CP!402 quiz

Description

Revision questions for internet fundamentals
d_cull91
Quiz by d_cull91, updated more than 1 year ago
d_cull91
Created by d_cull91 over 8 years ago
138
0

Resource summary

Question 1

Question
72.257.126.11 is a valid A class host address.
Answer
  • True
  • False

Question 2

Question
In CIDR, conventional network class distinctions do not exist.
Answer
  • True
  • False

Question 3

Question
Some software errors point to a physical connectivity problem.
Answer
  • True
  • False

Question 4

Question
Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems
Answer
  • True
  • False

Question 5

Question
193.255.126.255 is a valid C class host address.
Answer
  • True
  • False

Question 6

Question
In a star topology, a single connection failure will halt all traffic between all sites.
Answer
  • True
  • False

Question 7

Question
In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers.
Answer
  • True
  • False

Question 8

Question
Standards assist in network design.
Answer
  • True
  • False

Question 9

Question
Not all Transport layer protocols are concerned with reliability.
Answer
  • True
  • False

Question 10

Question
Latency occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
Answer
  • True
  • False

Question 11

Question
All protocols are routable.
Answer
  • True
  • False

Question 12

Question
The command used to view IP information on a Windows workstation is ipconfig.
Answer
  • True
  • False

Question 13

Question
Cut-through switches can detect corrupt packets.
Answer
  • True
  • False

Question 14

Question
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
Answer
  • True
  • False

Question 15

Question
A physical topology ____.
Answer
  • a. specifies device types
  • b. depicts a network in broad scope
  • c. specifies connectivity methods
  • d. specifies addressing schemes

Question 16

Question
In which OSI model layer does TCP operate?
Answer
  • Physical
  • b. Transport
  • c. Network
  • d. Data Link

Question 17

Question
Transport layer protocols break large data units into ____.
Answer
  • PDUs
  • b. segments
  • c. frames
  • d. block IDs

Question 18

Question
____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.
Answer
  • ARP
  • b. PING
  • c. Telnet
  • d. FTP

Question 19

Question
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
Answer
  • a. collision domain
  • b. broadcast domain
  • c. interference domain
  • d. duplicate domain

Question 20

Question
1000Base-SX has a maximum throughput of ____.
Answer
  • a. 1 Gbps
  • b. 10 Gbps
  • c. 100 Gbps
  • d. 1000 Gbps

Question 21

Question
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.
Answer
  • a. proxy
  • b. core
  • c. Internet
  • d. default

Question 22

Question
How is reliability achieved in TCP?
Answer
  • a. Routing
  • b. Sliding windows
  • c. Sequence numbers and acknowledgements
  • d. Port numbers

Question 23

Question
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
Answer
  • a. 0
  • b. 1
  • c. first eight
  • d. last eight

Question 24

Question
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
Answer
  • a. dash ( - )
  • b. underscore ( _ )
  • c. backward slash ( \ )
  • d. forward slash ( / )

Question 25

Question
A(n) ____ is a graphical representation of a network’s devices and connections.
Answer
  • a. Multi Router Traffic Grapher
  • b. network diagram
  • c. wiring schematic
  • d. event viewer

Question 26

Question
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
Answer
  • a. Performance
  • b. Fault
  • c. Network
  • d. Configuration

Question 27

Question
28. ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
Answer
  • a. Traffic monitoring
  • b. Traffic routing
  • c. Traffic polling
  • d. Traffic shaping

Question 28

Question
The most common type of caching is ____ caching.
Answer
  • a. online
  • b. Web
  • c. Internet
  • d. device

Question 29

Question
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
Answer
  • a. network monitor
  • b. sniffer
  • c. protocol analyzer
  • d. multimeter

Question 30

Question
The ____ utility allows you to view a host’s routing table.
Answer
  • a. nbstat
  • b. pathping
  • c. nslookup
  • d. route

Question 31

Question
Which of the following is a valid IP public address for use by a host on a LAN?
Answer
  • a. 10.2.256.5
  • b. 200.0.0.1
  • c. 192.168.10.5
  • d. 127.0.0.1

Question 32

Question
The result from ANDing 11110101 with 10111100 is ____.
Answer
  • a. 11111101
  • b. 10111101
  • c. 10110100
  • d. 01001010

Question 33

Question
What is the default administrative distance of static routes?
Answer
  • a. 120
  • b. 0
  • c. 90
  • d. 1

Question 34

Question
What is an Autonomous System in the context of internetworking?
Answer
  • a. A system that functions independently without external intervention
  • b. A group of routers under a common administration
  • c. A group of routers that have routes to every member of the group
  • d. A group of routers that can be configured by simply changing the settings in any one member

