You are on page 1of 7

Chapter 1

1. Which form of communication is a real-time, text-based communication type


used between two or more people who use mostly text to communicate?
A. Weblogs
B. Wikis
C. Instant messaging
D. Podcasting
2. Which type of network provides customers with limited access to corporate data
such as inventory, parts lists, and orders?
A. Intranet
B. Extranet
C. Internetwork
D. Internet
3. _______________ are collaborative web pages created and edited by users.
4. What prioritizes traffic and its characteristics to manage data?
A. Network administration
B. Network traffic
C. QoS strategy
D. Network evaluation
5. Rules that govern the process of network communication are called
______________.
6. What network traffic processes must be in place for quality of service strategies
to work correctly? (Choose two.)
A. Traffic is classified based on quality of service requirements.
B. Priorities are assigned to each classification of application data.
C. Web traffic is always assigned to a high-priority queue for processing.
D. Digital movies are always assigned to the high-priority queue for processing.
E. E-mail traffic is always assigned to the low-priority queue.
7. Copper cables and fiber-optic cables are two types of network
___________________.
8. What are two components of network architecture? (Choose two.)
A. People that comprise the human network
B. Built-in growth potential
C. Data transfer across the network
D. Redundant technologies
E. Corporations that operate and maintain the data network
9. Symbols that graphically represent network devices and media are called
___________.
10. For which three reasons were circuit-switched, connection-oriented technologies
rejected when the Internet was being developed? (Choose three.)
A. Circuit-switched technologies required that a single message be broken up
into multiple message blocks that contain addressing information.
B. Early circuit-switched networks did not automatically establish alternative
circuits in the event of circuit failure.
C. Circuit-switched technologies required that an open circuit between network
endpoints be established even if data was not being actively transferred
between locations.

D. The quality and consistency of messages transmitted across a connectionoriented, circuit-switched network cannot be guaranteed.
E. The establishment of simultaneous open circuits for fault tolerance is costly.
11. For which three reasons was a packet-switched, connectionless data
communications technology used when developing the Internet? (Choose three.)
A. It can rapidly adapt to the loss of data transmission facilities.
B. It efficiently utilizes the network infrastructure to transfer data.
C. Data packets can travel multiple paths through the network simultaneously.
D. It allows billing of network use by the amount of time a connection is
established.
E. It requires that a data circuit between the source and destination be
established before data can be transferred.
12. A _____________ is a device that helps direct messages between networks.
13. What is the role of QoS in a converged network?
A. Ensures that all traffic above available bandwidth levels is dropped
B. Establishes delivery priorities for different types of communication in a
network
C. Determines precise priorities for all types of network communication
D. Allows unused bandwidth to be shared by other organizations within the
network
14. Which term describes a common platform for diverse communication types?
A. Scalability
B. Convergence
C. Fault tolerance
D. Quality of service
15. Connectionless messages are broken into __________.
16. Which of the following pertains to network infrastructure security?
A. A competitor accesses sensitive information through an unsecured wireless
network.
B. Builders accidentally cut a network cable while digging.
C. A disgruntled employee alters information in a customer database.
D. A secretary sends confidential information in a reply to an e-mail that falsely
appears to come from her boss.
Chapter 2
17. Which OSI layer is associated with IP addressing?
A. 1
B. 2
C. 3
D. 4
18. The elements of communication include a message source, a message
destination, and a ___________________, or medium, to transport the message.
19. Which type of addressing is found at the OSI Layer 2? (Choose two.)
A. Logical
B. Physical
C. MAC
D. IP
E. Port

