Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CSIS 330 Final Exam_Answer (Versions 4), Business Data Communication Systems – CSIS 330, Liberty University, Verified correct answers

Beoordeling
-
Verkocht
-
Pagina's
18
Geüpload op
20-09-2020
Geschreven in
2020/2021

CSIS 330 Final Exam_Answer (Versions 4), Business Data Communication Systems – CSIS 330, Liberty University, Verified correct answers CSIS 330 Final Exam, Liberty University Question 1 1 out of 1 points Which protocol enables reliable communication between processes running on separate hosts and has reliable, acknowledged transmissions. Question 2 According to the textbook, data networks were initially used by businesses to internally record and manage all of the following except: Question 3 1 out of 1 points ______________ are pages that are easy to update and edit and give anyone a means to communicate their thoughts to a global audience without technical knowledge of web design. They are like an individual, personal journal. Question 4 1 out of 1 points A ______________________________ is a network infrastructure that provides access to users and end devices in a small geographical area. Question 5 1 out of 1 points All computers connected to a network that participate directly in network communication are classified as servers. Question 6 1 out of 1 points __________________________ is defined as “the act of working with another or others on a joint project.” Question 7 1 out of 1 points A cable connection provides a high-bandwidth, always on connection to the Internet. Question 8 1 out of 1 points In which of the following connections is the Internet data signal carried on the same coaxial cable that delivers cable television? Question 9 1 out of 1 points A(n) ______________________ connects end devices using network cables. Question 10 1 out of 1 points What command is used to display information about the device? Question 11 1 out of 1 points According to the textbook, when a banner is used on an IOS device, it should always welcome someone to the device as its first statement. Question 12 1 out of 1 points Which mode is used to configure one of the physical or virtual lines? Question 13 1 out of 1 points According to the textbook, while all devices come with a default IOS and feature set, it is possible to upgrade the IOS version or feature set to obtain additional capabilities. Question 14 1 out of 1 points IOS commands are case sensitive. Question 15 1 out of 1 points To save configuration changes to the startup-configuration file, what command is used? Question 16 1 out of 1 points Which of the following is not a benefit to using a layered model to describe network operations? Question 18 1 out of 1 points ________________________ is the physical address for the network interface of either the next-hop router or the network interface of the destination device. Question 19 1 out of 1 points _______________________ is the term used to refer to the PDU at the Internet layer of the TCP/IP model. Question 20 1 out of 1 points Which of the following is not one of the primary elements in communication listed in the textbook? Question 22 1 out of 1 points The ___________ model is the most widely known internetwork reference model. Question 23 1 out of 1 points What is the decimal equivalent of the binary number ? Question 24 1 out of 1 points What is the binary equivalent of the hexadecimal number AA? Question 25 1 out of 1 points What is the decimal equivalent of the binary number ? Question 26 1 out of 1 points What is the binary equivalent of the decimal number 8? Question 27 1 out of 1 points What is the hexadecimal equivalent of the binary number ? Question 28 1 out of 1 points What is the binary equivalent of the hexadecimal number FF? Question 29 1 out of 1 points Which of the following is not governed by one of the Wireless standards (IEEE 802.11, 802.15, or 802.16)? Question 31 1 out of 1 points The ____________________________ topology provides high availability, but requires that every end system be interconnected to every other system. Question 32 1 out of 1 points The _____________________________ layer in the OSI model is responsible for the exchange of frames between nodes over a physical network media. It also allows the upper layers to access the media and controls how data is placed and received on the media. Question 33 1 out of 1 points A ______________________ is used to facilitate access to a medium when the controlled access method is used. Question 34 1 out of 1 points In which type of industry is fiber optic being used for backbone cabling applications and interconnecting infrastructure devices? Question 36 1 out of 1 points When using copper cable, the signals are patterns of _____________. Question 37 1 out of 1 points ______________ is a physical port on a Layer 3 switch configured to act as a router port. Question 38 1 out of 1 points Which address is used as a destination address on a broadcast Ethernet frame? Question 39 1 out of 1 points Which of the following is not one of the primary fields in an Ethernet frame? Question 40 1 out of 1 points ________________ allows a switch to deliver power to a device, such as IP phones and some wireless access points, over the existing Ethernet cabling. Question 41 1 out of 1 points In ___________________ buffering, frames are stored in queues that are linked to specific incoming and outgoing ports. Question 42 1 out of 1 points If no device responds to an ARP request, the packet is dropped because a frame cannot be created. Question 43 1 out of 1 points Cisco routers use ROM to store which of the following? Question 44 1 out of 1 points An end device with a configured IP address is referred to as a ____________. Question 45 1 out of 1 points The Internet is largely based on _____, which is still the most widely used network layer protocol. Question 46 1 out of 1 points Which of the following is not a component of a router? Question 48 1 out of 1 points Both routing tables of hosts and routers identify the destination network, the metric associated with the