0% found this document useful (0 votes)
29 views

EXAM

This document contains an exam on data communications concepts. It includes 30 multiple choice questions covering topics like network topologies, transmission modes, connections types, protocols, and networking devices. The questions test understanding of fundamental topics in data communication including physical transmission media, network architectures, and standards.

Uploaded by

john al
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

EXAM

This document contains an exam on data communications concepts. It includes 30 multiple choice questions covering topics like network topologies, transmission modes, connections types, protocols, and networking devices. The questions test understanding of fundamental topics in data communication including physical transmission media, network architectures, and standards.

Uploaded by

john al
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

EXAM 1- Data Communications

1. The ___________ is the physical path over which a 16. Which agency developed standards for physical
message travels. connection interfaces and electronic signaling
a. Physical b. Signal c. None of These D. Medium specifications?
a. EIA b. ITU-T c. ISO d. ANSI
2. The information to be communicated in a data
communications system is the ___________. 17. ________ is the protocol suite for the current internet.
a. Message b. Transmission c. Medium D. Protocol a. UNIX b. NCP c. ACM d. TCP/IP

3. Frequency of a failure and network recovery time after a 18. ________ refers to the structure or format of the data,
failure are measures of the ________ of a network. meaning the order in which they are presented.
a. Performance b. Feasibility c. Reliability d. Security a. Syntax b. Timing c. Latency d. Semantics
4. An unauthorized user is a network _________ issue. 19. ________ defines how a particular pattern to be
a. Performance b. Security c. Reliability d. Fidelity interpreted and what action to be taken based on that
presentation.
5. Which topology requires a central controller or hub?
a. Syntax b. Timing c. Latency d. Semantics
a. Bus b. Mesh c. Star d. Ring
20. _________ refers to two characteristics when data
6.Which topology requires a multipoint connection?
should be sent and how fast it can be sent.
a. Bus b. Star c. Ring d. Mesh
a. Syntax b. Timing c. Latency d. Semantics
7. Communication between a computer and a keyboard
21. Data flow between two devices can occur in a ___ way.
involves ________ transmission.
a. simplex b. half-duplex c. full-duplex d. all of the above
a. full-duplex b. half-duplex c. simplex d. automatic
22. In a _____ connection, two and only two devices are
8. A television broadcast is an example of _________
connected by a dedicated link.
transmission.
a. multipoint b. point-to-point c. a & b d. none of the above
a. half-duplex b. simplex c. automatic d. full-duplex
23. In a _____ connection, three or more devices share a
9. A _______ connection provides a dedicated link
link.
between two devices?
a. multipoint b. point-to-point c. a & b d. none of the above
a. multipoint b. secondary c. point-to-point d. primary
24. Devices may be arranged in a ________ topology.
10. In a ______ connection, more than two devices can
a. mesh b. ring c. bus d. all of the above
share a single link.
a. multipoint b. secondary c. point-to-point d. primary 25. These are _____ internet service providers.
a. local b. regional c. national & international d. all of the above
11. In _______ transmission, the channel capacity is
shared by both communicating devices at all times. 26. A data communication system must ________ data to
a. half-simplex b. half-duplex c. simplex d. full-duplex the correct destination in an accurate and timely manner.
- deliver
12. In the original ARPANET, _______ were directly
connected together. 27. Text, numbers, images, audio and video are different
a. host computers b. network c. IMPs d. routers forms of ________.
- information
13. This was the first network.
a. NSFNET b. ANSNET c. CSNET d. ARPANET 28. A ______ is a set of communication devices connected
by media links.
14. Which organization has authority over interstate and
- network
international commerce in the communications field?
a. IEEE b. ITU-T c. ISOC d. FCC 29. An internet is a ______ of networks.
-network
15. ______ are special-interest groups that quickly test,
evaluate, and standardize new technologies. 30. _______ are special-interest groups that quickly
a. Regulatory agencies c. Forums evaluate and standardize new technologies.
b. All of the choices d. Standards organizations - Forums
31. ________ refers to the physical or logical arrangement 41. Which of the following describe router functions?
of a network. Choose four
- Topology a. Broadcasting forwarding
b. Collision prevention
32. A _______ is a data communication system within a
c. Packet Switching
building, plant, or campus or between nearby buildings.
d. Internetwork communication
- LAN
e. Packet filtering
33. A _______ is a data communication system spanning f. Path selection
states, countries or the whole world. g. Broadcast domain enlargement
-WAN
42. Why does the data communication industry use the
34. ___________ is a collection of many separate
layered OSI reference model? (Choose two)
networks.
- Internet a. It enables equipment from different vendors to use the
same electronic components, thus saving research and
35. A _________ is a set of rules that governs data
development funds.
communication.
b. It supports the evolution of multiple competing
- Protocol
standards and thus provides business opportunities for
36. ________ is an idea or concept that is a precursor to an equipment manufacturers.
internet standard. c. it provides a framework by which changes in
- RFC or Request for Comment functionality in one layer require change in other layers.
37. Data communication is the transfer of data from one d. It divides the network communication process into
device to another via some form of __________ medium. smaller and simpler components, thus aiding component
- transmission development, design, and troubleshooting.
e. It encourages industry standardization by defining what
38. A receiving host has failed to receive all of the functions occur at each layer of the model.
segments that it should acknowledge. What can the host
do to improve the reliability of this communication 43. What are two purposes of segmentation with a
session? bridge?
a. Decrease the sequence number. a. To add more bandwidth for users.
b. Decrease the windows size. b. To create more collision domains.
c. Restart the virtual circuit. c. To add more broadcast domains.
d. Send a different source port number. d. To allow more broadcasts for users.
39. Which fields are contained within an IEEE Ethernet
from the header? Choose two 44. Which of the following are unique characteristics of
half-duplex Ethernet when compared to full—duplex
a. Source and destination MAC address and source and
Ethernet?
destination network address.
a. Half-duplex Ethernet operates in a shared collision
b. Source and destination MAC address.
domain.
c. Source and destination network address.
b. Half-duplex Ethernet has lower effective throughput.
d. FCS field
c. Half-duplex Ethernet operates in a private collision
40. Which layer 1 devices can be used to enlarge the area domain.
covered by a single LAN segment? Choose two d. Half-duplex Ethernet operates in a private broadcast
a. Switch tani hub na na di based sa internet domain.
b. Repeater e. Half-duplex Ethernet has higher effective throughput.
c. NIC
d. RJ45-connector
45. You want to implement a network medium that is not
susceptible to EMI. Which type of cabling should you use?
a. Thicknet coax b. Thinnet coax
c. Category 5 UTP cable d. Fiber-optic cable

