POST BY -- SURENDRA SOLANKI
Multiple Choice:
1.
Which of the following is NOT an example of a
network node?
A.
printer
B.
computer
C.
NOS
D.
modem
Answer: C Reference: Networking Fundamentals Difficulty: Moderate
2.
The network architecture used in most home networks
is:
A.
client-server LAN.
B.
peer-to-peer LAN.
C.
client-server WAN.
D.
peer-to-peer WAN.
Answer: B Reference: Network Architectures Difficulty: Moderate
3.
You must install a(n) ____________ on a network if
you want to share a broadband Internet connection.
A.
router
B.
modem
C.
node
D.
cable
Answer: A Reference: Network Navigation Devices Difficulty: Moderate
4.
Which of the following statements concerning
peer-to-peer networks is FALSE?
A.
A peer-to-peer network is the most common example of a
locally controlled network.
B.
Peer-to-peer networks cost more than client/server
networks and are more difficult to maintain.
C.
Each node on a peer-to-peer network can communicate
directly with every other node on the network.
D.
Peer-to-peer networks are the most common type of home
network.
Answer: B Reference: Network Architectures Difficulty: Moderate
5.
The design of the network is called the network:
A.
architecture.
B.
server.
C.
transmission.
D.
type.
Answer: A Reference: Network Architectures Difficulty: Easy
6.
Data transfer rate (also called bandwidth) is the
____________ speed at which data can be transmitted between two nodes on a
network.
A.
average
B.
minimum
C.
actual
D.
maximum
Answer: D Reference: Transmission Media Difficulty: Challenging
7.
____________ are the navigation devices that act as
the “traffic cops” of the network and forward packets to nodes on the same
network (not between two networks).
A.
NICs
B.
Routers
C.
Switches
D.
Modems
Answer: C Reference: Network Navigation Devices Difficulty: Moderate
8.
Which of the following statements is FALSE
concerning Ethernet networks?
A.
Cat 5e UTP cable is recommended for Ethernet networks.
B.
Cat 5 UTP supports a data transmission rate of 1 Gbps.
C.
Ethernet typically uses an RJ-45 connector.
D.
When using UTP, a cable run cannot exceed 328 feet.
Answer: B Reference: Wired Ethernet Networks Difficulty: Challenging
9.
Devices installed on long cable runs to amplify the
signal are called:
A.
repeaters.
B.
adapters.
C.
switches.
D.
routers.
Answer: A Reference: Wired Ethernet Networks Difficulty: Challenging
10.
A network navigation device that merely retransmits
a signal to all other nodes attached to it is a(n):
A.
router.
B.
NIC.
C.
hub.
D.
adapter.
Answer: C Reference: Ethernet Switches Difficulty: Moderate
11.
The network navigation device known as a “smart
hub” that transmits a signal only to the node to which it should be sent is
a(n):
A.
router.
B.
switch.
C.
NIC.
D.
adapter.
Answer: B Reference: Ethernet Switches Difficulty: Moderate
12.
A ____________ is a device, contained in a wireless
network adapter, that translates the electronic data on a network into radio
waves and broadcasts the radio waves to other nodes on the network.
A.
router
B.
switch
C.
hub
D.
transceiver
Answer: D Reference: Wireless Ethernet Networks Difficulty: Moderate
13.
A switch is also known as a(n):
A.
smart hub.
B.
DSL modem.
C.
smart router.
D.
cable modem.
Answer: A Reference: Wired Ethernet Networks:
Ethernet Switches Difficulty: Moderate
14.
When creating a phoneline network, it is necessary
to install a(n) ____________ adapter.
A.
wireless
B.
phone cord
C.
home phoneline network
D.
Digital Subscriber Line (DSL)
Answer: C Reference: Phoneline Networks Difficulty: Moderate
15.
____________ adapters, used on a power-line
network, are available in either USB or Ethernet versions.
A.
Power-line network
B.
Peer-to-peer network
C.
Phoneline network
D.
Wireless network
Answer: A Reference: Power-Line Networks Difficulty: Easy
16.
All of the following statements concerning
client/server networks are true EXCEPT:
A.
one computer on a client/server network must act as a
server.
B.
there is no centralized security or administration on a
client/server network.
C.
most networks that have 10 or more nodes are
client/server networks.
