Computer Networking Fundementals Final Exam – Flashcards

Unlock all answers in this set

Unlock answers
question
A router is considered to be a CSU/DSU.
answer
False
question
T-Carrier lines only require a CSU/DSU on the customer's side of the connection.
answer
False
question
Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.
answer
True
question
Link Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended.
answer
True
question
If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.
answer
False
question
A protocol analyzer, such as Wireshark, gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa.
answer
True
question
In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
answer
False
question
The ping command is used to determine the path between two devices.
answer
False
question
Most SNMP managers allow the configuration of thresholds for generating alert messages to network administrators when those thresholds are exceeded.
answer
True
question
Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean?
answer
1.54 Mbps is the guaranteed minimum transmission rate.
question
Select the true statement regarding analog and digital signals.
answer
Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.
question
When would you most likely NOT choose to use a leased line connection?
answer
when a nondedicated link is needed for backups
question
Which of the following is something X.25 does NOT offer?
answer
144 Mbps maximum throughput
question
What is the local loop, or last mile?
answer
the connection between the demarcation point and the CO
question
You're the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?
answer
reduced physical plant costs
question
Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?
answer
hosted platforms
question
Which of the following protocols is NOT used for Windows 7 VPN connections?
answer
SMTP
question
You are a network architect for an IT consulting company. One of your clients needs a WAN connection and has asked you about the disadvantage of a packet-switched WAN method. Which of the following is a disadvantage that applies?
answer
shared bandwidth
question
You have been asked to install a VPN remote access solution using Windows Server.What do you need to install?
answer
Routing and Remote Access Service (RRAS)
question
Which one of the following is NOT a typical SONET data rate?
answer
OC-9001
question
What would an Asynchronous Transfer Mode (ATM) network be best suited for?
answer
carrying voice data and time-sensitive information
question
Which cloud computing category allows a company to quickly provision additional disk space?
answer
hosted infrastructure
question
Which cloud computing category refers to the use of software hosted on a service provider's network, and is usually subscription based?
answer
hosted applications
question
Which statement about Multiprotocol Label Switching (MPLS) is true?
answer
MPLS works with any network layer protocol.
question
What is the signaling method used to allocate time slots for each channel in a T-carrier line called?
answer
Time Division Multiplexing (TDM)
question
The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?
answer
Basic Rate Interface (BRI
question
The plain old telephone service is a good example of what kind of WAN technology?
answer
circuit switched
question
Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an important distinction between the two technologies?
answer
T1 uses point to point, while frame relay makes use of virtual circuits.
question
Part of SONET's flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?
answer
fault tolerant bus
question
You are currently troubleshooting a network issue with your ISP's customer support agent. The agent requests that you open up command prompt and type "ping 127.0.0.1". What does this accomplish?
answer
tests that the local IP stack is functioning
question
Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down at a machine and try to ping a well-known website, which fails. You then try to ping a known-public IP address, which succeeds. What is most likely the issue?
answer
DNS settings are incorrect.
question
You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?
answer
incorrectly configured gateway address
question
Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?
answer
ipconfig /all
question
Your current backup schedule involves differential backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
answer
The last full backup should be restored first, followed by the last successful differential backup prior to the drive failure.
question
Your current backup schedule involves incremental backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
answer
The full backup must be restored first, followed by all incremental backups in sequential order leading up to the day of failure.
question
Following a massive infection of your network by a virus, you have been tasked with developing preventive measures for keeping the network infection free. What would be an effective preventive measure?
answer
Install an enterprise-based anti-virus solution.
question
Which of the following statistics should a network baseline report include
answer
hard drive utilization
question
You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue, you receive several more phone calls from other co-workers. Using the problem-solving process, what must be done first to effectively troubleshoot the issue?
answer
Determine what the problem is, and then figure out who has been affected on your network
question
You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swarm of help desk support requests, all originating from one specific floor in your building. After a few minutes on the phone with those affected, you determine that no one has indicator lights active on their NICs. What is most likely the problem?
