You are on page 1of 6

Work sheets one

1. Which one is Odd?


A. Penetration C. by-pass
B. Denial of service D. MySQL
2. In a hierarchical network design, which layers may be combined into a collapsed core for
smaller networks?
A. core and access layer C. core, distribution and access layer
B. core and distribution D. distribution and access layer
3. Unsolicited commercial email is known as
A. Virus C. spam
B. Worm D. None the Above
4. Which attack involves a compromise of data that occurs between two end points?

A. denial-of-service C. extraction of security parameters


B. man-in-the-middle attack D. username enumeration

5. Coaxial Cables are connected using

A. BNC C. RJ11
B. RJ45 D. MT-RJ

6. You want to implement a mechanism that automates the IP configuration, including IP


address, subnet mask, default gateway, and DNS information. Which protocol will you use to
accomplish this?

A. SMTP C. DHCP
B. SNMP D. ARP

7. When selecting an ISP, you should carefully determine your ISP requirements. you should
consider
A. The costs and quality of services
B. The number of users needing an internet connection
C. The bandwidth capacity
D. All the Above
E. None The Above
8. Which protocol deals with resolving domain names

A. X-Window C. DNS
B. SMTP D. FTP
9. is protocol that uses text-based connection to a remote server

A. ARP B. Telnet
C. SMTP D. SNMP

10. Which protocol uses port 443 and port 80 respectively?

A. HTTPS & HTTTP C. XHTML


B. HTTTP & HTTPS D. HTML
11. Can send and receive information at the same time, so they can send information faster than
hubs can.
A. Switch C. Routers
B. Repeater D. Bridge
12. Which term refers to a network that provides secure access to the corporate offices by
suppliers, customers and collaborators?

A. Extranet C. Intranet
B. Internet D. None the Above

13. The network design for a college with users at five sites is being developed. Where in the
campus network architecture would servers used by all users be located?
A. access-distribution C. enterprise edge
B. data center D. services
14. Abebe is fetching mail from a server lying at a remote location .Which protocol is he using to
fetch the mails?
A. POP 3 C. SMTP
B. IMAP D. SNMP
15. Which of the following are threats to email security?
A. Spam D. Trojans
B. Phishing E. All of the above
C. Virus
16. Optical Fiber transmits ______ signals.
A. Electrical C. light             
B. Radio D. None of above.
17. DHCP uses UDP port _________ for sending data to the server.

A. 66 C. 68
B. 67 D. 69

18. Which of the following describe router functions?


A. Packet switching D. Path selection
B. Packet filtering E. All of the above
C. Internetwork communication
19. What should you do to keep unauthorized users from changing your home router settings?
A. Change the firewall settings on your computer.
B. Change the MAC address of the router
C. Change the default administrator password and SSID.
D. None the Above
20. Network layer firewall has two sub-categories as _________
A. State full firewall and stateless firewall
B. Bit oriented firewall and byte-oriented firewall
C. Frame firewall and packet firewall
D. Network layer firewall and session layer firewall
21. DHCP is used for

A. Only IP v4 B. Only IPv6 C. Both IPv6 and IPv4 D. None of the above

22. The DHCP server


A. maintains a database of available IP addresses
B. maintains the information about client configuration parameters
C. grants IP address when receives a request from a client
D. All of the above
23. Among the Following which one is/are False Statement
A. Internet refers to network of networks
B. Intranet is defined as private network of computers within an organization with its own
server and firewall.
C. Extranet refers to network within an organization, using internet to connect to the
outsiders in controlled manner.
D. None the Above
24. A transmitting modem converts digital data to analog signals, called

A. Modulation C. A and B
B. Demodulation D. None the Above

25. software or hardware that checks information coming from the Internet or a network

A. Firewall C. Modem
B. Internet infrastructure D. Hubs

26. Servers are application sever that provide name resolution to client computers by converting
names easily understood by human into machine readable ip addresses.

A. Domain name system C. Database server


B. Mail server D. None the Above

27. The physical path between transmitter and receiver in a data communication system.

A. Modem C. Internet infrastructure


B. Transmission Medium D. Physical Topology

28. Where is a hub specified or found in the OSI model?


A. Session layer C. Data link layer
B. Physical layer D. Application layer

29. When data is encapsulated which is the correct order?


A. Data Frame Packet Segment Bit
B. Segment Data Packet Frame Bit
C. Packet Data Segment Frame Bit
D. Data Segment Packet Frame Bit
30. The advantage of a client/server network over a peer to peer network is
A. performance is better on a peer to peer
B. Easier to backup file than a peer to peer network
C. Easy to configure the client /server
D. security is better on a peer to peer

31. a document that states in writing how a company plans to protect the company’s physical and
information technology assets
A. Password B. User Account. C. Security policy D. All the above.
32. When you tried to login to the server, your trial may failed, this failure event is recorded
in

A. System log C. Application log


B. Security log D. Event log

33. Router works at

A. Internet layer of the TCP/IP model C. Network interface layer of the OSI
B. Data link layer of the OSI reference model reference model
D. Transport layer of the OSI reference mode
34. The following medium does not use metallic conductor for transmission
A. Twisted Pair wire C. Coaxial Cable
B. Optical Fiber D. none of the above
35. is a network multiple access method in which carrier sensing is used, but nodes attempt to
avoid collisions by beginning transmission only after the channel is sensed to be "idle"?

A. CSMA C. CSMA/CD
B. CSMA/CA D. ALOHA
36. Which approach in networking allows for network changes, upgrades, or the introduction of
new services in a controlled and staged fashion?
A. Resiliency C. Flexibility
B. Modular D. Hierarch
36. Which device performs the function of determining the path that messages should take
through internetworks?

A. a router C. a web server


B. a firewall D. a DSL modem
37. A network administrator is implementing a policy that requires strong, complex
passwords. Which data protection goal does this policy support?

A.data integrity C. data confidentiality


B.data quality D. data redundancy
38. What is the port number for DNS?
A. 20 B. 25 C. 53 D. 80
39. What benefit does DHCP provide to a network?
A. Hosts always have the same IP address and are therefore always reachable.
B. DHCP allows users to refer to locations by a name rather than an IP address.
C. Hosts can connect to the network and get an IP address without manual
configuration.
D. Duplicate addresses cannot occur on a network that issues dynamic addresses using
DHCP and has static assignments.

40. Defense of digital information and IT assets against internal and external, malicious and
accidental threats.
A. Security policy B. Security C. Test D. none the Above
41. Which cable is the most common in networks?
A. UTP C. Coaxial
B. STP D. Fiber optic
42. The term used in the alarm world to mean intentionally deactivating a particular sensor or
zone in security
A. System. Trojan horse B. Virus C. Penetration D. Bypass

You might also like