CS402: Computer Communications and Networks Certification Final Exam Answers | Free Course with Free Certificate

Hello Technocrats, Today we are going to share Waze Ads Fundamentals Certification Course Exam Answers. This certification course is totally free of cost✅✅✅ for you which is provided by Google.

Here, you will find Computer Communications and Networks Certification Final Exam Answers in Bold Color which are given below.

These answers are updated recently and are 100% correct✅ answers of all modules and final exam answers of Computer Communications and Networks Certification Final Exam Answers from Saylor Academy Certification Course.

Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer.

Apply Link – Computer Communications and Networks Certification

Computer Communications and Networks Certification Final Exam Answers

Question 1: The networking standards development process is documented by:

  • ISO standards.
  • a protocol.
  • an RFC.
  • a standar

Question 2: Which transmission mode should be used to send information from a single point to another point?

  • Anycast
  • Broadcast
  • Multicast
  • Unicast

Question 3: In a complete data transmission (request and response), the diagram would contain which of the following?

  • Two layers
  • Five layers
  • Two columns with matching layers.
  • Five columns with matching layers.

Question 4: A LAN typically interconnects devices located where?

  • Anywhere on Earth
  • In your city
  • In your house
  • Within 10 meters of one another

Question 5: What is the network that typically interconnects devices with network capabilities located anywhere on Earth?

  • Internet
  • LAN
  • PAN
  • WAN

Question 6: Which of the following network topologies would reduce network failure by connecting all the network nodes to a central node?

  • Bus
  • Ring
  • Star
  • Tree

Question 7: What is the RFC?

  • A database of Internet services
  • A numeric linking system used by your text
  • A numeric listing of TCP/IP protocols
  • A tracking system for network development requirements

Question 8: Which of the following layers is unique to the TCP/IP reference model?

  • Application
  • Internet
  • Transport
  • VoIP

Question 9: The protocols for email and web file access are described in which layer of the Internet protocol?

  • Network
  • Presentation
  • Session
  • Transport

Question 10: Which of the following is a characteristic of the TCP service?

  • It is authenticate
  • It is bidirectional.
  • It is connectionless.
  • It is unreliable.

Question 11: An element of the WWW protocol is:

  • HTML.
  • JavaScript.
  • Jav
  • XML.

Question 12: The ______ access layer in the TCP/IP reference model is the combination of the Application, Presentation, and Session layers in the OSI reference model.

  • Application
  • Internet
  • Network
  • Transport

Question 13: The application layer in the TCP/IP reference model is different from which layer in the OSI model?

  • Application
  • Communication
  • Presentation
  • Session

Question 14: Which of the following layers is a combination of the Application, Presentation, and Session layer in the TCP/IP reference model?

  • Application
  • Internet
  • Network Interface
  • Transport

Question 15: The OSI Reference Model layers, in order from top to bottom, are:

  • Application, physical, session, transport, network, data link, presentation.
  • Application, presentation, network, session, transport, data link, physical.
  • Application, presentation, session, transport, network, data link, physical.
  • Physical, data link, network, transport, session, presentation, application.

Question 16: Which of the following is a protocol used to retrieve email messages?

  • MTP
  • POP
  • SMTP
  • SNMP

Question 17: The most widely used application/programming interface for UDP is the:

  • ADU.
  • layer.
  • socket.
  • telnet.

Question 18: A MIME message must:

  • identify spam.
  • be in binary format.
  • allow audio/video transmissions.
  • support only one format in a single message.

Question 19: Which of the following describes SMTP?

  • It utilizes UDP.
  • It allows web access.
  • It answers with multi-line replies.
  • It relies on the client-server model.

Question 20: PPP utilizes which of the following?

  • Bit stuffing for asynchronous lines
  • Character stuffing for synchronous lines
  • CRC for error detection
  • CRC for error ion

Question 21: What is the unit of information exchanged between two entities in the application layer?

  • An ADU
  • A bit
  • A datagram
  • A packet

Question 22: As a network engineer, you are required to write a simple socket program. What are the parameters you need to specify while creating a socket?

  • Socket address and socket family
  • Socket message and socket header
  • Socket stream and datagram socket
  • Socket type and address domain

Question 23: The HTTP request header:

  • contains no-cache.
  • contains no-transform.
  • allows client information.
  • contains the date, server, and content information.

