Fault Tolerance
Packets
Redundant routing
Protocols
Misc
100

(Q-4) Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet?


-The ability to use a hierarchical naming system to avoid naming conflicts


-The ability to provide data transmission even when some connections have failed


-The ability to resolve errors in domain name system (DNS) lookups


-The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data

The ability to provide data transmission even when some connections have failed

100

(Q-7) Which of the following best explains how data is transmitted on the Internet?


-Data is broken into packets, which are all sent to the recipient in a specified order along the same path.


-Data is broken into packets, which can be sent along different paths.


-All data is transmitted in a single packet through a direct connection between the sender and the recipient.


-Multiple data files are bundled together in a packet and transmitted together.

Data is broken into packets, which can be sent along different paths.

100

(Q-34) The figure shown in the packet represents a network of physically linked devices, labeled A through H. A line between two devices indicates a connection. Devices can communicate only through the connections shown. 


2

3

4

5

2

100

(Q-2) Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4? 


-IPv6 addresses are shorter than IPv4 addresses, which allows for faster routing of packets.


-IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.


-IPv6 eliminates the use of hierarchy in addressing, making addresses easier to use.


-IPv6 allows users to bypass older security protocols so that data can be sent peer-to-peer without the use of routers.

IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.

100

(Q-13) Which of the following best explains what happens when a new device is connected to the Internet?


-A device driver is assigned to the device.


-An Internet Protocol (IP) address is assigned to the device.


-A packet number is assigned to the device.


-A Web site is assigned to the device.


An Internet Protocol (IP) address is assigned to the device.

200

(Q-8) Which of the following best explains how fault tolerance in a network is achieved?


-By providing high-bandwidth connections between devices, enabling data packets to be transmitted as quickly as possible


-By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component


-By providing open network protocols, ensuring that all devices on the network are interacting in a standard way


-By providing software to monitor all network traffic, ensuring that data packets are sent and received in the proper order


By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component

200

(Q-5) Which of the following best explains how data is typically assembled in packets for transmission over the Internet?


-Each packet contains data to be transmitted, along with metadata containing information used for routing the data.


-Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data.


-Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted.


-Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.

Each packet contains data to be transmitted, along with metadata containing information used for routing the data.

200

(Q-24) The following figure shown in the packet represents different ways of configuring a network of physically linked computers labeled P, Q, R, and S. A line between two computers indicates that the computers can communicate directly with each other. In which configuration is it NOT possible to have redundant routing between computers P and S? 


A


B


C


D


B

200

(Q-16) Which of the following best explains how IP addresses are assigned? 


-As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.


-IP addresses are assigned only to servers that host Web sites; user devices do not require an IP address.


-New devices are connected to the Internet without an IP address, but are eventually assigned an IP address once they can be verified by a certificate authority.


-New devices are connected to the Internet without an IP address; IP addresses are assigned only for encrypted communications.

As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.

200

(Q-12) Which of the following is a true statement about Internet communication? 


-Devices from different manufacturers are required to run the same operating system to communicate over the Internet.


-Every device connected to the Internet is assigned a digital certificate by a certificate authority.


-Every device connected to the Internet is assigned an Internet protocol (IP) address.


-Every device connected to the Internet requires a high-bandwidth connection to enable redundant routing to each device.

Every device connected to the Internet is assigned an Internet protocol (IP) address.

300

(Q-19) Which of the following is a primary benefit of making a computing system fault-tolerant?


-If one component of the system fails, users of the system can often still access it.


-If one component of the system is hacked, no information will be stolen.


-If the system becomes too expensive, making it fault-tolerant will save money.


-If the system cannot operate efficiently, making it fault-tolerant will speed up its operation.

If one component of the system fails, users of the system can often still access it.

300

(Q-28) A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?


-The file is broken into packets for transmission. The packets must be reassembled upon receipt.


-The file is broken into packets for transmission. The user’s browser must request each packet in order until all packets are received.


-The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user.


-The server repeatedly attempts to connect directly to the user’s computer until a connection is made. Once the connection is made, the entire file is sent.

The file is broken into packets for transmission. The packets must be reassembled upon receipt.

300

(Q-3) Which of the following best describes a direct benefit in using redundant routing on the Internet? 


-Redundancy enables messages to be transmitted with as few packets as possible.


-Redundancy enables network devices to communicate with as few network connections as possible.


-Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.


-Redundancy prevents network communications from being intercepted by unauthorized individuals.

Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.

300

(Q-14) Which of the following best describes the role of the Internet Engineering Task Force (IETF) ? 


