Name: Class: Date: Networking Test 2 2013 Multiple Choice Identify the choice that best completes the statement or answers the question. 1. When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port? a. router b. switch c. repeater d. hub 2. Why would you need to use a repeater? a. You need to connect two networks together to make an internetwork. b. Your network is too large, and you need to decrease the size of the broadcast domain. c. You want to maximize the available bandwidth. d. You need to add a group of computers to your network, and the distance is too far for normal means of communication. 3. How does a switch learn MAC addresses? a. All the MAC addresses must be entered manually. b. The switch comes loaded with the most frequently used addresses. c. The switch reads each frame and makes a note of where each MAC address came from. d. The switch uses a mathematical formula to determine what the MAC address would be for each computer connected to it. 4. Why is the use of a switch preferred over a hub? a. Devices on a hub have to share the available bandwidth. b. Switches are intelligent; they read the frame and determine where to send it. c. Switches can operate in full-duplex mode. d. All of the above. 5. What does a switch store in its switching table? a. the source MAC address of a frame and the port it was received on b. the destination MAC address of a frame and the port it was received on c. the source IP address of a frame and the port it was received on d. the destination IP address of a frame and the port it was received on 6. What is a packet called that is intended for only one individual computer? a. broadcast b. unicast c. multicast d. anycast 4
Name: 7. What does it usually mean when the activity light on a switch is blinking? a. It is malfunctioning. b. It is ready to receive data. c. It is communicating with the network. d. A collision is imminent. 8. What component of the computer provides it with a MAC address? a. motherboard b. NIC c. CPU d. BIOS 9. What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer? a. route b. tracert c. ipconfig d. arp 10. A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers? a. switch b. router c. hub d. modem 11. When referring to network bandwidth, what is the basic unit of measurement? a. bytes per second b. bits per second c. bandwidth per second d. bytes per minute 12. Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP? a. RTS b. ARP c. CTS d. DNS 13. The SSID is configured on which of the following so that it can be distinguished from other available wireless networks? a. router b. access point c. switch d. repeater 2
Name: 14. Which of the following is not one of the main differences between the types of network cabling? a. the distance that a signal can travel b. the ability to send and receive signals c. the type of signal that the media can transmit d. the speed at which the signal can be sent 15. Which of the following is not a form of electromagnetic interference, or EMI? a. rain/fog b. transformer c. fluorescent lights d. crosstalk 16. When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon? a. electromagnetic interference b. crosstalk c. attenuation d. radio frequency interference 17. What is the maximum bandwidth for a network cabled using category 5e UTP cable? a. 10 Mbps b. 16 Mbps c. 100 Mbps d. 1000 Mbps 18. What is the maximum cable length for both category 5e and category 6 UTP cable? a. 10 m b. 20 m c. 100 m d. 1000 m 19. Terrestrial and satellite systems are two types of which wireless networking technology? a. infrared b. laser c. narrowband d. microwave 20. Which of the following is a length of cable that connects a computer to either a networking device or to an RJ-45 jack? a. patch panel b. cable segment c. backbone cable d. patch cable 3
Name: 21. The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point? a. departure point b. entrance point c. demarcation point d. customer premises point 22. In an MDI device, on which two pins does the device use to transmit? a. 1 and 2 b. 3 and 4 c. 4 and 6 d. 3 and 6 23. What type of wiring should be used for a high-speed connection between two buildings? a. coaxial cabling b. UTP cabling c. STP cabling d. fiber-optic cabling 24. What is a disadvantage of using fiber-optic cabling? a. limited to shorter distances due to high attenuation b. low bandwidth potential c. high susceptibility to eavesdropping d. difficult to install 25. What type of wireless technology is used for 802.11b /g /n networks? a. spread-spectrum radio b. laser c. infrared d. narrowband radio 26. Which part of the OS provides users and applications with an interface to manipulate files? a. kernel b. services c. processes d. file system 27. What are the chunks called into which the available storage space on a disk drive is broken? a. bytes b. sectors c. bits d. segments 4
