Networking essentials

Chapter1 Review Questions
1. Which of the following is one of the three basic functions a computer performs? (Choose all that apply.)
a. Processing
b. Internet access
c. Input
d. Graphics
e. Output
f. E-mail

2. The executes instructions provided by computer programs.
a. CPU
b. NIC
c. Hard drive
d. USB

3. When a CPU is composed of two or more processors, each one is referred to as a(n) .
a. I/O
b. Core
c. OS
d. Flash

4. Which of the following is considered long-term storage? (Choose all that apply.)
a. Flash drive
b. RAM
c. Working storage
d. Hard drive

5. Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?
a. RAM slots
b. IDE connectors
c. Chipset
d. PCI-Express

6. You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have?
a. PCI
b. SATA
c. IDE
d. PCI-Express

7. The time it takes for read/write heads to move to the correct spot on the platter is the.
a. Rotational delay
b. Seek time
c. Transfer time
d. Access time

8. Which of the following is a task usually performed by the BIOS? (Choose all that apply.)
a. Perform a POST.
b. Create an interrupt.
c. Store the operating system.
d. Begin the boot procedure.

9. Place the following steps of the boot procedure in order.
a. The OS is loaded into RAM.
b. CPU starts.
c. OS services are started.
d. Power is applied.
e. The POST is executed.
f. Boot devices are searched.1
 Answer: d, b, e, f, a, c
10. Which of the following is a critical service provided by the OS? (Choose all that apply.)
a. Power-on self test
b. Memory management
c. Web browsing
d. File system
e. Storage

11. An OS’ s capability to run more than one application or process at the same time is referred to which of the following?
a. Multicore
b. Double time
c. Multitasking
d. Multiprocessor
e. Interrupt processing

12. You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC?
a. Network application
b. Device driver
c. BIOS
d. Protocol

13. Which of the following requests information stored on another computer?
a. NIC
b. Network client
c. Network server
d. Network protocol
e. Device driver

14. Choose the correct order for the process of a user attempting to access network resources:
1. Network protocol
2. Application
3. Network client
4. NIC driver
a. 4, 2, 1, 3
b. 3, 2, 1, 4
c. 1, 4, 2, 3
d. 2, 3, 1, 4
e. 3, 1, 2, 4

15. TCP/IP is an example of which of the following?
a. NIC
b. Network client
c. Network server
d. Network protocol
e. Device driver

16. In network communication, the address is used to deliver a frame to the correct computer on the network. (Choose all that apply.)
a. MAC
b. Logical
c. IP
d. Physical

17. A(n) message is used to determine whether a computer is listening on the network.
a. MAC
b. Ping
c. IP
d. TCP

18. TCP/IP uses to look up a computer’ s IP address, given its name.
a. DNS
b. Ping
c. MAC
d. TCP

19. The unit of information containing MAC addresses and an error-checking code that’ s processed by the network interface layer is referred to as a.
a. Packet
b. Ping
c. Frame
d. Chunk

20. Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following?
a. Packetization
b. Encapsulation
c. Deencapsulation
d. Layering
1
 21. You’ re the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You’ re concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?
a. WAN
b. MAN
c. Internetwork
d. Extended LAN

22. Which of the following best describes a client?
a. A computer’ s primary role in the network is to give other computers access to network resources and services.
b. A computer’ s primary role in the network is to run user applications and access network resources.
c. It’s the software that responds to requests for network resources.
d. The OS installed on a computer is designed mainly to share network resources.

23. You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install?
a. Server-based network
b. Peer-to-peer network
c. WPAN
d. Storage area network

24. Which of the following characteristics is associated with a peer-to-peer network? (Choose all that apply.)
a. Decentralized data storage
b. Inexpensive
c. User-managed resources
d. Centralized control
e. Uses a directory service

25. A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?
a. LAN
b. MAN
c. WAN
d. Internetwork

26. At Yavapai College, the Prescott and Prescott Valley campuses (8 miles apart) have LANs connected via the local phone company. This configuration is an example of which of the following? (Choose the best answer.)
a. MAN
b. WPAN
c. WAN
d. SAN

27. You have installed Windows Server 2008 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server?
a. Naming services
b. Application services
c. Communication services
d. Directory services

28. Peer-to-peer networks aren’t suitable in which of the following situations?
a. Tight security is required.
b. Five or fewer users need network access.
c. Budget is the primary consideration.
d. No one uses the network heavily.

