netwokring test

studied byStudied by 0 people
0.0(0)
Get a hint
Hint
  1. What is the name of the executable for Microsoft Backup for DOS? a. MSBKUP.EXE b. MSBACKU.EXE c. BACKUP.EXE d. MWBACKUP.EXE

1 / 99

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

100 Terms

1
  1. What is the name of the executable for Microsoft Backup for DOS? a. MSBKUP.EXE b. MSBACKU.EXE c. BACKUP.EXE d. MWBACKUP.EXE

B

New cards
2
  1. ____________ offers the longest possible segment length. a. Coaxial cable b. Unshielded twisted-pair cabling c. Fiber-optic cabling d. Shielded twisted-pair cabling

C

New cards
3
  1. What is another name for IEEE 802.3? a. CSMA/CD LAN b. Logic link control c. Token passing d. Token Ring LAN

A

New cards
4
  1. The Hardware Compatibility List (HCL) lists hardware that has been tested with Windows

  1. If your hardware is not on the HCL, what should you do? a. Reload your Windows 95 or 98 drivers. b. Contact the vendor and get updated Windows 2000 drivers. c. Reinstall the device. The correct driver will load automatically. d. Download an updated HCL from Microsoft, which will then include the drivers for any device on your PC.

B

New cards
5
  1. What is the public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission? a. PGP b. SSL c. SSH d. Kerberos

A

New cards
6
  1. What device on a network acts as an intermediary between a client and server and evaluates the requests according to rules? a. Antivirus b. Router c. Proxy server d. Anti-spyware

C

New cards
7
  1. Which one of the following terms is not used to describe a network's physical layout? a. map b. topology c. diagram d. architecture map

D

New cards
8
  1. Which one of the following authentication protocols supports the use of smart cards? a. EAP b. SPAP c. MS-CHAP d. MS-CHAP2

A

New cards
9
  1. A physical star topology consists of several workstations that branch off a central device called a: a. hub b. repeater c. brouter d. router

A

New cards
10
  1. What is the net bit rate (maximum) as specified by 802.11n? a. 11Mbit/s b. 54Mbit/s c. 600Mbit/s d. 6000Mbit/s

C

New cards
11
  1. The connection-oriented, reliable transport of data takes place at what layer of the OSI model? a. transport b. network c. data-link d. session

A

New cards
12
  1. You are the administrator of a network with 250 nodes. You want to implement video conferencing, but your network is performing poorly. Through network analysis software, you determine that the hub is the bottleneck. Which device should you install in place of the hub to alleviate the bottleneck? a. a transceiver b. a repeater c. a switch d. aMAU

C

New cards
13
  1. Which connector should you use with fiber optic cabling? a. RJ-45 b. ST c. BNC d. AUI

B

New cards
14
  1. Which benefit does starting Samba on a UNIX/LINUX server provide? a. Web access b. Telnet access c. Print server access d. Secured server access

C

New cards
15
  1. Which fiber connector uses a twist-type attachment mechanism? a. SC b. ST c. MT-RJ d. FC

B

New cards
16
  1. Your company is planning to rebuild its network infrastructure. You are asked to provide a topology that will be scalable and easy to troubleshoot. Which topology should you recommend? a. ring b. mesh c. bus d. star

D

New cards
17
  1. You are assisting your senior technician in extending the Denmarc for a new DSL circuit. Which tool should you use? a. punch down tool b. bit error rate tester c. multimeter d. optical tester

A

New cards
18
  1. What is the process of changing the configuration of an A, B, or C network so that it treats the network and node number differently? a. proxying b. reverse lookup c. routing d. subnetting

D

New cards
19
  1. Which network transmission medium is limited to 10 megabits per second and can support cable segments up to a maximum of 100 meters? a. 10Base-F b. 10Base-2 c. 10Base-T d. 10Base-5

C

New cards
20
  1. Which one of the following applications, if running on a server, would most likely require more RAM than the minimum specified by the NOS vendor? a. MS SQL Server b. Netscape Navigator c. Telnet d. MS-DOS

