d_cull91
Quiz by , created more than 1 year ago

Revision questions for internet fundamentals

133
0
0
d_cull91
Created by d_cull91 almost 8 years ago
Close

CP!402 quiz

Question 1 of 109

1

72.257.126.11 is a valid A class host address.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 109

1

In CIDR, conventional network class distinctions do not exist.

Select one of the following:

  • True
  • False

Explanation

Question 3 of 109

1

Some software errors point to a physical connectivity problem.

Select one of the following:

  • True
  • False

Explanation

Question 4 of 109

1

Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems

Select one of the following:

  • True
  • False

Explanation

Question 5 of 109

1

193.255.126.255 is a valid C class host address.

Select one of the following:

  • True
  • False

Explanation

Question 6 of 109

1

In a star topology, a single connection failure will halt all traffic between all sites.

Select one of the following:

  • True
  • False

Explanation

Question 7 of 109

1

In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers.

Select one of the following:

  • True
  • False

Explanation

Question 8 of 109

1

Standards assist in network design.

Select one of the following:

  • True
  • False

Explanation

Question 9 of 109

1

Not all Transport layer protocols are concerned with reliability.

Select one of the following:

  • True
  • False

Explanation

Question 10 of 109

1

Latency occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.

Select one of the following:

  • True
  • False

Explanation

Question 11 of 109

1

All protocols are routable.

Select one of the following:

  • True
  • False

Explanation

Question 12 of 109

1

The command used to view IP information on a Windows workstation is ipconfig.

Select one of the following:

  • True
  • False

Explanation

Question 13 of 109

1

Cut-through switches can detect corrupt packets.

Select one of the following:

  • True
  • False

Explanation

Question 14 of 109

1

Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.

Select one of the following:

  • True
  • False

Explanation

Question 15 of 109

1

A physical topology ____.

Select one of the following:

  • a. specifies device types

  • b. depicts a network in broad scope

  • c. specifies connectivity methods

  • d. specifies addressing schemes

Explanation

Question 16 of 109

1

In which OSI model layer does TCP operate?

Select one of the following:

  • Physical

  • b. Transport

  • c. Network

  • d. Data Link

Explanation

Question 17 of 109

1

Transport layer protocols break large data units into ____.

Select one of the following:

  • PDUs

  • b. segments

  • c. frames

  • d. block IDs

Explanation

Question 18 of 109

1

____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.

Select one of the following:

  • ARP

  • b. PING

  • c. Telnet

  • d. FTP

Explanation

Question 19 of 109

1

On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.

Select one of the following:

  • a. collision domain

  • b. broadcast domain

  • c. interference domain

  • d. duplicate domain

Explanation

Question 20 of 109

1

1000Base-SX has a maximum throughput of ____.

Select one of the following:

  • a. 1 Gbps

  • b. 10 Gbps

  • c. 100 Gbps

  • d. 1000 Gbps

Explanation

Question 21 of 109

1

The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.

Select one of the following:

  • a. proxy

  • b. core

  • c. Internet

  • d. default

Explanation

Question 22 of 109

1

How is reliability achieved in TCP?

Select one of the following:

  • a. Routing

  • b. Sliding windows

  • c. Sequence numbers and acknowledgements

  • d. Port numbers

Explanation

Question 23 of 109

1

Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.

Select one of the following:

  • a. 0

  • b. 1

  • c. first eight

  • d. last eight

Explanation

Question 24 of 109

1

CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.

Select one of the following:

  • a. dash ( - )

  • b. underscore ( _ )

  • c. backward slash ( \ )

  • d. forward slash ( / )

Explanation

Question 25 of 109

1

A(n) ____ is a graphical representation of a network’s devices and connections.

Select one of the following:

  • a. Multi Router Traffic Grapher

  • b. network diagram

  • c. wiring schematic

  • d. event viewer

Explanation

Question 26 of 109

1

____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.

Select one of the following:

  • a. Performance

  • b. Fault

  • c. Network

  • d. Configuration

Explanation

Question 27 of 109

1

28. ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.

Select one of the following:

  • a. Traffic monitoring

  • b. Traffic routing

  • c. Traffic polling

  • d. Traffic shaping

Explanation

Question 28 of 109

1

The most common type of caching is ____ caching.

