Sunteți pe pagina 1din 6

Practice 2 1) What is the name of an Ethernet cable that contains two electrical conductors ? b.

A coaxial cable 2) What are the names of the two common conditions that degrade the signals on c opper-based cables? Crosstal and attenuation 3) Which topology requires the use of terminators? a. Bus 4) Which of the following topologies is implemented only logically, not physical ly? c. Ring 5) How many wire pairs are actually used on a typical UTP Ethernet network? b. Two 6) What is the name of the process of building a frame around network layer info rmation? d. Data encapsulation 7) Which of the connectors on a network interface adapter transmits data in para llel? The System bus connector 8) Which two of the following hardware resources do network interface adapters a lways require? b.I/O port address c.IRQ 9) What is the name of the process by which a network interface adapter determin es when it should transmit its data over the network? Media Access Control 10) Which bus type is preferred for a NIC that will be connected to a Fast Ether net network? PCI 11) A passive hub does not do which of the following? a. Transmit management information using SNMP 12) To connect two Ethernet hubs together, you must do which of the following? d. Connect the uplink port in one hub to a standard port on the other 13) Which term describes a port in a Token Ring MAU that is not part of the ring ? d. Intelligent 14) A hub that functions as a repeater inhibits the effect of____________? Attenuation 15) You can use which of the following to connect two Ethernet computers togethe r using UTP cable? d. All of the above Practice 5

1) What is the name of the protocol that systems use to negotiate options during the PPP connection establishment procedure? b. LCP 2) What does an Ethernet system generate when it detects a collision? c. A jam signal 3) Which of the following is not a required component of a 10BaseT Ethernet netw ork? c. A hub 4) To achieve 100 Mbps speed over Category 3 cable, 100BaseT4 Ethernet uses whic h of the following? d. All four wire pairs 5) In which of the following standards is Gigabit Ethernet defined? d. IEEE 802.3z 6) The Frame Check Sequence field in a data-link layer protocol header is used f or ____________? Error Correction 7) List the hardware components that you have to replace when upgrading a ten-ye ar-old 10BaseT network to 100BaseTX? The components are NICs, hubs and cable (because a 10 year old network is most l ikely using Category 3 cable, and Category 5 is required for 100Base TX.) 8) How could you upgrade a ten-year-old 10BaseT network to Fast Ethernet without replacing the cables? Use 100Base T4 and hubs. 9) Which data-link layer protocol is preferred on a network with high levels of traffic, Ethernet or Token Ring? Why? Token Ring is preferable, because it can handle high traffic levels without dimi nished performance. Ethernet experiences more collisions as traffic increase, ca using performance to degrade. 10) Which Fast Ethernet physical layer option is best suited for a connection be tween two campus buildings 200 meters apart? Why? 100BaseFX, because fiber optic cable is better suited to outdoor installations a nd because the Fast Ethernet UTP cable options are all restricted to cable segme nts no longer than 100 meters. Practice 4 1) Which of the following ITU standards is the basis for NDS and Active Director y? c. X.500 2) Which types of network clients are included in Windows 2000 Professional? a.Client Service for NetWare (STP) cable c.Client for Microsoft Networks 3) What is the Windows NT and Windows 2000 file system called that enables admin istrators to assign permissions to individual files? d. NTFS 4) Which of the following services on a Windows NT or Windows 2000 network is re sponsible for configuring TCP/IP clients? d. DHCP

