EXAM
EXAM
1. The ___________ is the physical path over which a 16. Which agency developed standards for physical
message travels. connection interfaces and electronic signaling
a. Physical b. Signal c. None of These D. Medium specifications?
a. EIA b. ITU-T c. ISO d. ANSI
2. The information to be communicated in a data
communications system is the ___________. 17. ________ is the protocol suite for the current internet.
a. Message b. Transmission c. Medium D. Protocol a. UNIX b. NCP c. ACM d. TCP/IP
3. Frequency of a failure and network recovery time after a 18. ________ refers to the structure or format of the data,
failure are measures of the ________ of a network. meaning the order in which they are presented.
a. Performance b. Feasibility c. Reliability d. Security a. Syntax b. Timing c. Latency d. Semantics
4. An unauthorized user is a network _________ issue. 19. ________ defines how a particular pattern to be
a. Performance b. Security c. Reliability d. Fidelity interpreted and what action to be taken based on that
presentation.
5. Which topology requires a central controller or hub?
a. Syntax b. Timing c. Latency d. Semantics
a. Bus b. Mesh c. Star d. Ring
20. _________ refers to two characteristics when data
6.Which topology requires a multipoint connection?
should be sent and how fast it can be sent.
a. Bus b. Star c. Ring d. Mesh
a. Syntax b. Timing c. Latency d. Semantics
7. Communication between a computer and a keyboard
21. Data flow between two devices can occur in a ___ way.
involves ________ transmission.
a. simplex b. half-duplex c. full-duplex d. all of the above
a. full-duplex b. half-duplex c. simplex d. automatic
22. In a _____ connection, two and only two devices are
8. A television broadcast is an example of _________
connected by a dedicated link.
transmission.
a. multipoint b. point-to-point c. a & b d. none of the above
a. half-duplex b. simplex c. automatic d. full-duplex
23. In a _____ connection, three or more devices share a
9. A _______ connection provides a dedicated link
link.
between two devices?
a. multipoint b. point-to-point c. a & b d. none of the above
a. multipoint b. secondary c. point-to-point d. primary
24. Devices may be arranged in a ________ topology.
10. In a ______ connection, more than two devices can
a. mesh b. ring c. bus d. all of the above
share a single link.
a. multipoint b. secondary c. point-to-point d. primary 25. These are _____ internet service providers.
a. local b. regional c. national & international d. all of the above
11. In _______ transmission, the channel capacity is
shared by both communicating devices at all times. 26. A data communication system must ________ data to
a. half-simplex b. half-duplex c. simplex d. full-duplex the correct destination in an accurate and timely manner.
- deliver
12. In the original ARPANET, _______ were directly
connected together. 27. Text, numbers, images, audio and video are different
a. host computers b. network c. IMPs d. routers forms of ________.
- information
13. This was the first network.
a. NSFNET b. ANSNET c. CSNET d. ARPANET 28. A ______ is a set of communication devices connected
by media links.
14. Which organization has authority over interstate and
- network
international commerce in the communications field?
a. IEEE b. ITU-T c. ISOC d. FCC 29. An internet is a ______ of networks.
-network
15. ______ are special-interest groups that quickly test,
evaluate, and standardize new technologies. 30. _______ are special-interest groups that quickly
a. Regulatory agencies c. Forums evaluate and standardize new technologies.
b. All of the choices d. Standards organizations - Forums
31. ________ refers to the physical or logical arrangement 41. Which of the following describe router functions?
of a network. Choose four
- Topology a. Broadcasting forwarding
b. Collision prevention
32. A _______ is a data communication system within a
c. Packet Switching
building, plant, or campus or between nearby buildings.
d. Internetwork communication
- LAN
e. Packet filtering
33. A _______ is a data communication system spanning f. Path selection
states, countries or the whole world. g. Broadcast domain enlargement
-WAN
42. Why does the data communication industry use the
34. ___________ is a collection of many separate
layered OSI reference model? (Choose two)
networks.
