REDES.test
![]() |
![]() |
![]() |
Título del Test:![]() REDES.test Descripción: Preguntas tipo test sobre redes de ordenadores en inglés |




Comentarios |
---|
NO HAY REGISTROS |
32-bit identifier for host and router interface. IP Address. MAC Address. NAT Address. Connection between the host/router and a physical link. Optical link. Coaxial cable. Interface. Select the correct statement. Routers have one interface. Routers have several interfaces. Select the correct statement. The host has only one interface. The host can have several interfaces. Select the correct statement. IP addresses are associated with each interface. IP addresses are associated with several interfaces. Device interfaces with the same network part of the IP address and can physically reach eachother without the router intervening: A network. A subnet. A switch. The first internet schemes were created in: 1992. 1982. 1976. Used to refer to the network as a whole. All devices on that network possess the same bits: Network address. Broadcast address. Host address. Used to send packets to each host on the network that shares the same network portion as theaddress. Network address. Broadcast address. Host address. Each one on this network has a unique address: Network address. Broadcast address. Host address. Select the correct statement regarding organizational requirements and classful addressing. The requirements of the organizations did not fit each of the classes. The requirements of the organizations fit each of the classes. Select the correct statement regarding organizational requirements and classful. Classful address space allocation wasted many addresses, exhausting IPv4 address. Classful address space allocation wasted many addresses, exhausting IPv6 address availability. Select the correct statement regarding organizational requirements and classful. It was abandoned at the end of the 90s; remnants of these networks are still seen today inrouters and PCs. It was abandoned at the end of the 80s; remnants of these networks are still seen today inrouters and PCs. The administrator can divide a network into subnets, creating another section in the IP addressthrough: Localhost. DNS. Subnet mask. Indicates which part of an address corresponds to the subnet field and which part corresponds tothe host field: Subnet mask. DNS. MAC Address. The strategy of address allocation on the internet. NAT. CIDR. VLSM. ISPs can now assign address space more efficiently using any prefix length, starting with /8 and larger: Reserved LAN addresses. VLSM. CIDR. Allows a company to use more than one subnet mask within the same address space, i.e., to divide a subnet into subnets: Reserved LAN addresses. VLSM. CIDR. With this routing protocol, routers external to the network only take into account the first /x bits ofthe prefix: RIP. BEG. BGP. Avoids the collapse of internet routers and each subnet has an entry in the routing table: Route summary. IP addressing. Tunneling. Dynamic routing protocols can avoid consuming bandwidth for updates. True. False. The route summary makes the routing table larger, making searches faster. True. False. It consolidates wireless signals from users and connects to the existing network infrastructure based on copper media, like Ethernet. Wireless NIC adapters. Wireless access point. Ethernet. They provide wireless communication capability to each network host. Wireless NIC adapters. Wireless access point. Ethernet. It is a communications network that interconnects various data devices around a geographically small area at a high data rate with a very low error rate. LAN. PAN. MAN. It is a communications network that interconnects various data devices around a personal area at a moderate data rate. LAN. PAN. MAN. A network that interconnects computers, terminals, and even LANs on a national and international scale. The transmission speed decreases over long distances and error rates increase. LAN. WAN. PAN. They extend over metropolitan areas and cities, allowing companies that are dispersed across the city to connect. Function: Interconnect geographically dispersed but nearby LANs. MAN. WAN. PAN. Signals are patterns of electrical pulses (Twisted Pair and Coaxial Cable). Copper media. Optical media. WIreless media. Signals are patterns of light (optical fiber). Copper media. Optical media. Wireless media. Signals are patterns of microwave transmissions. Copper media. Optical media. Wireless media. Copper wiring is economical, easy to install, has low resistance, and conducts electricity. True. False. Copper wiring does not produce