Exam sample questions - exam preparation PDF

Title Exam sample questions - exam preparation
Author Anh Nguyễn
Course Internet Fundamental
Institution James Cook University
Pages 20
File Size 353.5 KB
File Type PDF
Total Downloads 112
Total Views 182

Summary

exam preparation...


Description

CP1402/1802/5631 sample questions

Multiple choice 1. Switches make forwarding decisions based on: a. MAC address b. IP address c. random allocation d. nothing; switches forward all frames on all ports 2. Which of the following is a public IP address? a. 10.110.15.1 b. 172.24.50.240 c. 192.168.10.38 d. 128.14.42.70 3. The process of adding a header to the data inherited from the layer above is called _____. a. segmenting b. encapsulation c. fragmenting d. appending 4. What physical network topology consists of all connected devices connecting to one central device, such as a switch? a. bus topology b. ring topology c. hub topology d. star topology 5. Which of the following is not a broadcast address? a. 10.0.0.127/24 b. 10.0.0.127/25 c. 10.0.0.127/26 d. 10.0.0.127/27 6. Analog signals are boosted by: a. switches b. hubs c. repeaters d. amplifiers 7. What is the name for the protocol data unit (PDU) of the Data Link layer? a. packet b. data c. bit d. frame

Page 1

CP1402/1802/5631 sample questions 8. Text that has been scrambled by an encryption algorithm is known as: a. ciphertext b. cryptotext c. secret text d. private text 9. Devices generally connect to a network via a port on their ____ (NIC)? a. Network intelligence card b. Network interconnection card c. Network and Internet card d. Network interface card 10. Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase? a. memorandum of understanding b. statement of work c. request for quote d. request for proposal 11. Which of the following is not one of the disadvantages of peer-to-peer networks? a. They lack scalability b. They are not necessarily secure c. They are impractical for connecting large numbers of computers d. They centralise user account logins 12. The trailer of an Ethernet frame: a. signals to the receiving node that the bytes following are the actual frame b. provides the MAC address of the source and destination nodes c. specifies the transport layer protocol carried in the frame d. ensures that the data received by the destination exactly matches the data issued from the source 13. Which forwarding method used by a switch results in the fewest errors? a. Cut through b. Fragment free c. Store-and-forward d. Token based 14. In networking, a socket refers to a combination of ____ and _____. a. domain name, IP address b. IP address, port number c. IP address, MAC address d. MAC address, port number

Page 2

CP1402/1802/5631 sample questions 15. What does a statement of work document do? a. It documents in detail the work that must be completed for a particular object, and includes specifics

such as tasks, deliverables, standards, payment schedule, and work timeline. b. It documents the intentions of two or more parties to enter into a binding agreement, or contract, and

is sometimes used between an informal handshake and the legally binding signatures on contracts. c. It is a legally binding contract or part of a contract that defines, in plain language and in measurable

terms, the aspects of a service provided to a customer, such as the service provided by an ISP. d. It is a contract that defines the terms of future contracts between parties, such as payment terms or

arbitration arrangements. 16. What is the name of the GUI front end that is available for the Nmap utility? a. GUINmap b. Zenmap c. iMap d. VizMap 17. Which of the following is a routing protocol? a. OSPF b. IPv4 c. IPv6 d. TCP 18. How is traffic from multiple VLANs distinguished? a. A VLAN identifier is sent in a separate packet and frame. b. A VLAN identifier is added to the packet. c. A VLAN identifier is added to the frame. d. A VLAN identifier is added to the application data. 19. Which method of transmission allows signals to travel in both directions over a medium but in only one direction at a time? a. full duplex b. half duplex c. simplex d. semi duplex 20. A standard network switch operates at what layer of the OSI model? a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4

Page 3

CP1402/1802/5631 sample questions 21. What is the default subnet mask for a class B network? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255 22. Which of the following is an EGP (Exterior Gateway Protocol)? a. BGP b. IS-IS c. RIP d. IPv6 23. According to the standard, each Ethernet frame will carry at most ____ bytes of data. a. 384 b. 1500 c. 65536 d. 120000 24. An IPv6 address consists of how many bits? a. 32 b. 48 c. 96 d. 128 25. What type of diagram is a graphical representation of a network's wired infrastructure? a. network diagram b. wiring schematic c. topology map d. system diagram 26. There are ____ different port numbers. a. 256 b. 8192 c. 65536 d. about 4.3 billion 27. Which of these is not a main step in the network troubleshooting process? a. Identify the problem. b. Establish a theory of probable cause. c. Test the theory to determine case. d. Train staff in the use of software and equipment.