- Internet a. It enables equipment from different vendors to use the
same electronic components, thus saving research and
35. A _________ is a set of rules that governs data
development funds.
communication.
b. It supports the evolution of multiple competing
- Protocol
standards and thus provides business opportunities for
36. ________ is an idea or concept that is a precursor to an equipment manufacturers.
internet standard. c. it provides a framework by which changes in
- RFC or Request for Comment functionality in one layer require change in other layers.
37. Data communication is the transfer of data from one d. It divides the network communication process into
device to another via some form of __________ medium. smaller and simpler components, thus aiding component
- transmission development, design, and troubleshooting.
e. It encourages industry standardization by defining what
38. A receiving host has failed to receive all of the functions occur at each layer of the model.
segments that it should acknowledge. What can the host
do to improve the reliability of this communication 43. What are two purposes of segmentation with a
session? bridge?
a. Decrease the sequence number. a. To add more bandwidth for users.
b. Decrease the windows size. b. To create more collision domains.
c. Restart the virtual circuit. c. To add more broadcast domains.
d. Send a different source port number. d. To allow more broadcasts for users.
39. Which fields are contained within an IEEE Ethernet
from the header? Choose two 44. Which of the following are unique characteristics of
half-duplex Ethernet when compared to full—duplex
a. Source and destination MAC address and source and
Ethernet?
destination network address.
a. Half-duplex Ethernet operates in a shared collision
b. Source and destination MAC address.
domain.
c. Source and destination network address.
b. Half-duplex Ethernet has lower effective throughput.
d. FCS field
c. Half-duplex Ethernet operates in a private collision
40. Which layer 1 devices can be used to enlarge the area domain.
covered by a single LAN segment? Choose two d. Half-duplex Ethernet operates in a private broadcast
a. Switch tani hub na na di based sa internet domain.
b. Repeater e. Half-duplex Ethernet has higher effective throughput.
c. NIC
d. RJ45-connector
45. You want to implement a network medium that is not
susceptible to EMI. Which type of cabling should you use?
a. Thicknet coax b. Thinnet coax
c. Category 5 UTP cable d. Fiber-optic cable
Ans. 5
Ans. Application
EXAM #2 - PHYSICAL
15) The _________ address uniquely defines a host
1) The _______ layer lies between the network
on the Internet.
layer and the application layer.
- IP
- TRANSPORT
16) The _________ address identifies a process on
2) Which of the following is an application layer
the host.
service?
- PORT
- ALL OF THE ABOVE [Remote log-in, File
17) The network layer provides _______ through an
transfer and access, mail service)
internetwork and logical addressing.
3) Why was the OSI model developed?
- ROUTING
- STANDARS WERE NEEDE TO ALLOW ANY
18) PDUs at the Data Link layer are called_______.
TWO SYSTEMS TO COMMUNICATE
- FRAME
4) In the OSI model, what is the main function of
19) The Transport layer uses virtual _________ to
the transport layer?
create a reliable connection between two hosts.
- PROCESS-TO-PROCESS MESSAGE DELIVERY
- CONNECTION
5) When a host network A sends a message to a
20) In OSI, the __________ layer is responsible for
host on network B, which address does the
the electrical and mechanical connections
router look at?
between devices.
- LOGICAL
- PHYSICAL
6) ICMPv6 includes___________.
21) The ________ layer segments data.
- IGMP and ARP
- TRANSPORT
7) The __________ layer is responsible for moving
22) The Network layer creates _________ out of
frames from one hop (node) to the next.
segments handed down from the Transport
- DATA LINK
layer.
8) Internetworking Protocol (IP) is a ___________
- PACKETS
protocol.
23) As the data packet moves from the upper to the
- NONE OF THE ABOVE [reliable, connection-
lower layers, headers are________.
oriented]
- ADDED
9) _________ is a process-to-process protocol that
24) Layer 2 lies between the physical layer and the
adds only port addresses, checksum error
______ layer.
control, and length information to the data
- NETWORK
from the upper layer.
