Академический Документы
Профессиональный Документы
Культура Документы
CNIT 106
1: Introducing
Computer
Networks
A. Star
B. Bus
C. Ring
D. Full-mesh
E. Partial-mesh
2: Dissecting the
OSI Model
A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1
A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1
A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1
A. Layer 5, 6, or 7
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1
What transmission
method is used by
Ethernet?
A. Broadband
B. Baseband
C. FDM
D. TDM
E. StatTDM
A. TCP
B. Ethernet
C. UDP
D. IP
E. 802.11
A. Layer 7
B. Layer 6
C. Layer 5
D. Layer 4
E. Layer 1, 2, or 3
A. Layer 7
B. Layer 6
C. Layer 5
D. Layer 4
E. Layer 1, 2, or 3
A. HTTP
B. FTP
C. Telnet
D. HTTPS
E. POP3
3: Identifying
Network
Components
A. Coax
B. UTP
C. STP
D. Plenum-rated
E. Fiber optic
A. Coax
B. UTP
C. STP
D. Plenum-rated
E. Fiber optic
A. Hub
B. Bridge
C. Switch
D. Multilayer switch
E. Router
A. VPN Concentrator
B. Firewall
C. DNS server
D. DHCP server
E. Proxy server
A. SIP
B. PBX
C. RIP
D. RTP
E. BGP
4: Understanding
Ethernet
A. 802.1q
B. 802.1x
C. 802.11
D. 802.3
E. 802.11ac
A. VLAN
B. Trunk
C. STP
D. PoE
E. 802.1x
5: Working with
IP Addresses
What is 59 in binary?
A. 0011 1010
B. 0011 1011
C. 0000 1111
D. 0110 0011
E. 0011 1001
A. 24
B. 48
C. 32
D. 64
E. None of the above
6: Routing Traffic
A. Directly connected
B. Static
C. RIP
D. OSPF
E. BGP
A. Directly connected
B. Static
C. RIP
D. OSPF
E. BGP
A. NAT
B. IGMP
C. ICMP
D. RIP
E. SIP
7: Introducing
Wide-Area
Networks
A. SONET
B. T1
C. T3
D. ATM
E. Frame relay
A. UTP
B. Coax
C. Fiber optic
D. Power line
E. Wireless
A. DSL
B. PPP
C. PPPoE
D. RRAS
E. Cable
A. Satellite
B. POTS
C. ISDN
D. Frame relay
E. ATM
8: Connecting
Wirelessly
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
E. 802.11ac
9: Optimizing
Network
Performance
Which is a proprietary
Cisco protocol?
10: Using
Command-Line
Utilities
Which of these
commands is not present
in Linux?
A. ping
B. arp
C. ipconfig
D. netstat
E. route
11: Managing a
Network
A. BERT
B. Butt set
C. Cable tester
D. Cable certifier
E. Crimper
12: Securing a
Network
A. Authenticity
B. Confidentiality
C. Security
D. Integrity
E. Availability
A. MD5
B. SHA-1
C. SHA-2
D. DES
E. AES