Hello Technocrats, Today we are going to share Waze Ads Fundamentals Certification Course Exam Answers. This certification course is totally free of cost✅✅✅ for you which is provided by Google.
Here, you will find Computer Communications and Networks Certification Final Exam Answers in Bold Color which are given below.
These answers are updated recently and are 100% correct✅ answers of all modules and final exam answers of Computer Communications and Networks Certification Final Exam Answers from Saylor Academy Certification Course.
Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer.
Apply Link – Computer Communications and Networks Certification
Computer Communications and Networks Certification Final Exam Answers
Question 1: The networking standards development process is documented by:
- ISO standards.
- a protocol.
- an RFC.
- a standar
Question 2: Which transmission mode should be used to send information from a single point to another point?
- Anycast
- Broadcast
- Multicast
- Unicast
Question 3: In a complete data transmission (request and response), the diagram would contain which of the following?
- Two layers
- Five layers
- Two columns with matching layers.
- Five columns with matching layers.
Question 4: A LAN typically interconnects devices located where?
- Anywhere on Earth
- In your city
- In your house
- Within 10 meters of one another
Question 5: What is the network that typically interconnects devices with network capabilities located anywhere on Earth?
- Internet
- LAN
- PAN
- WAN
Question 6: Which of the following network topologies would reduce network failure by connecting all the network nodes to a central node?
- Bus
- Ring
- Star
- Tree
Question 7: What is the RFC?
- A database of Internet services
- A numeric linking system used by your text
- A numeric listing of TCP/IP protocols
- A tracking system for network development requirements
Question 8: Which of the following layers is unique to the TCP/IP reference model?
- Application
- Internet
- Transport
- VoIP
Question 9: The protocols for email and web file access are described in which layer of the Internet protocol?
- Network
- Presentation
- Session
- Transport
Question 10: Which of the following is a characteristic of the TCP service?
- It is authenticate
- It is bidirectional.
- It is connectionless.
- It is unreliable.
Question 11: An element of the WWW protocol is:
- HTML.
- JavaScript.
- Jav
- XML.
Question 12: The ______ access layer in the TCP/IP reference model is the combination of the Application, Presentation, and Session layers in the OSI reference model.
- Application
- Internet
- Network
- Transport
Question 13: The application layer in the TCP/IP reference model is different from which layer in the OSI model?
- Application
- Communication
- Presentation
- Session
Question 14: Which of the following layers is a combination of the Application, Presentation, and Session layer in the TCP/IP reference model?
- Application
- Internet
- Network Interface
- Transport
Question 15: The OSI Reference Model layers, in order from top to bottom, are:
- Application, physical, session, transport, network, data link, presentation.
- Application, presentation, network, session, transport, data link, physical.
- Application, presentation, session, transport, network, data link, physical.
- Physical, data link, network, transport, session, presentation, application.
Question 16: Which of the following is a protocol used to retrieve email messages?
- MTP
- POP
- SMTP
- SNMP
Question 17: The most widely used application/programming interface for UDP is the:
- ADU.
- layer.
- socket.
- telnet.
Question 18: A MIME message must:
- identify spam.
- be in binary format.
- allow audio/video transmissions.
- support only one format in a single message.
Question 19: Which of the following describes SMTP?
- It utilizes UDP.
- It allows web access.
- It answers with multi-line replies.
- It relies on the client-server model.
Question 20: PPP utilizes which of the following?
- Bit stuffing for asynchronous lines
- Character stuffing for synchronous lines
- CRC for error detection
- CRC for error ion
Question 21: What is the unit of information exchanged between two entities in the application layer?
- An ADU
- A bit
- A datagram
- A packet
Question 22: As a network engineer, you are required to write a simple socket program. What are the parameters you need to specify while creating a socket?
- Socket address and socket family
- Socket message and socket header
- Socket stream and datagram socket
- Socket type and address domain
Question 23: The HTTP request header:
- contains no-cache.
- contains no-transform.