25) When data are transmitted from device A to
- UDP
device B, the header from A’s layer 4 is read by
10) __________ provides full transport layer
B’s ___________ layer.
services to applications.
- TRANSPORT
- TCP
26) In the OSI, the ________ layer changes bits into
11) The __________ address, also known as the link
electromagnetic signals.
address, is the address of a node as defined by
- PHYSICAL
its LAN or WAN.
27) The _______ model developed by ISO shows
- PHYSICAL
how the network functions of a computer ought
12) Ethernet uses a __________ physical address
to be organized.
that is imprinted on the network interface card
- OSI
(NIC).
28) The physical layer is concerned with the
- 6-BYTE
movement of ________ over the physical
13) TCP/IP is a ________ hierarchical protocol suite
medium.
developed ________ the OSI model.
- BITS
- FIVE-LAYER; BEFORE
29) The OSI model consists of ______ layers.
14) The ________ address, also known as the link
- SEVEN
address, is the address of a node as defined by
its LAN or WAN.
30)In the OSI model, as a data packet moves from 44) In OSI, the __________ layer is responsible for
the lower to the upper layers, headers are delivering data units from one station to the
________. next without errors.
- REMOVED - DATA LINK
31)In the OSI model, when data is transmitted from 45) In the OSI, the _______ layer is responsible for
device A to device B, the header from A’s layer the source-to-destination delivery of a packet
5 is read by B’s _________ layer. across multiple network links.
- SESSION - NETWORK
32) In the OSI model, encryption and decryption are 46) In OSI, the ___________ layer is responsible for
functions of the __________ layer. the process-to-process deliver of the entire
- PRESENTATION message.
33) To deliver a message to the correct application - TRANSPORT
program running on a host, the _________ 47) In the OSI, the _______ layer establishes,
address must be consulted. maintains, and synchronizes the interactions
- PORT between communicating devices.
34) IPv6 has ______-bit address. - SESSION
- 128 48) In OSI, the ___________ layer ensures
35) The ______ layer adds a header to the packet interoperability between communicating
coming from the upper layer that includes the devices through transformation of data into a
logical addresses of the sender and receiver. mutually agreed upon format.
- NETWORK - PRESENTATION
36) In the OSI, the ________ layer is responsible for 49) In OSI, the _________ layer enables the users to
the delivery of a message from the process to access the network.
another. - APPLICATION
- TRANSPORT 50) The TCP/IP ___________ layer is equivalent to
37) A port address in TCP/IP is _______ bits long. the combined session, presentation, and
- 16 application layers of the OSI model.
38) The ________ created a model called the Open - APPLICATION
Interconnection, which allows diverse systems
to communicate.
- ISO
39) The seven-layer _______ model provides
guidelines for the development of universally
compatible networking protocols.
- OSI
40) The physical, data link, and network layers are
the _______ support layers.
- NETWORK
41) The session, presentation, and application
layers are the _______ support layers.
- USER
42) In the OSI, the _______ layer links the network
support layers and the user support layers.
- TRANSPORT
43) In the OSI, the ________ layer coordinates the
functions required to transmit a bit stream over
a physical medium.
- PHYSICAL
EXAM 3 Data Comms 10. Which of the following 10 Gigabit Ethernet
standards has the greatest maximum transmission
1. Which of the following fiber connectors uses a twist-
distance?
type connection method?
Ans. 10GBaseER
a. SC
b. SA 11. Your manager has asked you to specify a high-speed
c.BNC 10GbE link to provide connectivity between two
d. ST buildings 3km from each other. Which of the following
IEEE standards are you likely to recommend?
2. How is the class of an IP address determined? Ans. 10GBaseLR
a. From the router
b. From the last bit in last byte in the IP address
12. Which of the following is the strongest password?
c. From the first four bits of the first byte in the IP address
Ans. 100KalivE
d. from the MAC address
e. From the first bit of the first byte in the IP address.