Page 4

CP1402/1802/5631 sample questions 28. Which of the following statements about CSMA/CD is false? a. nodes listen to make sure that the wire is free before attempting to transmit b. if a collision is detected, nodes stop transmitting and broadcast a jam signal c. nodes wait a random back-off time before attempting to resubmit d. nodes with high priority may re-transmit immediately 29. Layer 1 of the OSI model is known as the _____ layer. a. Transmission b. Physical c. Transport d. Presentation 30. Which of the following types of networks is generally geographically largest? a. WAN b. MAN c. LAN d. PAN 31. What is the default subnet mask for a class A network? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255 32. At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Application b. Session c. Transport d. Network 33. Hubs make forwarding decisions based on: a. MAC address b. IP address c. random allocation d. nothing; hubs forward all frames on all ports 34. ARP is used to associate ________ and _________. a. MAC addresses, IP addresses b. MAC addresses, port numbers c. IP addresses, port numbers d. Port numbers, domain names

Page 5

CP1402/1802/5631 sample questions 35. Which OSI layer is divided into LLC and MAC sublayers? a. Data Link b. Physical c. Network d. Transport 36. Tone generators are used to determine: a. cable characteristics b. where a wired pair terminates c. level of noise d. attenuation 37. Which of the following is a valid class C IP address for a host? a. 193.255.101.18 b. 200.258.243.201 c. 215.12.63.0 d. 225.192.159.23 38. Which of the following options is not a likely source of electromagnetic interference? a. power lines b. motors c. fiber optic cables d. microwaves 39. Which of the following is not performed by TCP? a. three-way handshake b. sequencing c. acknowledgements d. packet fragmentation 40. Which tool could you use to identify the path that a packet takes between routers? a. tracert b. netstat c. ping d. ipconfig 41. Which cloud computing category would you choose if you only needed to access to hardware and network services, but were planning to install your own OS and applications? a. IaaS b. PaaS c. SaaS d. TaaS

Page 6

CP1402/1802/5631 sample questions 42. A change coordinator functions as what type of manager? a. project manager b. inventory manager c. human resources manager d. time manager 43. ____ refers to the loss of a signal's strength as it travels away from the source. a. attenuation b. latency c. jitter d. noise 44. What range of ports is referred to as the "well-known" range of ports? a. 0-1023 b. 512-1023 c. 1024-49151 d. 49152-65535 45. Which class of IP addresses is used for multicasting? a. Class C b. Class D c. Class E d. Class M 46. Routers make forwarding decisions based on: a. MAC address b. IP address c. random allocation d. nothing; routers forward all frames on all ports 47. Which layer of the OSI model is responsible for defining the format of logical addresses? a. Data link b. Network c. Transport d. Application 48. Frame Relay is a _________ layer protocol, generally used for ____. a. data link, WANs b. data link, LANs c. physical, WANs d. physical, LANs

Page 7

CP1402/1802/5631 sample questions 49. In fibre-optic terminology, MMF stands for __________. a. mixed-mode fibre b. multi-mode fibre c. maximum-mode fibre d. minimum-mode fibre 50. What type of documentation tool is a website that can be edited by users, allowing them to add files and

photos and links between pages? a. wiki b. spreadsheet c. workgroup d. co-op 51. A loopback IP address begins with what number? a. 254 b. 127 c. 169 d. 192 52. The preamble of an Ethernet frame: a. signals to the receiving node that the bytes following are the actual frame b. provides the MAC address of the source and destination nodes c. specifies the transport layer protocol carried in the frame d. ensures that the data the destination exactly matches the data issued from the source 53. In fibre-optic terminology, SMF stands for __________. a. single-mode fibre b. short-mode fibre c. semi-mode fibre d. simple-mode fibre 54. Which method of transmission allows signals to travel in both directions over a medium simultaneously? a. half duplex b. total duplex c. full duplex d. multiplex 55. DNS exists at the ___ layer. a. network b. transport c. presentation d. application