Select one of the following:

  • a. online

  • b. Web

  • c. Internet

  • d. device

Explanation

Question 29 of 109

1

A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.

Select one of the following:

  • a. network monitor

  • b. sniffer

  • c. protocol analyzer

  • d. multimeter

Explanation

Question 30 of 109

1

The ____ utility allows you to view a host’s routing table.

Select one of the following:

  • a. nbstat

  • b. pathping

  • c. nslookup

  • d. route

Explanation

Question 31 of 109

1

Which of the following is a valid IP public address for use by a host on a LAN?

Select one of the following:

  • a. 10.2.256.5

  • b. 200.0.0.1

  • c. 192.168.10.5

  • d. 127.0.0.1

Explanation

Question 32 of 109

1

The result from ANDing 11110101 with 10111100 is ____.

Select one of the following:

  • a. 11111101

  • b. 10111101

  • c. 10110100

  • d. 01001010

Explanation

Question 33 of 109

1

What is the default administrative distance of static routes?

Select one of the following:

  • a. 120

  • b. 0

  • c. 90

  • d. 1

Explanation

Question 34 of 109

1

What is an Autonomous System in the context of internetworking?

Select one of the following:

  • a. A system that functions independently without external intervention

  • b. A group of routers under a common administration

  • c. A group of routers that have routes to every member of the group

  • d. A group of routers that can be configured by simply changing the settings in any one member

Explanation

Question 35 of 109

1

What does a layer 2 switch do when it receives a broadcast frame from one of the hosts connected to it?

Select one of the following:

  • a. Forwards it to all the other hosts connected to the switch

  • b. Examines the TTL field in the header and if the value is not 0, forwards it to all the other hosts on the switch

  • c. Discards it

  • d. A and B

Explanation

Question 36 of 109

1

When would static NAT be used over dynamic NAT?

Select one of the following:

  • a. When there is only a single public IP address available

  • b. When a router does not support NAT

  • c. When a server requires a fixed Global IP address

  • d. To assign an IP address from an IP address pool

Explanation

Question 37 of 109

1

Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.

Select one of the following:

  • a. open

  • b. standard

  • c. routable

  • d. nonroutable

Explanation

Question 38 of 109

1

A(n) ____ is the place where a telephone company terminates lines and switches calls between different locations.

Select one of the following:

  • a. CO

  • b. EO

  • c. DO

  • d. TO

Explanation

Question 39 of 109

1

The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.

Select one of the following:

  • a. demarcation point

  • b. NIU (Network Interface Unit)

  • c. local loop

  • d. central office

Explanation

Question 40 of 109

1

Repeaters operate in the ____ layer of the OSI model.

Select one of the following:

  • a. Physical

  • b. Network

  • c. Transport

  • d. Session

Explanation

Question 41 of 109

1

A ____ can interpret physical addressing information.

Select one of the following:

  • a. repeater

  • b. tranciever

  • c. hub

  • d. bridge

Explanation

Question 42 of 109

1

Switches can create ____ by grouping a number of ports into a broadcast domain.

Select one of the following:

  • a. trunks

  • b. spanning trees

  • c. gateways

  • d. VLANs

Explanation

Question 43 of 109

1

____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.

Select one of the following:

  • a. Static

  • b. Dynamic

  • c. Best path

  • d. Link-state

Explanation

Question 44 of 109

1

A complex combination of topologies is known as a ____ topology.

Select one of the following:

  • a. mixed

  • b. hybrid

  • c. compound

  • d. mulitpart

Explanation

Question 45 of 109

1

The most common logical topologies are ____ and ring.

Select one of the following:

  • a. bus

  • b. star

  • c. wired

  • d. hybrid

Explanation

Question 46 of 109

1

Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.

Select one of the following:

  • a. FCS

  • b. header

  • c. preamble

  • d. frame

Explanation

Question 47 of 109

1

In a ____ attack, a person redirects or captures secure transmissions as they occur.