D.
the Internet is an example of a client/server network.
Answer: B Reference: Describing Networks Based on
Network Control Difficulty: Moderate
17.
Which of the following types of network adapter
card is most likely to be preinstalled in a typical home computer?
A.
Ethernet
B.
power-line adapter
C.
wireless adapter
D.
HPNA adapter
Answer: A Reference: Wired Ethernet Networks Difficulty: Moderate
18.
If a home network is connected to the Internet a
____________ is required to send data between the two networks.
A.
router
B.
repeater
C.
switch
D.
network operating system
Answer: A Reference: Network Navigation Devices Difficulty: Moderate
19.
CAT 5, CAT 5E, and CAT 6 are all types of:
A.
network adapters.
B.
Ethernet ports.
C.
UTP cables.
D.
connector jacks.
Answer: C Reference: Wired Ethernet Networks Difficulty: Moderate
20.
A wireless network uses ____________ as its
transmission media.
A.
cables
B.
radio waves
C.
twisted pair
D.
fiber optics
Answer: B Reference: Wireless Ethernet Networks Difficulty: Easy
21.
The main difference between the various 802.11
standards is the:
A.
data transfer rate.
B.
maximum allowable cable length.
C.
simplicity of installation.
D.
collision detection rate.
Answer: A Reference: Wireless Ethernet Networks Difficulty: Challenging
22.
The transceiver is the device that converts
electronic data into ____________ for broadcast to other network nodes.
A.
packets
B.
radio waves
C.
WAPs
D.
802.11 standards
Answer: B Reference: Wireless Ethernet Networks Difficulty: Moderate
23.
If you wish to extend the length of the network
without having the signal degrade, you would use a:
A.
repeater.
B.
router.
C.
gateway.
D.
switch.
Answer: A Reference: Wired Ethernet Networks Difficulty: Moderate
24.
If computers in a wireless network are unable to
connect to the wireless router, adding a(n) ____________ extends the range of
the wireless network by providing a second point to which the nodes can connect
to the network.
A.
router
B.
Internet portal
C.
cable modem
D.
wireless access point
Answer: D Reference: Wireless Ethernet Networks Difficulty: Moderate
25.
In network terminology, a(n) ____________ is a
wireless router that combines the capabilities of a wired router with the
ability to receive wireless signals.
A.
hub
B.
gateway
C.
adapter
D.
Ethernet port
Answer: B Reference: Wireless Ethernet Networks Difficulty: Moderate
26.
If you frequently need to transfer streaming video
or very large files between computers, which of the following networks would be
the best choice?
A.
Ethernet
B.
wireless
C.
power-line
D.
phoneline
Answer: A Reference: Wired Ethernet Networks Difficulty: Challenging
27.
The ____________ operating system assists with
configuring home networks with a Network Setup Wizard.
A.
Windows 98
B.
Windows ME
C.
Windows XP
D.
DOS
Answer: C Reference: Configuring Software for
Your Home Network Difficulty: Easy
28.
In a(n) ____________ network, any electrical outlet
provides a network connection.
A.
wireless
B.
power-line
C.
phoneline
D.
Ethernet
Answer: B Reference: Power-Line Networks Difficulty: Easy
29.
In a(n) ____________ network, any phone jack
provides a network connection.
A.
phoneline
B.
power-line
C.
802.11g
D.
Ethernet
Answer: A Reference: Phoneline Networks Difficulty: Easy
30.
A computer virus attaches itself to and attempts to
hide within the code of a(n) ____________ program.
A.
zombie
B.
Trojan horse
C.
host
D.
worm
Answer: C Reference: Computer Threats: Computer
Viruses Difficulty: Moderate
31.
____________ viruses replicate themselves to the
Master Boot Record whenever the computer boots up, ensuring that the virus will
be loaded into memory before some virus protection programs are loaded.
A.
Zombie
B.
Trojan horse
C.
Worm
D.
Boot-sector
Answer: D Reference: Types of Viruses Difficulty: Moderate
32.
____________ viruses are often transmitted by a
floppy disk left in the floppy disk drive.
A.
Boot-sector
B.
Trojan horse
C.
Script
D.
Logic bomb
Answer: A Reference: Types of Viruses Difficulty: Challenging
33.
____________ are viruses that are triggered when
certain logical conditions are met.
A.
