Computer Networks Midterms Questions
What is help desk software used for? a. To document problems and their resolutions b. To accumulate insights and solutions to problems encountered on a particular network c. To properly handle substances such as chemical solvents d. To protect the computer from an ESD charge
a. To document problems and their resolutions
Which of the following consists of one or more insulated twisted-pair wires encased in a plastic sheath? a. UTP b. STP c. MMF d. SMF
a. UTP
Which of the following is a component of backbone cabling that runs between building floors? a. Vertical cross connect b. IDF c. MDF d. Work area
a. Vertical cross connect
You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation? a. Window size b. Header length c. Options d. Destination port
a. Window size
Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved? a. Wireless range extender b. Signal propagation c. FHSS d. RSSI
a. Wireless range extender
As a network engineer, you are noticing inconsistent connectivity issues related to certain addresses. After examining the errors, you have decided to flush the ARP table on any device experiencing a similar problem. Which of the following commands will you apply to enable this action? a. arp -d b. arp -s c. arp -a d. IHL
a. arp -d
Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with? a. The geographical area that an antenna or wireless system can reach is known as its range. b. A more negative RSSI value indicates a higher quality of signal. c. Directional antennas transmit wireless signals along a single direction. d. TV and radio stations use omnidirectional antennas.
b. A more negative RSSI value indicates a higher quality of signal.
What is a graphical representation of network devices and connections known as? a. A Zenmap b. A network diagram c. A rack diagram d. A wiring diagram
b. A network diagram
Which of the following diagrams is needed while tracking and troubleshooting equipment installed in a rack? a. A wiring diagram b. A rack diagram c. A network diagram d. A network mapper
b. A rack diagram
Which wireless technology is used to track fitness activity levels and geographic movement? a. Bluetooth b. ANT+ c. NFC d. Infrared
b. ANT+
Which of the following fields in a TCP segment confirms receipt of data via return message to the sender? a. Sequence number b. Acknowledgment number c. Reserved d. Source port
b. Acknowledgment number
Which of the following is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements? a. An SLA b. An MSA c. An RPF d. An MLA
b. An MSA
Which of the following terms is also referred to as a "network of networks"? a. Hub b. Backbone c. Spoke d. Network interface card
b. Backbone
What is the frequency range for Bluetooth communication? a. 300 GHz-300,000 GHz b. 1850 MHz-1990 MHz c. 5.1 GHz-5.8 GHz d. 2.4 GHz-2.4835 GHz
d. 2.4 GHz-2.4835 GHz
Which of the following 802.11 wireless standards operates in the 6-GHz frequency band? a. 802.11b b. 802.11a c. 802.11ac d. 802.11ax
d. 802.11ax
Which of the following statements stands true? a. FTP servers provide secure encryption for file transfer. b. HTTP is a secured protocol that provides secure transmission. c. The DBMS does not support a multiuser environment. d. An email can be downloaded to the client computer using POP3.
d. An email can be downloaded to the client computer using POP3.
Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages. a. Version b. Fragment offset c. Flag d. Identification
d. Indentification
Warner is employed as a network engineer and part of his job requires him to measure the RSSI (received signal strength indicator) on the receiver's end. Warner is required to measure the RSSI and fill out a form indicating whether the signal is acceptable or not. During one such visit, the client's device's RSSI level reads -80 dBM. Analyze what Warner should report in such a scenario. a. Mark the rating as excellent b. Mark the rating as good c. Mark the rating as acceptable d. Mark the rating as not good
d. Mark the rating as not good
Which of the following DBMS applications would you use if you were to organize data into tables and records? a. Apache b. MS Outlook c. FileZilla d. Microsoft SQL Server
d. Microsoft SQL Server
DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use? a. RFID b. ANT+ c. ZiggBee d. NFC
d. NFC
In reversing a software upgrade, which of the following types of upgrade uses the patch's automatic uninstall utility for reversing? a. Client software upgrade b. Shared application upgrade c. Operating system upgrade d. Operating system patch
d. Operating system patch
Which of the following cables comes coated with a flame-resistant jacket? a. UTP cable b. PVC cable c. STP cable d. Plenum cable
d. Plenum cable
Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them? a. OSHA b. PPE c. Fire Suppression System d. SDS
d. SDS
Which of the following server racks would you use for a bolt-free mounting? a. Nonthreaded racks b. Threaded racks c. Round-hole racks d. Square-hole racks
d. Square-hole racks
Which of the following protocols is not a terminal emulation protocol? a. Telnet b. SSH c. Remote Desktop d. TFTP
d. TFTP
Which of the following protocols transfers files without any authentication or security? a. VPN b. FTPS c. SFTP d. TFTP
d. TFTP
What should you do once you have tested your theory to determine the cause of the problem at hand? a. Establish a plan for resolving the problem. b. Implement the solution or escalate the problem. c. Verify the functionality and implement preventive measures. d. Document findings, actions, and outcomes.
