Network III.

Quiz
•
Computers
•
University
•
Medium
Judit Horváth
Used 1+ times
FREE Resource
49 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
The Source Address field name from IPv4 is kept in IPv6.
The Version field from IPv4 is not kept in IPv6.
The Destination Address field is new in IPv6.
The Header Checksum field name from IPv4 is kept in IPv6.
The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
Answer explanation
The IPv6 packet header fields are as follows: Version, Traffic Class, Flow Label, Payload Length, Next Header, Hop Limit, Source Address, and Destination Address. The IPv4 packet header fields include the following: Version, Differentiated Services, Time-to-Live, Protocol, Source IP Address, and Destination IP Address. Both versions have a 4-bit Version field. Both versions have a Source (IP) Address field. IPv4 addresses are 32 bits; IPv6 addresses are 128 bits. The Time-to-Live or TTL field in IPv4 is now called Hop Limit in IPv6, but this field serves the same purpose in both versions. The value in this 8-bit field decrements each time a packet passes through any router. When this value is 0, the packet is discarded and is not forwarded to any other router.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed
The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?
255.255.255.192
255.255.255.252
255.255.255.240
255.255.255.0
255.255.255.224
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What characteristic describes identity theft?
the use of stolen credentials to access private data
software on a router that filters traffic based on IP addresses or applications
software that identifies fast-spreading threats
a tunneling protocol that provides remote users with secure access into the network of an organization
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.240
255.255.255.0
255.255.255.248
255.255.255.224
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are three commonly followed standards for constructing and installing cabling? (Choose three.)
cost per meter (foot)
cable lengths
connector color
pinouts
connector types
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. What is wrong with the displayed termination?
The woven copper braid should not have been removed.
The wrong type of connector is being used.
The untwisted length of each wire is too long.
The wires are too thick for the connector that is used.
Answer explanation
When a cable to an RJ-45 connector is terminated, it is important to ensure that the untwisted wires are not too long and that the flexible plastic sheath surrounding the wires is crimped down and not the bare wires. None of the colored wires should be visible from the bottom of the jack.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?
IMAP
FTP
SSH
Telnet
Create a free account and access millions of resources
Similar Resources on Wayground
51 questions
4.3 Instalación y administración de servicios

Quiz
•
University
50 questions
System & Network Administration

Quiz
•
University
50 questions
Routing & OSPF

Quiz
•
University
53 questions
Azure Networking and Security Quiz

Quiz
•
University
50 questions
Uvod u mrežne protokole

Quiz
•
University
47 questions
Modules 1 – 4: Switching Concepts, VLANs, and InterVLAN

Quiz
•
University
47 questions
Iceberg_TeamMode_Post

Quiz
•
University
50 questions
AKT test (251-300) Жаңа вариант

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University