Question 24: The HTTP response header:

  • allows client information.
  • contains the data file content information.
  • contains the status and content information.
  • contains the date, server, and content information.

Question 25: The function of Domain Name System is to:

  • route the IP packet to the destination.
  • translate computer hostnames to IP addresses.
  • translate IP addresses to computer hostnames.
  • automatically assign IP address to network device.

Question 26: Which of the following best describes the Stream Control Transmission Protocol (SCTP)?

  • Reliable, message-oriented
  • Reliable, character-oriented
  • Unreliable, message-oriented
  • Unreliable, character-oriented

Question 27: A connectionless service can be modeled by using just two primitives containing the SDU parameter. What information is contained in the SDU?

  • The message
  • The source address
  • The address of the sender
  • The address of the recipient

Question 28: A connection-oriented transport protocol is:

  • Frame Relay.
  • ICMP.
  • IPX.
  • TIP

Question 29: What is the unit of exchange in the transport layer?

  • Bits
  • Data
  • Packets
  • Segments

Question 30: A random isolated error in a segment in the transport layer occurs when:

  • one bit flips.
  • a group of bits flip.
  • two consecutive bits flip.
  • most bits in the segment flip.

Question 31: How many bits are needed for the Alternating Bit Protocol?

  • 1
  • 3
  • 5
  • 7

Question 32: The ___ layer is responsible for ensuring that messages are delivered in sequence and with no duplication.

  • Application
  • Network
  • Physical
  • Transport

Question 33: The network layer allows your LAN to exchange information with other networks through an intermediate system called a:

  • datagram.
  • frame.
  • packet.
  • router.

Question 34: All client computers are configured to receive IP addresses from the DHCP server. However, clients on Subnet B cannot access clients on Subnet  What is the most likely cause of this problem?

  • IPv6 is disable
  • Server option is disable
  • The IP address is not available in DHCP scope.
  • The IP address for the DNS Server is not available in scope option.

Question 35: For the subnet mask bits /31, what is the number of /24 subnets?

  • 2
  • 8
  • 64
  • 128

Question 36: For the subnet mask bits /24, what is the number of /25 subnets?

  • 1
  • 2
  • 4
  • 8

Question 37: The EGP protocol exchanges routing information between autonomous systems. Which of the following is an exterior gateway protocol?

  • BGP.
  • EIGRP.
  • OSPF.
  • RIP.

Question 38: Which of the following statements best describes middlebox devices?

  • A firewall is a type of middlebox device.
  • Middlebox devices operate only in the network layer.
  • Middlebox devices are routers that process, modify, and forward IP packets.
  • Middlebox devices act as network hubs that forward data to multiple devices.

Question 39: The purpose of the ICMPv4 is to do which of the following?

  • Calculate MTU
  • Determine protocol
  • Determine destination
  • Generate an error message

Question 40: Most data link protocols use:

  • a checksum.
  • traffic control.
  • a port number.
  • a user passwor

Question 41: Which type of cable is found in a public network?

  • Coaxial
  • Optical fiber
  • Plenum cable
  • Twisted pair

Question 42: What might you use to describe the interactions between the users and the provider of a computer network?

  • Algorithms
  • Hashing
  • Primitives
  • Time-sequence diagrams

Question 43: Which of the following protocol is designed to improve CSMA performance by terminating transmission as soon as a collision occurs?

  • ALOH
  • CSMA/C
  • CSMA/C
  • VTCSM

Question 44: Which of the following is one of the CSMA access modes that supports an aggressive transmission algorithm?

  • 1-persistent.
  • 2-persistent.
  • 3-persistent.
  • 4-persistent.

Question 45: Which of the following statement about the physical layer protocol is true?

  • The physical layer uses the port number to deliver traffi
  • The physical layer changes the value of a bit being transmitted due to electromagnetic interference.
  • The physical specifies the shared protocols and interface methods used by hosts in a communications network.
  • The physical layer provides the mechanism for opening, closing, and managing a session between end-user application processes.

Question 46: The unit of information for transfer between two entities of the data link layer is a:

  • bit.
  • channel.
  • frame.
  • packet.

Question 47: Which OSI layer breaks data up into individual frames to prepare it for transfer across a network?

