Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

BPA (300)

Computer Network Technology Practice Questions

QuestionAnswer
Another name for a PC connected to a network: A. Server B. Modem C. NIC D. Client D. Client
An Internet that allows only authorized access to users remotely: A. Internet B. Intranet C. Extranet D. LAN C. Extranet
Define EDI: A. Electronic Data Interchange B. Electronic Digital Interchange C. Electronic Digital Information D. Electronic Data Interface A. Electronic Data Interchange
Telephone lines are designed to carry: A. Analog signals B. Digital signals C. Wave signals D. Multiple code signals A. Analog signals
A processor used to offload certain data communications tasks from the host processor: a. Front-end-processor b. Back-end-processor c. Offload-processor d. Host-processor a. Front-end-processor
Rules established to govern the way data is transmitted in a computer network: a. ANSI b. Protocol c. DOS d. Universal rules of transmission b. Protocol
The front-end-processor establishes the link between the source and destination is a process called: a. Protocol b. Data Link c. Hank-shaking d. Front-end-data-comm c. Hank-shaking
A device used to bridge the gap between incompatible networks by performing the necessary protocol conversions to route messages to their proper destinations. a. Switch b. Modem c. Converter d. Router d. Router
A communications device that collects data from a number of low-speed devices, then transmits the combined data over a single communications channel. At the destination, it separates the signals for processing. a. Switch b. Router c. Multiplexor d. Modem c. Multiplexor
A name commonly used for cable-type is bandwidth. a. True b. False b. False
Cable used for “cable television” and data transmission. a. Coaxial cable b. POTS c. ISDN d. ADSL a. Coaxial cable
Another name for a dialup line is: a. Private line b. Leased line c. Coaxial line d. Switched line d. Switched line
A centralized host computer connected to several other computer systems, which are generally smaller than the host. These smaller computer systems usually share the host’s data base. a. Ring Topology b. Bus Topology c. Star Topology d. Mesh Topology c. Star Topology
The connection of terminals and peripherals along a common line. a. Ring Topology b. Bus Topology c. Star Topology d. Mesh Topology b. Bus Topology
A network specifically designed to span a city or across a college campus. a. TAN b. LAN c. WAN d. MAN d. MAN
The smallest type of network. a. TAN b. LAN c. WAN d. MAN a. TAN
Which of the following is not a server: a. File server b. Client server c. Print server d. Communications server b. Client server
Another name interchangeably used with a LAN’s peer-to-peer format is: a. One-on-one b. Remote server c. Dedicated server d. None of the above c. Dedicated server
Name of the software developed for a Novell Network. a. NovaWare b. CompuWare c. RamWare d. NetWare d. NetWare
Which of the following is not a browser? a. Internet Explorer b. Google Express c. Mozilla Firefox d. Opera b. Google Express
What year was the Internet born? a. 1959 b. 1969 c. 1979 d. 1989 b. 1969
Who governs the Internet? a. International Association of Computer Users b. Microsoft c. ARPANET d. United Nations c. ARPANET
Which network connection is the fastest? a. Dialup b. T1 c. DS3 d. ISDN c. DS3
Define URL: a. Universal Resource Locator b. Universal Record Locator c. Uniform Resource Locator d. Unlimited Resource Locator a. Universal Resource Locator
Which of these is a valid IP address? a. 1266.45.96.54 b. 2.45.0054.15 c. 786.543.45.8765 d. 204.38.196.10 d. 204.38.196.10
Define POP: a. Point-of-presence b. Post office position c. Post office priority d. Postal operations priority a. Point-of-presence
Which type of server provides a hierarchical storehouse of information? a. Internet server b. FTP server c. Host server d. Gopher server d. Gopher server
The bar that allows you to go back, forward, stop, refresh, search, and favorites: a. Menu Bar b. Tool Bar c. URL Bar d. Status Bar b. Tool Bar
Which bar is generally found below the workspace? a. Menu Bar b. Tool Bar c. URL Bar d. Status Bar d. Status Bar
Used to translate between domain names and IP addresses, and to control email delivery. a. TLS b. DHCP c. DNS d. FTP c. DNS
Which layer of the OSI provides a standard interface for the Application layer, MIME encoding, and data encryption? a. Session Layer b. Presentation Layer c. Transport Layer d. Data Link Layer b. Presentation Layer
Which OSI layer involves network cabling? a. Physical Layer b. Presentation Layer c. Transport Layer d. Data Link Layer a. Physical Layer
