0% found this document useful (0 votes)
74 views10 pages

40 - Computer Network Technology R 2010

The document is a 10 page test for a regional computer network technology competition. It contains 50 multiple choice questions about networking topics like protocols, standards, devices, and security. Contestants must hand in the test booklet and follow rules to avoid disqualification.

Uploaded by

Reshma KC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views10 pages

40 - Computer Network Technology R 2010

The document is a 10 page test for a regional computer network technology competition. It contains 50 multiple choice questions about networking topics like protocols, standards, devices, and security. Contestants must hand in the test booklet and follow rules to avoid disqualification.

Uploaded by

Reshma KC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

10 Pages

Contestant Number____________
Time____________
Rank____________

COMPUTER NETWORK
TECHNOLOGY (40)
OPEN EVENT
Regional 2010

TOTAL POINTS

___________ (500)

Failure to adhere to any of the following rules will result in disqualification:


1. Contestant must hand in this test booklet and all printouts. Failure to do so
will result in disqualification.
2. No equipment, supplies, or materials other than those specified for this event
are allowed in the testing area. No previous BPA tests and/or sample tests or
facsimile (handwritten, photocopied, or keyed) are allowed in the testing area.
3. Electronic devices will be monitored according to ACT standards.

Property of Business Professionals of America.


May be reproduced only for use in the Business Professionals of America
Workplace Skills Assessment Program competition.

COMPUTER NETWORK TECHNOLOGY


REGIONAL 2010
PAGE 2 of 10

1. A peer-to-peer network is configured as a star topology with a hub at the center of the star. All of
the workstations are identified in sequence starting as workstation1 until workstation 8. One of the
cables is disconnected between workstation 4 and the hub at the center of the star. What effect will
this have on the network?
A. All workstations will continue to work properly
B. All workstations will cease to be able to communicate on the network until the cable is reconnected.
C. Workstation 4 will not be able to communicate over the network.
D. All workstations from workstation 4 to workstation 8 will cease to communicate on the network.
2. According to the 10BaseT standard, what does the T represent?
A. Time To Live (TTL)
B. Transmission
C. Twisted pair.
D. Terminal
3. Which method of communication is used by Ethernet network systems?
A. Token passing
B. Broadcast
C. Limited-cast
D. Bus communication
4. What does the CA represent in the acronym CSMA/CA?
A. Collective Access
B. Common Access
C. Collision Agent
D. Collision Avoidance

COMPUTER NETWORK TECHNOLOGY


REGIONAL 2010
PAGE 3 of 10

5. Identify the connector type in the graphic exhibit.

A. SC
B. USB
C. RJ-45
D. IEEE 1394
6. What is the main function of a network bridge?
A. To issue IP addresses to workstations.
B. To limit network broadcasts based on MAC address.
C. To provide security in similar fashion as a firewall.
D. To link networks together that use different protocols.
7. How many pins are in a typical RJ-45 connector?
A. 2
B. 4
C. 6
D. 8
8. What is the minimum transmission speed associated with Bluetooth standard?
A. 1 Mbps
B. 10 Mbps
C. 100 Mbps
D. 1000 Mbps

COMPUTER NETWORK TECHNOLOGY


REGIONAL 2010
PAGE 4 of 10

9. What is the maximum broadcast range for an 802.11b standard device?


A. 100 Meters
B. 300 Meters
C. 500 Meters
D. There is no maximum range according to the standard.
10. Which connector type is commonly used to connect a cable modem to a PC?
A. RJ-11
B. USB
C. BNC
D. Serial
11. Which cable type is the most susceptible to radio interference?
A. UTP
B. Coaxial
C. Fiber-optic
D. STP
12. What is the maximum data rate for 1000Base-T?
A. 10 Mbps
B. 100 Mbps
C. 1 Gbps
D. 10 Gbps
13. What type of cable is used for 1000Base-CX?
A. Single mode Fiber-optic
B. Multimode Fiber-optic
C. Twisted Pair Copper
D. RG-58 Coaxial
14. Which standard will support the longest run of network cable?
A. 10BaseT
B. 100BaseFX
C. 100BaseSX
D. 10GBaseER

COMPUTER NETWORK TECHNOLOGY


REGIONAL 2010
PAGE 5 of 10

15. Which wire size is the smallest in diameter?


A. 18
B. 20
C. 22
D. 24
16. Which device is used to terminate a T1 connection?
A. CSU/DSU
B. Cable modem
C. NIC
D. ISDN modem
17. Which device does not limit network broadcasts?
A. Switch
B. Bridge
C. Router
D. Repeater

18. Which layer of the OSI model is responsible for addressing packets or frames using a Mac
address?
A. Physical
B. Data Link
C. Network
D. Session
19. Which layer of the OSI model aligns with a Hub?
A. Physical
B. Data Link
C. Network
D. Presentation
20. How does a network utilizing only NetBEUI protocol identify a workstation?
A. IPv4 address
B. NetBIOS name
C. URL
D. Combination of domain name and IP address.

