How To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)



Similar documents
COMPUTER NETWORK TECHNOLOGY (300)

SSVP SIP School VoIP Professional Certification

COMPUTER NETWORK TECHNOLOGY (40)

Local Area Networks (LANs) Blueprint (May 2012 Release)

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

11/22/

Chapter 4 Connecting to the Internet through an ISP

Post-Class Quiz: Telecommunication & Network Security Domain

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Network Design. Yiannos Mylonas

SSVVP SIP School VVoIP Professional Certification

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Candidates should attempt FOUR questions. All questions carry 25 marks.

Networking Test 4 Study Guide

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

CompTIA Network+ (Exam N10-005)

Networking 4 Voice and Video over IP (VVoIP)

Written examination in Computer Networks

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Networking Technology Online Course Outline

Networking Devices. Lesson 6

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Industrial Networks & Databases. Protocols and Networks - Device Bus - - Field Bus -

Introduction to computer networks and Cloud Computing

Chapter 2 TCP/IP Networking Basics

Based on Computer Networking, 4 th Edition by Kurose and Ross

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 5. Data Communication And Internet Technology

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Implementation date Fall 2009

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

IT4405 Computer Networks (Compulsory)

Technical Support Information Belkin internal use only

Networked AV Systems Pretest

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

DATA COMMUNICATION AND NETWORKS

Ethernet. Ethernet. Network Devices

Chapter 15: Advanced Networks

IT Data Communication and Networks (Optional)

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Network System Design Lesson Objectives

Network Technologies

UPPER LAYER SWITCHING

Networks. The two main network types are: Peer networks

Mathatma Gandhi University

Appendix B Network, Routing, Firewall, and Basics

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

The OSI Model: Understanding the Seven Layers of Computer Networks

TCP/IP SUPPLEMENT SCALE NETWORKING

Chapter 2 - The TCP/IP and OSI Networking Models

Study Guide CompTIA A+ Certification, Domain 2 Networking

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

The OSI and TCP/IP Models. Lesson 2

Computer Networks Vs. Distributed Systems

Cisco Network Performance Evaluation Using Packet Tracer

CCT vs. CCENT Skill Set Comparison

Internetworking and IP Address

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

QUESTION 1 If one of the links to a computer on a physical star topology is served, what will be the result?

Overview of Computer Networks

Chapter 1 Personal Computer Hardware hours

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Using High Availability Technologies Lesson 12

Fiber Distributed Data Interface

Network Topologies. Network Topologies

This course has been retired. View the schedule of current <a href=

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

NETWORKING TECHNOLOGIES

Data Communication Networks and Converged Networks

CSCI 362 Computer and Network Security

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Telecommunications, Networks, and Wireless Computing

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

WAN Data Link Protocols

Basic Network Configuration

CCNA Discovery Chapter Four

Networking Basics. Uses of a network

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Cisco Data Centre: Introducing Cisco Data Center Networking

C Information Systems for Managers Fall 1999

Introduction to Computer

ASM Educational Center (ASM) Est. 1992

- Hubs vs. Switches vs. Routers -

Protecting and controlling Virtual LANs by Linux router-firewall

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

Transcription:

PAGE 1 OF 16 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2013 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards.

PAGE 2 of 16 Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Which of the following statements describes the process of data encapsulation? a. Protocols perform data encapsulation when they add specific codes within the datagram that are used for error checking. b. Protocols perform data encapsulation when they embed protocol identification information within the datagram. c. Protocols within the stack perform data encapsulation by adding a header and, in some cases, a footer to the information received from an upper-layer protocol. d. Data encapsulation is the process of including only the user data in a packet. 2. Identify the layer of the Open Systems Interconnection (OSI) model that controls the transmission, reception, and addressing of frames. Also identify the channel access method that Ethernet uses. a. Physical layer; Carrier Sense Multiple Access with Collision Detection (CSMA/CD) b. Data-link layer; token passing c. Physical layer; token passing d. Data-link layer; Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 3. You are a software developer. You have the task of creating an application that provides guaranteed delivery of information between end system applications. What layer of the Open Systems Interconnection (OSI) model and what type of protocol must you implement? a. Data-link layer; connectionless b. Network layer; connection-oriented c. Transport layer; connection-oriented d. Application layer; connection-oriented