electromagnetic or radio frequency interference. True. False. In an unshielded twisted pair, the outer coating protects the copper wire against physical damage. Outer coating. Twisted pair. Color-coded plastic insulation. In an unshielded twisted pair, it protects the signal against interference. Outer coating. Twisted pair. Color-coded plastic insulation. In an unshielded twisted pair, it electrically isolates the wires from each other and identifies each pair. Outer coating. Twisted pair. Color-coded plastic insulation. Used for voice communication (RJ-11). Telephone lines. Category 3. Category 5 or 5e. Category 6. Data transmission speeds of 100 and 1000 Mbps. Category 3. Category 5 or 5e. Category 6. Data transmission. Has a separator between each pair of wires to support high speeds. 10 Gbps. Category 3. Category 5 or 5e. Category 6. Connects a network host to a network device, such as a switch or hub. Straight cable. Crossover cable. Console cable. Connects two network hosts. Connects two intermediate network devices (a switch to a switch, or a router to a router). Straight cable. Crossover cable. Console cable. Connects the serial port of a workstation to the console port of a router using an adapter. Straight cable. Crossover cable. Console cable. Copper compared to optical fiber offers these characteristics: longer distances, higher speeds, less attenuation, and immunity to EMI and RFI. True. False. Single-mode cables are suitable for long-distance applications, but less so than multimode cables. True. False. Typically used with LANs or for distances of a few hundred meters within a campus network. Single-mode. Multimode. Typically used with campus backbones for distances of several thousand meters. Single-mode. Multimode. Uses lasers as light sources. Single-mode. Multimode. Uses LEDs as light sources. Single-mode. Multimode. These issues belong to whom: Coverage area, Interference, Security. Copper cabling. Fiber optic cabling. Wireless media. Has the responsibility to transfer datagrams from one node (computer or router) to an adjacent node (same) through a link. Network layer. Transport layer. Data link layer. OSI layer services: Framing & link access, Reliable delivery, Flow control, Error detection, Error correction. Half-duplex and full-duplex. Network layer. Transport layer. Data link layer. In the data link layer, offers the network level a service of data transmission between adjacent machines. LLC. MAC. In the data link layer, responsible for Frame composition and decomposition, Flow control (Optional), Error management (Optional). LLC. MAC. Regulates access to a shared transmission medium by several machines (CSMA/CD, Token passing...). LLC. MAC. Which is correct?. Standards 802.3 (Ethernet), 802.11 (WiFi), 802.15 (Bluetooth) belong to the physical layer and to the link layer (in the MAC part). Standards 802.3 (Ethernet), 802.11 (WiFi), 802.15 (Bluetooth) belong to the physical layer. Standards 802.3 (Ethernet), 802.11 (WiFi), 802.15 (Bluetooth) belong to the link layer. X -> is in charge of access control to a shared medium. Z -> offers the network level a uniform data transmission service for different MACs. X -> LLC, Z -> MAC. Z -> LLC, X -> MAC. Whose are these: Point-to-point topology, Hub-and-spoke topology, Full mesh topology. LAN. MAN. WAN. Whose are these: Star topology, Extended star topology, Bus topology, Ring topology. LAN. MAN. WAN. The channel is divided in time (TDM) or in frequency (FDM). Good for heavy and constant traffic, but bad for bursts (usual). Static assignment. Dynamic assignment. The division is not predetermined. Tries to make better use of the channel in LANs. Static assignment. Dynamic assignment. Whose are these: Access to channels in "rounds". Each station gets a fixed-length slot (length = transmission time of the packet) in each round. Unused slots are not utilized. TDMA. FDMA. Whose are these: The channel spectrum is divided into frequency bands. Each station gets a fixed frequency band. Unused transmission time is not utilized. TDMA. FDMA. When two stations decide to transmit simultaneously after seeing the channel free and when the channel seems free but is not due to the propagation delay of packets through the network. What happens?. Obstruction. Restart. Collision. Whose are these: Radio network, transmits without considering whether the line is busy. The station (slave) transmits the frame and waits for a confirmation (acknowledgment), if this does not occur within the maximum time provided (timeout) the frame is retransmitted. Each frame carries a field that