Cat 5 cable should be limited in length to no more than: a. 50m b. 100ft c. 125m d. 328ft d. 328ft
The interference of a signal on a cable from an outside source. a. Electronic infusion b. Cross-talk c. Electronic disturbance d. Physical interruption b. Cross-talk
In the Transport layer, these devices are capable of inspecting data packets as they are received, determining the source and destination device of that packet, and forwarding it appropriately. a. Hub b. Router c. Switch d. Bridge c. Switch
These operate at the data link layer of the OSI model where their function is to inspect incoming traffic and decide whether to forward or discard it. a. Hub b. Router c. Switch d. Bridge d. Bridge
A system that joins two different networks together, this can be through hardware or software. a. Gateway b. Bridge c. Hub d. Switch a. Gateway
Define WINS: a. Windows Systems b. Wireless Information Networking System c. Windows Internet Name Service d. Wireless Integrated Networking System c. Windows Internet Name Service
The use of a Proxy Server may result in a client becoming more susceptible to computer crimes. a. True b. False a. True
Its primary responsibility is to transfer traffic between computer networks of different trust levels. a. Router b. Firewall c. Gateway d. Switch b. Firewall
A protocol used by networked clients to obtain IP addresses. a. DNS b. TCP/IP c. IPX d. DHCP d. DHCP
Networking protocol developed and used by Apple Systems. a. TCP/IP b. IPX c. Appletalk d. Linux c. Appletalk
Atypeofservicewhereauserdoesn'thavetorememberthephysicaladdressofanetworkresourceinordertoaccesstheresource.Theusercanmerelyprovideanameandthisservicewilllocatetheresource. a Resource Service b Peripheral Service c Directory Service d Print Service c Directory Service
NetBIOS Is an acronym for: A. Network BIOS B. Network Basic Input Output System C. Netscape Information Search D. Network Basic Instinct Operating System B. Network Basic Input Output System
Define IPS: a. Internet Priority System b. Internet Proxy System c. Intrusive Proxy Search d. Intrusion Prevention System d. Intrusion Prevention System
Which of the following IP addresses is a valid subnet mask of a class B network? a. 255.255.255.255 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 d. 255.255.0.0
The range of IP address from 224.0.0.0 to 239.255.255.255 is what class? a. B b. C c. D d. E c. D
Ethernet has been standardized as: a. IEEE 802.3 b. IEEE 803.3 c. IEEE 802.11 d. IEEE 803.11 a. IEEE 802.3
Cat 5 UTP contains: a. 2 twisted pair wires b. 4 twisted pair wires c. 5 twisted pair wires d. 6 twisted pair wires b. 4 twisted pair wires
You need to configure a direct connection between two network devices in different geographic locations. The connection must have a fixed bandwidth. What should you use? A. ATM B. X.25 C. ISDN D. Frame Relay D. Frame Relay
You need to find the approximate length of a fiber optic cable segment. You need to get this information as quickly as possible. What should you use? A. Multimeter B. Temperature monitor C. Cable tester D. OTDR D. OTDR
A malicious program that resides in memory, copies itself, and sends copies of itself to other network hosts is known as what? A. A virus B. A worm C. A Trojan D. A man-in-the-middle B. A worm
You need to extend your officenetwork,butyoucannotrunnewcableinthearea.Devicesshouldbeaddressedaspartofanexistingsubnetthatiswiredas10BaseT.Whatshouldyoudofirst? ADeploy a wireless access pointBDeploy a bridgeCDeploy a routerDDeploy a basic firewall A Deploy a wireless access
You connect the receive connector of a fiber optic cable to its send connector to troubleshoot a problem. This type of connection is known as a: A. loopback. B. patch. C. crossover. D. rollover. A. loopback.
How can you mitigate the risk of a smurf attack A. preventroutersandcomputersfromrespondingtoICMP requests B. Installvirusscannersonallcomputers C. Educateusersinsocialengineeringprevention D. Keepalserversupdatedwiththelatestsecuritypatches A. preventroutersandcomputersfromrespondingtoICMP requests
What is the most likely cause of interference on an 802.11g network A. 11000000 B. 01000010 C. 01100011 C. 01100011 D. 11000110 A. 11000000
When would you use a port scanner to test your perimeter network A.TotellhowwellyournetworkrespondstothreatsB.ToidentifypotentialholesinnetworkfirewallsC.Todetermineifyournetwork'swebserversareoperatingproperlyD.Toseeifyourproxyserverisforwardingtraffic B.Toidentifypotentialholesinnetworkfirewalls
What type of connector is used wit
Created by: Kalico2019
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards