Sunteți pe pagina 1din 15

NEW YORK STATE FBLA STATE LEADERSHIP CONFERENCE 2009 NETWORK DESIGN

PLEASE DO NOT OPEN THIS TEST UNTIL GIVEN PERMISSION


1. Complete the information requested on the answer sheet. PRINT your name on the Name line. PRINT the name of the event Network Design on the Subject line. PRINT the name of your chapter (school) in the spaced directed. All answers must be recorded on the answer sheet. Please do not write on the test booklet. Scrap paper will be provided. Read each question completely before answering. With a No. 2 pencil, blacken in each choice completely on the answer sheet. Do not make any other marks on the answer sheet or the scoring machine will reject it. Be sure to completely erase any changes or stray marks. You will be given 60 minutes to complete this test. You will be given a starting signal and a signal after 50 minutes have elapsed.

2. 3.

4.

NYS FBLA 2009 NETWORK DESIGN

1. What is the largest decimal value that can be stored in 1 byte? A. 254 B. 256 C. 255 D. 257 2. What A. B. C. D. is the binary number 11011010 in decimal? 186 202 218 222

3. What is the main circuit board of a computer? A. PC subsystem B. Motherboard C. Backplane D. Computer memory 4. What are the three common types of switching methods? A. STP, CRC, AND FCS B. Fragment-free, store-and-forward, and cut-out C. Store-and-forward, cut-through, and fragment-free D. Asymmetrical, symmetrical, and fragment-check 5. LAN switches use which of the following to make the forwarding decision? A. IP address B. MAC address C. Network address D. Host address 6. For which of the following do you need to provide a crossover cable? A. Connecting a switch to a switch B. Connecting a switch to a router C. Connecting a workstation to a hub D. Connecting a workstation to a switch 7. Which type of cabling is the most appropriate choice for Ethernet connectivity from a switch to a workstation? A. Coax B. UTP C. Fiber-optic D. RJ-11 8. Match the following to their respective units of measure: 1. Voltage A. Ohm 2. Current B. Ampere 3. Resistance C. Volt A. 1-C, 2-B, 3-A B. 1-B, 2-C, 3-A C. 1-A, 2-C, 3-B D. 1-C, 2-A, 3-B

NYS FBLA 2009 NETWORK DESIGN

9. What is the maximum cable length for Ethernet over UTP? A. 185 meters B. 500 meters C. 10 meters D. 100 meters 10. How many bits are in a byte? A. 4 B. 10 C. 8 D. 12 11. Which of the following would be the decimal value of the binary IP address 11001101.11111111.10101010.11001101? A. 205.255.170.205 B. 109.255.170.109 C. 205.127.200.205 D. 109.127.200.109 12. Which A. B. C. D. network device offers full-duplex, dedicated bandwidth to segments or desktops? Hub Bridge Ethernet switch Router

13. What is the decimal number 151 in binary? A. 10010110 B. 10010111 C. 10101011 D. 10010011 14. What numbering system do computers use for data processing? A. binary B. decimal C. hexadecimal D. octal 15. Which of the following would be the largest possible number expressed by an 8 bit binary number? A. 0 B. 11111111 C. 10101011 D. 10101010 16. What number system is based on powers of 2? A. octal B. hexadecimal C. binary D. ASCII 17. What is the advantage of coaxial cable? A. It can be run unrepeated farther than twisted-pair cabling.

NYS FBLA 2009 NETWORK DESIGN


B. It is less expensive than any other type of cabling C. It is easier to install than UTP D. It is more susceptible t noise than UTP 18. Which A. B. C. D. of the 4 FDDI specifications defines how the medium is accessed? Media Access Control (MAC) Physical Layer Protocol (PHY) Physical Layer Medium (PMD) Station Management (SMT)

19. What is a network interface card (NIC)? A. a WAN adapter B. a card used to make modern connections C. a printed circuit board that provides network communication D. a card used only for Ethernet networks 20. What does a switch use to make data forwarding decisions? A. IP address B. MAC address C. Network address D. Subnetwork address 21. Which A. B. C. D. private company created Ethernet? Xerox Microsoft IBM Cisco

22. What is a feature of coaxial cable? A. It contains four wire pairs in the center B. It uses a plastic woven braid C. It relies on cancellation effects to reduce the amount of interference D. It contains a copper conductor at the center 23. What does the twisting of the wires do in a CAT-5 cable? A. makes it thinner B. makes it less expensive C. limits signal degradation D. allows 6 pairs to fit in the space of 4 digits 24. What is the expansion slot on laptops commonly called? A. IEEE B. PCMCIA C. ITU-T D. FDDI 25. Which A. B. C. D. of the following represents the use of binary ones in a subnet mask? host bits subnet bits network bits subnet and network bits

26. What is the name of a device that has many transistors, performs a specific task, and is made of semi-conductor material? A. integrated circuit B. LED