Question 35

Question
What does a layer 2 switch do when it receives a broadcast frame from one of the hosts connected to it?
Answer
  • a. Forwards it to all the other hosts connected to the switch
  • b. Examines the TTL field in the header and if the value is not 0, forwards it to all the other hosts on the switch
  • c. Discards it
  • d. A and B

Question 36

Question
When would static NAT be used over dynamic NAT?
Answer
  • a. When there is only a single public IP address available
  • b. When a router does not support NAT
  • c. When a server requires a fixed Global IP address
  • d. To assign an IP address from an IP address pool

Question 37

Question
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
Answer
  • a. open
  • b. standard
  • c. routable
  • d. nonroutable

Question 38

Question
A(n) ____ is the place where a telephone company terminates lines and switches calls between different locations.
Answer
  • a. CO
  • b. EO
  • c. DO
  • d. TO

Question 39

Question
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
Answer
  • a. demarcation point
  • b. NIU (Network Interface Unit)
  • c. local loop
  • d. central office

Question 40

Question
Repeaters operate in the ____ layer of the OSI model.
Answer
  • a. Physical
  • b. Network
  • c. Transport
  • d. Session

Question 41

Question
A ____ can interpret physical addressing information.
Answer
  • a. repeater
  • b. tranciever
  • c. hub
  • d. bridge

Question 42

Question
Switches can create ____ by grouping a number of ports into a broadcast domain.
Answer
  • a. trunks
  • b. spanning trees
  • c. gateways
  • d. VLANs

Question 43

Question
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
Answer
  • a. Static
  • b. Dynamic
  • c. Best path
  • d. Link-state

Question 44

Question
A complex combination of topologies is known as a ____ topology.
Answer
  • a. mixed
  • b. hybrid
  • c. compound
  • d. mulitpart

Question 45

Question
The most common logical topologies are ____ and ring.
Answer
  • a. bus
  • b. star
  • c. wired
  • d. hybrid

Question 46

Question
Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.
Answer
  • a. FCS
  • b. header
  • c. preamble
  • d. frame

Question 47

Question
In a ____ attack, a person redirects or captures secure transmissions as they occur.
Answer
  • a. denial-of service
  • b. man-in-the-middle
  • c. war driving
  • d. phishing

Question 48

Question
____ software searches a node for open ports.
Answer
  • a. Phishing
  • b. Sniffing
  • c. Authentication
  • d. Port scanner

Question 49

Question
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
Answer
  • a. switch’s
  • b. gateway’s
  • c. router’s
  • d. proxy server’s

Question 50

Question
____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
Answer
  • a. flashing
  • b. denial-of-service
  • c. dictionary
  • d. brute force

Question 51

Question
The combination of a public key and a private key is known as a ____.
Answer
  • a. key lock
  • b. key frame
  • c. key pair
  • d. key set

Question 52

Question
RADIUS and TACACS belong to a category of protocols known as AAA (____).
Answer
  • a. access, authorization, and accounting
  • b. authentication, authorization, and accounting
  • c. authentication, authorization, and authority
  • d. authentication, authorization, and access

Question 53

Question
Standards define the ____ performance of a product or service.
Answer
  • a. ideal
  • b. most acceptable
  • c. minimum acceptable
  • d. maximum acceptable

Question 54

Question
In which OSI model layer(s) do NICs operate?
Answer
  • a. Physical
  • b. Network and Physical
  • c. Data Link
  • d. Physical and Data Link

Question 55

Question
A(n) ____ number is the address on a host where an application makes itself available to incoming or outgoing data.
Answer
  • a. port
  • b. source
  • c. destination
  • d. sequence

Question 56

Question
The protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network through a router is ____.
Answer
  • a. TCP
  • b. ICMP
  • c. UDP
  • d. IP

Question 57

Question
In IPv6, each address contains a(n) ____, or a variable-length field at the beginning of the address that indicates what type of address it is.
Answer
  • a. Variable Prefix
  • b. Address Prefix
  • c. Format Prefix
  • d. Field Prefix

Question 58

Question
In IPv4 addressing, a node with an IP address of 128.64.88.20 belongs to a Class ____ network.
Answer
  • a. A
  • b. B
  • c. C
  • d. D

Question 59

Question
Which of the following best describes the definition of administrative distance?
Answer
  • a. Measure of the trustworthiness of the source of a route update
  • b. The number of hops to a destination node recorded in the routing table
  • c. The maximum number of hops for a routing protocol which is used to set the TTL value in an IP packet
  • d. Distance to the closest network administrator