20. When a server responds to a web request, what occurs next in the encapsulation
process after the web page data is formatted and separated into TCP segments?
A. The client decapsulates the segment and opens the web page.
B. The client adds the appropriate physical address to the segments so that the
server can forward the data.
C. The server converts the data to bits for transport across the medium.
D. The server adds the source and destination IP address to each segment header
to deliver the packets to the destination.
E. The server adds the source and destination physical addresses to the packet
header.
21. Which term describes a specific set of rules that determine the formatting of
messages and the process of encapsulation used to forward data?
A. Segmentation
B. Protocol
C. Multiplexing
D. QoS
E. Reassembly
22. A limited-use protocol owned by a company is considered to be
_________________________.
23. Which one of the following is associated with Layer 4 of the OSI model?
A. IP
B. TCP
C. FTP
D. TFTP
24. The device that connects a device to the media is called a/an
_________________________.
25. Which of the following terms defines dividing data streams into smaller pieces
suitable for transmission?
A. Protocol
B. Multiplexing
C. Segmentation
D. Encapsulation
26. A device that moves data between networks is a _______________.
27. Which of the following is the process for interweaving multiple data streams
onto one shared communication channel or network medium?
A. Multicasting
B. Multiplexing
C. Encapsulation
D. Multidirecting
28. Which of the following is associated with the network layer?
A. IP address
B. Frames
C. MAC address
D. Physical addressing
29. Which of the following is the correct top down order of the OSI model?
A. Application, presentation, session, network, transport, data link, physical
B. Application, presentation, session, transport, network, data link, physical
C. Application, session, presentation, transport, network, data link, physical

D. Application, presentation, session, network, data link, transport, physical


30. Which layer of the OSI model is concerned with end-to-end message delivery
over the network?
A. Network
B. Transport
C. Data link
D. Application
Chapter 3
31. The application layer is ___________ of the OSI model.
A. Layer 1
B. Layer 3
C. Layer 4
D. Layer 7
32. The TCP/IP application layer consists roughly of which three OSI layers?
A. Application, session, transport
B. Application, presentation, session
C. Application, transport, network
D. Application, network, data link
33. HTTP is used to do which of the following?
A. Resolve Internet names to IP addresses
B. Provide remote access to servers and networking devices
C. Transfer files that make up the web pages of the World Wide Web
D. Transfer the mail messages and attachments
34. Post Office Protocol (POP) uses which port?
A. TCP/UDP port 53
B. TCP port 80
C. TCP port 25
D. UDP port 110
35. What is GET?
A. A client request for data
B. A protocol that uploads resources or content to the web server
C. A protocol that uploads information to the server in plain text that can be
intercepted and read
D. A response from a server
36. Which is the most popular network service?
A. HTTP
B. FTP
C. Telnet
D. E-mail
37. FTP requires ___________ connection(s) between client and server to
successfully transfer files.
A. 1
B. 2
C. 3
D. 4
38. DHCP enables clients on a network to do which of the following?
A. Have unlimited telephone conversations
B. Play back video streams
C. Obtain IP addresses
D. Track intermittent denial of service attacks

39. The Linux and UNIX operating systems use SAMBA, which is a version of
which protocol?
A. SMB
B. HTTP
C. FTP
D. SMTP
40. Which of the following is a connection using Telnet?
A. File Transfer Protocol (FTP) session
B. Trivial File Transfer Protocol (TFTP) session
C. Virtual Terminal (VTY) session
D. Auxiliary (AUX) session
41. Is eBay a peer-to-peer or client/server application?
42. In the client/server model, the device requesting the service is referred to as the
___________.
43. HTTP is referred to as a request/response protocol. What are three typical
message formats?
44. DHCP allows the automation of what?
45. What does FTP stand for, and what is it used for?
Chapter 4
46. Which port number is used by HTTP?
A. 23
B. 80
C. 53
D. 110
47. Which port number is used with SMTP?
A. 20
B. 23
C. 25
D. 143
48. Which characteristics are part of TCP? (Choose two.)
A. Reliable
B. Connectionless
C. No flow control
D. Resends anything not received
49. At the transport layer, which of the following controls is used to keep a
transmitting host from overflowing the buffers of a receiving host?
A. Best effort
B. Encryption
C. Flow control
D. Congestion avoidance
50. End systems use port numbers to select the proper application. What is the
lowest port number that can be dynamically assigned by the host system?
A. 1
B. 128
C. 256
D. 1024
51. During data transfer, what is the receiving host responsible for? (Choose the best
two answers.)
A. Encapsulation