Select one of the following:

  • a. denial-of service

  • b. man-in-the-middle

  • c. war driving

  • d. phishing

Explanation

Question 48 of 109

1

____ software searches a node for open ports.

Select one of the following:

  • a. Phishing

  • b. Sniffing

  • c. Authentication

  • d. Port scanner

Explanation

Question 49 of 109

1

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

Select one of the following:

  • a. switch’s

  • b. gateway’s

  • c. router’s

  • d. proxy server’s

Explanation

Question 50 of 109

1

____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.

Select one of the following:

  • a. flashing

  • b. denial-of-service

  • c. dictionary

  • d. brute force

Explanation

Question 51 of 109

1

The combination of a public key and a private key is known as a ____.

Select one of the following:

  • a. key lock

  • b. key frame

  • c. key pair

  • d. key set

Explanation

Question 52 of 109

1

RADIUS and TACACS belong to a category of protocols known as AAA (____).

Select one of the following:

  • a. access, authorization, and accounting

  • b. authentication, authorization, and accounting

  • c. authentication, authorization, and authority

  • d. authentication, authorization, and access

Explanation

Question 53 of 109

1

Standards define the ____ performance of a product or service.

Select one of the following:

  • a. ideal

  • b. most acceptable

  • c. minimum acceptable

  • d. maximum acceptable

Explanation

Question 54 of 109

1

In which OSI model layer(s) do NICs operate?

Select one of the following:

  • a. Physical

  • b. Network and Physical

  • c. Data Link

  • d. Physical and Data Link

Explanation

Question 55 of 109

1

A(n) ____ number is the address on a host where an application makes itself available to incoming or outgoing data.

Select one of the following:

  • a. port

  • b. source

  • c. destination

  • d. sequence

Explanation

Question 56 of 109

1

The protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network through a router is ____.

Select one of the following:

  • a. TCP

  • b. ICMP

  • c. UDP

  • d. IP

Explanation

Question 57 of 109

1

In IPv6, each address contains a(n) ____, or a variable-length field at the beginning of the address that indicates what type of address it is.

Select one of the following:

  • a. Variable Prefix

  • b. Address Prefix

  • c. Format Prefix

  • d. Field Prefix

Explanation

Question 58 of 109

1

In IPv4 addressing, a node with an IP address of 128.64.88.20 belongs to a Class ____ network.

Select one of the following:

  • a. A

  • b. B

  • c. C

  • d. D

Explanation

Question 59 of 109

1

Which of the following best describes the definition of administrative distance?

Select one of the following:

  • a. Measure of the trustworthiness of the source of a route update

  • b. The number of hops to a destination node recorded in the routing table

  • c. The maximum number of hops for a routing protocol which is used to set the TTL value in an IP packet

  • d. Distance to the closest network administrator

Explanation

Question 60 of 109

1

Which of the following statements is true regarding CSMA/CD after a collision has occurred?

Select one of the following:

  • a. Each device waits for a random backoff period before attempting to retransmit

  • b. Both stations stop transmitting immediately

  • c. The devices involved in the collision have priority to transmit data

  • d. The device with the highest priority will attempt to retransmit first

Explanation

Question 61 of 109

1

The decimal number 782 converted to binary is

Select one of the following:

  • a. 1010001000

  • b. 10000000110

  • c. 11100011100

  • d. 1100001110

Explanation

Question 62 of 109

1

64. When signals may travel in both directions over a medium but only in one direction at a time, the transmission is considered ____.

Select one of the following:

  • a. simplex

  • b. multiplex

  • c. half-duplex

  • d. full-duplex

Explanation

Question 63 of 109

1

Which network model ensures that no computer on the network has more authority than another?

Select one of the following:

  • a. client/server

  • b. stand alone

  • c. peer-to-peer

  • d. distributed

Explanation

Question 64 of 109

1

____ networks are the most popular type of network for medium- and large-scale organizations.

Select one of the following:

  • a. Client/server

  • b. Peer-to-peer

  • c. Stand-alone

  • d. Stationary

Explanation

Question 65 of 109

1

A ____ network is confined to a relatively small space.

Select one of the following:

  • a. NAN

  • b. MAN

  • c. WAN

  • d. LAN

Explanation

Question 66 of 109

1

Which network topology is the most common?

Select one of the following:

  • a. ring

  • b. star

  • c. hybrid

  • d. Ethernet

Explanation

Question 67 of 109

1

Which OSI model layer initiates the flow of information?