13. What is the IPv6 equivalent of 127.0.0.1? Choose
two
3. How many octets does a Class A address use to
represent the network portion? Ans. 0:0:0:0:0:0:0:1 and ::1
Ans. 1
14. As a network administrator, you work in a wiring
4. Which of the following answers refers to a system closet where none of the cables have been labeled.
containing mapping of domain names to various types of Which of the following tools are you most likely to use
data, such as numerical IP address? to locate the physical ends of the cable?
Ans. DNS Ans. Toner Probe
5. Which of the following services or protocols use SSH 15. Which of the following is a Class B address?
technology to provide additional security to Ans. 129.16.12.200
communications? (Choose two)
Ans. SFTP, SCP 16. Which Broadband over Power Lines standard exists
for high-speed communication devices?
6. Which of the following is an open source virtual switch? Ans. IEEE 1901
Ans. Open vSwitch
17. Which of the following is NOT a common packet
7. Because of a recent security breach, you have been sent during the normal DHCP process?
asked to design a security strategy that will allow data Ans. DHCPPROVE
to travel encrypted through both the Internet and
intranet. Which of the following protocols would you 18. Which of the following address types are associated
use? with IPv6? (Choose all that apply)
Ans. IPSec Ans. Multicast, Unicast, Anycast
8. You came to work on Thursday morning to find that 19. A user calls to report that he is experiencing periodic
the server has failed and you need to restore the data problems connecting to the network. Upon
from backup. You finished a full backup on Sunday and investigation, you find that the cable connecting the
incremental backups on Monday, Tuesday and user's PC to the switch is close to a fluorescent light
Wednesday. How many tapes are required to restore fitting. What condition is most likely causing the
the back up? problem?
Ans. Four Ans. EMI
21. You are the administrator for a network with two 30. Which of the following devices passes data based on
Windows Server systems and 65 Windows 7 systems. At the MAC address?
10 a.m., three users call to report that they are Ans. Switch
experiencing network connectivity problems. Upon
investigation, you determine that the DHCP server has 31. Several users on your network are downloading
failed. How can you tell that the DHCP server failure is from peer to-peer networks, tying up bandwidth during
the cause of the connectivity problems experienced by peak hours. Which of the following is used to manage
the three users? network bandwidth?
Ans. When you check their systems, they have an IP Ans. Bandwidth shaper
address from the 169.254.x.x range.
32. Which of the following is not a type of fiber-optic
22. Which of the following is true of many SOHO connector used in network implementations?
routers? Ans. BNC
Ans. They close down the ICMP ports by default.
33. When a WAN is confined to a certain geographic
23. What device acts as a translator between the LAN area, such as a university campus or city, it is known as
data format and the WAN data format? a ______________.
Ans. CSU/DSU Ans. MAN
24. Which of the following recovery sites might require 34. Which of the following is not an authentication
the delivery of computer equipment and an update of protocol?
all network data? Ans. IPSec
Ans. Cold site
35. Which of the following commands generates a
25. Which of the following protocols is used with Request timed out error message?
HTTPS? Ans. Ping
Ans. SSL
36. Which of the following best describes the function
26. Which of the following is not a commonly of the default gateway?
implemented feature of a firewall system? Ans. It enables systems to communicate with systems
Ans. NAS on a remote network
27. What is the basic reason for implementing a 37. What are the two main types of punchdown blocks?
firewall? (Choose two.)
Ans. It provides a mechanism to protect one network Ans. 110 and 66
from another.
38. On a typical cable modem, which panel light is found
28. In a 100BaseTX network environment, what is the beneath the power light?
maximum distance between the device and the Ans. Receive
networking equipment, assuming that no repeaters are
used?
Ans. 100 meters
39. You are wiring a new network. Due to space 48. Which of the following IP addresses is not from a
limitations, you need to run several cables close to each private address range?
other. After the setup, you find that the signals from Ans. 127.45.112.16
each cable are overlapping. Which term describes what
is happening? 49. When a vendor offers to provide all networking for a
Ans. Crosstalk client— freeing the company from needing to worry
about bandwidth, connectivity, scalability, and all the
40. In the 802.1X security framework, which of the issues normally associated with networking—what is it
following best describes the role of the supplicant? known as?
