Sie sind auf Seite 1von 14

Quiz 2:

Quiz Breakdown:
[ Cabling and Interfaces] 1. The RJ-45 connection houses (8)________cable connections Correct [ Cabling and Interfaces] 2. You are assembling a five-host 10Base2 network as shown in the graphic. Which locations on the network cable will require both a T-connector and a terminator. Correct [ Cabling and Interfaces] 3. If the coaxial conducting core and wire mesh touch, the cable will experience a (Short) Correct [ Cabling and Interfaces] 4. STP uses a foil wrap for (Shielding) Correct [ Cabling and Interfaces] 5. You have been asked to review XYZ Company's network configurations graphic). The network is a 10BaseT network using (CAT5)twisted-pair cabling. Which of the following are problems with this network?. You answered: Segments to computer A,D and F are too long Incorrect [ Cabling and Interfaces] 6. The most popular type of twisted-pair cable is (UTP) Correct [ Cabling and Interfaces] 7. UTP cable for data transmissions up to 10 Mbps is category (CAT3) Correct [ Cabling and Interfaces] 8. Point-to-point transmission involves wireless (serial)____________ data transfer Correct [ Cabling and Interfaces] 9. Thicknet cable is sometimes used as a (Backbone)____________ to connect thinnet segments

Correct [ Cabling and Interfaces] 10. Your network consulting firm has been asked to implement a network for a small company. It wants to connect its 25 computers to a small LAN. Required Results: The company needs a network that must be able to support transfer rate up to 10Mbps. Optional Results: The company would like to minimize costs. The company would like to use the existing cabling with RJ-45 connectors that was installed in the building. Proposed Solution: Implement a Thinnet network. Which results does the proposed solution produce? You answered: The proposed solution produces the required result and produces both of the optional desired results Incorrect [ Cabling and Interfaces] 11. Both sending and receiving NICs must agree on transmission speeds (true) Correct [ Cabling and Interfaces] 12. The core of coaxial cable is surrounded by an (insulating layer)____________ that separates it from the wire mesh. Correct [ Cabling and Interfaces] 13. IRQ lines are assigned different levels of (Priority)____________ so that the CPU can determine how important the request is. Correct [ Cabling and Interfaces] 14. Coaxial cable that contains special materials in its insulation and cable jacket to prevent fire hazard is called (Plenum)____________ cabling Correct [ Cabling and Interfaces] 15. Twisted-pair cabling uses (RJ45)________ connectors to connect to a computer. Correct [ Cabling and Interfaces] 16. Wireless mobile LANs use telephone carriers and public services to transmit and receive signals.

Correct [ Cabling and Interfaces] 17. Which of the following types is used for ARCNet? (RG62) You answered: RG-58 Incorrect [ Cabling and Interfaces] 18. Thinnet cable can carry a signal for a distance of about 185 meters (607 feet) before the signal starts to suffer from (attenuation) Correct [ Cabling and Interfaces] 19. STP is less susceptible to electrical (interference)____________ and supports higher transmission rates over longer distances than does UTP. Correct [ Cabling and Interfaces] 20. 10BaseT topologies have no which of the following characteristic? You answered: STP cabling. Incorrect [ Cabling and Interfaces] 21. UTP cable for data transmissions up to 100 Mbps is category(5) Correct [ Cabling and Interfaces] 22. You are installing a network between two buildings for a graphic publishing company. The company is going to connect its small network between the two buildings, which are approximately 900 meters apart. Each building already has a small 10BaseT LAN. Required Results: Connect the LANs in each building with the appropriate type of cabling. Optional Results: The segment attaching the two buildings should be immune to electronic interference. The cabling should be inexpensive and easy to install. Proposed Solution: Install a 10BaseFL (fiber Optic) line connecting the two buildings. Which results does the proposed solution produce? Correct [ Cabling and Interfaces] 23. On a 10Based2 network(as depicted in the graphic), client B can not connect to any other computers. All other machines are communicating correctly on the network. Which of the following is the most likely cause of the network problem?.

