Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
7. In which two layers of the OSI model do NICs belong? 16. What are the sublayers of the Data Link layer as defined in
a. Presentation and Application layers the IEEE 802 standards?
b. Transport and Network layers a. Logical Link Control sublayer and Media Access Control
c. Network and Data Link layers sublayer
d. Physical and Data Link layers b. Transport Control sublayer and Media Access Control
sublayer
8. Which standards organization developed the OSI model?
c. Logical Link Control sublayer and Physical Addressing
a. ISO
sublayer
b. ITU
d. Transport Control sublayer and Data Link Control sublayer
c. ISOC
d. OSI 17. Which layer of the OSI model encapsulates Network layer
packets?
9. Under what circumstances would the Transport layer use
a. Physical layer
segmentation?
b. Session layer
a. When too many data frames are flooding into a receiving
c. Data Link layer
node’s NIC
d. Transport layer
b. When more than 10 percent of transmitted frames are
damaged 18. Suppose that, at the receiving node, a frame’s FCS doesn’t
c. When the destination node cannot accept the size of the match the FCS it was issued at the transmitting node. What
data blocks transmitted by the source node happens as a result?
d. When the source node requests that data blocks be a. The receiving node’s Transport layer assesses the error and
segmented for faster processing corrects it.
b. The receiving node’s Data Link layer requests a
retransmission. 6. In addition to some types of data networks, which of the
c. The transmitting node’s Transport layer immediately issues following use half-duplex communication?
a replacement frame. a. Telephones
d. The transmitting node’s Data Link layer assesses the error b. Walkie-talkies
and corrects it. c. Television broadcast towers
d. Satellite Internet connections
19. In which of the following situations would it be most
desirable to use a connectionless Transport layer protocol? 7. In wavelength division multiplexing, two modulated signals
a. When retrieving a spreadsheet from a busy file server are guaranteed to differ in what characteristic?
b. When connecting to a graphics-intensive Web site a. Throughput
c. When viewing a movie clip on the Web b. Phase
d. When sending an e-mail message to a long list of recipients c. Amplitude
d. Color
20. Which of the following would be found in a Data Link
layer header? 8. Which of the following can increase latency on a network?
a. The packet’s fragmentation offset a. An EMI source, such as fluorescent lighting
b. The packet’s sequence number b. The use of full-duplex transmission
c. The source’s logical address c. Adding 50 meters to the length of the network
d. The source’s physical address d. The use of multiple protocols
1. What is different about the method used to boost a digital 9. You are helping to install a cable broadband system in your
signal’s strength, compared with the method of boosting an friend’s home. She wants to bring the signal from where the
analog signal’s strength? service provider’s cable enters the house to a room on
a. A digital signal requires an amplifier, which introduces another floor, which means you have to attach a new cable to
noise into the signal, and an analog signal requires a repeater, the existing one. What type of cable should this be?
which retransmits the signal in its original form. a. RG-6
b. A digital signal requires a repeater, which increases the b. RG-8
strength of both the signal and the noise it has accumulated, c. RG-58
and an analog signal requires an amplifier, which retransmits d. RG-59
the signal in its original form.
10. What part of a cable protects it against environmental
c. A digital signal requires an amplifier, which increases the
damage?
strength of both the noise and the signal, and an analog
a. Sheath
signal requires a repeater, which retransmits the signal in its
b. Braiding
original form.
c. Plenum
d. A digital signal requires a repeater, which retransmits the
d. Cladding
signal in its original form, and an analog signal requires an
amplifier, which increases the strength of both the signal and 11. With everything else being equal, a network using which
the noise it has accumulate of the following UTP types will suffer the most cross talk?
d. a. Cat 3
b. Cat 5
2. Which of the following decimal numbers corresponds to
c. Cat 5e
the binary number 00000111?
d. Cat 7
a. 3
b. 5 12. What are two advantages of using twisted pair cabling
c. 7 over coaxial cabling on a network?
d. 9 a. Twisted pair cable is more reliable.
b. Twisted pair cable is less expensive.
