Networking Fundamentals Practice Exam - 720 Verified Questions

Page 1


Networking Fundamentals Practice Exam

Course Introduction

Networking Fundamentals introduces students to the basic concepts and principles underlying computer networks. The course covers topics such as network topologies, protocols, and standards, as well as the OSI and TCP/IP models. Students will explore the function of routers, switches, and other networking devices, and learn about IP addressing, subnetting, and network security fundamentals. Practical exercises and real-world scenarios help reinforce theoretical knowledge, preparing students for further studies in networking and IT support.

Recommended Textbook Computer Networking from LANs to WANs Hardware Software and Security 1st Edition by Jr. Kenneth

Available Study Resources on Quizplus

24 Chapters

720 Verified Questions

720 Flashcards

Source URL: https://quizplus.com/study-set/1764 Page 2

Chapter 1: What Is a Computer Network

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35121

Sample Questions

Q1) The _____ Layer is responsible for routing protocol-specific packets to their proper destination using logical IP addressing.

A)Network

B)Data-Link

C)Transport

D)Session

Answer: A

Q2) Token-ring frames are similar to Ethernet frames in that both contain ____ addresses.

A)source and destination

B)source and origin

C)origin and interface

D)source and network

Answer: A

Q3) The high collision rate of an Ethernet system with a lot of communication taking place is eliminated in a token-ring network.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Network Topology

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35122

Sample Questions

Q1) A(n)____________________ network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network.

Answer: private

Q2) Logical connections between the nodes of the VPN

A)Tunnels

B)Topology

C)Logical topology

D)NAPs

E)Cloud

Answer: A

Q3) A ____ is a portion of a network.

A)subnet

B)subunit

C)slice

D)subdivision

Answer: A

Q4) ____________________ is a logical,not physical,activity and is accomplished using a special subnet mask,such as 255.255.255.192.

Answer: Subnetting

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Networking Hardware

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35123

Sample Questions

Q1) ____________________ maintain routing tables in their memories to store information about the physical connections on the network.

Answer: Routers

Q2) A valuable tool to have at your disposal when preparing or checking cables is a cable ____________________.

Answer: tester

Q3) A ____ is a special-purpose device designed to interconnect networks.

A)switch

B)router

C)hub

D)bridge

Answer: B

Q4) ____ cable relies on pulses of light to carry information.

A)Copper

B)Light

C)Fiber network

D)Fiber optic

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Ethernet Technology

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35124

Sample Questions

Q1) The AUI (attachment unit interface)may be a transceiver cable up to ____ meters in length.

A)25

B)50

C)75

D)100

Q2) Every Ethernet device manufactured (NIC,router)contains a unique ____-bit MAC address assigned by the manufacturer.

A)24

B)32

C)48

D)64

Q3) The maximum frame size allowed on the network.

A)Jabber

B)Jam sequence

C)Runt

D)MTU

E)Collision domain

Q4) List three properties that 10base5,10base2 and 10baseT have in common.

Q5) Describe CSMA/CA.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Token-Ring, fddi, and Other LAN Technologies

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35125

Sample Questions

Q1) In a token-ring network,data are transmitted using a ____.

A)Differential Equation Encoded Signal

B)Differential Manchester Encoded Signal

C)Differential Turing Encoded Signal

D)Differential Manheim Encoded Signal

Q2) A low-cost baseband network developed by the Datapoint Corporation in the late 1970s

A)ARCnet

B)Token

C)Bluetooth

D)Scatternet

E)FDDI-II

Q3) All aspects of Bluetooth are controlled by the ____,which issues specifications and licenses for Bluetooth technology.

A)Bluetooth Special Consortium

B)Bluetooth Advocacy Forum

C)Bluetooth Internet Forum

D)Bluetooth Special Interest Group

Q4) The ____________________ bits are used to reserve the next token at a specific priority.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Network Design and Troubleshooting Scenarios

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35126

Sample Questions

Q1) The ____________________ utility is used to display TCP/IP address information on a Linux/UNIX computer system.

Q2) Left-clicking the ____ tab in the Direct Cable Connection allows you to switch between Guest mode and Host mode.

A)Change

B)Properties

C)Alter

D)Interface

Q3) Discuss the names that Microsoft has used for the local network with different versions of Windows.

Q4) Discuss baseband versus broadband.