NYS FBLA 2009 NETWORK DESIGN


C. Capacitor D. Resistor 27. All of the following are personal safety precautions before you install cable except A. wear long sleeves B. wear baggy clothes C. wear long pants D. check for power cables 28. Which A. B. C. D. of the following correctly describes an ISP? Internal Service Protection Internal Service Provider Internet Service Provider Internet Service Protection

29. If a Class B Network is subnetted with a mask of 255.255.240.0, how many useable subnets are created? A. 2 B. 6 C. 14 D. 30 30. How would you configure one host name that points to two IP addresses? A. IP host P1R1 1.0.0.5.2.0.0.8 B. IP P1R1 1.0.0.5.2.0.0.8 C. IP host P1R1 1.0.0.5 D. IP host duplicate all Which of the following is not a component of an effective IP addressing scheme? A. It is hierarchical in nature B. It allows you to focus on specific areas of security C. It is meaningful with some basis in the company architecture D. It is easy to implement and understand should another network administrator take over.

31.

32. Category 5 and Category 6 UTP typically use which type of connector? A. STP B. BNC C. RJ-45 D. RJ-11 33. What does A. B. C. D. 34. Setting up A. B. C. D. twisting the wires do in a twisted-pair cable? It makes it thinner. It makes it less expensive It reduces noise problems through the cancellation effect. It allows six pairs to fit in the space of four pairs. a data line and cable failure recovery system includes all of the following except: building multiple links to servers. Allowing for multiple redundant links to network resource Investing in backup WAN links to remote locations Providing a RAID array fault tolerance system

35. A small company wants to protect its computers from access via the Internet. Which network service can protect the companys internal network from forces from the Internet? A. Proxy server

NYS FBLA 2009 NETWORK DESIGN


B. DHCP C. WINS D. SMB 36. Which of the following describes attenuation? A. A loss of signal strength B. An increase in signal amplitude C. The delay experienced during signal travel D. The time it takes a signal to reach its destination 37. Fast Ethernet supports up to what transfer rate? A. 5 Mbps B. 10 Mbps C. 100 Mbps D. 1000Mbps

38. The piece of hardware which takes a high bandwidth broadband segment and splits it into multiple segments with lower bandwidth is called a: A. hub B. router C. repeater D. multiplexor 39. When cost is a factor, which of the following backbones would be the most reasonable choice? A. Ethernet B. ATM C. FDDI D. SDDI 40. This protocol is used to resolve IP addresses to MAC addresses. A. TCP B. IP C. PPP D. ARP 41. A large company maintains many mission-critical database servers in a large server farm. The area is prone to brownouts and blackouts. The company has hired you to investigate ways to keep downtime to a minimum in the case of a blackout. The best solution is: A. put uninterruptible power supplies on all servers in the server farm B. place surge protectors on each server C. place line conditioners throughout the server farm D. set up power generators that kick in automatically to power all servers in the farm for long term outages. 42. This protocol suite is non-routable and may be used in LANS that do not require access to external networks A. TCP/IP B. IPX/SPX C. NetBEUI D. NWLink 43. A class C address can support up to _________ hosts with unique IP addresses. A. 255 B. 254 C. 256 D. 253

NYS FBLA 2009 NETWORK DESIGN

44. When a network client wishes to lease an IP address from a DHCP server, it logs on and sends a: A. DHCPDISCOVER B. HCPACK C. HCPNAK D. HCPOFFER E. 45. DNS servers store DNS data in: A. class records B. resource records C. data elements D. domain names 46. The following are features of the ________ file system. Security at file and folder level File compression Disk quotas File encryption Active directory A. NTFS B. FAT16 C. AT32 D. FAT12 47. This is the A. B. C. D. native protocol for IBM mainframes and minicomputers. SNA AppleTalk IPX/SPX TCP/IP

48. What is the purpose of port numbers? A. Allows a host to multiplex received segments, selecting the correct application process to which to give received data. B. Source systems use them to keep a session organized C. End systems use them to assign end users dynamically to a particular session, depending on their application use. D. Source systems generate them to predict destination addresses. 49. This is the A. B. C. D. part of a network that provides services and access to resources: Transmission media Server Protocols Client

50. The 802.11b standard is also called this: A. LCD Screen B. Hi-Def with Cable Phone Capabilities C. Blue Tooth D. Wi-Fi 51. Once a network is set up, much of a network administrators time may be spent: A. designing new network interfaces to fulfill future needs B. troubleshooting and maintaining the current network

NYS FBLA 2009 NETWORK DESIGN


C. setting up clients and providing technical support D. integrating new protocols into the network 52. This part of the network defines the Rules for communication. A. Transmission media B. Connectivity devices C. Protocols D. Client 53. The logical A. B. C. D. topology of a token ring network is a: Star Bus Ring Mesh