- allows client information.
- contains the date, server, and content information.
Question 24: The HTTP response header:
- allows client information.
- contains the data file content information.
- contains the status and content information.
- contains the date, server, and content information.
Question 25: The function of Domain Name System is to:
- route the IP packet to the destination.
- translate computer hostnames to IP addresses.
- translate IP addresses to computer hostnames.
- automatically assign IP address to network device.
Question 26: Which of the following best describes the Stream Control Transmission Protocol (SCTP)?
- Reliable, message-oriented
- Reliable, character-oriented
- Unreliable, message-oriented
- Unreliable, character-oriented
Question 27: A connectionless service can be modeled by using just two primitives containing the SDU parameter. What information is contained in the SDU?
- The message
- The source address
- The address of the sender
- The address of the recipient
Question 28: A connection-oriented transport protocol is:
- Frame Relay.
- ICMP.
- IPX.
- TIP
Question 29: What is the unit of exchange in the transport layer?
- Bits
- Data
- Packets
- Segments
Question 30: A random isolated error in a segment in the transport layer occurs when:
- one bit flips.
- a group of bits flip.
- two consecutive bits flip.
- most bits in the segment flip.
Question 31: How many bits are needed for the Alternating Bit Protocol?
- 1
- 3
- 5
- 7
Question 32: The ___ layer is responsible for ensuring that messages are delivered in sequence and with no duplication.
- Application
- Network
- Physical
- Transport
Question 33: The network layer allows your LAN to exchange information with other networks through an intermediate system called a:
- datagram.
- frame.
- packet.
- router.
Question 34: All client computers are configured to receive IP addresses from the DHCP server. However, clients on Subnet B cannot access clients on Subnet What is the most likely cause of this problem?
- IPv6 is disable
- Server option is disable
- The IP address is not available in DHCP scope.
- The IP address for the DNS Server is not available in scope option.
Question 35: For the subnet mask bits /31, what is the number of /24 subnets?
- 2
- 8
- 64
- 128
Question 36: For the subnet mask bits /24, what is the number of /25 subnets?
- 1
- 2
- 4
- 8
Question 37: The EGP protocol exchanges routing information between autonomous systems. Which of the following is an exterior gateway protocol?
- BGP.
- EIGRP.
- OSPF.
- RIP.
Question 38: Which of the following statements best describes middlebox devices?
- A firewall is a type of middlebox device.
- Middlebox devices operate only in the network layer.
- Middlebox devices are routers that process, modify, and forward IP packets.
- Middlebox devices act as network hubs that forward data to multiple devices.
Question 39: The purpose of the ICMPv4 is to do which of the following?
- Calculate MTU
- Determine protocol
- Determine destination
- Generate an error message
Question 40: Most data link protocols use:
- a checksum.
- traffic control.
- a port number.
- a user passwor
Question 41: Which type of cable is found in a public network?
- Coaxial
- Optical fiber
- Plenum cable
- Twisted pair
Question 42: What might you use to describe the interactions between the users and the provider of a computer network?
- Algorithms
- Hashing
- Primitives
- Time-sequence diagrams
Question 43: Which of the following protocol is designed to improve CSMA performance by terminating transmission as soon as a collision occurs?
- ALOH
- CSMA/C
- CSMA/C
- VTCSM
Question 44: Which of the following is one of the CSMA access modes that supports an aggressive transmission algorithm?
- 1-persistent.
- 2-persistent.
- 3-persistent.
- 4-persistent.
Question 45: Which of the following statement about the physical layer protocol is true?
- The physical layer uses the port number to deliver traffi
- The physical layer changes the value of a bit being transmitted due to electromagnetic interference.
- The physical specifies the shared protocols and interface methods used by hosts in a communications network.
- The physical layer provides the mechanism for opening, closing, and managing a session between end-user application processes.
Question 46: The unit of information for transfer between two entities of the data link layer is a:
- bit.
- channel.
- frame.
- packet.