Correct [ Cabling and Interfaces] 24. The RJ-11 connection houses(4)________cable connections Correct [ Cabling and Interfaces] 25. Broadband systems use (analog)____________ signaling and a range of frequencies Correct [ Cabling and Interfaces] 26. Of the following cable types Which is the most susceptible to crosstalk?(UTP) Correct [ Cabling and Interfaces] 27. In wireless LANs, a transceiver - sometimes called an (access point)________ broadcasts and receives signals to and from the surrounding computers and cabled segment Correct [ Cabling and Interfaces] 28. What is the longest distance limit between the two buildings that a wireless bridge can be used to connect?. (25 miles) Correct [ Cabling and Interfaces] 29. Which type of connectors is not characteristic of a Thinnet network?(RJ45) Correct [ Cabling and Interfaces] 30. A flexible coaxial cable that is easily routed by that should not go into crawl spaces is (PVC) Correct [ Cabling and Interfaces] 31. If a 10BaseT network has been installed and one of the segments exceeds 100 meters, which type of device can help to prevent signal attenuation?(Repeater) Correct [ Cabling and Interfaces] 32. CDPD uses the same technology and some of the same systems as (Cellular)____________ telephones Correct [ Cabling and Interfaces]

33. A component called a wireless (bridges)____________ offers an easy way to link buildings without using cable Correct [ Cabling and Interfaces] 34. Baseband networking systems use (digital)____________signaling over a single frequency Correct [ Cabling and Interfaces] 35. Optical fibers carry (digital)____________ data signals in the form of light pulses. Correct [ Cabling and Interfaces] 36. Fiber-optic cable cannot be (tapped)____________, and the data cannot be stolen Correct [ Cabling and Interfaces] 37. With (broadband)____________ transmission, the signal flow is unidirectional Correct [ Cabling and Interfaces] 38. Fiber-optic cable transmissions are not subject to electrical (interference) Correct

Quiz 4:

Quiz Breakdown:
1. The Universal Naming Convention(UNC) provides a way for networked computers to identify each others. Which of the following is included ina UNC name? Share name\Share resource

2. What is the function of a redirector? - Forwards requests to local or remote resource hosts.

3. A multitasking operating system can run as many tasks simultaneously as there are ____________.

processors

4. The network operating system can take control of the processor without the task cooperation in a multitasking operating system that uses ____________ multitasking. -

preemptive

5. Redirector activity orginates in the ____________ computer when the user issues a request for a network resource or service. Client 6. Which of the following issue is not for you to address before setting up a Server NOS(Network Operating System)?

Naming conventions
7. What are printer shares and directory shares considered to be?

8. Redirectors can send requests to either computers or ____________. (peripherals) 9. Multitasking is The method of computing where multiple processes operate simultaneously by sharing the CPU. 10. The process of forwarding requests is carried out by a also commonly referred to as a "shell" or a "requester" 11. In the past, network operating systems were (application)____________ that were loaded on top of a stand-alone operating system. 12. Which of the following has the proper format for a UNC(Universal Naming Convention) name?

redirector __, which is

\\servername\sharename

13. When a NOS/OS maintains control of the CPU by assigning specific time slices to processes, it is called cooperative multitasking. You answered: False

Quiz 5:

Quiz Breakdown:
[ Network Protocols] 1. The IEEE category _______ covers LAN standards for Token Ring Correct (802.5) [ Network Protocols]

2. Which of the following protocols is considered a transport protocol? Correct(TCP) [ Network Protocols] 3. Which layer of the OSI model establishes the route between the sending and receiving machines? Correct(Network) [ Network Protocols] 4. Which layer of OSI model managers flow control and error correction? Correct (Transport layer) [ Network Protocols] 5. Which of the following protocols is considered a network layer protocol? Correct(IP) [ Network Protocols] 6. The _________ layer of OSI model supports the port concept, so programmer can write programs to contact remote applications. Correct (transport layer) [ Network Protocols] 7. The ____________ layer provides error checking for bit streams by CRC Correct (Data link layer) [ Network Protocols] 8. The Project 802 specifications define the way ____________ access and transfer data over physical media Correct (NIC) [ Network Protocols] 9. Which of the following is an correct example of MAC address. Correct [ Network Protocols] 10. The ____________ layer provides data compression and encryption. Correct(Presentation) [ Network Protocols] 11. Which of the following IEEE 802 specifications provides details on network security? Correct(802.10) [ Network Protocols] 12. In which OSI model layer does the Media Access Control sublayer reside? Correct(data link layer)