29. Which of the following best describes a storage area network?
a. Provides a mechanism for users to access a network’ s storage resources remotely
b. Uses high-speed networking technologies to give servers fast access to large amounts of disk storage
c. Is a short-range networking technology designed to connect personal devices to exchange information
d. Provides secure centralized file storage and sharing and access to networked printers

30. Why might Windows 7 or Windows Vista require more RAM or disk space than Windows Server 2008?
a. They need to accommodate handling centralized logon.
b. They include a directory service and a naming service.
c. They run many background networking services.
d. They support a graphics-intensive user interface.


Chapter 4 Review Questions
1. Which of the following is a common characteristic of a networking medium? (Choose all that apply.)
a. Bandwidth rating
b. Interference susceptibility
c. Broadband rating
d. Maximum segment length

2. Which of the following types of fiber-optic connectors provides high density and requires only one connector for two cables?
a. SC
b. ST
c. MT-RJ
d. RJ-45

3. Which of the following conditions requires cables not to exceed a recommended maximum length?
a. Diminution
b. Capacitance
c. Bandwidth
d. Attenuation

4. Which of the following is the process for representing bit signals on the medium?
a. Encryption
b. Encoding
c. Decryption
d. Decoding

5. What happens to signals as they travel the length of the medium?
a. They decode.
b. They amplify.
c. They attenuate.
d. They implode.
4
6. Which of the following is UTP susceptible to? (Choose all that apply.)
a. EMI
b. Crosstalk
c. Signal enhancement
d. LEDs

7. The space between a false ceiling and the true ceiling where heating and cooling air circulates is called the.
a. Duct-equivalent airspace
b. Conduit
c. Return air
d. Plenum

8. What type of connector is used most commonly with TP network wiring?
a. RJ-11
b. RJ-45
c. BNC
d. MT-RJ

9. You have been hired to install a network at a large government agency that wants to reduce the likelihood of electronic eavesdropping on its network. What type of cable is most resistant to eavesdropping?
a. UTP
b. STP
c. Coaxial
d. Fiber optic

10. Which of the following is a characteristic of unshielded twisted-pair cable? (Choose all that apply.)
a. Consists of four wires
b. Commonly used in physical bus topologies
c. Has a distance limitation of 100 meters
d. Is susceptible to electrical interference

11. Which of the following is a characteristic of fiber-optic cabling? (Choose all that apply.)
a. Can be used in electrically noisy environments
b. Requires only a single strand of fiber for network connections
c. Carries data over longer distances than UTP
d. Has low bandwidth

12. You’re preparing to install a conventional Ethernet network in your new office building, but your boss tells you to be ready to handle a switchover to 1 Gbps Ethernet next year.
What types of cable could you install? (Choose all that apply.)
a. Cat 5
b. Fiber optic
c. Cat 4
d. Cat 6
e. Coax

13. When two cables run side by side, signals traveling down one wire might interfere with signals traveling on the other wire. What is this phenomenon called?
a. RFI
b. Attenuation
c. Impedance
d. Crosstalk

14. What characteristic of twisted-pair cabling helps mitigate the effects of crosstalk?
a. Differential signals
b. Copper conductors
c. Four pairs of wires
d. 100-ohm impedance

15. What is the wireless device used to link buildings without cable?
a. Hub
b. Router
c. Gateway
d. Bridge

16. Which of the following is a wiring standard for twisted-pair cable connections? (Choose all that apply.)
a. IEEE 802.3a
b. TIA/EIA 568A
c. IEEE 802.3b
d. TIA/EIA 568B

17. Which of the following is a component of a structured cabling system? (Choose all that apply.)
a. Patch cables
b. RJ-11 plugs
c. Coax cable
d. Horizontal wiring

4
 18. Where are you most likely to find vertical cabling? (Choose all that apply.)
a. Equipment rooms
b. In the work area
c. Connecting TCs
d. Connecting a work area to a TC

19. Which of the following are tool needed to make a patch cable? (Choose all that apply.)
a. 110 punchdown tool
b. Cable stripper
c. Crimping tool
d. RJ-45 jack

20. Which type of connection is most likely to require a crossover cable?
a. PC to hub
b. Hub to router
c. Router to switch
d. PC to router

21. Which UTP limitations can be solved by fiber-optic cable? (Choose all that apply.)
a. Bandwidth
b. EMI susceptibility
c. Installation cost
d. Segment length

22. How many strands of fiber-optic cable are needed for a network connection?
a. 1
b. 2
c. 4
d. 8

23. Which statement is true about fiber-optic cables?
a. MMF uses lasers and has a thicker core.
b. SMF uses lasers and has a thinner core.
c. MMF uses LEDs and has a thinner core.
d. SMF uses LEDs and has a thicker core.

