0% found this document useful (0 votes)
12 views7 pages

Reviewer in CSS 12 Q2

Uploaded by

ashiyalumbre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views7 pages

Reviewer in CSS 12 Q2

Uploaded by

ashiyalumbre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Republic of the Philippines

Department of Education
Region VIII (Eastern Visayas)
Division of Leyte
STA. ANA NATIONAL HIGH SCHOOL
Sta. Ana, La Paz, Leyte 6508

Computer Systems Servicing 12


(Berners_Lee)

Multiple Choice Test:

Directions: Read and understand the statement carefully. Choose the letter of the correct
answer. Write your answer in a ½ sheet of paper lengthwise.

1. A managed switch can prioritize LAN traffic by allowing greater user control to determine
priorities for critical traffic, whereas an Unmanaged Switch has default settings not
configured for any specific network.
a. VLANS c. QoS
b. Redundancy d. Port Mirroring
2. This feature is useful for troubleshooting as it duplicates the traffic on one port and
transfers it to another port 9 on the same switch) to be analyzed while the network
remains in production.
a. VLANS c. QoS
b. Redundancy d. Port Mirroring
3. Facilitates the sharing of resources by connecting all the devices, including computer,
printers, and servers, in a small business network.
a. Router c. Wireless Access Point
b. Switch d. None of the above
4. Alternate routes for data safeguards a network from complete breakdown.
a. VLANS c. QoS
b. Redundancy d. Port Mirroring
5. This isolates traffic to avoid unnecessary and potential traffic jams.
a. VLANS c. QoS
b. Redundancy d. Port Mirroring
6. The following are common types of access point configurations, EXCEPT.
a. Load Balancing Configurations c. Root Access Point
b. Repeater Access Point d. Bridges
7. A networking device that connects to various local area networks and wide area networks
on the Internet.
a. Router c. Wireless Access Point
b. Switch d. None of the above
8. A networking device that allows wireless-capable devices to connect to a wired network.
a. Router c. Wireless Access Points
b. Switch d. Bridges
9. Allow connected network devices to communicate with each other, and also gives the
network administrator greater control over managing and prioritizing LAN traffic.
a. Unmanaged Switch c. Wireless Access Point
b. Router d. Managed Switch
10. It is a plug-and -play device that does not require or allow any user intervention, setup or
configuration to be usable.
a. Unmanaged Switch c. Wireless Access Point
b. Router d. Managed Switch
11. These are the common threats when linking your computer to a network or the internet,
except.

Prepared by: MARICEL C. ADONIS


Teacher
a. Hacking c. Identity theft
b. Cloud storage d. Online Fraud
12. The most basic form of protection and is meant for smaller networks.
a. Stateful multi-layer inspection (SMLI) firewalls.
b. Packet filtering firewalls.
c. Next-generation firewall (NGFW)
d. Network address translation (NAT) firewalls.
13. More sophisticated than packet-filtering and stateful inspection firewalls.
a. Stateful multi-layer inspection (SMLI) firewalls.
b. Packet-filtering firewalls.
c. Next-generation firewalls (NGFW).
d. Network address translation (NAT) firewalls.
14. This involves using data from prior connections and packets from the same connections.
a. Stateful multi-layer inspection (SMLI) firewalls.
b. Packet-filtering firewalls.
c. Next-generation firewalls (NGFW)
d. Network address translation (NAT) firewalls.
15. The risk that attackers could shut down your network if without a firewall.
a. Open Access c. Network Crashes
b. Lost or compromised data d. None
16. The risk that you’re accepting every connection into your network from anyone if without
a firewall.
a. Open Access c. Network crashes
b. Lost or compromised data d. None
17. This is the firewall that keeps track of the state of network connections travelling through
the firewall.
a. Stateful packet inspection c. Packet filter
b. Proxy Firewall d. None
18. This is a set of rules that allows or denies traffic based on criteria such as IP addresses,
protocols, or ports used.
a. Stateful packet inspection c. Packet filter
b. Proxy firewall d. None
19. Multiple computers can be protected in this type of firewall.
a. Proxy Firewall c. Software firewall
b. Hardware firewall d. Windows defender firewall
20. Refers to connections coming -in to a specific device (host/ server) from a remote location.
a. Open Access c. Outbound connections
b. Packet filter d. Inbound Connections.
21. What is the primary purpose of a firewall in a computer network?
a. To increase internet speed. c. To block unauthorized access.
b. To monitor network traffic. d. To store data back-ups

22. Which of the following is a strong password?


a. Password123 c. Qw3rty!@#
b. 12345678 d. abcdefg
23. What does VPN standard for?
a. Virtual Private Network c. Verified Public Network
b. Very Protected Network d. Variable Protocol Network
24. What is Pishing?
a. A method of data encryption. c. A type of malware.
b. An attempt to acquire sensitive d. A protocol for secure data transfer
Information masquerading a trust-
worthy entity.
25. Which of the following best describes ‘two- factor authentication?
a. Using two different passwords. c. A method of encrypting files.

