Liberty CSIS 330 Final Exam Answers
- Intermediary devices direct the path of the data as well as change the data content.
- Which of the following is a type of media used to interconnect devices and to provide the pathway over which data can be transmitted?
- is an emerging trend for home networking that uses existing electrical wiring to connect devices and includes the concept of “no new wires”.
- Which of the following is a network security component for a home or small office network?
- involves increased priority for production control or business transaction data.
- Which of the following type of networks is often set up by individuals who work from a home or remote office and need to connect to a corporate network or other centralized resource?
- According to the textbook, the pace at which the development of exciting new converged network applications is occurring can be attributed to the rapid growth and expansion of
- One way to accomplish the required QoS by managing the delay and packet loss parameters on a network can be accomplished through
- What key is used to return to the EXEC prompt at the –More—prompt?
- To exit interface configuration mode and return to privileged EXEC mode, what command(s) should be entered at the prompt?
- According to the textbook, while all devices come with a default IOS and feature set, it is possible to upgrade the IOS version or feature set to obtain additional capabilities.
- What command must be entered to configure an IP address of 192.168.10.3 and subnet mask of 255.255.255.0 for a switch?
- What command is used to access the privileged EXEC mode from the user EXEC mode?
- A(n) _______________ secures outgoing traffic and restricts incoming traffic
- The portion of the OS that interfaces with the applications and user is known as the
- Which of the following prompts indicates that the user is in Privileged EXEC mode?
- is the physical address for the network interface of either the next-hop router or the network interface of the destination device.
- When a host sends messages using a one-to-many delivery option, it is known as a
- The process of placing one message format inside another message format is called
- The ___________ model is the most widely known internetwork reference model.
- A _________________________ consists of the media that provide the pathway over which a message travels from source to destination.
- is the physical address of the device that is sending a packet.
- What is the decimal equivalent of the binary number 01010101?
- What is the hexadecimal equivalent of the decimal number 248?
- What is the hexadecimal equivalent of the binary number 00011111?
- What is the binary equivalent of the decimal number 93?
- What is the decimal equivalent of the hexadecimal number F1?
- What is the hexadecimal equivalent of the binary number 11000111?
- is the capacity of a medium to carry data.
- The color coding for UTP cabling is:
- The __________________ layer produces the representation and grouping of bits as voltages, radio frequencies, or light pulses.
- The _______ layer accepts a complete frame from the data link layer and encodes it as a series of signals that are transmitted onto the local media.
- What are the contents of the data field in a frame?
- Which of the following is not a characteristic of Cat6 cable?
- is the amount of time, including delays, for data to travel from one given point to another.
- Which of the following is not a characteristic of contention-based access?
- In 1998, the IEEE 802.3ac standard extended the maximum allowable frame size to be 1522 bytes in order to accommodate a technology called
- The MAC address on a host does not change.
- In ___________________ buffering, frames are stored in queues that are linked to specific incoming and outgoing ports.
- is a logical interface on a Cisco device associated with a bundle of routed ports.
- is a physical port on a Layer 3 switch configured to act as a router port.
- The ______________ sublayer of the data link layer is responsible for the placement of frames on the media and the removal of frames from the media.
- Cisco routers use ROM to store which of the following?
- Which of the following is not a true statement regarding an IPv4 Header in the network layer of the OSI model?
- The version field in an IPv4 header contains a 4-bit binary value identifying the IP packet version. For IPv4 packets, this field is always set to
- Which of the following statements are major issues with IPv4?
- Which of the following is not displayed by the IOS show version command on a router?
- NVRAM is used by Cisco IOS as permanent storage for which of the following?
- The default route is only used when a host must forward packets to a remote network.
- Which field in a router’s routing table identifies the IP address of the next router to forward a packet?
- Which of the following is true of the TCP three-way handshake?
- Without segmentation, only one application would be able to receive data.
- UDP is known as __________________ delivery because there is no acknowledgement that the data is received at the destination.
- Which of the following types of ports use numbers 0 to 1023?
- What is the advantage that UDP has over TCP?
- The __________ represents the starting value for the bytes for a session that are transmitted to the receiving application. As data are transmitted during the session, this number is incremented by the number of bytes that have been transmitted.
- Starting with a sequence number of 2000, if 5 segments of 1000 bytes each were received, an ACK number of ________ would be returned to the source.
