review

66
Review CNIT 106

Upload: sameh-ahmed-hassan

Post on 04-Dec-2015

218 views

Category:

Documents


4 download

DESCRIPTION

networks

TRANSCRIPT

Page 1: Review

ReviewCNIT 106

Page 2: Review

1: Introducing Computer Networks

Page 3: Review

What device connects multiple nodes at layer

1?

A. Client

B. Server

C. Hub

D. Switch

E. Router

Page 4: Review

What device lifts packets off one network onto a

different network?

A. Client

B. Server

C. Hub

D. Switch

E. Router

Page 5: Review

San Francisco has a 56 km fiber loop connecting

government buildings throughout the city.

What sort of network is that?

A. LAN

B. WAN

C. CAN

D. MAN

E. PAN

Page 6: Review

What physical topology is used by Ethernet?

A. Star

B. Bus

C. Ring

D. Full-mesh

E. Partial-mesh

Page 7: Review

2: Dissecting the OSI Model

Page 8: Review

Which layer uses logical addressing?

A. Layer 5, 6, or 7

B. Layer 4

C. Layer 3

D. Layer 2

E. Layer 1

Page 9: Review

What layer contains frames?

A. Layer 5, 6, or 7

B. Layer 4

C. Layer 3

D. Layer 2

E. Layer 1

Page 10: Review

What layer contains bits?

A. Layer 5, 6, or 7

B. Layer 4

C. Layer 3

D. Layer 2

E. Layer 1

Page 11: Review

Which layer uses MAC addresses?

A. Layer 5, 6, or 7

B. Layer 4

C. Layer 3

D. Layer 2

E. Layer 1

Page 12: Review

What transmission method is used by

Ethernet?

A. Broadband

B. Baseband

C. FDM

D. TDM

E. StatTDM

Page 13: Review

What technique sends multiple signals with different wavelengths

through the same medium?

A. Broadband

B. Baseband

C. FDM

D. TDM

E. StatTDM

Page 14: Review

Which protocol has a "window size" field in its

header?

A. TCP

B. Ethernet

C. UDP

D. IP

E. 802.11

Page 15: Review

Which protocol has a TTL field in its header?

A. TCP

B. Ethernet

C. UDP

D. IP

E. 802.11

Page 16: Review

Which layer performs encryption?

A. Layer 7

B. Layer 6

C. Layer 5

D. Layer 4

E. Layer 1, 2, or 3

Page 17: Review

Which layer does routing?

A. Layer 7

B. Layer 6

C. Layer 5

D. Layer 4

E. Layer 1, 2, or 3

Page 18: Review

Which protocol uses port 443?

A. HTTP

B. FTP

C. Telnet

D. HTTPS

E. POP3

Page 19: Review

3: Identifying Network

Components

Page 20: Review

What cable has special fire-safety features?

A. Coax

B. UTP

C. STP

D. Plenum-rated

E. Fiber optic

Page 21: Review

What cable uses BNC connectors?

A. Coax

B. UTP

C. STP

D. Plenum-rated

E. Fiber optic

Page 22: Review

What device operates only at layer 3?

A. Hub

B. Bridge

C. Switch

D. Multilayer switch

E. Router

Page 23: Review

Four computers are connected to a hub. How many devices are in the

collision domain?

A. 1

B. 2

C. 3

D. 4

E. Some other number

Page 24: Review

What device assigns IP addresses?

A. VPN Concentrator

B. Firewall

C. DNS server

D. DHCP server

E. Proxy server

Page 25: Review

Which DNS record contains an IPv6

address?

A. A

B. AAAA

C. MX

D. SOA

E. CNAME

Page 26: Review

What protocol is used to ring a VoIP phone?

A. SIP

B. PBX

C. RIP

D. RTP

E. BGP

Page 27: Review

4: Understanding Ethernet

Page 28: Review

What is the standard for gigabit Ethernet over

copper wire?

A. 10BASE-T

B. 100BASE-TX

C. 100BASE-FX

D. 1000BASE-LX

E. 1000BASE-T

Page 29: Review

What IEEE standard implements VLANs?

A. 802.1q

B. 802.1x

C. 802.11

D. 802.3

E. 802.11ac

Page 30: Review

What protocol prevents broadcast storms?

A. VLAN

B. Trunk

C. STP

D. PoE

E. 802.1x

Page 31: Review

5: Working with IP Addresses

Page 32: Review

What is 59 in binary?

A. 0011 1010

B. 0011 1011

C. 0000 1111

D. 0110 0011

E. 0011 1001

Page 33: Review

What is the first usable address in this network?