Prepared by: MARICEL C. ADONIS


Teacher
b. A system requires two forms of d. A way to increase internet speed.
identification before granting access.
26. What is the correct sequence in opening command line or DOS interface so that you can
run a network connectivity testing tool?
a. Press Ctrl key + R, type CMD then press enter key
b. Press Windows key + E, type CMD then press enter key
c. Press Windows key + R, type CALC then press enter key
d. Press Windows Key + R, type CMD then press enter key
27. The correct syntax for ping tool command is _________.
a. c:\>ping google
b. c:\>ping yahoo
c. c:\>ping 10.10.10.2
d. c:\>none of the above
28. Testing that determines where client devices are able to satisfy coverage requirements is
__________.
a. In-motion testing c. Simulation Testing
b. Signal Coverage Testing d. Pilot Testing
29. It is strongly advisable to install the system in a limited number of facilities and make
that one work effectively first.
a. In-motion testing c. Simulation Testing
b. Signal Coverage Testing d. Pilot Testing
30. Determines whether users can continue to make use of applications while moving
throughout the coverage areas.
a. In-motion testing c. Simulation Testing
b. Signal Coverage Testing d. Pilot Testing
31. This can provide helpful feedback when designing the system, especially if the WLAN
will have critical performance requirements
a. In-motion testing c. Simulation Testing
b. Signal Coverage Testing d. Pilot Testing
32. Which part of system tools allows you to check the connections of your network
components.
a. Factory Defaults c. Diagnostic
b. Back-up and Restore d. Firmware upgrade
33. Which type of WAN Connection that requires a username and password?
a. Dynamic IP c. Static IP
b. PPPoE d. L2TP
34. The diagnostic tool which troubleshoots connectivity, reachability and name resolution
to a given host or gateway by using the Internet Control Message Protocol (ICMP)
protocol's mandatory Echo Request datagram to elicit an ICMP Echo Response from a
host or gateway.
a. Traceroute c. ipconfig
b. NSLookup d. ping
35. An address code that determines the size of the network.
a. Subnet Mask c. MAC Address
b. IP Address d. None of the above.
36. This is the process of setting a network controls, flow and operation to support the
network communication of an organization and network owner.
a. Network configurations c. Network Interface Card
b. MAC d. LAN
37. What type of connection that network interface card controls?
a. Wireless connections only c. wired connections only
b. Both wired and wireless connections d. Ethernet connections only
38. NIC is installed in a computer so that it can be disconnected to network.
a. True b. False
39. All of them are the roles of network interface card, EXCEPT. . .
a. To prepare data from the computer for the network cable
b. Control the flow of data between the computer and the cabling system.

Prepared by: MARICEL C. ADONIS


Teacher
c. Send the data to another computer
d. Provides the computer with a dedicated full-time connection to a computer.
40. Which statement is FALSE about wireless networks?
a. Wireless networks are convenient.
b. Wireless networks are slower than wired LAN.
c. Wireless networks use radio transmitter.
d. Wireless networks are faster than wired networks.
41. A network administrator needs to set up a high-performance network for a gaming
server. They want to ensure minimal latency and maximum throughput. Which type of NIC
would be the most suitable choice, and why?
a) 10/100/1000 Mbps NIC
b) Gigabit NIC
c) 10 Gigabit NIC (Analyzing)
d) Virtual NIC
42. A company is migrating its network from a traditional wired infrastructure to a wireless
one. What are the key considerations for choosing the right type of wireless NIC for their
laptops and mobile devices?
a) Wireless standards (e.g., 802.11ac, 802.11ax)
b) Data transfer rates
c) Security features (e.g., WPA2, WPA3)
d) All of the above (evaluating)
43. A home user is setting up a small network with a router and two computers. They want
to ensure that one computer has priority access to the network for online gaming, while the
other computer is used for general browsing. Which NIC setting would be most helpful for
this scenario?
a) MAC address filtering
b) IP address reservation
c) Quality of Service (QoS) (Applying)
d) Network driver configuration
44. A network administrator is configuring a new server with multiple NICs. They want to
ensure that the server can communicate with different networks simultaneously. What NIC
configuration setting would be most helpful for this scenario?
a) Network bonding (Applying)
b) VLAN tagging
c) IP address aliasing
d) Network driver configuration
45. A company is implementing a new security awareness training program for its
employees. What are some key elements that should be included in the training program?
a) Phishing and social engineering awareness
b) Password security best practices
c) Safe browsing and online activity guidelines
d) All of the above (Creating)
46. A user is receiving suspicious emails that appear to be from legitimate sources. What
are some warning signs that could indicate a phishing attack?
a) Grammar and spelling errors
b) Suspicious links or attachments
c) Requests for personal information
d) All of the above (Analyzing)
47. You're at a coffee shop, working on a project that requires access to sensitive data. You
need to use the free Wi-Fi, but you're worried about security. What's your secret weapon for
staying safe while browsing on public networks?
a) Use a VPN
b) Avoid accessing sensitive websites
c) Enable strong authentication on your device
d) All of the above (Analyzing)
48. You're setting up a repeater in a building with a lot of wireless devices. What's the most
important consideration for choosing the right wireless channel for the repeater?

