Introduction to Networking

kindlyminnowNetworking and Communications

Oct 26, 2013 (3 years and 11 months ago)

136 views

Introduction to Networking

Study Guide 2



This word document was downloaded from
http://www.worddocx.com/

please remain this
link
information when

you

reproduce , cop
y
, or use

it.

<a href='http://www.wordwendang.c
om/en'>word documents</a>




Multiple Choice Questions:


1.

The protocol field (indicating the protocol being transported) in an IP
datagram will most likely contain a value corresponding to:

a.

Transmission Control Protocol

b.

Internet Protocol

c.

Logical Link Contr
ol Protocol

d.

FTP

e.

TELNET


2.

The TCP/IP protocol is primarily concerned with the following layers of the
OSI model:

a.

1 and 2

b.

2 and 3

c.

3 and 5

d.

3 and 4

e.

1, 2, 3 and 4


3.

The primary reason a jamming message is sent out over the Ethernet is
to:

a. Warn other stations t
hat a collision has been detected.

b. To corrupt the preamble of the incoming MAC frame.

c. Resynchronize all of the stations on the local Ethernet.

d. A jamming message is the same as the MAC preamble.

e. To make sure that all remote stations have receive
d the previous frame.


1.

Which of the following is NOT true of Ethernet:

a.

Ethernet (CSMA/CD) becomes more efficient as the traffic
increases

b.

Ethernet can use 10base5, 10base2, and Twisted Pair at the
physical layer.

c.

MAC frames are transmitted across the physi
cal media.

d.

Is also referred to as the 802.3 standard.

e.

None of the above (all statements are true).


2.

The binary equivalent of the internet address 127.7.55.8 is:

a.

10000000 00000111 01101100 00000011

b.

10000000 00000110 01110111 00000101

c.

01111111 00000111 00110
111 00001000

d.

01111111 00000111 00111110 00000011

e.

01111111 00000111 00110111 00010000





3.

Which of the following statements(s) is NOT true of a data packet:

a.

Packets are generated at the network layer of the protocol stack.

b.

Packets are always broken up by th
e Data Link layer before
transmission.

c.

The header of a packet is generally referred to as the Network
header.

d.

Packets are point to point only.

e.

Both b and d.


4.

Which of the following statements are true:

a.

Frames are generated at the Data Link layer.

b.

Frames co
ntain both headers and trailers.

c.

Packets are generated at the Network Layer.

d.

Datagrams are generated at the Network Layer.

e.

All of the above


5.

Which of the following is an example of decapsulation:

a.

Adding the Session Layer header to the Application Layer dat
a and
Application Layer header.

b.

Stripping the transmission header from an outgoing frame.

c.

Stripping the header and trailer from an incoming MAC frame.

d.

Adding parity to an incoming frame.

e.

Removing the preamble of a MAC frame before passing the data to
the N
etwork Layer.


6.

Which network layer normally contains both a header and a trailer?

a.

Transport

b.

Network

c.

Data Link

d.

Physical


7.

In a client/server environment, what is the name of the software which
determines the destination of a users request for LAN services?

a.

R
edirector

b.

Initiator

c.

IP

d.

IPX


8.

UNIX ships with which of the following protocols:

a.

TCP/IP

b.

SPX/IPX

c.

VIP/IP

d.

SNA/DECnet



9.

Which of the following statements is true?

a.

IP is encapsulated by TCP

b.

UDP is encapsulated by TCP

c.

Ethernet is encapsulated by IP

d.

TCP is encapsula
ted by IP


10.

Which network layer protocol is the Internet based on (circle the best
answer)?

a.

TCP

b.

IP

c.

IPX

d.

UDP


11.

What layer of software is normally loaded on the NIC card (circle the best
answer)?

a.

Physical

b.

Data Link

c.

Network

d.

Transport


12.

What are the transport and
network layer protocols typically implemented
in a Novell NetWare network (circle the best answer)?

a.

TCP/UDP

b.

SPX/IPX

c.

PU/LU

d.

Ethernet and Token Ring


13.

Which of the following is NOT a protocol (circle the best answer)?

a.

TCP

b.

UDP

c.

IPX

d.

SNA


14.

