ITM 301 Self Test Questions

Ace your homework & exams now with Quizwiz!

Which of the following wireless standards is the fastest one (highest throughput)?Please select the correct option and then click the "Check Your Answer" button. 802.11a 802.11g 802.11n 802.11ac

802.11ac

Which of the following IEEE standards is assigned to VLAN trucking?Please select the correct option and then click the "Check Your Answer" button. 802.3b 802.11a 802.1q 802.155.1

802.1q

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?Please select the correct option and then click the "Check Your Answer" button. Default gateway DNS server Root server DHCP server NAT

Default gateway

You have created a virtual machine on your workstation so that you can test some new applications. You configured the VM's hard disk space to be dynamically allocated. Which of the following will allocate more space for the VM when it needs it?Please select the correct option and then click the "Check Your Answer" button. Virtual switch Virtual adapter Hypervisor Virtual network manager

Hypervisor

Which of the following is a potential drawback to using fibre optic cable for LANs?Please select the correct option and then click the "Check Your Answer" button. It is expensive. It cannot handle high-bandwidth transmissions. It can carry transmissions using only TCP/IP. It is not yet an accepted standard for high-speed networking.

It is expensive.

What is the purpose of cladding in a fibre optic cable?Please select the correct option and then click the "Check Your Answer" button. A. It reflects the signal back to the core. B. It protects the inner core from damage. C. It shields the signal from EMI. D. It concentrates the signal and helps keep it from fading.

It reflects the signal back to the core.

Which type of DNS record identifies an email server?Please select the correct option and then click the "Check Your Answer" button. AAAA record CNAME record MX record PTR record SRV record

MX record

Which part of a MAC address is unique to each manufacturer?Please select the correct option and then click the "Check Your Answer" button. The network identifier The OUI The device identifier The physical address The logical address

The physical address

Which of the following command list active connections?Please select the correct option and then click the "Check Your Answer" button. netstat ping ipconfig/all nslookup tracert

netstat

Which of the following commands is used to query a DNS server?Please select the correct option and then click the "Check Your Answer" button. ipconfig tracert nslookup nbtstat

nslookup

Fibre optic cable networks can span much longer distances than copper-based networks before requiring repeaters because:Please select the correct option and then click the "Check Your Answer" button. A. they use wavelength division multiplexing. B. their signals never require amplification. C. they are resistant to noise such as EMI. D. their signals do not suffer degradation no matter how small the cable's bend radius.

they are resistant to noise such as EMI.

A MAC address consists of __________ bits.Please select the correct option and then click the "Check Your Answer" button. 12 16 32 48 264

48

The MAC sub-layer is defined in which of the following OSI layers?Please select the correct option and then click the "Check Your Answer" button. 1 2 3 4 5

2

What the manufacturer's ID of the following MAC address 21-12-3F-C7-97-CE?Please select the correct option and then click the "Check Your Answer" button. 21-12 21-12-3F CF-97-CE 97-CE CE

21-12-3F

In which of the following network links might you use MT-RJ connectors?Please select the correct option and then click the "Check Your Answer" button. A. A coaxial connection between a cable modem and a server. B. A UTP connection between a workstation and a hub. C. A wireless connection between a handheld computer and a desktop computer. D. A fibre optic connection between a server and router.

A fibre optic connection between a server and router.

A network that is larger than a LAN and connects clients and servers from multiple buildings is known as a(n) ____. AMAN B.WAN C.GAN D.PAN E.HAN

A. MAN

Cloud computing is based on which of the following earlier technologies?Please select the correct option and then click the "Check Your Answer" button. Web 2.0 Grid Computing Virtualization P2P networking All of the above

All of the above

Which routing protocol does an exterior router use to collect data to build its routing tables?Please select the correct option and then click the "Check Your Answer" button. RIPv2 BGP OSPF IP ISIS

BGP

Which of the following topologies is/are part of the 802.3 standard or the so-called Ethernet?Please select the correct option and then click the "Check Your Answer" button. Bus Token Ring WiMax Star Both A & D

Both A & D

Which of the following is a wireless access method?Please select the correct option and then click the "Check Your Answer" button. CSMA/CD CSMA CSMA/CA OFDM

CSMA/CA

Which of the following types of twisted pair cables supports a speed of 4 Mbps for a token ring topology?Please select the correct option and then click the "Check Your Answer" button. Cat 3 Cat 5 Cat 6a Cat 7

Cat 3

Which of the following OSI layers is responsible for data flow?Please select the correct option and then click the "Check Your Answer" button. Physical Data link Network Transport Session

Data link

True or False: A client-server network is the simplest network model.

F

True or False: A common way to share resources on a client-server network is by modifying the file-sharing controls via the computer's operating system.

F

WEP provides stronger security features than WPA. True or False?