Ans. The system or node requesting access and Ans. NaaS
authentication to a network resource
50. Which of following connectors is commonly used
41. As part of your network administrative with fiber cabling?
responsibilities, you have completed your monthly Ans. SC
backups. As part of backup best practices, where should
the tapes be stored?
Ans. In a secure offsite location
8. What are the two features supported in SNMPv3 and UDP and TCP
not previous versions?
encryption
17. When a system running TCP/IP receives a data
authentication
packet, which of the following does it use to determine
which service to forward the packet to?
9. Which of the answers listed below refers to a secure
port number
replacement for Telnet?
SSH
18. Which of the following bits of IP information are
mandatory to join the network? (choose two)
10. You are experiencing performance problems on
subnet mask
your Ethernet-based network. By using a network
IP address
performance—monitoring tool, you determine that the
network has a large number of collisions. To reduce the
19. You have been asked to install a network to give the
collision, you decide to install a network bridge. What
network users the greatest amount of fault tolerance.
kind of bridge are you most likely to implement?
Which of the following network topologies would you
transparent bridge
choose?
Mesh
20. Which of the following statements are associated 28. which of the following statements are true of ISDN?
with a bus LAN network? ( Choose all correct answers) PRI ISDN uses 23 B+1 D channels
-a single cable break can cause complete network BRI ISDN uses two B+1 D channels
disruption
-it uses a single backbone to connect all network 29. You have been hired to establish a WAN connection
device. between two offices: one in Vancouver and one in
Seattle. The transmission speed can be less than 2Mbos.
21. Your company wants to create a secure tunnel
Which of the following technologies could you choose?
between two networks over the Internet. Which of the
T3
following protocols would you use to do this?
PPTP
30. Which of the following circuit-switching strategies
22. By producing broadcast traffic throughout the does ATM use? (Choose the two best answers.)
network , VLANs free up____
bandwidth SVC and PVC
23. Which of the following are valid ways to assign 31. Due to recent cutbacks, your boss approaches you,
computers to a VLAN? (choose the three best answers) demanding an alternative to the company’s costly
MAC address dedicated T1 line. Only small amounts of data require
Protocol assignment transfer over the line. Which of the following are you
port-band assignment likely to recommend?
The PSTN
24. Which of the following are required to establish a
vpn connection? 32. which of the following technologies requires a
Vpn sever logical connection between the sending and receiving
vpn cliet devices?
Vpn protocols virtual-circuit packet switching
25. Which of the following statements best describe a 33. Which of the following technologies require dialup
VPN? access?
it is a secure communication channel across a public The PSTN
network such as the internet. ISDN
26. Tour company currently uses a standard PSTN 34. Which of the following is an advantage of ISDN over
communication link to transfer files between LANs. the PSTN?
Until now, the transfer speeds have been sufficient for ISDN is faster
the amount of data that needs to be transferred.
Recently, a new application was purchased that requires 35. Which of the following techniques is known as a 3G
a minimum transmission speed of 1.5Mbps. You have transitional technology that supports legacy
been given the task to find the most cost effective architecture?
solution to accommodate the new application. Which of HSPA+
the following technologies would you use?
T1 36. Which of the following is the time lapse between
sending and receiving od requesting information and
27. Which of the following best describes the process to the time it takes to return?
create a dedicated circuit between two communication Latency
endpoints and direct traffic between those two points?
circuit switching 37. Which of the following provides public hotspots for
wireless access?
WISP
46. Which of the following power-related problems is
38.which of the following is an attack in which a rogue associated with a short-term voltage drop?
wireless access point poses as a legitimate wireless sag
service provider to intercept information users
transmit? 47. Which of the following statements best describes
Evil Twin the function of PPP?