What unit of information
does a router operate on (circle the best answer)?

a.

bit

b.

byte

c.

frame

d.

packet

e.

socket


15.

What unit of information does a bridge operate on (circle the best
answer)?

a.

bit

b.

byte

c.

frame

d.

packet

e.

socket


16.

Which is the fastest line speed (circle the best answer):

a.

T1

b.

SONET

c.

25
6Kbps

d.

512Kbps


17.

Which of the following are found at the network layer of a protocol stack
(circle the best answer):

a.

Datagram or Packet

b.

Frame

c.

Bit or Byte

d.

LU


18.

Which of the following best describes the function of a MAC layer address
(circle the best answer):

a.

Gets a frame to the next NIC

b.

Gets a packet to the correct port

c.

Gets a frame to the final destination

d.

Gets a frame to the correct socket


19.

What type of device is used with UTP cabling to create a star network
configuration?

a.

router

b.

gateway

c.

hub

d.

bridge


20.

What do
es NIC stand for?

a.

Network Interface Control

b.

Network Interface Card

c.

National Institute for Communications

d.

Network Interface Carrier


21.

What is the most widely installed LAN technology?

a.

Ethernet

b.

Token Ring

c.

ARCnet

d.

FDDI


22.

The ___________ is used to store frequent
ly accessed data and
instructions.

a.

hard drive

b.

RAM

c.

internal cache memory

d.

ROM


23.

This type of ROM memory chip is erasable using software tools, and is
most commonly used for BIOS chips.

a.

PROM

b.

ROM

c.

EPROM

d.

EEPROM


24.

PCI has a bus width of _____________ bits.

a.

32

b.

16

c.

64

d.

8


25.

Which of the following is NOT a common internal component considered
with Personal Computers:

a.

CPU type

b.

Applications Compatibility

c.

Supported Device Drivers

d.

Cluster controllers


26.

The two basic characteristics that differentiate microprocessors are:

a.

bandwi
dth and CPU type

b.

bandwidth and processor clock speed

c.

processor clock speed and CPU type

d.

processor type and CPU type


27.

A computer’s internal storage area is referred to as:

a.

Input/Output

b.

RAM

c.

Hard Disk

d.

Micro Channel


28.

The device that provides one or more servic
es to clients in a network is
referred to as a:

a.

CPU

b.

Server

c.

Device Driver

d.

System Software


29.

A continuous electrical signal that travels along a communications channel
is referred to as what type of signal:

a.

Digital

b.

Fiber Optic

c.

Copper

d.

Analog



30.

The endpoints of

a computer network are can be which of the following:

a.

PC

b.

Workstation

c.

Mainframe

d.

All of the above


31.

One advantage of a mainframe computer over a PC is:

a

Cost

b

High Availability

c

Easy Installation

d

Inexpensive software


32.

Which of the following would most likely ha
ve the highest bandwidth?

a.

8
-
bit ISA bus

b.

16
-
bit ISA bus

c.

EISA bus

d.

PCI bus


33.

The main memory of a computer is also referred to as:

a.

ROM

b.

EPROM

c.

RAM

d.

PROM


34.

The PC hardware component that a networking cable plugs into is referred
to as a:

a.

NIC

b.

MAU

c.

Hub

d.

RJ
-
45


35.

The char
acteristic of an operating system that allows more than one user
to run a program on the same computer is:

a.

Multitasking

b.

Multiprocessing

c.

Multithreading

d.

Multi
-
user


36.

The function of an operating system is to:

a.

Provide interpretation of network events

b.

Perform t
he basic tasks of a computer

c.

Provide for high speed memory transfers

d.

Provide word processing capabilities





37.

Which of the following best typifies a broadband signal network?

a.

Digital to digital

b.

Optimum for video transmission

c.

One
-
way transmission

d.

Digital to

Binary


38.

Which of the following best typifies a typical broadband signal?

a.

Digital to analog

b.

Broadcast one way

c.

Higher frequency ranges

d.

Analog to digital


39.

When is UTP cable preferred over STP?

a.

When there is little electrical interference

b.

When cost is no obje
ct

c.

When going long distances

d.

When a fire hazard exists


40.