destination network, and the gateway to get to the destination network. Question 49 1 out of 1 points The local routing table of a host typically contains a route to the loopback interface (127.0.0.1). This address is known as a ______________________. Question 51 1 out of 1 points Which port is assigned to DNS? Question 52 1 out of 1 points Which of the following is not a common transport layer protocol? Question 53 1 out of 1 points A ______________________ protocol is one that negotiates and establishes a permanent connection between source and destination devices prior to forwarding any traffic. Question 54 1 out of 1 points Each TCP segment has ___________ bytes of overhead in the header encapsulating the application layer data; UDP has _____ bytes of overhead. Question 55 1 out of 1 points UDP is known as __________________ delivery because there is no acknowledgement that the data is received at the destination. Question 56 1 out of 1 points What does UDP do when receiving messages that are more than one datagram in length? Question 57 1 out of 1 points Which of the following is not a characteristic of TCP? Question 58 1 out of 1 points The _______________ assigns port numbers. Selected Answer: IANA Question 59 1 out of 1 points The IPv4 __________ address is a special address for each network that allows communication to all the hosts in that network. Question 60 1 out of 1 points The 1s in the subnet mask represent the ___________ portion, and the 0s represent the ______ portion. Question 61 1 out of 1 points The address block for legacy Class B networks included the range Question 62 1 out of 1 points Addresses included in the address pool for a DHCP server should include static addresses that are used by other devices. Question 63 1 out of 1 points The double colon can only be used once within an IPv6 address. Question 64 1 out of 1 points Which of the following is not a type of broadcast address? Question 65 1 out of 1 points The legacy Class B address block was designed to support moderate- to large-size networks with up to 65,000 host addresses and used a ___________ prefix. Question 66 1 out of 1 points Which type of communication is occurring when a packet is sent from one host to another individual host? Question 67 1 out of 1 points You are given an IPv4 network address of 192.168.10.0/24 by your ISP. You need to subnet this network. You know that the subnet mask will be 255.255.255.252. Therefore, how many bits have you borrowed from the host portion of the network address to achieve this subnet mask? Question 69 1 out of 1 points All devices attached to the same network will have an IPv4 host address for that network and a common ____________________. Question 70 1 out of 1 points Which of the following subnet masks is used to represent a prefix mask of / 26 Question 71 1 out of 1 points In creating subnets for IPv6, conversion to binary is not required. Question 73 1 out of 1 points You are given an IPv4 network address of 192.168.10.0/24 by your ISP. You need to subnet this network. You know that you need at least 6 subnets. What will be the address of your last usable host in your first subnet (i.e. subnet [0])? Question 75 1 out of 1 points Which of the following message types is a client request for data? Question 76 1 out of 1 points Which port(s) is(are) assigned to HTTP? Question 77 1 out of 1 points In a __________________ network, two or more computers are connected through a network and can share resources without having a dedicated server. Question 78 1 out of 1 points What is the IPv6 DHCP message that corresponds to the IPv4 DHCPACK message? Question 79 1 out of 1 points Which protocol is used to assign an IP address, subnet mask, default gateway and DNS address to a host? Question 80 1 out of 1 points Which port(s) is(are) assigned to FTP? Question 81 1 out of 1 points Which port(s) is(are) assigned to Telnet? Question 82 1 out of 1 points Which of the following are functions of the Presentation Layer in the OSI model? Question 83 1 out of 1 points What type of attack is the unauthorized manipulation of data, system access, or user privileges? Question 84 1 out of 1 points Making illegal online purchases is what type of security threat? Question 85 1 out of 1 points According to the textbook, real-time applications require more planning and dedicated services (relative to other types of data) to ensure priority delivery of voice and video traffic. Question 86 1 out of 1 points Which type of security threat involves breaking into a computer to destroy or alter data records? Question 87 1 out of 1 points A(n) __________ firewall is a firewall that is built into a dedicated hardware device known as a security appliance. Question 88 1 out of 1 points A(n) ______ firewall consists of a firewall application that runs on a network operating system such as UNIX or Windows. Question 89 1 out of 1 points Which of the following firewall techniques blocks unsolicited packets unless permitted specifically? Question 90 1 out of 1 points Which of the following is not a factor that needs to be considered when designing a small network? Question 91 1 out of 1 points Which type of security threat involves breaking into a computer to obtain confidential information? Question 92 1 out of 1 points Which type of physical threat involves physical damage to servers, routers, switches, cabling, and workstations? Question 93 1 out of 1 points In IP telephone, a router performs voice-to-IP conversions. Question 94 1 out of 1 points What type of network vulnerability is involved when JavaScript is turned on in web browsers? Question 96 1 out of 1 points Which of the following are steps that should be taken to secure devices on which a new operating system has been installed? Question 97 1 out of 1 points Which type of security threat involves preventing legitimate users from accessing services to which they should be entitled? Question 98 1 out of 1 points What name is given to malicious software that is attached to another program to execute a particular unwanted function on a workstation?