Boot-sector viruses
B.
Logic bombs
C.
Macro viruses
D.
Worms
Answer: B Reference: Types of Viruses Difficulty: Moderate
34.
____________viruses attach themselves to documents
such as Word and Excel.
A.
Boot-sector
B.
Trojan horse
C.
DOS
D.
Macro
Answer: D Reference: Types of Viruses Difficulty: Moderate
35.
A numbered communication gateway or path, used to
organize requests for information, that is assigned for a commonly used network
service such as SMTP or HTTP is called a:
A.
protocol.
B.
physical port.
C.
logical port.
D.
packet filter.
Answer: C Reference: How Hackers Gain Access Difficulty: Moderate
36.
Which of the following would most likely NOT be a
symptom of a virus?
A.
Existing program files and icons disappear.
B.
The CD-ROM stops functioning.
C.
The Web browser opens to an unusual home page.
D.
Odd messages or images are displayed on the screen.
Answer: B Reference: Bits and Bytes: Virus Symptoms Difficulty: Challenging
37.
Blocking access to logical ports is a common method
used by ____________ for maximizing computer security.
A.
switches
B.
Web browsers
C.
firewalls
D.
access points
Answer: C Reference: Dig Deeper: How Firewalls
Work Difficulty: Moderate
38.
____________ are a series of commands, actually
mini programs that are executed without your knowledge.
A.
Scripts
B.
Trojan horses
C.
Worms
D.
Boot-sector viruses
Answer: A Reference: Scripts and Macro Viruses Difficulty: Moderate
39.
A firewall’s ability to examine incoming and
outgoing information and prevent the use of unauthorized logical ports is known
as:
A.
packet filtering.
B.
logical port blocking.
C.
Network Address Translation.
D.
network key distribution.
Answer: A Reference: Dig Deeper: How Firewalls
Work Difficulty: Challenging
40.
Classifications of viruses by the methods they take
to avoid detection by antivirus software include all of the following EXCEPT:
A.
polymorphic.
B.
multipartite.
C.
encryption.
D.
stealth.
Answer: C Reference: Virus
Classifications Difficulty: Challenging
41.
The purpose of Network Address Translation is to:
A.
translate an IP address to a text-based URL.
B.
hide user IP addresses from the Internet.
C.
convert logical ports to physical port configurations.
D.
dynamically assign IP addresses via an ISP.
Answer: B Reference: Dig Deeper: How Firewalls
Work Difficulty: Challenging
42.
When you set up a router for a wireless network,
the router uses a default network name known as the:
A.
service set identifier (SSID).
B.
router address.
C.
MAC address.
D.
IP identifier.
Answer: A Reference: Securing Wireless Networks Difficulty: Challenging
43.
Wired Equivalent Privacy (WEP) and Wi-Fi Protected
Access (WPA) are examples of:
A.
packet filtering services.
B.
network address translation protocols.
C.
security protocols.
D.
service set identifiers.
Answer: C Reference: Securing Wireless Networks Difficulty: Challenging
44.
A ____________ is the name given to a computer that
is controlled by hackers through the installation of a backdoor program and
used to flood a target computer with bogus requests.
A.
zombie
B.
worm
C.
DoS
D.
Trojan horse
Answer: A Reference: Denial of Service Attacks Difficulty: Easy
45.
Wired Equivalent Privacy (WEP) and Wi-Fi Protected
Access (WPA) use ____________ to protect data.
A.
packet filtering
B.
network address translation
C.
encryption
D.
service set identifiers
Answer: C Reference: Securing Wireless Networks Difficulty: Challenging
46.
____________ are viruses that are triggered by the
passage of time or on a certain date.
A.
Boot-sector viruses
B.
Macro viruses
C.
Time bombs
D.
Worms
Answer: C Reference: Types of Viruses Difficulty: Moderate
47.
Unlike other viruses, ____________ are viruses that
can run independently of host file execution and are much more active in
spreading themselves.
A.
boot-sector viruses
B.
time bombs
C.
Trojan horses
D.
worms
Answer: D Reference: Types of Viruses Difficulty: Moderate
48.
____________ viruses temporarily erase their code
from the files where they reside and hide in active memory.
A.
Multipartite
B.
Stealth
C.
Polymorphic
D.
Script
Answer: B Reference: Virus Classifications Difficulty: Challenging
49.