46. How does a host on an Ethernet LAN know when to


transmit after a collision has occurred? (Choose two)

a. After a collision, all stations run an identical backoff


algorithm. When the backoff delay period has expired, all
stations have equal priority to transmit data.
b. You can improve the CSMA/CD network by adding more
hubs.
c. After a collision, all stations run a random backoff
algorithm. When the backoff delay period has expired, all
stations have equal priority to transmit data.
d. After a collision, the station that detected the collision
has first priority to resend the lost data.
e. In a CSMA/CD collision domain, stations must wait until
the media is not in use before transmitting.
f. In a CSMA/CD collision domain, multiple stations can
successfully transmit data simultaneously.

47. The Internet model (in Forouzan Ch2) consists of


_________ layers.

Ans. 5

48. The process-to-process delivery of the entire message


is the responsibility of the _________ layer.
Ans. Transport
49. The _______ layer is the layer closest to the
transmission medium.
Ans. Physical

50. Mail services are available to network users through


the _____________ layer.

Ans. Application
EXAM #2 - PHYSICAL
15) The _________ address uniquely defines a host
1) The _______ layer lies between the network
on the Internet.
layer and the application layer.
- IP
- TRANSPORT
16) The _________ address identifies a process on
2) Which of the following is an application layer
the host.
service?
- PORT
- ALL OF THE ABOVE [Remote log-in, File
17) The network layer provides _______ through an
transfer and access, mail service)
internetwork and logical addressing.
3) Why was the OSI model developed?
- ROUTING
- STANDARS WERE NEEDE TO ALLOW ANY
18) PDUs at the Data Link layer are called_______.
TWO SYSTEMS TO COMMUNICATE
- FRAME
4) In the OSI model, what is the main function of
19) The Transport layer uses virtual _________ to
the transport layer?
create a reliable connection between two hosts.
- PROCESS-TO-PROCESS MESSAGE DELIVERY
- CONNECTION
5) When a host network A sends a message to a
20) In OSI, the __________ layer is responsible for
host on network B, which address does the
the electrical and mechanical connections
router look at?
between devices.
- LOGICAL
- PHYSICAL
6) ICMPv6 includes___________.
21) The ________ layer segments data.
- IGMP and ARP
- TRANSPORT
7) The __________ layer is responsible for moving
22) The Network layer creates _________ out of
frames from one hop (node) to the next.
segments handed down from the Transport
- DATA LINK
layer.
8) Internetworking Protocol (IP) is a ___________
- PACKETS
protocol.
23) As the data packet moves from the upper to the
- NONE OF THE ABOVE [reliable, connection-
lower layers, headers are________.
oriented]
- ADDED
9) _________ is a process-to-process protocol that
24) Layer 2 lies between the physical layer and the
adds only port addresses, checksum error
______ layer.
control, and length information to the data
- NETWORK
from the upper layer.
25) When data are transmitted from device A to
- UDP
device B, the header from A’s layer 4 is read by
10) __________ provides full transport layer
B’s ___________ layer.
services to applications.
- TRANSPORT
- TCP
26) In the OSI, the ________ layer changes bits into
11) The __________ address, also known as the link
electromagnetic signals.
address, is the address of a node as defined by
- PHYSICAL
its LAN or WAN.
27) The _______ model developed by ISO shows
- PHYSICAL
how the network functions of a computer ought
12) Ethernet uses a __________ physical address
to be organized.
that is imprinted on the network interface card
- OSI
(NIC).
28) The physical layer is concerned with the
- 6-BYTE
movement of ________ over the physical
13) TCP/IP is a ________ hierarchical protocol suite
medium.
developed ________ the OSI model.
- BITS
- FIVE-LAYER; BEFORE
29) The OSI model consists of ______ layers.
