netwokring test

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards
1) What is the name of the executable for Microsoft Backup for DOS?
a. MSBKUP.EXE
b. MSBACKU.EXE
c. BACKUP.EXE
d. MWBACKUP.EXE
B
2
New cards
2) \____________ offers the longest possible segment length.
a. Coaxial cable
b. Unshielded twisted-pair cabling
c. Fiber-optic cabling
d. Shielded twisted-pair cabling
C
3
New cards
3) What is another name for IEEE 802.3?
a. CSMA/CD LAN
b. Logic link control
c. Token passing
d. Token Ring LAN
A
4
New cards
4) The Hardware Compatibility List (HCL) lists hardware that has been tested with Windows
2000. If your hardware is not on the HCL, what should you do?
a. Reload your Windows 95 or 98 drivers.
b. Contact the vendor and get updated Windows 2000 drivers.
c. Reinstall the device. The correct driver will load automatically.
d. Download an updated HCL from Microsoft, which will then include the drivers for
any device on your PC.
B
5
New cards
5) What is the public key encryption system that can verify the authenticity of an e-mail sender
and encrypt e-mail data in transmission?
a. PGP
b. SSL
c. SSH
d. Kerberos
A
6
New cards
6) What device on a network acts as an intermediary between a client and server and evaluates
the requests according to rules?
a. Antivirus
b. Router
c. Proxy server
d. Anti-spyware
C
7
New cards
7) Which one of the following terms is not used to describe a network's physical layout?
a. map
b. topology
c. diagram
d. architecture map
D
8
New cards
8) Which one of the following authentication protocols supports the use of smart cards?
a. EAP
b. SPAP
c. MS-CHAP
d. MS-CHAP2
A
9
New cards
9) A physical star topology consists of several workstations that branch off a central device
called a:
a. hub
b. repeater
c. brouter
d. router
A
10
New cards
10) What is the net bit rate (maximum) as specified by 802.11n?
a. 11Mbit/s
b. 54Mbit/s
c. 600Mbit/s
d. 6000Mbit/s
C
11
New cards
1. The connection-oriented, reliable transport of data takes place at what layer of the OSI model?
a. transport
b. network
c. data-link
d. session
A
12
New cards
2. You are the administrator of a network with 250 nodes. You want to implement video conferencing,
but your network is performing poorly. Through network analysis software, you determine that the hub
is the bottleneck. Which device should you install in place of the hub to alleviate the bottleneck?
a. a transceiver
b. a repeater
c. a switch
d. aMAU
C
13
New cards
3. Which connector should you use with fiber optic cabling?
a. RJ-45
b. ST
c. BNC
d. AUI
B
14
New cards
4. Which benefit does starting Samba on a UNIX/LINUX server provide?
a. Web access
b. Telnet access
c. Print server access
d. Secured server access
C
15
New cards
5. Which fiber connector uses a twist-type attachment mechanism?
a. SC
b. ST
c. MT-RJ
d. FC
B
16
New cards
6. Your company is planning to rebuild its network infrastructure. You are asked to provide a topology
that will be scalable and easy to troubleshoot. Which topology should you recommend?
a. ring
b. mesh
c. bus
d. star
D
17
New cards
7. You are assisting your senior technician in extending the Denmarc for a new DSL circuit. Which tool
should you use?
a. punch down tool
b. bit error rate tester
c. multimeter
d. optical tester
A
18
New cards
8. What is the process of changing the configuration of an A, B, or C network so that it treats the
network and node number differently?
a. proxying
b. reverse lookup
c. routing
d. subnetting
D
19
New cards
9. Which network transmission medium is limited to 10 megabits per second and can support cable
segments up to a maximum of 100 meters?
a. 10Base-F
b. 10Base-2
c. 10Base-T
d. 10Base-5
C
20
New cards
10. Which one of the following applications, if running on a server, would most likely require more RAM
than the minimum specified by the NOS vendor?
a. MS SQL Server
b. Netscape Navigator
c. Telnet
d. MS-DOS
A
21
New cards
11. You must propose a cabling scheme for your company's new location. Several departments are
located on the same floor with a maximum distance of 61 meters (200 feet) between departments.