All of the following are recommended to secure a
wireless network EXCEPT:
A.
changing the default password on your router.
B.
turning on security protocols.
C.
using static IP addressing.
D.
restricting access to the network to certain MAC
addresses.
Answer: C Reference: Securing Wireless Networks Difficulty: Challenging
50.
If a virus signature or other suspicious activity
is detected by the antivirus software, it places the virus in a secure area of
the hard drive so that it won’t spread infection to other files. This procedure
is known as:
A.
inoculation.
B.
automatic updating.
C.
encryption.
D.
quarantining.
Answer: D Reference: Computer Safeguards:
Antivirus Software Difficulty: Easy
Fill in the Blank:
51.
The Internet is a good example of a(n) ____________
network.
Answer: client/server Reference:
Describing Networks Based on
Network Control Difficulty: Easy
52.
A(n) ____________ network is one in which each
computer can communicate directly with each other, instead of having a separate
device exercise central control over the entire network.
Answer: peer-to-peer (P2P) Reference:
Describing Networks Based on
Network Control Difficulty: Easy
53.
A(n) ____________ network is one in which the nodes
are located within a small geographical area.
Answer: local area network (LAN) Reference:
Describing Networks Based on
Distance Difficulty: Easy
54.
____________ cable consists of a single copper wire
surrounded by layers of plastic and is used to connect cable TV.
Answer: Coaxial Reference:
Transmission Media Difficulty: Moderate
55.
Normal telephone wire is composed of ____________
cable, which consists of copper wires wrapped around each other and covered in
a plastic jacket.
Answer: twisted pair Reference: Transmission Media Difficulty: Easy
56.
All network nodes (computers and peripherals) are
connected to each other and to the network by ____________.
Answer: transmission media Reference:
Transmission Media Difficulty: Easy
57.
____________ transfer packets of data between two
or more networks.
Answer: Routers Reference: Network Navigation Devices Difficulty: Moderate
58.
Bundles of data sent over transmission media are
called ____________.
Answer: packets Reference: Network Navigation Devices Difficulty:
Moderate
59.
The 802.11 wireless standard is also known as
____________.
Answer: WiFi (Wireless Fidelity) Reference:
Wireless Ethernet Networks Difficulty: Challenging
60.
Windows Server 2003 is an example of specialized
software known as ____________ software.
Answer: network operating system (NOS) Reference:
Networking Software Difficulty: Easy
61.
____________ viruses, the newest form of virus,
compress common data files into a file using a complex encryption key rendering
your files unusable.
Answer: Encryption
Reference: Encryption Viruses Difficulty: Easy
62.
A(n) ____________ is required for each node on a
wireless network .
Answer: wireless network adapter Reference:
Wireless Ethernet Networks Difficulty: Moderate
63.
The best defense against viruses is to install
____________, which is software specifically designed to detect viruses and
protect your computer.
Answer: antivirus software Reference:
Computer Safeguards: Antivirus Software Difficulty: Easy
64.
When setting up a network, each computer on the
network needs a(n) ____________ so that the network can identify it and know
which computer is requesting data and services so that the data can be
delivered correctly.
Answer: unique name Reference:
Configuring Software For Your Home Network Difficulty: Moderate
65.
____________ networks move data through the network
using conventional phone lines.
Answer: Phoneline Reference: Phoneline Networks Difficulty: Easy
66.
When setting up a wireless network, using Windows
XP, the ____________ encryption is recommended for the best security.
Answer: WPA Reference: Securing Wireless Networks Difficulty: Challenging
67.
Using millions of computers during their inactive
periods to provide a network-based maximization of productivity is called
____________ computing.
Answer: grid Reference: Trends in IT: Emerging
Technologies: Grid Computing Difficulty: Moderate
68.
Anyone who breaks into a computer system (an
individual computer or a network) is generally referred to as a(n)
____________.
Answer: hacker Reference: Computer Threats: Hackers Difficulty: Easy
69.
A(n) ____________ is a computer program that
investigates data packets as they travel through the network and is often used
by hackers to capture sensitive or private data to use for illegal purposes.
Answer: packet sniffer Reference:
What Hackers Steal Difficulty: Moderate
70.
A(n) ____________ is a program that appears to be
something useful or desirable (like a game or a screen saver) but actually does
something malicious in the background.