3. A wave with which of the following frequencies would have
c. Twisted pair cable is more resistant to noise.
the shortest wavelength?
d. Twisted pair cable is more resistant to physical damage. e.
a. 10 MHz
Twisted pair cable is required for modern transmission
b. 100 MHz
standards.
c. 1 GHz
d. 100 GHz 13. Which of the following problems could be solved by using
a crossover cable?
4. What is the origin of the word modem?
a. You’re missing a patch cable, but need to connect a
a. Modifier/demodifier
workstation to a switch.
b. Modulator/demodulator
b. You’re missing a connectivity device, but need to exchange
c. Modulator/decoder
data between two laptops.
d. Multiplexer/demultiplexer
c. You’re missing a serial cable, but need to configure a new
5. With everything else being equal, which of the following router using your laptop.
transmission techniques is capable of the greatest d. You’re missing a repeater, but need to extend a network
throughput? segment.
a. Simplex
14. Which of the following network transmission media offers
b. Half-duplex
the highest potential throughput over the longest distances?
c. Full-duplex
a. UTP
d. All techniques transmit data at equally high throughputs.
b. STP
c. MMF a. UTP designed for telephone signaling
d. SMF b. UTP designed for 100 Mbps Ethernet
c. UTP designed for 1 Gbps Ethernet
15. In which of the following network links might you use SC
d. Fiber-optic cable
connectors?
a. A coaxial connection between a cable modem and a server 24. Your campuswide WAN is experiencing slow Internet
b. A UTP connection between a workstation and a hub response times. When you call your Internet service provider
c. A wireless connection between a handheld computer and a to ask if they can troubleshoot the problem from their end,
desktop computer they warn you that their responsibilities end at the demarc.
d. A fiber-optic connection between a server and router. What do they mean?
a. They will not diagnose problems beyond your
16. What type of fiber-optic cable is used most frequently on
organization’s MDF.
LANs?
b. They will not diagnose problems beyond your
a. Multithreaded fiber
organization’s entrance facilities.
b. Twisted fiber
c. They will not diagnose problems beyond your
c. Single-mode fiber
organization’s IDF.
d. Multimode fiber
d. They will not diagnose problems beyond your
17. What is the purpose of cladding in a fiber-optic cable? organization’s telco rooms.
a. It protects the inner core from damage.
25. What is the maximum amount you should untwist twisted
b. It reflects the signal back to the core.
pair wires before inserting them into connectors?
c. It shields the signal from EMI.
a. ¼ inch
d. It concentrates the signal and helps keep it from fading.
b. ½ inch
18. Which of the following is a potential drawback to using c. 1 inch
fiber-optic cable for LANs? d. 2 inches
a. It is expensive.
1. Which of the following distinguishes peer-to-peer networks
b. It cannot handle high-bandwidth transmissions. from client/server networks?
c. It can carry transmissions using only TCP/IP. a. In peer-to-peer networks, only one computer can send and
d. It is not yet an accepted standard for high-speed receive transmissions on the network.
networking. b. In peer-to-peer networks, only one type of protocol suite
can be used to send and receive data.
19. In what part of a structured cabling system would you find c. In peer-to-peer networks, a central computer manages all
users’ desktop computers? file and print sharing.
a. Telco room d. In peer-to-peer networks, no single computer has more
b. MDF authority than another, by default.
c. IDF
d. Work area 2. Which of the following is an advantage of using a peer-to-
peer network over using a client/server network?
20. You’ve just received a new Cisco router for your data a. A peer-to-peer network allows for more nodes.
center, and it came with a rollover cable. What can you do b. A peer-to-peer network provides greater security.
with this cable? c. A peer-to-peer network is easier to set up.
a. Make a connection from the router’s console port to your d. A peer-to-peer network allows for easier expansion.
laptop’s serial port and configure the router from your 3. Which of the following is an advantage of using a
laptop. client/server network over using a peer-to-peer network?
b. Make a connection from the router’s Ethernet port to a a. A client/server network is simpler to set up.
port on the patch panel in the telecommunications closet to b. A client/server network allows for easier expansion.
establish connectivity for workstations in a work area. c. A client/server network does not require a network
c. Make a connection from the router’s Ethernet port to the operating system.
