Module 7 Computer Networking
Module 7 Computer Networking
Centralized administration
Each host responsible for securing resources
Policies can control client settings on workstations
Contains a central database which has information on all network resources
2) Which of following is the protocol of choice on the Internet and with most all of today's network
operating systems?
TCP/
NetBEUI
IPX/SPX
OSI/RM
3) Which of the following network topologies is the most resistant to the failure of a single host or
communication channel?
Mesh
Star-bus
Star
Star-ring
4) Which of the following layers in the OSI / RM is responsible for the routing of packets from source to
destination?
Transport
Network
Application
Data Link
5) Which of the following layers would contain a protocol such as HTTP which is used to traverse the
World Wide Web?
Transport
Session
Application
Presentation
6) A network cabling method which uses unshielded very pliable copper to deploy computer networks is
a good description for which of the following cable types?
Fiber
STP
UTP
Coaxial
7) Which of the following wireless standards has the potential to become a major standard for providing
Internet access at high speeds wirelessly for rural areas with a signal that continues for up to 30 miles?
802.11a
802.16
802.3
802.11n
8) Which of the following fiber connectors has a ferrule connector that is used to connect the fibers
using of push/pull motion for connection?
SC
ST
LC
MT-RJ
9) Which of the following connectors is used for today's Ethernet networks?
RJ-11
RJ-45
RJ-8
RJ-25
10) Which of the following address types if generally added by the manufacturer of a network card?
MAC
IP
IPX
PHY
11) Which of the following wireless protocols suffers from fewer interference problems and can be used
when required to provide up to 54Mbps transfer rates?
802.11b
802.11a
802.11g
802.11n
12) Which of the following devices is used in infrastructure WLANs to connect wireless clients to the
wired network devices and connections?
SSID
WPA
WAP
WEP
13) Which of the following wireless technologies provides slow transfer over short distances and is
primarily used for mobile device connectivity?
802.11
WIMAX
802.11a
Bluetooth
14) Which of the following wireless network protocols is the newest standard providing 200+ Mbps
transfer rates over radio frequencies operating on the 2.4GHz band?
802.11g
802.11a
802.11n
802.16
15) Which of the following TCP/IP Layers offers the same services using the protocols TCP and UDP that
are specified in the Transport layer of the OSI/RM?
Application
Internet
Transport
Network Interface
16) Which of the following core protocols in TCP/IP is responsible for addressing and routing of data?
TCP
UDP
ICMP
IP
17) You need to configure a rule on the network firewall, what port should you define in the rule to allow
RDP traffic to network servers?
3389
53
80
443
18) What is the network ID for an address 192.168.10.220/24?
192.168.10.0
192.168.0.0
192.168.10.200
192.0.0.0
19) You need to create the appropriate DNS entry for your SMTP E-mail server. Which type of resource
record should you create?
A
PTR
SRV
MX
20) Which of the following addresses usually indicates that a DHCP server has not responded in a timely
fashion and the host has automatically generated an address for use?
169.254.65.233
192.168.1.100
172.16.31.157
10.2.45.254
21) Which of the following troubleshooting utilities will send ICMP Echo Request messages to a
destination computer in order to test general network connectivity?
PING
TRACERT
NSLOOKUP
IPCONFIG
22) Which of the following commands will show all active listening TCP/IP connections?
Ipconfig /all
Net view
Netstat -a
Tracert
23) You have a host computer that has automatically generated an address and you would like to force
the client to attempt to contact a DHCP server?
Ipconfig /all
Ipconfig /registerdns
Ipconfig/flushdns
Ipconfig /renew
24) Which layer provides hardware addressing capabilities and is used to package frames for delivery
over the wire?
Network interface
Internet
Transport
Application
25) Which of the following is also known as a multi-port repeater?
Switch
Switching hub
Hub
Router
26) Which of the following networking devices provides significant advantages over standard Ethernet
hubs because of the isolation of collision domains?
Router
Switch
Bridge
Repeater
27) You need to implement a device that is capable of monitoring and restricting Internet access in
addition to increasing performance for commonly downloaded files?
NAT
Firewall
Proxy server
Gateway
28) Which of the following network devices requires a unique identification for each interface and
representative network segment?
Router
Layer 3 switch
Bridge
Firewall
29) Which of the following provides the best description for a wide area network or (WAN)?
Computers, servers, and other devices connected using local connectivity devices in the same
geographical area
Multiple local area networks connected to one another using private networking technologies
Multiple local area networks connected to one another often utilizing public carriers such as leased
data lines
All the computers and servers that are available on the Internet
30) Which of the following connectivity methods is often used for small business and homes in order to
connect to a public carrier but could also be used as a backup connection for larger companies providing
a dedicated and guaranteed amount of bandwidth?
Cable
DSL
PSTN
ISDN
31) Which of the following is considered a private IP address?
192.168.1.100
171.16.32.250
110.100.100.255
11.0.0.1
32) Which network model is identified as not requiring dedicated servers and where resources are
shared on each individual computer?
Hierarchal
Centralized
Workgroup
Domain
33) Which of the following would not be considered a requirement in order to connect to a computer
network?