  • Data link
  • Network
  • Session
  • Transport

Question 48: Which transmission mode is used to send a video or radio signal in a TV transmission over your LAN?

  • Anycast
  • Broadcast
  • Multicast
  • Point-to-point transport

Question 49: ___ is a cloud computing solution that is implemented outside the company’s firewall and is under the control of a third party.

  • Public cloud
  • Private cloud
  • Platform as a service
  • Software as a service

Question 50: ___ allows developers to develop and test an application without worrying about the underlying infrastructure and ___ provides storage, infrastructure, and connectivity to a consumer.

  • IaaS, SaaS
  • PaaS, IaaS
  • SaaS, PaaS
  • SaaS, IaaS

Question 51: How are the interactions between a user and a service provider expressed as an abstract representation?

  • Checksum
  • Hashing
  • Parity
  • Primitive

Question 52: The networking process for review and revision is documented by a:

  • protocol.
  • RFC.
  • standard.
  • W3C publication.

Question 53: The data link layer provides reliable delivery of information due to its _____.

  • connection-oriented characteristics
  • error detection
  • fixed-length frames
  • media access control

Question 54: What is the network topology typically used by cable TV networks?

  • Bus
  • Ring
  • Star
  • Tree

Question 55: Throughout this course, you have been asked to understand a number of concepts underlying the computer networks. Which of the following statements best sums up these concepts?

  • Different types of devices enable all hosts to exchange information.
  • Information sent on computer networks always reaches its destination.
  • Protocols are the processes that occur in the computer networks.
  • Protocols are used to make phone calls over computer networks.

Question 56: The physical layer delivers 1000 bits to the receiver. However, the receiver only receives 900 bits. Which of the following characteristics describes the behavior of the physical layer?

  • Compressed
  • Error-free
  • Reliable
  • Unreliable

Question 57: A service provided by the physical layer is:

  • user authorization.
  • transmission of long messages.
  • the transfer of data frames from one node to another.
  • bit transmission between nodes attached to the same physical transmission channel.

Question 58: How many layers comprise the OSI Model?

  • 3
  • 5
  • 7
  • 9

Question 59: The session layer in the OSI reference model is similar to which layer in the TCP/IP model?

  • Application
  • Internet
  • Routing
  • Session

Question 60: A manager is a host that runs which of the following SNMP processes?

  • Client
  • Server
  • TCP
  • UDP

Question 61: A(n) _____ query is defined as a query for the domain name that corresponds to a given IP address.

  • Reverse
  • Resource
  • Robust
  • Zone

Question 62: The most widely used application/programming interface for TCP is the:

  • ADU.
  • layer.
  • socket.
  • telnet.

Question 63: The syntax used in the URL requires the:

  • IP address.
  • HTTP protocol.
  • document location.
  • web server details.

Question 64: Which of the following is a main entity in the client-server environment?

  • Network
  • Peer-to-peer
  • Routing
  • Switching

Question 65: Which of the following does SNMP define to be sent from a manager to an agent and vice versa?

  • Username
  • Number of packets
  • Format of the packets
  • Encoding of the packets

Question 66: Select the correct order of mail transfer phases in SMTP protocol.

  • Authorization, establish a connection, mail transfer
  • Mail transfer, authorization, connection termination
  • Authentication, mail transfer, connection termination
  • Establish a connection, mail transfer, connection termination

Question 67: Which of the following describe the features that are supported by the transport layer?

  • Connection-oriented, flow control, and multiplexing
  • Data encoding, frame error checking, and session support
  • Frame fragmentation, file sharing, and network management
  • Remote file access, data encryption, and media access control

Question 68: A complex solution to detect transmission errors is:

  • even parity.
  • Internet checksums.
  • error-correcting codes.
  • cyclical redundancy check.

Question 69: The IP subnet address can be represented as a(n):

  • address.
  • CIDR.
  • interface.
  • netmask.

Question 70: How does CSMA/CD react to collisions?

  • Collisions do not occur on CSMA/CD.
  • All systems jam the network, and then all begin transmitting again.
  • Hosts involved in a collision send an RTS signal indicating a time frame in which to retransmit.
  • Hosts involved in the collision send a jam signal, and then run an algorithm before retransmitting.

Question 71: Which of the following is a communication protocol that uses a three-byte frame that travels around a logical ring of workstations or servers?

