click below
click below
Normal Size Small Size show me how
BPA (300)
Computer Network Technology Practice Questions
Question | Answer |
---|---|
Another name for a PC connected to a network: A. Server B. Modem C. NIC D. Client | D. Client |
An Internet that allows only authorized access to users remotely: A. Internet B. Intranet C. Extranet D. LAN | C. Extranet |
Define EDI: A. Electronic Data Interchange B. Electronic Digital Interchange C. Electronic Digital Information D. Electronic Data Interface | A. Electronic Data Interchange |
Telephone lines are designed to carry: A. Analog signals B. Digital signals C. Wave signals D. Multiple code signals | A. Analog signals |
A processor used to offload certain data communications tasks from the host processor: a. Front-end-processor b. Back-end-processor c. Offload-processor d. Host-processor | a. Front-end-processor |
Rules established to govern the way data is transmitted in a computer network: a. ANSI b. Protocol c. DOS d. Universal rules of transmission | b. Protocol |
The front-end-processor establishes the link between the source and destination is a process called: a. Protocol b. Data Link c. Hank-shaking d. Front-end-data-comm | c. Hank-shaking |
A device used to bridge the gap between incompatible networks by performing the necessary protocol conversions to route messages to their proper destinations. a. Switch b. Modem c. Converter d. Router | d. Router |
A communications device that collects data from a number of low-speed devices, then transmits the combined data over a single communications channel. At the destination, it separates the signals for processing. a. Switch b. Router c. Multiplexor d. Modem | c. Multiplexor |
A name commonly used for cable-type is bandwidth. a. True b. False | b. False |
Cable used for “cable television” and data transmission. a. Coaxial cable b. POTS c. ISDN d. ADSL | a. Coaxial cable |
Another name for a dialup line is: a. Private line b. Leased line c. Coaxial line d. Switched line | d. Switched line |
A centralized host computer connected to several other computer systems, which are generally smaller than the host. These smaller computer systems usually share the host’s data base. a. Ring Topology b. Bus Topology c. Star Topology d. Mesh Topology | c. Star Topology |
The connection of terminals and peripherals along a common line. a. Ring Topology b. Bus Topology c. Star Topology d. Mesh Topology | b. Bus Topology |
A network specifically designed to span a city or across a college campus. a. TAN b. LAN c. WAN d. MAN | d. MAN |
The smallest type of network. a. TAN b. LAN c. WAN d. MAN | a. TAN |
Which of the following is not a server: a. File server b. Client server c. Print server d. Communications server | b. Client server |
Another name interchangeably used with a LAN’s peer-to-peer format is: a. One-on-one b. Remote server c. Dedicated server d. None of the above | c. Dedicated server |
Name of the software developed for a Novell Network. a. NovaWare b. CompuWare c. RamWare d. NetWare | d. NetWare |
Which of the following is not a browser? a. Internet Explorer b. Google Express c. Mozilla Firefox d. Opera | b. Google Express |
What year was the Internet born? a. 1959 b. 1969 c. 1979 d. 1989 | b. 1969 |
Who governs the Internet? a. International Association of Computer Users b. Microsoft c. ARPANET d. United Nations | c. ARPANET |
Which network connection is the fastest? a. Dialup b. T1 c. DS3 d. ISDN | c. DS3 |
Define URL: a. Universal Resource Locator b. Universal Record Locator c. Uniform Resource Locator d. Unlimited Resource Locator | a. Universal Resource Locator |
Which of these is a valid IP address? a. 1266.45.96.54 b. 2.45.0054.15 c. 786.543.45.8765 d. 204.38.196.10 | d. 204.38.196.10 |
Define POP: a. Point-of-presence b. Post office position c. Post office priority d. Postal operations priority | a. Point-of-presence |
Which type of server provides a hierarchical storehouse of information? a. Internet server b. FTP server c. Host server d. Gopher server | d. Gopher server |
The bar that allows you to go back, forward, stop, refresh, search, and favorites: a. Menu Bar b. Tool Bar c. URL Bar d. Status Bar | b. Tool Bar |
Which bar is generally found below the workspace? a. Menu Bar b. Tool Bar c. URL Bar d. Status Bar | d. Status Bar |
Used to translate between domain names and IP addresses, and to control email delivery. a. TLS b. DHCP c. DNS d. FTP | c. DNS |
Which layer of the OSI provides a standard interface for the Application layer, MIME encoding, and data encryption? a. Session Layer b. Presentation Layer c. Transport Layer d. Data Link Layer | b. Presentation Layer |