192.168.1.199 /25

A. 192.168.1.0

B. 192.168.1.1

C. 192.168.1.129

D. 192.168.1.193

E. 192.156.1.255

Page 34: Review

When you view a Web page, which transmission

method are you using?

A. Unicast

B. Multicast

C. Broadcast

D. Anycast

E. None of the above

Page 35: Review

Which technique results in addresses starting

169.254?

A. DHCP

B. APIPA

C. BOOTP

D. Static addressing

E. Multihoming

Page 36: Review

How many bits are in an IPv6 address?

A. 24

B. 48

C. 32

D. 64

E. None of the above

Page 37: Review

6: Routing Traffic

Page 38: Review

Which type of route is the most trusted?

A. Directly connected

B. Static

C. RIP

D. OSPF

E. BGP

Page 39: Review

Which is a distance-vector routing protocol?

A. Directly connected

B. Static

C. RIP

D. OSPF

E. BGP

Page 40: Review

What system conceals internal IP addresses?

A. NAT

B. IGMP

C. ICMP

D. RIP

E. SIP

Page 41: Review

7: Introducing Wide-Area Networks

Page 42: Review

Which WAN link allows more than 100 Gbps?

A. SONET

B. T1

C. T3

D. ATM

E. Frame relay

Page 43: Review

Which link is used by Ethernet?

A. UTP

B. Coax

C. Fiber optic

D. Power line

E. Wireless

Page 44: Review

Which technology uses a DOCSIS modem?

A. DSL

B. PPP

C. PPPoE

D. RRAS

E. Cable

Page 45: Review

Which system uses 48-byte cells?

A. Satellite

B. POTS

C. ISDN

D. Frame relay

E. ATM

Page 46: Review

8: Connecting Wirelessly

Page 47: Review

Which of these was never used on wireless

networks?

A. CSMA/CD

B. CSMA/CA

C. FHSS

D. DSSS

E. OFDM

Page 48: Review

Which Wi-Fi standard goes at 11 Mbps?

A. 802.11a

B. 802.11b

C. 802.11g

D. 802.11n

E. 802.11ac

Page 49: Review

Which wireless security technique requires a

RADIUS server?

A. WEP

B. WPA

C. WPA2

D. MAC address filtering

E. 802.1x

Page 50: Review

9: Optimizing Network

Performance

Page 51: Review

Which is a proprietary Cisco protocol?

A. Single point of failure

B. Active-standby

C. HSRP

D. CARP

E. Load balancing

Page 52: Review

What congestion control technique delays

packets?

A. IntServ

B. DiffServ

C. RED

D. Policing

E. Shaping

Page 53: Review

10: Using Command-Line

Utilities

Page 54: Review

Which of these commands is not present

in Linux?

A. ping

B. arp

C. ipconfig

D. netstat

E. route

Page 55: Review

Which command resolves a layer 2 address to a

layer 3 address?

A. ping

B. arp

C. ipconfig

D. netstat

E. route

Page 56: Review

11: Managing a Network

Page 57: Review

Which device is used to terminate cable?

A. BERT

B. Butt set

C. Cable tester

D. Cable certifier

E. Crimper

Page 58: Review

What device sends a brief electrical pulse through a cable, and

measures the reflected pulses?

A. Multimeter

B. Loopback plug

C. Protocol analyzer

D. Punch-down tool

E. TDR

Page 59: Review

What system manages network devices and

uses community strings?

A. SNMP

B. Toner probe

C. Syslog

D. Application log

E. SMTP

Page 60: Review

12: Securing a Network

Page 61: Review

What security goal is provided by encryption?

A. Authenticity

B. Confidentiality

C. Security

D. Integrity

E. Availability

Page 62: Review

Which system uses a key that is too short, and is

not secure?

A. DES

B. 3DES

C. AES

D. Asymmetric encryption

E. Symmetric encryption

Page 63: Review

Which is the most secure hash function?

A. MD5

B. SHA-1

C. SHA-2

D. DES

E. AES

Page 64: Review

Which technique can steal your password even

when you use HTTPS?

A. Keylogger

B. Packet sniffing

C. Dictionary attack

D. DoS

E. Buffer overflow

Page 65: Review

Which technique will protect a network even if

a password is stolen?

A. SSO

B. TACACS

C. ACLs

D. CHAP

E. 2FA

Page 66: Review

Which technique allows a laptop to operate as a client but not a server?

A. Packet filtering

B. Stateful inspection

C. DMZ

D. VPN

E. IDS