You want a relatively easy, low-cost installation with simple connections. Which type of cabling would
you propose?
a. unshielded twisted-pair
b. fiber-optic
c. yhicknet
d. yhinnet
A
22
New cards
12. You are experiencing connection problems with the fiber-optic cables in the 100BaseFX LAN that you
administer. What could be the cause of this problem?
a. The cable length between workstations and hubs is less than 1,000 meters.
b. The cable is experiencing problems with ESD.
c. The cable is not properly terminated.
d. The cable in the plenum is too close to an energy source.
C
23
New cards
13. Twisted pair cabling is commonly terminated with what type of connector:
a. RJ-45
b. BNC
c. RJ-11
d. RJ-12
A
24
New cards
14. To use file level security you should have what file system installed?
a. FAT
b. FAT32
c. CDFS
d. NTFS
D
25
New cards
15. Twisted pair cable installations are covered by what wiring standard?
a. TIA/EIA568
b. IEEE 802.3
c. TAI/EAI568
d. IEEE 802.1
A
26
New cards
16. What is 10Base5 considered?
a. category 5 UTP
b. thinnet
c. thicknet
d. category 6 UTP
C
27
New cards
17. \___ is not a fiber-optic connector.
a. MT-RJ
b. RJ-45
c. SMA
d. MIC
B
28
New cards
18. With respect to structured cabling, a(n) \____ is the location of the cabling and equipment that
connects a corporate network to a third-party telecommunications provider.
a. work area
b. equipment room
c. cable plant
d. entrance facility
D
29
New cards
19. The job of the \____ to convert bits into signals for outgoing messages and signals into bits for
incoming messages.
a. MAC sublayer
b. data link layer
c. LLC sublayer
d. physical layer
D
30
New cards
20. \___ frames are created for any computers on a network that "listen" to a shared network address.
a. Group
b. Multicast
c. Broadcast
d. Unicast
B
31
New cards
21. \___ is a name-to-address resolution protocol that functionally operates at the Session layer of the
OSI model.
a. ICMP
b. ARP
c. DHCP
d. DNS
D
32
New cards
22. Class \____addresses are reserved for experimental use and cannot be used for address
assignment.
a. D
b. A
c. C
d. E
D
33
New cards
23. A form of \____is used in wireless LANs with an access point.
a. polling
b. CSMA/CA
c. demand priority
d. switching
B
34
New cards
24. \____ defines Gigabit Ethernet over fiber-optic cable.
a. 1000BaseO
b. 1000BaseC
c. 1000BaseX
d. 1000BaseF
C
35
New cards
25. \____ uses specially shielded, balanced, copper jumper cables.
a. 1000BaseTX
b. 1000BaseSX
c. 1000BaseCX
d. 1000BaseT
C
36
New cards
26. A V.90 modem uses a technique called \____that digitizes analog signals.
a. MP3
b. PCM
c. WAV
d. CODEC
B
37
New cards
27. One of the most widely used high-speed digital lines is the \____, a DDS technology that uses two
two-wire pairs to transmit full-duplex data signals at a maximum rate of 1.544 Mbps.
a. ADSL
b. T1
c. T3
d. ISDN
B
38
New cards
28. Most NICs in computer workstations today are connected to what type of bus architecture?
a. AGP
b. firewire
c. PCI
d. USB-x
C
39
New cards
29. When a computer boots up and tries to obtain an IP address automatically, but does not find a DHCP
server, what addressing is used?
a. APIPA
b. ICANN
c. IP
d. DNS
A
40
New cards
30. The main active directory unit that is the building block of the structure allowing for distribution of
resources and administration is:
a. domain
b. forest
c. tree
d. organizational unit (OU)
D
41
New cards
1)
A network that has a large capacity, covers a large geographical area and combine multiple communication channels is known as what type of a network?