allows the receiver to check that the content is correct. Aloha. Pure Aloha. Slotted Aloha. Whose are these: Transmission times are random (simpler, no synchronization). Aloha. Pure Aloha. Slotted Aloha. Whose are these: The stations are synchronized, time is divided into intervals, and each frame is transmitted in only one interval. Currently used in GSM networks and satellite communications. Advantages: A single active node can transmit continuously at the maximum channel rate. Disadvantages: Collisions, slots are wasted and require clock synchronization. Aloha. Pure Aloha. Slotted Aloha. If the channel is sensed free, the entire frame is transmitted. If the channel is detected as occupied, postpone transmission. CSMA. CSMA/CD. It is a contention-based medium access protocol, used in Ethernet cards. CSMA. CSMA/CD. When a station wants to transmit, it listens to the channel, if it is occupied, it waits until it is free. If it is free, it transmits. While transmitting, it continues to listen to see if someone transmits at the same time, in which case it aborts the transmission. CSMA. CSMA/CD. CSMA/CD (collision detection) is used in. Ethernet. 802.11. CSMA/CA (collision detection) is used in. Ethernet. 802.11. There is a token that circulates through the network. At any time, only the token holder can transmit, so collisions disappear. Assumes that network stations are configured as a physical or logical ring. CSMA. Token passing protocol. A host can send a packet... To itself. To a local host and to itself. To a local host, to itself, and to a remote host. A special IP address, 127.0.0.1, called the "loopback interface" is used. When a host sends a packet to itself. When a host sends a packet to a local host. When a host sends a packet to a remote host. Hosts share the same network address: When a host sends a packet to itself. When a host sends a packet to a local host. When a host sends a packet to a remote host. Hosts do not share the network address. When a host sends a packet to itself. When a host sends a packet to a local host. When a host sends a packet to a remote host. A summary of the route table or route information for specific IP addresses, network masks, or protocols. Router's routing table. Route summary table. NAT translation table. Represents the "reliability" of the route: the lower it is, the more reliable will be the source of the route. Trustworthiness. Administrative distance. Metric. Identifies the value assigned to reach the remote network. Lower values indicate preferred routes. Trustworthiness. Administrative distance. Metric. Routing that is easy to implement in a small network, is secure, the route to the destination is always the same and does not require additional resources. Static routing. Dynamic routing. Both. Static routing is complex to configure as the network grows and requires manual intervention to reroute traffic. True. False. RIP, OSPF, IGRP, IS-IS, EIGRP, and BGP are. Static routing protocols. Routing protocols. Dynamic routing protocols. Distance vector, information from the neighbor's point of view, based on the least number of hops, periodic updates, low CPU usage, and broadcast network update. Bellman-Ford. Dijkastra. Link state, complete network topology information, based on cost, specific updates, high CPU usage, and multicast network update. Bellman-Ford. Dijkstra. Suitable in all topologies where several routers are required, independent of the size of the network, and if possible, it automatically adapts to the topology to route traffic: Static routing. Dynamic routing. Both. Implementation can be more complex, less secure, depends on the current topology, and requires CPU, RAM, and bandwidth. Static routing. Dynamic routing. Both. It is a hierarchical structure used to accelerate the search process when locating routes and forwarding packets. Dynamic routing protocol. Route scheme. Routing table. It is a routing table entry that contains an IPv4 address of the next hop or an output interface. Ultimate route. Level 1 route. Level 2 secondary routes. It is a route with a subnet mask equal to or lower than the classful mask of the network address. Ultimate route. Level 1 route. Level 2 secondary routes. It is a network route that is divided into subnets.** - A) Ultimate route - B) Main level 1 route - C) Level 2 secondary routes. Ultimate route. Main level 1 route. Level 2 secondary routes. It is a route that constitutes a subnet of a classful network address. Ultimate route. Level 1 route. Level 2 secondary routes. Used to route a datagram within the same network. 