Networking Test 2 2013



Similar documents
Chapter 4 Connecting to the Internet through an ISP

Chapter 15: Advanced Networks

Networking Devices. Lesson 6

Networks. The two main network types are: Peer networks

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Computer Networks I Laboratory Exercise 1

Study Guide CompTIA A+ Certification, Domain 2 Networking

COMPUTER NETWORK TECHNOLOGY (40)

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Network Design. Yiannos Mylonas

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Cabling LANs and WANs

COMPUTER NETWORK TECHNOLOGY (300)

2 Setting Up the Hardware for a Wired Ethernet Network Setting Up the Software for an Ethernet Network... 21

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

VIRTUAL NETWORKING WITH "VMware Player" Summary:

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

TestOut Network Pro English 4.0.x LESSON PLAN

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

Networking Test 4 Study Guide

Contents. Section A Networking Basics Learning the Basics Section B Wired Ethernet Networking... 17

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Preparing the Computers for TCP/IP Networking

SSVP SIP School VoIP Professional Certification

Chapter 1 Personal Computer Hardware hours

Appendix B Network, Routing, Firewall, and Basics

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

SSVVP SIP School VVoIP Professional Certification

Chapter 12 Homework CIT J001/02/04/06. Name: Date: Course: Test:

DSL-2600U. User Manual V 1.0

Networking 4 Voice and Video over IP (VVoIP)

Chapter 2 TCP/IP Networking Basics

11/22/

Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point

DI-634M. Check Your Package Contents. This product can be set up using any current web browser, i.e., Internet Explorer 6 or Netscape Navigator 7.

AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP

Client Server Networks

Local-Area Network -LAN

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Tenth Edition. Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall


Install Guide for JunosV Wireless LAN Controller

FSW-0505TX/0805TX 5/8 Port SOHO 10/100Mbps NWay Switch FSW-0505TX FSW-0805TX. 5/8 Port SOHO 10/100Mbps NWay Switch. User s Manual. (Revision 1.

Using High Availability Technologies Lesson 12

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

NETWORKING ESSENTIALS

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

MN-700 Base Station Configuration Guide

BiPAC 7404V series. VoIP/(802.11g) ADSL2+ (VPN) Firewall Router. Quick Start Guide

Mathatma Gandhi University

IEEE a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. Software Release v

Chapter 2 Wireless Settings and Security

Basic Network Configuration

Lab - Using IOS CLI with Switch MAC Address Tables

Different Types Of Network

Introduction To Computer Networks

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Connecting to the Internet

RedRapid X WIRELESS MODEM ROUTER. Quick Installation Guide (DN-7060)

Chapter 4 Management. Viewing the Activity Log

VMware ESX Server Q VLAN Solutions W H I T E P A P E R

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

VLANs. Application Note

Computer Networking: A Survey

DSL-520T ADSL Router User Guide

NETWORKING TECHNOLOGIES

ethernet connection For more information about the printer's ethernet feature, click the topic below: ethernet lights network configuration page

DSL Installation Guide

CompTIA Network+ (Exam N10-005)

Universal Network Access Policy

Chapter 5. Data Communication And Internet Technology

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

ADSL MODEM. User Manual V1.0

Local Area Networks (LANs) Blueprint (May 2012 Release)

Student Halls Network. Connection Guide

BASIC ANALYSIS OF TCP/IP NETWORKS

Chapter 3 Management. Remote Management

Quick Start Guide for VMware and Windows 7

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Nokia Siemens Networks. CPEi-lte User Manual

Discovering Computers Chapter 9 Communications and Networks

< Introduction > This technical note explains how to connect New SVR Series to DSL Modem or DSL Router. Samsung Techwin Co., Ltd.