Which connector type is associated with Thinnet coaxial cable?

a.

RJ
-
45

b.

RG
-
58

c.

BNC

d.

RS
-
232


41.

Which are considered advantages of star topology?

a.

Redundancy

b.

Ease of management

c.

Minimize cable requirements

d.

High
immunity to noise


42.

Which statement best describes the relationship between services and
protocols?

a.

Services allow protocols to get where they are going.

b.

A protocol provides a service.

c.

Multiple services can make up a protocol.

d.

All of the above


43.

What purpose

do protocols serve in computer networking?

a.

Decide who gets information first

b.

Decide how computers perform internal processing

c.

Provide rules for communicating computers

d.

Decide how fast computers can send and receive data






44.

A process in one computer that

has the same functionality as a process in
another computer is considered a:

a.

client

b.

peer

c.

server

d.

none of the above


45.

The information that is sent along with data to provide information about
the data is referred to as a:

a.

Protocol header

b.

Protocol translator

c.

Protocol stack

d.

Character provider


46.

Communication programs are arranged in layers to:

a.

reduce the overall complexity of the communication programs

b.

to provide error
-
free service to the application

c.

to tell the sender the address of the receiver

d.

none of the abo
ve


47.

Which of the layers below is most concerned with getting a packet through
a network from source, through intermediate hops, to the final destination:

a.

Transport

b.

Network

c.

Data Link

d.

Physical


48.

The primary difference between a packet and a datagram is:

a.

A pac
ket is usually acknowledged, a datagram is not.

b.

A packet is generated at the Network Layer, a datagram is not.

c.

A datagram usually refers to TCP, a packet to IP.

d.

A packet is connectionless, a datagram is connection
-
oriented.


49.

Which of the following is a con
cern at the physical layer.

a.

Whether or not the data is ASCII or EBCDIC.

b.

How a binary zero is represented versus a binary one.

c.

The error free delivery of frames.

d.

The length of a packet.


50.

While a packet is traversing a network, the intermediate nodes between

the source and destination will deal with which protocol layers:

a.

From Presentation Layer down

b.

From Session Layer down

c.

From Transport Layer down

d.

From Network Layer down



51.

Which of the following is NOT true:

a.

A message is broken up into packets at the Networ
k Layer.

b.

A packet is broken up into MAC frames at the Data Link Layer.

c.

A packet is broken up into Data Link frames at the Data Link Layer.

d.

Data Link frames are broken up into packets at the Network Layer.


52.

The contents of a MAC frame going from source to d
estination on a single
LAN are:

a.

The application data plus the network layer header and trailer.

b.

The application data plus the headers from the protocol layers
above the transport layer.

c.

The application data plus all the headers in the protocol stack.

d.

Only
the MAC header, trailer and application data.


53.

Which of the following is NOT a concern at the physical layer?

a.

The representation of binary data

b.

The timing of the binary data

c.

The number of bits in a byte

d.

The voltage level of each bit

e.

The gauge of the wire
used to transmit the data


54.

Which of the following is true of the Data Link layer:

a.

Frames are generated at the Data Link layer.

b.

Frames contain both headers and trailers.

c.

The data unit of a frame contains the application data plus all
headers from the layers

above the data link layer.

d.

All of the above.


55.

One of the services provided by the Data Link Layer to the Network Layer
is:

a.

The delivery of the network layer information to the next node in the
network.

b.

The delivery of the network layer information to the
final destination
in the network.

c.

The delivery of the application layer information to the final
destination in the network.

d.

The error
-
free delivery of the application data.


56.

A message, packet, and a frame refer to the following three layers (in
order):

a.

Pr
esentation, Session, Transport.

b.

Session, Transport, Network.

c.

Transport, Network, Data Link.

d.

Network, Data Link, Physical.




57.

Which of the following is an example of encapsulation:

a.

Stripping the header and trailer from an incoming frame.

b.

Putting a header an
d a trailer on an outgoing message.

c.

Putting a header and a trailer on an outgoing frame.

d.

Stripping a header and a trailer from an incoming message.


58.

Which OSI model layers are concerned primarily with applications?

a.

All seven

b.

The top three

c.

The lower four

d.