Select one of the following:

  • a. Physical

  • b. Session

  • c. Application

  • d. Presentation

Explanation

Question 68 of 109

1

Which OSI model layer manages data encryption?

Select one of the following:

  • a. Physical

  • b. Session

  • c. Application

  • d. Presentation

Explanation

Question 69 of 109

1

Which type of protocol is useful when data must be transferred quickly?

Select one of the following:

  • a. connection-oriented

  • b. connectionless

  • c. TCP

  • d. IP

Explanation

Question 70 of 109

1

____ is the process of reconstructing segmented data.

Select one of the following:

  • a. Reassembly

  • b. Reengineering

  • c. Resegmenting

  • d. Realigning

Explanation

Question 71 of 109

1

The process of determining the best path from Point A on one network to Point B on another is known as ____.

Select one of the following:

  • a. mapping

  • b. enhancing

  • c. reconfiguring

  • d. routing

Explanation

Question 72 of 109

1

In which OSI model layer does IP operate?

Select one of the following:

  • a. Physical

  • b. Transport

  • c. Network

  • d. Data Link

Explanation

Question 73 of 109

1

Which Data Link sublayer manages flow control?

Select one of the following:

  • a. LLC

  • b. MAC

  • c. Management layer

  • d. Addressing layer

Explanation

Question 74 of 109

1

Which Data Link sublayer manages access to the physical medium?

Select one of the following:

  • a. LLC

  • b. MAC

  • c. Management layer

  • d. Addressing layer

Explanation

Question 75 of 109

1

When signals are free to travel in both directions over a medium simultaneously, the transmission is considered ____.

Select one of the following:

  • a. simplex

  • b. multiplex

  • c. half-duplex

  • d. full-duplex

Explanation

Question 76 of 109

1

When signals may travel in only one direction over a medium, the transmission is considered ____.

Select one of the following:

  • a. simplex

  • b. multiplex

  • c. half-duplex

  • d. full-duplex

Explanation

Question 77 of 109

1

The most significant factor in choosing a transmission method is its ____.

Select one of the following:

  • a. noise

  • b. attenuation

  • c. throughput

  • d. latency

Explanation

Question 78 of 109

1

The more twists per foot in a pair of wires, the more resistant the pair will be to ____.

Select one of the following:

  • a. throughput

  • b. attenuation

  • c. cross talk

  • d. latency

Explanation

Question 79 of 109

1

TCP is a(n) ____ protocol.

Select one of the following:

  • a. open-ended

  • b. indiscriminating

  • c. connection-oriented

  • d. connectionless

Explanation

Question 80 of 109

1

____ is more efficient than TCP for carrying messages that fit within one data packet.

Select one of the following:

  • a. IP

  • b. UDP

  • c. ICMP

  • d. IGMP

Explanation

Question 81 of 109

1

In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.

Select one of the following:

  • a. TCP

  • b. UDP

  • c. IP

  • d. ARP

Explanation

Question 82 of 109

1

In IPv4 addressing, each public IP address is a unique ____ number.

Select one of the following:

  • a. 12-bit

  • b. 32-bit

  • c. 64-bit

  • d. 128-bit

Explanation

Question 83 of 109

1

In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.

Select one of the following:

  • a. A

  • b. B

  • c. C

  • d. D

Explanation

Question 84 of 109

1

In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a Class ____ network.

Select one of the following:

  • a. A

  • b. B

  • c. C

  • d. D

Explanation

Question 85 of 109

1

The default subnet mask for a Class B network is ____.

Select one of the following:

  • a. 255.0.0.0

  • b. 255.255.0.0

  • c. 255.255.255.0

  • d. 255.255.255.255

Explanation

Question 86 of 109

1

A(n) ____ address represents any one interface from a group of interfaces, any one of which can accept a transmission.

Select one of the following:

  • a. anycast

  • b. unicast

  • c. multicast

  • d. singlecast

Explanation

Question 87 of 109

1

All Ethernet networks, independent of their speed or frame type, use an access method called ____.

Select one of the following:

  • a. CSMA

  • b. CSMA/DC

  • c. CSAM/CD

  • d. CSMA/CD

Explanation

Question 88 of 109

1

A ____ occurs when two transmissions interfere with each other.

