Multiple Choices Practice 1
Multiple Choices Practice 1
1.
When getting specific, a frame represents information used in conjunction with ____ of the
OSI model.
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
5.
1
7.
Refer to the exhibit. How many Collision Domain are there in this exhibit?
A. 3
B. 4
C. 5
D. 6
9.
Refer to the exhibit. How many Broadcast Domain are there in this exhibit?
2
A. 4
B. 5
C. 3
D. 6
12.
The ____ layer offers a way to set up half- and full-duplex communications.
A. Session
B. Network
C. Communications
D. Transport
3
13.
You are a network technician assigned to install a new network Router. Which layer of the
OSI model does a standard router operate at?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
15.
____ is/are usually used to connect computers that demand high-speed LAN and WAN
access.
A. Coaxial cable
B. Fiber-optic cable
C. Twisted pair cable
D. Wireless technologies
17.
While undergoing a security audit, a network administrator is told to set up the WLANs wi
th at least 128 bit encryption but also keeping the 802.11n speeds. What WLAN configurat
ion would meet the requirements?
A. Static WEP
B. WPA-TKIP
C. WPA2-AES
D. CKIP
20.
5
21.
Which device should be used for enabling a host to communicate with another host on a
different network?
A. switch
B. repeater
C. router
D. bridge
22.
Which two Internet connection options do not require that physical cables be run to the
building? (choose two.)
A. DSL
B. cellular
C. satellite
D. dialup
23.
A host needs to request an IP address. What protocol would be used to process the request?
A. FTP
B. HTTP
C. DHCP
D. ICMP
24.
What command can be used to test connectivity between two computers that are attached
to a network?
A. ipconfig
B. ping
C. msconfig
D. test connect
26.
What is the general term that is used to describe a piece of data at any layer of a
networking model?
A. frame
B. packet
C. protocol data unit
D. segment
6
27.
Which layer of the OSI model is responsible for specifying the encapsulation method used
for specific types of media?
A. application
B. transport
C. data link
D. physical
32.
What are two reasons a network administrator might want to create subnets? (choose two.)
A. reduction in number of routers needed
7
B. improves network performance
C. reduction in number of switches needed
D. easier to implement security policies
34.
What is the purpose of the subnet mask in conjunction with an IP address?
A. to uniquely identify a host on a network
B. to identify whether the address is public or private
C. to mask the IP address to outsiders
D. to determine the subnet to which the host belongs
35.
A student is having problems accessing the myDTU website. The command ping
mydtu.duytan.edu.vn fails. However, pinging the ip address of mydtu.duytan.edu.vn with
the command ping 103.7.177.13 is successful. What is the problem?
A. The web server is down
B. The default gateway is incorrect
C. There is a problem with DNS
D. The address of the ARP cache is incorrect
38.
What is one advantage of using fiber optic cabling rather than copper cabling?
A. It is usually cheaper than copper cabling
B. It is easier to terminate and install than copper cabling
C. It is able to be installed around sharp bends
D. It is able to carry signals much farther than copper cabling
8
40.
When getting specific, a packet represents information used in conjunction with ____ of
the OSI model.
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
42.
____ can determine the shortest path between two computers separated by LANs or by
WANs.
A. Bridges
B. Routers
C. Gateways
D. Repeaters
43.
Flow control software and capabilities are found in the ____ layer of the OSI model.
A. Network
B. Session
C. Transport
D. Data Link
44.
The capacity of a channel to transmit data in terms of given speeds, such as 100Mbps, is its
____.
A. throughput
B. bandwidth
C. transmission speed
D. attenuation
45.
9
46.
Which service listed below is used to resolve IP addresses and domain names?
A.DNS
B.DHCP
C.ARP
D.TCP
49.
Which of the following layers contains a number of protocols that provide services, such as
e-mails, Web browsing, and remote login by users?
A.Internet layer.
B.Transport layer.
C.Network Access layer.
D.Application layer.
51.
10
C. Communications
D. Transport
52.
You are designing a new network and are concerned about interference from other wires.
Which of the following is most susceptible to transmission errors due to crosstalk?
A. Coaxial
B. UTP
C. STP
D. Fiber optic
53.
Which command can be used from a PC to verify the connectivity between hosts that
connect through a switch in the same LAN?
A. ping address
B. tracert address
C. traceroute address
D. arp address
54.
Which subnet mask would be appropriate for a network address range to be subnetted for
up to 8 LANs, with each LAN containing 5 to 26 hosts?
A. 0.0.0.240
B. 255.255.255.252
C. 255.255.255.0
D. 255.255.255.224
55.
You are designing a new network for DTU. Cabling will have to run along the ceiling,
where there are a significant number of florescent lights. You are concerned about
interference from these lights. Which of the following cable types could be used, which
would not be susceptible to this type of interference?
A. Coaxial
B. UTP
C. STP
D. Fiber optic
56.
Your network uses vampire taps and AUI connectors to access data from the network
cable. Which of the following cabling types is being used?
