COMPUTER NETWORK TECHNOLOGY (40)

Similar documents
COMPUTER NETWORK TECHNOLOGY (40)

Study Guide CompTIA A+ Certification, Domain 2 Networking

COMPUTER NETWORK TECHNOLOGY (300)

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

SSVP SIP School VoIP Professional Certification

CompTIA Network+ (Exam N10-005)

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

ASM Educational Center (ASM) Est. 1992

SSVVP SIP School VVoIP Professional Certification

Test Code: 8148 / Version 1

MIS NETWORK ADMINISTRATOR PROGRAM

Networking 4 Voice and Video over IP (VVoIP)

Networking Technology Online Course Outline

Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker

Computer Networks I Laboratory Exercise 1

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Advanced Higher Computing. Computer Networks. Homework Sheets

Domain 3.0 Networking... 1

TestOut Network Pro English 4.0.x LESSON PLAN

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Chapter 15: Advanced Networks

Chapter 4 Connecting to the Internet through an ISP

BASIC ANALYSIS OF TCP/IP NETWORKS

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

Domain 5.0: Network Tools

Lab Organizing CCENT Objectives by OSI Layer

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks

N CompTIA Network+ Certification Exam Document version:

Network System Design Lesson Objectives

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Computer System Networking and Telecommunications CIP Task Grid

Medical Networks and Operating Systems

How To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Go Wireless. Open up new possibilities for work and play

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

A+ Correlation Chart. CompTIA A Domain 1.0 Hardware. Text Lab Study Guide

#888 Network Fundamentals

Mathatma Gandhi University

Network Design. Yiannos Mylonas

Microsoft MTA Exam

Setting up VPN Access for Remote Diagnostics Support

Connecting to the Internet

AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Connecting to and Setting Up a Network

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Networked AV Systems Pretest

Cisco Networking Professional-6Months Project Based Training

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Networks. The two main network types are: Peer networks

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

Networking Test 4 Study Guide

Chapter 10 Troubleshooting

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

CCT vs. CCENT Skill Set Comparison

NETWORK ADMINISTRATION USING MICROSOFT (310) REGIONAL 2014

Lab PC Network TCP/IP Configuration

Networking Devices. Lesson 6

ProCurve Networking. Troubleshooting WLAN Connectivity. Technical White paper

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

Technical Support Information Belkin internal use only

Preparing the Computers for TCP/IP Networking

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

2 Setting Up the Hardware for a Wired Ethernet Network Setting Up the Software for an Ethernet Network... 21

Cabling LANs and WANs

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Chapter 5. Data Communication And Internet Technology

IT Data Communication and Networks (Optional)

Wireless LAN g USB Adapter

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Configure A VoIP Network

Local Area Networks (LANs) Blueprint (May 2012 Release)

Chapter 12 Supporting Network Address Translation (NAT)

DSL-2600U. User Manual V 1.0

Lesson Plans Network+

Step-by-Step Configuration

Chapter 1 Personal Computer Hardware hours

TW100-BRF114 Firewall Router. User's Guide. Cable/DSL Internet Access. 4-Port Switching Hub

TW100-BRV204 VPN Firewall Router

48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W

QUESTION 1 If one of the links to a computer on a physical star topology is served, what will be the result?

Chapter 2 Preparing Your Network

Interconnecting Cisco Network Devices 1 Course, Class Outline

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Load Balancer LB-2. User s Guide

DSL-520T ADSL Router User Guide

Transcription:

(40) CONTESTANT ID# START TIME END TIME TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards.

Page 2 of 10 1. You need to configure a direct connection between two network devices in different geographic locations. The connection must have a fixed bandwidth. What should you use? A. ATM B. X.25 C. ISDN D. Frame Relay 2. You need to find the approximate length of a fiber optic cable segment. You need to get this information as quickly as possible. What should you use? A. Multimeter B. Temperature monitor C. Cable tester D. OTDR 3. A malicious program that resides in memory, copies itself, and sends copies of itself to other network hosts is known as what? A. A virus B. A worm C. A Trojan D. A man-in-the-middle 4. You need to extend your office network, but you cannot run new cable in the area. Devices should be addressed as part of an existing subnet that is wired as 10BaseT. What should you do first? A. Deploy a wireless access point. B. Deploy a bridge. C. Deploy a router. D. Deploy a basic firewall. 5. You connect the receive connector of a fiber optic cable to its send connector to troubleshoot a problem. This type of connection is known as a: A. loopback. B. patch. C. crossover. D. rollover.