Question 60

Question
Which of the following statements is true regarding CSMA/CD after a collision has occurred?
Answer
  • a. Each device waits for a random backoff period before attempting to retransmit
  • b. Both stations stop transmitting immediately
  • c. The devices involved in the collision have priority to transmit data
  • d. The device with the highest priority will attempt to retransmit first

Question 61

Question
The decimal number 782 converted to binary is
Answer
  • a. 1010001000
  • b. 10000000110
  • c. 11100011100
  • d. 1100001110

Question 62

Question
64. When signals may travel in both directions over a medium but only in one direction at a time, the transmission is considered ____.
Answer
  • a. simplex
  • b. multiplex
  • c. half-duplex
  • d. full-duplex

Question 63

Question
Which network model ensures that no computer on the network has more authority than another?
Answer
  • a. client/server
  • b. stand alone
  • c. peer-to-peer
  • d. distributed

Question 64

Question
____ networks are the most popular type of network for medium- and large-scale organizations.
Answer
  • a. Client/server
  • b. Peer-to-peer
  • c. Stand-alone
  • d. Stationary

Question 65

Question
A ____ network is confined to a relatively small space.
Answer
  • a. NAN
  • b. MAN
  • c. WAN
  • d. LAN

Question 66

Question
Which network topology is the most common?
Answer
  • a. ring
  • b. star
  • c. hybrid
  • d. Ethernet

Question 67

Question
Which OSI model layer initiates the flow of information?
Answer
  • a. Physical
  • b. Session
  • c. Application
  • d. Presentation

Question 68

Question
Which OSI model layer manages data encryption?
Answer
  • a. Physical
  • b. Session
  • c. Application
  • d. Presentation

Question 69

Question
Which type of protocol is useful when data must be transferred quickly?
Answer
  • a. connection-oriented
  • b. connectionless
  • c. TCP
  • d. IP

Question 70

Question
____ is the process of reconstructing segmented data.
Answer
  • a. Reassembly
  • b. Reengineering
  • c. Resegmenting
  • d. Realigning

Question 71

Question
The process of determining the best path from Point A on one network to Point B on another is known as ____.
Answer
  • a. mapping
  • b. enhancing
  • c. reconfiguring
  • d. routing

Question 72

Question
In which OSI model layer does IP operate?
Answer
  • a. Physical
  • b. Transport
  • c. Network
  • d. Data Link

Question 73

Question
Which Data Link sublayer manages flow control?
Answer
  • a. LLC
  • b. MAC
  • c. Management layer
  • d. Addressing layer

Question 74

Question
Which Data Link sublayer manages access to the physical medium?
Answer
  • a. LLC
  • b. MAC
  • c. Management layer
  • d. Addressing layer

Question 75

Question
When signals are free to travel in both directions over a medium simultaneously, the transmission is considered ____.
Answer
  • a. simplex
  • b. multiplex
  • c. half-duplex
  • d. full-duplex

Question 76

Question
When signals may travel in only one direction over a medium, the transmission is considered ____.
Answer
  • a. simplex
  • b. multiplex
  • c. half-duplex
  • d. full-duplex

Question 77

Question
The most significant factor in choosing a transmission method is its ____.
Answer
  • a. noise
  • b. attenuation
  • c. throughput
  • d. latency

Question 78

Question
The more twists per foot in a pair of wires, the more resistant the pair will be to ____.
Answer
  • a. throughput
  • b. attenuation
  • c. cross talk
  • d. latency

Question 79

Question
TCP is a(n) ____ protocol.
Answer
  • a. open-ended
  • b. indiscriminating
  • c. connection-oriented
  • d. connectionless

Question 80

Question
____ is more efficient than TCP for carrying messages that fit within one data packet.
Answer
  • a. IP
  • b. UDP
  • c. ICMP
  • d. IGMP

Question 81

Question
In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.
Answer
  • a. TCP
  • b. UDP
  • c. IP
  • d. ARP

Question 82

Question
In IPv4 addressing, each public IP address is a unique ____ number.
Answer
  • a. 12-bit
  • b. 32-bit
  • c. 64-bit
  • d. 128-bit

Question 83

Question
In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.
Answer
  • a. A
  • b. B
  • c. C
  • d. D

Question 84

Question
In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a Class ____ network.
Answer
  • a. A
  • b. B
  • c. C
  • d. D

Question 85

Question
The default subnet mask for a Class B network is ____.
Answer
  • a. 255.0.0.0
  • b. 255.255.0.0
  • c. 255.255.255.0
  • d. 255.255.255.255