answer
A network switch has not been powered on.
question
Which of the following is NOT a good practice for performing upgrades?
answer
ignoring updates to new releases
question
Which statement is true regarding differential / incremental backups?
answer
Incremental backups copy all files changed since the last full or incremental backup and marks files as backed up.
question
Select the utility inside of Windows that allows the user to recover a previous system state. This utility monitors drives and partitions, as well as registry settings and system files.
answer
System Restore
question
When using tape backup, what should be done to ensure that the backups are viable?
answer
Verify data can be restored.
question
The trial-and-error method should NOT be used under which of the following situations?
answer
The server is your public Web server and is currently hosting all of your business.
question
Traceroute would be best suited for which of the following tasks?
answer
locating bottlenecks in a network
question
What does the ping message "Destination host unreachable" message mean?
answer
The pinged IP address is on the same network, but an ARP reply was not received.
question
What does the ping message "Destination net unreachable" mean?
answer
A router in the path from the source to the destination determined that the destination network does not exist.
question
What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
answer
protocol analyzer
question
A junior network administrator tells you that he can ping a DNS server successfully, but he has not tested domain name lookups. What utility on the command line would you suggest your colleague use next?
answer
nslookup
question
End of Multiple Choice / Beginning of Completion
answer
...
question
________________ is a PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology.
answer
Frame relay
question
If a portion of a T-Carrier line is used for one purpose and a different portion for another purpose, the line has been ____________.
answer
fractionalized
question
A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.
answer
modem
question
The CPE must be able to send data in the correct format onto the connection that makes up the ___________ and receives data coming from that connection.
answer
local loop
question
________ is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.
answer
ATM
question
Most manufacturers store their technical support problems and solutions in a database called a knowledge base or a _______________________ document.
answer
frequently asked questions
question
To eliminate the potential problems caused by power fluctuations, especially on servers, you can install _________________
answer
uninterruptible power supplies
question
A ____________ copies selected files to the selected media without marking files as backed up.
answer
copy backup
question
The ________ Windows command is used to determine the network path between two devices.
answer
tracert
question
Whether your problem and proposed solution affect an entire network or just a few users, you must devise a ____________ so that you can return things to their original state if the solution doesn't work.
answer
rollback plan
question
Group accounts make it easier for an administrator to manage user rights and permissions.
answer
True
question
In Linux, every user that is created automatically belongs to a default group named Users.
answer
False
question
Windows can be installed on an extended partition that has been formatted with the NTFS file system.
answer
False
question
An event log entry that is an error is marked with a red circle with a white exclamation point in the center.
answer
True
question
RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.
answer
False
question
A security policy should clearly state the desired rules, even if they cannot be enforced.
answer
False
question
You don't need to physically secure your servers as long as you use a good strong password for your accounts.
answer
False
question
A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.
answer
True
question
A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
answer
False
question
In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions
answer
True
question
You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned?
answer
A. User must change password at next logon.
question
In regards to a user account, what does a white circle with a black arrow indicate?
answer
B. The account is disabled.
question
You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?
answer
C. global
question
In Linux, what is the command for viewing a file's contents onscreen?
answer
B. cat
question
A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
answer
D. Mandatory
question
The partition that contains the Windows OS files is known as the what type of partition?
answer
C. Boot
question
A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?
answer
D. Dynamic
question
If you need to limit the amount of data users can store on a volume, you would implement which of the following?
answer
B. Disk quotas
question
When a file is encrypted, what color does the file name appear in Windows Explorer?
answer
A. Green
question
Which of the following is NOT a Linux file system?
answer
D. SFS
question
Where are the waiting print jobs stored until they can be sent to the print device?
answer
D. print queue
question
What tool would you use to view error messages that are generated by system services or applications?
answer
B. Event Viewer
question
What is RAID level 1 also called?
answer
B. disk mirroring
question
What level of RAID does not provide fault tolerance?
answer
A. 0
question
How many disks are needed to implement a RAID 1 + 0?