48 bits. Must be unique. It is recorded on the network adapter by the manufacturer. MAC Address. IP Address. Address used at the network level. Used to route a datagram to its destination. Must be unique. MAC Address. IP Address. This protocol is used to communicate error conditions between machines and to perform some diagnostic functions. Messages are transmitted encapsulated within IP datagrams. ICMP. ARP. IGMP. Literally means moving packets from source to destination and should not be confused with the function of a layer 2 switch. Switching. Switch routing. Routing. Sends an Ethernet broadcast frame containing a request that includes the IP address in question. Among all adjacent machines, the one whose IP is in the request responds. Responds with an Ethernet frame directed to the questioner, containing a response indicating the requested MAC address. ICMP. ARP. IGMP. Each machine maintains a cache of IP address to MAC address correspondences with the results of the requests it makes. ICMP. ARP. IGMP. Translation of private addresses to public ones. ARP. NAT. DNS. Assignment of a local address to a global one. Static NAT. Dynamic NAT. PAT or NAT with overload. Assignment of several local addresses to several global addresses. Static NAT. Dynamic NAT. PAT or NAT with overload. Assignment of several local addresses to a global address. Static NAT. Dynamic NAT. PAT or NAT with overload. In PAT... Uses a set of public IP addresses. Uses a single public IP address. Both. Which layer of interconnection devices is this: Repeaters (repeaters, hubs), are signal regenerators that copy bits between segments of the same network. Layer 1. Physical level. Link level. Network level. Transport level. Which layer of interconnection devices is this: Bridges (bridges, switches), store and retransmit frames between local networks (IEEE 802.X). Physical level. Link level. Network level. Transport level. Which layer of interconnection devices is this: Routers, store and re-transmit packets between different networks. They ensure that IP addresses do not change (excluding NAT). Physical level. Link level. Network level. Transport level. Which layer of interconnection devices is this: Gateways, interconnect transport levels or higher. They have the capability to perform protocol translation. Physical level. Link level. Network level. Transport level. Occurs when there is a collision between frames and information is lost. Frame domain. Broadcast domains. Collision domains. The solution is to retransmit the frame, avoiding collision domains __________ traffic on a LAN network. Increases. Reduces. Defines. A switch, router, or bridge... Avoids collisions. Forwards packets at physical levels and by not managing the forwarding of packets intelligently, collisions occur. A hub... Avoids collisions. Forwards packets at physical levels and by not managing the forwarding of packets intelligently, collisions occur. Refers to the traffic limit when a broadcast is made. Frame domain. Broadcast domains. Collision domains. At the network level, only _______ divide the broadcast domain. Routers. Switches. Hubs. The switch delimits the broadcast domain and the router does not. True. False. Due to the broadcast domains, when a package arrives, who sends it to everyone and who sends it only to a network segment. The router sends it to everyone and the switch sends it only to a network segment. The switch sends it to everyone and the router only to a network segment. Both the router and the switch send only to a network segment. If two stations transmit at the same time, there is a collision: Same collision domain. All ports must be of the same speed. They are half-duplex. The bandwidth is divided. Routers. Switches. Hubs. The hub cannot manage two frames that arrive simultaneously. True. False. Hubs operate at the _________ level, connecting 2 network segments. Physical level. Link level. Network level. Transport level. Hubs use...