[ Network Protocols] 13. The ____________ layer defines how the cable is attached to the NIC Correct(Physical) [ Network Protocols] 14. NICs work in the __________ sublayer of the data-link layer of the OSI model Correct(MAC) [ Network Protocols] 15. At each layer, the software adds some additional formatting or _____ to the packet Correct (addressing) [ Network Protocols] 16. Which of the following protocols are considered application protocols? You answered: None of these Incorrect(SNMP Simple Network Management Protocol) [ Network Protocols] 17. The data-link layer is responsible for sending _________ from the network layer to the physical layer Correct(data frames) [ Network Protocols] 18. Which layer of the OSI model converts data into a generic format for network transmission? Correct (Presentation Layer) [ Network Protocols] 19. The 802 project divided the _________layer of the OSI reference model into two sublayers, the Logical Link Control (LLC) layer and the Media Access Conrol (MAC) layer Correct (Data Link Layer) [ Network Protocols] 20. The 192.168.1.234 is an address of _____ layer of OSI model. Correct (Network layer) [ Network Protocols] 21. The ____________ layer provides reliable connection-oriented communication. You answered: session Incorrect(Transport layer) [ Network Protocols]

22. The smart-download protocol utilizes checkpoint-mechanism of _________ layer of OSI model Correct(Session) [ Network Protocols] 23. The IEEE category _______ covers LAN standards for wireless communication Correct (802.11) [ Network Protocols] 24. The ____________ layer determines the route from the source to the destination computer Correct(Network layer) [ Network Protocols] 25. The ____________ layer manages the dialog between sender and receiver. Correct (Session) [ Network Protocols] 26. The ____________ layer provides connectionless packet-switching communication. You answered: data link Incorrect(Network layer) [ Network Protocols] 27. The peter@yahoo.com is an address of _____ layer of OSI model. You answered: network Incorrect (Application layer) [ Network Protocols] 28. Which of the following 802 specifications provide details on how an Ethernet network operates? Correct(802.3) [ Network Protocols] 29. The end-to-end protocol of flow control is provided by _________ layer of OSI model Correct(Transport layer) [ Network Protocols] 30. The ____________information in a data frame is used for frame type, routing, and segmentation information Correct (Control) [ Network Protocols] 31. At the sending computer, the _______ layer translates data from a format sent down from the application layer

Correct(Presentation layer) [ Network Protocols] 32. The OSI reference model divides network activity into ____ layers Correct(7) [ Network Protocols] 33. The http protocol belongs to _________ layer of OSI model Correct (Application) [ Network Protocols] 34. The ____________ sublayer communicates directly with the NIC and is responsible for delivering error-free data between two computers on the network Correct (MAC)

Quiz 6:

Quiz Breakdown:
[ Network Protocols and TCP/IP] 1. Several protocols can work together in what is known as a protocol ____________. Correct(Stack) [ Network Protocols and TCP/IP] 2. The purpose of the ________ is to prevent lost or damaged data packets (such as missing e-mail messages) from endlessly wandering the network Correct(TTL) [ Network Protocols and TCP/IP] 3. TCP uses what is known as a "_______-way handshake" which establishes the port number and beginning sequence numbers from both sides of the transmission Correct(three) [ Network Protocols and TCP/IP] 4. Which protocol is an industry-standard suite of protocols providing communication in a heterogeneous environment? Correct(TCP/IP) [ Network Protocols and TCP/IP] 5. The receiving computer passes the reassembled data to the ____________ in a usable form(application) Correct [ Network Protocols and TCP/IP]

6. A receiving computer copies the data from the packets to a memory ______________ for reassembly. Correct(buffer) [ Network Protocols and TCP/IP] 7. Windows Sockets (WinSock) is a networking ________ designed to facilitate communication among different TCP/IP applications and protocol stacks. Correct(API) [ Network Protocols and TCP/IP] 8. IBM's NetBEUI is not a good choice for large networks because it is not _________________. Correct(Routable) [ Network Protocols and TCP/IP] 9. TCP/IP supports routing and is commonly used as a(n) _______________ protocol Correct(Internetworking) [ Network Protocols and TCP/IP] 10. An _______ can be used to reduce traffic in the LAN You answered: router Incorrect(bridge or switch Layer 2) [ Network Protocols and TCP/IP] 11. The transport layer of TCP/IP maps to the transport layer of OSI Correct(True) [ Network Protocols and TCP/IP] 12. NetBIOS and NetBEUI are nonroutable protocols, because _____________ You answered: they do not do switching Incorrect(Network ID) [ Network Protocols and TCP/IP] 13. The _______ is responsible for the reliable transmission of data from one node to another.. Correct(TCP) [ Network Protocols and TCP/IP] 14. Services and applications use _________ to establish connections with another host. Correct(Ports) [ Network Protocols and TCP/IP] 15. Application protocols work at the upper layer of the OSI reference model and provide _______ between applications