54. This can be defined as software that allows a server to manage resources. A. Protocols B. Network operating system C. Connectivity devices D. Management software 55. If a computer has data to send, it captures the special frame and sends the date. This access method sends around a special frame to each computer. What is it called? A. Polling B. Token passing C. Contention D. CSMA/CD 56. What type A. B. C. D. of cabling is used in FDDI? Cat 5 Cat 4 Coaxial Fiber Optic

57. The OSI model can be used to: A. explain network communications on a conceptual level B. monitor network performance by categorizing what should be happening in network communications C. show interrelationships among hardware, protocols, and actions that occur/are used in network communications D. all of the above 58. Which of the following is one of the protocols found in the TCP/IP transport layer? A. FTP B. UDP C. Telnet D. DNS 59. Hafner needs to install a hub on his system. She has cable lengths of approximately 20 meters each. It is 300 meters from one end of the network to the other. Her main issue is attenuation. Other than that, she just wants to combine signals. She wants to buy the cheapest hub she can that will work best with her network. What type of hub should Hafner choose? A. Active hub B. Passive hub C. Intelligent hub

NYS FBLA 2009 NETWORK DESIGN


D. Switching hub

60. Routers use ________ protocols A. transport B. routable C. modulated D. application layer 61. This piece model: A. B. C. D. of hardware can be managed remotely and works at the data link layer of the OSI Switch Active hub Passive hub Router

62. Feldman is running a small network and using TCP/IP as the protocol stack. He needs to deal with a high number of collisions as indicated below. What is the result of this solution? Required result: reduce collisions on the network Optional desired results: route date from one computer directly to another; subnet the network into smaller network Proposed solution: Install a router A. fulfills the required result and both desired results B. fulfills the required result and one desired result C. fulfills the required result only D. does not fulfill the required result 63. The purpose of the secondary DNS server is to: A. provide a master copy of the lookup database to other DNS servers on the network B. maintain a secondary copy of the lookup database for fault tolerance C. help event e load of DNS requests on a large network so the primary DNS server is not overwhelmed D. both B and C 64. Which protocol would be used by a router? A. FTP B. DNS C. TCP D. IP 65. A bridge uses this address to deliver its packets A. Hardware or MAC address B. IP address C. Network address D. Port address 66. Configuring your hard drive to break a large hard drive into a smaller logical drives is referred to as: A. formatting B. partitioning C. managing D. portioning 67. To resolve an IP address to a domain name, use: A. forward lookup zones

NYS FBLA 2009 NETWORK DESIGN


B. WINS resolution C. Reverse lookup zones D. DNS caching 68. This is the A. B. C. D. 69. This is the A. B. C. D. area in RAM set aside for a device and its drivers to use. DMA channel IRQ Memory address IRC protocol stack used by Novell Netware: IPX/SPX TCP/IP NETBEUI DLC

10

70. This is a direct line to the CPU. When a device needs some processing power, it interrupts the CPU using the: A. IRC B. IRQ C. DMA channel D. I/O address 71. This access method fights for the transmission media. Its drawback is that collisions happen quite often. A. polling B. token passing C. contention D. none of the above 72. In your token-ring network, Node D did not return a reply to the beacon just sent out by the active monitor. What happens next? A. Node D will be sent another beacon B. Node D will be removed from the network by the MSAU C. The network will cease to function D. Nothing 73. Which of the following is not an advantage of peer-to-peer networks? A. Easy to install and configure B. Enhanced network security C. Individual users control their own shared resources D. Works well for 10 or fewer users 74. Which of the following devices is used as the central point of connection in a star topology network? A. Transceiver B. Hub C. Ring D. MAU 75. If your network has both TCP/IP and NetBEUI installed and your primary activity is connecting directly to the Internet, which protocol should have the priority binding? A. Net BEUI B. IPC C. DLC D. TCP/IP

NYS FBLA 2009 NETWORK DESIGN

11

76. What is the maximum transmission speed of TI circuit? A. 1.544 Mbps B. 15 Mbps C. 1 Mbps D. 64 Kbps 77. Which backup type backs up all selected files and marks them as backed up, but only if they have changed since they were last backed up? A. Full B. Copy C. Incremental D. Differential 78. When attempting to eliminate a problem, which of the following is the best choice? A. Perform several solutions simultaneously B. Attempt to isolate the problem C. Reinstall the network operating system D. De-emphasize one problem by creating another 79. Bandwidth A. B. C. D. is infinite. Bandwidth is limited by two factors. They are: Technology and corporate greed Hardware and the Biological Sciences Laws of Physics and chemistry Technology and the Laws of Physics

