40 - Computer Network Technology R 2010
40 - Computer Network Technology R 2010
Contestant Number____________
Time____________
Rank____________
COMPUTER NETWORK
TECHNOLOGY (40)
OPEN EVENT
Regional 2010
TOTAL POINTS
___________ (500)
1. A peer-to-peer network is configured as a star topology with a hub at the center of the star. All of
the workstations are identified in sequence starting as workstation1 until workstation 8. One of the
cables is disconnected between workstation 4 and the hub at the center of the star. What effect will
this have on the network?
A. All workstations will continue to work properly
B. All workstations will cease to be able to communicate on the network until the cable is reconnected.
C. Workstation 4 will not be able to communicate over the network.
D. All workstations from workstation 4 to workstation 8 will cease to communicate on the network.
2. According to the 10BaseT standard, what does the T represent?
A. Time To Live (TTL)
B. Transmission
C. Twisted pair.
D. Terminal
3. Which method of communication is used by Ethernet network systems?
A. Token passing
B. Broadcast
C. Limited-cast
D. Bus communication
4. What does the CA represent in the acronym CSMA/CA?
A. Collective Access
B. Common Access
C. Collision Agent
D. Collision Avoidance
A. SC
B. USB
C. RJ-45
D. IEEE 1394
6. What is the main function of a network bridge?
A. To issue IP addresses to workstations.
B. To limit network broadcasts based on MAC address.
C. To provide security in similar fashion as a firewall.
D. To link networks together that use different protocols.
7. How many pins are in a typical RJ-45 connector?
A. 2
B. 4
C. 6
D. 8
8. What is the minimum transmission speed associated with Bluetooth standard?
A. 1 Mbps
B. 10 Mbps
C. 100 Mbps
D. 1000 Mbps
18. Which layer of the OSI model is responsible for addressing packets or frames using a Mac
address?
A. Physical
B. Data Link
C. Network
D. Session
19. Which layer of the OSI model aligns with a Hub?
A. Physical
B. Data Link
C. Network
D. Presentation
20. How does a network utilizing only NetBEUI protocol identify a workstation?
A. IPv4 address
B. NetBIOS name
C. URL
D. Combination of domain name and IP address.
33. Which file system is typically used by Linux servers to support file transfer
and sharing to clients?
A. NFS
B. NTFS
C. FAT16
D. FAT32
34. Which protocol is used to support file access and file transfers
between A Windows server and a Windows client?
A. NTF
B. FPT
C. SMB
D. SSL
35. Which system would provide the fastest recovery of a failed single RAID
drive installed in a server?
A. Hot swap drive.
B. Cold spare.
C. Hot spare.
D. Flash drive.
36. Which backup procedure requires the least amount of time each day?
A. Incremental
B. Differential
C. Full Backup
D. Full Tape backup
37. What is a group of servers designed to share network demand called?
A. Server Pod
B. Server School
C. Server Cluster
D. Server Zone
38. Which item do antivirus software suites provide the least protection form?
A. Known email viruses
B. Viruses released over a year or more in the past.
C. New malware infections.
D. Known Trojan horse
39. Which technology provides the most secure connection between two
devices on different networks?
A. VLAN
B. PPP
C. FTP
D. TFTP
40. What is required for a Windows XP client to access a UNIX server share?
A. A user name
B. A user name and password
C. A user name, password, and permission.
D. A user name, password, permission and CHAP.
41. Which does the acronym UPS represent?
A. United Protocol Support
B. Universal Power Service
C. UNIX Protocol Service
D. Uninterruptible Power Supply
42. Which protocol does MAC OS X use to communicate over the Internet?
A. TCP/IP
B. IPX/SPX
C. X.25
D. RADIUS
43. Which would be the most appropriate to limit access of specific files and
directories on a local network and not permit local users to access
websites outside the local area network?
A. Internet
B. Intranet
C. Extranet
D. Privatenet
44. Which network device is typically used to store frequency accessed web
sites?
A. Proxy server.
B. Gateway
C. Firewall
D. Primary Domain Controller