You are on page 1of 10

Exam

Name___________________________________

MULTIPLECHOICE. Choosetheonealternativethatbestcompletesthestatementor
answersthequestion.
1) Toimprovecommunicationeffectivenessinawirelessnetwork,youcan

1) _______
doallofthefollowingEXCEPT
A) addawirelessaccesspoint(WAP)tothenetwork.

B) repositionthecomputeryouareusing.

C) moveyourcomputernexttoacementwall.

D) movethecomputersinthenetworkclosertogether.

2) Distributeddenialofservice(DDoS)attackshavebeenassociatedwith

2) _______
A) theftoffinancialdataattheIRS.

B) identitytheft.

C) misuseofcreditcardinformation.

D) attacksonfamousblogs,eBay,andAmazon.com.

3) Themostlikelymethodahackerwouldusetoaccessacomputeris

3) _______
A) enteringthroughacompanyintranet.

B) enteringthroughtheInternet.

C) sittingdownatacomputerandinstallinghackingsoftware.

D) overhearingyourpasswordand/orlog-oninformation.

4) AnEthernetadapterisa

4) _______
A) devicethatusesasimplealgorithmtomovedata.

B) transmissionmedium.

C) specifictypeofNIC.

D) specifictypeofrouter.

5) Whichofthefollowingisformallydefinedasanycriminalaction

5) _______
perpetratedprimarilythroughtheuseofacomputer?
A) cybercrime

B) phishing

C) socialnetworking

D) hacking

6) Most__________allowyoutoconnectwirelessandwiredcomputersto

6) _______
thesamenetwork.
A) servers

B) wirelessrouters

C) modems

D) transceivers

7) WhichofthefollowingdevicesisneededtoshareanInternetconnection

7) _______
onawirelessnetwork?
A) afiber-opticcable

B) amodem

C) awirelesshub

D) awirelessrouter

8) Normaltelephonewireis

8) _______
A) ethernetcable.

B) coaxialcable.

C) fiber-opticcable.

D) twisted-paircable.

9) WhichofthefollowingisNOTanexampleofaWAN?

9) _______
A) LANsconnectedinasinglebuilding

B) thecomputersinalabatyourschoolconnectedtothecomputers

inalabat

anotherschoolinyourtown
C) acomputeratabanksmainbranchconnectedwithaLANatthe

banksbranchofficeacrosstown
D) aLANatthemainuniversitycampusconnectedwithaLANatthe

universityextensionsite

10) WhichofthefollowingisNOTanexampleofanetworknode?

A) anNOS

B) aprinter

C) amodem

D) acomputer

11) Themostcommontypeofnetworkis

A) aclient/servernetwork.

B) apeer-to-peer(P2P)network.

C) aWAN.

D) atokenringLAN.

12) Duetotheexpansionofmediafilesonhomecomputers,__________

optionsarenowbeingmarketed; however,theyarenotasfullfeatured
astheirbusiness-worldcounterparts.
A) homeserver

B) externalharddrive

C) onlinestorage

D) megaflashdrives

13) ThemajordifferenceintypesofP2Pnetworksisthe__________by

whichthenodesareconnected.
A) networkinterfacecard

B) software

C) port

D) transmissionmedium

14) Tosecureawirelessnetwork,youshouldtakeallthefollowing

precautionsEXCEPT
A) disablingSSIDbroadcast.

B) turningyourcomputeroffatnight.

C) changingthedefaultpasswordonyourrouter.

D) changingyournetworkname.

15) Whichofthefollowingisaprogramthatappearstobesomethinguseful

ordesirablebutatthesametimedoessomethingmaliciousinthe
background?
A) avirus

B) azombie

C) aTrojanhorse

D) aworm

16) Networksallowuserstoshare

A) paper.

B) phones.

C) flashdrives.

D) peripherals.

17) Inaclient/servernetwork,thereareusuallymanymore__________than

__________.
A) servers,clients

B) clients,servers

C) clients,computers

D) printers,computers

18) Whichofthefollowingnetworkadaptersismostlikelytobe

preinstalledinatypicalnotebookcomputertoday?
A) atransceiver

B) amodem

10) ______

11) ______

12) ______

13) ______

14) ______

15) ______

16) ______

17) ______

18) ______

C) awirelessnetworkadapter

D) apower-lineadapter

19) Thedatatransferrateofawirelessnetworkisusuallymeasuredin

A) Gbps.

