Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0



Similar documents
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

CompTIA Network+ (Exam N10-005)

COMPUTER NETWORK TECHNOLOGY (300)

Advanced Higher Computing. Computer Networks. Homework Sheets

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Chapter 15: Advanced Networks

Chapter 5. Data Communication And Internet Technology

LESSON Networking Fundamentals. Understand TCP/IP

SSVP SIP School VoIP Professional Certification

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Networking Test 4 Study Guide

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Computer Networks CCNA Module 1

Connecting to and Setting Up a Network

UIP1868P User Interface Guide

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Multi-Homing Dual WAN Firewall Router

Local Area Networks (LANs) Blueprint (May 2012 Release)

Basic Network Configuration

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Networking 4 Voice and Video over IP (VVoIP)

Domain 3.0 Networking... 1

SSVVP SIP School VVoIP Professional Certification

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Network Pop Quiz 5 Brought to you by please visit our site!

Network Technology CMP-354-TE. TECEP Test Description

Lab Organizing CCENT Objectives by OSI Layer

Cornerstones of Security

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

BASIC ANALYSIS OF TCP/IP NETWORKS

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Introduction to computer networks and Cloud Computing

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Wireless Encryption Protection

Broadband Phone Gateway BPG510 Technical Users Guide

COMPUTER NETWORK TECHNOLOGY (40)

A+ Correlation Chart. CompTIA A Domain 1.0 Hardware. Text Lab Study Guide

Networking Technology Online Course Outline

Protecting the Home Network (Firewall)

Connecting with Computer Science, 2e. Chapter 5 The Internet

2006 Network + Domain 2 - Study Guide

CCT vs. CCENT Skill Set Comparison

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Chapter 1 Personal Computer Hardware hours

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Step-by-Step Configuration

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Cisco Configuring Commonly Used IP ACLs

Chapter 11 Cloud Application Development

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

EUCIP IT Administrator - Fundamentals Syllabus Version 1.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

The OSI and TCP/IP Models. Lesson 2

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Transport and Network Layer

IT Data Communication and Networks (Optional)

Chapter 10 Troubleshooting

Figure 41-1 IP Filter Rules

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

ICTTEN8195B Evaluate and apply network security

Enterprise Edge Communications Manager. Data Capabilities

CERTIFICATE IN COMPUTER HARDWARE AND NETWORK TECHNOLOGY (CCHNT) COURSE STRUCTURE UNIVERSITY SCIENCE INSTRUMENTATION CENTRE (USIC)

How To Understand And Understand The Security Of A Key Infrastructure

Chapter 1 Network Security

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Guideline for setting up a functional VPN

Security Technology: Firewalls and VPNs

Gigabit Multi-Homing VPN Security Router

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

Cisco Networking Professional-6Months Project Based Training

Lab Diagramming External Traffic Flows

Discovering Computers Chapter 9 Communications and Networks

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Multi-Homing Security Gateway

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Network System Design Lesson Objectives

Web Foundations Series Internet Business Associate

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Lab Diagramming Intranet Traffic Flows

TCP/IP Basis. OSI Model

1.0 Basic Principles of TCP/IP Network Communications

Protocol Data Units and Encapsulation

Chapter 4 Customizing Your Network Settings

Protocols. Packets. What's in an IP packet

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan :25 10:40

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Lab Developing ACLs to Implement Firewall Rule Sets

Pre-lab and In-class Laboratory Exercise 10 (L10)

Chapter 2 - The TCP/IP and OSI Networking Models

Using MIS 3e Chapter 6A Appendix

Transcription:

Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a front-end computer. 2. What is a packet? a. A protocol that enables information to be sent across a network b. Another name for an e-mail message c. A protocol that sends e-mail messages d. A fixed piece of information sent across a network 3. Which OSI layer is responsible for the reliability of the data sent between hosts? a. Transport layer b. Presentation layer c. Network layer d. Application layer 4. A local area network (LAN) is: a. a group of computers connected over an expansive geographic area. b. another name for a peer-to-peer network. c. a group of computers connected within a confined geographic area. d. another name for a server-based network. 5. Which of the following is a benefit of a peer-to-peer (P2P) network? a. Centralized resources b. File system management c. Security d. Decentralized computing