answer
C. 4
question
Employees in the Sales department need to be able to access the sales share on the file server. They will need to have the ability to create files, read them, and make corrections or additions. Which of the following share permissions should the group be given?
answer
A. Change
question
The ultimate goal of network security is to protect which of the following?
answer
D. all of the above
question
What is a policy that defines the methods involved when a user logs on to the network called?
answer
C. authentication
question
Which of the following should not be a concern when discerning the level of security that is required in a network?
answer
A. how difficult it would be to enforce a password policy
question
In Windows 7, what is the maximum length that a password can be?
answer
D. 128
question
If the minimum password length on a Windows system is set to zero, what does that mean?
answer
B. The user can use a blank password.
question
Which one of the following passwords meets Windows password complexity requirement?
answer
C. N3tworking1O1
question
Which protocol is used to encrypt data as it travels a network?
answer
C. IPSec
question
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
answer
D. preshared key
question
When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
answer
B. USB key mode
question
If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
answer
A. network policy and access services
question
Which VPN implementation needs no additional configuration to be allowed access through a firewall?
answer
A. SSTP
question
What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?
answer
B. NAT
question
What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?
answer
B. malware
question
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
answer
A. rootkit
question
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
answer
D. spyware
question
The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
answer
D. WPA2
question
Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
answer
A. Port
question
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
answer
C. Smurf Attack
question
Which of the following are case sensitive?
answer
B. Windows password C. Linux logon name D. Linux password
question
Which of the following groups are special identity groups?
answer
B. authenticated users D. system E. self
question
Which of the following are standard NTFS permissions?
answer
A. List Folder Contents B. Read D. Write
question
When dealing with permissions in Linux, what are the three user types that can be assigned permissions?
answer
B. Group C. Other D. Owner
question
Which of the following can be used to secure data on disk drives?
answer
A. EFS D. BitLocker E. TrueCrypt
question
Firewall rules can be based on which of the following properties?
answer
A. source IP address C. protocol D. context
question
How the network resources are to be used should be clearly defined in a (an) ____________ policy.
answer
acceptable use
question
In Linux, passwords are stored in an encrypted format in the ____________ file, which is located in the /etc directory.
answer
shadow
question
____________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
answer
Kerberos
question
____________ is a free open-source product that can be used to encrypt the contents of an entire drive.
answer
TrueCrypt
question
A ____________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect.
answer
rootkit
question
When Windows is first installed, two user accounts are created by default. One is the Administrator account, and the other is the ____________ account.
answer
Guest
question
A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user's profile is called a ____________ profile.
answer
roaming
question
The ____________ file system supports a maximum file size of 2GB.
answer
FAT16
question
In Windows, the term for a computer that accepts job requests for a shared printer and sends them to the physical device is called a print ____________.
answer
Server
question
As a network administrator, it is a good idea to have a performance ____________, a collection of performance data from a time when the network is performing normally.
answer
baseline
question
File and printer sharing for Microsoft networks is an example of a network protocol.
answer
False
question
A network that has locations in different countries is considered a WAN.
answer
True
question
In order to find out your MAC address, you should open a command prompt and type ipconfig /all.
answer
True
question
What makes a computer a "server" is the fact that it has a server operating system installed on it.
answer
True
question
Each component of a computer is designed to perform only one specific task—either input, processing, or output.
answer
False
question
The XYZ company has two offices, one downtown, and a brand new office in the newer section of town. To connect the two offices, they will need a dedicated line, probably leased from the local phone company. What type of network will they be implementing to connect their two offices?
answer
c. MAN
question
Airwaves are an example of what type of network component?
answer
b. network medium
question
Windows 7, Windows Vista, and Windows XP are all examples of which of the following?
answer
b. client operating systems
question
What is one of the disadvantages of a peer-to-peer network compared to a server-based network?
answer
d. limited security
question
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
answer
b. net view
question
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
answer
a. additional costs
question
For any device to communicate with the computer, either through input or output, it must have what special software installed?
answer
d. device driver
question
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?