Answer: Trojan horse Reference: Trojan Horses Difficulty: Moderate
71.
When legitimate users are denied access to a
computer system due to repeated bogus requests made by a hacker through a
“zombie” computer systems, this is called a(n) ____________.
Answer: denial of service (DoS) attack Reference:
Denial of Service Attacks Difficulty: Moderate
72.
____________ is characterized by someone using
personal information about you to assume your identity for the purpose of
defrauding others.
Answer: Identity theft Reference: What Hackers Steal Difficulty: Easy
73.
____________ are software programs or hardware
devices designed to keep computers safe from hackers.
Answer: Firewalls Reference: Computer Safeguards: Firewalls Difficulty:
Moderate
74.
128.15.9.21 is an example of a(n) ____________.
Answer: Internet Protocol (IP) address Reference: Dig Deeper: How Firewalls
Work Difficulty: Easy
75.
The process firewalls use to assign internal IP
addresses on a network (which are not shared with devices not on the network)
so the address is safe from hackers is called ____________.
Answer: Network Address Translation
(NAT) Reference: Dig Deeper: How Firewalls
Work Difficulty: Challenging
True and False:
76.
Wide Area Networks (WANs) are made up of LANs
connected over long distances.
Answer: True Reference:
Describing Networks Based on Distance Difficulty: Easy
77.
Networking standards set by organizations such as
the IEEE make it easier for manufacturers to produce devices that work with a
variety of computers and peripherals.
Answer: True Reference: Bits
and Bytes: One Brand Equals Fewer Headaches Difficulty: Moderate
78.
Throughput
is the maximum speed at which data can be transferred.
Answer: False (Data transfer rate /
bandwidth) Reference: Transmission Media Difficulty: Challenging
79.
Public places at which you can wirelessly connect
to the Internet are known as “hot spots.”
Answer: True Reference:
Bits and Bytes: Wireless Hot Spots Difficulty: Easy
80.
A Trojan horse program can install backdoor
programs that allow hackers to take almost complete control of your computer
without your knowledge.
Answer: True Reference:
Trojan Horses Difficulty: Easy
81.
If a firewall is configured to ignore all incoming packets on a particular
logical port, this is known as packet filtering.
Answer: False (logical port blocking) Reference:
Dig Deeper: How Firewalls Work Difficulty: Challenging
82.
Static addressing means retaining the same IP
address for a period of time.
Answer: True Reference:
Dig Deeper: How Firewalls Work Difficulty: Easy
83.
Dynamic addressing makes broadband users more
vulnerable to hackers because the hackers have a more permanent IP address with
which to locate the computer.
Answer: False (Static) Reference: Dig Deeper: How Firewalls Work Difficulty:
Moderate
84.
Some popular software firewalls are BlackICE PC
Protection and ZoneAlarm.
Answer: True Reference:
Types of Firewalls Difficulty: Easy
85.
Mac OS X does not support peer-to-peer networking.
Answer: False (it does) Reference:
Networking Software Difficulty: Easy
86.
LANs are made up of WANs connected over long
distances.
Answer: False (WANs are made up of
LANs) Reference: Describing Networks Based on Distance Difficulty: Moderate
87.
A computer virus’s main purpose is to replicate
itself and copy its code to as many other files as possible.
Answer: True Reference:
Computer Threats: Computer Viruses Difficulty: Easy
88.
Time bombs are viruses that are triggered when
certain logical conditions are met.
Answer: False (logic bombs) Reference:
Computer Threats: Computer Viruses Difficulty: Challenging
Matching:
89.
Match the following devices to their purposes:
II. adapter B. converts digital signals
to radio waves
III. repeater C. facilitates data packet
transmission
IV. wireless
transceiver D.
sends data packets between networks
V. router E. amplifies signals to
prevent degradation on long cables
Answer: C, A, E, B, D Reference: Multiple locations in chapter Difficulty:
Challenging
90.
Match the following terms to their meanings:
II. Wi-Fi B. server-side software
that controls network communications
III. driver C. unit of data transmitted
in a network
IV. NOS D. software that is
written to read-only memory
V. firmware E. another name for the 802.11
standard
Answer: C, E, A, B, D Reference: Multiple locations in chapter Difficulty:
Easy
91.
