You are on page 1of 621

MOST POPULAR AROUND THE WORLD

SUCCESS

PRACTICE BOOK» NOT FOR SALE


SERIES

COMPUTER NETWORK
BOOST YOUR KNOWLEDGE

DESIGNED FOR SURE SUCCESS


MCQ EDITION
NARAYAN CHANGDER

5 + S
4 O N
S
59 STI ER
E W
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2

Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.

JAI SHREE RAM

NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:

PRACTICE BOOK» NOT FOR SALE


my guiding light, my shining star,
forever

It is my deepest gratitude and warmest


affection that I dedicate this Ebook.

To my mother JOYTSNA CHANGDER


who could not see this Ebook.

who has been a constant source of Knowledge and in-


spiration. Mom, Covid did not take you, it took our
many dreams. wherever you are we will meet again.
Disclaimer

The aim of this publication is to sup-


ply information taken from sources be-
lieved to be valid, reliable and authen-
ticate. The author bear no responsibil-
ity for any damage arising from inad-
verent omissions, negligence or inac-
curacies (typographical or factual) that

NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.

nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:

PRACTICE BOOK» NOT FOR SALE


1. If you require practice sets on various sub-
jects, kindly send us a message on Facebook
with the subject name. Our team will be happy
to create them for you. Message us on Face-
book at https://www.facebook.com/
narayanchangder
2. Additionally, you can access all of my books
with answers on Google Play Books at »>
https://play.google.com/store/books/
author?id=Narayan+Changder
3. Answers are given at the end of every page
to help you identify your strengths and weak-
nesses.
4. It shows you how to build your own techni-
cal and pedagogical skills to enable them to
create their own materials and activities for
students.
5. It helps you to see how you can make the
transition from classroom teaching to blended
and online teaching.
6. It’s the cheapest good quality ebook that you
can buy online on google play books.

NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents

1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 OVERVIEW OF THE INTERNET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 PROTOCOL LAYERING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.3 INTERNET HISTORY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.4 STANDARDS AND ADMINISTRATION . . . . . . . . . . . . . . . . . . . . . . . . 54

2 Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
2.2 CLIENT-SERVER PARADIGM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
2.3 CLIENT-SERVER APPLICATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
2.4 PEER-TO-PEER PARADIGM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
2.5 SOCKET INTERFACE PROGRAMMING . . . . . . . . . . . . . . . . . . . . . . . . 90

3 Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
3.2 USER DATAGRAM PROTOCOL (UDP) . . . . . . . . . . . . . . . . . . . . . . . 112
3.3 TRANSMISSION CONTROL PROTOCOL (TCP) . . . . . . . . . . . . . . 113

4 Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130


4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
4.2 NETWORK-LAYER PROTOCOLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
4.3 UNICAST ROUTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
4.4 NEXT GENERATION IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
1

5 Data-Link Layer: Wired Networks . . . . . . . . . . . . . . . . . . . . . . 198


5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

PRACTICE BOOK» NOT FOR SALE


5.2 DATA LINK CONTROL (DLC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
5.3 MULTIPLE ACCESS PROTOCOLS (MAC) . . . . . . . . . . . . . . . . . . . . 216
5.4 LINK-LAYER ADDRESSING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
5.5 WIRED LANS: ETHERNET PROTOCOL . . . . . . . . . . . . . . . . . . . . . . 222
5.6 CONNECTING DEVICES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

6 Wireless Networks and Mobile IP . . . . . . . . . . . . . . . . . . . . . . . 248


6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
6.2 WIRELESS LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
6.3 WIRELESS NETWORKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

7 Physical Layer and Transmission Media . . . . . . . . . . . . . . . . . 319


7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
7.2 DATA AND SIGNALS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
7.3 DIGITAL TRANSMISSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
7.4 ANALOG TRANSMISSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
7.5 BANDWIDTH UTILIZATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
7.6 TRANSMISSION MEDIA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338

8 Multimedia and Quality of Service . . . . . . . . . . . . . . . . . . . . . . 344


8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
8.2 COMPRESSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
8.3 MULTIMEDIA DATA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
8.4 MULTIMEDIA IN THE INTERNET . . . . . . . . . . . . . . . . . . . . . . . . . . . 463

9 Network Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495


9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
9.2 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506

10 Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513


10.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
10.2 CONFIDENTIALITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
10.3 Digital Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
10.4 INTERNET SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
10.5 FIREWALLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
1. Introduction

NARAYAN CHANGDER
1.1 OVERVIEW OF THE INTERNET
1. A link from a hypertext document to an- B. MAN, LAN, WAN
other location, activated by clicking on a C. WAN, LAN, MAN
highlighted word or image.
D. WAN, MAN, LAN
A. Hyper Text
B. Hyper Image 5. A converts a private IP to a public IP.
C. Hyperlink A. firewall
D. Hyphen B. NAT device
C. subnet mask
2. A term for individual computers and de-
vices connected to a network D. SNMP
A. Node 6. UDP packets
B. Client A. can be transmitted faster than TCP
C. Server
B. are extremely reliable
D. Internet
C. require receipts
3. Requests information from a server D. are connection-oriented
A. Client
7. An intranet that can be partially accessed
B. Server by authorized outside users, enabling busi-
C. Node nesses to exchange information over the
internet securely.
D. Internet
A. Extranet
4. Arrange the Following Types of Networks
B. Subnet Address
according to their size, from largest to
smallest? C. Internet
A. LAN, MAN, WAN D. intranet

1. C 2. A 3. A 4. D 5. B 6. A 7. A
1.1 OVERVIEW OF THE INTERNET 3

8. The Internet standard protocol for sending 13. Which of these is not included in a UDP
emails from one computer to another packet?