5) Which of the following network operating systems is generally considered to b e the best application server platform? d. UNIX 6) What is a program called that runs in the background on a UNIX system? b. A daemon 7) Which of the following directory services uses multiword names for its domain s? d. Active Directory 8) What is splitting an NDS tree into pieces and storing those pieces on differe nt servers called? b. Partitioning 9) What is the Windows NT and Windows 2000 service that maintains a list of shar ed resources on the network called? c. Computer Browser 10) Which of the following is not a true statement? a. Containers are composed of objects. Practice 1 1) Which layer of the OSI reference model is responsible for controlling access to the network medium? The data-link layer 2) On which type of network does each computer maintain its own permissions and security settings? A peer to peer network 3) A language that two computers "speak" while communicating over a network is c alled ____________. A protocol 4) A series of LANs connected together by any means is called ____________. An internetwork 5)What kind of network is often used to connect horizontal segments on a large e nterprise internetwork? A backbone 6) Which layer of the OSI model is responsible for translating different syntaxe s? The presentation layer 7) A network in which the medium carries only one signal is called ____________. Baseband 8) An example of full-duplex communications is ____________. A telephone call 9) The address of a packet's final destination is specified in the ____________ layer. Network 10) TCP is an example of a ____________layer protocol. Transport

11) Electrical voltages, light pulses, and infrared waves are all examples of ty pes of ____________. Signals 12) A technology used to connect LANs at distant locations is called ___________ _. A wide area network 13) The type of network in which data is split into discrete units that are tran smitted over the network individually is callled ____________. A packet switching network 14) The process by which a receiving system sends messages instructing a sending system to slow down its transmission rate is called ____________. Flow control 15) A protocol that uses a handshake to establish a connection before sending da ta is called ____________. Connection oriented Practice 3 1) Which of the following devices are you most likely to use to connect a LAN to the Internet? A router 2) Which of the following devices does not read the data-link layer protocol hea der in incoming packets? A hub (STP) cable 3) Suppose that you have a 10 MBPS Ethernet LAN that consists of 45 computers co nnected to three standard repeating hubs. Traffic levels are getting too high, c ausing excessive collisions and reduced performance. Which of the following cour ses of action is the most inexpensive way to reduce the overall traffic level on the network? Install a transparent bridge between two of the hubs. 4) Using the same scenario as in question 3, which of the following courses of a ction would not increase the bandwidth available to each workstation? Split the network into three LANs and connect them using dedicated hardware rout ers. 5) The spanning tree algorithm is used to prevent which of the following network ing problems? Bridge loops 6) Source route bridging is associated with which of the following protocols? b. Token Ring 7) On a switched network, virtual LANs are used to create multiples of what? Broadcast domains 8) ICS enables a computer running Windows to function as what? A router 9) Which of the following processes requires manual intervention from a network administrator? Static routing

10) Which of the following devices does not have buffers to store data during pr ocessing? All of the above Practice 6 1) What does the IP header's protocol field identify? .The transport layer protocol that generated the information in the Data field 2) Which of the following IP header elements is never modified during the IP fra gmentation process? The Identification field 3) What does an IP address identify? A computer 4) In the IP header, the IPX equivalent to the TTL field is called what? Transport Control 5) Which of the following statements about IPX is untrue? IPX uses a checksum to verify the proper transmission of data. 6) How many bytes long is the information that IPX uses to identify the datagram 's destination computer on a particular network? 10 7) Specify which network layer protocol you would use on each of the following n etworks, and explain why. a.A private internetwork with mixed Windows and NetWare systems IPX, because NetWare requires it b.A two-node home Windows-based network with individual dial-up Internet connect ions NETBeui because it is easy to install and configure c.A ten-node Windows-based network with a router connecting it to the Internet TCP/IP because it needs to connect to internet 8) Which IP header field makes the Traceroute utility possible? Time To Live 9) Which two protocols carried within IP datagrams operate at the transport laye r of the OSI model? TCP UDP 10) Give two reasons why NetBEUI is not suitable for use on a large internetwork . It is not suitable because it lacks then network indentifiers needed to route pa ckets between networks and because it generates a large amount of broadcast traf fic. 11) 12.Place the following phases of a NetBEUI Frame session in the proper order . dcbfae Name resolution LLC session establishment Session Initialize Session Confirm Session End

12) What is the maximum number of routers that an IPX datagram can pass through on the way to its destination? 16 13) Which of the following protocols is capable of providing connection-oriented service? NetBEUI

S-ar putea să vă placă și