B) Mbps.

C) Kbps.

D) Tbps.

20) __________

makesbroadbandusersmorevulnerabletoattacks..
A) Staticaddressing

B) Dynamicaddressing

C) Greaterbandwidth

D) IPaddressing

21) Apacketsnifferisaprogramthatcanenableahackertodoallofthe

followingEXCEPT
A) useyourdebitcardinformationtopurchaseitemsillegally.

B) assumeyouridentity.

C) launchadenialofservice(DoS)attackonyourcomputer.

D) stealyourlogonandpasswordsforvariousaccounts.

22) Ifyoufrequentlytransferlargedatafilesbetweennodesonanetwork,

whichofthefollowingnetworkswouldbethebestchoice?
A) wireless

B) power-line

C) Ethernet

D) dial-up

23) Quarantiningwithregardtocomputerprotectionisdefinedas

A) updatingyourantivirussoftware.

B) repairingtheinfectedfile.

C) placingafoundvirusinasecureareaontheharddrive.

D) deletingtheinfectedfile.

24) Theweakestlinkinanycomputersecuritysystemis

A) theusers.

B) USBports.

C) thenetwork.

D) theoperatingsystem.

25) ThepurposeofNetworkAddressTranslationisto

A) translateIPaddressesfromtheInternet.

B) dynamicallyassignIPaddressesviaanISP.

C) hideuserIPaddressesfromtheInternet.

D) convertlogicalportstophysicalportconfigurations.

26) WhichtypeofviruswasthefamousMichelangelovirus?

A) ascriptvirus

B) ane-mailvirus

C) aworm

D) atimebomb

27) Whichofthefollowingisnecessarytosenddatabetweenahome

networkandtheInternet?
A) ahub

B) aswitch

C) arouter

D) acable

28) Maximumcablerun(length)forEthernetnetworksusingUTPcableis

approximately:
A) 328feet.

B) 50feet.

C) 550feet.

D) 1,100feet.

29) Sophisticatednetworksgenerallyusewhichofthefollowinghardware

devicestoeasetheflowofdatapacketsthroughoutthenetwork?

19) ______

20) ______

21) ______

22) ______

23) ______

24) ______

25) ______

26) ______

27) ______

28) ______

29) ______

A) routersandswitches

B) USBports

C) networkinterfacecards(NICs)

D) firewalls

30) A(n)__________allowssharingofabroadbandInternetconnection.

A) adapter

B) hub

C) phonecord

D) router

31) ManufacturerssuchasLinksys,D-Link,andNetgearmakewhichofthe

followingdevicesthatcandoubleasfirewalls?
A) networks

B) modems

C) routers

D) NICs

32) PublicplaceswhereyoucanwirelesslyconnecttotheInternetare

knownas
A) hotspots.

B) gateways.

C) links.

D) wiredspots.

33) Whichofthefollowingdevicestranslateselectronicdataintoradio

waves?
A) amodem

B) atransceiver

C) areceiver

D) afiber-opticcable

34) Anetworkthathastenormorenodesisusuallyconfiguredasa

A) client/servernetwork.

B) peer-to-peernetwork.

C) homenetwork.

D) WAN.

35) Whatisthebestthingacompanycandotopreventitselectronicdata

frombeingstolen?
A) establishdetailedsecuritypolicies

B) shutoffaccessoncomputerstoflashdrives

C) disconnectemployeescomputersfromtheInternet

D) installhiddencameras

36) Mostcomputerstodaycontainnetworkadaptersinstalledinsideas

expansioncards.Suchadaptersarereferredtoas
A) networkadaptercards.

B) networkexpansioncards.

C) ethernetcards.

D) networkinterfacecards.