** - A) Physical star topology - B) Bus topology - C) Ring topology. Physical star topology. Bus topology. Ring topology. A hub... What it receives through one port, it copies to another destination port. What it receives through one port, it does not copy to another destination port. What it receives through one port, it copies to all other ports. They have no storage capacity - There is no logical isolation between the segments they connect - Problems with loops. Routers. Switches. Hubs. The difference with the ________ is that the ______ has 2 ports to connect two networks or LAN subnets and serves as an extension of the 2 networks. Router / Bridge. Switch / Bridge. Bridge / Switch. A bridge works at the layer. Physical layer (level 1). Link layer (level 2). Transport layer (level 4). A Bridge... Controls which MAC addresses it has on each side of the bridge and makes its decisions based on the list of MAC addresses. Controls which IP addresses it has on each side of the bridge and makes its decisions based on the list of IP addresses. Controls which Ethernet addresses it has on each side of the bridge and makes its decisions based on the list of Ethernet addresses. The main function of a bridge is to connect two networks: True. False. The main function of a switch is to connect two networks: True. False. The MAC address format of a bridge is: Half-duplex. Full-duplex. Duplex. It has several ports and allows connecting a large number of hosts. Bridge. Switch. Hub. Switches are more ____ than routers. Economical. Expensive. A switch works at the layer. Physical layer (level 1). Link layer (level 2). Transport layer (level 4). Controls which MAC addresses it has on each side and makes its decisions based on the list of MAC addresses. Routers. Switches. Hubs. Switches do not have switching tables. True. False. Switches never send simultaneous frames. True. False. Switches are preferably _______ on each port. Half-duplex. Full-duplex. Duplex. In switches, all ports have the same speed. True. False. It is a technology that reduces congestion in Ethernet LANs by reducing traffic and increasing bandwidth. Switching. Routing. When a switch is activated and starts operating, it examines the MAC address of incoming datagrams and creates a table of known destinations. True. False. A switch discards the datagram since there is no need to transmit it. If the switch knows that the destination of a datagram is in the same segment as the origin of the datagram. If the switch knows that the destination is in another segment. If the switch does not know the destination segment. A switch transmits the datagram to that segment only. If the switch knows that the destination of a datagram is in the same segment as the origin of the datagram. If the switch knows that the destination is in another segment. If the switch does not know the destination segment. A switch transmits the datagram to all segments except the origin segment (broadcast). If the switch knows that the destination of a datagram is in the same segment as the origin of the datagram. If the switch knows that the destination is in another segment. If the switch does not know the destination segment. Inspects the entire frame before forwarding it (CRC). If it discards a frame, it does not notify. Increases reliability and latency. Requires switches with more memory. It is a type of switching: Store and forward. Cut-Through. Fragment free. Does not wait to receive the entire frame (the preamble is enough). As soon as it knows the MAC destination, it begins to send the information. There is no error checking (it is left to the host). Reduces delays and can promote an increase in bandwidth if there are many corrupt packets. It is a type of switching. Store and forward. Cut-Through. Fragment free. It is a hybrid of the previous two. Always stores the first 64 bytes and performs an error check. If the first part of the frame is correct, it sends the rest of the information. Most errors can be detected in the first 64 bits. Store and forward. Cut-Through. Fragment free. A switch knows LAN addresses thanks to self-learning. True. False. Knows the location of a station by examining the source address - Sends to all ports (except the port from which the frame entered), when the destination address is a broadcast, multiple broadcast or an unknown address. - Sends when the destination is on a different interface - Filters when the destination is on the same interface. Routing tables. Frame forwarding of a hub. Self-learning of a switch. Forwards data by looking at a table. Router. Switch. Both. Forwards Ethernet frames not directed to it, takes them without permission, stores them, and intact forwards them through the appropriate port. Router. Switch. Hub. Forwards IP datagrams contained in Ethernet frames that are directed to it (these frames have as destination Ethernet address the address of one of the interfaces) therefore it receives these frames, removes their headers, and obtains the IP datagrams they contain. Then, it forwards through the appropriate interface those IP datagrams, contained in new Ethernet frames (with different Ethernet addresses from the frames in which they arrived). Router. Switch. Hub. Transparent