F

The first services widely used by networks were:Please select the correct option and then click the "Check Your Answer" button. Fax services Backup services Network management services Mail services File and print services

File and print services

Each of the VMs on your host computer is configured to use the NAT networking type. They can still pick up e-mail and surf the Web. How are they getting their IP addresses?Please select the correct option and then click the "Check Your Answer" button. From the host machine's virtualization software From the DHCP server on the physical network From the router on the physical network From another VM on the host machine that's configured to act as a DHCP server

From the host machine's virtualization software

Which term identifies a computer that enables resource sharing by other computers on the same network?Please select the correct option and then click the "Check Your Answer" button. Subnode Host Node NIC Dummy Terminal

HOST

In which of the following vNIC modes VMs cannot communicate with nodes beyond the host?Please select the correct option and then click the "Check Your Answer" button. Bridged NAT Host only All of the above

Host only

____________ is a centralized fault tolerant for data storage of a LAN.Please select the correct option and then click the "Check Your Answer" button. NAT NAS UPS Hard drive All of the above

NAS

Which of the following servers hides internal IP addresses from external networks?Please select the correct option and then click the "Check Your Answer" button. DNS NAT DHCP Mail

NAT

Which of the following OSI layers is responsible for packet generation?Please select the correct option and then click the "Check Your Answer" button. Physical Data link Network Transport Session

Network

You work second shift and share a desktop workstation with your colleagues who work on the first and third shifts. Each of you has a separate virtual machine on the workstation. When your third-shift coworker installs a new program on his VM, it causes the machine's operating system to stop working. What happens as a consequence?Please select the correct option and then click the "Check Your Answer" button. Your VM's operating system stops working. The host machine's operating system stops working. Your VM and the host machine work as usual, but performance of all the VMs is compromised. Nothing changes for your VM.

Nothing changes for your VM.

Suppose you wanted to share documents among several computers in your household in a peer-to-peer fashion. You could do that by properly configuring which of the following types of software?Please select the correct option and then click the "Check Your Answer" button. Word-processing software Remote authentication software Mail client software Operating system software Web browser

Operating system software

Which of the following wireless technologies is based on IEEE 802.15 standard?Please select the correct option and then click the "Check Your Answer" button. Bluetooth WiMAX Near Field Communication (NFC) Wireless sensor network PAN

PAN

Which of the following OSI is responsible for data encryption?Please select the correct option and then click the "Check Your Answer" button. Application Presentation Session Network Data Link

Presentation

Which computers are the highest authorities in the Domain Name System hierarchy?Please select the correct option and then click the "Check Your Answer" button. Authoritative name servers Root servers Top-level domain servers Primary DNS servers

Root servers

Which of the following network transmission media offers the highest potential throughput over the longest distances?Please select the correct option and then click the "Check Your Answer" button. MMF SMF UTP STP

SMF

Which of the following OSI layers is responsible for handshaking?Please select the correct option and then click the "Check Your Answer" button. Physical Data link Network Transport Session

Session

The address 10.43.3.87:23 is referred to as ___________Please select the correct option and then click the "Check Your Answer" button. IPv4 IPv6 MAC physical node Socket

Socket

SDN stands forPlease select the correct option and then click the "Check Your Answer" button. System Digital Network Software Defined Networking Simple Design Network Simple Digital Network

Software Defined Networking

True or False: Before networks, transferring data via floppy disks was the only possible way to share data.

T

Which of the following applies to virtual machines, no matter what type of virtualization software they are created with?Please select the correct option and then click the "Check Your Answer" button. They can only belong to one VLAN. They cannot be addressed by clients on a physical LAN. They cannot be assigned Internet-routable IP addresses. They exist as files on the hard drive of their host.

They exist as files on the hard drive of their host.

The physical layout of nodes on a network is known as the network's:Please select the correct option and then click the "Check Your Answer" button. Topology Schematic Formation Grid Protocol

Topology

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?Please select the correct option and then click the "Check Your Answer" button. Virtual firewall Virtual switch Virtual router Virtual load balancer

Virtual switch

Which of the following is an advantage to virtualizing many servers in your data center, compared to running each server on a separate physical machine?Please select the correct option and then click the "Check Your Answer" button. Virtualization will improve the servers' performance. Virtualization will conserve resources. Virtualization will make administration easier. Virtualization will save software costs.

Virtualization will conserve resources.

Which of the following wireless technologies is based on IEEE 802.16 standard?Please select the correct option and then click the "Check Your Answer" button. Bluetooth WiMAX Near Field Communication (NFC) Wireless sensor network PAN

WiMAX


Related study sets

Principles of Business Semester 1 Final Exam Multiple Choice

View Set

Intro to Cyber Security Final Exam

View Set

Jensen's Health Assessment 3rd Ed. | Chapter 11

View Set

Humanities 310 Final Study Guide Questions

View Set

Unit 7: Life Insurance Policy Provisions

View Set

Cost Accounting - Second Examination

View Set