Select one of the following:

  • a. jam

  • b. collision

  • c. carrier sense

  • d. multiple access event

Explanation

Question 89 of 109

1

Together, the FCS and the header make up the ____-byte “frame” for the data.

Select one of the following:

  • a. 15

  • b. 18

  • c. 21

  • d. 24

Explanation

Question 90 of 109

1

In addition to viewing its LEDs and using a loopback plug to test a NIC’s functionality, you can also check a NIC’s connectivity with ____.

Select one of the following:

  • a. simple commands

  • b. special clients

  • c. special switches

  • d. special software

Explanation

Question 91 of 109

1

Traditional switches operate at the ____ layer of the OSI model.

Select one of the following:

  • a. Physical

  • b. Data link

  • c. Network

  • d. Session

Explanation

Question 92 of 109

1

____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.

Select one of the following:

  • a. Routers

  • b. Switches

  • c. Gateways

  • d. Broadcast domains

Explanation

Question 93 of 109

1

The ____ encompasses the entire telephone system, from the wires that enter homes and businesses to the network centers that connect different regions of a country.

Select one of the following:

  • a. SLIP

  • b. POTS

  • c. PPP

  • d. PSTN

Explanation

Question 94 of 109

1

____ means that a telephone company connects residential users to its network with fiber-optic cable.

Select one of the following:

  • a. OLT

  • b. FITL

  • c. PON

  • d. FITH

Explanation

Question 95 of 109

1

A class ____ network class is reserved for special purposes.

Select one of the following:

  • a. A

  • b. B

  • c. C

  • d. D

Explanation

Question 96 of 109

1

In classful addressing, the Class B IPv4 address network ID is located in the ____.

Select one of the following:

  • a. last 8 bits

  • b. last 16 bits

  • c. first 8 bits

  • d. first 16 bits

Explanation

Question 97 of 109

1

In classful addressing, Class C IPv4 address host information is located in the ____.

Select one of the following:

  • a. last 8 bits

  • b. last 16 bits

  • c. first 8 bits

  • d. first 16 bits

Explanation

Question 98 of 109

1

Within a classful addressing, ____ is the default subnet mask for a Class C address.

Select one of the following:

  • a. 255.255.255.255

  • b. 255.255.255.0

  • c. 255.255.0.0

  • d. 255.0.0.0

Explanation

Question 99 of 109

1

The result from ANDing 11001111 with 10010001 is ____.

Select one of the following:

  • a. 11001111

  • b. 10010001

  • c. 10000001

  • d. 00000001

Explanation

Question 100 of 109

1

____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

Select one of the following:

  • a. Cracking

  • b. Hacking

  • c. War driving

  • d. Phishing

Explanation

Question 101 of 109

1

A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.

Select one of the following:

  • a. flashing

  • b. denial-of-service

  • c. war driving

  • d. phishing

Explanation

Question 102 of 109

1

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

Select one of the following:

  • a. packet-filtering

  • b. gateway

  • c. proxy

  • d. selective

Explanation

Question 103 of 109

1

An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.

Select one of the following:

  • a. intensity

  • b. background

  • c. scope

  • d. focus

Explanation

Question 104 of 109

1

To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.

Select one of the following:

  • a. open

  • b. static

  • c. promiscuous

  • d. continuous

Explanation

Question 105 of 109

1

____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.

Select one of the following:

  • a. Jabbers

  • b. Ghosts

  • c. Giants

  • d. Runts

Explanation

Question 106 of 109

1

A ____ usually results from a bad NIC.

Select one of the following:

  • a. jabber

  • b. ghost

  • c. giant

  • d. runt

Explanation

Question 107 of 109

1

A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously

Select one of the following:

  • . a. multimeter

  • b. cable performance tester

  • c. network monitor

  • d. protocol analyzer

Explanation

Question 108 of 109

1

110. Which of the following is a valid IP address for use by a host on a LAN?

Select one of the following:

  • a. 10.2.257.5

  • b. 127.0.0.1

  • c. 192.168.10.5

  • d. 227.125.5.25

Explanation

Question 109 of 109

1

Which of the following is a valid IP address for use by a host on a LAN?

Select one of the following:

  • a. 10.256.255.5

  • b. 127.0.0.1

  • c. 227.125.5.25

  • d. None of the above

Explanation