14) The ________ address, also known as the link
- SEVEN
address, is the address of a node as defined by
its LAN or WAN.
30)In the OSI model, as a data packet moves from 44) In OSI, the __________ layer is responsible for
the lower to the upper layers, headers are delivering data units from one station to the
________. next without errors.
- REMOVED - DATA LINK
31)In the OSI model, when data is transmitted from 45) In the OSI, the _______ layer is responsible for
device A to device B, the header from A’s layer the source-to-destination delivery of a packet
5 is read by B’s _________ layer. across multiple network links.
- SESSION - NETWORK
32) In the OSI model, encryption and decryption are 46) In OSI, the ___________ layer is responsible for
functions of the __________ layer. the process-to-process deliver of the entire
- PRESENTATION message.
33) To deliver a message to the correct application - TRANSPORT
program running on a host, the _________ 47) In the OSI, the _______ layer establishes,
address must be consulted. maintains, and synchronizes the interactions
- PORT between communicating devices.
34) IPv6 has ______-bit address. - SESSION
- 128 48) In OSI, the ___________ layer ensures
35) The ______ layer adds a header to the packet interoperability between communicating
coming from the upper layer that includes the devices through transformation of data into a
logical addresses of the sender and receiver. mutually agreed upon format.
- NETWORK - PRESENTATION
36) In the OSI, the ________ layer is responsible for 49) In OSI, the _________ layer enables the users to
the delivery of a message from the process to access the network.
another. - APPLICATION
- TRANSPORT 50) The TCP/IP ___________ layer is equivalent to
37) A port address in TCP/IP is _______ bits long. the combined session, presentation, and
- 16 application layers of the OSI model.
38) The ________ created a model called the Open - APPLICATION
Interconnection, which allows diverse systems
to communicate.
- ISO
39) The seven-layer _______ model provides
guidelines for the development of universally
compatible networking protocols.
- OSI
40) The physical, data link, and network layers are
the _______ support layers.
- NETWORK
41) The session, presentation, and application
layers are the _______ support layers.
- USER
42) In the OSI, the _______ layer links the network
support layers and the user support layers.
- TRANSPORT
43) In the OSI, the ________ layer coordinates the
functions required to transmit a bit stream over
a physical medium.
- PHYSICAL
EXAM 3 Data Comms 10. Which of the following 10 Gigabit Ethernet
standards has the greatest maximum transmission
1. Which of the following fiber connectors uses a twist-
distance?
type connection method?
Ans. 10GBaseER
a. SC
b. SA 11. Your manager has asked you to specify a high-speed
c.BNC 10GbE link to provide connectivity between two
d. ST buildings 3km from each other. Which of the following
IEEE standards are you likely to recommend?
2. How is the class of an IP address determined? Ans. 10GBaseLR
a. From the router
b. From the last bit in last byte in the IP address
12. Which of the following is the strongest password?
c. From the first four bits of the first byte in the IP address
Ans. 100KalivE
d. from the MAC address
e. From the first bit of the first byte in the IP address.
13. What is the IPv6 equivalent of 127.0.0.1? Choose
two
3. How many octets does a Class A address use to
represent the network portion? Ans. 0:0:0:0:0:0:0:1 and ::1
Ans. 1
14. As a network administrator, you work in a wiring
4. Which of the following answers refers to a system closet where none of the cables have been labeled.
containing mapping of domain names to various types of Which of the following tools are you most likely to use
data, such as numerical IP address? to locate the physical ends of the cable?
Ans. DNS Ans. Toner Probe