It is a dialup protocol used over serial links.
39. Which of the following wireless protocols operate at
2.4GHz? 48.which of the following would most likely use latency-
802.11n sensitive QoS?
802.11g VoIP
802.11b
49. As a network administrator, you have been asked to
40. Under what circumstances would you change the implement a RAID solution that offers high
default channel on an access point? performance. Fault tolerance is not a concern. Which
when a channel overlap occurs between access point RAID level are you likely to use?
RAID 0
41. A client on your network has had no problems
accessing the wireless network in the past, but recently 50. Which of the following protocols is used in thin-
the moved to a new office. Since the move she cannot client computing?
access the network. Which of the following is most RDP
likely the cause of the problem?
the client system has moved too far from the access
point.
4. Ina dynamic routing environment, the network admin 18. Authenticates connection from VPN clients.
uses routing protocols.
VPN Server
5. Although the SNMP manager resides on a PC , each
19.Wireless devices communicate with the wired LAN
device that is part of the SNMP structure also need to
through a base station known as an Access Point.
have some SNMP functionality enabled. What is the
software component that performs this called? 20. In a wireless ad hac topology, devices
communication directly between themselves without
-agent
using access Point. This peer to peer network design is
6.A type of cryptographic network protocol for secure commonly used to connect a small number of
data communication, remote command line log in, computers or wireless devices.
remote command execution, and other secure Network
21 Wireless Access Points are used to create WLAN
services between two Networked computers is known
as: 22. DHCP is a protocol dependent service and also
platform dependent.
-SSH
True
7. In a packet switching environment, the packet begins
to be forwarded as soon as it is received. 23. Is a system in not configured with any static routes
or default gateway, it is limited to operating on its own
8.what topology would use a hub or switch?
Network.
-star
True
9. A topology refers to a network’s physical and logical
24. SNMP in itself is a network management system.
lay out.
True.
10. A network’s logical topology refers to the way in
which the network appears to the devices that use it. 25. Your router has the following IP address on
Enthernet0.172.16.2.1/23. Which of the following can
11.A network’s physical topology refers to the actual
be valid host IDs on the LAN interface attached to the
layout of the computer cables and other network
router.
devices.
172.16.2.255
12. A bus topology uses a trunk or backbone to connect
all the computer’s on the network. 172.16.3.0
13. A star topology is the easiest to expand in terms of 26. You need to subnet a network that has 5 subnets,
the number of devices connected to the Network. each with at least 16 hosts. Which class subnet mask
would you use.
14. The infrastructure wireless topology is commonly
used to extend a wired LAN to include wireless devices. 255.255.255.224
27.What is the maximum number of IP addresses that FQDN
can be assigned to hosts on a local subnet that uses the
39. DNS solves the problem of name resolution by
255.255.255.224 subnet masks.
offering resolution through servers configured to act as
30 Name servers.
28. Last valid host on the subnetwork 192.168.249.0/26 40. You troubleshoot a network using 1000BaseCX
cable, and you suspect that the maximum length has
192.168.249.62
been exceeded. What is the maximum length in meters
29. First valid host on the subnetwork that the node of 1000BaseCX cable.
172.16.108.136/27 belongs to?
25
172.16.108.129
41. Data sent with unicast addressing is delivered to a
30. Broadcast address of the network 192.168.220.0 specific node identified by the address. It is a point to
255.255.255.224? point address link
33. You purchase a new wireless access point that uses 45. Dynamic addressing to the automatic assignment of
no WEP security by default. You change the settings to IP addresses.
use 128 bit encryption. How much the client system be 46. Enables the system to determine what portion of
configured. the IP address represent the network address and what
All the client systems must be set to 128 bit encryption portion represent the node address.
37. A Distributed network model has the processing 49. The point-to-point link is often used for organization
power distributed between the client systems and the that need a direct link between two remote office
server. building.
38. Within DNS, what is the domain name, along with 50 . What is the default port used by NTP.
any subdomains called? 123