Page 3 of 10 6. A Windows computer is unable to connect to any network resources after restarting. You suspect that the network adapter or its drivers are not initializing properly during startup. You need to determine if this is the problem. What should you do first? A. Run a connectivity test. B. Use a packet sniffer to capture network traffic. C. Check archived log entries. D. Review the computer's event logs. 7. How can you mitigate the risk of a Smurf attack? A. Prevent routers and computers from responding to ICMP requests. B. Install virus scanners on all computers. C. Educate users in social engineering prevention. D. Keep all servers updated with the latest security patches. 8. What is the most likely cause of interference on an 802.11g network? A. Cordless phones B. Fluorescent lights C. EMI D. Blocked line of sight 9. What is the binary representation of the host portion of the IPv4 address 198.24.233.192/24? A. 11000000 B. 01000010 C. 01100011 D. 11000110 10. Which layer of the OSI model is responsible for data compression and encryption? A. Presentation layer B. Transport layer C. Application layer D. Data Link layer 11. When would you use a port scanner to test your perimeter network? A. To tell how well your network responds to threats B. To identify potential holes in network firewalls C. To determine if your network's Web servers are operating properly D. To see if your proxy server is forwarding traffic

Page 4 of 10 12. What type of connector is used with RG-58 coaxial cable networking implementations? A. SC B. RJ-11 C. BNC D. RJ-45 13. Which wireless standard operates at 5 GHz, offers a range of approximately 35 meters, and provides transmission speeds of up to 54 Mbps? A. 802.11b B. 802.11g C. 802.11n D. 802.11a 14. The primary benefit of using STP over UTP is that STP: A. has higher transmission speed. B. has better immunity to EMI. C. supports longer cable distance. D. is less expensive. 15. You need to quickly test a cable terminator resistor. What should you use? A. Time Domain Reflectometer (TDR) B. Multimeter C. Butt set D. Toner probe 16. Which Transmission Control Protocol (TCP) port is used to securely send and receive files? A. 53 B. 69 C. 21 D. 22 17. A network user calls you to report a problem with his computer. What should you do first? A. Try to identify how many computers are affected by the same problem. B. Determine what has recently changed on the network. C. Have the user install all available updates and patches. D. Gather as much information as you can about the problem.

Page 5 of 10 18. Users report problems connecting to a host. The host is configured with a personal firewall that blocks incoming ICMP packets. The host is on the same IP subnet as your computer. What tool can you use to test whether the host is connected to the network? A. ipconfig B. arping C. netstat D. ping 19. You need to select a backbone network cable. The cable must run 500 meters and provide a bandwidth of at least 1 Gbps. The cable must be immune to eavesdropping. What is the least expensive option? A. 1000BASE-TX B. 1000BASE-SX C. 1000BASE-LX10 D. 1000BASE-T 20. Which type of connector can be used with 100BASE-FX cable? A. RG-6 B. RS-232 C. ST D. RG-59 21. After you extended the length of a coaxial cable, you have problems with the signal strength at the far ends of the cable. What should you do? A. Test the new section of cable to see if it has a short and replace it if necessary. B. Install a repeater between the cable segments. C. Increase the resistance of the cable terminators. D. Add an additional length of cable. 22. 10BaseT Ethernet networks are wired using what physical topology? A. Star B. Bus C. Ring D. Point-to-point 23. In which network topology is every host device effectively directly connected to every other host device through a common cable? A. Star B. Bus C. Mesh D. Tree

Page 6 of 10 24. Which device simplifies network client configuration? A. SNMP agent B. Switch C. Media converter D. DHCP server 25. What is the role of an Interior Gateway Protocol (IGP) in a network infrastructure? A. To provide updates to static routes B. To transfer routing information between Internet gateway routers C. To exchange routing information between autonomous networks D. To manage packets sent by a source routing application 26. In a combined distribution frame (CDF): A. all horizontal blocks are 100 pair blocks. B. internal equipment is connected on horizontal blocks. C. the demarcation point is connected on a horizontal block. D. all vertical blocks are 100 pair blocks. 27. What is the purpose of a Dynamic Host Configuration Protocol (DHCP) server? A. To assign host IP addresses and configuration settings B. To divide a subnet into virtual local area networks (VLANs) C. To regenerate and amplify the data signal for selected protocols D. To control traffic into and out of a network for selected protocols 28. Which Transmission Control Protocol/Internet Protocol (TCP/IP) protocol is used to transfer e-mail messages and attachments between mail servers? A. POP3 B. SNMP C. TFTP D. SMTP 29. Which protocol in the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite is responsible for reporting errors and providing information about packet delivery? A. ARP B. ICMP C. UDP D. IGMP