answer
c. encapsulation
question
Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called?
answer
c. MAC address
question
What was the primary reason to create a network?
answer
d. all of the above
question
You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?
answer
c. PCI-Express
question
You want a fast CPU for the new computer you are building and your motherboard only has one CPU socket. To increase the processing power, you need a CPU that provides more than one processor. What is this CPU called?
answer
a. multicore
question
Which component, located on the motherboard, carries out all the instructions provided by computer programs?
answer
d. CPU
question
You are the network administrator for a company and you want to separate the traffic from the accounting department from the rest of the network. However, the accounting department still needs to have access to other network resources. What type of network do you need to implement?
answer
b. internetwork
question
Which part of the network communication process is responsible for sending and receiving data to and from the network media?
answer
d. NIC driver
question
You're the network administrator for a company located in Arizona that has just opened an office in Texas. You need to make sure that the two locations can communicate. What type of network are you implementing?
answer
b. WAN
question
You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
answer
c. peer-to-peer network
question
Which of the following are examples of output devices? (Choose all that apply.)
answer
a. monitor b. printer d. hard disk
question
Which of the following are examples of input devices? (Choose all that apply.)
answer
a. mouse c. DVD e. printer
question
The three basic functions of a computer are input, ____________, and output.
answer
processing
question
____________ components include devices such as printers, disk drives, network cards, and monitors.
answer
Output
question
A ____________ is a packet that has been encapsulated with the source and destination MAC addresses in the header and an error-checking code in the trailer.
answer
frame
question
There are two different network models. One of them, a peer-to-peer network, also is referred to as a ____________ network.
answer
workgroup
question
____________ is an operating system's ability to execute more than one process at a time.
answer
Multitasking
question
Before data is transmitted, it is broken into chunks of data and then encapsulated with the source and destination IP addresses to create a ____________.
answer
packet
question
When a NIC is in "promiscuous" mode, it will process only the frames in which the destination MAC address matches its own MAC address.
answer
False
question
Routers do not forward broadcast packets.
answer
True
question
If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.
answer
True
question
The function of a repeater is to extend the range of an existing network.
answer
True
question
You cannot connect a hub to another hub unless it has an uplink port.
answer
False
question
When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?
answer
b. switch
question
Why would you need to use a repeater?
answer
d. You need to add a group of computers to your network, and the distance is too far for normal means of communication.
question
Which of the following is NOT a function of a hub?
answer
b. transmits the signal to the correct port
question
How does a switch "learn" MAC addresses?
answer
c. The switch reads each frame and makes a note of where each MAC address came from.
question
Why is the use of a switch preferred over a hub?
answer
d. All of the above.
question
What does a switch store in its switching table?
answer
a. the source MAC address of a frame and the port it was received on
question
What is a packet called that is intended for only one individual computer?
answer
b. unicast
question
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?
answer
a. ARP
question
What does it usually mean when the activity light on a switch is blinking?
answer
c. It is communicating with the network.
question
What component of the computer provides it with a MAC address?
answer
b. NIC
question
A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?
answer
d. It's the organizationally unique identifier for the manufacturer of the device.
question
What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer?
answer
b. tracert
question
What is the purpose of the default route?
answer
c. It's where the router sends all packets with destinations of which it has no knowledge.
question
A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?
answer
c. hub
question
When referring to network bandwidth, what is the basic unit of measurement?
answer
b. bits per second
question
Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP?
answer
a. RTS
question
The SSID is configured on which of the following so that it can be distinguished from other available wireless networks?
answer
b. access point
question
What command would you issue from the command prompt to test whether your computer has connectivity to the network?
answer
a. ping IPaddress
question
Which of the following are features of a router? (Choose all that apply)
answer
b. connects LANs to one another e. works with packets instead of frames
question
What type of indicator lights would you find on a hub?
answer
a. network activity b. link status e. collision
question
The "Locally Administered Address" can be used to override the burned-in __________ address.
answer
MAC
question
In a computer's IP address settings, the _____________ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own.