PAGE 3 of 16 4. Which type of cable and connector is used to attach a television set to a cable television (CATV) network? a. A fiber-optic cable and a Straight Tip (ST) connector b. A coaxial cable and a Bayonet-Neill-Concelman (BNC) connector c. A twisted-pair cable and an RJ-45 connector d. A coaxial cable and an F-type connector e. An AUI cable and a vampire tap connector 5. a. They prevent collisions. What purpose do the twists serve in twisted-pair cabling? b. They completely eliminate crosstalk from adjacent pairs and electromagnetic interference (EMI). c. They prevent crosstalk from adjacent pairs and limit the effects that EMI has on the signal being carried over the cable. d. They extend the bend radius allowance of the cable. 6. patch panels? a. A crimper What type of tool do you use to connect bulk cable runs to wall plates and b. A splicer c. A pigtail d. A punchdown block tool 7. You have been hired by a corporation to install cabling to connect two existing networks. The two networks are in different buildings approximately 1,000 meters apart. The cable type must support Fast Ethernet data rates of 100 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Your client wants the most economical cabling solution that meets the corporation s needs. What cable type best meets the needs of this corporation? a. Multimode fiber-optic cable b. Shielded twisted-pair (STP) c. Unshielded twisted-pair (UTP)

PAGE 4 of 16 d. Thin coaxial cable e. Singlemode fiber-optic cable 8. (LANs)? a. Bus Which of the following topologies is not used in local area networks b. Star c. Mesh d. Ring 9. Which of the following topologies is configured in a linear fashion, allowing the signal to travel in two directions simultaneously? a. Bus b. Star c. Full mesh d. Wireless e. Ring 10. Which communication method requires separate channels for simultaneously transmitting and receiving data without collisions? a. Half-duplex b. Full-duplex c. Biplex d. Dual channel 11. mechanism? What is the main function of the Media Access Control (MAC) a. To convert hexadecimal data to binary b. To provide a common data frame to communicating systems c. To perform error detection and correct segment errors d. To regulate access to the network medium

PAGE 5 of 16 12. What network interface adapter feature enables you to power up a computer remotely? a. Remote initialize b. Wake on LAN c. Boot on LAN d. LAN remote boot 13. You have a network that consists of three virtual local area networks (VLANs) defined on all of the switches within the network. VLAN 10 is the Sales VLAN, VLAN 20 is the Marketing VLAN, and VLAN 30 is the Accounting VLAN. Users complain that they can t communicate with anyone outside of their own VLAN. What is the problem, and what must you do? a. The problem is a faulty VLAN configuration on one of the switches. You need to re-create the VLANs and configure each VLAN for routing. b. One of the VLANs is configured to filter all other VLAN traffic for security purposes. You need to change the filter on this VLAN. c. VLANs are limited to data-link layer communication only. To allow communication between VLANs, you must add a router or Layer 3 switch to the network and configure it to route between the VLANs. d. The VLANs are using different data-link layer protocols. VLANs must use the same data-link layer protocol in order to communicate.

PAGE 6 of 16 14. Review the following illustration. How many collision domains and broadcast domains exist in the network diagram? a. There are three collision domains and three broadcast domains. b. There are one collision domain and three broadcast domains. c. There are one broadcast domain and three collision domains. d. There are no collision domains and only one broadcast domain. 15. Which of the following statements about bridges and switches is true? a. They are network layer devices that use logical addressing to forward frames. b. They are data-link layer devices that use Media Access Control (MAC) addresses to forward frames. c. They build their internal tables based on destination address and forward packets based on source address. d. They must support the network layer protocol implemented on the local area network. (LAN). e. Each port defines a separate broadcast domain.

PAGE 7 of 16 16. Which of the following sublayers is defined in the Institute of Electrical and Electronics Engineers (IEEE) 802.2 standard? a. Media specifications b. Media Access Control (MAC) c. Logical Link Control (LLC) d. Physical signaling 17. a. 60 bytes What is the maximum legal frame size for Ethernet? b. 64 bytes c. 1500 bytes d. 1518 bytes 18. What term best describes the alternating clocking pattern of 1s and 0s sent prior to frame transmission? a. Signal clocking b. Frame clocking sequence c. Preamble d. Frame clock 19. Hardware addresses with 6 bytes are divided into two parts. Each part is 3 bytes in length. Which of the following statements describes these values? a. The first 3 bytes of a Media Access Control (MAC) address contain the organizationally unique identifier (OUI), and the second 3 bytes must be the same for all devices on the network. b. The first 3 bytes of a Media Access Control (MAC) address must be unique, and the second 3 bytes must be the same for all devices on the network. c. The first 3 bytes of a Media Access Control (MAC) address contain the organizationally unique identifier (OUI), and the second 3 bytes must be unique for each device on the network. d. The first 3 bytes of a Media Access Control (MAC) address is assigned by the manufacturer, and the second 3 bytes must be unique for all devices on the network.