5. Which of the following services or protocols use SSH 15. Which of the following is a Class B address?
technology to provide additional security to Ans. 129.16.12.200
communications? (Choose two)
Ans. SFTP, SCP 16. Which Broadband over Power Lines standard exists
for high-speed communication devices?
6. Which of the following is an open source virtual switch? Ans. IEEE 1901
Ans. Open vSwitch
17. Which of the following is NOT a common packet
7. Because of a recent security breach, you have been sent during the normal DHCP process?
asked to design a security strategy that will allow data Ans. DHCPPROVE
to travel encrypted through both the Internet and
intranet. Which of the following protocols would you 18. Which of the following address types are associated
use? with IPv6? (Choose all that apply)
Ans. IPSec Ans. Multicast, Unicast, Anycast

8. You came to work on Thursday morning to find that 19. A user calls to report that he is experiencing periodic
the server has failed and you need to restore the data problems connecting to the network. Upon
from backup. You finished a full backup on Sunday and investigation, you find that the cable connecting the
incremental backups on Monday, Tuesday and user's PC to the switch is close to a fluorescent light
Wednesday. How many tapes are required to restore fitting. What condition is most likely causing the
the back up? problem?
Ans. Four Ans. EMI

9. Which command can you issue from the command


line to view the status of the system’s ports?
Ans. Netstat-a
20. How many octets does a Class C address use to 29. A computer is connected directly to the internet, so
represent the network portion? what type of address it must have?
Ans. 3 Ans. Public Address

21. You are the administrator for a network with two 30. Which of the following devices passes data based on
Windows Server systems and 65 Windows 7 systems. At the MAC address?
10 a.m., three users call to report that they are Ans. Switch
experiencing network connectivity problems. Upon
investigation, you determine that the DHCP server has 31. Several users on your network are downloading
failed. How can you tell that the DHCP server failure is from peer to-peer networks, tying up bandwidth during
the cause of the connectivity problems experienced by peak hours. Which of the following is used to manage
the three users? network bandwidth?
Ans. When you check their systems, they have an IP Ans. Bandwidth shaper
address from the 169.254.x.x range.
32. Which of the following is not a type of fiber-optic
22. Which of the following is true of many SOHO connector used in network implementations?
routers? Ans. BNC
Ans. They close down the ICMP ports by default.
33. When a WAN is confined to a certain geographic
23. What device acts as a translator between the LAN area, such as a university campus or city, it is known as
data format and the WAN data format? a ______________.
Ans. CSU/DSU Ans. MAN

24. Which of the following recovery sites might require 34. Which of the following is not an authentication
the delivery of computer equipment and an update of protocol?
all network data? Ans. IPSec
Ans. Cold site
35. Which of the following commands generates a
25. Which of the following protocols is used with Request timed out error message?
HTTPS? Ans. Ping
Ans. SSL
36. Which of the following best describes the function
26. Which of the following is not a commonly of the default gateway?
implemented feature of a firewall system? Ans. It enables systems to communicate with systems
Ans. NAS on a remote network