Name: 28. What method does the CPU use to divide its computing cycles between more than one process? a. context switching b. process switching c. time slicing d. thread slicing 29. In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems? a. resource monitor b. terminal manager c. performance manager d. system monitor 30. What is the native file-sharing protocol in Linux? a. SMB b. NFS c. NSF d. SMP 31. Which common e-mail protocol allows the user to access messages, yet still have them stored on the server? a. SMTP b. IMAP c. POP3 d. SNMP 32. Which of the following is not a function typically provided by the centralized management of a server-based network? a. account management b. user authentication c. security policy management d. protocol analysis 33. What is the process called that grants or denies a user s access to network resources? a. authentication b. acceptance c. authorization d. admission 34. What directory service protocol used in Linux systems is also supported by Windows? a. NFS b. NIS c. LDAP d. LEAP 5
Name: 35. What storage solution involves a third-party company that provides off-site hosting of data? a. network-attached storage b. cloud-based storage c. network accessed appliance d. storage area network 36. What is a partial copy of a VM that is used to restore it to a previous state? a. snapshot b. clone c. hypervisor d. host computer 37. Which of the following virtualization products provides hosted virtualization? a. Citrix XenServer b. VMware vsphere c. Microsoft Hyper-V d. VMware Workstation 38. You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation? a. NAT b. bridged c. host-only d. internal 39. Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances? a. Web Server 2008 b. Standard Edition c. Enterprise Edition d. Datacenter Edition Completion Complete each statement. 40. The Locally Administered Address can be used to override the burned-in address. 41. In a computer s IP address settings, the _ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own. 42. A frame is a message that is intended to be processed by all devices on the LAN. 6
Name: 43. The network is a measurement of the amount of data that can pass through a network in a certain period of time. 44. A switch operating in mode can send and receive data at the same time. 45. A network that uses the air to transmit signals across the network is considered a(an) network. 46. When copper wires are bundled together, they are susceptible to, a form of interference where the signals leak out onto other wires. 47. A type of wireless network that uses light beams to send signals between two devices and is highly susceptible to visible light sources is called. 48. A wireless using line-of-sight or broadcast transmissions can extend a wired network over a short distance that would normally require a dedicated communication line from a communications carrier. 49. Most office buildings usually have a false ceiling with an area above that which is used to run conduit for heating and air conditioning units, called the. 50. A is a program that runs in the background and provides support for other processes. 51. In multitasking, either the user or the OS can terminate a process that is monopolizing the CPU s time. 52. A file is simply a text file that contains a list of commands that you would normally enter in a command prompt. 53. When a user enters his username and password to log on to a machine, he is invoking the process of. 54. A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network. Short Answer 55. Why is the NIC considered the gatekeeper? 56. What are the major differences between a hub and a switch? 57. List the steps that a switch performs for each frame. 58. What is a broadcast frame? 7
Name: 59. What is the difference between a switch and a router? 60. What does a router keep in its routing table? 61. What is the importance of a default route? 62. What is a default gateway? 63. What are the major tasks that a NIC performs? 64. What is the MAC address of a computer? 65. Describe twisted-pair cabling. 66. What are the advantages to using UTP in a network installation? 67. What is the difference between a straight-through cable and a crossover cable? 68. When would you use a straight-through cable and when would you use a crossover? 69. What are the benefits of fiber-optic cabling? 70. What five issues should you consider when determining the structure for a new network? 71. Why is copper cabling susceptible to eavesdropping? 72. What are the benefits of installing a wireless network? 73. What is a transceiver and what is its function? 74. What is structured cabling and what are its six components? 75. If you store mainly large files on a disk, should you use a smaller cluster size or larger cluster size? Why? 76. What is the System Idle process, and what does its value mean? 77. What are the names of four broadcast packets involved in a DHCP lease? 78. What is the purpose of the DNS client? 8
Name: 79. How do you map a shared folder using the command prompt? 80. What is a domain controller? 81. What is a reservation? 82. What is a hot-swappable device? 83. What is a hypervisor? 84. What is XP mode? 9