Question 47: Which OSI layer breaks data up into individual frames to prepare it for transfer across a network?
- Data link
- Network
- Session
- Transport
Question 48: Which transmission mode is used to send a video or radio signal in a TV transmission over your LAN?
- Anycast
- Broadcast
- Multicast
- Point-to-point transport
Question 49: ___ is a cloud computing solution that is implemented outside the company’s firewall and is under the control of a third party.
- Public cloud
- Private cloud
- Platform as a service
- Software as a service
Question 50: ___ allows developers to develop and test an application without worrying about the underlying infrastructure and ___ provides storage, infrastructure, and connectivity to a consumer.
- IaaS, SaaS
- PaaS, IaaS
- SaaS, PaaS
- SaaS, IaaS
Question 51: How are the interactions between a user and a service provider expressed as an abstract representation?
- Checksum
- Hashing
- Parity
- Primitive
Question 52: The networking process for review and revision is documented by a:
- protocol.
- RFC.
- standard.
- W3C publication.
Question 53: The data link layer provides reliable delivery of information due to its _____.
- connection-oriented characteristics
- error detection
- fixed-length frames
- media access control
Question 54: What is the network topology typically used by cable TV networks?
- Bus
- Ring
- Star
- Tree
Question 55: Throughout this course, you have been asked to understand a number of concepts underlying the computer networks. Which of the following statements best sums up these concepts?
- Different types of devices enable all hosts to exchange information.
- Information sent on computer networks always reaches its destination.
- Protocols are the processes that occur in the computer networks.
- Protocols are used to make phone calls over computer networks.
Question 56: The physical layer delivers 1000 bits to the receiver. However, the receiver only receives 900 bits. Which of the following characteristics describes the behavior of the physical layer?
- Compressed
- Error-free
- Reliable
- Unreliable
Question 57: A service provided by the physical layer is:
- user authorization.
- transmission of long messages.
- the transfer of data frames from one node to another.
- bit transmission between nodes attached to the same physical transmission channel.
Question 58: How many layers comprise the OSI Model?
- 3
- 5
- 7
- 9
Question 59: The session layer in the OSI reference model is similar to which layer in the TCP/IP model?
- Application
- Internet
- Routing
- Session
Question 60: A manager is a host that runs which of the following SNMP processes?
- Client
- Server
- TCP
- UDP
Question 61: A(n) _____ query is defined as a query for the domain name that corresponds to a given IP address.
- Reverse
- Resource
- Robust
- Zone
Question 62: The most widely used application/programming interface for TCP is the:
- ADU.
- layer.
- socket.
- telnet.
Question 63: The syntax used in the URL requires the:
- IP address.
- HTTP protocol.
- document location.
- web server details.
Question 64: Which of the following is a main entity in the client-server environment?
- Network
- Peer-to-peer
- Routing
- Switching
Question 65: Which of the following does SNMP define to be sent from a manager to an agent and vice versa?
- Username
- Number of packets
- Format of the packets
- Encoding of the packets
Question 66: Select the correct order of mail transfer phases in SMTP protocol.
- Authorization, establish a connection, mail transfer
- Mail transfer, authorization, connection termination
- Authentication, mail transfer, connection termination
- Establish a connection, mail transfer, connection termination
Question 67: Which of the following describe the features that are supported by the transport layer?
- Connection-oriented, flow control, and multiplexing
- Data encoding, frame error checking, and session support
- Frame fragmentation, file sharing, and network management
- Remote file access, data encryption, and media access control
Question 68: A complex solution to detect transmission errors is:
- even parity.
- Internet checksums.
- error-correcting codes.
- cyclical redundancy check.
Question 69: The IP subnet address can be represented as a(n):
- address.
- CIDR.
- interface.
- netmask.
Question 70: How does CSMA/CD react to collisions?
- Collisions do not occur on CSMA/CD.
- All systems jam the network, and then all begin transmitting again.