a. (?) Establish a plan for resolving the problem. (The solution to this was multiple answers so just check all of them if it is.)
What is the maximum allowable distance for horizontal cabling? a. 100 m b. 50 m c. 7 m d. 90 m
a. 100 m
Which of the following is a centralized directory database that contains user account information and security for the entire group of computers? a. Active Directory b. Clients c. Workgroups d. RAID
a. Active Directory
Barney is the owner of Venture Capitals Internet Solutions. Venture's client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don't want to purchase dozens of physical computers for these students to connect to. What should Barney do in such a scenario? a. Barney should use VDI (Virtual Desktop Infrastructure). b. Barney should use RDP (Remote Desktop Protocol). c. Barney should use SSH (Secure Shell). d. Barney should use Telnet.
a. Barney should use VDI (Virtual Desktop Infrastructure).
What is a small file containing verified users' identification information and public key known as? a. Digital certificate b. Public-key infrastructure c. Asymmetric encryption d. Key pair
a. Digital certificate
Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload? a. Ethernet b. NDP c. TCP d. ICMP
a. Ethernet
Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel? a. GRE b. IKEv2 c. L2TP d. OpenVPN
a. GRE
Which of the following is an example of an industrial controls system? a. HVAC b. PVC c. EMI d. MDF
a. HVAC
BitBakers is a small start-up selling local bakery items in Kansas. It has its organizational back end running from a small LAN setup. Recently, it received funding for its products to be sold on a larger scale. As a result of this funding, the firm has contracted Kevin to boost up its network strength so that it can traverse to more than one LAN segment. Analyze which of the following protocols he should apply in this scenario. a. IP b. UDP c. TCP d. ICMP
a. IP
Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions? a. IPsec b. Public key encryption c. Private key encryption d. Key pair
a. IPsec
Which of the following layers in an Open System Interconnection (OSI) model adds a header in front of the payload? a. Layer 4 b. Layer 1 c. Layer 2 d. Layer 3
a. Layer 4
A client wants you to install a network model for his server so that each computer on the network is responsible for controlling access to its resources. Which of the following operating systems will you install in such a situation? a. Mac b. Ubuntu Server c. Red Hat Enterprise d. Window Server 2019
a. Mac
You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply? a. Presentation layer b. Transport layer c. Data link layer d. Physical layer
a. Presentation layer
Which of the following protocols is used to send an email message to the first server? a. SMTP b. POP3 c. IMAP4 d. FTP
a. SMTP
You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of an IPV4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way? a. The third bit b. The first bit c. The second bit d. The fourth bit
a. The third bit
While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error. a. Sequencing b. Checksum c. Flow control d. Source port
b. Checksum
Which of the following is an enclosed space that holds network equipment? a. MDF b. Data Room c. Demarc d. Work area
b. Data Room
You are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. Which of the following IPsec encryptions will you apply to your program in such a scenario? a. IKE b. ESP c. AH d. ISAKMP
b. ESP
Which of the following cabling methods connects workstations to the closest data rooms? a. Backbone cabling b. Horizontal cabling c. Plenum cabling d. Patch cabling
b. Horizontal cabling
Which of the following statements is true? a. Physical topologies mostly refer to how software controls access to network resources. b. In a peer-to-peer network model, each computer controls its own administration, resources, and security. c. In a general scenario, if a network supports fewer than 15 computers, a client-server network model is the way to go. d. Logical topologies mostly refer to how computers work together with radio signals and other devices to form the physical network.
b. In a peer-to-peer network model, each computer controls its own administration, resources, and security.