PAGE 8 of 16 20. Which of the following 10 Gigabit Ethernet specifications calls for the use of copper cable? a. 10GBase-LR b. 10GBase-CX4 c. 10GBase-ER d. 10GBase-LX4 e. 10GBase-SR 21. You have been hired to design a company s network. The company has an assigned Class C network address of 192.168.30.0. Your client wants the network to be configured with 8 subnets with 14 hosts each. Will this configuration work, and, if so, how many subnets and hosts can be on the network? a. Yes, this will work. The network will have 14 hosts per subnet and more than 8 subnets for future growth. Four bits will be used for hosts for a total of 14. The last 4 bits will be used to get a total of 14 subnets. b. No, this will not work. There are not enough bits to have 8 subnets with 14 hosts per subnet. c. No, this will not work. Although you have enough bits to have 8 subnets, there are not enough bits left over to allow for 14 hosts per subnet. d. Yes, this will work. The company can have 14 hosts per subnet and 8 subnets. Five bits will be used for hosts for a total of 14. The last 3 bits will be used to get a total of 8 subnets. 22. You have been hired to design a company s Internet Protocol (IP) addressing scheme. The company has an assigned Class C network address of 192.168.30.0. Your client wants 4 subnets with 28 hosts per subnet. How many bits are required for subnets? How many bits are required for hosts? What will the new mask be for this network? a. 3 subnet bits, 5 host bits, and mask 255.255.255.240 b. 4 subnet bits, 3 host bits, and mask 255.255.255.248 c. 3 subnet bits, 5 host bits, and mask 255.255.255.224 d. 5 subnet bits, 3 host bits, and mask 255.255.255.192

PAGE 9 of 16 23. If you have a Class B network with an Internet Protocol (IP) address of 172.16.168.2 and a mask of 255.255.240.0, what is the network address of the subnet to which the IP address belongs? a. 172.16.32.0 b. 172.16.192.0 c. 172.16.168.0 d. 172.16.160.0 24. a. Segment What term describes a unit of data at the transport layer? b. Frame c. Bit d. Datagram 25. When you are analyzing captured Transmission Control Protocol/Internet Protocol (TCP/IP) packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host s data? a. The ACK bit b. The URG bit c. The PSH bit d. The SYN bit e. The FIN bit 26. What is the valid range for well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) server ports? a. 1023 through 65534 b. 1 through 1024 c. 1024 through 65534 d. 1 through 1023

PAGE 10 of 16 27. Review the following illustration. What are the starting sequence number and window size advertised by the source host 192.42.252.20? a. 2921 and 1024 b. 2921 and 4096 c. 1545216000 and 1024 d. 49856000 and 4096 e. 1545216000 and 4096 28. Which of the following protocols resolves a logical network layer Internet Protocol (IP) address to a Media Access Control (MAC) address? a. Internet Control Message Protocol (ICMP) b. Internet Group Management Protocol (IGMP) c. IP d. Address Resolution Protocol (ARP)

PAGE 11 of 16 29. Internet Control Message Protocol (ICMP) and Address Resolution Protocol (ARP) function at what layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite? a. Application b. Transport c. Internet d. Network Access 30. Which of the following protocols resolves host names to Internet Protocol (IP) addresses? a. Dynamic Host Configuration Protocol (DHCP) b. Domain Name System (DNS) c. Address Resolution Protocol (ARP) d. File Transfer Protocol (FTP) 31. Which version of Microsoft Windows Server 2003 is designed specifically for use as an Internet server and supports up to 2 gigabytes (GB) of memory and two processors? a. Business b. Home c. Professional d. Enterprise e. Web 32. What is the native file sharing protocol used on all Microsoft Windows operating systems? a. NetWare Core Protocol (NCP) b. Network File System (NFS) c. Samba d. Server Message Block (SMB) e. Apple Filing Protocol (AFP)