answer
default
question
A __________ frame is a message that is intended to be processed by all devices on the LAN.
answer
broadcast
question
The network ____________ is a measurement of the amount of data that can pass through a network in a certain period of time.
answer
bandwidth
question
A switch operating in ___________ mode can send and receive data at the same time.
answer
full-duplex
question
A network's physical topology refers to the arrangement of the cabling and how the devices connect to each other.
answer
True
question
The physical bus topology is no longer used because it required extra cable to connect all the computers and required a central device.
answer
False
question
A point-to-point topology is typically used for WAN connections.
answer
True
question
A network's logical topology often depends on the central device's electronics.
answer
True
question
A collision can occur on a switch only if the switch is operating in full-duplex mode.
answer
False
question
In a physical bus topology, both ends of the medium must be terminated in order to prevent what?
answer
b. signal bounce
question
Which of the following is NOT an advantage of a physical star?
answer
d. provides redundancy and fault tolerance
question
Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?
answer
c. physical ring
question
What is the main advantage of a point-to-point topology?
answer
a. data travels on a dedicated link
question
What type of logical topology is at work when using an Ethernet hub?
answer
a. logical bus
question
What type of logical topology does a Wireless LAN use?
answer
a. logical bus
question
In a token ring network, what is the central device called?
answer
d. multistation access unit
question
What is the most common topology and technology combination in use today?
answer
d. switched / Ethernet
question
Which of the following is NOT a characteristic of Unshielded Twisted Pair cabling?
answer
c. operates in half-duplex only
question
What is the Ethernet frame type that is used by TCP/IP?
answer
c. Ethernet II
question
What does the frame trailer consist of in an Ethernet frame?
answer
d. cyclic redundancy check
question
What is the media access method used by Ethernet?
answer
a. CSMA/CD
question
What is the best way to eliminate the possibility of collisions in a network?
answer
d. Both a and c
question
When discussing Ethernet standards, what does the XBaseY terminology refer to?
answer
b. the transmission speed, the type of transmissions, and the length or type of cabling
question
When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?
answer
c. 100 meters
question
What is the IEEE standard governing wireless networking?
answer
d. 802.11
question
When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode?
answer
b. ad hoc
question
In wireless networks, what type of media access control is used?
answer
c. CSMA/CA
question
What is the main disadvantage of cable modem networking?
answer
d. It uses a bus topology.
question
Which of the following is NOT a component of an Ethernet frame header?
answer
d. 4-byte frame check sequence
question
The way that data travels in a network is referred to as the network's ____________ topology.
answer
logical
question
In a large network, in which several switches need to be connected together, usually one device is placed at the center, forming a(n) ____________ star.
answer
extended
question
The most popular LAN technology used today is ____________.
answer
Ethernet
question
When a wireless computer connects with an AP before it connects with other devices, it is operating in ____________ mode.
answer
infrastructure
question
A ___________ topology is fully redundant and is the most expensive to implement.
answer
mesh
question
There are two basic categories of physical cabling used in Ethernet networks. They are copper wire and fiber optic.
answer
True
question
The length of cable between the wall jack and a patch panel is called vertical cabling.
answer
False
question
Wireless and wired networks are both susceptible to RFI.
answer
True
question
Because fiber-optic cabling uses light pulses instead of electrical signals, it is immune to interference and highly resistant to eavesdropping.
answer
True
question
Wireless networks are often used to extend the reach of a wired LAN.
answer
True
question
Which of the following is not one of the main differences between the types of network cabling?
answer
b. the ability to send and receive signals
question
Which of the following is not a form of electromagnetic interference, or EMI?
answer
a. rain/fog
question
When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?
answer
c. attenuation
question
What are all of the connections in a network considered, including the cables and their connectors?
answer
d. cable plant
question
What is the maximum bandwidth for a network cabled using category 5e UTP cable?
answer
d. 1000 Mbps
question
What is the maximum cable length for both category 5e and category 6 UTP cable?
