Documente Academic
Documente Profesional
Documente Cultură
science/networking topics/studies its intention is for high school and college computer
science students interested in home study to have fun while learning about computer
science/networking topics. The latest version features 210 questions. Sections include
amongst others:
Topology
Acronyms
Media Type/Conductors
Jack Arrangements
Standard File Name Extensions
Keys on Keyboard
Microprocessor Chips
DOS Commands
OSI Model
Networking Hardware Terms
Sonet Levels
Linux Command Line Commands
Domain Names
Network Troubleshooting
Viruses
Network Security
Network Connectors
Network Terms
2
Topology ..................................................................................................................... 4
Common Acronyms .................................................................................................... 6
Miscellaneous Media Type/Conductor ....................................................................... 8
Jack Arrangements .................................................................................................... 10
Standard Filename Extensions .................................................................................. 12
Keys on Keyboard..................................................................................................... 14
Historic Microprocessor Chips.................................................................................. 16
DOS Commands........................................................................................................ 18
OSI Model - Open System Interconnection .............................................................. 20
Networking Hardware Terms.................................................................................... 22
Sonet Levels .............................................................................................................. 24
Linux Command Line Commands ............................................................................ 26
Domain Names.......................................................................................................... 28
Network Troubleshooting ......................................................................................... 30
Viruses....................................................................................................................... 32
Network Security....................................................................................................... 34
Network Connectors.................................................................................................. 36
Network Terms I ....................................................................................................... 38
Network Terms II ...................................................................................................... 40
Network Terms III..................................................................................................... 42
About The Author ..................................................................................................... 44
Sources ...................................................................................................................... 45
3
Topology
1) Type of network topology that has all connections terminating into a central
concentrator. Also uses 10BaseT and 100BaseT cabling?
a) Star Topology
b) Bus Topology
c) Mesh Topology
d) Fence Topology
2) Type of network topology that sends signals to disks, memory, CPU etc.
Commonly used with 10Base2 (thinnet) and 10Base5 (thicknet) cabling?
a) Car/Tree topology
b) Bus/Tree topology
c) Mesh/Tree topology
d) Web/Tree topology
3) A network topology that has two ways to every path. Commonly used in MPLS
(Multi Protocol Label Switching) networks?
a) List topology
b) Bus topology
c) Disk topology
d) Mesh topology
4) A network topology where all nodes on the network are connected conceptually via a
circle?
a) Ring or Token Ring Topology
b) Ring or Web Ring Topology
c) Bus or Ring Topology
d) Left or Right Topology
4
6) Created when multiple rings are interconnected by a bridge?
a) Bus Ring topology
b) Wing Ring topology
c) Star Ring topology
d) Key Ring topology
10) All transmitted messages must travel through the central hub?
a) Bus topology
b) Star topology
c) Ring topology
d) Iron topology
5
Common Acronyms
1) In regards to the 802.2 standard - what does the LLC refer to?
a) Lightweight Link Control
b) Logical Link Control
c) Lovely Link Control
d) Lava Link Control
6
6) Packets generated by the LLC layer are called PDUs - PDU stands for what?
a) Protocol Dime Units
b) Protocol Data Unks
c) Possible Data Units
d) Protocol Data Units
7
Miscellaneous Media Type/Conductor
8
6) Type of Ethernet segment that runs 328 ft?
a) 10Base2
b) 10Base5
c) 10BaseT
d) 10BaseS
9
Jack Arrangements
1) Usually associated with single line devices used with desk telephone sets and wall
mounted telephone sets?
a) RJ-12C and RJ-12W
b) RJ-11C and RJ-11W
c) RJ-14C and RJ-14W
d) RJ-15C and RJ-15W
2) Usually associated with one line of a key telephone system - additionally, used for
responding to a central office or public telephone switch ringing?
a) RJ-12C and RJ-12W
b) RJ-13C and RJ-13W
c) RJ-14C and RJ-14W
d) RJ-15C and RJ-15W
3) Usually used in hospital critical care area. Only equipment that conforms to Article
517 of the 1978 National Electrical Code can connect to this jack?
a) RJ-17A
b) RJ-17B
c) RJ-17C
d) RJ-17D
10
6) Usually used with alarm - reporting devices?
a) RJ-33X
b) RJ-38X
c) RJ-31X
d) RJ-36A
9) Usually associated with a key telephone all conductors are wired behind the system
key-system line circuit?