Page 8

CP1402/1802/5631 sample questions 56. Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read: a. Application b. Presentation c. Session d. Transport 57. A port that can carry traffic for multiple VLANs is known as a(n) ___________ port. a. access b. trunk c. multi d. traffic 58. ________ is the process of a wireless device gaining Internet access through an AP (access point). a. association b. synchronisation c. connection d. activation 59. TCP and UDP are ____ layer protocols. a. Transport b. Transmission c. Network d. Application 60. ___ is any undesirable influence degrading or distorting a signal. a. attenuation b. latency c. jitter d. noise 61. The image below depicts what type of topology? Switch 1 connects to 4 workstations, and to Switch 2. Switch 2 connects to 3 workstations, and to both Switch 1 and Switch 3. Switch 3 connects to 3 workstations and to Switch 2.

a. bus b. star-bus c. chain-bus d. chain Page 9

CP1402/1802/5631 sample questions 62. Which of the following statements is true? a. VLANs are logical broadcast domains b. VLANs are defined at the Transport layer c. all switches support the creation of VLANs d. VLANs use access ports to exchange VLAN information 63. Application layer protocols fall into two categories: those that provide services to users; and those that provide utility services to the ______. a. system b. network c. packet d. NIC 64. The number of usable host addresses on a /29 subnet is: a. 2 b. 4 c. 6 d. 8 65. 220.33.219.11 is a ______ address. a. Class A b. Class B c. Class C d. Class D 66. What command below can be used to display a complete summary of all network interfaces in a Windows computer? a. ipconfig /a b. ipconfig /all c. ipconfig /list d. ipconfig /show 67. What is the highest layer at which HTTP, FTP, and Telnet protocols operate? a. Layer 5 b. Layer 6 c. Layer 7 d. Layer 8 68. Where is a demarc located in relation to the structured cabling of an enterprise environment? a. in the Main Distribution Frame (MDF) b. at the Intermediate Distribution Frame (IDF) c. in the work area d. between the MDF and the IDF

Page 10

CP1402/1802/5631 sample questions 69. What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling? a. network interface device b. main distribution frame c. intermediate distribution frame d. entrance facility 70. The subnet mask 255.255.255.128 is equivalent to ___ in CIDR notation. a. /24 b. /25 c. /26 d. /27 71. The WLAN architecture in which wireless nodes transmit directly to each other is referred to as an ______ WLAN. a. infrastructure b. arbitrary c. extensible d. ad hoc 72. What is the smallest subnet that will accommodate 40 hosts? a. /24 b. /25 c. /26 d. /27 73. Routing protocols are used to: a. determine the best path through a network b. determine the formatting of logical addresses c. determine the formatting of packet headers d. determine whether a router is functioning correctly 74. Wireless signals may be subject to reflection, which refers to signals: a. bouncing back to the source b. splitting into secondary waves c. diffusing in multiple different directions d. being absorbed by obstacles 75. What is the maximum segment length for twisted pair cables? a. 10m b. 30m c. 100m d. 300m

Page 11

CP1402/1802/5631 sample questions 76. A topology that combines together various other topologies is known as a ____ topology. a. combination b. multiplex c. hybrid d. complex 77. In IPv6, normally the first ____ bits identify the network. a. 32 b. 48 c. 64 d. 96 78. What statement regarding main distribution frame or main distribution facilities is accurate? a. The MDF and entrance facility are always in separate rooms. b. The MDF refers to the racks holding network equipment in an organization. c. The MDF provides intermediate connection between the IDF and end-user equipment on each floor. d. The MDF is the centralized point of interconnection for an organization's LAN or WAN. 79. What is the default subnet mask for a class C network? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255 80. The header of an Ethernet frame: a. signals to the receiving node that the bytes following are the actual frame b. provides the MAC address of the source and destination nodes c. specifies the transport layer protocol carried in the frame d. ensures that the data the destination exactly matches the data issued from the source 81. What statement correctly identifies the purpose of a software patch? a. A software patch is a correction, improvement, or enhancement to software. b. A software patch is a major change to a software package that enhances the functionality and features

of the software, while also correcting bugs and vulnerabilities. c. A software patch involves the process of reverting to a previous version of software after attempting to upgrade it. d. A software patch is a container for new software, and must be installed on relevant devices and incorporated with network resources. 82. In cloud computing terminology, IaaS refers to: a. Infrastructure as a Service b. Internet as a Service c. Integration as a Service d. Internationalisation as a Service Page 12