A

New cards
21
  1. You must propose a cabling scheme for your company's new location. Several departments are located on the same floor with a maximum distance of 61 meters (200 feet) between departments. You want a relatively easy, low-cost installation with simple connections. Which type of cabling would you propose? a. unshielded twisted-pair b. fiber-optic c. yhicknet d. yhinnet

A

New cards
22
  1. You are experiencing connection problems with the fiber-optic cables in the 100BaseFX LAN that you administer. What could be the cause of this problem? a. The cable length between workstations and hubs is less than 1,000 meters. b. The cable is experiencing problems with ESD. c. The cable is not properly terminated. d. The cable in the plenum is too close to an energy source.

C

New cards
23
  1. Twisted pair cabling is commonly terminated with what type of connector: a. RJ-45 b. BNC c. RJ-11 d. RJ-12

A

New cards
24
  1. To use file level security you should have what file system installed? a. FAT b. FAT32 c. CDFS d. NTFS

D

New cards
25
  1. Twisted pair cable installations are covered by what wiring standard? a. TIA/EIA568 b. IEEE 802.3 c. TAI/EAI568 d. IEEE 802.1

A

New cards
26
  1. What is 10Base5 considered? a. category 5 UTP b. thinnet c. thicknet d. category 6 UTP

C

New cards
27
  1. ___ is not a fiber-optic connector. a. MT-RJ b. RJ-45 c. SMA d. MIC

B

New cards
28
  1. With respect to structured cabling, a(n) ____ is the location of the cabling and equipment that connects a corporate network to a third-party telecommunications provider. a. work area b. equipment room c. cable plant d. entrance facility

D

New cards
29
  1. The job of the ____ to convert bits into signals for outgoing messages and signals into bits for incoming messages. a. MAC sublayer b. data link layer c. LLC sublayer d. physical layer

D

New cards
30
  1. ___ frames are created for any computers on a network that "listen" to a shared network address. a. Group b. Multicast c. Broadcast d. Unicast

B

New cards
31
  1. ___ is a name-to-address resolution protocol that functionally operates at the Session layer of the OSI model. a. ICMP b. ARP c. DHCP d. DNS

D

New cards
32
  1. Class ____addresses are reserved for experimental use and cannot be used for address assignment. a. D b. A c. C d. E

D

New cards
33
  1. A form of ____is used in wireless LANs with an access point. a. polling b. CSMA/CA c. demand priority d. switching

B

New cards
34
  1. ____ defines Gigabit Ethernet over fiber-optic cable. a. 1000BaseO b. 1000BaseC c. 1000BaseX d. 1000BaseF

C

New cards
35
  1. ____ uses specially shielded, balanced, copper jumper cables. a. 1000BaseTX b. 1000BaseSX c. 1000BaseCX d. 1000BaseT

C

New cards
36
  1. A V.90 modem uses a technique called ____that digitizes analog signals. a. MP3 b. PCM c. WAV d. CODEC

B

New cards
37
  1. One of the most widely used high-speed digital lines is the ____, a DDS technology that uses two two-wire pairs to transmit full-duplex data signals at a maximum rate of 1.544 Mbps. a. ADSL b. T1 c. T3 d. ISDN

B

New cards
38
  1. Most NICs in computer workstations today are connected to what type of bus architecture? a. AGP b. firewire c. PCI d. USB-x

C

New cards
39
  1. When a computer boots up and tries to obtain an IP address automatically, but does not find a DHCP server, what addressing is used? a. APIPA b. ICANN c. IP d. DNS

A

New cards
40
  1. The main active directory unit that is the building block of the structure allowing for distribution of resources and administration is: a. domain b. forest c. tree d. organizational unit (OU)

D

New cards
41

A network that has a large capacity, covers a large geographical area and combine multiple communication channels is known as what type of a network? Α) ΜΑΝ B) SAN C) WAN D) LAN

