Вы находитесь на странице: 1из 66

Review

CNIT 106

1: Introducing
Computer
Networks

What device connects


multiple nodes at layer
1?
A. Client
B. Server
C. Hub
D. Switch
E. Router

What device lifts packets


off one network onto a
different network?
A. Client
B. Server
C. Hub
D. Switch
E. Router

km fiber loop connecting


government buildings
throughout the city.
What sort of network is
that?
A. LAN
B. WAN
C. CAN
D. MAN
E. PAN

What physical topology is


used by Ethernet?

A. Star
B. Bus
C. Ring
D. Full-mesh
E. Partial-mesh

2: Dissecting the
OSI Model

Which layer uses logical


addressing?

A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1

What layer contains


frames?

A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1

What layer contains bits?

A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1

Which layer uses MAC


addresses?

A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1

What transmission
method is used by
Ethernet?
A. Broadband
B. Baseband
C. FDM
D. TDM
E. StatTDM

What technique sends


multiple signals with
different wavelengths
through the same
medium?
A. Broadband
B. Baseband
C. FDM
D. TDM
E. StatTDM

Which protocol has a


"window size" field in its
header?
A. TCP
B. Ethernet
C. UDP
D. IP
E. 802.11

Which protocol has a TTL


field in its header?

A. TCP
B. Ethernet
C. UDP
D. IP
E. 802.11

Which layer performs


encryption?

A. Layer 7
B. Layer 6
C. Layer 5
D. Layer 4
E. Layer 1, 2, or 3

Which layer does


routing?

A. Layer 7
B. Layer 6
C. Layer 5
D. Layer 4
E. Layer 1, 2, or 3

Which protocol uses port


443?

A. HTTP
B. FTP
C. Telnet
D. HTTPS
E. POP3

3: Identifying
Network
Components

What cable has special


fire-safety features?

A. Coax
B. UTP
C. STP
D. Plenum-rated
E. Fiber optic

What cable uses BNC


connectors?

A. Coax
B. UTP
C. STP
D. Plenum-rated
E. Fiber optic

What device operates


only at layer 3?

A. Hub
B. Bridge
C. Switch
D. Multilayer switch
E. Router

Four computers are


connected to a hub. How
many devices are in the
collision domain?
A. 1
B. 2
C. 3
D. 4
E. Some other number

What device assigns IP


addresses?

A. VPN Concentrator
B. Firewall
C. DNS server
D. DHCP server
E. Proxy server

Which DNS record


contains an IPv6
address?
A. A
B. AAAA
C. MX
D. SOA
E. CNAME

What protocol is used to


ring a VoIP phone?

A. SIP
B. PBX
C. RIP
D. RTP
E. BGP

4: Understanding
Ethernet

What is the standard for


gigabit Ethernet over
copper wire?
A. 10BASE-T
B. 100BASE-TX
C. 100BASE-FX
D. 1000BASE-LX
E. 1000BASE-T

What IEEE standard


implements VLANs?

A. 802.1q
B. 802.1x
C. 802.11
D. 802.3
E. 802.11ac

What protocol prevents


broadcast storms?

A. VLAN
B. Trunk
C. STP
D. PoE
E. 802.1x

5: Working with
IP Addresses

What is 59 in binary?

A. 0011 1010
B. 0011 1011
C. 0000 1111
D. 0110 0011
E. 0011 1001

What is the first usable


address in this network?
192.168.1.199 /25
A. 192.168.1.0
B. 192.168.1.1
C. 192.168.1.129
D. 192.168.1.193
E. 192.156.1.255

When you view a Web


page, which transmission
method are you using?
A. Unicast
B. Multicast
C. Broadcast
D. Anycast
E. None of the above

Which technique results


in addresses starting
169.254?
A. DHCP
B. APIPA
C. BOOTP
D. Static addressing
E. Multihoming

How many bits are in an


IPv6 address?

A. 24
B. 48
C. 32
D. 64
E. None of the above

6: Routing Traffic

Which type of route is


the most trusted?

A. Directly connected
B. Static
C. RIP
D. OSPF
E. BGP

Which is a distancevector routing protocol?

A. Directly connected
B. Static
C. RIP
D. OSPF
E. BGP

What system conceals


internal IP addresses?

A. NAT
B. IGMP
C. ICMP
D. RIP
E. SIP

7: Introducing
Wide-Area
Networks

Which WAN link allows


more than 100 Gbps?

A. SONET
B. T1
C. T3
D. ATM
E. Frame relay

Which link is used by


Ethernet?

A. UTP
B. Coax
C. Fiber optic
D. Power line
E. Wireless

Which technology uses a


DOCSIS modem?

A. DSL
B. PPP
C. PPPoE
D. RRAS
E. Cable

Which system uses 48byte cells?

A. Satellite
B. POTS
C. ISDN
D. Frame relay
E. ATM

8: Connecting
Wirelessly

Which of these was never


used on wireless
networks?
A. CSMA/CD
B. CSMA/CA
C. FHSS
D. DSSS
E. OFDM

Which Wi-Fi standard


goes at 11 Mbps?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
E. 802.11ac

Which wireless security


technique requires a
RADIUS server?
A. WEP
B. WPA
C. WPA2
D. MAC address filtering
E. 802.1x

9: Optimizing
Network
Performance

Which is a proprietary
Cisco protocol?

A. Single point of failure


B. Active-standby
C. HSRP
D. CARP
E. Load balancing

What congestion control


technique delays
packets?
A. IntServ
B. DiffServ
C. RED
D. Policing
E. Shaping

10: Using
Command-Line
Utilities

Which of these
commands is not present
in Linux?
A. ping
B. arp
C. ipconfig
D. netstat
E. route

Which command resolves


a layer 2 address to a
layer 3 address?
A. ping
B. arp
C. ipconfig
D. netstat
E. route

11: Managing a
Network

Which device is used to


terminate cable?

A. BERT
B. Butt set
C. Cable tester
D. Cable certifier
E. Crimper

What device sends a


brief electrical pulse
through a cable, and
measures the reflected
pulses?
A. Multimeter
B. Loopback plug
C. Protocol analyzer
D. Punch-down tool
E. TDR

What system manages


network devices and
uses community strings?
A. SNMP
B. Toner probe
C. Syslog
D. Application log
E. SMTP

12: Securing a
Network

What security goal is


provided by encryption?

A. Authenticity
B. Confidentiality
C. Security
D. Integrity
E. Availability

Which system uses a key


that is too short, and is
not secure?
A. DES
B. 3DES
C. AES
D. Asymmetric encryption
E. Symmetric encryption

Which is the most secure


hash function?

A. MD5
B. SHA-1
C. SHA-2
D. DES
E. AES

Which technique can


steal your password even
when you use HTTPS?
A. Keylogger
B. Packet sniffing
C. Dictionary attack
D. DoS
E. Buffer overflow

Which technique will


protect a network even if
a password is stolen?
A. SSO
B. TACACS
C. ACLs
D. CHAP
E. 2FA

Which technique allows a


laptop to operate as a
client but not a server?
A. Packet filtering
B. Stateful inspection
C. DMZ
D. VPN
E. IDS

Вам также может понравиться