Question 86

Question
A(n) ____ address represents any one interface from a group of interfaces, any one of which can accept a transmission.
Answer
  • a. anycast
  • b. unicast
  • c. multicast
  • d. singlecast

Question 87

Question
All Ethernet networks, independent of their speed or frame type, use an access method called ____.
Answer
  • a. CSMA
  • b. CSMA/DC
  • c. CSAM/CD
  • d. CSMA/CD

Question 88

Question
A ____ occurs when two transmissions interfere with each other.
Answer
  • a. jam
  • b. collision
  • c. carrier sense
  • d. multiple access event

Question 89

Question
Together, the FCS and the header make up the ____-byte “frame” for the data.
Answer
  • a. 15
  • b. 18
  • c. 21
  • d. 24

Question 90

Question
In addition to viewing its LEDs and using a loopback plug to test a NIC’s functionality, you can also check a NIC’s connectivity with ____.
Answer
  • a. simple commands
  • b. special clients
  • c. special switches
  • d. special software

Question 91

Question
Traditional switches operate at the ____ layer of the OSI model.
Answer
  • a. Physical
  • b. Data link
  • c. Network
  • d. Session

Question 92

Question
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
Answer
  • a. Routers
  • b. Switches
  • c. Gateways
  • d. Broadcast domains

Question 93

Question
The ____ encompasses the entire telephone system, from the wires that enter homes and businesses to the network centers that connect different regions of a country.
Answer
  • a. SLIP
  • b. POTS
  • c. PPP
  • d. PSTN

Question 94

Question
____ means that a telephone company connects residential users to its network with fiber-optic cable.
Answer
  • a. OLT
  • b. FITL
  • c. PON
  • d. FITH

Question 95

Question
A class ____ network class is reserved for special purposes.
Answer
  • a. A
  • b. B
  • c. C
  • d. D

Question 96

Question
In classful addressing, the Class B IPv4 address network ID is located in the ____.
Answer
  • a. last 8 bits
  • b. last 16 bits
  • c. first 8 bits
  • d. first 16 bits

Question 97

Question
In classful addressing, Class C IPv4 address host information is located in the ____.
Answer
  • a. last 8 bits
  • b. last 16 bits
  • c. first 8 bits
  • d. first 16 bits

Question 98

Question
Within a classful addressing, ____ is the default subnet mask for a Class C address.
Answer
  • a. 255.255.255.255
  • b. 255.255.255.0
  • c. 255.255.0.0
  • d. 255.0.0.0

Question 99

Question
The result from ANDing 11001111 with 10010001 is ____.
Answer
  • a. 11001111
  • b. 10010001
  • c. 10000001
  • d. 00000001

Question 100

Question
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Answer
  • a. Cracking
  • b. Hacking
  • c. War driving
  • d. Phishing

Question 101

Question
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
Answer
  • a. flashing
  • b. denial-of-service
  • c. war driving
  • d. phishing

Question 102

Question
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
Answer
  • a. packet-filtering
  • b. gateway
  • c. proxy
  • d. selective

Question 103

Question
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.
Answer
  • a. intensity
  • b. background
  • c. scope
  • d. focus

Question 104

Question
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
Answer
  • a. open
  • b. static
  • c. promiscuous
  • d. continuous

Question 105

Question
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
Answer
  • a. Jabbers
  • b. Ghosts
  • c. Giants
  • d. Runts

Question 106

Question
A ____ usually results from a bad NIC.
Answer
  • a. jabber
  • b. ghost
  • c. giant
  • d. runt

Question 107

Question
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously
Answer
  • . a. multimeter
  • b. cable performance tester
  • c. network monitor
  • d. protocol analyzer

Question 108

Question
110. Which of the following is a valid IP address for use by a host on a LAN?
Answer
  • a. 10.2.257.5
  • b. 127.0.0.1
  • c. 192.168.10.5
  • d. 227.125.5.25

Question 109

Question
Which of the following is a valid IP address for use by a host on a LAN?
Answer
  • a. 10.256.255.5
  • b. 127.0.0.1
  • c. 227.125.5.25
  • d. None of the above
Show full summary Hide full summary

Similar

CCNA Answers – CCNA Exam
Abdul Demir
Network Protocols
Shannon Anderson-Rush
Introduction to the Internet
Shannon Anderson-Rush
Home networks
johnson8221
Wireless Networking
Tunds
8º - Internet and Ethical use of Technology
Julian Perez
Week 19: Computers, Intro to Networks
Michael Lullo
IT - The Online World
Summir
Hardware, Software and Networking
dphillips211
The Internet
Gee_0599
Mapa Mental de Tics
erika.m.ortiz