COMPUTER NETWORK TECHNOLOGY


REGIONAL 2010
PAGE 6 of 10

21. Which type of IP address is configured by default on a Windows XP workstation?


A. Static
B. Dynamic
C. Limited
D. ICS
22. Which port number must be left open to allow users to upload their email to the email server?
A. 20
B. 25
C. 69
D. 119
23. Which service is required for a Windows XP workstation to be able to locate a web site located on
the Internet by using the web site URL?
A. FTP
B. NAT
C. DNS
D. WINS
24. Which is the European equalvalent of a T1 line?
A. J1
B. OCX
C. X.25
D. E1
25. Which protocol is designed to support secure business transactions from an Internet merchant
site?
A. WEP
B. WPA
C. PPP
D. SSL
26. Which security protocol transfers the password in plain ASCII text format?
A. PAP
B. CHAP
C. MS-CHAP
D. Kerberos

COMPUTER NETWORK TECHNOLOGY


REGIONAL 2010
PAGE 7 of 10

27. Which security protocol requires a public and a private key?


A. Kerberos
B. PPTP
C. PPPoE
D. CHAP
28. Which service should be started on a Linux server to support file transfers to a Windows XP
workstation?
A. WINS
B. Samba
C. IPSec
D. SSL
29. What is the purpose of the TCP protocol?
A. To encapsulate data and carry the destination and source IP address in the header.
B. To resolve the destination IP address to the corresponding MAC address.
C. To encapsulate data and identify the destination and source service by port number.
D. To only encapsulate network commands and locate destinations based on MAC address.
30. Which operating system closely matches Apple OS X server system?
A. Windows Server 2003
B. Linux Server
C. DOS 6.1
D. NetWare 4.0
31. Which statement below is true?
A. Both Windows and Linux files used case sensitive file names.
B. Only Windows uses case sensitive file names.
C. Only Linux uses case sensitive file names.
D. Neither Windows not Linux use case sensitive file names.

32. Which clients can access shares on a UNIX server?


A. Windows XP
B. Windows XP and Apple/MAC
C. Windows XP and Linux
D. Windows XP, Apple/MAC and Linux

COMPUTER NETWORK TECHNOLOGY


REGIONAL 2010
PAGE 8 of 10

33. Which file system is typically used by Linux servers to support file transfer
and sharing to clients?
A. NFS
B. NTFS
C. FAT16
D. FAT32
34. Which protocol is used to support file access and file transfers
between A Windows server and a Windows client?
A. NTF
B. FPT
C. SMB
D. SSL
35. Which system would provide the fastest recovery of a failed single RAID
drive installed in a server?
A. Hot swap drive.
B. Cold spare.
C. Hot spare.
D. Flash drive.
36. Which backup procedure requires the least amount of time each day?
A. Incremental
B. Differential
C. Full Backup
D. Full Tape backup
37. What is a group of servers designed to share network demand called?
A. Server Pod
B. Server School
C. Server Cluster
D. Server Zone
38. Which item do antivirus software suites provide the least protection form?
A. Known email viruses
B. Viruses released over a year or more in the past.
C. New malware infections.
D. Known Trojan horse

COMPUTER NETWORK TECHNOLOGY


REGIONAL 2010
PAGE 9 of 10

39. Which technology provides the most secure connection between two
devices on different networks?
A. VLAN
B. PPP
C. FTP
D. TFTP
40. What is required for a Windows XP client to access a UNIX server share?
A. A user name
B. A user name and password
C. A user name, password, and permission.
D. A user name, password, permission and CHAP.
41. Which does the acronym UPS represent?
A. United Protocol Support
B. Universal Power Service
C. UNIX Protocol Service
D. Uninterruptible Power Supply
42. Which protocol does MAC OS X use to communicate over the Internet?
A. TCP/IP
B. IPX/SPX
C. X.25
D. RADIUS
43. Which would be the most appropriate to limit access of specific files and
directories on a local network and not permit local users to access
websites outside the local area network?
A. Internet
B. Intranet
C. Extranet
D. Privatenet
44. Which network device is typically used to store frequency accessed web
sites?
A. Proxy server.
B. Gateway
C. Firewall
D. Primary Domain Controller

COMPUTER NETWORK TECHNOLOGY


REGIONAL 2010
PAGE 10 of 10

45. Which tool is used to make individual conductor connections of UTP on


the backside of a network crossbar?
A. BNC crimper
B. Punch down tool
C. RJ-56 Compression tool
D. RJ Hammer Link
46. What does the acronym CIFS represent?
A. Central Integrated Filing System
B. Common Internet File System
C. Control Instruction Format System
D. Common Instructional Format System
47. Which protocol can be used to access a printer service on a Novell
NetWare 6.x or later from a Windows XP client?
A. HTTP
B. CIFS
C. Both HTTP and CIFS
D. Only CIFS
48. Which port would you block on a firewall to prevent network clients from
accessing POP3 email?
A. 53
B. 80
C. 110
D. 443
49. Which form of electrical power protection is provided by a UPS?
A. Protection from electrical surges.
B. Protection from temporary brownouts.
C. Protection from complete blackouts.
D. All the above.
50. Which feature is provided by a proxy server?
A. A proxy server blocks all web page requests.
B. A proxy server hides workstations on the local network from the Internet.
C. A proxy server encrypts all data leaving the local area network.
D. A proxy server provides higher data transmission rates by compressing all
encapsulated data leaving the local area network.

You might also like