Advertisement Upgrade to remove ads

Which of the following is one of the basic functions a computer performs?

Processing, Input, Output

The ____ executes instructions provided by computer programs.

CPU

When a CPU is composed of two or more processors, each one is referred to as a(n) ______.

Core

Which of the following is considered long-term storage?

Flash drive, Hard drive

Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?

Chipset

You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have?

PCI-Express

The time it takes for read/write heads to move to the correct spot on the platter is the _______.

Rotational Delay

Which of the following is a task usually performed by the BIOS?

Perform a POST, Begin the boot procedure

Place the following steps of the boot procedure in order:

Power is applied, CPU starts, The POST is executed, Boot devices are searched, The OS is loaded into RAM.

Which of the following is a critical service provided by the OS?

Memory management, File system

An OS's capability to run more than one application or process at the same time is referred to which of the following?

Multitasking

You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC?

Device driver

Which of the following requests information stored on another computer?

Network client

Choose the correct order for the process of a user attempting to access network resources:

Application, Network client, Network protocol, NIC driver

TCP/IP is an example of which of the following?

Network protocol

In network communication, the _______ address is used to deliver a frame to the correct computer on the network.

MAC, Physical

A(n) _________ message is used to determine whether a computer is listening on a network.

Ping

TCP/IP uses _____ to look up a computer's IP address, given its name.

DNS

The unit of information containing MAC addresses and an error-checking code that's processed by the network interface layer is referred to as a _____.

Frame

Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following?

Encapsulation

You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?

Internetwork

Which of the following best describes a client?

A computer's primary role in the network is to run user applications and access network resources.

You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install?

Peer-to-peer network

Which of the following characteristics is associated with a peer-to-peer network?

Decentralized data storage, Inexpensive, User-managed resources

A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?

LAN

At Yavapai College, the Prescott and Prescott Valley campuses (8 mile apart) have LANs connected via the local phone company. This configuration is an example of which of the following?

MAN

You have installed Windows Server 2008 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server?

Directory services

Peer-to-peer networks aren't suitable in which of the following situations?

Tight security is required

Which of the following best describes a storage area network?

Uses high-speed networking technologies to give servers fast access to large amounts of disk storage.

Why might Windows 7 or Windows Vista require more RAM or disk space than Windows Server 2008?

They include a directory service and a naming service.

Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers?

...

Which of the following is true of a repeater?

...

Which of the following is true of a hub?

...

Which of the following is the unit of measurement by which a hub's bandwidth is usually specified?

...

Which of the following describes how devices connected to a hub use the speed at which the hub can transmit data?

...

Which of the following is a likely indicator light on a hub?

...

Which of the following describes how devices connected to a switch use the speed at which the switch can transmit data?

...

What does a switch use to create its switching table?

...

What purpose does the timestamp serve in a switching table?

...

What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100 Mbps switch?

...

To which device is a wireless access point most similar in how it operates?

...

What's the purpose of an RTS signal in wireless networking?

...

Which of the following is a common operational speed of a wireless network?

...

Which of the following is a task performed by a NIC and its driver?

...

Which of the following best describes a MAC address?

...

Under which circumstances does a NIC allow inbound communications to pass through the interface?

...

How does a protocol analyzer capture all frames?

...

In Windows 7, which of the following displays information about currently installed NICs?

...

Which of the following is the purpose of an SSID?

...

Which of the following describe the function of routers?

...

What information is found in a routing table?

...

You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one another so that all 300 computers can communicate with each other in a single LAN. You have been detecting a high percentage of broadcast frames on this LAN. You think the number of broadcasts might be having an impact on network performance. What should you do?

...

Review the routing table in Figure 2-29. Based on this figure, where will the router send a packet with the source network number 1.0 and the destination network number 3.0?

...

If a router receives a packet with a destination network address unknown to the router, what will the router do?

...

Which of the following is true about routers?

...

Which of the following describes the arrangement of network cabling between devices?

...

Which of the following is an advantage of a star topology?

...

Which of the following is an example of a technology using a physical ring topology?

...

Which technology is likely to be implemented as a point-to-point physical topology?

...

Which of the following describes a hub-based Ethernet network?

...

Which of the following is a characteristic of a logical ring topology?

...

Which best describes a typical wireless LAN?

...

Which of the following is a characteristic of a switched logical topology?

...

Which of the following is a characteristic of unshielded twisted-pair cabling?

...

Which of the following is a characteristic of fiber-optic cabling?

...

Which topology most likely uses coaxial cabling?

...

Which of the following is true of a MAC address?

...

Which of the following is the most commonly used Ethernet frame type?

...

Which access method uses a "listen before sending" strategy?

...

Which of the following is a field of the most common Ethernet frame type?

...

Which of the following is true about full-duplex Ethernet?

...

Which of the following is defined by the extent to which signals in an Ethernet bus topology network are propagated?

...

Which of the following is considered a property of Ethernet?

...

Which of the following is true of IEEE 802.3an?

...

Which of the following is a feature of 100BaseFX?

...

Which Wi-Fi standard can provide the highest bandwidth?

...

Which of the following is true about infrastructure mode in wireless networks?

...

How many channels can be used on an 802.11b network in North America?

...

Which media access method does Wi-Fi use?

...

Which of the following is true about the token ring technology?

...

Which of the following is a common characteristic of a networking medium?

...

Which of the following types of fiber-optic connectors provides high density and requires only one connector for two cables?

...

Which of the following conditions requires cables not to exceed a recommended maximum length?

...

Which of the following is the process for representing bit signals on the medium?

...

What happens to signals as they travel the length of the medium?

...

Which of the following is UTP susceptible to?

...

