6. Which three of the following are common network applications? (Choose three.)
e-mail
collaboration
graphics creation
database
word processing
spreadsheets
7. Which of the following network characteristic determines how easily users can access
the network?
Speed
Cost
Security
Availability
Scalability
Reliability
Topology
8. Which two statements about physical networking topologies are accurate? (Choose
two)
A physical topology defines the way in which the computers, printers, network
devices, and other devices are connected.
There are three primary categories of physical topologies: bus, ring, and star.
A physical topology describes the paths that signals travel from one point on a
network to another.
The choice of a physical topology is largely influenced by the type of data to be
transmitted over the network.
10. Which topology allows all the network devices to connect directly to each other in a
linear fashion?
Star
Bus
Mesh
Ring
Partial-mesh
Dual-ring
11. Which two statements about wireless networks are accurate? (Choose two.)
Instead of cables, wireless communication uses RFs or infrared waves to transmit
data.
To receive the signals from the access point, a computer needs to have a wireless
adapter card or wireless NIC.
For wireless LANs, a key component is a router, which propagates signal
distribution.
Wireless networks are not very common, and generally only large corporations use
them.
13. Which two factors have recently influenced the increase in threats from hackers?
(Choose two.)
Hacker tools require more technical knowledge to use.
Hacker tools have become more sophisticated.
The number of reported security threats has remained constant year to year.
Hacker tools require less technical knowledge to use.
14. Which of the following four attacks are classified as access attacks?
password attacks
DDoS
Trojan horse
Love Bug
15. Which two statements about the purpose of the OSI model are accurate? (Choose
two.)
The OSI model defines the network functions that occur at each layer.
The OSI model facilitates an understanding of how information travels throughout a
network.
The OSI model ensures reliable data delivery through its layered approach.
The OSI model allows changes in one layer to affect the other layers.
16. Which OSI layer provides connectivity and path selection between two host systems
that may be located on geographically separated networks?
Physical
Datalink
Network
Transport
Session
Presentation
Application
17. The presentation layer is _____ in the encapsulation process. It adds the presentation
layer header (Layer 6 header) to the data. This then becomes the data that is passed down
to the session layer.
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
21. Which TCP/IP layer provides applications for file transfer, network troubleshooting,
and Internet activities, and supports the network?
Physical layer
Datalink layer
Internet layer
Transport layer
Application layer
22. Which area of the OSI model and the TCP/IP stack is most diverse?
network layer
transport layer
application layer
data link layer
23. How many bits are in an IPv4 address?
16
32
48
64
128
24. In a Class B address, which of the octets are the host address portion and are assigned
locally?
The first octet is assigned locally.
The first and second octets are assigned locally.
The second and third octets are assigned locally.
The third and fourth octets are assigned locally.
27. Which two of these addresses are private IP addresses? (Choose two.)
10.215.34.124
127.16.71.43
172.17.10.10
225.200.15.10
29. Which three statements about TCP are accurate? (Choose three.)
TCP operates at Layer 3 of the TCP/IP stack.
TCP is a connection-oriented protocol.
TCP provides no error checking.
TCP packets are numbered and sequenced so that the destination can reorder packets
and determine if a packet is missing.
TCP provides no recovery service.
Upon receipt of one or more TCP packets, the receiver returns an acknowledgement
to the sender indicating that it received the packets.
30. In the OSI model, which characteristic is similar between TCP and UDP?
operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack
capable of performing a very limited form of error checking
provides service on a best-effort basis and does not guarantee packet delivery
provides no special features that recover lost or corrupted packets
31. When a single computer with one IP address has several websites open at once, this is
called _____.
windowing
session multiplexing
segmenting
connection-oriented protocol
32. TCP is best for which two of the following applications? (Choose two.)
E-mail
voice streaming
downloading
video streaming
33. Which three of the following characteristics apply to UDP? (Choose three.)
Packets are treated independently.
Packet delivery is guaranteed.
Packet delivery is not guaranteed
Lost or corrupted packets are not resent
34. Which two of the following characteristics apply to TCP? (Choose two.)
Packet delivery is not guaranteed.
Lost or corrupted packets are not resent.
Lost or corrupted packets are resent.
TCP segment contains a sequence number and an acknowledgment number.
36. Ports that are used only for the duration of a specific session are called _____.
dynamically assigned ports
well-known ports
registered ports
37. The source port in both a UDP header and a TCP header is a _____.
16-bit number of the called port
16-bit length of the header
16-bit sum of the header and data fields
16-bit number of the calling port
38. Which field in a TCP header ensures that data arrives in correct order?
acknowledgement number
sequence number
reserved
options
47. Which UTP category is capable of transmitting data at speeds up to 100 Mbps?
Category 1
Category 2
Category 3
Category 4
Category 5
Category 5e
Category 6