24. Which type of wireless network requires a clear line of sight between transmitter and receiver? (Choose all that apply.)
a. Infrared
b. Narrowband radio
c. Spread-spectrum LAN
d. Terrestrial microwave

25. Which of the following wireless technologies does a 802.11 wireless network using the
2.4 GHz frequency range use?
a. Infrared
b. Narrowband radio
c. Frequency hopping
d. Direct-sequence spread spectrum


Chapter8 Review Questions
1. Which of the following is an objective of a file system? (Choose all that apply.)
a. Organize space on a drive.
b. Organize files hierarchically.
c. Schedule access to applications.
d. Secure access to files.

2. A cluster is composed of which of the following?
a. One or more 512-bit blocks8
b. Two or more 2K-byte sectors
c. One or more 512-byte sectors
d. One or more 2K-byte blocks

3. Large cluster sizes can result in which of the following on a disk drive?
a. Faster performance for large files, more wasted space for small files
b. Faster performance for small files, less wasted space for small files
c. More fragmentation, faster performance for large files
d. Less fragmentation, more wasted space for large files

4. Which of these file systems includes file and folder permissions? (Choose all that apply.)
a. FAT32
b. Ext3
c. NTFS
d. Ext2

5. What feature of a file system makes it possible to find a file based on keywords in it?
Indexing

6. Which of the following is best described as a program loaded into memory that has no user interface but communicates with other programs?
a. Process
b. Task
c. Service
d. Application

7. The DNS function is built into most applications.
True or False?

8. Which best describes context switching?
a. Dividing computing cycles equally among processes
b. The OS suspending the running process and activating another process
c. Cooperative multitasking
d. Changing from one OS to another in a virtual environment

9. The most common form of multitasking in current OSs is cooperative multitasking.
True or False?

10. The OS component that schedules processes to run is the .
a. File system
b. User interface
c. Memory manager
d. Kernel

11. Which best describes a thread?
a. A process you can view in Task Manager
b. The smallest schedulable unit of software
c. A process in a preemptive multitasking OS
d. A multiprocessing computer

12. Which answer shows the correct order of DHCP packets generated when a computer requests a new address lease?
a. DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck
b. DHCPDiscover, DHCPRequest, DHCPOffer, DHCPAck
c. DHCPRequest, DHCPDiscover, DHCPOffer, DHCPAck
d. DHCPRequest, DHCPOffer, DHCPDiscover, DHCPAck

13. If you want a computer to query DNS by appending more than one domain name to the computer name, which of the following should you configure?
a. Two or more DNS server addresses
b. Additional DNS port numbers
c. Additional DNS suffixes
d. Two or more primary DNS suffixes

14. Which port does your Web browser use to communicate securely with the Web server by using SSL?
a. 80
b. 25
c. 110
d. 443

15. Why should you set the “ Register this connection’ s addresses in DNS” option?
a. So that you can query multiple domains when looking up a computer name
b. So that the computer’ s name and address are added to the DNS database automatically
c. So that the NIC receives a DNS address from DHCP
d. To disable Dynamic DNS for that computer

16. Which is the correct syntax for mapping drive letter W to a shared folder named Accounting on the Finance server?
a. net use W: \\Finance\Accounting
 b. net share W: \\Accounting\Finance
 c. net use W: \\Accounting\Finance
 d. net share W: \\Finance\Accounting

 17. A text file containing a list of commands is called which of the following?
a. Logon process file
b. Service file
c. Task file
d. Batch file
8
 18. The default protocol Windows uses to share folders is which of the following?
a. NFS
b. SMB
c. WPA
d. FTP

19. Which of the following refers to a Windows server with Active Directory installed?
a. Member server
b. NIS server
c. Domain controller
d. LDAP controller
20. Which of the following best describes an NAS?
a. A dedicated device designed to provide shared storage for network users
b. A high-speed network storage solution that can replace locally attached drives on servers
c. A storage solution in which some or all data is stored on offsite servers
d. A SATA or SCSI drive connected to a server

21. Which of the following is an element of a DNS server? (Choose all that apply.)
a. Zone
b. Root hints
c. Scope
d. Reservations

22. If you want one server to take over the processing of a server that has failed, what should you configure?
a. RAID
b. Failover cluster
c. Redundant array of servers
d. Load-balancing disk system

23. Software that creates and monitors the virtual hardware environment is called what?
a. Host computer
b. Hypervisor
c. Snapshot
d. Guest OS

24. Bare-metal virtualization is best for desktop virtualization.
True or False?

25. If you want your virtual machine to have direct access to the physical network, which virtual network option should you configure?
a. Bridged
b. NAT
c. Host-only
d. Internal


1 comment:

  1. please upload answers of chapters 9 to 13.....send me that links arslanshabbirgujjar@yahoo.com

    ReplyDelete