Search the site
Menu
Networking Basics Course Final
Exam Answers
Jul 16, 2022 | Last Updated: Dec 2, 2023 |
Networking Basics | 3 Comments
Networking Basics Course Final
Exam Answers
1. Which statement describes the use of
powerline networking technology?
A device connects to an existing home
LAN using an adapter and an existing
electrical outlet.
New “smart” electrical cabling is used to
extend an existing home LAN.
Wireless access points use powerline
adapters to distribute data through the home
LAN.
A home LAN is installed without the use of
physical cabling.
Explanation: Powerline networking adds the
ability to connect a device to the network
using an adapter wherever there is an
electrical outlet. The network uses existing
electrical wiring to send data. It is not a
replacement for physical cabling, but it can
add functionality in places where wireless
access points cannot be used or cannot
reach devices.
2. Which wireless RF band do IEEE 802.11b/g
devices use?
60 GHz
2.4 GHz
900 MHz
5 GHz
Explanation: 900 MHz is an FCC wireless
technology that was used before
development of the 802.11 standards. 900
MHz devices have a larger coverage range
than the higher frequencies have and do not
require line of sight between devices.
802.11b/g/n/ad devices all operate at 2.4
GHz. 802.11a/n/ac/ad devices operate at 5
GHz, and 802.11ad devices operate at 60
GHz.
3. Refer to the exhibit. Which term correctly
identifies the device type that is included in
the area B?
Networking Basics Course Final Exam 3
end
transfer
source
intermediary
Explanation: Routers and switches are
intermediary devices. End devices consist of
PCs, laptops, and servers. They also include
printers, VoIP phones, security cameras, and
hand-held devices.
4. What is a disadvantage of deploying a peer-
to-peer network model?
lack of centralized administration
high cost
difficulty of setup
high degree of complexity
Explanation: The simplest peer-to-peer
network consists of two computers that are
directly connected to each other through the
use of a wired or wireless connection. The
primary disadvantages of a peer-to-peer
network are its lack of central administration,
minimal security, and its lack of scalability.
5. Which three steps must be completed to
manually connect an Android or IOS device to
a secured wireless network? (Choose three.)
Change the MAC address.
Set the IP address.
Enter the network SSID.
Activate the Bluetooth antenna.
Input the authentication password.
Choose the correct security type.
Explanation: In order to connect an Android
or IOS device to a Wi-Fi network manually,
perform these steps:
Enter the network SSID of the wireless
network.
Choose the security type used by the
wireless network.
Input the password to authenticate
successfully.
6. A company is contemplating whether to use
a client/server or a peer-to-peer network. What
are three characteristics of a peer-to-peer
network? (Choose three.)
better security
scalable
easy to create
better device performance when acting as
both client and server
less cost to implement
lacks centralized administration
Explanation: Because network devices and
dedicated servers are not required, peer-to-
peer networks are easy to create, less
complex, and have lower costs. Peer-to-peer
networks also have no centralized
administration. They are less secure, not
scalable, and those devices acting as both
client and server may perform slower.
7. Which type of device provides an Internet
connection through the use of a phone jack?
satellite modem
Wi-Fi AP
DSL modem
cable modem
Explanation: SL technology uses the existing
telephone network. For that reason, a DSL
modem commonly has an RJ-11 phone
8. A traveling sales representative uses a cell
phone to interact with the home office and
customers, track samples, make sales calls,
log mileage, and upload/download data while
at a hotel. Which internet connectivity method
would be a preferred method to use on the
mobile device due to the low cost?
cellular
Wi-Fi
DSL
cable
Explanation: Mobile devices typically use
either the cellular network or a Wi-Fi network
to connect to the internet. The Wi-Fi
connection is preferred because it uses less
battery power and is free in many places.
9. A user is configuring a wireless access
point and wants to prevent any neighbors from
discovering the network. What action does the
user need to take?
Configure DMZ settings.
Disable SSID broadcast.
Configure a DNS server.
Enable WPA encryption.
Explanation: Disabling SSID broadcast
prevents the access point from announcing
the name of the network. Enabling WPA
encryption, configuring DMZ settings, and
configuring a DNS server will accomplish
different tasks, but the name of the network
will still be announced.