Th
e bottom two layers


59.

A purpose of the OSI model is to provide:

a.

A standard for the software/networking industry

b.

A standard for the hardware/networking industry

c.

A reference for network end users

d.

All of the above


60.

Which activities best describe an Application

Layer function?

a.

Network management software

b.

E
-
mail program

c.

Web browser

d.

All of the above


61.

The OSI model Presentation Layer:

a.

Manages the way computers read information

b.

Is where information can be scrambled

c.

Is concerned with the order of bytes and integers

d.

A
ll of the above


62.

Compressed data is a function of:

a.

Application Layer

b.

Session Layer

c.

Presentation Layer

d.

Network Layer


63.

The Session Layer is concerned with:

a.

Managing dialog

b.

Beginning dialog

c.

Ending dialog

d.

All of the above


64.

What is the primary purpose of a Tran
sport Layer protocol?

a.

Transmit bits across a physical link

b.

Transmit frames across a physical link

c.

Transmit packets across a network

d.

Transmit messages from process to process

65.

Which layer uses software ports for communication?

a.

Session Layer

b.

Transport Layer

c.

A
pplication Layer

d.

Presentation Layer


66.

Which of the following is an example of a Transport Layer protocol?

a.

Ethernet

b.

IP

c.

TCP

d.

RS
-
232

e.

SPX


67.

As the Transport Layer is to a message, the Network Layer is to a:

a.

Server

b.

WAN

c.

Ethernet

d.

Packet


68.

What is an example of a Netw
ork Layer protocol?

a.

Ethernet

b.

IP

c.

TCP

d.

RS
-
232


69.

What is the primary purpose of a Network Layer protocol?

a.

Transmit bits across a physical link

b.

Transmit frames across a physical link

c.

Transmit packets across a network

d.

To get frames across a network


70.

What is the p
rimary purpose of a Data Link Layer protocol?

a.

Transmit bits across a physical link

b.

Transmit frames across a physical link

c.

Transmit packets across a network

d.

To get frames across a WAN


71.

The Network Layer is to packets... as the Data Link Layer is to:

a.

Frames

b.

Signals

c.

Protocol suites

d.

Datagrams






72.

What device frames a packet?

a.

Media adapter unit

b.

Node port

c.

Network Interface Card

d.

Hub


73.

What is the primary purpose of a Physical Layer protocol?

a.

Transmit bits across a physical link

b.

Transmit frames across a physical li
nk

c.

Transmit packets across a network

d.

Transmit bits across a network


74.

What will not occur on a Physical Layer?

a.

Collisions

b.

Two
-
way traffic

c.

Rerouting of information

d.

Repeating of digital information


75.

Which of the following is an example of decapsulation:

a.

Strip
ping the header and trailer from an incoming frame.

b.

Putting a header and a trailer on an outgoing message.

c.

Putting a header and a trailer on an outgoing frame.

d.

Stripping a header and a trailer from an incoming message.


76.

Which of the layers below is most co
ncerned with getting a message
through a network from source, through intermediate hops, to the final
destination:

a.

Application

b.

Network

c.

Data Link

d.

Physical


77.

Which of the following is a concern at the physical layer.

a.

Whether or not the data is ASCII or EBCDIC
.

b.

How a binary zero is represented versus a binary one.

c.

The error free delivery of frames.

d.

Where a frame starts and ends.


78.

While a packet is traversing a network, the intermediate nodes between
the source and destination will deal with which protocol layer
s:

a.

From Presentation Layer down

b.

From Session Layer down

c.

From Transport Layer down

d.

From Network Layer down




79.

A router normally operates at which of the following layers of the OSI
model:

a.

Data Link

b.

Network

c.

Transport

d.

Session


80.

A bridge normally operates at wh
ich of the following layers of the OSI
model:

a.

Data Link

b.

Network

c.

Transport

d.

Session


81.

A switch normally operates at which of the following layers of the OSI
model:

a.

Data Link

b.

Network

c.

Transport

d.

Physical



82.

A repeater normally operates at which of the following l
ayers of the OSI
model:

a.

Data Link

b.

Network

c.

Transport

d.

Physical



83.

A hub normally operates at which of the following layers of the OSI model:

a.