C

New cards
42
  1. What is the most common method for encrypting TCP/IP communications? A) SSL B) PGP C) Kerberos D) HKEY

A

New cards
43
  1. What type of firewall inspects each packet passing through the network and accepts or rejects it based on user-defined rules? A) packet filter B) proxy server C) circuit-level gateway D) application gateway

A

New cards
44

Which of the following terms refers to a permanent IP address assignment from a DHCP server? A) reservation B) relay C) scope D) lease

A

New cards
45

Jeff just moved to a new apartment and is looking for a company to contact for Internet service. He is willing to pay a monthly fee, but in return he needs a modem and also an e-mail address. Who would Jeff contact for this service? A) DNS B) ISDN C) ISP D) IEEE

C

New cards
46

Which of the following is a non-routable protocol? A) NetBEUI B) TCP/IP C) DHCP D) AppleTalk

A

New cards
47

The term for a computer with no network is: A) client/server B) peer to peer C) null D) standalone

D

New cards
48

A Digital Subscriber line is best described as: A) an always on services made up of copper phone lines that are not used by voice. B) using existing cable lines that converts a digital signal to analog when sending data. C) a solution for those who live in remote areas because it connects to satellites. D) a dedicated line that connects directly from the ISP to your home/business without sharing.

A

New cards
49

Which networking tool would be used to attach an RJ-45 connector to a CAT5e networking cable? A) punch down tool B) crimper C) DHCP too! D) reflectometer

B

New cards
50
  1. Which of the following is not a network operating system? A) Windows NT B) Windows for Workgroups C) Windows 2000 D) Linux

B

New cards
51
  1. Which of the following is not a way an operating system allocates disk space for files. A) sporadic allocation B) contiguous allocation C) linked allocation D) indexed allocation

A

New cards
52
  1. What is the purpose of the event viewer tool? A) Schedule programs or other tasks to run automatically. B) Used to check the main log files in Windows Server. C) View advanced system information about the CPU, memory, hard disk, and network performance. D) View and edit group policy security settings.

B

New cards
53

A roaming mandatory profile must be renamed with what extension: A).DAT B).TMP C) .MAN D) .TXT

C

New cards
54
  1. Which of the following are the recommended steps that should be taken for worm attack mitigation? A) containment, quarantine, inoculation, treatment B) containment, inoculation, quarantine, treatment C) quarantine, containment, inoculation, treatment D) inoculation, containment, quarantine, treatment

B

New cards
55
  1. HTTPS communication traffic is on what TCP port? A) 443 B) 21 C) 23 D) 80

A

New cards
56
  1. Which of the following would be classified as an access attack? A) Trojan horse B) zero-day attack C) Dos D) password attack

D

New cards
57
  1. Which of the following reconnaissance attack tools are used to search the publicly available IP addresses to identify the addresses that are active? A) ping sweeps B) packet sniffers C) port scans D) Internet queries

A

New cards
58

The main network cable to which branch networks may be connected is called the: A) backbone B) express cable C) trunk D) thick cable

A

New cards
59
  1. What networking device determines the path that a message should take through a network? A) switch B) firewall C) router D) bridge

C

New cards
60

Related to security, DES is: A) Denial of Electronic Service B) Digital Encryption Security C) Data Encryption Standard D) Disk Encryption Standard

C

New cards
61

Which of the following does not describe characteristics of baseband technologies? A) Baseband can send and receive at the same time if the transmission media is split into two channels. B) Baseband transmissions occupy the entire bandwidth of network media C) Baseband typically uses digital signaling over a single wire. D) Baseband transmissions cannot be sent and received at the same time.

A

New cards
62

You've been asked by your supervisor to research new possible operating systems for the ABC Company using one of their current PCs. The company is running a Windows OS, but would like to look at Linux and Mac operating systems as possibilities. Which method listed below would be the best option to test out the systems? A) Create a virtual machine to run and test the software. B) Use a dual boot configuration to choose the test OS at startup. C) Research what you can on the Internet. D) Uninstall Windows and install each of the test systems separately.