B. Bandwidth
C. Segmentation
D. Acknowledgment
E. Reassembly
52. What are the transport layers responsibilities?
53. Why does TCP use a sequence number in the header?
A. To reassemble the segments into data
B. To identify the application layer protocol
C. To indicate the number of the next expected byte
D. To show the maximum number of bytes allowed during a session
54. Which of the following determines how much data a sending host running
TCP/IP can transmit before it must receive an acknowledgment?
A. Segment size
B. Transmission rate
C. Bandwidth
D. Window size
55. What is the purpose of TCP/UDP port numbers?
A. To indicate the beginning of a three-way handshake
B. To reassemble the segments into the correct order
C. To identify the number of data packets that can be sent without
acknowledgment
D. To track the different conversations crossing the network at the same time
56. What does segmentation provide to communications?
57. In networking terms, what is reliability?
58. List three network applications that use TCP.
59. List three network applications that use UDP.
60. What is contained in the header of each segment or datagram?
61. What is the purpose of sequence numbers?
Chapter 5
62. Which protocol provides connectionless network layer services?
A. IP
B. TCP
C. UDB
D. OSI
63. What two commands can be used to view a hosts routing table?
64. Select three pieces of information about a route that a routing table contains.
A. Next-hop
B. Source address
C. Metric
D. Destination network address
E. Last hop
F. Default gateway
65. What kinds of problems are caused by excessive broadcast traffic on a network
segment? (Choose three.)
A. Consumes network bandwidth
B. Increases overhead on network
C. Requires complex address schemes
D. Interrupts other host functions
E. Divides networks based on ownership
F. Advanced hardware required

66. What are three key factors to consider when grouping hosts into a common
network?
67. Which of the following are not functions of the network layer? (Choose two.)
A. Routing
B. Addressing packets with an IP address
C. Delivery reliability
D. Application data analysis
E. Encapsulation
F. Decapsulation
68. Which of the following are true about IP? (Choose two.)
A. IP stands for International Protocol.
B. It is the most common network layer protocol.
C. It analyzes presentation layer data.
D. It operates at OSI Layer 2.
E. It encapsulates transport layer segments.
69. What is the name of the process of removing the OSI Layer 2 information from
an IP packet?
70. Which of the following is true about IP?
A. It is connection oriented.
B. It uses application data to determine the best path.
C. It is used by both routers and hosts.
D. It is reliable.
71. Which of the following are true about network layer encapsulation? (Choose
two.)
A. It adds a header to a segment.
B. It can happen many times on the path to the destination host.
C. It is performed by the last router on the path.
D. Both source and destination IP addresses are added.
E. It converts transport layer information into a frame.
72. Which of the following are true about TCP and IP? (Choose two.)
A. TCP is connectionless and IP is connection oriented.
B. TCP is reliable and IP is unreliable.
C. IP is connectionless and TCP is connection oriented.
D. TCP is unreliable and IP is reliable.
E. IP operates at the transport layer.
73. Why is IP media independent?
A. It encapsulates Layer 1 instructions.
B. It works the same on all Layer 1 media.
C. It carries both video and voice data.
D. It works without Layer 1 media.
74. TCP is a __________ layer protocol.
75. How many bits are in an IPv4 address?
76. Which of the following are true about static and dynamic routing? (Choose two.)
A. Static routing requires a routing protocol such as RIP.
B. A default route is a dynamic route.
C. Dynamic routing adds packet-processing overhead.
D. Administrative overhead is reduced with static routing.
E. Routers can use static and dynamic routing simultaneously.

You might also like