Correct(data exchange) [ Network Protocols and TCP/IP] 16. The application layer of TCP/IP maps to the ____________ layers of OSI. Correct(Application, Presentation and Session) [ Network Protocols and TCP/IP] 17. Routers commonly use ________ to control the flow, or speed, of data between themselves. If the flow of data is too fast for a router, it requests that other routers slow down. You answered: None of these Incorrect(ICMP) [ Network Protocols and TCP/IP] 18. TCP/IP standards are published in a series of documents called ___________ Correct(RFCs) [ Network Protocols and TCP/IP] 19. The _____ is an network management protocol that is installed in every routers. Correct(SNMP) [ Network Protocols and TCP/IP] 20. The _________ tells each router on the network between the source and the destination how long the packet has to remain on the network Correct(TTL) [ Network Protocols and TCP/IP] 21. The network interface layer of TCP/IP maps to ________ layers of OSI Correct(Physical and Data Link Layer) [ Network Protocols and TCP/IP] 22. Protocol _____________ are used to reference the location of a particular application or process on each machine (in the application layer). You answered: IPs Incorrect(port numbers) [ Network Protocols and TCP/IP] 23. The four layers of TCP/IP are the network interface layer, ______ layer, transport layer, and application layer. You answered: network Incorrect(Internet layer) [ Network Protocols and TCP/IP] 24. Protocols are implemented and removed in the same manner as drivers Correct(True)

[ Network Protocols and TCP/IP] 25. The UDP protocol works in the network layer and provides connectionless communication between two computers. Correct(False) [ Network Protocols and TCP/IP] 26. To avoid conflicts or incomplete operations, protocols are _______________ in an orderly manner. Correct(Layered) [ Network Protocols and TCP/IP] 27. A sending computer breaks the data into smaller sections called ______, that the layer 3 protocol can handle. Correct(Packets) [ Network Protocols and TCP/IP] 28. _____________ is a packet-switched protocol that performs addressing and route selection You answered: TCP Incorrect(IP) [ Network Protocols and TCP/IP] 29. APPC (advanced program-to-program communication) is IBM's _____________ protocol Correct(transport) [ Network Protocols and TCP/IP] 30. The TCP protocol provides _______ communication between two computers. You answered: packet switching Incorrect(Connection-oriented) [ Network Protocols and TCP/IP] 31. The _______ protocol determines hardware address (MAC addresses) that correspond to an IP address Correct(ARP) [ Network Protocols and TCP/IP] 32. The Internet layer of TCP/IP maps to the _________ layer of OSI Correct(Network) [ Network Protocols and TCP/IP] 33. A NIC-driver protocol resides in the ______________ sublayer of the OSI reference model Correct(MAC)

[ Network Protocols and TCP/IP] 34. A non-routable protocol can not pass through a router, but can pass through a switch. Correct(True) [ Network Protocols and TCP/IP] 35. The _______________ order indicates where the protocol sits in the protocol stack Correct(binding) [ Network Protocols and TCP/IP] 36. Protocols that support multipath LAN-to-LAN communications are known as _________ protocols. Correct(Routable) [ Network Protocols and TCP/IP] 37. The ______ protocol is an internet e-mail protocol. Correct(SMTP) [ Network Protocols and TCP/IP] 38. The ________ protocol provides flow control and error handling Correct(TCP) [ Network Protocols and TCP/IP] 39. A ___________ is used by TCP for transferring data between hosts. It regulates how much information can be passed over a TCP connection before the receiving host must send an acknowledgement. Correct(Sliding window)

Das könnte Ihnen auch gefallen