Professional Documents
Culture Documents
Name___________________________________
MULTIPLECHOICE. Choosetheonealternativethatbestcompletesthestatementor
answersthequestion.
1) Toimprovecommunicationeffectivenessinawirelessnetwork,youcan
1) _______
doallofthefollowingEXCEPT
A) addawirelessaccesspoint(WAP)tothenetwork.
B) repositionthecomputeryouareusing.
C) moveyourcomputernexttoacementwall.
D) movethecomputersinthenetworkclosertogether.
2) Distributeddenialofservice(DDoS)attackshavebeenassociatedwith
2) _______
A) theftoffinancialdataattheIRS.
B) identitytheft.
C) misuseofcreditcardinformation.
D) attacksonfamousblogs,eBay,andAmazon.com.
3) Themostlikelymethodahackerwouldusetoaccessacomputeris
3) _______
A) enteringthroughacompanyintranet.
B) enteringthroughtheInternet.
C) sittingdownatacomputerandinstallinghackingsoftware.
D) overhearingyourpasswordand/orlog-oninformation.
4) AnEthernetadapterisa
4) _______
A) devicethatusesasimplealgorithmtomovedata.
B) transmissionmedium.
C) specifictypeofNIC.
D) specifictypeofrouter.
5) Whichofthefollowingisformallydefinedasanycriminalaction
5) _______
perpetratedprimarilythroughtheuseofacomputer?
A) cybercrime
B) phishing
C) socialnetworking
D) hacking
6) Most__________allowyoutoconnectwirelessandwiredcomputersto
6) _______
thesamenetwork.
A) servers
B) wirelessrouters
C) modems
D) transceivers
7) WhichofthefollowingdevicesisneededtoshareanInternetconnection
7) _______
onawirelessnetwork?
A) afiber-opticcable
B) amodem
C) awirelesshub
D) awirelessrouter
8) Normaltelephonewireis
8) _______
A) ethernetcable.
B) coaxialcable.
C) fiber-opticcable.
D) twisted-paircable.
9) WhichofthefollowingisNOTanexampleofaWAN?
9) _______
A) LANsconnectedinasinglebuilding
B) thecomputersinalabatyourschoolconnectedtothecomputers
inalabat
anotherschoolinyourtown
C) acomputeratabanksmainbranchconnectedwithaLANatthe
banksbranchofficeacrosstown
D) aLANatthemainuniversitycampusconnectedwithaLANatthe
universityextensionsite
10) WhichofthefollowingisNOTanexampleofanetworknode?
A) anNOS
B) aprinter
C) amodem
D) acomputer
11) Themostcommontypeofnetworkis
A) aclient/servernetwork.
B) apeer-to-peer(P2P)network.
C) aWAN.
D) atokenringLAN.
12) Duetotheexpansionofmediafilesonhomecomputers,__________
optionsarenowbeingmarketed; however,theyarenotasfullfeatured
astheirbusiness-worldcounterparts.
A) homeserver
B) externalharddrive
C) onlinestorage
D) megaflashdrives
13) ThemajordifferenceintypesofP2Pnetworksisthe__________by
whichthenodesareconnected.
A) networkinterfacecard
B) software
C) port
D) transmissionmedium
14) Tosecureawirelessnetwork,youshouldtakeallthefollowing
precautionsEXCEPT
A) disablingSSIDbroadcast.
B) turningyourcomputeroffatnight.
C) changingthedefaultpasswordonyourrouter.
D) changingyournetworkname.
15) Whichofthefollowingisaprogramthatappearstobesomethinguseful
ordesirablebutatthesametimedoessomethingmaliciousinthe
background?
A) avirus
B) azombie
C) aTrojanhorse
D) aworm
16) Networksallowuserstoshare
A) paper.
B) phones.
C) flashdrives.
D) peripherals.
17) Inaclient/servernetwork,thereareusuallymanymore__________than
__________.
A) servers,clients
B) clients,servers
C) clients,computers
D) printers,computers
18) Whichofthefollowingnetworkadaptersismostlikelytobe
preinstalledinatypicalnotebookcomputertoday?