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CSIS 330 Final Exam, Liberty University
Question 1
1 out of 1 points

Which protocol enables reliable communication between processes
running on separate hosts and has reliable, acknowledged transmissions.
Selected Answer:
TCP

Question 2
According to the textbook, data networks were initially used by
businesses to internally record and manage all of the following except:
Selected Answer:
All of the above were initial uses of data networks
Question 3
1 out of 1 points

______________ are pages that are easy to update and edit and give
anyone a means to communicate their thoughts to a global audience
without technical knowledge of web design. They are like an individual,
personal journal.
Selected Answer:
Weblogs
Question 4
1 out of 1 points

A ______________________________ is a network infrastructure that
provides access to users and end devices in a small geographical area.
Selected Answer:
LAN
Question 5
1 out of 1 points

,All computers connected to a network that participate directly in
network communication are classified as servers.
Selected Answer:
False
Question 6
1 out of 1 points

__________________________ is defined as “the act of working with
another or others on a joint project.”
Selected Answer:
Collaboration
Question 7
1 out of 1 points

A cable connection provides a high-bandwidth, always on connection to
the Internet.
Selected Answer:
True
Question 8
1 out of 1 points

In which of the following connections is the Internet data signal carried
on the same coaxial cable that delivers cable television?
Selected Answer:
Cable
Question 9
1 out of 1 points

A(n) ______________________ connects end devices using network
cables.
Selected Answer:
Switch
Question 10
1 out of 1 points

, What command is used to display information about the device?
Selected Answer:
Switch# show running-config
Question 11
1 out of 1 points

According to the textbook, when a banner is used on an IOS device, it
should always welcome someone to the device as its first statement.
Selected Answer:
False
Question 12
1 out of 1 points

Which mode is used to configure one of the physical or virtual lines?
Selected Answer:
Line mode
Question 13
1 out of 1 points

According to the textbook, while all devices come with a default IOS
and feature set, it is possible to upgrade the IOS version or feature set to
obtain additional capabilities.
Selected Answer:
True
Question 14
1 out of 1 points

IOS commands are case sensitive.
Selected Answer:
False
Question 15
1 out of 1 points

To save configuration changes to the startup-configuration file, what
command is used?

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
20 september 2020
Aantal pagina's
18
Geschreven in
2020/2021
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$20.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
bettergrades NIT,IIM
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
237
Lid sinds
8 jaar
Aantal volgers
203
Documenten
1432
Laatst verkocht
2 jaar geleden

5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen