Telecom Practice Final Exam

95 Questions

Settings
Practice Exam Quizzes & Trivia

The following questions have been created from Ch. 3, 8, 15, and 17 of the textbook. This practice exam DOES NOT have questions from the group presentations or Windows commands. #1-25 are chapter 3. #26-51 are chapter 15. #52-63 are chapter 18. #64-95 are chapter 8


Questions and Answers
  • 1. 
    Which is not one of the main types of Ethernet Cabling?
    • A. 

      RG-58

    • B. 

      UTP

    • C. 

      FTP

    • D. 

      RG-11

  • 2. 
    What type of cable is used with ubs and switches?
    • A. 

      RG-58

    • B. 

      UTP

    • C. 

      FTP

    • D. 

      RG-11

  • 3. 
    RG-11 cable is considered the backbone of cable.
    • A. 

      True

    • B. 

      False

  • 4. 
    Reducation of noise and crosstalk is one advantage of twisted pair wires
    • A. 

      True

    • B. 

      False

  • 5. 
    Fiber optic cable can be constructed only using plasic.
    • A. 

      True

    • B. 

      False

  • 6. 
    One advantage of fiber optic wire is that is eliminates the problems found in copper wires 
    • A. 

      True

    • B. 

      False

  • 7. 
    Which of the following acts as an interface between networked device and physical network connection?
    • A. 

      WAN

    • B. 

      LAN

    • C. 

      INET

    • D. 

      NIC

  • 8. 
    Which layer of the OSI model does the NIC operate in?
    • A. 

      Data-link layer

    • B. 

      Transmission layer

    • C. 

      Physical Layer

    • D. 

      THE CHOCOLATE LAYER

  • 9. 
    This type of address consist of 48 bits and is unique.
    • A. 

      IP

    • B. 

      MAC

    • C. 

      IF

    • D. 

      Machine

  • 10. 
    The alst six digits of a MAC address represent the NIC serial number.
    • A. 

      True

    • B. 

      False

  • 11. 
    The NIC utilizes two addresses.  The __________and the _____________.
  • 12. 
    The MAC address is assigned by the manufacture and it changes every time you log in.
    • A. 

      True

    • B. 

      False

  • 13. 
    The IP address is assigned by the operating system and it stays the same.
    • A. 

      True

    • B. 

      False

  • 14. 
    Token-ring networks make connections using what types of cables?
    • A. 

      Ethernet

    • B. 

      STP

    • C. 

      Coaxial

    • D. 

      UTP

  • 15. 
    What is used to connect two network segments?
    • A. 

      Transceivers

    • B. 

      Repeaters

    • C. 

      Ethernet

    • D. 

      Coaxial cable

  • 16. 
    Repeaters are designed to keep collision detection wokring properly
    • A. 

      True

    • B. 

      False

  • 17. 
    Which of the following is NOT true about transceivers?
    • A. 

      They concert transmissions from one media type to another

    • B. 

      They operate at the OSI model layer

    • C. 

      They are important for upgrading a network

    • D. 

      The is only one type of transceiver available

  • 18. 
    Which of the folloing is NOT true about hubs?
    • A. 

      They are different from repeaters

    • B. 

      They contain a small amount of intelligence

    • C. 

      They operate in the physical layer

    • D. 

      The broadcast data received by any port to all other ports on hub

  • 19. 
    Hubs are used to expand one Ethernet connection to many
    • A. 

      True

    • B. 

      False

  • 20. 
    Bridges are used to partition a large network into smaller groups
    • A. 

      True

    • B. 

      False

  • 21. 
    Switches use which type of protocol?
    • A. 

      FTP

    • B. 

      UTP

    • C. 

      SNMP

    • D. 

      SMTP

  • 22. 
    Bridges and swtiches operate in the data link layer of the OSI model
    • A. 

      True

    • B. 

      False

  • 23. 
    Which of the following is NOT a characteristic of a router?
    • A. 

      Basic Internet building block

    • B. 

      Examines each packet

    • C. 

      Connects two or more networks together

    • D. 

      Inspects network traffic

  • 24. 
    The purpose of a firewall is to protect a network and computer from outside access
    • A. 

      True

    • B. 

      False

  • 25. 
    ISP stand for...
    • A. 

      Internal Service Provider

    • B. 

      Internet Sales Processor

    • C. 

      Internet Service Provider

    • D. 

      Internet Service Protocol

  • 26. 
    Domain names are associated with an IP address.
    • A. 

      True

    • B. 

      False

  • 27. 
    Even with a growing internet, there will never be a shortage of available networks.
    • A. 

      True

    • B. 

      False

  • 28. 
    ICS stands for...
    • A. 

      Internal Control Sharing

    • B. 

      Internet Connection Sharing

    • C. 

      Internal Connection Sharing

    • D. 

      Information Connection Session

  • 29. 
    ICS - Contains one connection to the ___________, second connection to the ____________.
  • 30. 
    Alternatively, multiple computers can share a single Internet connection if there is a cable modem/DSL router.
    • A. 

      True

    • B. 

      False

  • 31. 
    What does WINS stand for?
  • 32. 
    Which of the following is a characteristic of WINS (may be multiple answers)?
    • A. 

