Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
What type of topology is displayed in the figure above?a. Star b. Bus c. Ringd. Bus-star
Q:
What type of fiber-optic cabling should be installed between floors in a proper cable plant?a. Single-mode b. Multimode c. Single-strandd. Multi-strand
Q:
What is the biggest disadvantage of shielded twisted-pair cabling?
a. It is large in diameter and has limited bending capability
b. It is relatively susceptible to EMI and RFI
c. It is fragile and requires expertise to install
d. It needs to have proper grounding
Q:
Which type of cable is the most difficult to tap into?a. Twisted pair b. Thick coax c. Fiber opticd. Thin coax
Q:
How are the optical light pulses generated in fiber-optic cabling?a. Laser b. LED c. Photometerd. Both a and be. a, b, and c
Q:
Which type of communication media is usually used to connect computers that demand high-speed LAN and WAN access?a. Coax cableb. UTP cable c. Fiber-optic cabled. Wireless technologies
Q:
What is the biggest disadvantage of the star topology?
a. It is more difficult to expand than a traditional bus network
b. It is more difficult to manage than a traditional bus network
c. It has a single point of failure
d. It is easier to tap into than a traditional bus network
Q:
The _____ is the most popular topology.a. bus b. star c. hybridd. ring
Q:
What device does each computer connect to in a ring layout?a. Chassis switch b. Hub c. Repeaterd. MAU
Q:
What is one of the disadvantages of a ring network?
a. It is more difficult to manage than a bus topology
b. It is more expensive to implement than a bus topology
c. It is not suited for transmitting signals over long distances on a LAN
d. It does not handle high-volume network traffic as well as the traditional bus topology
Q:
Which organization plays a leading role in developing standards for network cabling and data transmissions?a. Comptia b. ISO c. EIA/TIAd. IEEE
Q:
Which type of topology consists of cable running from one computer to the next?a. Star b. Bus c. Ringd. Hybrid
Q:
Which EIA/TIA standard specifies various wiring closet configurations?a. 232 b. 442 c. 489d. 569
Q:
What type of interference is caused by magnetic force fields that are generated by electric devices such as factory machinery, fans, elevator motors, and air-conditioning units?a. EMS b. EMI c. RFId. EMF
Q:
Which type of network device divides a communications medium into multiple channels so that several nodes can communicate at the same time?a. Repeater b. Multiplexer c. Switchd. De-multiplexer
Q:
Which type of network device provides immediate battery power to equipment during a power failure or brownout?a. Uninterruptible battery source b. Redundant battery source c. Uninterruptible power suppliesd. Redundant power supplies
Q:
Which type of network device links network segments and forwards and filters frames between segments?a. Hub b. Router c. Bridged. Switch
Q:
Which type of network device connects networks having the same or different access methods and media, and forwards packets and frames to networks?a. Switch b. Router c. Bridged. Firewall
Q:
Which type of network device connects two or more cable segments and retransmits any incoming signal to all other segments?a. Hub b. Bridge c. Repeaterd. Switch
Q:
Which type of network device is used to link together network segments in a physical star fashion?a. Hub b. Switch c. Routerd. Bridge
Q:
Which type of network device provides remote communications, such as multiple modems and connections to telecommunications lines?a. Routers b. Firewalls c. Switchesd. Access servers
Q:
What location can NLMs be loaded from when the SECURE CONSOLE command is run?a. sys:system b. DOS partition c. Floppy diskd. CD
Q:
In Netware 6.x, how do you gain access back into the system after the screen saver starts and the screen is locked?
a. Console 1
b. Server Console Authentication dialog box
c. Command line authentication
d. Ctrl+Alt+Del key sequence
Q:
Which NetWare 6.x SCRSAVER command parameter must be used at the time SCRSAVER is loaded and prevents screen locking?a. Disable Lock b. Enable Lock c. No Passwordd. Disable
Q:
Which NetWare 6.x SCRSAVER command parameter entered in seconds, determines the amount of time that the keyboard is inactive before the screen saver starts?a. Auto Clear Delay b. Wait c. Timerd. Delay
Q:
Which NetWare 6.x SCRSAVER command parameter enables the screen saver to work after it has been disabled?a. Activate b. Enable c. Re-enabled. Start
Q:
Which NetWare 6.x SCRSAVER command parameter starts the screen saver immediately and requires a user account and password to go back into the console?a. Delay b. Auto Clear Delay c. Activated. Enable
Q:
Which command in Netware 6.x allows you to configure a screen saver at the console?a. SCRSAVER b. SSAVER c. SCRNSVRd. SCREENSAVER
Q:
Which of the following fire suppression chemicals is considered to be an environmental concern?a. Soda acid b. Halon c. Carbon dioxided. Baking soda
Q:
Which operating system uses XScreenSaver to lock the screen?a. Windows ME b. Red Hat Linux 9.x c. Mac OS Xd. Netware 6.x
Q:
Which of the following operating systems can use screen savers to protect the desktop?a. Windows b. Linux c. Mac OS Xd. All of the above
Q:
A _____ lock consists of a thick cable covered by vinyl, with one end permanently attached to a table or an immobile object.a. hardware b. cable c. cipherd. both a and be. a, b, and c
Q:
What kind of security is related to the purpose and location of a workstation?a. End User b. Desktop c. Workstationd. System
Q:
An advantage of fiber-optic cable is that its high bandwidth and low attenuation (signal loss) enable it to sustain transmissions over long distances. _________________________
Q:
UTP cable is the most frequently used network cable because it is relatively inexpensive and easy to install. _________________________
Q:
When working with twisted-pair cabling, solid shielding is used for indoor wiring, and corrugated shielding is used for outside or underground wiring. _________________________
Q:
Twisted-pair cabling is more flexible than coax cable and therefore better for running through walls and around corners. _________________________
Q:
Twisted-pair cable is used mainly in older LANs and in LANs that exist in areas with strong sources of signal interference. _________________________
Q:
A(n) trunkis a high-capacity communications medium that joins networks and central network devices on the same floor in a building, on different floors, and across long distances. _________________________
Q:
It is more difficult with a(n) star topology than with the traditional bus topology for someone to create an unauthorized tap into the network, because they need access to the central hub or switch. _________________________
Q:
Newer high-speed ring technologies employ three loops for redundant data transmission. _________________________
Q:
In a bus topology, a terminator is connected to each end of the bus cable segment. _________________________
Q:
A(n) intermediate cross-connect is a wiring closet that houses the main-level cables and cables to main networking and telecommunications devices. _________________________
Q:
Coaxial cable (typically called coax) comes in two varieties, thick and thin.