to the machines, they are not aware of its existence at the network level. Presence of a Router. Presence of a Switch. Presence of a Hub. Manifest for the machines, they send frames explicitly directed to the router. Presence of a Router. Presence of a Switch. Presence of a Hub. Works at OSI layer 2. Switch. Router. Faster because it works by hardware. Switch. Router. If the destination is unknown within a switch, it floods all ports it has. Switch. Router. Has the same broadcast domain. Switch. Router. MAC Address. Switch. Router. Frame level data protocol. Switch. Router. Works at OSI layer 3. Switch. Router. Slower works by software. Switch. Router. If the destination is unknown, it rejects the packet. Switch. Router. Separates the broadcast domains. Switch. Router. IP Address. Switch. Router. Packet level data protocol. Switch. Router. Maintain switching tables, implement filtering, learning, and Spanning Tree Protocol (STP) algorithms. Switch. Router. Maintain routing tables, implement routing algorithms. Switch. Router. Work well when there are few (about 100 hosts). Bridges. Router. Are used in large networks (thousands of hosts). Bridges. Router. Is simpler and requires less processing - Are created through self-learning. Switch. Router. All traffic is limited to the spanning tree, even when other bandwidth is available - Do not offer protection against broadcast storms. Switch. Router. Can support arbitrary topologies, the cycle is limited by TTL counters. - Provides protection against broadcast storms. Switch. Router. Requires manual configuration of IP addresses or by routing protocol (there is no self learning). - Requires more packet processing. Switch. Router. Traffic isolation: no-Connection and operation: yes. Hubs. Bridges. Routers. Switches. Traffic isolation: yes-Connection and operation: yes-Optimal routing: no. Hubs. Bridges and switches. Routers. Switches. Traffic isolation: yes-Connection and operation: no-Optimal routing: yes. Hubs. Bridges. Routers. Switches. Switching table of a switch. What happens if there is no MAC entry?. Nothing because it doesn't realize. Activates the ICMP protocol. Launches a flooding message. Switching table of a switch. What happens if the port through which I receive a frame coincides with the MAC destination?. Does an auto-send. Discards the frame. Launches a flooding message. They eliminate collision domains and isolate each of the collision domains on each port. Switch. Router. What problems do we find in wired LANs (physical topology)?. They are very expensive. Collision and security. There are better types of wiring. They are based on logical connections instead of physical ones. - Allow solving problems that LANs alone cannot address (e.g., Security, isolation) - Save economic costs of wiring and equipment - Facilitate network operator management - Reduced and controlled broadcast domains. VLAN. SVI. Allows defining multiple virtual local area networks over a single physical local area network. Router. Switch. Carries graphics generated by users. Type of VLAN: Data VLAN. Default VLAN. Native VLAN. Management VLAN. VLAN to which all ports belong when a switch is purchased or restarted. Type of VLAN: Data VLAN. Default VLAN. Native VLAN. Management VLAN. Assigned to 802.1Q trunk ports (allow communication between switches). Type of VLAN: Data VLAN. Default VLAN. Native VLAN. Management VLAN. Any VLAN that is configured to access the management capabilities of a switch. It is usually assigned an IP address and mask for remote management. Type of VLAN: Data VLAN. Default VLAN. Native VLAN. Management VLAN. There is a record of MAC of each of the hosts that belong to a network. It is managed depending on the MAC of the host. Port-based VLAN. Dynamic VLAN. Traffic isolation: Traffic only within its VLAN - Communication between VLANs through a router - VLANs can be extended across multiple switches. Port-based VLAN. Dynamic VLAN. When a switch is started all ports belong to the same VLAN (default VLAN). True. False. How does the switch know which VLAN a frame belongs to?. By the format of the IP address. By the format of the MAC address. By the format of the extended Ethernet frame IEEE 802.1Q. Can be configured on layer 2 and 3 devices. VLAN. SVI. Cannot perform routing between them. VLAN. SVI. OSI layer 2. VLAN. SVI. Can be enabled following the command - Vlan (Vlan ID)*. VLAN. SVI. Only layer 3 devices can be configured. VLAN. SVI. Can perform routing between IP subnets. VLAN. SVI. Can be enabled following the command - Interface Vlan (VLAN ID). VLAN. SVI. |