- Hosts involved in a collision send an RTS signal indicating a time frame in which to retransmit.
- Hosts involved in the collision send a jam signal, and then run an algorithm before retransmitting.
Question 71: Which of the following is a communication protocol that uses a three-byte frame that travels around a logical ring of workstations or servers?
- CSMA/CA
- CSMA/CD
- Frame ring
- Token ring
Question 72: What is the size of a MAC address?
- 16 bits
- 32 bits
- 48 bits
- 64 bits
Question 73: All client computers are configured to receive IP addresses from the DHCP server. However, clients on Subnet B cannot access clients on Subnet A. What is the most likely cause of this problem?
- IPv6 is disabled.
- Server option is disabled.
- The IP address is not available in DHCP scope.
- The IP address for the DNS Server is not available in scope option.
Question 74: For the subnet mask bits /28, what is the number of addresses?
- 12
- 14
- 16
- 28
Question 75: Which of the following networking protocols is used to transfer files between a client and server on a computer network and secured with SSL or SSH authentication?
- ICMP
- FTP
- TCP
- UDP
Question 76: What is the unit of information transferred in the physical layer?
- Bit
- Datagram
- Fragment
- Packet
Question 77: Which of the following is a connectionless transport protocol?
- SCTP
- TCP
- Telnet
- UDP
Question 78: The UDP service is characterized by:
- its reliability.
- being connectionless.
- its unlimited message size.
- its user authentication method.
Question 79: The ICMPv6 is used by the data link layer to:
- autoconfigure addresses.
- determine the packet is too big.
- determine the address is unreachable.
- determine transmission time is exceeded.
Question 80: Select the network service that allows a host to retrieve its assigned IPv4 address automatically.
- ARP
- DHCP
- DNS
- RARP
Question 81: A security issue in the transport layer occurs when:
- a virus is spread.
- the packet is lost in transmission.
- the checksum algorithm detects an error.
- the information becomes corrupted by a non-transmission error.
Question 82: Which statement best describes a host name?
- It replaces the IP address.
- t is assigned by the IETF.
- It is composed of two parts.
- It does not have to be unique
Question 83: In a reliable connectionless service, packets:
- cannot be lost.
- can be modified.
- can be duplicated.
- can suffer transmission errors.
Question 84: Which of the following fields is found in an IPv4 header but not in an IPv6 header?
- IHL.
- Source address.
- Destination address.
- TTL or Hop Limit.
Question 85: Your LAN is running a Voice over IP application that is processing slowly, or not at all. You have determined that it is due to the IPv6
header overhead. Which of the following techniques/services will best resolve the issue?
- Data compression
- Data fragmentation
- Data reassembly
- Data reorganization
Question 86: Which of the following belongs to the link layer?
- LAN devices
- MAC addresses
- NBMA networks
- Point-to-point links
Question 87: A distributed algorithm can be used for:
- concurrent processing.
- preventing packet loss.
- delaying transmissions.
- creating recovery messages.
Question 88: Which layer from OSI layer model facilitates the creation, sending, and receiving of bits?
- Data link
- Physical
- Session
- Transport
Question 89: The ICMPv6 protocol is configured in your network but is giving destination unreachable ICMP messages. Which of the following
- could be responsible for destination unreachable error messages?
- hop limit exceeded in transit
- beyond the scope of source address
- erroneous header field encountered
- fragment reassembly time exceeded
Question 90: Each end of the TCP connection uses a buffer to speed up data flow when the network is busy. Which of the following processes
manages the flow controls?
- Buffer control
- Sliding window
- Traffic avoidance
- Congestion control
Question 91: What does the receiver use to extract frames from the bit stream?
- Big endian
- Character stuffing
- MAC padding
- Reverse lookup
Question 92: Amazon provides ___ cloud computing and Microsoft supports the ___ cloud computing model.
- Azure, EC2
- EC2, Azure
- Deep Blue, EC2
- Deep Blue, Azure
Question 93: Select the correct architecture in which each host can simultaneously act as both a client and a server.