NIC
Network client
Network server
Network protocol
34) What is the name of the component associated with network interface cards that is used to transmit
and receive over the network?
half-duplex
full-duplex
modem
transceiver
35) Which of the following topologies is the only one to not suffer from a single point of failure?
Mesh
Star
Ring
Hybrid
36) Which of the following network classifications would predominantly use Bluetooth and wireless
technologies?
MAN
CAN
PAN
LAN
37) Which of the following devices is primarily responsible for controlling traffic that flows from one
network to another?
Switch
Router
Vlad
Firewall
38) Which protocol is used in voice over IP to set up communication sessions between a sending and
receiving system?
RTP
SIP
SNMP
SMTP
39) Which of the following is the standard used for wiring twisted-pair cables?
T568A
IEEE 1284
802.1X
IEEE 802.3
40) Which of the following network tools is used to attach the RJ-45 connector to unshielded twisted
pair cabling?
Punchdown tool
cable tester
toner probe
crimper
41) You need to configure a home router to allow remote desktop traffic into an internal computer.
Which of the following port should you open?
3389
25
443
80
42) You've been asked to configure a port on your network firewall to allow email traffic inbound to your
messaging server. Which of the following should you open?
21
22
23
25
43) Which of the following protocols is a retrieve only email protocol?
SMTP
POP3
HTTP
FTP
44) Given the following IP address configuration: 221.90.17.141/19 what is the network ID?
221.90.0.0
221.0.0.0
221.90.17.0
221.90.32.0
45) Given the following IP address configuration: 10.255.255.240/23 what is the subnet mask?
255.255.255.0
255.255.252.0
255.255.254.0
255.255.255.128
46) What is the class of the following IP address? 126.12.255.254
A
B
C
D
47) Which protocol in TCP/IP is responsible for error free connection oriented delivery between two
systems?
TCP
ICMP
IGMP
IP
48) Which protocol in TCP/IP is responsible for ensuring that packets are routed to the correct local
address using an address associated with the network card?
ARP
IP
ICMP
IGMP
49) Which protocol is utilized in Windows networks commonly associated with the directory service for
querying information about users and computers on the network?
LDAP
Kerberos
SMB
NetBIOS
50) Which protocol provide single sign-on capabilities in a Windows domain environment?
Kerberos
SMB
NetBIOS
SSL
51) You need to ensure that DHCP related traffic is allowed between clients and the DHCP server. Which
port should you open up on the firewall?
25
67
53
80
52) Which of the following protocols is used by both the PING and the TRACERT command line utilities?
IGMP
ICMP
IP
TCP
53) Which Wi-Fi standard operates in the 2.4 GHz frequency range and is capable of sending data up to
54 Mb per second?
802.11b
802.11a
802.11n
802.11g
54) Which of the following is not backwards compatible with 802.11b?
802.11a
802.11g
802.11n
802.11ac
55) Which part of the DHCP process is used by the server to send that the client a potential address to
use for configuration?
Discover
Offer
Request
Acknowledge
56) Which of the following is not a benefit of IPv6 in comparison with IPv4?
Prioritized delivery
Enhanced security
No need for automatic configuration
Larger address space
57) Which of the following is the correct length of the IPv6 address?
32
48
64
128
58) Which of the following is not a valid IPv4 address for configuring a client computer?
237.245.110.1
10.1.4.234
192.168.1.250
172.16.255.254
59) Which of the following is not a valid IPv6 address?
2601:FE64:FE80::F800
2601::FE64::01:0111
2601::1
2601:F64:1::15FF:33EE:EA:BC
60) Which IPv6 address type is the equivalent to a public IPv4 address?
Global unicast
Site local
Local unicast
Anycast
61) Which Wi-Fi mode are you utilizing if you connect two computers directly using Wi-Fi technologies?
Ad-hoc
Infrastructure
Point-to-point
Mesh
62) Which of the following wireless security configurations can ensure that only authorized computers
are able to connect?
MAC Filtering
Auto channel select
Port forwarding
DMZ configuration
63) Which of the following wireless security configurations can be used to ensure that users must know
the name of your network in order to be able to connect to?
max filtering
auto channel select
disable SS ID broadcast
enable WPA encryption
64) Which of the following is a distributed hierarchical system of servers that are used to resolve names
to numerical IP addresses?
NetBIOS
DNS
DHCP
SMB
65) What port does DNS listen on in order to resolve names to IP addresses?
67
80
3389
53
66) What type of fiber-optic network is capable of sending data the farthest without the need of a
repeater?
Single mode
Multi-mode
Fibre channel
None of the above
67) What type of cabling is required in order to implement Gigabit Ethernet? (Choose Two)
Cat3
Cat5
Cat5E
Cat6
68) Hubs generally provide connectivity in older Ethernet networks and could have which of the
following connector types available? (Choose all that apply)
Coaxial
RJ-45
Token Ring
RJ-11
69) What is the host ID for address 172.19.4.72 with a subnet mask of 255.255.224.0(Choose two)
.72
4.72
172.19.0.0
172.19.4.0
70) Which numbering system is based on the number 16?
decimal
octal
hexadecimal
binary
71) Which category of Ethernet UTP cabling is required in order to achieve the speeds of Gigabit
Ethernet? (Choose all that Apply)
Cat3
Cat5
Cat5e
Cat6