Data Link

b.

Network

c.

Transport

d.

Physical


84.

A repeater is also referred to as a:

a.

regenerator

b.

amplifier

c.

multiplexer

d.

inverse m
ultiplexer


85.

A repeater repeats:

a.

frames

b.

packets

c.

datagrams

d.

bits


86.

A switch switches:

a.

frames

b.

packets

c.

bits

d.

sockets


87.

A Data Link Layer internetworking device would NOT be used in which of
the following circumstances:

a.

frame conversion

b.

convert between twisted pair

and coax cables

c.

wide area connectivity

d.

traffic isolation


88.

The most complex internetworking device is the:

a.

repeater

b.

hub

c.

switch

d.

gateway


89.

In what two ways is the term gateway used:

a.

as a router and a switch

b.

as a router and a protocol converter

c.

as a protocol c
onverter and a switch

d.

as a switch and a repeater


90.

Which OSI layer do hubs and repeaters operate at?

a.

Physical Layer

b.

Network Layer

c.

Transport Layer

d.

Session Layer


91.

Which of the following is a function of hubs and repeaters?

a.

Provide for cable extension

b.

Repeat d
igital signals

c.

Interconnect different cable types

d.

All of the above


92.

Why shouldn’t hubs and repeaters be used to interconnect LANs?

a.

They are too expensive.

b.

They are too powerful.

c.

They do not manage traffic efficiently enough.

d.

They do not extend the physical

segment adequately





93.

Which scenario requires a gateway?

a.

Interconnecting an IP network to an AppleTalk network

b.

Interconnecting an IP network to an IP network

c.

Interconnecting three IP networks together

d.

Interconnecting a coax network to a UTP
-
cabled networ
k


94.

What do bridges require that hubs and repeaters do not?

a.

Hardware

b.

Address tables

c.

Two segments

d.

All of the above


95.

Bridges are needed in which of the following situations?

a.

Too much traffic on the LAN

b.

Remote connection of two LANs is necessary

c.

Isolation of t
raffic on a busy LAN

d.

All of the above


96.

What distinguishes routers from bridges?

a.

Routers operate on packets.

b.

Routers are for WANs only.

c.

Routers are less expensive.

d.

Bridges are less efficient


97.

Which of the following is not a LAN communication process?

a.

Peer t
o peer

b.

Client to server

c.

Client to peer

d.

Interactive to Animated


98.

Which of the following are primary functions of the server platform?

a.

Preemptive multitasking

b.

Shared memory

c.

Protected memory

d.

All of the above


99.

Ethernet operates at all of the following speeds e
xcept:

a.

16Kbps

b.

10Mbps

c.

1Gbps

d.

100Mbps


100.

By far the most popular LAN Data Link Layer Technology is:

a.

Token Ring

b.

FDDI

c.

SNA

d.

Ethernet


101.

An Ethernet LAN that uses coaxial cabling as the physical media is
referred to as a:

a.

Star

b.

Star/Ring

c.

Bus

d.

Ring


102.

An Ethernet LAN that
uses UTP cabling as the physical media is referred
to as a:

a.

Star

b.

Star/Ring

c.

Bus

d.

Ring


103.

The CD is CSMA/CD refers to the ability of an Ethernet node to do which
of the following:

a.

Access the physical media

b.

Detect frame collisions

c.

Detect node failures

d.

Sense an e
lectrical signal


104.

The CS is CSMA/CD refers to the ability of an Ethernet node to do which
of the following:

a.

Access the physical media

b.

Detect frame collisions

c.

Detect node failures

d.

Sense an electrical signal


105.

Which of the following devices isolate traffic in

an Ethernet network:

a.

Bridge

b.

Switch

c.

Router

d.

All of the above


106.

Performance will most likely increase in an Ethernet network when:

a.

Switches are replaced by hubs

b.

Routers are replaced by hubs

c.

Switches are replaced by routers

d.

Hubs are replaced by switches


107.

Which

of the following are differences between peer
-
to
-
peer and
client/server traffic:

a.

Both are identical

b.

Clients initiate the request in a client/server network

c.

Peer
-
to
-
peer networks require a standalone hub

d.