CP1402/1802/5631 sample questions 83. In IPv4, a subnet mask is used to determine _______. a. the network portion of an IP address b. the host portion of an IP address c. the destination MAC address d. the source MAC address 84. IP is __________ and ___________. a. unreliable, connectionless b. reliable, connectionless c. unreliable, connection-oriented d. reliable, connection-oriented 85. Which of the following is not a wireless technology used to connect PAN devices? a. bluetooth b. infrared (IR) c. near-field communication (NFC) d. Wi-Max 86. Ethernet uses _______ transmission. a. broadband b. baseband c. wideband d. narrowband 87. What kind of document serves as a legally binding contract or part of a contract that defines, in plain

language and in measurable terms, the aspects of a service provided to a customer? a. statement of work b. memorandum of understanding c. service-level agreement d. master service agreement 88. Which subnet mask below is equivalent to /24 in CIDR notation? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.24 89. The 1000Base-T Ethernet standard specifies a maximum throughput of: a. 1000 bps (kilobit) b. 1000 Kbps (megabit) c. 1000 Mbps (gigabit) d. 1000 Gbps (terabit)

Page 13

CP1402/1802/5631 sample questions 90. Which of the following describes the broadcast address on a IPv4 network? a. all host bits set to 1 b. all host bits set to 0 c. final octet is always 255 d. router defined - can be anything 91. Which of these routing protocols is not used within an autonomous system? a. BGP b. IS-IS c. OSPF d. RIP 92. Which of the following is false? a. bridging tables associate interfaces (ports) and MAC addresses b. bridging tables are used by switches c. bridging tables are used by hubs d. bridging tables are initially empty and are created by learning from traffic on the network 93. Ethernet exists at which layers of the OSI model? a. Layer 1 & 2 b. Layer 2 & 3 c. Layer 3 & 4 d. Layer 4 & 5 94. Which of the following is an advantage of fibre-optic cable over copper cable? a. less expensive b. able to carry signals for longer distances c. easier to install d. can plug directly into most workstations 95. What are the last two parts of a host name known as? a. top level domain b. fully qualified domain name (FQDN) c. domain name d. host qualifier 96. The major difference between IPv4 and IPv6 is that: a. IPv6 is a Transport layer protocol b. IPv6 can carry more types of data than IPv4 c. IPv6 has a much larger address space d. IPv6 uses domain names directly, rather than numeric addresses

Page 14

CP1402/1802/5631 sample questions 97. The TLD (top-level domain) in http://www.google.com is: a. http b. www c. google d. com 98. The subnet mask 255.0.0.0 is equivalent to ________. a. /8 b. /16 c. /24 d. /255 99. What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. arp b. ifconfig c. ping d. route 100. Which of the following is the most widely used networking medium for modern Ethernet LANs? a. twisted pair cable b. coaxial cable c. fibre-optics d. infrared 101. UDP is preferable to TCP for: a. live video or audio b. email c. downloading files d. secure applications 102. What do the first 24 bits of a MAC address represent? a. Organizationally Unique Identifier b. device ID c. extension ID d. network ID 103. A port number, which identifies an application on a host, exists at what level of the OSI model? a. Application b. Transport c. Network d. Data link

Page 15

CP1402/1802/5631 sample questions 104. _____ extend collision domains. a. hubs and repeaters b. only repeaters c. only hubs d. hubs, repeaters, and switches 105. The ______ layer is responsible for breaking down application layer data and ensuring it crosses the network reliably. a. Network b. Transport c. Data link d. Presentation 106. Wireless signals may be subject to diffraction, which refers to signals: a. bouncing back to the source b. splitting into secondary waves c. diffusing in multiple different directions d. being absorbed by obstacles 107. Wireless signals may be subject to scattering, which refers to signals: a. bouncing back to the source b. splitting into secondary waves c. diffusing in multiple different directions d. being absorbed by obstacles 108. The smallest network is a ______________________, which is a network of personal devices, such as the network you use when you sync your mobile phone and your computer. a. PAN (Personal Area Network) b. LAN (Local Area Network) c. SAN (Small Area Network) d. MAN (Mobile Area Network) 109. The segment is the protocol data unit (PDU) for: a. TCP b. UDP c. Network layer d. Data link layer 110. The data field in an Ethernet frame must be at least ___ bytes long. a. 12 b. 46 c. 384 d. 1500

Page 16

CP1402/1802/5631 sample questions 111. ____ extend broadcast domains. a. hubs and repeaters b. only repeaters c. only hubs d. hubs, repeaters, and switches 112. Which tool could you use to identify which application is using a particular port number? a. netstat b. ipconfig c. ping d. tracert 113. The _____ layer describes how data between applications is synced an...


Similar Free PDFs