- Which port is assigned to HTTPS?
- ISPs that are large national or international and are directly connected to the Internet backbone are members of what Tier?
- The address block for legacy Class A networks included the range
- Unlike IPv4, in IPv6, the all-0s address can be assigned to a device. However, the all-0s address is reserved as a Subnet-Router anycast address and should be assigned only to routers.
- IPv6 address are ______ bits in length and written as a string of hexadecimal values. 1 out of 1 points
- Like IPv4, IPv6 uses both the prefix length and the dotted-decimal subnet mask notation for indicate the network portion of an IPv6 address.
- What type of IPv6 addresses are in the range FE80::/10?
- The address of the last usable host in a network is always 1 less than the network address.
- Typically, it is the global unicast address of the router and not the link-local address that is used as the default gateway for other devices on the link.
- In subnetting, for each bit borrowed from the host portion of a network address, the number of subnetworks available
- How many valid host addresses are created when 4 host bits are borrowed from the 10.20.20.0/24 network?
- The terms subnet and network are often used interchangeably.
- Using an IPv4 network address of 192.168.2.0/26, what is the broadcast address in the first subnet (i.e. subnet[0])?
- Traffic cannot be forwarded between subnets without the use of a router.
- How many usable hosts per sub-network will you have using a /17 address?
- Using an IPv4 network address of 192.168.2.0/26, what is the subnetwork address in the second subnet (i.e. subnet[1])?
- Using an IPv4 network address of 192.168.2.0/26, how many usable hosts per subnet are possible?
- What is the IPv6 DHCP message that corresponds to the IPv4 DHCPOFFER message?
- What TCP/IP layer supports the exchange of data between programs running on the source and destination hosts?
- After a client has a leased IPv4 address from a DHCP server, it can be renewed prior to the lease expiration through another DHCPDISCOVER message.
- The automatic assignment of IP addresses, subnet masks, gateways, and other IP networking parameters is called _________________ addressing.
- Which protocol resolves Internet names to IP addresses?
- Which DHCP message is a reply with an offer of a lease to the client?
- DHCP enables clients on a network to do which of the following?
- Which of the following is false with respect to FTP?
- Which of the following is an example of a strong password?
- Which feature of network security determines which resources a user can access and which operations the user is allowed to perform?
- A(n) __________ firewall is a firewall that is built into a dedicated hardware device known as a security appliance.
- Intruders who gain access by modifying software or exploiting software vulnerabilities are often called
- A firewall is one of the most effective security tools available for protecting internal network users from external threats.
- Which of the following firewall techniques prevents or allows access to websites based on specific URLs or keywords?
- attacks are the disabling or corruption of networks, systems, or services.
- Which of the following elements are not considered when scaling a network?
- A DDoS attack differs from a regular DoS attack in that the victim is attacked in a coordinated manner from several compromised systems known as
- How is “extended ping” entered on a Cisco router?
- What type of network vulnerability is involved with the lack of a disaster recovery plan?
- Which of the following is not a type of access attack?
- VoIP uses voice-enabled routers that convert analog voice from traditional telephone signals into IP packets.
- Which of the following protocols support delay-sensitive delivery to support streaming media?
- An attacker runs a ping sweep against a network. What type of attack is this?
- Which feature of network security requires that users and administrators must prove that they are who they say they are?
- firewalls reside on host computers and are not designed for LAN implementations.
- Making illegal online purchases is what type of security threat?
Struggling with paper writing? Look no further, as you have found the ideal paper writing company! We are a reputable essay writing service that offers high-quality papers at affordable prices. On our user-friendly website, you can request a wide range of assignments. Rest assured that our work is entirely original. Each essay is crafted from scratch, tailored to meet the precise requirements of your assignment. We guarantee that it will successfully pass any plagiarism check.
Need Help with Your Essay? Our Experts Are Ready to Assist
Tell us about your assignment and we will find the best writer for your paper
Write My Essay For MeGet Your Assignments Completed by Expert Writers. Hire Essay Helpers for Any Task
Order essays, term papers, research papers, reaction paper, research proposal, capstone project, discussion, projects, case study, speech/presentation, article, article critique, coursework, book report/review, movie review, annotated bibliography, or another assignment without having to worry about its originality – we offer 100% original content written completely from scratch