Page 7 of 10 30. Which protocol uses Transmission Control Protocol (TCP) port 443? A. Secure Hypertext Transfer Protocol (HTTPS) B. Secure File Transfer Protocol (SFTP) C. Simple Network Management Protocol (SNMP) D. Secure Shell (SSH) 31. You are configuring a SOHO network that allows wireless connections. You need to determine where the wireless router should be placed. What should you consider? A. The number of user connections that will be needed B. Interference from electrical sources C. Whether port forwarding will be used D. Whether port triggering will be used 32. You have intermittent connectivity to www.measureup.com and want to check connectivity to the server over several hours. Which command should you use? A. ping -t B. nslookup C. ipconfig D. ping l 33. You are troubleshooting networking connectivity issues. For what purpose might you use the ping command? A. To verify that a computer is connected to the network B. To verify that DNS name resolution is working C. To see if Windows Firewall is blocking incoming connections D. To release a DHCP lease and request a new one 34. Which feature of Windows XP permits DHCP clients to automatically self-configure an IP address and subnet mask when their DHCP server cannot be found? A. DNS B. WINS C. ipconfig D. APIPA 35. You want to be able to access the Windows XP computer at your office from your home computer over an Internet connection. What should you select on your office computer? A. Start > Control Panel > System B. Start > Control Panel > Administrative Tools > Computer Management C. Start > Control Panel > Administrative Tools > Services D. Start > All Programs > Accessories > System Tools

Page 8 of 10 36. You have configured a Windows XP Professional computer at one of your branch offices to allow remote desktop connections. You want to connect to the computer from your Windows XP Professional computer at the home office. What should you do? A. Select Start > Run, type mstsc, and press Enter. B. Select Start > Run, type msconfig, and press Enter. C. Select Start > Control Panel > System > Remote. D. Select Start > Control Panel > Administrative Tools > Computer Management. 37. A user cannot access the network. You attempt to ping the loopback address and receive no response. Which answer represents a solution to the problem? A. The network adapter is configured with an invalid subnet mask for the network. B. The network adapter has a green blinking link led thus it is not functioning properly C. The DHCP server is not functioning. D. TCP/IP needs to be reinstalled. 38. A computer running Windows XP using static IP addressing cannot connect to the network. You run ipconfig from a command line. The output shows a subnet mask of 0.0.0.0. What is most likely the problem? A. The connection has been disabled in Control Panel. B. Another user on the network is using the same IP address. C. The MBR is corrupt. D. The DHCP server could not be reached. 39. You are implementing a PAN. What networking technology should you use? A. Cellular B. 802.11g C. Satellite D. Bluetooth 40. You have recently implemented a WLAN and want to maximize security. You only want specific wireless clients to be able to access the WLAN. What should you do? A. Use BitLocker. B. Implement MAC filtering. C. Disable WEP. D. Enable SSID broadcasting. 41. You are implementing a wireless network. You want to provide the best security during data transmission. What should you do? A. Implement WPA2. B. Disable SSID broadcasting. C. Implement WEP. D. Enable content filtering.

Page 9 of 10 42. You have a Windows XP computer using dynamic IP addressing that is unable to connect to the network. You run ipconfig, and it produces the following output: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix. : Autoconfiguration IP Address... : 169.254.208.001 Subnet Mask........... : 255.255.0.0 Default Gateway...... What is most likely the problem? A. The NIC has an invalid driver that needs to be updated. B. Windows Firewall is enabled. C. The NIC in the computer is bad. D. The DHCP server was not found. 43. You are working on a laptop for a customer who wants a new wireless network adapter installed. You open the laptop and see an available expansion slot. The slot is between two and three inches wide. It has eight connectors, a small gap, and then another 18 connectors. What kind of expansion slot is this? A. Mini PCI Express B. Mini PCI C. PCI Express D. PCI 44. For what purpose would you use the nslookup command? A. To confirm that DNS name resolution is working correctly B. To trace the path packets take to reach a specified destination C. To restore missing system files D. To fix a corrupt MBR 45. Your wireless network is secured using WEP. You need to improve data encryption to minimize the chance that data transmissions might be compromised. What should you do? A. Reconfigure the network to use WPA. B. Implement MAC address filtering. C. Change the WEP shared key each week. D. Disable SSID broadcast on all access points.

Page 10 of 10 46. You run the ping command to ping an IP address of a computer on your network. The command runs successfully. However, you are unable to successfully ping the same computer when using the computer's name. What is the problem? A. The DNS configuration B. Your computer's NIC C. The router D. The host computer's NIC 47. For which of the following should you implement QoS in a small office/home office (SOHO) environment? A. E-mail B. Instant messaging C. SSID D. VoIP 48. You are replacing a computer in an office. The existing computer has been connected to a TCP/IP network, and you want to use the existing network card in the new computer. Which configuration settings would you not have to set in the new computer? A. IP address B. Subnet Mask C. Network media D. MAC address 49. A user has installed an internal modem in her computer, but it is not detected by Windows XP. She has a CD-ROM containing drivers. What should she do? A. Use the System utility to create a hardware profile that contains the modem. B. Use Network Connections to configure a dial-up connection. C. Use the Add Hardware wizard to install the modem. D. Use Device Manager to enable the modem. 50. You have a computer running Windows XP Professional. You need to connect to a share named AdminDocs on the server named Server1. You want this to be mapped to disk drive K. Which command should you use? A. net share K:\\Server1\AdminDocs B. net drive K:\\Server1\AdminDocs C. net name K:\\Server1\AdminDocs D. net use K:\\Server1\AdminDocs