27. What is the basic reason for implementing a 37. What are the two main types of punchdown blocks?
firewall? (Choose two.)
Ans. It provides a mechanism to protect one network Ans. 110 and 66
from another.
38. On a typical cable modem, which panel light is found
28. In a 100BaseTX network environment, what is the beneath the power light?
maximum distance between the device and the Ans. Receive
networking equipment, assuming that no repeaters are
used?
Ans. 100 meters
39. You are wiring a new network. Due to space 48. Which of the following IP addresses is not from a
limitations, you need to run several cables close to each private address range?
other. After the setup, you find that the signals from Ans. 127.45.112.16
each cable are overlapping. Which term describes what
is happening? 49. When a vendor offers to provide all networking for a
Ans. Crosstalk client— freeing the company from needing to worry
about bandwidth, connectivity, scalability, and all the
40. In the 802.1X security framework, which of the issues normally associated with networking—what is it
following best describes the role of the supplicant? known as?
Ans. The system or node requesting access and Ans. NaaS
authentication to a network resource
50. Which of following connectors is commonly used
41. As part of your network administrative with fiber cabling?
responsibilities, you have completed your monthly Ans. SC
backups. As part of backup best practices, where should
the tapes be stored?
Ans. In a secure offsite location

42. What tool would you use when working with an


IDC?
Ans. Punchdown Tool

43. In a crossover cable, which wire is wire 1 crossed


with?
Ans. 3

44. As network administrator, you have been tasked


with designing a disaster recovery plan for your
network. Which of the following might you include in a
disaster recovery plan?
Ans. Offsite tape storage

45. You are installing a new system into an existing star


network, and you need a cable that is 45 feet long. Your
local vendor does not stock cables of this length, so you
are forced to make your own. Which of the following
tools do you need to complete the task?
Ans. Crimper

46. Which of the following best describes 802.1X?


Ans. A port-based access control

47. You are onsite as a consultant. The client's many


remote-access users experience connection problems.
Basically, when users try to connect, the system cannot
service their authentication requests. What kind of
server might you recommend to alleviate this problem?
Ans. RADIUS server
ECE40: Quiz 4 11. Port mirroring enables administrators to monitor
which traffic to the switch?
1. at which OSI layer does an AP operate?
inbound and outbound
data link
12 which of the following devices sends a packet to all
2. Of the following routing methods, which is likely to
active interfaces/ ports?
admission time in the long term?
hub
static
13. Which of the following is not used to avoid
3. which of the following statements best describes a
redundant paths and potential loops within ports?
gateway?
jamming
it refers to any device that resides at the entrance of a
network.
14. Users are complaining that the network’s
performance is unsatisfactory. It takes a long time to
4. Which of the following best describes the function of
pull files from the server, and under heavy loads,
the default gateway?
workstations ca become disconnected from server. The
it provides the route for destinations outside the local
network is heavily used and a new videoconferencing
network.
application is about to be installed. The network is a
5. which of the following is a common phrase used for 1000BaseT system created with Ethernet hubs. Which
server clustering? device are you most likely to install to alleviate the
server farm performance problems?
switch
6. A network protocol that allows for secure file transfer
over Secure Shell is called? 15. Which of the following protocols offer a guaranteed
SFTP delivery?
TCP
7. The SMTP protocol is used for: (select 2 answers)
Sending Email between mail servers
16. Which of the following are considered transport
sending email from a client device
protocols?

8. What are the two features supported in SNMPv3 and UDP and TCP
not previous versions?
encryption
17. When a system running TCP/IP receives a data
authentication
packet, which of the following does it use to determine
which service to forward the packet to?
9. Which of the answers listed below refers to a secure
port number
replacement for Telnet?
SSH
18. Which of the following bits of IP information are
mandatory to join the network? (choose two)
10. You are experiencing performance problems on
subnet mask
your Ethernet-based network. By using a network
IP address
performance—monitoring tool, you determine that the
network has a large number of collisions. To reduce the
19. You have been asked to install a network to give the
collision, you decide to install a network bridge. What
network users the greatest amount of fault tolerance.
kind of bridge are you most likely to implement?
Which of the following network topologies would you
transparent bridge
choose?
Mesh
20. Which of the following statements are associated 28. which of the following statements are true of ISDN?
with a bus LAN network? ( Choose all correct answers) PRI ISDN uses 23 B+1 D channels
-a single cable break can cause complete network BRI ISDN uses two B+1 D channels
disruption
-it uses a single backbone to connect all network 29. You have been hired to establish a WAN connection
device. between two offices: one in Vancouver and one in
Seattle. The transmission speed can be less than 2Mbos.
21. Your company wants to create a secure tunnel
Which of the following technologies could you choose?
between two networks over the Internet. Which of the
T3
following protocols would you use to do this?
PPTP
30. Which of the following circuit-switching strategies
22. By producing broadcast traffic throughout the does ATM use? (Choose the two best answers.)
network , VLANs free up____
bandwidth SVC and PVC