Advanced Higher Computing. Computer Networks. Homework Sheets

Chapter 1 Connecting the Router to the Internet

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK

Quick Installation Guide 24-port PoE switch with 2 copper Gigabit ports and 2 Gigabit SFP ports (af Version 15.4W)

Transcription:

Name: Class: Date: Networking Test 2 2013 Multiple Choice Identify the choice that best completes the statement or answers the question. 1. When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port? a. router b. switch c. repeater d. hub 2. Why would you need to use a repeater? a. You need to connect two networks together to make an internetwork. b. Your network is too large, and you need to decrease the size of the broadcast domain. c. You want to maximize the available bandwidth. d. You need to add a group of computers to your network, and the distance is too far for normal means of communication. 3. How does a switch learn MAC addresses? a. All the MAC addresses must be entered manually. b. The switch comes loaded with the most frequently used addresses. c. The switch reads each frame and makes a note of where each MAC address came from. d. The switch uses a mathematical formula to determine what the MAC address would be for each computer connected to it. 4. Why is the use of a switch preferred over a hub? a. Devices on a hub have to share the available bandwidth. b. Switches are intelligent; they read the frame and determine where to send it. c. Switches can operate in full-duplex mode. d. All of the above. 5. What does a switch store in its switching table? a. the source MAC address of a frame and the port it was received on b. the destination MAC address of a frame and the port it was received on c. the source IP address of a frame and the port it was received on d. the destination IP address of a frame and the port it was received on 6. What is a packet called that is intended for only one individual computer? a. broadcast b. unicast c. multicast d. anycast 4

Name: 7. What does it usually mean when the activity light on a switch is blinking? a. It is malfunctioning. b. It is ready to receive data. c. It is communicating with the network. d. A collision is imminent. 8. What component of the computer provides it with a MAC address? a. motherboard b. NIC c. CPU d. BIOS 9. What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer? a. route b. tracert c. ipconfig d. arp 10. A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers? a. switch b. router c. hub d. modem 11. When referring to network bandwidth, what is the basic unit of measurement? a. bytes per second b. bits per second c. bandwidth per second d. bytes per minute 12. Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP? a. RTS b. ARP c. CTS d. DNS 13. The SSID is configured on which of the following so that it can be distinguished from other available wireless networks? a. router b. access point c. switch d. repeater 2

Name: 14. Which of the following is not one of the main differences between the types of network cabling? a. the distance that a signal can travel b. the ability to send and receive signals c. the type of signal that the media can transmit d. the speed at which the signal can be sent 15. Which of the following is not a form of electromagnetic interference, or EMI? a. rain/fog b. transformer c. fluorescent lights d. crosstalk 16. When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon? a. electromagnetic interference b. crosstalk c. attenuation d. radio frequency interference 17. What is the maximum bandwidth for a network cabled using category 5e UTP cable? a. 10 Mbps b. 16 Mbps c. 100 Mbps d. 1000 Mbps 18. What is the maximum cable length for both category 5e and category 6 UTP cable? a. 10 m b. 20 m c. 100 m d. 1000 m 19. Terrestrial and satellite systems are two types of which wireless networking technology? a. infrared b. laser c. narrowband d. microwave 20. Which of the following is a length of cable that connects a computer to either a networking device or to an RJ-45 jack? a. patch panel b. cable segment c. backbone cable d. patch cable 3

Name: 21. The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point? a. departure point b. entrance point c. demarcation point d. customer premises point 22. In an MDI device, on which two pins does the device use to transmit? a. 1 and 2 b. 3 and 4 c. 4 and 6 d. 3 and 6 23. What type of wiring should be used for a high-speed connection between two buildings? a. coaxial cabling b. UTP cabling c. STP cabling d. fiber-optic cabling 24. What is a disadvantage of using fiber-optic cabling? a. limited to shorter distances due to high attenuation b. low bandwidth potential c. high susceptibility to eavesdropping d. difficult to install 25. What type of wireless technology is used for 802.11b /g /n networks? a. spread-spectrum radio b. laser c. infrared d. narrowband radio 26. Which part of the OS provides users and applications with an interface to manipulate files? a. kernel b. services c. processes d. file system 27. What are the chunks called into which the available storage space on a disk drive is broken? a. bytes b. sectors c. bits d. segments 4