Q5) Use a ____ to get the fastest data transfer speed between two direct connected computers running Windows 9x.

A)serial cable

B)Firewire cable

C)parallel cable

D)USB cable

Q6) Discuss how to use test equipment to detect hardware problems.

Q7) List three ways to connect just two computers.

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Low-Level Protocols

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35127

Sample Questions

Q1) A protocol cannot use an adapter until it is ____ to it.

A)attached

B)bound

C)defined

D)profiled

Q2) ____________________ names are the NetBIOS names that identify each machine on a Windows network.

Q3) A special dynamic database called ____ maps NetBIOS names to IP addresses when larger networks are needed.

A)WINS

B)DNS

C)WIND

D)NDS

Q4) Data communication that takes place one bit at a time over a single communication line

A)SLIP

B)Parity

C)Baud

D)NetBEUI

E)Serial

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: The Tcpip Protocols

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35128

Sample Questions

Q1) The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.

A)True

B)False

Q2) The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.

A)ARP

B)DNS

C)SNMP

D)SMTP

Q3) The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.

A)True

B)False

Q4) Describe SMTP.

Q5) Describe protocol analyzers.

Q6) Each piece of an IP datagram is routed on the network using a(n)____________________.

Q7) What happens when a hardware frame is sent out to a network?

Q8) Discuss the functionality of PING.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Ipxspx, Appletalk, and Other Network Protocols

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35129

Sample Questions

Q1) List the four fields of the domain-specific part of the DECnet address.

Q2) In IPX,the ____________________ field is normally set to FFFF hexadecimal and is typically not used for error detection.

Q3) Developed by Novell for its NetWare network operating system

A)Internet Packet Exchange (IPX)protocol

B)SSCP

C)NCP

D)IPX/SPX protocol suite

E)Sequenced Packet Exchange (SPX)protocol

Q4) The DECnet protocols are based on a network architecture that is referred to as the

A)Digital Network Architecture

B)Digital Network Infrastructure

C)Digital Network Alliance

D)Digital Network Alignment

Q5) ____ was added to reduce the amount of control traffic necessary when using NCP.

A)NDB

B)NCFP

C)NCPD

D)NCPB

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Switching and Routing

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35130

Sample Questions

Q1) A(n)____ variable is used to control the lifetime of each entry in the routing table.

A)invalid timer

B)update timer

C)hold-time timer

D)flush timer

Q2) ____________________ switching reduces the latency of a switch tremendously.

Q3) The ____ algorithm is a type of routing algorithm that is based on the number of hops in a route between a source and destination computer.

A)distance-vector routing

B)distance-volume routing

C)distance-domain routing

D)domain-vector routing

Q4) Section of the switch that contains the Ethernet receiving logic

A)Crossbar switch

B)Buffer

C)Switching fabric

D)Input port logic

E)Multiplexed bus

Q5) Describe the Exterior Gateway Protocol.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Network Management and Security

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35131

Sample Questions

Q1) A(n)____________________ is a program that replicates itself,but does not necessarily infect other programs.

Q2) A(n)____________________ allows you to connect the keyboard,video,and mouse signals from two or more computers to a single keyboard,video monitor,and mouse.

Q3) List and describe five areas to consider in User Management.

Q4) ____ is a technology where high-capacity file storage is directly connected to the network.

A)NAS

B)SAN

C)MAS

D)NAD

Q5) A(n)____ is a stand-alone hardware unit that connects to the network or a software program running on a network host,collecting statistical information about the network performance.

A)program analyzer

B)packet analyzer

C)interface analyzer

D)protocol analyzer

Q6) List and describe the different types of hardening.

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Electronic Mail

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35132

Sample Questions

Q1) A blank line is used as the separator between the parts of an email message.

A)True

B)False

Q2) What is IMAP and what does it do?

Q3) The mailbox portion of the address is often made from a user's ____.

A)home address

B)first name

C)server name

D)account name

Q4) Electronic mail uses the ____ model to allow mail messages to be exchanged.

A)client-server

B)client-client

C)servlet-servlet

D)server-server

Q5) Discuss the issue with sending messages in clear text.

Q6) The Internet Network Authority is responsible for maintenance of the Top Level Domains.