23. Which of the following are valid ways to assign 31. Due to recent cutbacks, your boss approaches you,
computers to a VLAN? (choose the three best answers) demanding an alternative to the company’s costly
MAC address dedicated T1 line. Only small amounts of data require
Protocol assignment transfer over the line. Which of the following are you
port-band assignment likely to recommend?
The PSTN
24. Which of the following are required to establish a
vpn connection? 32. which of the following technologies requires a
Vpn sever logical connection between the sending and receiving
vpn cliet devices?
Vpn protocols virtual-circuit packet switching

25. Which of the following statements best describe a 33. Which of the following technologies require dialup
VPN? access?
it is a secure communication channel across a public The PSTN
network such as the internet. ISDN

26. Tour company currently uses a standard PSTN 34. Which of the following is an advantage of ISDN over
communication link to transfer files between LANs. the PSTN?
Until now, the transfer speeds have been sufficient for ISDN is faster
the amount of data that needs to be transferred.
Recently, a new application was purchased that requires 35. Which of the following techniques is known as a 3G
a minimum transmission speed of 1.5Mbps. You have transitional technology that supports legacy
been given the task to find the most cost effective architecture?
solution to accommodate the new application. Which of HSPA+
the following technologies would you use?
T1 36. Which of the following is the time lapse between
sending and receiving od requesting information and
27. Which of the following best describes the process to the time it takes to return?
create a dedicated circuit between two communication Latency
endpoints and direct traffic between those two points?
circuit switching 37. Which of the following provides public hotspots for
wireless access?
WISP
46. Which of the following power-related problems is
38.which of the following is an attack in which a rogue associated with a short-term voltage drop?
wireless access point poses as a legitimate wireless sag
service provider to intercept information users
transmit? 47. Which of the following statements best describes
Evil Twin the function of PPP?
It is a dialup protocol used over serial links.
39. Which of the following wireless protocols operate at
2.4GHz? 48.which of the following would most likely use latency-
802.11n sensitive QoS?
802.11g VoIP
802.11b
49. As a network administrator, you have been asked to
40. Under what circumstances would you change the implement a RAID solution that offers high
default channel on an access point? performance. Fault tolerance is not a concern. Which
when a channel overlap occurs between access point RAID level are you likely to use?
RAID 0
41. A client on your network has had no problems
accessing the wireless network in the past, but recently 50. Which of the following protocols is used in thin-
the moved to a new office. Since the move she cannot client computing?
access the network. Which of the following is most RDP
likely the cause of the problem?
the client system has moved too far from the access
point.

42. Which of the following are components of the layer


2 in OSI?
LLC
MAC

43. You have enabled HTTPs because of concerns about


security of your web server application, which runs on a
web server system in the DZM of your corporate
network. However, remote users are now unable to
connect to the application. Which of the following is the
most likely reason for the problem?
Port 443 is being blocked on the corporate firewall.

44. Which of the following is the most commonly used


port for FTP in modern implementations?
21

45. As the network administrator, you decide to block


port 80. Which of the following services will be
unavailable for network users?
HTTP
Exam 5 15. 802.1Q is the IEEE standards to create a virtual
Networks on your LAN.
1. You are installing a wireless network solution that
uses a feature known as MIMO. Which wireless 16. What type of Network configuration enables a
Network standard are you using? remote user to access a private Network across the
internet.
-802.11n
Remote Access VPN
2. A Hop count of 16 means the route is unreachable.
17. The computer that initiates the connection to the
3. In environments that use static routing, routes and
VPN server.
route information are entered into the routing tables by
hand. VPN client