37) Awirelessnetworkuseswhichofthefollowingasitstransmission

medium?
A) radiowaves

B) soundwaves

C) fiber-opticwaves

D) laserwaves

38) ThemostpopulartransmissionmediumoptionforwiredEthernet

networksis
A) unshieldedtwisted-paircable(UTP).

B) fiber-opticcable.

C) coaxialcable.

D) power-linecable.

39) Networkadapters

30) ______

31) ______

32) ______

33) ______

34) ______

35) ______

36) ______

37) ______

38) ______

39) ______

A) enablenodesinanetworktocommunicatewitheachother.

B) arealwaysEthernetNICs.

C) arebuiltintothemotherboardoneachnode.

D) arenecessaryonlyonserversinaclient/servernetwork.

40) Acomputernetworkisdefinedastwoormorecomputersconnected

with__________sothattheycancommunicatewitheachother.
A) softwareandhardware

B) theInternet

C) software

D) hardware

41) Howmanyvirusesandvirusvariantsexisttoday?

A) millions

B) hundreds

C) tens

D) thousands

42) Throughput,theactualspeedofdatatransferthatisachievedina

network,isusually
A) lessthanthedatatransferrate.

B) thesameasthedatatransferrate.

C) dependentonthecablesbendradius.

D) morethanthedatatransferrate.

43) Whichofthefollowingclassificationsofviruseschangesitsowncode?

A) multipartite

B) worm

C) polymorphic

D) stealth

44) RulesforcreatingpasswordsincludeallofthefollowingEXCEPT

A) keepyourpasswordasecret.

B) createahard-to-guesspassword,withacombinationofletters

andnumbers.
C) changeyourpasswordfrequently.

D) keepyourpasswordwrittendown,andputitinyourwallet.

45) Onecanthwartmosthackingproblemsbyinstallinga

A) hub.

B) network.

C) firewall.

D) securitypolicy.

46) Networkarchitecturesareclassifiedaccordingto

A) thedistancebetweenthehubandtherouter.

B) thebandwidthsuppliedbytheconnection.

C) thewaytheyarecontrolledandthedistancebetweentheirnodes.

D) thespeedatwhichtheprocessorruns.

47) Client/servernetworksarecontrolledbyacentralserverthatrunsa

specializedpieceofsoftwarecalled
A) WindowsVista.

B) NetWare.

C) afirewall.

D) anetworkoperatingsystem(NOS).

48) Allofthefollowingarereasonsforusingapower-linenetworkinstead

ofanEthernetnetworkEXCEPT
A) power-linenetworkscanbeeasiertoinstall.

40) ______

41) ______

42) ______

43) ______

44) ______

45) ______

46) ______

47) ______

48) ______

B) youareexperiencinginterferencewithawirelessEthernet

network.
C) power-linenetworkscostless.

D) youdontneedtorunnewwireswithapower-linenetwork.

49) Ethernetnetworksarenamedfor

A) thetypeofNICinstalledineverynode.

B) thetypeofoperatingsysteminstalledoneverynode.

C) theprotocolused.

D) thetypeoftransmissionmediumused.

50) Whensettingupanetwork,youshouldsetupanycomputersrunning

theMicrosoftVistaoperatingsystem
A) Theorderdoesnotmatter.

B) last.

C) onlybeforeanycomputersrunningLinux.

D) first.

51) Whichtransmissionmediumisabletotransmitdatathefastest?

A) coaxialcable

B) wireless

C) fiber-opticcable

D) twisted-paircable

TRUE/FALSE. WriteTifthestatementistrueandFifthestatementisfalse.
52) The802.11gstandardsupportstransferratesofupto30Mbps.

53) Asinglecomputercanfunctionasbothaclientandaserver,but

performancewillbedegraded.

54) Itisnotpossibletoconfigureaclient/servernetworkforhomeuse.

55) ExtremeGandEnhancedGstandardswerebothbasedon802.11g

standardsbutusedproprietaryhardwareandsoftwaretweaksto
increaseperformance.

56) SMTPusesport21.

57) Themajorityofinvestigationsrelatedtocybercrimeinvolvedebitcard

fraud.

58) Repeaterscanextendanetworksrangebyamplifyingthesignal.

59) Thepracticeofpiggybackingisillegal.