A)True

B)False

Q7) List three features that the MIME standard provides.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: FTP and Telnet

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35133

Sample Questions

Q1) The FTP client can use any port numbers greater than ____________________.

Q2) When transferring files using FTP,it is necessary to use the correct mode,ASCII or binary,otherwise file corruption can occur.

A)True

B)False

Q3) One of the most frustrating experiences with the Telnet protocol involves keyboard mapping.

A)True

B)False

Q4) When using ____________________ FTP,it is necessary to provide a valid username and password in order to access the private files on the FTP server.

Q5) The ____ protocol provides for a bidirectional,byte-oriented service using TCP as the transport to reliably deliver messages.

A)Telnet

B)FTP

C)HTTP

D)RPC

Q6) An FTP ____________________ consists of a command or an action to be performed.

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Multimedia Networking

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35134

Sample Questions

Q1) Some of the original image information is thrown away during the lossy compression process.

A)True

B)False

Q2) A(n)______________________________ customer purchases the VoIP product of their choice,and simply enables it to work on the ViaTalk network using the ViaTalk SIP credentials.

Q3) The ____ credentials provide authenticated access between the VoIP service provider and the local VoIP capable device.

A)NAS

B)SIP

C)SIL

D)SIB

Q4) ____________________ is a method for sending voice and fax data using the IP protocol.

Q5) A Web page with one hundred images will require much longer to download and display if all the images are GIF instead of JPG.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: The Internet

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35135

Sample Questions

Q1) Describe XML.

Q2) Provides a method to incorporate style and layout elements into Web pages with an improved level of control of the page appearance,including consistency between background colors,font selections,font sizes,etc

A)JavaScript

B)CGI

C)VPN

D)Applet

E)CSS

Q3) The ____ is used to create traditional computer programs,or active Web pages using Java applets.

A)Java programming language

B)Java interpreter

C)Java development environment

D)Java program standard

Q4) List the capabilities that a VPN using PPTP or L2TP provides.

Q5) ____________________ is an application that provides the capability for a user to send and receive instant messages,which are delivered to the recipient instantly-even faster than electronic mail.

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Writing a Network Application

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35136

Sample Questions

Q1) Client-server messages only contain text-based data.

A)True

B)False

Q2) The ____ project on Linux supports the C# language.

A)notNet

B)mono

C)Babylon

D)Babel

Q3) When a socket is in ___________________ mode,and a read type of function is called,the program will stop and wait for a packet to be received.

Q4) _____________________________________________ is an interpreted language useful for CGI applications.

Q5) Visual Basic comes complete with many sample applications to help get you started with Internet programming right away.

A)True

B)False

Q6) List the two forms of Visual Basic code and two types of applications that can be created with Visual Basic for use with the Internet.

To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 17: An Introduction to Networking With Windows

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35137

Sample Questions

Q1) Describe ICA.

Q2) Designed to provide reliable data connections using a modem and a telephone line using Windows 9x computer systems

A)Thin client

B)DHCP server

C)Network Properties menu

D)Dial-Up Networking

E)NetBEUI

Q3) List the three components that the ICA uses.

Q4) When trouble shooting at the software level there are two areas of concern: ____.

A)the network operating system software and the router software

B)the network operating system software and the client routing software

C)the application software and the router software

D)the network operating system software and the application software

Q5) Today,the backbone of Windows network operation is based on NetBEUI.

A)True

B)False

Q6) Describe a network printer.

Q7) Explain how to share files over a network.

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Windows Domains

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35138

Sample Questions

Q1) One of the most important elements in a Windows network

A)C2 compliance

B)Security

C)RAS Server

D)Primary domain controller

E)PWL files

Q2) List four of the features that support enhanced security measures in Active Directory.

Q3) List four different versions of the Windows 2008 Server operating system.

Q4) List four important Active Directory Management features.

Q5) Windows 2003 Server extends the capabilities of Windows 2000 Server.

A)True

B)False

Q6) Involves properly configuring Windows NT/200x to use the built-in safeguards

A)C2 compliance

B)Security

C)RAS Server

D)Primary domain controller

E)PWL files

Q7) When is the Administrator account created in Windows NT?

To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 19: Unix and Linux

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35139

Sample Questions

Q1) Describe the Linux documentation project.

Q2) A Linux computer can import and export NFS disks at the same time.