A) atransceiver
B) amodem
10) ______
11) ______
12) ______
13) ______
14) ______
15) ______
16) ______
17) ______
18) ______
C) awirelessnetworkadapter
D) apower-lineadapter
19) Thedatatransferrateofawirelessnetworkisusuallymeasuredin
A) Gbps.
B) Mbps.
C) Kbps.
D) Tbps.
20) __________
makesbroadbandusersmorevulnerabletoattacks..
A) Staticaddressing
B) Dynamicaddressing
C) Greaterbandwidth
D) IPaddressing
21) Apacketsnifferisaprogramthatcanenableahackertodoallofthe
followingEXCEPT
A) useyourdebitcardinformationtopurchaseitemsillegally.
B) assumeyouridentity.
C) launchadenialofservice(DoS)attackonyourcomputer.
D) stealyourlogonandpasswordsforvariousaccounts.
22) Ifyoufrequentlytransferlargedatafilesbetweennodesonanetwork,
whichofthefollowingnetworkswouldbethebestchoice?
A) wireless
B) power-line
C) Ethernet
D) dial-up
23) Quarantiningwithregardtocomputerprotectionisdefinedas
A) updatingyourantivirussoftware.
B) repairingtheinfectedfile.
C) placingafoundvirusinasecureareaontheharddrive.
D) deletingtheinfectedfile.
24) Theweakestlinkinanycomputersecuritysystemis
A) theusers.
B) USBports.
C) thenetwork.
D) theoperatingsystem.
25) ThepurposeofNetworkAddressTranslationisto
A) translateIPaddressesfromtheInternet.
B) dynamicallyassignIPaddressesviaanISP.
C) hideuserIPaddressesfromtheInternet.
D) convertlogicalportstophysicalportconfigurations.
26) WhichtypeofviruswasthefamousMichelangelovirus?
A) ascriptvirus
B) ane-mailvirus
C) aworm
D) atimebomb
27) Whichofthefollowingisnecessarytosenddatabetweenahome
networkandtheInternet?
A) ahub
B) aswitch
C) arouter
D) acable
28) Maximumcablerun(length)forEthernetnetworksusingUTPcableis
approximately:
A) 328feet.
B) 50feet.
C) 550feet.
D) 1,100feet.
29) Sophisticatednetworksgenerallyusewhichofthefollowinghardware
devicestoeasetheflowofdatapacketsthroughoutthenetwork?
19) ______
20) ______
21) ______
22) ______
23) ______
24) ______
25) ______
26) ______
27) ______
28) ______
29) ______
A) routersandswitches
B) USBports
C) networkinterfacecards(NICs)
D) firewalls
30) A(n)__________allowssharingofabroadbandInternetconnection.
A) adapter
B) hub
C) phonecord
D) router
31) ManufacturerssuchasLinksys,D-Link,andNetgearmakewhichofthe
followingdevicesthatcandoubleasfirewalls?
A) networks
B) modems
C) routers
D) NICs
32) PublicplaceswhereyoucanwirelesslyconnecttotheInternetare
knownas
A) hotspots.
B) gateways.
C) links.
D) wiredspots.
33) Whichofthefollowingdevicestranslateselectronicdataintoradio
waves?
A) amodem
B) atransceiver
C) areceiver
D) afiber-opticcable
34) Anetworkthathastenormorenodesisusuallyconfiguredasa
A) client/servernetwork.
B) peer-to-peernetwork.
C) homenetwork.
D) WAN.
35) Whatisthebestthingacompanycandotopreventitselectronicdata
frombeingstolen?
A) establishdetailedsecuritypolicies
B) shutoffaccessoncomputerstoflashdrives
C) disconnectemployeescomputersfromtheInternet
D) installhiddencameras
36) Mostcomputerstodaycontainnetworkadaptersinstalledinsideas
expansioncards.Suchadaptersarereferredtoas
A) networkadaptercards.
B) networkexpansioncards.
C) ethernetcards.
D) networkinterfacecards.
37) Awirelessnetworkuseswhichofthefollowingasitstransmission
medium?