4. Ina dynamic routing environment, the network admin 18. Authenticates connection from VPN clients.
uses routing protocols.
VPN Server
5. Although the SNMP manager resides on a PC , each
19.Wireless devices communicate with the wired LAN
device that is part of the SNMP structure also need to
through a base station known as an Access Point.
have some SNMP functionality enabled. What is the
software component that performs this called? 20. In a wireless ad hac topology, devices
communication directly between themselves without
-agent
using access Point. This peer to peer network design is
6.A type of cryptographic network protocol for secure commonly used to connect a small number of
data communication, remote command line log in, computers or wireless devices.
remote command execution, and other secure Network
21 Wireless Access Points are used to create WLAN
services between two Networked computers is known
as: 22. DHCP is a protocol dependent service and also
platform dependent.
-SSH
True
7. In a packet switching environment, the packet begins
to be forwarded as soon as it is received. 23. Is a system in not configured with any static routes
or default gateway, it is limited to operating on its own
8.what topology would use a hub or switch?
Network.
-star
True
9. A topology refers to a network’s physical and logical
24. SNMP in itself is a network management system.
lay out.
True.
10. A network’s logical topology refers to the way in
which the network appears to the devices that use it. 25. Your router has the following IP address on
Enthernet0.172.16.2.1/23. Which of the following can
11.A network’s physical topology refers to the actual
be valid host IDs on the LAN interface attached to the
layout of the computer cables and other network
router.
devices.
172.16.2.255
12. A bus topology uses a trunk or backbone to connect
all the computer’s on the network. 172.16.3.0
13. A star topology is the easiest to expand in terms of 26. You need to subnet a network that has 5 subnets,
the number of devices connected to the Network. each with at least 16 hosts. Which class subnet mask
would you use.
14. The infrastructure wireless topology is commonly
used to extend a wired LAN to include wireless devices. 255.255.255.224
27.What is the maximum number of IP addresses that FQDN
can be assigned to hosts on a local subnet that uses the
39. DNS solves the problem of name resolution by
255.255.255.224 subnet masks.
offering resolution through servers configured to act as
30 Name servers.

28. Last valid host on the subnetwork 192.168.249.0/26 40. You troubleshoot a network using 1000BaseCX
cable, and you suspect that the maximum length has
192.168.249.62
been exceeded. What is the maximum length in meters
29. First valid host on the subnetwork that the node of 1000BaseCX cable.
172.16.108.136/27 belongs to?
25
172.16.108.129
41. Data sent with unicast addressing is delivered to a
30. Broadcast address of the network 192.168.220.0 specific node identified by the address. It is a point to
255.255.255.224? point address link

192.168.220.31 42. A broadcast address is an IP address that you can


use to target all systems on a subnet or network instead
31. Which subnet does host 172.24.170.190 of single hosts
255.255.254.0 belongs to?
43. Multicasting is a mechanism by which groups of
172.24.170.128 network devices can send and receive data between the
32. You are asked to configure the security settings for a members of the group at one time, instead of
new wireless Network. You want to setting that offers separately sending messages to each device in the
the greatest level of security. Which of the following group.
would you choose. 44. Static addressing refers to the manual assignment of
WEP-shared IP addresses to a system.

33. You purchase a new wireless access point that uses 45. Dynamic addressing to the automatic assignment of
no WEP security by default. You change the settings to IP addresses.
use 128 bit encryption. How much the client system be 46. Enables the system to determine what portion of
configured. the IP address represent the network address and what
All the client systems must be set to 128 bit encryption portion represent the node address.

34. You experience connectivity problems with your Subnet mask


SOHO Network. What can you change in the attempt to 47. A LAN is a data Network restricted to a single
solve the problem. geographic location and typically encompasses a
Lower the transfer rate. relatively small area, such as an office building or
school.
35. Within DHCP, ranges the IP addresses are known as
IP Pool. 48. A peer-to-peer network is a decentralized network
model offering no centralized storage of data or
36. A special packet that looks for a DHCP server. centralized control over the Sharing of files or
DHCP Discover Packet resources.

37. A Distributed network model has the processing 49. The point-to-point link is often used for organization
power distributed between the client systems and the that need a direct link between two remote office
server. building.

38. Within DNS, what is the domain name, along with 50 . What is the default port used by NTP.
any subdomains called? 123

You might also like