COMPUTER NETWORK TECHNOLOGY (300)



Similar documents
COMPUTER NETWORK TECHNOLOGY (40)

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

SSVP SIP School VoIP Professional Certification

Advanced Higher Computing. Computer Networks. Homework Sheets

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

IT Data Communication and Networks (Optional)

CompTIA Network+ (Exam N10-005)

Chapter 1 Personal Computer Hardware hours

Networking Technology Online Course Outline

Chapter 4 Connecting to the Internet through an ISP

SSVVP SIP School VVoIP Professional Certification

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

IT4405 Computer Networks (Compulsory)

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Basic Network Configuration

Cisco Network Performance Evaluation Using Packet Tracer

Terminology. Internet Addressing System

Networking 4 Voice and Video over IP (VVoIP)

Technical Support Information Belkin internal use only

Mathatma Gandhi University

Study Guide CompTIA A+ Certification, Domain 2 Networking

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

How To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

Chapter 5. Data Communication And Internet Technology

Network Configuration Settings

Test Code: 8148 / Version 1

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

User Manual. Page 2 of 38

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Computer Networks CCNA Module 1

Connecting to and Setting Up a Network

Lab Organizing CCENT Objectives by OSI Layer

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Introduction to computer networks and Cloud Computing

Guideline for setting up a functional VPN

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

CCT vs. CCENT Skill Set Comparison

Multi-Homing Dual WAN Firewall Router

Computer Networks I Laboratory Exercise 1

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

LESSON Networking Fundamentals. Understand TCP/IP

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

NETWORK ADMINISTRATION USING MICROSOFT (310) REGIONAL 2014

Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547

Chapter 15: Advanced Networks

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Domain 3.0 Networking... 1

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

EXPLORER. TFT Filter CONFIGURATION

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

DSL-2600U. User Manual V 1.0

Installation of the On Site Server (OSS)

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Chapter 4: Networking and the Internet

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Configure A VoIP Network

1 PC to WX64 direction connection with crossover cable or hub/switch

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Debugging Network Communications. 1 Check the Network Cabling

UIP1868P User Interface Guide

CSCI 362 Computer and Network Security

Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker

Exam Questions SY0-401

Broadband Router User s Manual

Network Design. Yiannos Mylonas

ASM Educational Center (ASM) Est. 1992

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Lab Developing ACLs to Implement Firewall Rule Sets

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Using Innominate mguard over BGAN

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

Exam: Cisco Title: Interconnecting Cisco Networking Devices Part 1 Version: Demo. Actualtests.com - The Power of Knowing

Lab Diagramming External Traffic Flows

Chapter 8 Router and Network Management

Networked AV Systems Pretest

Lab Diagramming Intranet Traffic Flows

BASIC ANALYSIS OF TCP/IP NETWORKS

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

Network System Design Lesson Objectives

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Load Balancer LB-2. User s Guide

Post-Class Quiz: Telecommunication & Network Security Domain

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Broadband Phone Gateway BPG510 Technical Users Guide

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Networking Basics and Network Security

ADSL MODEM. User Manual V1.0

GPRS and 3G Services: Connectivity Options

Transcription:

Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards. No more than 60 minutes testing time Property of Business Professionals of America. May be reproduced only for use in the Business Professionals of America Workplace Skills Assessment Program competition.

Page 2 of 10 Answer the multiple choice questions using the Scantron scoring sheet provided. Write your contestant name, along with the contest number on the scantron sheet. (10 pts. each) 1. You have a network that uses a logical ring topology. How do messages travel through the network? a. Messages are sent to a central device which then forwards the message to the destination device. b. Messages are sent directly to the destination device only. c. Messages are sent to all devices connected to the network. d. Messages travel from one device to the next until they reached the destination device. 2. Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? a. IGMP b. ICMP c. IP d. DHCP 3. Which protocol is used on the World Wide Web to transmit Web pages to Web browsers? a. HTML b. FTP c. HTTP d. SFTP 4. What is the default port for DNS? a. 80 b. 20 c. 63 d. 53 5. Which of the following is a valid MAC address? a. 192.168.0.1 b. 83-09-5A-8E-FF-0B-F1-31 c. C0-34-FF-15-01-8E d. 255.255.255.0

Page 3 of 10 6. Which windows utility is useful in identifying a program that is hogging the processor? a. Task Manager b. System Information c. Device Manager d. Netstat 7. Which of the following applications is more likely to justify the investment in Category 6 cable? a. Instant Messaging b. Printing c. Streaming video d. E-Mail 8. Which of the following is a file transfer protocol that uses UDP? a. FTP b. TFTP c. HTTP d. SMTP 9. You are building network cables and attaching RJ-45 connectors to each end. Which tool do you need for this task? a. Punch down tool b. Vampire taps c. Crimping tool d. Needle nose pliers 10. How many devices can USB support? a. 140 b. 63 c. 48 d. 127 11. Which of the following is the best device to deploy to protect your private network from a public untrusted network? a. Router b. Hub c. Firewall d. Switch

Page 4 of 10 12. Which of the following protocols stores e-mail on the mail server and gives users a choice to download mail or keep it on the server? a. SMTP b. IMAP4 c. NTP d. POP3 13. Which of the following is a valid public IP address? a. 10.1.20.254 b. 172.16.30.20 c. 68.12.16.30 d. 192.168.30.10 14. Which of the following connectors would you use to terminate a Category 6 network cable? a. RJ-45 b. RJ-11 c. RJ-14 d. RJ-22 15. What does VoIP stand for? a. Virtual online Internet Protocol b. Voice over Internet Protocol c. Virtual omni-directional Internet Protocol d. Voice online Internet Protocol 16. What is the agency that is responsible for maintaining the official assignments of port numbers for specific uses on a network and the Internet? a. IANA b. Cisco c. NCP d. DCCP 17. Which of the following ports is reserved for File Transfer Protocol? a. 21 b. 42 c. 10 d. 27