A) radiowaves
B) soundwaves
C) fiber-opticwaves
D) laserwaves
38) ThemostpopulartransmissionmediumoptionforwiredEthernet
networksis
A) unshieldedtwisted-paircable(UTP).
B) fiber-opticcable.
C) coaxialcable.
D) power-linecable.
39) Networkadapters
30) ______
31) ______
32) ______
33) ______
34) ______
35) ______
36) ______
37) ______
38) ______
39) ______
A) enablenodesinanetworktocommunicatewitheachother.
B) arealwaysEthernetNICs.
C) arebuiltintothemotherboardoneachnode.
D) arenecessaryonlyonserversinaclient/servernetwork.
40) Acomputernetworkisdefinedastwoormorecomputersconnected
with__________sothattheycancommunicatewitheachother.
A) softwareandhardware
B) theInternet
C) software
D) hardware
41) Howmanyvirusesandvirusvariantsexisttoday?
A) millions
B) hundreds
C) tens
D) thousands
42) Throughput,theactualspeedofdatatransferthatisachievedina
network,isusually
A) lessthanthedatatransferrate.
B) thesameasthedatatransferrate.
C) dependentonthecablesbendradius.
D) morethanthedatatransferrate.
43) Whichofthefollowingclassificationsofviruseschangesitsowncode?
A) multipartite
B) worm
C) polymorphic
D) stealth
44) RulesforcreatingpasswordsincludeallofthefollowingEXCEPT
A) keepyourpasswordasecret.
B) createahard-to-guesspassword,withacombinationofletters
andnumbers.
C) changeyourpasswordfrequently.
D) keepyourpasswordwrittendown,andputitinyourwallet.
45) Onecanthwartmosthackingproblemsbyinstallinga
A) hub.
B) network.
C) firewall.
D) securitypolicy.
46) Networkarchitecturesareclassifiedaccordingto
A) thedistancebetweenthehubandtherouter.
B) thebandwidthsuppliedbytheconnection.
C) thewaytheyarecontrolledandthedistancebetweentheirnodes.
D) thespeedatwhichtheprocessorruns.
47) Client/servernetworksarecontrolledbyacentralserverthatrunsa
specializedpieceofsoftwarecalled
A) WindowsVista.
B) NetWare.
C) afirewall.
D) anetworkoperatingsystem(NOS).
48) Allofthefollowingarereasonsforusingapower-linenetworkinstead
ofanEthernetnetworkEXCEPT
A) power-linenetworkscanbeeasiertoinstall.
40) ______
41) ______
42) ______
43) ______
44) ______
45) ______
46) ______
47) ______
48) ______
B) youareexperiencinginterferencewithawirelessEthernet
network.
C) power-linenetworkscostless.
D) youdontneedtorunnewwireswithapower-linenetwork.
49) Ethernetnetworksarenamedfor
A) thetypeofNICinstalledineverynode.
B) thetypeofoperatingsysteminstalledoneverynode.
C) theprotocolused.
D) thetypeoftransmissionmediumused.
50) Whensettingupanetwork,youshouldsetupanycomputersrunning
theMicrosoftVistaoperatingsystem
A) Theorderdoesnotmatter.
B) last.
C) onlybeforeanycomputersrunningLinux.
D) first.
51) Whichtransmissionmediumisabletotransmitdatathefastest?
A) coaxialcable
B) wireless
C) fiber-opticcable
D) twisted-paircable
TRUE/FALSE. WriteTifthestatementistrueandFifthestatementisfalse.
52) The802.11gstandardsupportstransferratesofupto30Mbps.
53) Asinglecomputercanfunctionasbothaclientandaserver,but
performancewillbedegraded.
54) Itisnotpossibletoconfigureaclient/servernetworkforhomeuse.
55) ExtremeGandEnhancedGstandardswerebothbasedon802.11g
standardsbutusedproprietaryhardwareandsoftwaretweaksto
increaseperformance.
56) SMTPusesport21.
57) Themajorityofinvestigationsrelatedtocybercrimeinvolvedebitcard
fraud.
58) Repeaterscanextendanetworksrangebyamplifyingthesignal.
59) Thepracticeofpiggybackingisillegal.