10. A tourist is traveling through the
countryside and needs to connect to the
internet from a laptop. However, the laptop
only has Wi-Fi and Ethernet connections. The
tourist has a smartphone with 3G/4G
connectivity. What can the tourist do to allow
the laptop to connect to the internet?
Enable tethering and create a hotspot.
Use the smartphone to access web pages
and then pass the web pages to the laptop.
Use the smartphone to access the internet
through a satellite connection and then share
that connection with the laptop.
Use an Ethernet cable to connect the
smartphone to the laptop.
Explanation: Many cell phones have the
ability to connect to other devices through a
feature called tethering. The connection can
be made using Wi-Fi, Bluetooth, or a USB
cable. Once a device is connected, it is able
to use the cellular connection of the phone to
access the internet. When a cellular phone
allows Wi-Fi devices to connect and use the
mobile data network, this is called a hotspot.
11. What layer is responsible for routing
messages through an internetwork in the
TCP/IP model?
network access
session
transport
internet
Explanation: The TCP/IP model consists of
four layers: application, transport, internet,
and network access. Of these four layers, it is
the internet layer that is responsible for
routing messages. The session layer is not
part of the TCP/IP model but is rather part of
the OSI model.
12. What will a Cisco LAN switch do if it
receives an incoming frame and the
destination MAC address is not listed in the
MAC address table?
Send the frame to the default gateway
address.
Drop the frame.
Forward the frame out all ports except the
port where the frame is received.
Use ARP to resolve the port that is related to
the frame.
Explanation: A LAN switch populates the
MAC address table based on source MAC
addresses. When a switch receives an
incoming frame with a destination MAC
address that is not listed in the MAC address
table, the switch forwards the frame out all
ports except for the ingress port of the frame.
When the destination device responds, the
switch adds the source MAC address and the
port on which it was received to the MAC
address table.
13. What process involves placing one
message format inside of another message
format?
flow control
encapsulation
encoding
segmentation
Explanation: When a message is placed
inside of another message, this is known as
encapsulation. On networks, encapsulation
takes place when one protocol data unit is
carried inside of the data field of the next
lower protocol data unit.
14. A cable installation company is trying to
convince a customer to use fiber-optic cabling
instead of copper cables for a particular job.
What is one advantage of using fiber-optic
cabling compared to copper cabling?
The installation skills required for fiber-optic
cabling are lower.
Fiber-optic cabling can transmit signals
without attenuation.
Fiber-optic cabling is completely immune
to EMI and RFI.
The cost of fiber-optic connectors is lower.
Explanation: When comparing UTP cabling
with fiber-optic cabling, note the following:
fiber-optic connectors have higher costs,
technician installation skills required are
higher, fiber bandwidth supported is higher,
and fiber-optic cabling is immune to RFI and
EMI, and can transmit signals with less
attenuation.
15. What data encoding technology is used in
copper cables?
electrical pulses
modulation of specific frequencies of
electromagnetic waves
modulation of light rays
pulses of light
Explanation: Data is transmitted across a
network on media. Modern networks primarily
use three types of media to interconnect
devices:
Metal wires within cables (copper cable,
such as twisted-pair and coaxial cable) –
Data is encoded into electrical impulses.
Glass or plastic fibers within cables
(fiber-optic cable) – Data is encoded into
pulses of light.
Wireless transmission – Data is encoded
via modulation of specific frequencies of
electromagnetic waves.
16. What information is added to the switch
table from incoming frames?
destination IP address and incoming port
number
source MAC address and incoming port
number
source IP address and incoming port number
destination MAC address and incoming port
number
Explanation: A switch “learns” or builds the
MAC address table based on the source
MAC address as a frame comes into the
switch. A switch forwards the frame onward
based on the destination MAC address.
17. At which layer of the OSI model would a
logical address be added during
encapsulation?
network layer
physical layer
transport layer
data link layer
Explanation: Logical addresses, also known
as IP addresses, are added at the network
layer. Physical addresses are edded at the
data link layer. Port addresses are added at
the transport layer. No addresses are added
at the physical layer.