A

New cards
63

Which of the following is not a characteristic that applies to UDP? A) Lost or corrupt packets are not resent. B) Packet delivery is guaranteed. C) Packets are treated independently. D) Packet delivery is not guaranteed.

B

New cards
64

What is the generic designator for any of several digitally multiplexed communications carrier systems which has a basic unit called the DSO, which has a transmission rate of 64kbit/s? A) cable modem B) T-Carrier C) DSL D) ISDN

B

New cards
65

The Internet uses the network protocol called A) CSMA/CD B) HTTP C) TCP/IP D) FTP

C

New cards
66

Your Company is requesting that the company network is segregated logically in terms of the departments they deal with. There are three main departments: manufacturing, accounting and sales. The data intended for manufacturing must not reach accounting or sales. Which solution would best fit this request? A) VLANS B) Routing C) RMON probe D) SNMP

A

New cards
67

What specialized United Nations agency provides developing countries with technical expertise and equipment to advance their technological standard of living? Α) ΝΑΤΟ B) ITU C) ISO D) ICANN

B

New cards
68

Which of the following statements is true about single-mode fiber optic cable? A) Single-mode has higher attenuation than multimode. B) Single-mode has a larger core. C) Single-mode is typically used in LANs or small distances. D) Single-mode provides the highest throughput.

D

New cards
69
  1. What type of RJ45 UTP cable is used between switches? A) crossover with a router in between the two switches B) crossover with a CSU/DSU C) straight-through D) crossover cable

D

New cards
70

Which command can be used on a Window computer to test the connectivity of the local machine? A) Ping -192.168.0.1 B) Ping - C) Ping 127.0.0.1 D) Ping -loopback

C

New cards
71
  1. The process of distributing network traffic across numerous servers is called: a. Multiloading b. Fault Tolerance c. Load Balancing d. Distribution

C

New cards
72
  1. Which network is confined to a relatively small space? a. LAN b. WAN c. WiMAX d. GSM

A

New cards
73
  1. The process of determining the path a packet will take on a network is known as: a. segmentation b. routing c. construction d. reassembly

B

New cards
74
  1. How does a proxy server improve web performance for clients on a private LAN? a. It enables users to save frequently used bookmarks in a shared location. b. It expedites incoming data to clients because it replaces client IP addresses. c. It enables incoming requests to bypass the firewall. d. It holds web requests in a cache so that subsequent requests for those pages can be fulfilled locally.

D

New cards
75
  1. Where in Netscape Communicator could you enter the IP address of a proxy server? a. Edit, Preferences, Advanced, and Proxies b. Edit, Preferences, Advanced, and Cache c. Tools, Internet Options, Connections, and Settings d. Tools, Internet Options, and Proxy Server

C

New cards
76
  1. A model for computing where some computers request services and other computers respond to requests for services is called: a. request/response b. host/response c. thin client d. client/server

D

New cards
77
  1. All IIS information on a Windows server is stored in the: a. hive b. .Conf file c. index d. metabase

D

New cards
78
  1. The process of configuring numerous servers to functions as one is called: a. Domaining b. Multiloading c. Clustering d. Balancing

C

New cards
79
  1. Why would it be necessary to include details about an organization's service agreements with telecommunications carriers in disaster recovery plans? a. The carriers also may be affected by the disaster and may owe the organization compensation for downtime. b. The carriers may decide to void their agreement after the disaster. c. The agreements may change as a result of the disaster. d. They will have to supply the organization with new equipment.

A

New cards
80
  1. A client tries to log in to her ISP and is repeatedly prompted to enter her user name and password. Which one of the following are the most likely causes? a. IPX/SPX is not installed. b. She is using an incorrect user name and password combination. c. The modem is not functioning. d. NetBEUI is not installed.

B

New cards
81
  1. Which one of the following is a potential disadvantage to using Telnet to remotely log in to a router? a. It requires a high-bandwidth connection. b. It is not very efficient. c. It is not compatible with all types of router operating systems. d. It is not secure.