The space between a false ceiling and the true ceiling where heating and cooling air circulates is called the _____.

...

What type of connector is used most commonly with TP network wiring?

...

You have been hired to install a network at a large government agency that wants to reduce the likelyhood of electronic eavesdropping on its network. What type of cable is most resistant to eavesdropping?

...

Which of the following is a characteristic of unshielded twisted-pair cable?

...

Which of the following is a characteristic of fiber-optic cabling?

...

You're preparing to install a conventional Ethernet network in your new office building, but your boss tells you to be ready to handle a switchover to 1 Gbps Ethernet next year. What types of cable could you install?

...

When two cables run side by side, signals traveling down one wire might interfere with signals traveling on the other wire. What is this phenomenon called?

...

What characteristic of twisted-pair cabling helps mitigate the effects of crosstalk?

...

What is the wireless device used to link buildings without cable?

...

Which of the following is a wiring standard for twisted-pair cable connections?

...

Which of the following is a component of a structured cabling system?

...

Where are you most likely to find vertical cabling?

...

Which of the following is a tool needed to make a patch cable?

...

Which type of connection is most likely to require a crossover cable?

...

Which UTP limitations can be solved by fiber-optic cable?

...

How many strands of fiber-optic cable are needed for a network connection?

...

Which statement is true about fiber optic cables?

...

Which type of wireless network requires a clear line of sight between transmitter and receiver?

...

Which of the following wireless technologies does a 802.11 wireless network using the 2.4 GHz frequency range use?

...

An IPv6 address is made up of how many bits?

128

The subnet mask of an IP address does which of the following?

Defines network and host portions of an IP address

If a protocol is routable, which TCP/IP layer does it operate at?

Internetwork

Which of the following is a private IP address and can't be routed across the Internet?

172.19.243.254

Which TCP/IP model layer takes a large chunk of data from the Application layer and breaks it into smaller segments?

Transport

Which of the following protocols resolves logical addresses to physical addresses?

ARP

Which of the following protocols provides connectionless service?

UDP, TCP

If you want to design an Application-layer protocol that provides fast, efficient communication and doesn't work with large amounts of data, what Transport-layer protocol would you design it to use?

UDP

Which of the following is the term for identifying packets used by TCP to establish a connection?

Three-way handshake

What is the term for each grouping of 8 bits in an IP address?

Octet

When using TCP/IP, which of the following must computers on the same logical network have in common?

Subnet mask

Which of the following IPv6 features is an enhancement to IPv4?

Larger address space, Built-in security

Which protocol can configure a computer's IP address and subnet mask automatically?

DHCP

How many bits must be reallocated from host ID to network ID to create 16 subnets?

4

For the class C network address 192.168.10.0, which of the following subnet masks provides 32 subnets?

255.255.255.248

How many host bits are necessary to assign addresses to 62 hosts?

6

Which IP addressing process enables workstations to use private IP addresses to access the Internet?

NAT

When a Windows computer is configured to use DHCP but no DHCP server is available, what type of address is configured automatically for it?

APIPA

Which of the following represents a valid IPv6 address?

2001:345:abcd::BEEF:44

Which of the following is a reason to subnet?

Networks can be divided into logical groups, Subnetting can decrease the size of broadcast domains

Which of the following Application-layer protocols typically uses the UDP Transport-layer protocol?

DNS, DHCP

Which is the correct order of headers, from left to right, in a completed frame?

Frame, IP, UDP

Which of the following is a task performed by the Network access layer?

Verifies that incoming frames have the correct destination MAC address, Transmits and receives bit signals

What field of the IP header does the Tracert program use to get the IP address of routers in the path?

TTL

Which of the following is not found in a connectionless Transport-layer protocol?

Three-way handshake, Acknowledgements

The original commercial version of Ethernet supported 10 Mbps bandwidth; the version introduced in the early 1990s supports 100 Mbps; and in 1998, Gigabit Ethernet was introduced. All version use the same data frame formats, with the same maximum PDU sizes, so they can interoperate freely. Given this information and what you know of layered technologies, which of the following statements is true?

Ethernet works at the Data Link and Physical layers of the OSI model, and upgrades to newer, faster versions of Ethernet can be made by changing only the components that work at these layers, Changes in technology at one layer of the OSI model don't usually affect the operation of other layers.

The addition of information to a PDU as it's passed from one layer to the next is called which of the following?

Encapsulation

Layers acting as though they communicate directly with each other across the network are called which of the following?

Peers

Place the following letters in the correct order to represent the OSI model from Layer 7 to Layer 1:

Application, Presentation, Session, Transport, Network, Data Link, Physical

Which OSI layer creates and processes frames?

Data Link

Which OSI layer handles flow control, data segmentation, and reliability?

Transport

Which OSI layer governs how a NIC is attached to the network medium?

Physical

Which OSI layer determines the route a packet takes from sender to receiver?

3

Which OSI layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network?

5

Which of the following elements might the Data Link layer add to its PDU?

Physical addresses, CRC

When and how many times is a CRC calculated?

At the source and destination and at each intermediary device

Which layer of the OSI model does Project 802 divide into two sublayers?

Data Link

What and the names of the sublayers specified as part of Project 802 ?

Logical Link Control (LLC), Media Access Control (MAC)

Which term refers to stripping header information as a PDU is passed from one layer to a higher layer?

Deencapsulation

Which IEEE 802 standard applies to Ethernet?

802.3

Which IEEE 802 standard applies to wireless LANs?

802.11

What is the name of the PDU at the Transport layer?

Segment

At which OSI layer does the PDU contain sequence and acknowledgement numbers?

4

Which of the following is an example of software found at the Application layer?

FTP, HTTP

See More

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set