      Translates Windows computer names to IP addresses

    • B. 

      Name-to-IP mappings dynamic database

    • C. 

      Assigns MAC address manually

    • D. 

      Automatically adjusts entries as IP addresses reassigned

  • 33. 
    Linux, Unix and MAC OS are examples of other operating systems on the internet.
    • A. 

      True

    • B. 

      False

  • 34. 
    WWW(World Wide Web) is a collection of
    • A. 

      Operating systems

    • B. 

      Internet Users

    • C. 

      Web Servers

  • 35. 
    What are the three elements of Web Server Files
    • A. 

      Depth, Layout, Organization

    • B. 

      Content, Layout, Depth

    • C. 

      Users, Servers, Websites

    • D. 

      Content, Organization, Layout

  • 36. 
    HTML stand for Hypertext Markup Language
    • A. 

      True

    • B. 

      False

  • 37. 
    This is not a question. Make sure you know the difference between WWW/HTTP/URL/HTML. Select true to move on.
    • A. 

      True

    • B. 

      False

  • 38. 
    XHTML is an update to HTML.
    • A. 

      True

    • B. 

      False

  • 39. 
    XML is much more advanced.
    • A. 

      True

    • B. 

      False

  • 40. 
    Java is a programming language used to create:
    • A. 

      Surveys

    • B. 

      Hardware

    • C. 

      Computer Programs

    • D. 

      Websites

  • 41. 
    The Java Applet program can't be run on other operating systems. 
    • A. 

      True

    • B. 

      False

  • 42. 
    Which of the following programming langauges provides web client side processes, preforms common activities, and custom activities
    • A. 

      HTML

    • B. 

      CSS

    • C. 

      JavaScript

    • D. 

      XML

  • 43. 
    VPN's allow for private _____ secure communication (uses encryption).
    • A. 

      LAN

    • B. 

      WAN

    • C. 

      MAN

    • D. 

      SPAM

  • 44. 
    Only authorized network members can access data on VPN's
    • A. 

      True

    • B. 

      False

  • 45. 
    Only authorized network members can access data on VPN's.
    • A. 

      True

    • B. 

      False

  • 46. 
    VPN's use _________________, which allows the system to make sure you are who you say you are.
  • 47. 
    Web servers are typically set up on a small computer system.
    • A. 

      True

    • B. 

      False

  • 48. 
    What is the most popular web server program?
    • A. 

      Jigsaw

    • B. 

      Apache Server

    • C. 

      Klone

    • D. 

      Lighttpd

  • 49. 
    Instant Messaging is slower than electronic mail
    • A. 

      True

    • B. 

      False

  • 50. 
    Microsoft Internet Information Services (IIS) Web server is veryy popular with Windows users.
    • A. 

      True

    • B. 

      False

  • 51. 
    Windows today uses ________ for network operation backbone
    • A. 

      TCP

    • B. 

      IP

    • C. 

      TCP/IP

    • D. 

      IP/Mac

  • 52. 
    The ISO/OSI model is a widely accepted standard defining network layering
    • A. 

      True

    • B. 

      False

  • 53. 
    • A. 

      True

    • B. 

      False

  • 54. 
    Select characteristics associated with the NetBEUI protocol.
    • A. 

      Handles file and printer sharing

    • B. 

      Provides security features

    • C. 

      Gathers network neighborhood information

  • 55. 
    The Network Neighborhood is a hierarchical collection of machines that is capable of communicating with each other.
    • A. 

      True

    • B. 

      False

  • 56. 
    All of the following are characteristics of Network Printing EXCEPT
    • A. 

      Printer that users share

    • B. 

      Network users map to the network printer

    • C. 

      Printer with only a network connection shared by a server

    • D. 

      Users need printer software to use printer

  • 57. 
    A printer cannot be added using TCP/IP.
    • A. 

      True

    • B. 

      False

  • 58. 
    Sharing files over a network allows remote users to map a disk.  A(n) _____________ may be necessary to gain access to the data.
    • A. 

      Identical IP address

    • B. 

      Password

    • C. 

      Identical operating system

    • D. 

      MAC address

  • 59. 
    File sharing is only accessible on Windows 9x. 
    • A. 

      True

    • B. 

      False

  • 60. 
    Dial-Up networking was designed to provide...
    • A. 

      Reliable data connections

    • B. 

      Email access

    • C. 

      Network printing

  • 61. 
    Dial-Up networking uses...
    • A. 

      A modem

    • B. 

      A telephone line

    • C. 

      Both A and B

    • D. 

      None of the above

  • 62. 
    ICA: efficient remote-access method.
    • A. 

      True

    • B. 

      False

  • 63. 
    Which of the following is NOT one of the TCP/IP layers
    • A. 

      Application

    • B. 

      Transport

    • C. 

      Physical

    • D. 

      Network

  • 64. 
    The packet of data that is transmitted from the source computer contains one information header for the entire protocol stack.
    • A. 

      True

    • B. 

      False

  • 65. 
    What does TCP/IP stand for?
    • A. 

      Transmitted Captured Protocol/Interface Protocol

    • B. 