80. What is the opposition to the flow of electrons? A. Resistance B. Bandwidth C. Gigahertz D. Information Systems 81. Windows 2000 is a dynamic DNS server, which: A. Automatically registers computers with the DNS server as they log into the network. It works with the DHCP server to keep the DNS server lookup database up to date. B. Automatically assigns DNS addresses to the clients as they log onto the network. It works with DHCP. C. Automatically registers computers NetBIOS names with the WINS server when the computer logs onto the network. It works with the DHCP server. D. Automatically updates the caching servers with new requests as the clients log onto the network. 82. What is the purpose of plug and play? A. allows the user to manually configure hardware devices B. allows the computer to discover hardware devices and installs drivers C. discovers all hardware devices installed in a system D. ensures that all hardware devices are compatible with Windows 2000 83. If DNS is configured statically on a client that uses a DHCP server for IP addresses assignment: A. the DHCP server will override the static DNS addresses when it assigns the IP address and subnet mask. B. the DHCP server addresses will be added to the statically assigned addresses providing more fault tolerance in case of a DNS server failure.

NYS FBLA 2009 NETWORK DESIGN


C. the static IP addresses will be erased from the TCP/IP properties box. D. the static IP addresses of the DNS. E. 84. S. Endz needs to install Windows 2000 Server on a number of computers on a network. What is the result of this solution? Required objective: Install Windows 2000 Server Optional desired results -Prepare different installations for different computers -Deploy the set-ups using the fastest and easiest way possible (CONT ON NEXT PAGE) Proposed solution: SysPrep to prepare an image. Deploy that image using a third party project. A. fulfills the required result and both desired results B. fulfills the required result and one desired result C. fulfills the required result only D. does not fulfill the required result 85. This information is included in a packet and is the main stuff being transmitted. A. Header B. Data C. Start bits D. Stop bits 86. This RAID level provides more speed, but no real fault tolerance. A. RAID 0 B. RAID 1 C. RAID 2 D. RAID 5 87. This device allows you to continue working for a few minutes in the event of a power outage: A. UPS B. APS C. RAID D. Backup

12

88. When Windows 2000 Server is installed on the computer without checking the HCL, you find that the serial ports do not work correctly. What is most likely the problem? A. The ports are bad B. Need to install an update to Windows 2000 C. Need to update the BIOS because Windows has updated the serial port configuration. D. Need to update the serial port because Windows has updated the serial port configuration. 89. Which of the following is not an ongoing responsibility of a network administrator? A. Monitoring the network B. Optimizing network communications C. Troubleshooting problems D. Maintaining hardware 90. This RAID level can be either duplexing or mirroring. A. RAID 0 B. RAID 1 C. RAID 2 D. RAID 5

NYS FBLA 2009 NETWORK DESIGN

13

91. When starting in this mode, the screen is 640 x 480 and the colors are 16 colors. A. VGA B. Safe mode C. Debugging mode D. High Definition E. 92. This is a kind of shortcut from a device to RAM that allows the device to use memory without bugging the CPU. A. DMA channel B. IRC C. IRQ D. I/O Address 93. When a client boots with a RIS boot disk and connects to a RIS server, which of the following is not an option presented by the client wizard? A. restart a previous set-up B. custom setup C. maintenance and troubleshooting D. interactive setup 94. A piece of hardware that deals with attenuation problems is called a: A. repeater B. passive Hub C. NIC D. NAC 95. A simple solution to subnetting a large network would be: A. router B. hub C. gateway D. bridge 96. ___________ can be set up in a variety of ways and ensures high network availability, fail-over support, and little or no downtime in the event of a catastrophic network event. A. Backups B. Deployment C. Fault tolerance D. Logical grouping 97. Analyzing a companys enterprise includes: A. LANs and WANs B. LANs and VPNs C. LANs, WANs, and VPNs D. LANs, WANs, VPNs, and Remote Users 98. You are setting up a backbone-based network for a small not for profit company using donated equipment. The backbone consists of thicknet coaxial cable with drop cables connecting the hosts. Which of the following is required on this network? A. TCP/IP protocol B. 5-4-2 rule throughout the network C. terminate both ends of the backbone to absorb the signal D. use a repeater every 100 meters to deal with attenuation

NYS FBLA 2009 NETWORK DESIGN

14

99. This numerical designation is a number between 0 and 65535 that is coded into TCP or UDP to provide communication for specific applications. It allows for differentiation of data streams being sent to a particular host. A. IP address B. Host address C. MAC address D. Port address 100. This is defined as a group of computers with clients and at least one server sharing resources. A. Network B. Transmission media C. Peer to Peer D. Protocol

NYS FBLA 2009 NETWORK DESIGN

15

ANSWER KEY 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. C C B C B A B A D C A C B A B B B A C B A D C B D 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. A B C C A B C C D A A B C A D A C B A B A A D B D 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. B C C B B D D D A A A A D D A B C C A B C A B B D 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. A C B D A A B D B B A A C D B B A D A D C D C D A

S-ar putea să vă placă și