Α) ΜΑΝ B) SAN C) WAN D) LAN
C
42
New cards
2) What is the most common method for encrypting TCP/IP communications?
A) SSL B) PGP C) Kerberos D) HKEY
A
43
New cards
3) What type of firewall inspects each packet passing through the network and accepts or rejects it based on user-defined rules? A) packet filter B) proxy server C) circuit-level gateway D) application gateway
A
44
New cards
Which of the following terms refers to a permanent IP address assignment from a DHCP server? A) reservation B) relay C) scope D) lease
A
45
New cards
5)
Jeff just moved to a new apartment and is looking for a company to contact for Internet service. He is willing to pay a monthly fee, but in return he needs a modem and also an e-mail address. Who would Jeff contact for this service? A) DNS B) ISDN C) ISP D) IEEE
C
46
New cards
6)
Which of the following is a non-routable protocol?
A) NetBEUI B) TCP/IP C) DHCP D) AppleTalk
A
47
New cards
7)
The term for a computer with no network is: A) client/server B) peer to peer C) null D) standalone
D
48
New cards
8)
A Digital Subscriber line is best described as: A) an always on services made up of copper phone lines that are not used by voice. B) using existing cable lines that converts a digital signal to analog when sending data. C) a solution for those who live in remote areas because it connects to satellites. D) a dedicated line that connects directly from the ISP to your home/business without sharing.
A
49
New cards
Which networking tool would be used to attach an RJ-45 connector to a CAT5e networking cable?
A) punch down tool B) crimper C) DHCP too! D) reflectometer
B
50
New cards
10) Which of the following is not a network operating system?
A) Windows NT B) Windows for Workgroups C) Windows 2000 D) Linux
B
51
New cards
11) Which of the following is not a way an operating system allocates disk space for files.
A) sporadic allocation B) contiguous allocation C) linked allocation D) indexed allocation
A
52
New cards
12) What is the purpose of the event viewer tool?
A) Schedule programs or other tasks to run automatically. B) Used to check the main log files in Windows Server. C) View advanced system information about the CPU, memory, hard disk, and network performance. D) View and edit group policy security settings.
B
53
New cards
13)
A roaming mandatory profile must be renamed with what extension: A).DAT B).TMP C) .MAN D) .TXT
C
54
New cards
14) Which of the following are the recommended steps that should be taken for worm
attack mitigation? A) containment, quarantine, inoculation, treatment B) containment, inoculation, quarantine, treatment C) quarantine, containment, inoculation, treatment D) inoculation, containment, quarantine, treatment
B
55
New cards
15) HTTPS communication traffic is on what TCP port?
A) 443 B) 21 C) 23 D) 80
A
56
New cards
16) Which of the following would be classified as an access attack?
A) Trojan horse B) zero-day attack C) Dos D) password attack
D
57
New cards
17) Which of the following reconnaissance attack tools are used to search the publicly
available IP addresses to identify the addresses that are active? A) ping sweeps B) packet sniffers C) port scans D) Internet queries
A
58
New cards
18)
The main network cable to which branch networks may be connected is called the: A) backbone B) express cable C) trunk D) thick cable
A
59
New cards
19) What networking device determines the path that a message should take through a
network? A) switch B) firewall C) router D) bridge
C
60
New cards
20)
Related to security, DES is: A) Denial of Electronic Service B) Digital Encryption Security C) Data Encryption Standard D) Disk Encryption Standard
C
61
New cards
21)
Which of the following does not describe characteristics of baseband technologies? A) Baseband can send and receive at the same time if the transmission media is split into two channels. B) Baseband transmissions occupy the entire bandwidth of network media C) Baseband typically uses digital signaling over a single wire. D) Baseband transmissions cannot be sent and received at the same time.
A
62
New cards
22)
You've been asked by your supervisor to research new possible operating systems for the ABC Company using one of their current PCs. The company is running a Windows OS, but would like to look at Linux and Mac operating systems as possibilities. Which method listed below would be the best option to test out the systems?