Ethernet port on your laptop to configure the router. d. A client/server network is less expensive to set up.
d. Make a connection from the router’s console port to 4. The first services widely used by networks were:
another router’s console port to daisy-chain the routers. a. Mail services
b. Communications services
21. What is the maximum distance specified in the structured
c. Network management services
cabling standard for a horizontal wiring subsystem?
d. File and print services
a. 10 m
b. 90 m 5. Suppose you wanted to share documents among several
c. 100 m computers in your household in a peer-to-peer fashion. You
d. 200 m could do that by properly configuring which of the following
types of software?
22. Which of the following can occur as a result of improper a. Word-processing software
cable termination? b. Desktop operating system software
a. Cross talk c. Mail client software
b. Noise d. Remote authentication software
c. Data errors 6. What is the primary function of a file server on a network?
d. All of the above a. It routes traffic between two or more LANs.
b. It monitors how many users are logged on to a WAN.
23. If your MDF contains a 66 block, the type of cable
c. It prevents unauthorized remote users from connecting to
terminating at that punch-down block is probably what?
a LAN. c. Formation
d. It manages access and use of shared applications and data. d. Grid
7. On most LANs, a computer acting as a server differs from a 15. Which of the following is an example of a mail service?
computer acting as a client in which of the following ways? a. Exchanging messages between mail servers on different
(Choose two answers.) networks
a. The server would have a faster connection to the network b. Ensuring that users are not running more copies of an e-
than the client. mail client than have been purchased
b. The server would run different network protocols than the c. Preventing unauthorized users from gaining access to the
client. network and, in particular, to its mail server
c. The server would support connections to more media types d. Enabling users to print messages from their e-mail client
than the client. software
d. The server would run a different operating system than the
client. e. The server would possess greater processing power 16. Which of the following network topologies is most
than the client. common on today’s networks?
a. Fan
8. In which of the following environments would a MAN be b. Star
most appropriate? c. Ring
a. A corporate headquarters connecting its five buildings d. Bus
across a small campus
b. A global hotel chain connecting its reservation desks to a 17. Which of the following is an example of a network
central call center management service?
c. A home office connecting its personal computers between a. Establishing permissions for users and groups of users to
the den, living room, and bedroom access certain applications on the server
d. A local newspaper connecting to a global news agency’s b. Alerting the network administrator when a critical
Web site connectivity device fails
c. Managing the queue of print jobs during periods of heavy
9. Which of the following describes the combination of voice network traffic
(such as telephone), video, and data signals sent over the d. Supplying users with file transfer capabilities over the
same network? Internet
a. Switching
b. Remote access 18. Security is a concern when using remote access servers on
c. Convergence a network because:
d. Network management a. Access servers enable computers to dial in to a network
and obtain access to its resources, thereby exposing the
10. What is the term used to describe a discrete unit of data network to the outside world.
that is sent from one node to another over the network? b. Access servers have poor password enforcement
a. Capsule capabilities and rely on users to choose good passwords.
b. Node c. Access servers cannot accept encoded data transfers,
c. Packet requiring users to transmit plain text to and from the
d. Parcel network.
d. Access servers are difficult to understand and support, and
11. How can a server tell the difference between many clients so many networks are using them incorrectly and perhaps
on a network? insecurely.
a. Each has a different electromagnetic characteristic to its
signal, similar to differences in human voices. 19. Distributing data transfer activity equally over several
b. Each regularly transmits a signal that indicates its network devices or components belongs to which category of network
location and unique client characteristics. management services?
c. Each is identified by a unique network address. a. Load balancing
d. Each uses uniquely modified versions of the same network b. Asset management
protocol. c. Traffic monitoring
d. File and print services
12. What device connects a client computer to a network’s
medium, such as a wire? 20. What organization sponsors the CCNA and CCIE
a. Network interface card certifications?
b. Network terminator a. IEEE
c. Network junction clip b. CompTIA
d. Network line extender c. Cisco
d. WITI
13. Which of the following is one function of a network
protocol?
a. To ensure that connectivity devices are configured properly
b. To establish rules for routing mail messages in an
organization
c. To ensure that data arrives at its destination in the proper
sequence
d. To prevent unauthorized users from logging on to a file
server