A. Thinnet
B. Thicknet
C. STP
D. Fiber optic
11
57.
You are designing a 10Base2 network. In creating this network, what distance limitation
will you be facing when installing the cabling?
A. 100 m
B. 185 m
C. 500 m
D. 2 km
58.
You have been hired by a small company to cable its network. The company has offices in
two buildings that are 300 m apart. Both of the offices have about 15 computers and the
numbers are expected to grow in near future. All of the computers are within 90 m of one
another. You need to decide on the cabling that will be used both in the individual
buildings, and which will be used to connect the buildings LANs together. Which of the
following will you do?
A. Use UTP cabling in each of the buildings, and connect the two buildings together using
10BaseT cabling.
B. Use fiber-optic cabling in each of the buildings, and connect the two buildings together
using 10Base2 cabling.
C. Use 10BaseT cabling in each of the buildings, and connect the two buildings together
using 10Base5 cabling.
D. Use 100BaseFX cabling in each of the buildings, and connect the two buildings together
using 10BaseT cabling.
59.
Your network uses 100BaseFX so that data can be transferred at higher speeds and up to
distances of 400 m. During transmission, data can travel in both directions, but only in one
direction at a given time. Which of the following transmission methods is used?
A. Simplex
B. FireWire
C. Half-Duplex
D. Full-Duplex
60.
Your network uses UTP cabling in a star topology. Which of the following types of
connectors is being used?
A. RJ-45
B. BNC
C. ST
D. SC
61.
As a Network technician for 123 LLC, you are asked by your CIO about the access method
of Gigabit Ethernet. Which of the following access methods does Gigabit Ethernet use?
A. FDDI
B. CSMA/CD
12
C. CSMA/CA
D. Token passing
62.
A new technician for 123 Corp plans out the maximum length of a Gigabit Ethernet
segment using MMF optic cable is. What is the correct distance?
A. 100 m
B. 125 m
C. 550 m
D. 10 km
63.
You are the network engineer assigned to implement a new 100 Mbps network connection.
You need to select the correct cabling, as well as the correct standard. From the selections
below, choose which 100 Mbps networking standard makes use of only two pairs of a
Category 5 UTP cable.
A. 10BaseT
B. 100BaseFL
C. 100BaseTX
D. 100BroadT4
64.
Identify which of the services below uses both TCP and UDP ports.
A. FTP
B. TFTP
C. DNS
D. SSH
65.
13
D. 25.255.255.0
14
1.
List ten devices that can be considered end devices and intermediary devices
on a network (list five for each type).
Ans: End devices: Laptop, PC/desktop, server, printer, phone, tablet, smart TV,
VoIP phone, …
Intermediary devices: Router, switch, hub, repeater, bridge, gateway, …
2.
Refer to the model: PC-----1-----Switch-----2-----Router-----3-----PC. The PC is
connected to the console port of the switch. All the other connections are made
through FastEthernet links. Which types of cables 1, 2 and 3?
Ans: Cable 1: Rollover
Cable 2: Ethernet Straight-through
Cable 3: Ethernet Crossover
3.
List the layers of the OSI model from top to bottom, and the layers of the
TCP/IP model from bottom to top.
Ans: The layers of the OSI model from top to bottom: Application, Presentation,
Session, Transport, Network, Data Link, Physical.
The layers of the TCP/IP model from bottom to top: Network Access, Internet,
Transport, Application.
4.
What four protocols needed for communication between a web server and web
client?
Ans: HTTP, TCP, IP, Ethernet
5.
What will happen if the default gateway address is incorrectly configured on a
host?
Ans: The host cannot communicate with hosts in other networks.
6.
Match the function to the name of the application.
a. DHCP 1. allows viewing of messages on email clients
b. DNS 2. displays web pages
c. IMAP 3. sends email messages
d. HTTP 4. dynamically assigns IP address to clients
e. SMTP 5. maps URLs to numerical addresses
Ans: a4, b5, c1, d2, e3
7.
A new office building of DTU is being constructed at 03 Quang Trung St. and
will be finished this year. Currently DTU uses the 10.10.0.0/20 address
space.How many valid host addresses are available within the DTU network
10.10.0.0/20?
Ans: 212 – 2 = 4096 – 2 = 4094.
8.
A new office building of DTU is being constructed at 03 Quang Trung St. and
will be finished this year. Currently DTU uses the 10.10.0.0/16 address space.
How many valid host addresses are available within the DTU network
10.10.0.0/16?
Ans: 216 – 2 = 65536 – 2 = 65534.
9.
A new office building of DTU is being constructed at 03 Quang Trung St. and
will be finished this year. The building is planned to install 1,000 devices
(hosts) for staff. Currently DTU uses the 10.10.0.0/16 address space. How
many bits must the network administrator borrow to provide addresses for the
subnet of the new office building without wasting addresses?
Ans: The subnet for the new office: 2x-2>1000, x = 10
Borrow 16 – 10 = 6 bits.
10.
Given an IP address 172.16.28.222 with a subnet mask of 255.255.248.0, what
is the correct network address?