A)True

B)False

Q3) The Gnome interface is provided by the ____ project.

A)Apache

B)GNU

C)Mono

D)Ubuntu

Q4) Describe the Apache Web Server.

Q5) The ____ is a method used on UNIX and Linux systems to share passwords and group file access within a computer network.

A)Distributed File System

B)Network Information Service

C)Network Teller Service

D)Network File System

Q6) For security purposes,it is necessary for the system administrator to protect the ____________________ account.

Q7) Describe NIS+.

21

To view all questions and flashcards with answers, click on the resource link above.

Chapter 20: Other Network Operating Systems

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35140

Sample Questions

Q1) A core component of NetWare consists of the services available for managing and using ____________________.

Q2) Darwin uses ____ as the primary network infrastructure while still supporting AppleTalk.

A)NetBIOS

B)IPX/SPX

C)ICMP

D)TCP/IP

Q3) What is NDS?

Q4) OS/2 Warp contains a built-in TCP/IP stack and Microsoft LAN Manager capability.

A)True

B)False

Q5) Explain print services in the Mac environment.

Q6) Security on the Mac OS X operating system is provided by ____________________.

Q7) To access the Macintosh file system over the network,____________________ must be enabled.

Q8) The latest version of NetWare is version ____________________.

Q9) A workstation connecting to a NetWare server may do so by installing the appropriate ____________________ software. Page 22

To view all questions and flashcards with answers, click on the resource link above.

Page 23

Chapter 21: Cryptography and Security

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35141

Sample Questions

Q1) ____ ciphers encrypt any number of bits

A)Bit

B)Hash

C)Stream

D)Block

Q2) A ____ is visible or invisible information added to an image,video,or audio that identifies the copyright owner of the media.

A)digital signature

B)digital footprint

C)digital fingerprint

D)digital watermark

Q3) A JPG image is a complex data structure containing compressed DCT coefficients for ____ blocks of pixels.

A)4x4

B)8x8

C)16x16

D)32x32

Q4) Hashed data can be unhashed and turned back into their original form.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 24

Chapter 22: Security Hardware

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35142

Sample Questions

Q1) ____ is concerned with understanding what a person is saying.

A)Voice recognition

B)Voice authentication

C)Voice processing

D)Voice translation

Q2) An integrated IDS appliance combines the tap and analysis software all in one device.

A)True

B)False

Q3) Computers with two network adapters

A)Multi-homed

B)Intrusion Detection System

C)Link aggregation

D)Fault tolerance

E)Hardening

Q4) Describe an Intrusion Detection System.

Q5) Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.

Q6) Describe the types of doors and locks that should be used to secure an area.

Q7) _____________________ involves the process of identifying a user to a computer. Page 25

To view all questions and flashcards with answers, click on the resource link above. Page 26

Chapter 23: Security Software

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35143

Sample Questions

Q1) ____ is a vulnerability scanner that will scan the host system,or any and all computers on the local network or anywhere on the Internet.

A)GFI LANguard

B)NetCat

C)L0phtCrack

D)Brutus

Q2) Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.

Q3) Capturing packets is also referred to as ____.

A)packet stiffing

B)packet sniffing

C)packet hiding

D)packet blocking

Q4) Describe host-based intrusion detection.

Q5) A(n)____________________ will take action on its own to handle the problem without user intervention,such as interrupting the offending traffic.

Q6) The most common approaches to password ____________________ are guessing,brute force,and dictionary attacks.

To view all questions and flashcards with answers, click on the resource link above. Page 27

Chapter 24: Forensic Techniques

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35144

Sample Questions

Q1) What is the pre-incident preparation that must take place for a CSIRT?

Q2) The first thing you want to do before analyzing network traffic is make sure you have permission to look at it.

A)True

B)False

Q3) List the skills that you need to become proficient at analyzing malware.

Q4) The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.

Q5) List five laws that have been put into effect to help monitor and control the use of electronic communication systems and computers as well as provide guidelines for prosecution of computer and information-related crimes.

Q6) The ____ file is used when Windows goes into hibernation.

A)Hiberfil.sys

B)Pagefile.sys

C)IO.sys

D)BOOT.INI

Q7) Working with the Registry is easy for the inexperienced user.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 28

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Networking Fundamentals Practice Exam - 720 Verified Questions by Quizplus - Issuu