  • CSMA/CA
  • CSMA/CD
  • Frame ring
  • Token ring

Question 72: What is the size of a MAC address?

  • 16 bits
  • 32 bits
  • 48 bits
  • 64 bits

Question 73: All client computers are configured to receive IP addresses from the DHCP server. However, clients on Subnet B cannot access clients on Subnet A. What is the most likely cause of this problem?

  • IPv6 is disabled.
  • Server option is disabled.
  • The IP address is not available in DHCP scope.
  • The IP address for the DNS Server is not available in scope option.

Question 74: For the subnet mask bits /28, what is the number of addresses?

  • 12
  • 14
  • 16
  • 28

Question 75: Which of the following networking protocols is used to transfer files between a client and server on a computer network and secured with SSL or SSH authentication?

  • ICMP
  • FTP
  • TCP
  • UDP

Question 76: What is the unit of information transferred in the physical layer?

  • Bit
  • Datagram
  • Fragment
  • Packet

Question 77: Which of the following is a connectionless transport protocol?

  • SCTP
  • TCP
  • Telnet
  • UDP

Question 78: The UDP service is characterized by:

  • its reliability.
  • being connectionless.
  • its unlimited message size.
  • its user authentication method.

Question 79: The ICMPv6 is used by the data link layer to:

  • autoconfigure addresses.
  • determine the packet is too big.
  • determine the address is unreachable.
  • determine transmission time is exceeded.

Question 80: Select the network service that allows a host to retrieve its assigned IPv4 address automatically.

  • ARP
  • DHCP
  • DNS
  • RARP

Question 81: A security issue in the transport layer occurs when:

  • a virus is spread.
  • the packet is lost in transmission.
  • the checksum algorithm detects an error.
  • the information becomes corrupted by a non-transmission error.

Question 82: Which statement best describes a host name?

  • It replaces the IP address.
  • t is assigned by the IETF.
  • It is composed of two parts.
  • It does not have to be unique

Question 83: In a reliable connectionless service, packets:

  • cannot be lost.
  • can be modified.
  • can be duplicated.
  • can suffer transmission errors.

Question 84: Which of the following fields is found in an IPv4 header but not in an IPv6 header?

  • IHL.
  • Source address.
  • Destination address.
  • TTL or Hop Limit.

Question 85: Your LAN is running a Voice over IP application that is processing slowly, or not at all. You have determined that it is due to the IPv6

header overhead. Which of the following techniques/services will best resolve the issue?

  • Data compression
  • Data fragmentation
  • Data reassembly
  • Data reorganization

Question 86: Which of the following belongs to the link layer?

  • LAN devices
  • MAC addresses
  • NBMA networks
  • Point-to-point links

Question 87: A distributed algorithm can be used for:

  • concurrent processing.
  • preventing packet loss.
  • delaying transmissions.
  • creating recovery messages.

Question 88: Which layer from OSI layer model facilitates the creation, sending, and receiving of bits?

  • Data link
  • Physical
  • Session
  • Transport

Question 89: The ICMPv6 protocol is configured in your network but is giving destination unreachable ICMP messages. Which of the following

  • could be responsible for destination unreachable error messages?
  • hop limit exceeded in transit
  • beyond the scope of source address
  • erroneous header field encountered
  • fragment reassembly time exceeded

Question 90: Each end of the TCP connection uses a buffer to speed up data flow when the network is busy. Which of the following processes

manages the flow controls?

  • Buffer control
  • Sliding window
  • Traffic avoidance
  • Congestion control

Question 91: What does the receiver use to extract frames from the bit stream?

  • Big endian
  • Character stuffing
  • MAC padding
  • Reverse lookup

Question 92: Amazon provides ___ cloud computing and Microsoft supports the ___ cloud computing model.

  • Azure, EC2
  • EC2, Azure
  • Deep Blue, EC2
  • Deep Blue, Azure

Question 93: Select the correct architecture in which each host can simultaneously act as both a client and a server.

  • Client-server
  • Client-queue-client
  • Client-server three-tier model
  • Peer-to-Peer

Question 94: Which of the following is an example of a client-server protocol?

  • IP
  • LCP
  • NCP
  • SIP

Question 95: A reliable transport layer includes:

  • DNS lookup.
  • user authentication.
  • IP packet forwarding.
  • connection establishment.