60) OnecanhavebothwiredandwirelessnodesonasingleP2Pnetwork.
61) Anetwork-readydeviceisadevicethatmaybeattachedtoanetwork
butstillhastoconnecttoanetworkedcomputerfirst.
62) P2Pnetworksaremorecommonlyusedinsmallbusinessesthanin
homes.
63) TheMasterBootRecordexecuteseverytimeacomputerbootsup.
49) ______
50) ______
51) ______
52) ______
53) ______
54) ______
55) ______
56) ______
57) ______
58) ______
59) ______
60) ______
61) ______
62) ______
63) ______
64) Wirelessnetworksarenomorevulnerabletopacketsniffersthanany
othertypeofnetwork.
65) AwirelessNICfromonemanufacturermaynotworkwithaDSLrouter
fromanothermanufacturer,evenwhenbothdevicesclaimtobe
developedusingthesamestandards.
66) MostcomputerstodaycomewithEthernetadaptersalreadyinstalled.
67) Switchesreceivedatapacketsandsendthemtothenodeforwhichthey
areintendedonthesamenetwork.
68) White-hathackersperformaneededlegalserviceforsociety.
69) Inapeer-to-peernetwork,onecomputeractsastheserver.
70) Cybercriminalsareusuallysecurityindividualswhoworkinlarge
corporationswithavastknowledgebaseofcomputingandnetworking.
71) Whenconfiguredcorrectly,networkfirewallscanhelpprotectyour
network.
72) Aclientcomputeristhecomputeronwhichusersaccomplishspecific
tasks.
73) TheInternetisanexampleofaclient/servernetwork.
74) AP2Pnetworkneedsnetworkoperatingsystemsoftwareinstalledon
everynode.
75) Wirelessnetworksaremorevulnerabletoattackthanwirednetworks.
76) MANstandsformobileareanetwork
77) Whenanetworkissponsoredbyagovernmententitytoprovide
Internetaccesstoaspecificgeographicarea,thatnetworkwillgenerally
bedesignatedasaMAN.
78) 802.11devicesarelesssusceptibletointerferencethan802.11gdevices
are.
79) SMTPstandsforSimpleMailTransferProtocol.
80) ThecostofaP2Pnetworkisslightlygreaterthanthecostofa
client/servernetwork.
81) TheMacOSdoesNOTsupportP2Pnetworking.
82) Mostdesktopandnotebooksystemssoldtodayarenetworkready.
83) DatatransferratedoesNOTaffectthespeedatwhichausercan
64) ______
65) ______
66) ______
67) ______
68) ______
69) ______
70) ______
71) ______
72) ______
73) ______
74) ______
75) ______
76) ______
77) ______
78) ______
79) ______
80) ______
81) ______
82) ______
do wnload
afile
83)
froma
WAN.
84) Ethernetnetworksarealwaysconnectedusingtwisted-paircable
technology.
85) 802.11gdevices
haveafasterthroughputthan802.11ndevices.
___
___
84) ______
85) ______
1) C
2) D
3) B
4) C
5) A
6) B
7) D
8) D
9) A
10) A
11) B
12) A
13) D
14) B
15) C
16) D
17) B
18) C
19) B
20) A
21) C
22) C
23) C
24) A
25) C
26) D
27) C
28) A
29) A
30) D
31) C
32) A
33) B
34) A
35) A
36) D
37) A
38) A
39) A
40) A
41) D
42) A
43) C
44) D
45) C
46) C
47) D
48) C
49) A
50) D
51) C
52) FALSE
53) TRUE
54) FALSE
55) TRUE
56) TRUE
57) FALSE
58) TRUE
59) TRUE
60) TRUE
61) FALSE
62) FALSE
63) TRUE
64) FALSE
65) TRUE
66) TRUE
67) TRUE
68) FALSE
69) FALSE
70) FALSE
71) TRUE
72) TRUE
73) TRUE
74) FALSE
75) TRUE
76) FALSE
77) TRUE
78) FALSE
79) TRUE
80) FALSE
81) FALSE
82) TRUE
83) FALSE
84) FALSE
85) FALSE