answer
c. 100 m
question
The frequency at which a wireless network operates is measured in cycles per second and is expressed as what unit of measurement?
answer
a. hertz
question
Terrestrial and satellite systems are two types of which wireless networking technology?
answer
d. microwave
question
What is the way in which bit signals are represented on the network medium?
answer
b. encoding
question
Which of the following is a length of cable that connects a computer to either a networking device or to an RJ-45 jack?
answer
d. patch cable
question
What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?
answer
b. structured cabling
question
The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?
answer
c. demarcation point
question
Which of the following connections might require a crossover cable?
answer
c. switch to switch
question
In an MDI device, on which two pins does the device use to transmit?
answer
a. 1 and 2
question
What type of wiring should be used for a high-speed connection between two buildings?
answer
d. fiber-optic cabling
question
What is a disadvantage of using fiber-optic cabling?
answer
d. difficult to install
question
What type of wireless technology is used for 802.11b /g /n networks?
answer
a. spread-spectrum radio
question
Which of the following categories of UTP cabling are considered to be data grade as specified by ANSI/TIA/EIA? (Choose all that apply.)
answer
c. Category 4 d. Category 5 e. Category 6
question
Which of the following are components of a network that are defined by structured cabling?
answer
a. horizontal wiring c. entrance facility d. work area
question
A network that uses the air to transmit signals across the network is considered a(an) ____________ network.
answer
wireless
question
When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out onto other wires.
answer
crosstalk
question
A type of wireless network that uses light beams to send signals between two devices and is highly susceptible to visible light sources is called ____________.
answer
infrared
question
A wireless ____________ using line-of-sight or broadcast transmissions can extend a wired network over a short distance that would normally require a dedicated communication line from a communications carrier.
answer
bridge
question
Most office buildings usually have a false ceiling with an area above that which is used to run conduit for heating and air conditioning units, called the ____________.
answer
plenum
question
IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
answer
False
question
The Internetwork layer is the layer that handles network configuration and is considered the heart of the TCP/IP protocol suite.
answer
True
question
The Transport layer uses port numbers to identify the source and destination Application-layer protocol of the data that it contains.
answer
True
question
DNS is a protocol that automatically provides a computer with its IP address configuration.
answer
False
question
An IP address is composed of 48 bits that are grouped together into 8-bit octets and are represented by a decimal number from 0 to 255.
answer
False
question
The Transport layer deals with which unit of information?
answer
d. segment
question
Which of the following is not a function of the Network Access layer?
answer
b. delivers packets efficiently
question
In what layer does the NIC operate?
answer
a. Network Access
question
In which layer does a router operate?
answer
b. Internetwork
question
Which protocol is responsible for determining the MAC address associated with each IP address and keeping a table of its results?
answer
c. ARP
question
TCP establishes a connection with the destination device using which process?
answer
d. three-way handshake
question
Which of the following is not an Application layer protocol?
answer
b. TCP
question
An IP address consists of four octets separated by periods. Which part of this address denotes its class?
answer
a. first octet
question
How many host addresses are available on a Class C network?
answer
a. 254
question
You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address?
answer
d. PAT
question
What is the binary number system based on?
answer
a. powers of 2
question
Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID?
answer
b. subnet mask
question
What is the decimal equivalent to the binary number 11000001?
answer
d. 193
question
How many bits are in an IPv6 address?
answer
d. 128
question
The last 64 bits of an IPv6 address are the interface identifier. Where is that number derived from?
answer
d. the MAC address
question
What is the hexadecimal number F equal to in binary?
answer
d. 1111
question
What is the decimal equivalent to the hexadecimal number D?
answer
a. 13
question
How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the host ID is 64 bits?
answer
b. 16
question
Which of the following is a feature of TCP? (Choose all that apply.)
answer
a. segments data into chunks d. ensures flow control e. establishes a connection
question
Which of the following are solutions to the shortage of available IPv4 addresses? (Choose all that apply.)
answer
a. IPv6 b. private addressing c. subnetting e. NAT
question
An IP address is composed of two parts, one is the ____________ ID and one is the host ID.