a) RJ-34X
b) RJ-34Z
c) RJ-35A
d) RJ-38X
10) This jack set-up provides the features of a patch panel. Provides a multiple-mounting
arrangement?
a) RJ-42M and RJ-46M
b) RJ-43M and RJ-43M
c) RJ-45M and RJ-45M
d) RJ-41M and RJ-45M
11
Standard Filename Extensions
12
6) What is the best description of a FON file extension?
a) Form file
b) Font file
c) Farm file
d) Filter file
13
Keys on Keyboard
1) Cancels the command one has typed but not yet entered?
a) Esc
b) End
c) Est
d) Esq
3) Typically erases the character to the left of the current cursor position?
a) Tab
b) Backspace
c) Caps Lock
d) Scroll Lock
14
6) Prints out the data that is displayed on the screen?
a) Page down
b) Print screen
c) Alt
d) Ctrl
10) When print is used with this key - it can do print screen displays continually?
a) Ctrl
b) Home
c) End
d) Pg Dn
15
Historic Microprocessor Chips
16
6) What is the clock speed in Mhz range of a 30386SX chip type?
a) 10-33Mhz
b) 12-33Mhz
c) 14-33Mhz
d) 16-33Mhz
10) What was the Mhz of both the 8088 and 8085 chips?
a) 2Mhz
b) 4Mhz
c) 6Mhz
d) 8Mhz
17
DOS Commands
18
6) This command displays/changes the system time?
a) Date
b) Time
c) Clock
d) World
10) This command is used to access what version of DOS is being used?
a) Ver
b) Dos
c) Version
d) Comm
19
OSI Model - Open System Interconnection
20
6) At this layer - codes, addresses and transmitting of information occurs?
a) Data link
b) Presentation
c) Session
d) Transport
7) At this layer - text formatting and displaying of code conversion takes place?
a) Data link
b) Presentation
c) Session
d) Transport
9) Components of the Ethernet 802.3 frame - which indicates the beginning of the
addressing frame is called what?
a) SFD - Start of Frame Dialect
b) SFD - Start of Frame Digit
c) SFD - Start of Frame Delimiter
d) SFD - Start of Frame Digital
10) Components of the Ethernet 802.3 frame which marks the beginning of the entire
frame is called what?
a) Start
b) Preamble
c) Begin
d) Status Start
21
Networking Hardware Terms
22
6) VLAN stands for what network within a network?
a) Virtual Large Area Network
b) Virtual Local Area Network
c) Very Local Area Net
d) Virtual Light Area Network
23
Sonet Levels
3) What does SDH stand for which is the international version of a Sonet?
a) Synchronous Diode Hierarchy
b) Synchronous Digital High
c) Super-voltage Digital Hierarchy
d) Synchronous Digital Hierarchy
24
6) What is the throughput in Mbps of OC24?
a) 244Mbps
b) 2244Mbps
c) 1244Mbps
d) 684Mbps
25
Linux Command Line Commands
1) Command to display with details all the files in the current directory?
a) ls -la
b) ll -la
c) lq -la
d) ls -lc
26
6) Used to make a copy of test1, named test2?
a) cp test1 test2
b) cp test2 test1
c) ci test1 test2
d) ct test1 test2
8) Used to display the network interface configuration, including the IP address, MAC
address and statistics?
a) config
b) ip
c) ip stat
d) ip config
27
Domain Names
28
6) What does a domain suffix of mil stand for?
a) Military
b) U.S. military organization
c) Government organization
d) Militia
29
Network Troubleshooting
1) This high-end instrument is used for testing the qualities of a cable - its acronym is
TDZ?
a) Time Dung Reflectometer
b) Tin Domain Reflect
c) Time Digital Reflectometer
d) Time Domain Reflectometer
2) This high-end instrument is for testing fiber optic networks its acronym is OTDR?
a) Optical tune domain reflectometer
b) Optical time domain reflectometer
c) Object time domain reflectometer
d) Optical time dimension reflectometer
3) Collisions that occur when two or more stations are transmitting simultaneously?
a) Static collisions
b) Single collisions
c) Local collisions
d) Diode collisions
4) Packets that are smaller then the items minimum packet size?
a) Runts
b) Tiny
c) Very Small
d) Minute
5) Packets that are larger then the items maximum packet size?
a) Extra Packets
b) Giants
c) Huge Packets
d) Gigantic Packets
30
6) Device that handles electrical signals improperly affecting the network?
a) Crabber
b) Jabber
c) Flow-ray
d) Network-optic-scanner
7) Frames that are not really data frames but by a repeater misinterpreting voltage on a
wire?