Page 5 of 10 18. Which of the following ports is reserved for Post Office Protocol v3? a. 104 b. 156 c. 110 d. 179 19. Which of the following is the correct name for TCP? a. Transmission Control Protocol b. Transmission Catering Protocol c. Transit Control Protocol d. Transport Control Protocol 20. Which of the following measures are you most likely to implement in order to protect against a worm or Trojan horse? a. Firewall b. Password Policy c. IPSec d. Anti-Virus software 21. A VPN is used primarily for what purpose? a. Support secured communications over an untrusted network. b. Support the distribution of public Web documents. c. Allow the use of network-attached printers. d. Allow remote systems to save documents, avoiding overage charges on cellular data plans. 22. Which protocol is used for securely browsing a Web site? a. SSH b. ARP c. HTTPS d. SIP 23. How many layers are there in the OSI model? a. 4 b. 5 c. 7 d. 9

Page 6 of 10 24. Which command would you use to view the path taken by an Ethernet packet? a. ipconfig b. ping c. nslookup d. tracert 25. At which layer of the OSI model is routing performed? a. Physical b. Transport c. Network d. Data Link 26. Which of the following communication modes supports two-way traffic, but will only allow it in one direction at a time? a. Half-duplex b. Full-duplex c. Single User Mode d. Simplex 27. How many IP addresses are available in a Class B network? a. 256 b. 32,506 c. 65,536 d. 128,580 28. Which of the following is an example of a Class A IP address? a. 10.1.0.15 b. 129.1.72.5 c. 192.168.1.5 d. 172.168.15.72 29. Which of the following is an example of a Class B IP address? a. 10.0.1.5 b. 191.168.0.52 c. 192.128.254.5 d. 223.255.254.56

Page 7 of 10 30. Which of the following is considered a network broadcast address? a. 192.168.0.1 b. 192.168.0.254 c. 192.168.0.255 d. 192.168.0.0 31. What is the term given to a machine that has its address assigned by a DHCP server? a. Static Address b. Dynamic Address c. Sticky address d. Unicast address 32. Which type of cable would you use to connect a router to another router? a. Straight-through b. Loopback c. Rollover d. Crossover 33. Security is always a concern of a Network administrator. Just recently, almost 85% of your end users are receiving e-mails requesting that they need to change their password. What type of security concern is this? a. Spear phishing b. Phishing c. Pharming d. Mail bombing 34. All of the 802.11 standards for wireless networking support which type of communication path sharing technology? a. CSMA/CD b. Polling c. CSMA/CA d. Token passing 35. The loopback address is used to send a packet from the to. a. Host; all other hosts b. Router; all other hosts c. Host; a specific host d. Host; itself

Page 8 of 10 36. Which of the following best describes the purpose of using subnets? a. Subnets divide an IP network address into multiple network addresses. b. Subnets place each device within its own collision domain. c. Subnets combine multiple IP network addresses into one network address. d. Subnets let you connect a private network on to the Internet. 37. Which network service would you use to get the IP address from the FQDN hostname? a. NAT b. FTP c. DNS d. DHCP 38. An IP address has: a. A portion of the address which identifies the network to which the individual belongs. b. A portion of the address which identifies the individual host on a destination network. c. A 32 bit addressing schema. d. All of the above. 39. The medium that supports the fastest transmission rate is: a. Shielded twisted pair b. Coaxial cable c. Type 3 unshielded twisted pair d. Fiber optics 40. Which of the following describes the most common implementation of a Local Area Network? a. Fast packet network used to connect PCs to mainframes in an SNA environment b. A moderate to high speed data network confined to a limited geographic area c. A high speed data network used to connect PCs in different geographic regions of the country d. A local network used primarily to connect PCs to Unix servers 41. Repeater operates in which layer of the OSI model? a. Physical layer b. Network later c. Transport layer d. Data Link layer

Page 9 of 10 42. The Internet is an example of which type of network? a. Cell switched b. Circuit switched c. Packet switched d. All of the above 43. What does a router do in a network? a. Forwards a packet to all outgoing links b. Forwards a packet to the next free outgoing link c. Determines on which outgoing link a packet is to be forwarded d. Forwards a packet to all outgoing links except the originated link 44. One security method is encryption. But encryption does nothing to keep hackers out. To accomplish this goal, which device is best to implement? a. Firewall b. Bridge c. Router d. Hubs 45. Which of the following should you setup on the Wi-Fi router to make it most secure? a. WEP b. NTFS c. WAP2 d. WAP 46. Which of the following is not a type of computer network? a. Local Area Network (LAN) b. Personal Area Network (PAN) c. Remote Area Network (RAN) d. Metropolitan Area Network (MAN) 47. Sending a file from your personal computer s primary memory or disk to another computer is called? a. Downloading b. Uploading c. Saving d. Networking

Page 10 of 10 48. You are troubleshooting a network connection issue for a customer. You discover that the computer s IP address is 169.254.5.50. What would this indicate? a. The PC is configured with a private IP address. b. The PC is unable to contact the DHCP server. c. The PC is configured with a public IP address. d. The PC is configure is a static IP address. 49. Which Ethernet standard specifies a data transfer rate of 1 Gigabit per second (Gbps)? a. 10BaseT b. 100BaseFX c. 10Base5 d. 1000BaseT 50. How many hosts can successfully send data simultaneously on Ethernet? a. 1 b. 2 c. 3 d. Unlimited