D

New cards
82
  1. What specialized United Nations agency provides developing countries with technical expertise and equipment to advance their technological standard of living? a. ICANN b. ITU c. ANSI d. ISO

B

New cards
83
  1. Each network node has a network address and a __________address. a. IP b. IPX c. MAC d. PCD

C

New cards
84
  1. The ability to use names to connect to network resources is controlled by: a. NAME b. DHCP c. NetBIOS d. NETSTAT

C

New cards
85
  1. The type of group that has a GUID attached to it so that you can use it to assign rights and permissions is called: a. security b. permissions c. object d. distribution

A

New cards
86
  1. A set of rules that determines how communications will take place on a network is called: a. ICANN b. Internetwork c. protocol d. IEEE

C

New cards
87
  1. You can start programs if they don't have a shortcut on the desktop or in the programs submenu by: a. typing cmd in the Start Run box b. using the Run dialog box and typing in the name of the program c. using the Shut Down command d. typing cmd in the Start box and then the program

B

New cards
88
  1. What form of Internet access allows the user's computer or router to use an attached modem connected to a telephone line to dial into an ISP's node to establish a modem-to- modem link? a. Cable Modem b. DSL c. Dial-up d. Satellite Internet

C

New cards
89
  1. What is a server service that allows RRAS servers to delegate responsibility for inbound authentication to a central server and can be used to authenticate users at switch ports or wireless access points? a. DNS b. RIM c. DHCP d. RADIUS

D

New cards
90
  1. When using a firewall to guard a private LAN from Internet-based intrusion, how can you still allow authorized users to access the network from home? a. Open access to all the router's ports b. Allow some users to bypass the firewall c. Allow access to select ports based on incoming IP address d. Apply time of day restrictions to some of the firewall's ports

C

New cards
91
  1. At the telephone exchange, what terminates the DSL where another frequency splitter separates the voice band signal from the data signal? a. DSLTA b. FiOS c. DSMOD d. DSLAM

D

New cards
92
  1. Which describes wiring that connects workstations to the hub room? a. patch b. backbone c. horizontal wiring d. harness

C

New cards
93
  1. Typically routers on a LAN are used to separate networks into: a. subnets b. VPNs c. e-mail addresses d. DNS zones

A

New cards
94
  1. Which one of the following layers does the UDP correspond to? a. transport b. physical c. network d. session

A

New cards
95
  1. What type of firewall inspects each packet passing through the network and accepts or rejects it based on user-defined rules? a. application gateway b. circuit-level gateway c. proxy server d. packet filter

D

New cards
96
  1. Which topology is the easiest to modify? a. bus b. star c. ring d. mesh

B

New cards
97
  1. Which one of the following is an example for distance vector protocol? a. RIP b. AppleTalk c. IPX/SPX d. OSPF

A

New cards
98
  1. What is the 802.11 standard? a. Wireless LAN b. Wi-Max c. Token Ring d. Ethernet

A

New cards
99
  1. Which type of cabling has the largest installation base? a. coaxial b. twisted-pair c. wireless d. fiber-optic

B

New cards
100
  1. What is generally the rated speed for T1 and PRI ISDN service? a. 512Kbit/sec b. 256Kbit/sec c. 1.544Mbit/sec d. 3 Mbit/sec

C

New cards

Explore top notes

note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 122 people
... ago
5.0(1)
note Note
studied byStudied by 15463 people
... ago
4.8(102)
note Note
studied byStudied by 58 people
... ago
5.0(1)
note Note
studied byStudied by 69 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(2)
note Note
studied byStudied by 46 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (20)
studied byStudied by 4 people
... ago
4.0(1)
flashcards Flashcard (28)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (55)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 23 people
... ago
5.0(1)
flashcards Flashcard (56)
studied byStudied by 31 people
... ago
4.0(1)
flashcards Flashcard (125)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (56)
studied byStudied by 64 people
... ago
5.0(1)
robot