a) Ghosts
b) Hosts
c) Hives
d) Gestures
8) When a cyclic redundancy check sum (CRC) does not match the checksum calculated
from the data received?
a) Positive frame sequence blocks
b) Negative frequent sequence blocks
c) Neutral frame sequence blocks
d) Negative frame sequence blocks
9) Collisions that occur outside the window of time in which under normal theory would
be detected by the network?
a) Early collisions
b) Late collisions
c) Latté collisions
d) Lonely collisions
10) A portable hardware based tool that a network employee connects to the networks to
troubleshoot the network problems?
a) Network analyzer
b) Ray analyzer
c) Hover analyzer
d) MPLS analyzer
31
Viruses
1) Virus that resides on the boot sector of a floppy disk and transfers to a hard disk?
a) Boot sector virus
b) Disk drive sector virus
c) Computer sector virus
d) Boot hovering virus
4) Virus that gets propagated via network protocols, commands, messaging programs
and data links?
a) IP virus
b) NPLS virus
c) Router virus
d) Network virus
5) Programs that run independently and travel between computers and across networks?
a) Operations
b) Worms
c) Snails
d) Slugs
32
6) Program that claims to do something useful but rather harms the computer system?
a) Trojan horse
b) Fake
c) Inherited
d) Promo
7) A virus scanning that try s to identify viruses by trying to find the virus behavior?
a) Combat scanning
b) Heuristic scanning
c) Scaled scanning
d) Clip scanning
10) Compares file contents to known virus signatures in a signature database to see if the
file is a virus?
a) Signature scanning
b) Comfort scanning
c) Octet scanning
d) Octave scanning
33
Network Security
1) In the IPSEC Internet protocol security realm this type of encryption provides
authentication of the IP packet's data via public key techniques?
a) Authentication header (AH)
b) Phantom header (PH)
c) Dialogue header (DH)
d) Public header (PH)
2) A popular key-based encryption system for e-mail which uses a two-step verification
process?
a) PGP-Pretty Gale Privacy
b) PGP-Pretty Good Privacy
c) PGP-Pretty Goofy Privacy
d) PGP-Perpetual Good Privacy
3) A cross-platform authentication protocol that uses key encryption for its verification
process. Good example of a private key encryption service?
a) WAML
b) SAML
c) Disco
d) Kerberos
4) Method of encrypting TCP/IP transmissions which includes web pages and web
forms?
a) Secure Sock Layer (SSL)
b) Secure Sockets Layer (SSL)
c) Sent Sockets Layer (SSL)
d) Secure Scrub Layer (SSL)
34
6) Enables a user to be accepted as a validated user by multiple services, speaking in
Kerberos terminology?
a) Tike Granting Ticket (TGT)
b) Ticket Granting Ticket (TGT)
c) Ticket Grading Ticket (TGT)
d) Ticket Granting Transfer (TGT)
8) A key issued to both the client and service by the authentication service which
uniquely identifies the session - in Kerberos terminology?
a) Subject key
b) Sublet key
c) Security key
d) Session key
10) Filters or blocks traffic between networks via a specialized device (like a router)?
a) Firewall
b) Band-aid
c) Block engine
d) Spam
35
Network Connectors
36
6) A ST connector is used for?
a) Fiber-audit cabling
b) Thin cabling
c) Segment cabling
d) Fiber-optic cabling
37
Network Terms I
2) Ethernet networks that identifies a node that uses the LLC protocol?
a) Service Access Protocol (SAP)
b) Service Access Point (SAP)
c) Service Atrium Point (SAP)
d) Service Access Point (SAP)
3) Generated at the transport layer of the OSI model that confirms to a sender - that its
frame was received?
a) Awkward
b) Acknowledgment
c) Await
d) Transport
4) Attached to the system board - controls the computer's communication with its
devices?
a) BIOS (basic input/output system)
b) ROM (read only memory)
c) RAM (random access memory)
d) BIOS (basic inject/output system)
38
6) Algorithm used to verify accuracy of data contained in a data frame?
a) Cyclic redundancy cycle (CRC)
b) Cyclic redundancy check (CRC)
c) Cyclic redundancy chip (CRC)
d) Cyclic redundancy coin (CRC)
8) Small plastic toggle switch located on a circuit board that is flipped to indicate an on
or off status?