Quiz Answers-2 Lesson 2 Quiz 1. What network component converts the computer data into a format appropriate for transmission over the network? Choose the best answer. a. Switch b. MAC address c. NIC d. Modem 2. Which of the following can cloud application providers implement to lower their hardware costs? Choose the best answer. a. Switches b. Data centers c. Software as a Service (SaaS) d. Virtualization 3. Which of the following network devices can regulate traffic in and out of a network? Choose the best answer. a. Firewall b. Router c. Switch d. NIC 4. Which wireless network component is usually subscription-based and provides broadband Internet speeds without the need for a cable or DSL modem? Choose the best answer. a. Layer 3 switch b. Wireless router c. 4G mobile hotspot device d. Wi-Fi Ethernet 5. Wireless networks are specified in which of the following IEEE standards? a. IEEE 802.2 b. IEEE 802.3 c. IEEE 802.5 d. IEEE 802.11

Quiz Answers-3 Lesson 3 Quiz 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)? a. A suite of protocols that allow computers running the same operating system to communicate b. A suite of protocols that allow computers from different vendors with various operating systems to communicate c. A single protocol that allows computers from different vendors with various operating systems to communicate d. A single protocol that allows computers running the same operating system to communicate 2. Which process determines the path that a packet will travel across a network? a. Resolving b. ANDing c. Routing d. Pinging 3. Which routing protocol is sensitive to such criteria as available bandwidth and security? a. Open Shortest Path First (OSPF) b. Routing Information Protocol (RIP) c. File Transfer Protocol (FTP) d. Transmission Control Protocol (TCP) 4. In IPv4, which of the following distinguishes network and host portions of an IP address? Choose the best answer. a. Router b. NIC c. Subnet mask d. Internet protocol 5. Which of the following diagnostic tools helps determine connectivity between source and destination systems? a. The tracert command b. The ipconfig command c. The ping command d. The netstat command

Quiz Answers-4 Lesson 4 Quiz 1. What two servers are often incorporated as one service? a. HTTP and directory servers b. Mail and mailing list servers c. File and print servers d. News and media servers 2. How does the HTTP server interact with TCP/IP? a. HTTP enables multi-person text input, which allows many individuals to access and read the same message. b. HTTP validates keys used to decode encryption algorithms. c. HTTP allows many users on a network to access the same files. d. HTTP listens on Port 80 for incoming requests from clients, such as Web browsers. 3. Which cloud service allows the delivery of operating systems over the Internet? a. Infrastructure as a Service (IaaS). b. Platform as a Service (PaaS). c. Software as a Service (SaaS). d. All cloud services can provide this function. 4. The protocol that identifies a file type, encodes the file using the file type, and decodes it at the receiving end to display properly is called: a. Simple Mail Transfer Protocol (SMTP). b. File Transfer Protocol (FTP). c. Post Office Protocol (POP). d. Multipurpose Internet Mail Extensions (MIME). 5. You are a mail administrator and you receive complaints that users can receive mail but cannot send it. Which mail server should you troubleshoot? a. SMTP server b. IMAP server c. POP3 server d. NNTP server

Quiz Answers-5 Lesson 5 Quiz 1. Which of the following describes the location through which a processor transfers data and commands to a device? a. DMA channel b. I/O address c. IRQ assignment d. PIO channel 2. Which of the following electronic interfaces used to connect mass storage devices to the motherboard is currently the de facto standard for PC-based drives? a. IDE b. SATA c. SCSI d. USB 3. What type of problem may be caused by accumulated dust? a. Electrostatic discharge b. Heat c. Power spike d. Resource conflict 4. In order to provide security, which file system must you implement to ensure specific files and folders have controlled access to a Windows computer? a. NTFS b. ReiserFS c. FAT32 d. Ext4 5. Which of the following Windows utilities would you use to rearrange files into contiguous structures to improve system performance? a. Chkdsk b. Convert c. Disk Cleanup d. Disk Defragmenter

Quiz Answers-6 Lesson 6 Quiz 1. A network attack in which repeated attempts are made to guess user names and passwords using a file containing a long list of words is called: a. a back-door attack. b. a brute-force attack. c. a dictionary attack. d. a man-in-the-middle attack. 2. A network-level protocol that uses tunneling to encapsulate data packets into network packets is called: a. non-repudiation. b. Pretty Good Privacy (PGP). c. remote access server (RAS). d. virtual private network (VPN). 3. A server whose primary goal is to enable the secure creation and management of digital certificates is called: a. a certificate authority (CA). b. Data Encryption Standard (DES). c. Public Key Infrastructure (PKI). d. Virtual Network Computing (VNC). 4. The practice of hiding internal IP addresses from the external network is called: a. information caching. b. Network Address Translation (NAT). c. packet-sniffing. d. spoofing. 5. What is the term for the hardware used to allow multiple operating systems to run concurrently in a virtual network? a. Hypervisor b. Rack server c. Data center d. Multi-tenancy