      Transmission Control Protocol/Internet Protocol

    • C. 

      Transmission Control Protocol/Interface Protocol

    • D. 

      Transceiver Control Preface/Interface Protocol

  • 66. 
    One disadvantage of TCP/IP is the lack of vendor 
    • A. 

      True

    • B. 

      False

  • 67. 
    All the following EXCEPT ________ are important TCP/IP RFC’s
    • A. 

      Telnet

    • B. 

      SMTP

    • C. 

      SNMP

    • D. 

      UPT

  • 68. 
    IP is responsible for the physical addressing of each packet created by the Transport 
    • A. 

      True

    • B. 

      False

  • 69. 
    IP adds the source and destination IP address to each packet as it is built
    • A. 

      True

    • B. 

      False

  • 70. 
    IP datagram pieces are treated at independent entities and as such they may take different routes. 
    • A. 

      True

    • B. 

      False

  • 71. 
    An IP address is composed of which two parts?
    • A. 

      Protocol ID and Network ID

    • B. 

      Network ID and data ID

    • C. 

      Network ID and host ID

    • D. 

      Host ID and data ID

  • 72. 
    Each ________ in an IP address represents ______ bits of information?
    • A. 

      Host, 32

    • B. 

      Data, 8

    • C. 

      Packet, 32

    • D. 

      Octet 8

  • 73. 
    A host can be anything on the mainframe with an IP 
    • A. 

      True

    • B. 

      False

  • 74. 
    Which is NOT true of an IP address?
    • A. 

      It is different than a MAC address

    • B. 

      It is always static

    • C. 

      It is divided into classes A-E

    • D. 

      They must be unique

  • 75. 
    DHCP stands for Dynamic Host Control Protocol 
    • A. 

      True

    • B. 

      False

  • 76. 
    ARP is used to
    • A. 

      Connect two different routers

    • B. 

      Convert logical IP addresses to physical MAC addresses

    • C. 

      Verify that the remote host exists

    • D. 

      Provide communication between links

  • 77. 
    TCP establishes connections through predefined ports or sockets one advantage of TCP is
    • A. 

      Reliability

    • B. 

      Error Checking

    • C. 

      Packet received acknowledgement

    • D. 

      Packet Sequencing

    • E. 

      All of the above.

  • 78. 
    TCP is the most commonly used protocol 
    • A. 

      True

    • B. 

      False

  • 79. 
    The primary purpose of TCP is to provide security between networks
    • A. 

      True

    • B. 

      False

  • 80. 
    Which is NOT one of the layers of the TCP/IP architecture?
    • A. 

      Application

    • B. 

      Transport

    • C. 

      Internet

    • D. 

      Processing

  • 81. 
    Which layer is responsible for providing access to network resources?
    • A. 

      Application

    • B. 

      Transport

    • C. 

      Internet

    • D. 

      Processing

  • 82. 
    Which layer is responsible for breaking entire messages down into packets?
    • A. 

      Application

    • B. 

      Transport

    • C. 

      Internet

    • D. 

      Processing

  • 83. 
    The transport layer uses port addresses
    • A. 

      True

    • B. 

      False

  • 84. 
    The combination of an IP address and a port number is referred to as a?
    • A. 

      Hub

    • B. 

      Client

    • C. 

      Browser

    • D. 

      Socket

  • 85. 
    Which of the following is the protocol associated with the Web?
    • A. 

      TELNET

    • B. 

      POP3

    • C. 

      FTP

    • D. 

      HTTP

  • 86. 
    SMTP is always used to retrieve e-mail from a server when you are reading it 
    • A. 

      True

    • B. 

      False

  • 87. 
    POP3 stands for...
    • A. 

      Peer on Peer version 3

    • B. 

      Past or Present standard 3

    • C. 

      Purpose of Protocol standard 3

    • D. 

      Post office Protocol version 3

  • 88. 
    RARP provides an IP address for a specific MAC address 
    • A. 

      True

    • B. 

      False

  • 89. 
    All of the following are characteristics of DNS EXCEPT?
    • A. 

      Converts host name to IP address (vice versa)

    • B. 

      Makes remembering Domain address more difficult

    • C. 

      Resolves host names to IP addresses

    • D. 

      Finds domain controllers

  • 90. 
    TELNET is a non-terminal emulation protocol that is primarily used to connect remotely to UNIX and Linux. 
    • A. 

      True

    • B. 

      False

  • 91. 
    DHCP is an automated mechanism to assign IP and MAC address to clients 
    • A. 

      True

    • B. 

      False

  • 92. 
    The D in DHCP stands for
    • A. 

      Dual

    • B. 

      Dynamic

    • C. 

      Data

    • D. 

      Dontknow

  • 93. 
    The SNMP support protocol is used for network management 
    • A. 

      True

    • B. 

      False

  • 94. 
    Which of the following is NOT a characteristic of HTTP?
    • A. 

      Transfers multimedia information over the Internet

    • B. 

      Is the most common protocol used on the Internet today

    • C. 

      Defines the commands that Web browsers can send

    • D. 

      Exchanges encrypted Web pages between a client/server connection