answer
network
question
____________are sets of rules and procedures that dictate communication and behavior.
answer
Protocols
question
___________ is a way of breaking a large address space into more, smaller, address spaces.
answer
Subnetting
question
The four layers of the TCP/IP protocol suite are Application, ____________, Internetwork, and Network Access
answer
Transport
question
An address that can only be used on the internal network and cannot be used to access the Internet is called a ____________ address
answer
private
question
The Transport layer is the same in both the OSI model and the TCP/IP model.
answer
True
question
The Physical layer has been divided into two sublayers, called the LLC sublayer and the MAC sublayer.
answer
False
question
The Network layer communicates with the Data Link layer and the Session layer.
answer
False
question
The maximum transmission unit for Ethernet is 1518 bytes.
answer
True
question
One of the problems that can occur in the Network layer is the incorrect configuration of a hosts IP address.
answer
True
question
Which layer is responsible for establishing a connection between the source and destination?
answer
b. Session
question
Which layer of the OSI model is responsible for encryption and decryption?
answer
b. Presentation
question
Put the layers of the OSI model in order from layer 7 to layer 1.
answer
b. f., a., g., e., b., d., c.
question
What is a PDU?
answer
c. It is the name given to the unit of information used by each layer.
question
What information would you find in the header of a Transport layer PDU?
answer
d. window size
question
At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this process called?
answer
a. encapsulation
question
What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device?
answer
d. sequence number
question
What is the IEEE standard that governs all forms of Ethernet media?
answer
b. 802.3
question
Which is the IEEE standard that sets the standards for wireless networking?
answer
d. 802.11
question
Which layer is responsible for determining the best path a packet should travel across an internetwork?
answer
a. Network
question
One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called?
answer
c. access control
question
You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem?
answer
c. Network layer device
question
Which layer has been subdivided into the Logical Link Control sublayer and the Media Access Control sublayer?
answer
b. Data Link
question
What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand?
answer
b. 6
question
At what layer do NICs operate?
answer
b. Data Link
question
Which layer is responsible for the encoding of signals?
answer
b. 1
question
The Transport layer segments data into smaller chunks, the size of which is determined by which of the following?
answer
a. MTU
question
At which layer would you find errors that were caused by EMI?
answer
c. Physical
question
How can you find out what your MAC address is? (Choose all that apply.)
answer
a. Right-click on the Local Area Connection and choose status. c. Open a command prompt and type the command getmac. d. Open a command prompt and type the command ipconfig /all.
question
Which of the following are protocols that you find at the Application layer of the OSI model?
answer
b. FTP e. DHCP f. SNMP
question
The ____________ reference model is a general framework for networking systems that uses a layered approach to reduce its complexity.
answer
OSI
question
The ____________ layer is the bottom layer, whose job it is to convert bits into signals and vice versa.
answer
Physical
question
The process of stripping the header and trailer from a PDU is called ____________.
answer
deencapsulation
question
The PDU at the Data Link layer is called a ____________.
answer
frame
question
The ____________ layer of the TCP/IP model combines the top three layers of the OSI model into one layer.
answer
Application
question
Network switches always must be configured before they can be put into operation in a network.
answer
False
question
The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
answer
True
question
Communications through a router are noticeably faster than communications through a switch.
answer
False
question
A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
answer
True
question
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
answer
False
question
Which of the following is not a true statement regarding the function of a switch?
answer
a. It determines the path used based on the destination IP address.
question
Which of the following combinations will you find in a switching table?
answer
d. MAC address/switch port number
question
Which of the following is the fastest switching mode?
answer
a. cut-through
question
Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called?
answer
c. smart
question
Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?
answer
d. STP
question
Which of the following is not a function that would be found in a managed switch?
answer
b. the ability to transfer it's switching table with neighboring switches
question
Each interface on a router must have an IP address and what else to be able to communicate on the network?
answer
c. MAC address
question
When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?