- Client-server
- Client-queue-client
- Client-server three-tier model
- Peer-to-Peer
Question 94: Which of the following is an example of a client-server protocol?
- IP
- LCP
- NCP
- SIP
Question 95: A reliable transport layer includes:
- DNS lookup.
- user authentication.
- IP packet forwarding.
- connection establishment.
Question 96: When a router receives a packet, the router does which of the following?
- Checks the digital signature
- Performs network address translation
- Store the state information about the packet
- Forwards the data packets between computer networks
Question 97: A radio signal can be sent using which of the following?
- Bluetooth
- Coaxial cable
- Optical fiber
- Wireless network
Question 98: A MAC address is an example of the:
- application layer.
- data link layer.
- physical layer.
- transport layer
Question 99: Which of the following is a phase of the POP protocol?
- Authorization
- Closure
- Handshaking
- Transmission
Question 100: The language used to encode documents on the web is:
- HTML.
- HTTP.
- Unicode.
- XML.
Question 101: A deadlock occurs in the transport layer when the:
- segment is lost.
- checksum result is invalid.
- transmission error is random.
- data transmission is bidirectional.
Question 102: A random burst error in a segment of the transport layer occurs when:
- one bit flips.
- a group of bits flip.
- using UDP instead of TCP.
- most bits in the segment flip
Question 103: A _____ cable has an insulator that minimizes the emission of dangerous fumes in the event of fire.
- coaxial
- plastic
- STP twisted pair
- UTP twisted pair
Question 104: A great resource used by network maintenance/support personnel when researching the evolution of a protocol is/are the:
- Cisco standards.
- IEEE.
- RFC.
- vendor device manual.
Question 105: The presentation layer in the OSI reference model is similar to which layer in the TCP/IP model?
- Application
- Internet
- Presentation
- Session
Question 106: The hop limit field in IPv6 has the same purpose as which field in the IPv4 header?
- Extension header
- MTU
- TTL
- UDP
Question 107: The Internet layer in the TCP/IP reference model is the equivalent to which layer in the OSI model?
- Application
- Data link
- Network
- Transport
Question 108: Which of the following protocols runs on TCP port 22 and operates network services securely over an unsecured network?
- CyberGate
- SGMP
- SSH
- TACACS+
Question 109: It is often necessary to exchange information between hosts that are not attached to the same physical medium. Which layer’s basic function is to facilitate this exchange?
- Data link
- Network
- Physical
- Transport
Question 110: Your LAN is running a Voice over IP application that is processing slowly, or not at all. You have determined that it is due to the IPv6 header overhead. Which of the following techniques/services will best resolve the issue?
- Data compression
- Data fragmentation
- Data reassembly
- Data reorganization
Question 111: Which of the data link layer protocols supports retransmission of lost or corrupted messages?
- Token ring
- Alternating bit protocol
- Address routing protocol
- Asynchronous transport mode
Question 112: Which of the following is an element of the WWW protocol?
- DHCP
- DNS
- HTML
- XML
Question 113: The layer that builds on the service provided by the underlying physical layer is the:
- data link layer.
- network layer.
- transport layer.
- physical layer.
Question 114 : The TCP/IP reference model combines the data link and another layer in its link layer. What is the second layer?
Select one:
- Application
- Network
- Physical
- Transport
Question 115 : he ICMPv6 protocol is configured in your network but is giving destination unreachable ICMP messages. Which of the following could be responsible for destination unreachable error messages?
Select one:
- hop limit exceeded in transit
- beyond the scope of source address
- erroneous header field encountered
- fragment reassembly time exceeded
Question 116 : An address is considered CIDR if the address or routing prefix is written with a suffix indicating the number of bits of the prefix. Select the correct CIDR notation from the following list.