Q:
A disadvantage of a bus network is that it requires more cable than does the traditional star.
Q:
The star topologyis the oldest communications design, with roots in telephone switching systems.
Q:
The bus topology is easier to manage than the ring topology because the equipment used to build the bus makes it easier to locate a defective node or cable problem.
Q:
A bus network segment must be within the IEEE length specifications to ensure that packets arrive in the expected time.
Q:
What four tasks is Windows XP Internet Connection Firewall designed to handle?
Q:
What are the six ways that a metric can be calculated?
Q:
What six tasks do routers perform?
Q:
What four tasks can a proxy fulfill?
Q:
What are the four ways to perform network address translation?
Q:
Firewalls provide border security by using three different approaches. What are they?
Q:
What five border points should be protected by a strong border security design?
Q:
What four fields does a UDP header contain?
Q:
What are the three component protocols within the TCP/IP protocol suite?
Q:
A newer way to ignore address class designation is by using ______________________________addressing, which puts a slash (/) after the dotted decimal notation.
Q:
When an application on a network station uses a(n) ____________________ packet (which is the most typical packet used by an application), one copy of each packet in a transmission is sent to each destination intended to receive the packet.
Q:
When a TCP segment is formatted with the additional IP header information, the entire unit is called a(n) ____________________ or packet.
Q:
UDP does not provide the same level of reliability and error checking as TCP, because it relies only on the ____________________ to ensure reliability.
Q:
TCP (and UDP) ____________________ software may be used to simply collect information about a target, without the target's knowledge; it may be used to gain access to a system, or it may be used to crash a system.
Q:
In a TCP header, the ____________________ is a 16-bit CRCthat is computed by adding the length of all header fields plus the length of the data payload field.6
Q:
In TCP communications, the number of data bytes transmitted in a frame is called the ____________________because the number can be increased or decreased from one moment to the next by mutual agreement of the two communicating stations.
Q:
Connection-oriented services occur between the ____________________ sublayer of the data-link layer (layer 2) and the network layer (layer 3) in the OSI model.
Q:
Red Hat Linux 9.x offers the ____________________ interface for configuring NAT and complex firewall security from the command line in a terminal window.
Q:
When a server is set up for ______________________________, it performs address translation between the local network clients (including the server as an Internet user) and the Internet.
Q:
Is Internet Connection Firewall available in Windows Server 2003, Enterprise Edition?
Q:
Can routers filter packets on the basis of information associated with each port (inbound and outbound connections) to control network traffic?
Q:
Does RIP have the ability to send only routing updates to other routers instead of the entire routing table?
Q:
Do routers maintain information about network station addresses and network status in databases?
Q:
Is one function of a proxy to screen application requests that go across a firewall placed between an internal network and an external or public network?
Q:
Does dynamic NAT translate a range of addresses on the internal network to a range of specific decoy addresses?
Q:
Does NetBEUI use the type of addressing that would enable it to be forwarded or routed to networks other than the one on which it is used?
Q:
Are network classes A through C intended for unicast addressing methods?
Q:
Does UDP provide the same level of reliability and error checking as TCP?
Q:
When two devices communicate using connection-oriented methods, do they establish sequence numbers for each frame that is transmitted and place the sequence number in the frame header?
Q:
What is displayed in the figure above?a. OSPF border areasb. Using NAT on a small office networkc. Proxy firewall as an application-level gatewayd. Firewall proxy as a circuit-level gateway
Q:
What is displayed in the figure above?a. Proxy firewall as an application-level gatewayb. Firewall proxy as a circuit-level gatewayc. OSPF border areasd. Implementing border security
Q:
In the figure above, which letter indicates the portion of the TCP/IP packet that is the TCP segment?a. A b. A and B c. B and Cd. C and D