answer
d. router on a stick
question
What type of routing protocol are RIP and RIPv2?
answer
d. distance-vector protocol
question
The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?
answer
b. convergence
question
When an access control list is applied on a router's interface, that interface is performing a specific function on the packets that it receives. What is that function called?
answer
a. packet filtering
question
What command issued from a command prompt will display the routing table in Windows?
answer
b. route print
question
A wireless router is actually composed of three devices, a wireless access point and which two other devices?
answer
c. a router and a switch
question
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
answer
b. wardriver
question
Which is the strongest form of wireless security?
answer
c. WPA2
question
Which is the PCI bus type that has the highest possible transfer rate?
answer
b. PCIe
question
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?
answer
d. preboot execution environment
question
On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? (Choose all that apply.)
answer
a. metric b. hop count
question
Which of the following would be found in a routing table on a router?
answer
a. timestamp b. destination network c. next hop e. metric
question
Access control lists can be configured based on which of the following? (Choose all that apply.)
answer
a. protocol c. destination network e. source IP address
question
When a switch receives a broadcast frame, it ____________ the frame out to all ports.
answer
floods
question
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.
answer
blocking
question
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
answer
forwarding
question
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.
answer
filtering
question
A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
answer
bus
question
When a disk is formatted, it is impossible to recover the data that was on the disk.
answer
False
question
In Windows, you can start the Task Manager by simply right-clicking the taskbar and choosing Start Task Manager.
answer
True
question
One critical difference between a client OS and a server OS is the addition of directory services on some server OSs
answer
True
question
Virtualization is designed for testing and development purposes only.
answer
False
question
Windows Server 2008 R2 can be installed only on a 64-bit system.
answer
True
question
Which part of the OS provides users and applications with an interface to manipulate files?
answer
d. file system
question
What are the chunks called into which the available storage space on a disk drive is broken?
answer
b. sectors
question
Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU's time until the process had completed its own task?
answer
b. cooperative
question
What method does the CPU use to divide its computing cycles between more than one process?
answer
c. time slicing
question
In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems?
answer
d. system monitor
question
What is the native file-sharing protocol in Linux?
answer
b. NFS
question
Which common e-mail protocol allows the user to access messages, yet still have them stored on the server?
answer
b. IMAP
question
Which of the following is not a function typically provided by the centralized management of a server-based network?
answer
d. protocol analysis
question
What is the process called that grants or denies a user's access to network resources?
answer
c. authorization
question
What directory service protocol used in Linux systems is also supported by Windows?
answer
c. LDAP
question
What storage solution involves a third-party company that provides off-site hosting of data?
answer
b. cloud-based storage
question
What is a partial copy of a VM that is used to restore it to a previous state?
answer
a. snapshot
question
Which of the following virtualization products provides hosted virtualization?
answer
d. VMware Workstation
question
You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation?
answer
c. host-only
question
Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?
answer
d. Datacenter Edition
question
Which of the following types of file systems support file and folder permissions? (Choose all that apply.)
answer
a. EXT2 d. NTFS
question
A DHCP server can supply the client with more than just its IP address and subnet mask. What other necessary configurations can it supply? (Choose all that apply.)
answer
a. default gateway d. DNS server
question
What are the two most common ways of accessing a network resource? (Choose two.)
answer
b. mapping a drive d. entering a UNC path
question
Which of the following is a fault tolerant feature provided by a server OS? (Choose all that apply.)
answer
a. RAID d. server cluster e. hot-swappable devices
question
Which of the following virtualization products are used for bare-metal virtualization?
answer
b. Citrix XenServer d. VMware vSphere f. Microsoft Hyper-V
question
A ____________ is a program that runs in the background and provides support for other processes.
answer
service
question
In ___________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPU's time.
answer
pre-emptive
question
A ____________ file is simply a text file that contains a list of commands that you would normally enter in a command prompt.
answer
batch
question
When a user enters his username and password to log on to a machine, he is invoking the process of ____________.
answer
authentication
question
A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network ____________.
answer
appliance
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New