-Developing standards and protocols for Internet communication


-Preventing copyrighted materials from being illegally distributed online


-Preventing malicious software from being distributed online


-Verifying the ownership of encrypted keys used in secured messages

Developing standards and protocols for Internet communication

300

(Q-6) A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth? 


-The amount of time it takes guest users to send and receive large files is likely to decrease.


-The number of packets required for guest users to send and receive data is likely to decrease.


-Guest users will be prevented from having fault-tolerant routing on the Internet.


-Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Guest users will be restricted in the maximum amount of data that they can send and receive per second.

400

(Q-11) Which of the following best explains how the Internet is a fault-tolerant system?


-The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.


-The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.


-The Internet is fault-tolerant because users can transmit messages using a variety of different protocols, allowing them to use devices from any manufacturer.


-The Internet is fault-tolerant because users usually understand and accept the fact that servers sometimes fail, allowing network engineers to repair faulty devices as quickly as possible.

The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.

400

(Q-9) Which of the following best explains how messages are typically transmitted over the Internet? 


-The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device.


-The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.


-The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device.


-The message is transmitted as a single file and received in whole by the recipient’s device.

The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.

400

(Q-33) The figure shown in the packet represents a network of physically linked devices, labeled A through F. A line between two devices indicates a connection. Devices can communicate only through the connections shown. 

Which of the following statements are true about the ability for devices A and C to communicate?

Select two answers.


A- If devices B and D were to fail, then information sent from device A could not reach device C.


B- If devices B and F were to fail, then information sent from device A could not reach device C.


C- If devices D and F were to fail, then information sent from device A could not reach device C.


D- If devices E and F were to fail, then information sent from device A could not reach device C.

A- If devices B and D were to fail, then information sent from device A could not reach device C. 


C- If devices D and F were to fail, then information sent from device A could not reach device C. 

400

(Q-15) Which of the following explains a benefit of using open standards and protocols for Internet communication? 


-Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.


-Open standards and protocols provide ways for users to eliminate the latency of messages they send on the Internet.


-Open standards and protocols allow users to freely share or reuse material found on the Internet for noncommercial purposes.


-Open standards and protocols prevent developers from releasing software that contains errors.

Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.

400

(Q-21) The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols? 


-To ensure that communications between devices on the Internet are above a minimum transmission speed


-To ensure that private data is inaccessible to unauthorized devices on the Internet


-To establish a common standard for sending messages between devices on the Internet


-To validate the ownership of encryption keys used in Internet communication

To establish a common standard for sending messages between devices on the Internet

500

(Q-1) The following figure shown in the packet represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown.Which of the following statements best explains the ability of the network to provide fault tolerance? 


-The network is considered fault-tolerant because there are redundant paths between each pair of devices.


-The network is considered fault-tolerant because it guarantees that no individual component will fail.


-The network is not considered fault-tolerant because it relies on physical connections.


-The network is not considered fault-tolerant because it provides more paths than are needed.

The network is considered fault-tolerant because there are redundant paths between each pair of devices.

500

(Q-27) Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation?

Select two answers.


A-Better understanding of the effect of temporarily unavailable network connections


B-Better understanding of the effect of using hexadecimal representations for binary data


C-Better understanding of the impact of access to public data in identifying solutions to problems


D-Better understanding of the impact of increased connection speeds for frequently visited servers

A- Better understanding of the effect of temporarily unavailable network connections 


D- Better understanding of the impact of increased connection speeds for frequently visited servers 

500

(Q-29) The figure shown in the packet represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other.

Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices.


Which of the following statements is true about the network?


-Information sent from device A to device D can use at most two unique paths.


-Information sent from device A to device I will pass through at most four other devices.


-If devices B and F fail, then device A will not be able to communicate with device G.


-If devices C and F fail, then device D will not be able to communicate with device H.

If devices B and F fail, then device A will not be able to communicate with device G.

500

(Q-20) Which of the following is a primary reason for the use of open protocols on the Internet? 


-Open protocols allow devices to specify how data packets are to be routed on the Internet in advance.


-Open protocols ensure that all data transmission on the Internet is kept secure.


-Open protocols ensure that all Internet users are provided connections with equal bandwidth.


-Open protocols provide a way to standardize data transmission between different devices.

Open protocols provide a way to standardize data transmission between different devices.

500

(Q-10) 

Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale?

I -A central monitoring computer is used to track and maintain the connections of the Internet.

II -Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted around the inoperative connections.

III -Protocols for packets and routing are used so that computers from different manufacturers can communicate in a standard way.


I and II only


I and III only


II and III only


I, II, and III

II and III only

M
e
n
u