Prepared by: MARICEL C. ADONIS


Teacher
a) Minimizing interference from other wireless networks. (Analyzing)
b) Maximizing the repeater's signal strength.
c) Ensuring compatibility with the router's channel.
d) Using a channel that's not commonly used by other devices.
49. You're configuring a repeater for a home network. You want to ensure that the repeater
only amplifies traffic from devices that are authorized to access the network. What security
setting should you prioritize for this scenario?
a) WPA2/WPA3 encryption (Applying)
b) MAC address filtering
c) Access control lists (ACLs)
d) Firewall configuration
50. You're setting up a repeater in a building with a lot of metal objects. What's the most
likely effect of these objects on the repeater's signal strength?
a) The signal will be amplified.
b) The signal will be weakened. (Understanding)
c) The signal will be distorted.
d) The signal will be blocked completely.
51. You're setting up a repeater in a large warehouse with multiple access points. What's
the best approach to ensure that the repeater seamlessly integrates with the existing
network?
a) Using a different SSID for the repeater.
b) Configuring the repeater to use the same SSID as the main access points.
(Applying)
c) Using a different wireless channel for the repeater.
d) Disabling the repeater's security settings.
52. You're configuring a repeater to extend the range of a wireless network in a busy coffee
shop. What's the most important consideration for choosing the right wireless channel for
the repeater?
a) Minimizing interference from other wireless networks. (Analyzing)
b) Maximizing the repeater's signal strength.
c) Ensuring compatibility with the router's channel.
d) Using a channel that's not commonly used by other devices.
53. You're configuring a repeater for a small office network. You want to ensure that the
repeater only amplifies traffic from authorized devices. What security setting should you
prioritize for this scenario?
a) MAC address filtering (Applying)
b) WPA2/WPA3 encryption
c) Access control lists (ACLs)
d) Firewall configuration
54. You're configuring a firewall for a company that allows employees to work remotely. You
need to ensure that remote users can access the company's network securely. What firewall
feature should you prioritize for this scenario?
a) VPN access for remote users. (Applying)
b) Network segmentation.
c) Intrusion detection system (IDS).
d) IP address filtering.
55. You're the IT manager for a research institution that collaborates with researchers from
various countries. You need to ensure that sensitive research data is shared securely with
collaborators while complying with international data privacy regulations. What are the key
considerations for configuring a firewall to facilitate secure data sharing?
a) Implement a robust access control system that allows authorized collaborators to access
specific data sets.
b) Use encryption to protect data both at rest and in transit, ensuring compliance with
international data privacy regulations.
c) Implement a system for monitoring and auditing data access to track activity and identify
potential breaches.
d. All of the above (Creating)

Prepared by: MARICEL C. ADONIS


Teacher
56. You're troubleshooting a network connectivity issue where employees can't access a
specific web application. You suspect a firewall rule is blocking the traffic. Which of the
following steps is MOST likely to help you identify the problematic rule?
a) Temporarily disabling the firewall
b) Checking the firewall logs for blocked traffic
c) Contacting the application vendor for troubleshooting assistance
d) Reviewing the firewall's configuration for rules that match the application's port or
domain. (Analyzing)
57. You're experiencing a surge in network traffic that's slowing down performance. You
suspect a denial-of-service (DoS) attack. Which of the following firewall features can help
mitigate this type of attack?
a) Intrusion detection system (IDS)
b) Rate limiting (Remembering)
c) Network segmentation
d) VPN access for remote users
58. You're configuring a firewall for a company that has multiple offices located in different
geographic regions. You want to ensure that traffic between these offices is prioritized and
secure. Which of the following firewall features is MOST helpful for this scenario?
a) Intrusion prevention system (IPS)
b) Quality of Service (QoS) settings (Analyzing)
c) Network segmentation
d) VPN access for remote users
59.You're troubleshooting a network security issue where unauthorized users are accessing
sensitive data. You suspect a firewall configuration error. Which of the following steps is
MOST likely to help you identify the problematic rule?
a) Temporarily disabling the firewall
b) Contacting the security vendor for troubleshooting assistance
c) Checking the firewall's configuration for rules that allow access to sensitive data
(Analyzing)
d) Reviewing the firewall logs for suspicious activity
60. You're configuring a firewall for a company that has a web server hosting a public
website. You need to ensure that only authorized users can access the web server's
administrative interface. Which of the following firewall features is MOST effective for this
purpose?
a) Network segmentation for the web server
b) Intrusion prevention system (IPS) for the web server
c) IP address filtering for the web server's administrative interface (Remembering)
d) Two-factor authentication for the web server's administrative interface

_____________________________
Name & Signature of Parent:

Prepared by: MARICEL C. ADONIS


Teacher
Prepared by: MARICEL C. ADONIS
Teacher

You might also like