask E) Protocol Bridge Number#3

11 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 11 A host ID of all ones is called the _________ address A) Multicast B) Broadcast C) Simulcast D) Gateway E) None of these Number#4

12 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 12 BCCCABCDCC A routing protocol that is able to accommodate variable length subnet masks is A) OSPF B) RIP C) IGRP D) All of these E) None of these Number#5

13 2 nd Session M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 13 Quiz Chapter 9 LAN OS & Remote Access

14 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 14 Which of the following are not steps in the authentication process? A)Identification B)Authorization C)Proof of Identification D)All of these are steps in the authentication process E)none of these Number#1

15 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 15 Which of the following NOSs offers powerful capabilities, is the most expensive, and is complicated to install? A) DOS-based LAN B) Client/server NOS C) Peer-to-peer NOS D) client-to-client NOS E) all of these Number#2

16 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 16 Which of the following is not an advantage of client/server network operating systems? A) provide fast service B) offer reliable performance C) are easy to install and configure D) offer good security capabilities E) all of these are advantages Number#3

17 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 17 Which of the following remote LAN access categories is often referred to as SOHO? A) technical support B) telecommuting C) mobile computing D) corporate computing E) none of these Number#4

18 Applied Data Communications, Goldman M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 18 Which of the following security related procedures for remote access computing would ensure that an intercepted password would not be usable? A) password assignment and management B) intrusion responses C) dial-back systems D) encryption E) none of these Number#5


Download ppt "2 nd Session M agister K omputer Post-Graduated University of Budi Luhur Ciledug - Indonesia 1 Quiz Chapter 7 LAN Communications Protocols."

Similar presentations


Ads by Google