As a network engineer, you have been sent to install a data outlet at BMC Corporation Ltd. Which of the following cable installation tips should you follow to prevent physical layer failures and to reduce the risk of damage from pests and water? a. Make sure that the cable sheath is plenum-rated. b. Install cable through conduits. c. Install the cable at least 3 feet away from sources of EMI. d. Do not leave more than an inch of exposed cable.
b. Install cable through conduits.
Which of the following will act as the centralized point of interconnection in reference to an organization's LAN, CAN, or WAN? a. Demarc Point b. MDF c. Data Room d. VoIP telephone equipment
b. MDF
JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs. a. In-band management b. Out-of-band management c. Telnet d. SSH
b. Out-of-band management
What is the data passed between utility programs or applications and the operating system known as? a. Host b. Payload c. Firmware d. Ethernet
b. Payload
You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation? a. Port 20 b. Port 22 c. Port 69 d. Port 989
b. Port 22
What is the process of reverting to a previous version of the software after a failed upgrade attempt known as? a. Network mapper b. Rollback c. Patch d. Upgrade
b. Rollback
Which of the following is a collection of protocols that performs both authentication and encryption? a. Telnet b. SSH c. RDP d. VNC
b. SSH
What are larger data rooms also known as? a. Telecommunications enclosure b. Telecommunications room c. Patch bay d. Equipment room
b. Telecommunications room
Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model? a. User accounts and passwords to the networks are all assigned in one place. b. They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce. c. Problems on the network can be monitored, diagnosed, and fixed from one location. d. Access to multiple shared resources can be centrally granted to a single user or a group of users.
b. They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.
Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case? a. 300072 b. 300800 c. 300871 d. 300870
c. 300871
As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation? a. Protocol b. Option c. Padding d. Data
c. Padding
Which of the following network devices does not fall under the category of "end devices" as certified by CISCO? a. Smartphone b. Network printer c. Router d. File Server
c. Router
Which of the following consists of high capacity data storage devices in a distinctly defined network segment? a. MAN b. PAN c. SAN d. WLAN
c. SAN
Which of the following remote access methods allows a remote client to take over and command a host computer? a. RAS b. Remote file access c. Terminal emulation d. VPN
c. Terminal emulation
Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario? a. Internet Message Access Protocol b. Simple Network Management Protocol c. Transmission Control Protocol d. User Datagram Protocol
c. Transmission Control Protocol
The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connection. The championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network? a. ICMP b. TCP c. UDP d. IP
c. UDP
Which of the following client-server applications use Apache and Nginx? a. Email services b. FTP services c. Web service d. DNS service
c. Web service
Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement? a. Remote file access b. FTPS c. VPN d. Terminal emulation
d. Terminal emulation
Which of the following is the third step in a network troubleshooting methodology? a. Establish a plan for solving the problem. b. Identify the problem and its symptoms. c. Establish a theory of probable cause. d. Test your theory to determine the cause.
d. Test your theory to determine the cause.
Which of the following layer's header identifies the IP address of the destination host? a. The physical layer b. The transport layer c. The data link layer d. The network layer
d. The network layer
Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network? a. Remote Desktop Protocol b. Terminal emulator c. Remote file access d. VPN
d. VPN
The process of designing, implementing, and maintaining an entire network is called _____. a. patch management b. SCADA c. a network loop d. a system life cycle
d. a system life cycle
Which of the following utilities is also known as a packet sniffer? a. ping b. netstat c. traceroute d. tcpdump
d. tcpdump