60) OnecanhavebothwiredandwirelessnodesonasingleP2Pnetwork.

61) Anetwork-readydeviceisadevicethatmaybeattachedtoanetwork

butstillhastoconnecttoanetworkedcomputerfirst.

62) P2Pnetworksaremorecommonlyusedinsmallbusinessesthanin

homes.

63) TheMasterBootRecordexecuteseverytimeacomputerbootsup.

49) ______

50) ______

51) ______

52) ______
53) ______

54) ______
55) ______

56) ______
57) ______

58) ______
59) ______
60) ______
61) ______

62) ______

63) ______


64) Wirelessnetworksarenomorevulnerabletopacketsniffersthanany

othertypeofnetwork.

65) AwirelessNICfromonemanufacturermaynotworkwithaDSLrouter

fromanothermanufacturer,evenwhenbothdevicesclaimtobe
developedusingthesamestandards.

66) MostcomputerstodaycomewithEthernetadaptersalreadyinstalled.

67) Switchesreceivedatapacketsandsendthemtothenodeforwhichthey

areintendedonthesamenetwork.

68) White-hathackersperformaneededlegalserviceforsociety.

69) Inapeer-to-peernetwork,onecomputeractsastheserver.

70) Cybercriminalsareusuallysecurityindividualswhoworkinlarge

corporationswithavastknowledgebaseofcomputingandnetworking.

71) Whenconfiguredcorrectly,networkfirewallscanhelpprotectyour

network.

72) Aclientcomputeristhecomputeronwhichusersaccomplishspecific

tasks.

73) TheInternetisanexampleofaclient/servernetwork.

74) AP2Pnetworkneedsnetworkoperatingsystemsoftwareinstalledon

everynode.

75) Wirelessnetworksaremorevulnerabletoattackthanwirednetworks.

76) MANstandsformobileareanetwork

77) Whenanetworkissponsoredbyagovernmententitytoprovide

Internetaccesstoaspecificgeographicarea,thatnetworkwillgenerally
bedesignatedasaMAN.

78) 802.11devicesarelesssusceptibletointerferencethan802.11gdevices

are.

79) SMTPstandsforSimpleMailTransferProtocol.

80) ThecostofaP2Pnetworkisslightlygreaterthanthecostofa

client/servernetwork.

81) TheMacOSdoesNOTsupportP2Pnetworking.

82) Mostdesktopandnotebooksystemssoldtodayarenetworkready.

83) DatatransferratedoesNOTaffectthespeedatwhichausercan

64) ______

65) ______

66) ______
67) ______

68) ______
69) ______
70) ______

71) ______

72) ______

73) ______
74) ______

75) ______
76) ______
77) ______

78) ______

79) ______
80) ______

81) ______
82) ______
do wnload

afile
83)
froma
WAN.

84) Ethernetnetworksarealwaysconnectedusingtwisted-paircable

technology.

85) 802.11gdevices

haveafasterthroughputthan802.11ndevices.

___
___

84) ______

85) ______


1) C

2) D

3) B

4) C

5) A

6) B

7) D

8) D

9) A

10) A

11) B

12) A

13) D

14) B

15) C

16) D

17) B

18) C

19) B

20) A

21) C

22) C

23) C

24) A

25) C

26) D

27) C

28) A

29) A

30) D

31) C

32) A

33) B

34) A

35) A

36) D

37) A

38) A

39) A

40) A

41) D

42) A

43) C

44) D

45) C

46) C

47) D

48) C

49) A

50) D

51) C

52) FALSE

53) TRUE

54) FALSE

55) TRUE

56) TRUE

57) FALSE

58) TRUE

59) TRUE

60) TRUE

61) FALSE

62) FALSE

63) TRUE

64) FALSE

65) TRUE

66) TRUE

67) TRUE

68) FALSE

69) FALSE

70) FALSE

71) TRUE

72) TRUE

73) TRUE

74) FALSE

75) TRUE

76) FALSE

77) TRUE

78) FALSE

79) TRUE

80) FALSE

81) FALSE

82) TRUE

83) FALSE

84) FALSE

85) FALSE

You might also like