Match the following computer threats to their
meanings:
II. Trojan
horse B. software allowing
hackers to take control of a computer
III. backdoor
program C. simultaneous requests from
multiple zombie computers
IV. DDoS D. program appearing to do
useful work but doing harm in the background
V. worm E. infectious program that
runs independent of host files
Answer: A, D, B, C, E Reference: Computer Threats: Computer Viruses Difficulty:
Challenging
92.
Match the following terms to their meanings:
II. packet
filtering B. virtual communication
gateway for a specific service, such as HTTP or FTP
III. static
address C. method for selectively
allowing certain requests to access ports
IV. firewall D. hardware or software for
protecting computers from hackers
V. NAT E. IP number that is
typically assigned for a long period of time
Answer: B, C, E, D, A Reference: Computer Safeguards: Firewalls Difficulty: Moderate
93.
Match the following acronyms to their meanings:
I. WAN A. protocol for
Internet-based e-mail formats
II. Mbps B. type of transmission
medium
III. HPNA C. measure of data transfer
IV. UTP D. type of network
adapter
V. SMTP E. network spanning a large
geographical area
Answer: E, C, D, B, A Reference: Multiple locations in chapter Difficulty:
Moderate
94.
Match the following acronyms to their definitions:
I. HTTP A. protects IP addresses
from hackers
II. SMTP B. a protocol associated
with Web pages
III. HPNA C. a protocol used for
e-mail
IV. WAP D. an access point on a
wireless network
V. NAT E. a network adapter used
on a phoneline network
Answer: B, C, E, D, A Reference: Multiple locations in chapter Difficulty:
Moderate
95.
Match the following terms to their meanings:
I. Wi-Fi A. a virus that changes its
own code to avoid detection
II. packet
sniffer B. addresses are assigned
out of available pool of IP addresses
III. polymorphic
virus C. also known as the 802.11 wireless
standard
IV. dynamic
addressing D.
a computer controlled by a hacker
V. zombie E. a program that looks at
each packet as it travels over the network
Answer: C, E, A, B, D Reference: Multiple locations in chapter Difficulty:
Moderate
96.
Match the following acronyms to their definitions:
I. FTP A. Internet service
provider
II. UTP B. a protocol used on the
Internet for sending and receiving files
III. ISP C. a type of denial of
service attack
IV. DDOS D. type of cable
V. IP E. part of the TCP/IP
suite of protocols
Answer: B, D, A, C, E Reference: Multiple locations in chapter Difficulty:
Easy
97.
Match the following terms to their meanings:
II. computer
virus B. a program that
executes whenever the computer boots up
III. script C. read-only memory
(ROM) that has software written to it
IV. Master
Boot Record D.
a short series of commands that automates repetitive tasks
V. macro E. a program that
attaches itself to another program and attempts to spread itself
to other computers through the exchange of files
Answer: C, E, A, B, D Reference: Multiple locations in chapter Difficulty:
Moderate
98.
Match the following acronyms to their definitions:
I. WPA A. unique number assigned
to the network adapter by the manufacturer
II. SSID B. wireless security
protocol
III. MAC C. provides a means of
wirelessly connecting to a network
IV. WAP D. default network name
used by a router
V. WAN E. network made up of LANs
Answer: B, D, A, C, E Reference: Multiple locations in chapter Difficulty:
Challenging
99.
Match the following terms to their meanings:
II. throughput B. these devices handle data
traffic between nodes on the same network
III. routers C. maximum speed at
which data can be transmitted
IV. switches D. a unique number
assigned by the manufacturer to every NIC
V. MAC
address E. actual speed of
data transfer
Answer: C, E, A, B, D Reference: Multiple locations in chapter Difficulty:
Challenging
100.
Match the following terms to their meanings:
II. client B. can be a computer,
peripheral, or communication device
III. network C. a network device that
retransmits a signal to all nodes attached to it
IV. node D. accomplishes specific
tasks and makes requests on the network
V. hub E. provides information,
resources, and central control for functions on a network
Answer: E, D, A, B, C Reference: Multiple locations in chapter Difficulty:
Moderate
Thank you Sir :)
ReplyDeletevery useful ,Thanks alot sir
ReplyDeleteThnks
ReplyDeleteNice One Really Very Interesting
ReplyDeleteage calculator
ReplyDelete