A) Create a virtual machine to run and test the software. B) Use a dual boot configuration to choose the test OS at startup. C) Research what you can on the Internet. D) Uninstall Windows and install each of the test systems separately.
A
63
New cards
23)
Which of the following is not a characteristic that applies to UDP?
A) Lost or corrupt packets are not resent. B) Packet delivery is guaranteed. C) Packets are treated independently. D) Packet delivery is not guaranteed.
B
64
New cards
24)
What is the generic designator for any of several digitally multiplexed communications carrier systems which has a basic unit called the DSO, which has a transmission rate of 64kbit/s? A) cable modem B) T-Carrier C) DSL D) ISDN
B
65
New cards
25)
The Internet uses the network protocol called A) CSMA/CD B) HTTP C) TCP/IP D) FTP
C
66
New cards
26)
Your Company is requesting that the company network is segregated logically in terms of the departments they deal with. There are three main departments: manufacturing, accounting and sales. The data intended for manufacturing must not
reach accounting or sales. Which solution would best fit this request? A) VLANS B) Routing C) RMON probe D) SNMP
A
67
New cards
27)
What specialized United Nations agency provides developing countries with technical expertise and equipment to advance their technological standard of living? Α) ΝΑΤΟ B) ITU C) ISO D) ICANN
B
68
New cards
Which of the following statements is true about single-mode fiber optic cable?
A) Single-mode has higher attenuation than multimode. B) Single-mode has a larger core. C) Single-mode is typically used in LANs or small distances. D) Single-mode provides the highest throughput.
D
69
New cards
29) What type of RJ45 UTP cable is used between switches?
A) crossover with a router in between the two switches B) crossover with a CSU/DSU C) straight-through D) crossover cable
D
70
New cards
30)
Which command can be used on a Window computer to test the connectivity of the local machine? A) Ping -192.168.0.1 B) Ping - C) Ping 127.0.0.1 D) Ping -loopback
C
71
New cards
1. The process of distributing network traffic across numerous servers is called:
a. Multiloading
b. Fault Tolerance
c. Load Balancing
d. Distribution
C
72
New cards
2. Which network is confined to a relatively small space?
a. LAN
b. WAN
c. WiMAX
d. GSM
A
73
New cards
3. The process of determining the path a packet will take on a network is known as:
a. segmentation
b. routing
c. construction
d. reassembly
B
74
New cards
4. How does a proxy server improve web performance for clients on a private LAN?
a. It enables users to save frequently used bookmarks in a shared location.
b. It expedites incoming data to clients because it replaces client IP addresses.
c. It enables incoming requests to bypass the firewall.
d. It holds web requests in a cache so that subsequent requests for those pages can be
fulfilled locally.
D
75
New cards
5. Where in Netscape Communicator could you enter the IP address of a proxy server?
a. Edit, Preferences, Advanced, and Proxies
b. Edit, Preferences, Advanced, and Cache
c. Tools, Internet Options, Connections, and Settings
d. Tools, Internet Options, and Proxy Server
C
76
New cards
6. A model for computing where some computers request services and other computers
respond to requests for services is called:
a. request/response
b. host/response
c. thin client
d. client/server
D
77
New cards
7. All IIS information on a Windows server is stored in the:
a. hive
b. .Conf file
c. index
d. metabase
D
78
New cards
8. The process of configuring numerous servers to functions as one is called:
a. Domaining
b. Multiloading
c. Clustering
d. Balancing
C
79
New cards
9. Why would it be necessary to include details about an organization's service agreements
with telecommunications carriers in disaster recovery plans?
a. The carriers also may be affected by the disaster and may owe the organization
compensation for downtime.
b. The carriers may decide to void their agreement after the disaster.
c. The agreements may change as a result of the disaster.
d. They will have to supply the organization with new equipment.
