review

Post on 04-Dec-2015

218 Views

Category:

Documents

4 Downloads

Preview:

Click to see full reader

DESCRIPTION

networks

TRANSCRIPT

ReviewCNIT 106

1: Introducing Computer Networks

What device connects multiple nodes at layer

1?

A. Client

B. Server

C. Hub

D. Switch

E. Router

What device lifts packets off one network onto a

different network?

A. Client

B. Server

C. Hub

D. Switch

E. Router

San Francisco has a 56 km fiber loop connecting

government buildings throughout the city.

What sort of network is that?

A. LAN

B. WAN

C. CAN

D. MAN

E. PAN

What physical topology is used by Ethernet?

A. Star

B. Bus

C. Ring

D. Full-mesh

E. Partial-mesh

2: Dissecting the OSI Model

Which layer uses logical addressing?

A. Layer 5, 6, or 7

B. Layer 4

C. Layer 3

D. Layer 2

E. Layer 1

What layer contains frames?

A. Layer 5, 6, or 7

B. Layer 4

C. Layer 3

D. Layer 2

E. Layer 1

What layer contains bits?

A. Layer 5, 6, or 7

B. Layer 4

C. Layer 3

D. Layer 2

E. Layer 1

Which layer uses MAC addresses?

A. Layer 5, 6, or 7

B. Layer 4

C. Layer 3

D. Layer 2

E. Layer 1

What transmission method is used by

Ethernet?

A. Broadband

B. Baseband

C. FDM

D. TDM

E. StatTDM

What technique sends multiple signals with different wavelengths

through the same medium?

A. Broadband

B. Baseband

C. FDM

D. TDM

E. StatTDM

Which protocol has a "window size" field in its

header?

A. TCP

B. Ethernet

C. UDP

D. IP

E. 802.11

Which protocol has a TTL field in its header?

A. TCP

B. Ethernet

C. UDP

D. IP

E. 802.11

Which layer performs encryption?

A. Layer 7

B. Layer 6

C. Layer 5

D. Layer 4

E. Layer 1, 2, or 3

Which layer does routing?

A. Layer 7

B. Layer 6

C. Layer 5

D. Layer 4

E. Layer 1, 2, or 3

Which protocol uses port 443?

A. HTTP

B. FTP

C. Telnet

D. HTTPS

E. POP3

3: Identifying Network

Components

What cable has special fire-safety features?

A. Coax

B. UTP

C. STP

D. Plenum-rated

E. Fiber optic

What cable uses BNC connectors?

A. Coax

B. UTP

C. STP

D. Plenum-rated

E. Fiber optic

What device operates only at layer 3?

A. Hub

B. Bridge

C. Switch

D. Multilayer switch

E. Router

Four computers are connected to a hub. How many devices are in the

collision domain?

A. 1

B. 2

C. 3

D. 4

E. Some other number

What device assigns IP addresses?

A. VPN Concentrator

B. Firewall

C. DNS server

D. DHCP server

E. Proxy server

Which DNS record contains an IPv6

address?

A. A

B. AAAA

C. MX

D. SOA

E. CNAME

What protocol is used to ring a VoIP phone?

A. SIP

B. PBX

C. RIP

D. RTP

E. BGP

4: Understanding Ethernet

What is the standard for gigabit Ethernet over

copper wire?

A. 10BASE-T

B. 100BASE-TX

C. 100BASE-FX

D. 1000BASE-LX

E. 1000BASE-T

What IEEE standard implements VLANs?

A. 802.1q

B. 802.1x

C. 802.11

D. 802.3

E. 802.11ac

What protocol prevents broadcast storms?

A. VLAN

B. Trunk

C. STP

D. PoE

E. 802.1x

5: Working with IP Addresses

What is 59 in binary?

A. 0011 1010

B. 0011 1011

C. 0000 1111

D. 0110 0011

E. 0011 1001

What is the first usable address in this network?

192.168.1.199 /25

A. 192.168.1.0

B. 192.168.1.1

C. 192.168.1.129

D. 192.168.1.193

E. 192.156.1.255

When you view a Web page, which transmission

method are you using?

A. Unicast

B. Multicast

C. Broadcast

D. Anycast

E. None of the above

Which technique results in addresses starting

169.254?

A. DHCP

B. APIPA

C. BOOTP

D. Static addressing

E. Multihoming

How many bits are in an IPv6 address?

A. 24

B. 48

C. 32

D. 64

E. None of the above

6: Routing Traffic

Which type of route is the most trusted?

A. Directly connected

B. Static

C. RIP

D. OSPF

E. BGP

Which is a distance-vector routing protocol?

A. Directly connected

B. Static

C. RIP

D. OSPF

E. BGP

What system conceals internal IP addresses?

A. NAT

B. IGMP

C. ICMP

D. RIP

E. SIP

7: Introducing Wide-Area Networks

Which WAN link allows more than 100 Gbps?

A. SONET

B. T1

C. T3

D. ATM

E. Frame relay

Which link is used by Ethernet?

A. UTP

B. Coax

C. Fiber optic

D. Power line

E. Wireless

Which technology uses a DOCSIS modem?

A. DSL

B. PPP

C. PPPoE

D. RRAS

E. Cable

Which system uses 48-byte cells?

A. Satellite

B. POTS

C. ISDN

D. Frame relay

E. ATM

8: Connecting Wirelessly

Which of these was never used on wireless

networks?

A. CSMA/CD

B. CSMA/CA

C. FHSS

D. DSSS

E. OFDM

Which Wi-Fi standard goes at 11 Mbps?

A. 802.11a

B. 802.11b

C. 802.11g

D. 802.11n

E. 802.11ac

Which wireless security technique requires a

RADIUS server?

A. WEP

B. WPA

C. WPA2

D. MAC address filtering

E. 802.1x

9: Optimizing Network

Performance

Which is a proprietary Cisco protocol?

A. Single point of failure

B. Active-standby

C. HSRP

D. CARP

E. Load balancing

What congestion control technique delays

packets?

A. IntServ

B. DiffServ

C. RED

D. Policing

E. Shaping

10: Using Command-Line

Utilities

Which of these commands is not present

in Linux?

A. ping

B. arp

C. ipconfig

D. netstat

E. route

Which command resolves a layer 2 address to a

layer 3 address?

A. ping

B. arp

C. ipconfig

D. netstat

E. route

11: Managing a Network

Which device is used to terminate cable?

A. BERT

B. Butt set

C. Cable tester

D. Cable certifier

E. Crimper

What device sends a brief electrical pulse through a cable, and

measures the reflected pulses?

A. Multimeter

B. Loopback plug

C. Protocol analyzer

D. Punch-down tool

E. TDR

What system manages network devices and

uses community strings?

A. SNMP

B. Toner probe

C. Syslog

D. Application log

E. SMTP

12: Securing a Network

What security goal is provided by encryption?

A. Authenticity

B. Confidentiality

C. Security

D. Integrity

E. Availability

Which system uses a key that is too short, and is

not secure?

A. DES

B. 3DES

C. AES

D. Asymmetric encryption

E. Symmetric encryption

Which is the most secure hash function?

A. MD5

B. SHA-1

C. SHA-2

D. DES

E. AES

Which technique can steal your password even

when you use HTTPS?

A. Keylogger

B. Packet sniffing

C. Dictionary attack

D. DoS

E. Buffer overflow

Which technique will protect a network even if

a password is stolen?

A. SSO

B. TACACS

C. ACLs

D. CHAP

E. 2FA

Which technique allows a laptop to operate as a client but not a server?

A. Packet filtering

B. Stateful inspection

C. DMZ

D. VPN

E. IDS

top related