Name: 28. What method does the CPU use to divide its computing cycles between more than one process? a. context switching b. process switching c. time slicing d. thread slicing 29. In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems? a. resource monitor b. terminal manager c. performance manager d. system monitor 30. What is the native file-sharing protocol in Linux? a. SMB b. NFS c. NSF d. SMP 31. Which common e-mail protocol allows the user to access messages, yet still have them stored on the server? a. SMTP b. IMAP c. POP3 d. SNMP 32. Which of the following is not a function typically provided by the centralized management of a server-based network? a. account management b. user authentication c. security policy management d. protocol analysis 33. What is the process called that grants or denies a user s access to network resources? a. authentication b. acceptance c. authorization d. admission 34. What directory service protocol used in Linux systems is also supported by Windows? a. NFS b. NIS c. LDAP d. LEAP 5

Name: 35. What storage solution involves a third-party company that provides off-site hosting of data? a. network-attached storage b. cloud-based storage c. network accessed appliance d. storage area network 36. What is a partial copy of a VM that is used to restore it to a previous state? a. snapshot b. clone c. hypervisor d. host computer 37. Which of the following virtualization products provides hosted virtualization? a. Citrix XenServer b. VMware vsphere c. Microsoft Hyper-V d. VMware Workstation 38. You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation? a. NAT b. bridged c. host-only d. internal 39. Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances? a. Web Server 2008 b. Standard Edition c. Enterprise Edition d. Datacenter Edition Completion Complete each statement. 40. The Locally Administered Address can be used to override the burned-in address. 41. In a computer s IP address settings, the _ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own. 42. A frame is a message that is intended to be processed by all devices on the LAN. 6

Name: 43. The network is a measurement of the amount of data that can pass through a network in a certain period of time. 44. A switch operating in mode can send and receive data at the same time. 45. A network that uses the air to transmit signals across the network is considered a(an) network. 46. When copper wires are bundled together, they are susceptible to, a form of interference where the signals leak out onto other wires. 47. A type of wireless network that uses light beams to send signals between two devices and is highly susceptible to visible light sources is called. 48. A wireless using line-of-sight or broadcast transmissions can extend a wired network over a short distance that would normally require a dedicated communication line from a communications carrier. 49. Most office buildings usually have a false ceiling with an area above that which is used to run conduit for heating and air conditioning units, called the. 50. A is a program that runs in the background and provides support for other processes. 51. In multitasking, either the user or the OS can terminate a process that is monopolizing the CPU s time. 52. A file is simply a text file that contains a list of commands that you would normally enter in a command prompt. 53. When a user enters his username and password to log on to a machine, he is invoking the process of. 54. A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network. Short Answer 55. Why is the NIC considered the gatekeeper? 56. What are the major differences between a hub and a switch? 57. List the steps that a switch performs for each frame. 58. What is a broadcast frame? 7

Name: 59. What is the difference between a switch and a router? 60. What does a router keep in its routing table? 61. What is the importance of a default route? 62. What is a default gateway? 63. What are the major tasks that a NIC performs? 64. What is the MAC address of a computer? 65. Describe twisted-pair cabling. 66. What are the advantages to using UTP in a network installation? 67. What is the difference between a straight-through cable and a crossover cable? 68. When would you use a straight-through cable and when would you use a crossover? 69. What are the benefits of fiber-optic cabling? 70. What five issues should you consider when determining the structure for a new network? 71. Why is copper cabling susceptible to eavesdropping? 72. What are the benefits of installing a wireless network? 73. What is a transceiver and what is its function? 74. What is structured cabling and what are its six components? 75. If you store mainly large files on a disk, should you use a smaller cluster size or larger cluster size? Why? 76. What is the System Idle process, and what does its value mean? 77. What are the names of four broadcast packets involved in a DHCP lease? 78. What is the purpose of the DNS client? 8

Name: 79. How do you map a shared folder using the command prompt? 80. What is a domain controller? 81. What is a reservation? 82. What is a hot-swappable device? 83. What is a hypervisor? 84. What is XP mode? 9