Question 96: When a router receives a packet, the router does which of the following?

  • Checks the digital signature
  • Performs network address translation
  • Store the state information about the packet
  • Forwards the data packets between computer networks

Question 97: A radio signal can be sent using which of the following?

  • Bluetooth
  • Coaxial cable
  • Optical fiber
  • Wireless network

Question 98: A MAC address is an example of the:

  • application layer.
  • data link layer.
  • physical layer.
  • transport layer

Question 99: Which of the following is a phase of the POP protocol?

  • Authorization
  • Closure
  • Handshaking
  • Transmission

Question 100: The language used to encode documents on the web is:

  • HTML.
  • HTTP.
  • Unicode.
  • XML.

Question 101: A deadlock occurs in the transport layer when the:

  • segment is lost.
  • checksum result is invalid.
  • transmission error is random.
  • data transmission is bidirectional.

Question 102: A random burst error in a segment of the transport layer occurs when:

  • one bit flips.
  • a group of bits flip.
  • using UDP instead of TCP.
  • most bits in the segment flip

Question 103: A _____ cable has an insulator that minimizes the emission of dangerous fumes in the event of fire.

  • coaxial
  • plastic
  • STP twisted pair
  • UTP twisted pair

Question 104: A great resource used by network maintenance/support personnel when researching the evolution of a protocol is/are the:

  • Cisco standards.
  • IEEE.
  • RFC.
  • vendor device manual.

Question 105: The presentation layer in the OSI reference model is similar to which layer in the TCP/IP model?

  • Application
  • Internet
  • Presentation
  • Session

Question 106: The hop limit field in IPv6 has the same purpose as which field in the IPv4 header?

  • Extension header
  • MTU
  • TTL
  • UDP

Question 107: The Internet layer in the TCP/IP reference model is the equivalent to which layer in the OSI model?

  • Application
  • Data link
  • Network
  • Transport

Question 108:  Which of the following protocols runs on TCP port 22 and operates network services securely over an unsecured network?

  • CyberGate
  • SGMP
  • SSH
  • TACACS+

Question 109: It is often necessary to exchange information between hosts that are not attached to the same physical medium. Which layer’s basic function is to facilitate this exchange?

  • Data link
  • Network
  • Physical
  • Transport

Question 110:  Your LAN is running a Voice over IP application that is processing slowly, or not at all. You have determined that it is due to the IPv6 header overhead. Which of the following techniques/services will best resolve the issue?

  • Data compression
  • Data fragmentation
  • Data reassembly
  • Data reorganization

Question 111: Which of the data link layer protocols supports retransmission of lost or corrupted messages?

  • Token ring
  • Alternating bit protocol
  • Address routing protocol
  • Asynchronous transport mode

Question 112: Which of the following is an element of the WWW protocol?

  • DHCP
  • DNS
  • HTML
  • XML

Question 113: The layer that builds on the service provided by the underlying physical layer is the:

  • data link layer.
  • network layer.
  • transport layer.
  • physical layer.

Question 114 : The TCP/IP reference model combines the data link and another layer in its link layer. What is the second layer?

Select one:

  • Application
  • Network
  • Physical
  • Transport

Question 115 : he ICMPv6 protocol is configured in your network but is giving destination unreachable ICMP messages. Which of the following could be responsible for destination unreachable error messages?

Select one:

  • hop limit exceeded in transit
  • beyond the scope of source address
  • erroneous header field encountered
  • fragment reassembly time exceeded

Question 116 : An address is considered CIDR if the address or routing prefix is written with a suffix indicating the number of bits of the prefix. Select the correct CIDR notation from the following list.

Select one:

  • 192.168.0.1
  • 192.168.1.1/24
  • 192.168.1.1 255.255.255.0
  • 255.255.255.0

Conclusion

Hopefully, this article will be useful for you to find all the Modules and Final Quiz Answers of CS402: Computer Communications and Networks and grab some premium knowledge with less effort. If this article really helped you in any way then make sure to share it with your friends on social media and let them also know about this amazing training. You can also check out our other course Answers. So, be with us guys we will share a lot more free courses and their exam/quiz solutions also and follow our Techno-RJ Blog for more updates.

Leave a Comment

Ads Blocker Image Powered by Code Help Pro
Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Refresh