review
DESCRIPTION
networksTRANSCRIPT
ReviewCNIT 106
1: Introducing Computer Networks
What device connects multiple nodes at layer
1?
A. Client
B. Server
C. Hub
D. Switch
E. Router
What device lifts packets off one network onto a
different network?
A. Client
B. Server
C. Hub
D. Switch
E. Router
San Francisco has a 56 km fiber loop connecting
government buildings throughout the city.
What sort of network is that?
A. LAN
B. WAN
C. CAN
D. MAN
E. PAN
What physical topology is used by Ethernet?
A. Star
B. Bus
C. Ring
D. Full-mesh
E. Partial-mesh
2: Dissecting the OSI Model
Which layer uses logical addressing?
A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1
What layer contains frames?
A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1
What layer contains bits?
A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1
Which layer uses MAC addresses?
A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1
What transmission method is used by
Ethernet?
A. Broadband
B. Baseband
C. FDM
D. TDM
E. StatTDM
What technique sends multiple signals with different wavelengths
through the same medium?
A. Broadband
B. Baseband
C. FDM
D. TDM
E. StatTDM
Which protocol has a "window size" field in its
header?
A. TCP
B. Ethernet
C. UDP
D. IP
E. 802.11
Which protocol has a TTL field in its header?
A. TCP
B. Ethernet
C. UDP
D. IP
E. 802.11
Which layer performs encryption?
A. Layer 7
B. Layer 6
C. Layer 5
D. Layer 4
E. Layer 1, 2, or 3
Which layer does routing?
A. Layer 7
B. Layer 6
C. Layer 5
D. Layer 4
E. Layer 1, 2, or 3
Which protocol uses port 443?
A. HTTP
B. FTP
C. Telnet
D. HTTPS
E. POP3
3: Identifying Network
Components
What cable has special fire-safety features?
A. Coax
B. UTP
C. STP
D. Plenum-rated
E. Fiber optic
What cable uses BNC connectors?
A. Coax
B. UTP
C. STP
D. Plenum-rated
E. Fiber optic
What device operates only at layer 3?
A. Hub
B. Bridge
C. Switch
D. Multilayer switch
E. Router
Four computers are connected to a hub. How many devices are in the
collision domain?
A. 1
B. 2
C. 3
D. 4
E. Some other number
What device assigns IP addresses?
A. VPN Concentrator
B. Firewall
C. DNS server
D. DHCP server
E. Proxy server
Which DNS record contains an IPv6
address?
A. A
B. AAAA
C. MX
D. SOA
E. CNAME
What protocol is used to ring a VoIP phone?
A. SIP
B. PBX
C. RIP
D. RTP
E. BGP
4: Understanding Ethernet
What is the standard for gigabit Ethernet over
copper wire?
A. 10BASE-T
B. 100BASE-TX
C. 100BASE-FX
D. 1000BASE-LX
E. 1000BASE-T
What IEEE standard implements VLANs?
A. 802.1q
B. 802.1x
C. 802.11
D. 802.3
E. 802.11ac
What protocol prevents broadcast storms?
A. VLAN
B. Trunk
C. STP
D. PoE
E. 802.1x
5: Working with IP Addresses
What is 59 in binary?
A. 0011 1010
B. 0011 1011
C. 0000 1111
D. 0110 0011
E. 0011 1001
What is the first usable address in this network?
192.168.1.199 /25
A. 192.168.1.0
B. 192.168.1.1
C. 192.168.1.129
D. 192.168.1.193
E. 192.156.1.255
When you view a Web page, which transmission
method are you using?
A. Unicast
B. Multicast
C. Broadcast
D. Anycast
E. None of the above
Which technique results in addresses starting
169.254?
A. DHCP
B. APIPA
C. BOOTP
D. Static addressing
E. Multihoming
How many bits are in an IPv6 address?
A. 24
B. 48
C. 32
D. 64
E. None of the above
6: Routing Traffic
Which type of route is the most trusted?
A. Directly connected
B. Static
C. RIP
D. OSPF
E. BGP
Which is a distance-vector routing protocol?
A. Directly connected
B. Static
C. RIP
D. OSPF
E. BGP
What system conceals internal IP addresses?
A. NAT
B. IGMP
C. ICMP
D. RIP
E. SIP
7: Introducing Wide-Area Networks
Which WAN link allows more than 100 Gbps?
A. SONET
B. T1
C. T3
D. ATM
E. Frame relay
Which link is used by Ethernet?
A. UTP
B. Coax
C. Fiber optic
D. Power line
E. Wireless
Which technology uses a DOCSIS modem?
A. DSL
B. PPP
C. PPPoE
D. RRAS
E. Cable
Which system uses 48-byte cells?
A. Satellite
B. POTS
C. ISDN
D. Frame relay
E. ATM
8: Connecting Wirelessly
Which of these was never used on wireless
networks?
A. CSMA/CD
B. CSMA/CA
C. FHSS
D. DSSS
E. OFDM
Which Wi-Fi standard goes at 11 Mbps?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
E. 802.11ac
Which wireless security technique requires a
RADIUS server?
A. WEP
B. WPA
C. WPA2
D. MAC address filtering
E. 802.1x
9: Optimizing Network
Performance
Which is a proprietary Cisco protocol?
A. Single point of failure
B. Active-standby
C. HSRP
D. CARP
E. Load balancing
What congestion control technique delays
packets?
A. IntServ
B. DiffServ
C. RED
D. Policing
E. Shaping
10: Using Command-Line
Utilities
Which of these commands is not present
in Linux?
A. ping
B. arp
C. ipconfig
D. netstat
E. route
Which command resolves a layer 2 address to a
layer 3 address?
A. ping
B. arp
C. ipconfig
D. netstat
E. route
11: Managing a Network
Which device is used to terminate cable?
A. BERT
B. Butt set
C. Cable tester
D. Cable certifier
E. Crimper
What device sends a brief electrical pulse through a cable, and
measures the reflected pulses?
A. Multimeter
B. Loopback plug
C. Protocol analyzer
D. Punch-down tool
E. TDR
What system manages network devices and
uses community strings?
A. SNMP
B. Toner probe
C. Syslog
D. Application log
E. SMTP
12: Securing a Network
What security goal is provided by encryption?
A. Authenticity
B. Confidentiality
C. Security
D. Integrity
E. Availability
Which system uses a key that is too short, and is
not secure?
A. DES
B. 3DES
C. AES
D. Asymmetric encryption
E. Symmetric encryption
Which is the most secure hash function?
A. MD5
B. SHA-1
C. SHA-2
D. DES
E. AES
Which technique can steal your password even
when you use HTTPS?
A. Keylogger
B. Packet sniffing
C. Dictionary attack
D. DoS
E. Buffer overflow
Which technique will protect a network even if
a password is stolen?
A. SSO
B. TACACS
C. ACLs
D. CHAP
E. 2FA
Which technique allows a laptop to operate as a client but not a server?
A. Packet filtering
B. Stateful inspection
C. DMZ
D. VPN
E. IDS