a) DAP (dual analog package) switch
b) DIP (dual in-line package) switch
c) AIP (Angled in-line package) switch
d) DIQ (dual in-line quantum) switch
9) Tracking domain names and their addresses - which was devised in the 1980's?
a) Domain Name Syntax (DNS)
b) Domain Name System (DNS)
c) Doubt Name System (DNS)
d) Domain Nuclear System (DNS)
39
Network Terms II
1) ROM that is found on a circuit board and whose information can be erased and
rewritten using electrical pulses?
a) Electrically errand programmable read-only memory (EEPROM)
b) Electrically engine programmable read-only memory (EEPROM)
c) Electrically erasable programmable read-only memory (EEPROM)
d) Electrically en-caved programmable read-only memory (EEPROM)
3) Network standard from the mid 1980's specified by ANSI - uses a dual fiber-optic
ring to transmit data?
a) Fibber distributed data interface (FDDI)
b) Fiber distributed dialect interface (FDDI)
c) Fiber distributed data interface (FDDI)
d) Fiber digital data interface (FDDI)
40
6) Core protocol in TCP/IP that notifies the sender that something has gone wrong?
a) Internet command message protocol (ICMP)
b) Internet control magic protocol (ICMP)
c) Intranet control message protocol (ICMP)
d) Internet control message protocol (ICMP)
7) Transmission where one device sends data to a certain group of devices in a point-to-
multipoint fashion. This can be used for teleconferencing and video conferencing?
a) Multicasting
b) Pod-casting
c) Multilinking
d) Casting
10) One of four 8 bit bytes that are separated by periods and together make-up an IP
address?
a) Octet
b) Octave
c) Binary
d) Bit
41
Network Terms III
1) Uses shared multiple physical or logical hard disks to ensure data integrity and
availability?
a) Redundant Array of Inactive Disks (RAID)
b) Redundant Addition of Inexpensive Disks (RAID)
c) Redundant Array of Inexpensive Diodes (RAID)
d) Redundant Array of Inexpensive Disks (RAID)
3) Multiple storage devices and servers that provide fast, highly available fault-tolerant
access to large quantities of data?
a) Storage Area Network (SAN)
b) Storage Arena Network (SAN)
c) Storage Area Nickel (SAN)
d) Stop Area Network (SAN)
4) Point-to-point connections that rely on switches in regards to the path between sender
and receiver?
a) Swipe virtual circuit (SVC)
b) Switched viral circuit (SVC)
c) Switched virtual circle (SVC)
d) Switched virtual circuit (SVC)
5) Core protocol in the TCP/IP that is in the transport layer - its between the Internet
layer and application layer of TCP/IP?
a) Usage Datagram Protocol (UDP)
b) User Datagram Probe (UDP)
c) User Data Protocol (UDP)
d) User Datagram Protocol (UDP)
42
6) Multiplexing item where each signal on a fiber-optic cable is assigned a different
wavelength?
a) Wavelength divide multiplexing (WDM)
b) Wave division multiplexing (WDM)
c) Wave-light division multiplexing (WDM)
d) Wavelength division multiplexing (WDM)
7) Memory carved out of space on the hard disk and added to RAM?
a) Virtual mind
b) Vibe memory
c) Intense memory
d) Virtual memory
9) Devices to convert digital signals into analog signals to use with ISDN phones?
a) Term adapter (TA)
b) Terminal analog (TA)
c) Termite adapter (TA)
d) Terminal adapter (TA)
43
About The Author
Kevin O Neill was born in 1972. His love of writing started when he was
about 7 years old and wrote a music trivia book written out long hand
on old scrap paper. The material for the book was obtained from some
old records found around the house. Since that time his works have
evolved into more technical writing as his best selling book to date
is the C++ For Kids book which he sells off his website. Mr. O Neill is
married and has a son and daughter they reside in Canonsburg, PA.
44
Sources
Black Box Network Services, Pocket Glossary of Computer Terms. 3rd Edition, Black
Box Corporation 2000.
Huggins, Diane Windows 2000 Network Infrastructure: Exam Cram 2 (Exam 70-216).
Que Certification, 2003.
Parrish, Bruce, Kirk Hausman., Managing and Maintaining a Windows Server 2003
Environment for an MCSA Certified on Windows 2000: Exam Cram 2 (Exam 70-292).
Que Certification, 2004.
Waters, Jason, Matthew J Rees, Jeffrey T. Coe. CCNA Routing and Switching: Exam
Cram (Exam 640-507). Second Edition, The Coriolis Group, 2000.
45