PAGE 12 of 16 33. What is the native file sharing protocol used on UNIX/Linux systems? a. NetWare Core Protocol (NCP) b. Network File System (NFS) c. Samba d. Server Message Block (SMB) e. Apple Filing Protocol (AFP) 34. Which Internet Protocol (IP) address allocation method is not supported by Dynamic Host Configuration Protocol (DHCP)? a. Manual b. Dynamic c. Stable d. Automatic 35. Which of the following features of Novell NetWare 6.5 is used to authenticate users and control access to the network? a. Active Directory b. Bindery c. edirectory d. NWHost database 36. Which of the following is not a mechanism used to resolve Network Basic Input/Output System (NetBIOS) host names to Internet Protocol (IP) addresses? a. NetBIOS broadcasts b. Lmhosts file c. Hosts file d. Windows Internet Naming Service (WINS) 37. Which of the following security mechanisms prevents unauthorized network access through the Internet and isolates local LAN-to-LAN access within a private network? a. IP Security (IPSec) b. Encapsulating Security Payload (ESP) c. A firewall

PAGE 13 of 16 d. A storage area network (SAN) 38. What redundant array of independent disks (RAID) level increases the speed of write requests by writing data to multiple disks but does not provide any fault tolerance against disk failures? a. 0 b. 1 c. 2 d. 5 e. 10 39. What data storage technology consists of a drive array with an embedded operating system that connects directly to a local area network (LAN)? a. DAS b. NAS c. NAD d. OSD 40. Your company wants to implement a firewall on its Internet gateway that can be configured to permit or deny traffic based on Media Access Control (MAC) and network layer addresses, protocols, and ports. In addition, it wants to be able to detect and prevent Internet Protocol (IP) spoofing, SYN floods, and teardrop attacks. Which of the following best meets their needs? a. A packet filtering firewall b. Network Address Translation (NAT) c. A proxy server d. A stateful packet filtering firewall 41. Which of the following remote access technologies converts digital signals generated by a computer to analog signals that can be carried over standard telephone wires? a. Modem-to-modem b. Integrated Services Digital Network (ISDN) c. Digital Subscriber Line (DSL) d. Cable television (CATV)

PAGE 14 of 16 42. Which of the following wide area network (WAN) connection types uses analog signaling and is limited to transmission speeds of 33.6 kilobits per second (Kbps) upstream and 56 Kbps downstream? a. Public Switched Telephone Network (PSTN) b. Integrated Services Digital Network (ISDN) c. Digital Subscriber Line (DSL) d. Cable television (CATV) 43. Which wide area network (WAN) technology is referred to as 2B+D? a. Integrated Services Digital Network (ISDN) Basic Rate Interface (BRI) b. Digital Subscriber Line (DSL) c. Integrated Services Digital Network (ISDN) Primary Rate Interface (PRI) d. T-1 44. Why does digital subscriber line (DSL) technology support faster data transmissions than a standard Public Switched Telephone Network (PSTN) modem connection? a. It uses a separate control circuit that provides clear channels for data. b. It does not perform cyclical redundancy check (CRC) functions and, therefore, has less overhead. c. It performs only a single analog-to-digital conversion. d. It uses a higher frequency range. 45. If you want to allow both voice and data traffic to be transmitted across the same digital subscriber line (DSL) connection, what type of device is required at the customer site? a. A signal terminator b. Digital Subscriber Line Access Multiplexer (DSLAM) c. A coder/decoder (CODEC) device d. A splitter

PAGE 15 of 16 46. What troubleshooting tool allows you to copy all traffic traversing a network to a buffer, interpret protocols, and display the output? a. Event Viewer b. Traffic monitor c. Protocol analyzer d. Management console 47. A single user suddenly can t connect to any hosts on the network (local or remote). You interview the user and find that he made some changes to his computer s Internet Protocol (IP) configuration properties. What should you do next? a. Run the Winipcfg or Ipconfig command to view the local configuration. b. Check the Domain Name System (DNS) server to see if it is resolving IP host names. c. Check the Windows Internet Naming Service (WINS) server to see if it is resolving Network Basic Input/Output System (NetBIOS) names. d. Verify that the router is functioning. 48. Which of the following are examples of data-link layer protocols? (Choose all answers that are correct.) 1. Ethernet 2. UDP 3. Token Ring 4. IP a. 1 and 3 b. 1 and 2 c. 2 and 3 d. 1 and 4 49. The link light on a NIC and the corresponding light on a switch are not lit.what action should be taken first? a. Replace the switch b. Replace the cable between the switch and NIC

PAGE 16 of 16 c. Replace the NIC d. Insert the cable into another switch port. 50. a. TRUE A baseband network can carry only one signal at a time. b. FALSE