Peer
-
to
-
peer networks require a NIC


108.

A PC becomes a
server by adding which of the following:

a.

A NIC

b.

UTP cabling

c.

A NOS

d.

Communication software


109.

Which of the following is NOT a NOS:

a.

NetWare

b.

NT

c.

AppleTalk

d.

SNA


110.

The defacto standard for Application interfaces in many LANs is:

a.

TCP

b.

IP

c.

NetBIOS

d.

SMB


111.

Which of the follow
ing protocols would be responsible for moving
packets across a TCP/IP network:

a.

TCP

b.

IP

c.

SMB

d.

NetBIOS


112.

Which of the following is true:

a.

IP encapsulates Ethernet

b.

Ethernet encapsulates IP

c.

TCP encapsulates IP

d.

SMB encapsulates Ethernet


113.

Which of the following heade
rs is used to create a message:

a.

Ethernet

b.

IP

c.

TCP

d.

SMB


114.

The unit of information used by an ATM network is the:

a.

frame

b.

packet

c.

cell

d.

message





115.

Another name for a central office is a:

a.

local exchange

b.

private branch exchange

c.

local loop

d.

multiplexer


116.

The primary dif
ference between a public and private network is:

a.

Who owns and maintains the network

b.

The distance between communicating devices

c.

The cost of the equipment

d.

The number of nodes in the network


117.

What distinguishes a LAN from a WAN or MAN?

a.

Distance

b.

Use of public
systems

c.

Use of routers, modems, and bridges

d.

All of the above


118.

Which of the following is not a WAN connection type?

a.

Leased

b.

Public data

c.

Dial
-
up

d.

Ethernet


119.

Which of the following devices are NOT used to connect a LAN to a
WAN

a.

Bridges

b.

Routers

c.

Modems

d.

Hubs


120.

Which

of the following WAN services usually provides the highest
bandwidth:

a.

T1

b.

T3

c.

DDS

d.

SONET


121.

One disadvantage to using modem technology is:

a.

cost

b.

Any
-
to
-
any connectivity

c.

Transfer rate

d.

Availability of equipment





122.

Fractional T1 might be used instead of T1 becaus
e of

a.

Cost

b.

Speed requirements

c.

Ease of use

d.

Equipment availability


123.

An ATM cell is small and can therefore be

a.

slow

b.

fast

c.

expensive

d.

hard to manage


124.

Normally, the portion of a WAN that is analog is

a.

trunk lines between central offices

b.

computer to modem cable

c.

loca
l loop

d.

LAN


125.

Microwave systems are often used instead of land lines because of

a.

right
-
of
-
way issues

b.

cost issues

c.

speed issues

d.

compatibility issues



True/False Questions


1.

The job of a repeater is to filter out the bits that would cause errors to be
repeated.


2.

A repeater is used to extend the length of a cable segment to any length
the user requires.


3.

A repeater is a passive device.


4.

A repeater can be used to connect Ethernet and Token Ring seg
-
ments.


5.

Traffic isolation is one of the chief advantages of usin
g repeaters.


6.

Repeaters and hubs operate at the Physical Layer of the OSI model.


7.

An example of a managed hub is one with front
-
panel LEDs.


8.

Bridges can be used to connect LAN segments located in the same
building, as well as LAN segments 1,000 miles apar
t.


9.

Unlike a repeater, a bridge can connect an Ethernet LAN to a Token Ring
LAN.


10.

When a three
-
port bridge does not know the destination port to send a
frame, it tries Port 1 first.


11.

A switch is used for traffic isolation, but a bridge does not have thi
s
capability.


12.

Routers can connect networks with different Layer 3 architectures.


13.

A gateway performs the same functions as a router.


14.

Gateways might convert all seven layers of the OSI model.


15.

A gateway must use the same Data Link Layer protocol when c
on
-
verting
between architectures.


16.

A gateway is a type of protocol converter.


It will typically take less time for information to go through a gate
-
way than a
repeater.


This word document was downloaded from
ht
tp://www.worddocx.com/

please remain this
link
information when

you

reproduce , cop
y
, or use

it.

<a href='http://www.wordwendang.com/en'>word documents</a>


17.