Cloud computing allows users to access applications, back up and store files, and perform tasks without needing additional software or servers. Cloud users access resources through subscription-based or pay-per-use services, in real time, using nothing more than a web browser.
3. A network administrator can successfully ping the server at www.cisco.com, but cannot ping the
company web server located at an ISP in another city. Which tool or command would help
identify the specific router where the packet was lost or delayed?
The traceroute command provides connectivity information about the path a packet takes to reach the destination and about every router (hop) along the way. It also indicates how long a packet takes to get from the source to each hop and back.
4. Which OSI model layer contains protocols for process-to-process communication?
When a message is placed inside of another message, this is known as encapsulation. On networks, encapsulation takes place when one protocol data unit is carried inside of the data field of the next lower protocol data unit.
7. Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data
to the network?
A. Frames are sent from the network access layer to the internet layer.
B. Packets are sent from the network access layer to the transport layer.
C. Segments are sent from the transport layer to the internet layer.
D. Data is sent from the internet layer to the network access layer.
When the data is traveling from the PC to the network, the transport layer sends segments to the internet layer. The internet layer sends packets to the network access layer, which creates frames and then converts the frames to bits. The bits are released to the network media.
8. A web client is receiving a response for a web page from a web server. From the perspective of the
client, what is the correct order of the protocol stack that is used to decode the received
1. HTTP governs the way that a web server and client interact. 2. TCP manages individual conversations between web servers and clients. 3. IP is responsible for delivery across the best path to the destination. 4. Ethernet takes the packet from IP and formats it for transmission.
9. How does BYOD change the way in which businesses implement networks?
A. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.
B. BYOD devices are more expensive than devices that are purchased by an organization.
C. BYOD provides flexibility in where and how users can access network resources.
D. BYOD requires organizations to purchase laptops rather than desktops.
A BYOD environment requires an organization to accommodate a variety of devices and access methods. Personal devices, which are not under company control, may be involved, so security is critical. Onsite hardware costs will be reduced, allowing a business to focus on delivering collaboration tools and other software to BYOD users.
10. In computer communication, what is the purpose of message encoding?
A. To convert information to the appropriate form for transmission
B. To negotiate correct timing for successful communication
Before a message is sent across a network it must first be encoded. Encoding is the process of converting the data message into another format suitable for transmission across the physical medium. Each bit of the message is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media over which the bits are transmitted. The destination host receives and decodes the signals in order to interpret the message.
11. Which statement is true about the TCP/IP and OSI models?
A. The OSI Layer 7 and the TCP/IP application layer provide identical functions.
B. The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.
C. The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
D. The TCP/IP network access layer has similar functions to the OSI network layer.
The TCP/IP internet layer provides the same function as the OSI network layer. The transport layer of both the TCP/IP and OSI models provides the same function. The TCP/IP application layer includes the same functions as OSI Layers 5, 6, and 7.
12. What method can be used by two computers to ensure that packets are not dropped because too
much data is being sent too quickly?
In order for two computers to be able to communicate effectively, there must be a mechanism that allows both the source and destination to set the timing of the transmission and receipt of data. Flow control allows for this by ensuring that data is not sent too fast for it to be received properly.