Select one:
- 192.168.0.1
- 192.168.1.1/24
- 192.168.1.1 255.255.255.0
- 255.255.255.0
Conclusion
Hopefully, this article will be useful for you to find all the Modules and Final Quiz Answers of CS402: Computer Communications and Networks and grab some premium knowledge with less effort. If this article really helped you in any way then make sure to share it with your friends on social media and let them also know about this amazing training. You can also check out our other course Answers. So, be with us guys we will share a lot more free courses and their exam/quiz solutions also and follow our Techno-RJ Blog for more updates.
Thanks for every other informative blog. The place else may just I am getting that kind of info written in such an ideal approach? I’ve a challenge that I’m simply now working on, and I’ve been on the look out for such information.
Saved as a favorite, I really like your blog!
Some truly marvellous work on behalf of the owner of this website , dead great subject matter.
Just wanna input that you have a very decent site, I like the layout it actually stands out.
I reckon something truly interesting about your blog so I saved to bookmarks.
Hi, Neat post. There is an issue together with your website in web explorer, may test this… IE still is the marketplace leader and a large element of people will pass over your wonderful writing due to this problem.
Whoa! This blog looks just like my old one! It’s on a completely different topic but it has pretty much the same page layout and design. Outstanding choice of colors!
Some truly nice stuff on this site, I love it.
Wow, superb blog format! How lengthy have you been running a blog for? you make blogging glance easy. The full look of your site is wonderful, let alone the content!
This is the right blog for anyone who wants to find out about this topic. You realize so much its almost hard to argue with you (not that I actually would want…HaHa). You definitely put a new spin on a topic thats been written about for years. Great stuff, just great!
It is really a great and useful piece of info. I’m glad that you shared this helpful info with us. Please keep us up to date like this. Thanks for sharing.
I have been exploring for a little for any high-quality articles or blog posts on this sort of area . Exploring in Yahoo I at last stumbled upon this website. Reading this info So i am happy to convey that I’ve a very good uncanny feeling I discovered just what I needed. I most certainly will make sure to don’t forget this site and give it a look on a constant basis.
It is perfect time to make some plans for the future and it’s time to be happy. I’ve read this submit and if I may just I desire to counsel you few attention-grabbing issues or advice. Perhaps you can write next articles relating to this article. I desire to read more issues approximately it!
This actually answered my drawback, thank you!
I conceive you have mentioned some very interesting points, thanks for the post.
I am glad to be a visitor of this everlasting web site! , thanks for this rare information! .
It’s appropriate time to make some plans for the future and it’s time to be happy. I’ve read this post and if I could I wish to suggest you few interesting things or suggestions. Maybe you can write next articles referring to this article. I desire to read even more things about it!
Keep working ,remarkable job!
Hi my family member! I want to say that this article is amazing, nice written and come with almost all vital infos. I’d like to see more posts like this.
I’m typically to blogging and i really admire your content. The article has actually peaks my interest. I’m going to bookmark your site and preserve checking for new information.
I really like your writing style, superb info , regards for posting : D.
Its like you read my mind! You appear to know so much about this, like you wrote the book in it or something. I think that you could do with a few pics to drive the message home a bit, but other than that, this is magnificent blog. A great read. I’ll certainly be back.
Can I just say what a relief to find someone who actually knows what theyre talking about on the internet. You definitely know how to bring an issue to light and make it important. More people need to read this and understand this side of the story. I cant believe youre not more popular because you definitely have the gift.
I’ve been browsing online more than three hours nowadays, yet I never found any attention-grabbing article like yours. It is pretty price sufficient for me. Personally, if all web owners and bloggers made good content material as you did, the web will likely be much more helpful than ever before.
You are my inhalation, I possess few blogs and very sporadically run out from to post .
Very interesting subject, appreciate it for posting. “To have a right to do a thing is not at all the same as to be right in doing it.” by G. K. Chesterton.
Appreciating the time and energy you put into your website and detailed information you provide. It’s good to come across a blog every once in a while that isn’t the same old rehashed material. Fantastic read! I’ve saved your site and I’m including your RSS feeds to my Google account.