Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
23 views4 pages

NET 100 Midterm Part 2

The document is a midterm exam covering various networking concepts, including the OSI model, protocols, and cabling types. It includes multiple-choice questions, true/false statements, and short answer questions about network layers, data transmission, and troubleshooting. Key topics include TCP vs. UDP, DNS, routing protocols, and the physical and logical topology of networks.

Uploaded by

albertjoyb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views4 pages

NET 100 Midterm Part 2

The document is a midterm exam covering various networking concepts, including the OSI model, protocols, and cabling types. It includes multiple-choice questions, true/false statements, and short answer questions about network layers, data transmission, and troubleshooting. Key topics include TCP vs. UDP, DNS, routing protocols, and the physical and logical topology of networks.

Uploaded by

albertjoyb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

MIDTERM PART 2

1. The Network Layer utilizes what name for its protocol data unit (PDU)?
a. packet
b. data
c. bit
d. frame

2. What statement accurately reflects what occurs when a message is too large to transport on a
network?
a. The message is discarded and must be sent again.
b. The message is sent anyway, and is received by the destination as garbage data.
c. The message is divided into smaller messages called segments (for TCP) or datagrams
(for UDP).
d. An ICMP error is generated, and the application must reformat the data for
transmission.

3. At what layer of the OSI model does a router normally operate?


a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5

4. Explain the differences between a physical topology and a logical topology.


Physical Topology is to describe how computers hardware and other devices fit together with
cables or wirelessly to form the physical network.
Logical topology applies to software and describes how access to the network is controlled.

5. Describe how the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
differ from each other and provide examples of where each might be used.

TCP is when the data transmitted are confirmed after it been received before sending more data.
Ex. Browser, Email
And UPD is when data is sent without any feedback or recognition.
Ex. Video streaming

6. Fiber-optic cable comes in two types: single-mode fiber (SMF) or multispectral fiber (MSF).
a. True
b. False
7. Where is a demarc located in relation to the structured cabling of an enterprise environment?
a. in the Main Distribution Frame (MDF)
b. at the Intermediate Distribution Frame (IDF)
c. in the work area
d. between the MDF and the IDF

8. When creating network diagrams, what icon description typically represents a router?
a. An icon that has a hockey-puck shape with two arrows pointing inward and two
arrows pointing outward.
b. An icon that resembles a brick wall.
c. An icon that is rectangular in shape, with squiggly lines on the front.
d. An icon that is rectangular, which contains four arrows pointing in opposite
directions.

9. Why should you not leave more than 1 inch of exposed cable before a twisted-pair
termination?
a. Exposing more cable than necessary can cause corrosion of the copper wire.
b. The exposure of the cable can cause transmission interference between wires.
c. The cable will lose its conductive properties.
d. The termination will fail over time due to oxidation.

10. What are the three different types of cabling recognized by TIA/EIA as acceptable for
horizontal wiring?

UTP, STP, or fiber optic cable.

11. At the Data Link layer of the OSI, what is used to find and communicate with a particular
application running on a host?
a. IP addresses
b. port numbers
c. domain names
d. MAC addresses

12. What command can you utilize to display TCP/IP configuration information for each
network adapter installed?
a. ipconfig /show
b. ipconfig /list
c. ipconfig /all
d. ipconfig /full
13. You are troubleshooting a network issue on a client computer and discover that the network
card has an IP address of 169.254.196.200. What does this mean?
a. The computer has been assigned a routed public IP address.
b. The network card has been erroneously assigned a loopback address.
c. The computer is configured to use DHCP, but was unable to lease an address.
d. The network card is set up for multicast communication.

14. Which of the following are ranges of IP addresses recommended for use in private networks?
(select all that apply)
a. 10.0.0.0 through 10.255.255.255
b. 172.16.0.0 through 172.31.255.255
c. 192.168.0.0 through 192.168.255.255
d. 127.0.0.0 through 127.255.255.255

15. What is DNS, and how is it used?


DNS is a database where all domain names are located and translated into Internet Protocol (IP)
addresses. The domain name entered by the end user are used to locate a website to the IP
address that a computer uses to locate that website.

16. Open Shortest Path First (OSPF) is an interior gateway protocol that uses a link-state
algorithm.
a. True
b. False

17. Which of the following are tasks handled by a router? (select all that apply)
a. A router forwards broadcasts over the network.
b. A router can reroute traffic if the path of first choice is down but a second path is
available.
c. A router can interpret Layer 3 and often Layer 4 addressing.
d. A router can connect dissimilar networks.

18. What IP connection-oriented protocol guarantees delivery of data?


a. UDP
b. ICMP
c. TCP
d. ARP
19. Routing protocols that enable routers to communicate beyond neighboring routers, allowing
each router to independently map the network, are known as which type of protocols?
a. interior gateway protocols
b. border gateway protocols
c. distance vector protocols
d. link-state protocols

20. How are distance vector routing paths determined?


The best routing paths are determined by using data from the routing table.

21. Latency on data networks are not based on a calculation of a packet's round trip time (RTT).
a. True
b. False

22. An open circuit is one where needed connections are missing, such as when a wire breaks.
a. True
b. False

23. What kind of tool can you use to measure voltage on a cable length?
a. continuity tester
b. multimeter
c. time domain reflectometer
d. light meter

24. Signals that can travel in two directions on a medium are referred to as what type of signal?
a. full duplex
b. duplex
c. half-duplex
d. simplex

25. List all seven layers of the OSI model.


Layer 1 – Physical Layer
Layer 2- Datalink Layer
Layer 3 – Networking Layer
Layer 4- Transport Layer
Layer 5- Session Layer
Layer 6 – Presentation Layer
Layer 7 – Application Layer

You might also like