Ans: 192.168.24.0
11.
What is the differentiate between a switch and a hub?
Ans: Switches are used at the data link layer, while hubs are used at the physical
layer.
12.
What is the difference between public and private IP?
Ans: Public IP is used across the internet, while private IP is used within the local
LAN.
13.
You are working in a data center of DTU and are assigned the address range
15.10.30.0/23. You are asked to develop an IP addressing plan to allow the
maximum number of subnets with as many as 30 hosts each. What IP address
range meets these requirements?
Ans: 15.10.30.0/27
14.
Compare and contrast copper wire, glass fiber, and satellite transmission
media?
ANS:
Feature Copper Wire Glass Fiber Satellite
Channels Few More Most
Signal Short Long Very Long
Distance
Interference Susceptible Not susceptible Very Susceptible
Bandwidth Small Large Very Large
Cost Inexpensive (short More expensive Most expensive
dist.)
15.
Computer networks are typically classified according to what? What are the
types of computer networks?
ANS:
Computer networks are typically classified according to their reach and
complexity. The three types of computer networks are local area networks (LANs),
metropolitan area networks (MANs), and wide area networks (WANs).
16.
What is the difference between a connection-oriented network and a
connectionless network?
ANS:
In a connection-oriented network, packets are sent through an established route. In
a connectionless network, packets sent from a source may take different paths
through the network.
17.
What is the difference between the OSI model and the TCP/IP model?
Ans:
The OSI model has 7 different layers and is not actually implemented in most
networks because of its complexity. The TCP/IP model is in practical use today,
but does not address the physical and data link layers that are addressed in the OSI
model. Nor does it address the presentation and session layers that the OSI model
does.
18.
What is the difference between a connection-oriented network and a
connectionless network?
Ans:
In a connection-oriented network, packets are sent through an established route. In
a connectionless network, packets sent from a source may take different paths
through the network.
19.
What is encryption? Which OSI layer is responsible for encryption?
ANS:
Encryption is a process that scrambles the data so that it cannot be read if
intercepted by unauthorized users. The Presentation layer is responsible for data
encryption.
20.
What are the two kinds of twisted-pair cable? Which is preferred? Why?
ANS:
The two kinds of twisted-pair cable are shielded and unshielded. Unshielded cable
is preferred because of its lower cost and high reliability.
21.
Give three reasons why wireless technologies are attracting strong interest?
ANS:
Wireless technologies are attracting strong interest because:
1. They provide mobility for portable and hand-held computing devices.
2. They can prove to be cheaper to implement than cable, in some cases.
3. They provide good alternatives in situations where it is difficult or impossible to
use cable.
22.
A new office building of DTU is being constructed at 03 Quang Trung St. and
will be finished this year. And you are a DTU network technician. You are
assigned to design a network addressing scheme that will supply 6 subnets and
30 hosts per subnet. Currently, DTU uses the 192.168.10.0/24 address space.
How many bits are borrowed to provide enough of this number of hosts and
subnets? And list the information of the first subnet (Network Address,
Custom Subnet Mask, Start IP, Last IP, and Broadcast Address)?
Ans:
Number of bits borrowed: 3 bits
The information of the first subnet:
+ Network Address: 192.168.10.0
+ Custom Subnet Mask: 255.255.255.224
+ Start IP: 192.168.10.1
+ Last IP: 192.168.10.30
+ Broadcast Address: 192.168.10.31
23.
What valid host range is the IP address 172.16.10.22 255.255.255.240 a part
of?
Ans:
The valid host range is 172.16.10.17 through 172.16.10.30
24.
How many subnets and hosts can you get from the network 192.168.254.0/26?
Ans:
We can get 4 networks with 62 hosts.
25.
You are creating a DHCP scope for your 192.168.1.32/28 subnet. The subnet
consists of Windows 7, Windows 8, and Windows 10 computers. You have two
UNIX computers on this subnet that will be assigned the two highest available
static IP addresses. The subnet's default gateway will be assigned the lowest
available IP address on the subnet. Which scope should you create on your
DHCP server?
Ans:
We should create the scope on DHCP Server from 192.168.1.34 through
192.168.1.44.
26.
What is encapsulation?
ANS:
Encapsulation is a process for converting a frame between networks that places the
data frame of one type of network inside the header format used by another
network. The new header acts like an envelope used to send a letter.
27.
Explain what might happen if two stations are accidentally assigned the same
hardware address?
Ans:
If two stations had the same hardware address, both stations would receive packets
addressed to them, but would get confused when implementing error control or
flow control and it would be totally confusing to the upper layers since the data
link layer would be passing information to the higher layers which may, or may not
have been intended for the host.
28.
What is the difference between link state and distance vector routing?
Ans:
In distance routing, a router broadcasts its’ routing table to all neighbors. Each
neighbor updates its’ own routing table based on the information sent by the
neighbor taking the best route from each table. In Link State routing, each router
constructs a packet telling other routers about itself. Each router then determines
the shortest route based on its own calculated shortest path algorithm.