Which OSI layer involves network cabling? a. Physical Layer b. Presentation Layer c. Transport Layer d. Data Link Layer | a. Physical Layer |
Cat 5 cable should be limited in length to no more than: a. 50m b. 100ft c. 125m d. 328ft | d. 328ft |
The interference of a signal on a cable from an outside source. a. Electronic infusion b. Cross-talk c. Electronic disturbance d. Physical interruption | b. Cross-talk |
In the Transport layer, these devices are capable of inspecting data packets as they are received, determining the source and destination device of that packet, and forwarding it appropriately. a. Hub b. Router c. Switch d. Bridge | c. Switch |
These operate at the data link layer of the OSI model where their function is to inspect incoming traffic and decide whether to forward or discard it. a. Hub b. Router c. Switch d. Bridge | d. Bridge |
A system that joins two different networks together, this can be through hardware or software. a. Gateway b. Bridge c. Hub d. Switch | a. Gateway |
Define WINS: a. Windows Systems b. Wireless Information Networking System c. Windows Internet Name Service d. Wireless Integrated Networking System | c. Windows Internet Name Service |
The use of a Proxy Server may result in a client becoming more susceptible to computer crimes. a. True b. False | a. True |
Its primary responsibility is to transfer traffic between computer networks of different trust levels. a. Router b. Firewall c. Gateway d. Switch | b. Firewall |
A protocol used by networked clients to obtain IP addresses. a. DNS b. TCP/IP c. IPX d. DHCP | d. DHCP |
Networking protocol developed and used by Apple Systems. a. TCP/IP b. IPX c. Appletalk d. Linux | c. Appletalk |
Atypeofservicewhereauserdoesn'thavetorememberthephysicaladdressofanetworkresourceinordertoaccesstheresource.Theusercanmerelyprovideanameandthisservicewilllocatetheresource. a Resource Service b Peripheral Service c Directory Service d Print Service | c Directory Service |
NetBIOS Is an acronym for: A. Network BIOS B. Network Basic Input Output System C. Netscape Information Search D. Network Basic Instinct Operating System | B. Network Basic Input Output System |
Define IPS: a. Internet Priority System b. Internet Proxy System c. Intrusive Proxy Search d. Intrusion Prevention System | d. Intrusion Prevention System |
Which of the following IP addresses is a valid subnet mask of a class B network? a. 255.255.255.255 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 | d. 255.255.0.0 |
The range of IP address from 224.0.0.0 to 239.255.255.255 is what class? a. B b. C c. D d. E | c. D |
Ethernet has been standardized as: a. IEEE 802.3 b. IEEE 803.3 c. IEEE 802.11 d. IEEE 803.11 | a. IEEE 802.3 |
Cat 5 UTP contains: a. 2 twisted pair wires b. 4 twisted pair wires c. 5 twisted pair wires d. 6 twisted pair wires | b. 4 twisted pair wires |
You need to configure a direct connection between two network devices in different geographic locations. The connection must have a fixed bandwidth. What should you use? A. ATM B. X.25 C. ISDN D. Frame Relay | D. Frame Relay |
You need to find the approximate length of a fiber optic cable segment. You need to get this information as quickly as possible. What should you use? A. Multimeter B. Temperature monitor C. Cable tester D. OTDR | D. OTDR |
A malicious program that resides in memory, copies itself, and sends copies of itself to other network hosts is known as what? A. A virus B. A worm C. A Trojan D. A man-in-the-middle | B. A worm |
You need to extend your officenetwork,butyoucannotrunnewcableinthearea.Devicesshouldbeaddressedaspartofanexistingsubnetthatiswiredas10BaseT.Whatshouldyoudofirst? ADeploy a wireless access pointBDeploy a bridgeCDeploy a routerDDeploy a basic firewall | A Deploy a wireless access |
You connect the receive connector of a fiber optic cable to its send connector to troubleshoot a problem. This type of connection is known as a: A. loopback. B. patch. C. crossover. D. rollover. | A. loopback. |
How can you mitigate the risk of a smurf attack A. preventroutersandcomputersfromrespondingtoICMP requests B. Installvirusscannersonallcomputers C. Educateusersinsocialengineeringprevention D. Keepalserversupdatedwiththelatestsecuritypatches | A. preventroutersandcomputersfromrespondingtoICMP requests |
What is the most likely cause of interference on an 802.11g network A. 11000000 B. 01000010 C. 01100011 C. 01100011 D. 11000110 | A. 11000000 |
When would you use a port scanner to test your perimeter network A.TotellhowwellyournetworkrespondstothreatsB.ToidentifypotentialholesinnetworkfirewallsC.Todetermineifyournetwork'swebserversareoperatingproperlyD.Toseeifyourproxyserverisforwardingtraffic | B.Toidentifypotentialholesinnetworkfirewalls |
What type of connector is used wit |