Which of the following types of networks pass a token sequentially to each host? (Choose two.) Ethernet *Token Ring *FDDI Frame Relay ISDN 2 Which of the following are ways that bandwidth is commonly measured? (Choose three.) GHzps *kbps *Mbps Nbps MHzps *Gbps 3 Which of the following are typical features that determine throughput? (Choose two.) types of passwords used on servers type of Layer 3 protocol used *network topology length of the network cable *number of users on the network 4 Which protocols are commonly part of the application layer of the TCP/IP model? (Choose three.) *FTP *DNS UDP TCP *HTTP 5 Which of the following are data link layer encapsulation details? (Choose two.) *Packets are put into frames. Data is packaged into a packet. Data is segmented into segments. Data is converted for Internet travel. *An address is added to identify the directly connected device. 6 Which device is used to connect LANs that are geographically separated? hub bridge *router repeater 7 Which of the following is the Layer 4 PDU? bit frame packet *segment 8 What is important to remember about the data link layer of the OSI model when considering Peer to Peer communication? (Choose three.) It links data to the transport layer. It encapsulates frames into packets. *It provides a service to the network layer. *It encapsulates the network layer information into a frame. *Its header contains a physical address which is required to complete the data link functions. It encodes the data link frame into a pattern of 1s and 0s (bits) for transmission on the medium. 9 Which of the following is true regarding network bandwidth? Bandwidth is free. *Bandwidth has capacity limits. Bandwidth never increases. Bandwidth is not a key factor in analyzing network performance. 10 Which of the following is the official name for the address assigned to each network interface card (NIC) by its manufacturer? NIC address *MAC address IP address Source Address 11 Which physical network topology uses a single backbone cable and connects all hosts directly to this cable? ring star *bus mesh 12 Which OSI and TCP/IP layer appears in both models yet has different functions in each? transport session *application Internet physical 13 Which of the following topologies are considered logical topologies? (Choose two.) bus *token-passing star mesh *broadcast hierarchical 14 During the data encapsulation process, how is the data broken down by the transport layer? packets *segments data bits frames 15 Which of the following describe a LAN? (Choose two.) *operates within a limited geographical area provides dial-up connectivity uses serial interfaces to allow operation at lower speeds *connects physically adjacent devices ensures single access to specialty hosts 16 Which of the following are considered valid types of VPNs? (Choose three.) internal * intranet external *extranet local *access 17 Which of the following physical topologies connects all cables to a central point of concentration? ring *star mesh bus 18 Refer to the figure. What is the maximum possible throughput obtained end to end on this network when the user on Lab A communicates with the user on LAB D? The maximum possible throughput is based on the largest connection, the T3. *The maximum possible throughput is based on the smallest connection, the T1. There is not enough data to determine the maximum possible throughput. The maximum possible throughput is the T1 plus T3 speed divided by 2. 19 What is the name of the Layer 1 PDU? segment packet frame *bit 20 Which layer of the TCP/IP model encapsulates TCP segments into packets? application transport *internet network physical 21 Which layer of the TCP/IP model deals with quality-of-service issues such as reliability, flow control, and acknowledgement? application internet * transport network 22 From the following list, choose the data packaging type that is created at the data link layer during the data encapsulation process. packets segments data bits * frames 23 Refer to the following list. Choose the correct order of data encapsulation when a device sends information. segments bits packets data frames 1 - 3 - 5 - 4 - 2 2 - 1 - 3 - 5 - 4 2 - 4 - 3 - 5 - 1 4 - 3 - 1 - 2 - 5 *4 - 1 - 3 - 5 - 2 3 - 5 - 1 - 2 - 4