18. Which type of network model describes the
functions that must be completed at a
particular layer, but does not specify exactly
how each protocol should work?
reference model
hierarchical design model
protocol model
TCP/IP model
Explanation: There are two common types
of network communication models:
Protocol model – This model closely matches
the structure of a particular protocol suite and
describes the functions that occur at each
layer of protocols within the suite. The TCP/IP
model is an example of a protocol model.
Reference model – The primary purpose is to
aid in a clearer understanding of the functions
and processes necessary for network
[Link] type of model does not
specify exactly how a function should be
accomplished. The OSI model is an example
of a reference model.
19. Which two criteria are used to help select a
network medium for a network? (Choose two.)
the environment where the selected
medium is to be installed
the cost of the end devices that are used in
the network
the number of intermediate devices that are
installed in the network
the distance the selected medium can
successfully carry a signal
the types of data that need to be prioritized
Explanation: Criteria for choosing a network
medium include the following:
The distance the selected medium can
successfully carry a signal in the environment
in which the selected medium is to be
installed
The amount of data and the speed at which
the data must be transmitted
The cost of the medium and its installation
20. Which scenario is suitable for deploying
twisted-pair cables?
to connect network devices in backbone
networks
to connect a TV set to the wall plug at home
to connect data centers with high bandwidth
requirements over long distances
to connect PC workstations in an office
Explanation: Ethernet technology generally
uses twisted-pair cables to interconnect
devices. Because Ethernet is the foundation
for most local networks, twisted-pair is the
most commonly used type of network cabling
for connecting office computers.
21. Refer to the exhibit. How many bits are
represented by each group of four
hexadecimal values contained between the
colons in an IPv6 address?
16
64
4
32
8
Explanation: The four hexadecimal values
contained in a hextet represent 16 bits. There
are eight hextets in an IPv6 address that
make up the total 128 bits of the address. (16
x 8 = 128).
22. Which network design has the fewest
broadcast domains?
Explanation: Routers break networks into
separate broadcast domains. Each LAN is a
broadcast domain. The correct answer has
only one broadcast domain. All other answers
have two broadcast domains.
23. A company uses DHCP servers to
dynamically assign IPv4 addresses to
employee workstations. The address lease
duration is set as 5 days. An employee returns
to the office after an absence of one week.
When the employee boots the workstation, it
sends a message to obtain an IP address.
Which Layer 2 and Layer 3 destination
addresses will the message contain?
FF-FF-FF-FF-FF-FF and [Link]
MAC address of the DHCP server and
[Link]
FF-FF-FF-FF-FF-FF and IPv4 address of the
DHCP server
both MAC and IPv4 addresses of the DHCP
server
Explanation: When the lease of a
dynamically assigned IPv4 address has
expired, a workstation will send a
DHCPDISCOVER message to start the
process of obtaining a valid IP address.
Because the workstation does not know the
addresses of DHCP servers, it sends the
message via broadcast, with destination
addresses of FF-FF-FF-FF-FF-FF and
[Link].
24. What are two characteristics of multicast
transmission? (Choose two.)
The source address of a multicast
transmission is in the range of [Link] to
[Link].
Multicast transmission can be used by
routers to exchange routing information.
A single packet can be sent to a group of
hosts.
Multicast messages map lower layer
addresses to upper layer addresses.
Computers use multicast transmission to
request IPv4 addresses.
Explanation: Broadcast messages consist of
single packets that are sent to all hosts on a
network segment. These types of messages
are used to request IPv4 addresses, and map
upper layer addresses to lower layer
addresses. A multicast transmission is a
single packet sent to a group of hosts and is
used by routing protocols, such as OSPF and
RIPv2, to exchange routes. The address
range [Link] to [Link] is reserved for
link-local addresses to reach multicast groups
on a local network.
25. Which three types of nodes should be
assigned static IP addresses on a network?
(Choose three.)
desktop PCs
printers
mobile laptops
gateways
tablets
servers
Explanation: Servers, printers, and
intermediary devices, such as routers,
switches, and access points should have
statically assigned IP addresses so that they
are accessible to users and available for
remote management.
26. What benefit does DHCP provide to a
network?
DHCP allows users to refer to locations by a