A
80
New cards
10. A client tries to log in to her ISP and is repeatedly prompted to enter her user name and
password. Which one of the following are the most likely causes?
a. IPX/SPX is not installed.
b. She is using an incorrect user name and password combination.
c. The modem is not functioning.
d. NetBEUI is not installed.
B
81
New cards
11. Which one of the following is a potential disadvantage to using Telnet to remotely log in to a
router?
a. It requires a high-bandwidth connection.
b. It is not very efficient.
c. It is not compatible with all types of router operating systems.
d. It is not secure.
D
82
New cards
12. What specialized United Nations agency provides developing countries with technical
expertise and equipment to advance their technological standard of living?
a. ICANN
b. ITU
c. ANSI
d. ISO
B
83
New cards
13. Each network node has a network address and a \__________address.
a. IP
b. IPX
c. MAC
d. PCD
C
84
New cards
14. The ability to use names to connect to network resources is controlled by:
a. NAME
b. DHCP
c. NetBIOS
d. NETSTAT
C
85
New cards
15. The type of group that has a GUID attached to it so that you can use it to assign rights and
permissions is called:
a. security
b. permissions
c. object
d. distribution
A
86
New cards
16. A set of rules that determines how communications will take place on a network is called:
a. ICANN
b. Internetwork
c. protocol
d. IEEE
C
87
New cards
17. You can start programs if they don't have a shortcut on the desktop or in the programs
submenu by:
a. typing cmd in the Start Run box
b. using the Run dialog box and typing in the name of the program
c. using the Shut Down command
d. typing cmd in the Start box and then the program
B
88
New cards
18. What form of Internet access allows the user's computer or router to use an attached
modem connected to a telephone line to dial into an ISP's node to establish a modem-to-
modem link?
a. Cable Modem
b. DSL
c. Dial-up
d. Satellite Internet
C
89
New cards
19. What is a server service that allows RRAS servers to delegate responsibility for inbound
authentication to a central server and can be used to authenticate users at switch ports or
wireless access points?
a. DNS
b. RIM
c. DHCP
d. RADIUS
D
90
New cards
20. When using a firewall to guard a private LAN from Internet-based intrusion, how can you still
allow authorized users to access the network from home?
a. Open access to all the router's ports
b. Allow some users to bypass the firewall
c. Allow access to select ports based on incoming IP address
d. Apply time of day restrictions to some of the firewall's ports
C
91
New cards
21. At the telephone exchange, what terminates the DSL where another frequency splitter
separates the voice band signal from the data signal?
a. DSLTA
b. FiOS
c. DSMOD
d. DSLAM
D
92
New cards
22. Which describes wiring that connects workstations to the hub room?
a. patch
b. backbone
c. horizontal wiring
d. harness
C
93
New cards
23. Typically routers on a LAN are used to separate networks into:
a. subnets
b. VPNs
c. e-mail addresses
d. DNS zones
A
94
New cards
24. Which one of the following layers does the UDP correspond to?
a. transport
b. physical
c. network
d. session
A
95
New cards
25. What type of firewall inspects each packet passing through the network and accepts or
rejects it based on user-defined rules?
a. application gateway
b. circuit-level gateway
c. proxy server
d. packet filter
D
96
New cards
26. Which topology is the easiest to modify?
a. bus
b. star
c. ring
d. mesh
B
97
New cards
27. Which one of the following is an example for distance vector protocol?
a. RIP
b. AppleTalk
c. IPX/SPX
d. OSPF
A
98
New cards
28. What is the 802.11 standard?
a. Wireless LAN
b. Wi-Max
c. Token Ring
d. Ethernet
A
99
New cards
29. Which type of cabling has the largest installation base?
a. coaxial
b. twisted-pair
c. wireless
d. fiber-optic
B
100
New cards
30. What is generally the rated speed for T1 and PRI ISDN service?
a. 512Kbit/sec
b. 256Kbit/sec
c. 1.544Mbit/sec
d. 3 Mbit/sec
C