PRACTICE BOOK» NOT FOR SALE


A. POP A. Checksum
B. HTTP B. Source port
C. HTTPS C. Destination address
D. Sequence number
D. Email Protocols
14. What is cloud computing?
9. What is the subnet mask of
255.255.128.0 in the CIDR notation? A. Storing files on the Internet
B. Running programs on a remote server
A. /17
C. Running an operating system
B. /22
D. All of the above
C. /25
15. Which of these is a benefit of virtual net-
D. /27
work?
10. Two or more computers connected to- A. They have a higher level of security
gether over a wide geographical area (e.g. than other remote connections
county, country, globe). What type of net- B. There is no need for any hardware to
work is this? connect a computer to a network
A. LAN C. There is no need for any software to
B. School Network connect a computer to a network
C. WAN D. They stop any errors occurring in the
transmission of data in a network
D. The Extranet
16. A packet showing the ACK flag turned on
11. When an IP address has an appended port indicates
number at the end of the address this is A. data should be sent without additional
called a buffering
A. public address B. a response to a SYN packet
B. private address C. the sender is requesting the connec-
C. local host tion to be reset

D. socket D. the last packet in a sequence


17. Which is not true about DDos attacks?
12. The internet is a collection of many differ-
ent networks owned by many different en- A. It is a combined Smurf attack and SYN
tities that all share information and com- flood.
municate together. B. It uses a network of unsuspecting sys-
A. Extranet tems to conduct the attack.
C. A DDos attack can be conducted with
B. Subnet Address
a SYN flood or Smurf attack.
C. Internet
D. They can overwhelm a system and pre-
D. Intranet vent legitimate access.

8. D 9. A 10. C 11. D 12. C 13. D 14. B 15. A 16. B 17. A 18. A


1.1 OVERVIEW OF THE INTERNET 4

18. The Internet Protocol (IP) address iden- 23. Which of these IP addresses is not consid-
tifies the network and host address as- ered a private address?
signed to a device. A. 172.16.55.4
A. Internet Protocol Address (IP Ad- B. 10.4.1.99
dress)
C. 172.15.192.168
B. Local Area Network (LAN)
D. 192.168.1.1
C. Metropolitan Area Network (MAN
24. If a network crosses multiple buildings in

NARAYAN CHANGDER
D. Wide Area Network (WAN)
one city, what is it called?
19. A group of two or more computers con- A. LAN
nected so they can communicate, share B. MAN
resources and exchange information with
one another. C. WAN

A. Network Server D. PAN

B. Network E. SAN

C. ARPA 25. DNS maps human, readable domain names


into actual
D. Internet
A. IP addresses.
20. A protocol to transfer web pages from a
B. domain names.
web server to a web client, usually a web
browser, and exchange files, text, images, C. servers.
videos, across the web. D. caches.
A. HTTP 26. The default CIDR value for an IPv6 address
B. HTTPS is
C. PPP A. /24
D. MPPP B. /32
C. /64
21. is an insecure network service that
runs via port 23. D. /128
A. SSH 27. Who played Neo in The Matrix?
B. RDP A. Laurence Fishburne
C. TFTP B. Carrie-Anne Moss
D. Telnet C. James Dean
D. Keanu Reeves
22. Data that is exchanged using RESTCONF
and NETCONF on IOS network devices are 28. A standard that is accepted over time but
modeled using which of the following? not required is known as
A. YANG models A. de facto
B. XML schema definitions (XSD) B. ad hoc
C. JSON schema definitions C. ad hominem
D. YAML-based models D. post hoc

19. B 20. A 21. D 22. A 23. C 24. B 25. A 26. C 27. D 28. A
1.1 OVERVIEW OF THE INTERNET 5

29. To defeat a DoS attack from a spoofed IP 34. A smurf attack occurs when
address you should: A. there are repeated SYN packets sent

PRACTICE BOOK» NOT FOR SALE


A. block the IP address on the firewall B. an oversized ICMP packet is sent
B. block the IP address at the proxy C. a user accesses the computer via Tel-
server net
C. redirect the IP address to the DMZ D. the host is the recipient fo repeated
D. limit the total number of sessions from ICMP packets
any IP address 35. Processes the request, locates the re-
quested information and send the informa-
30. Created to share information more effi-
tion to the client
ciently by using hypertext documents
A. Node
A. World Wide Web (WWW)
B. Network Server
B. HTML
C. Network
C. HTTP
D. Server
D. HTTPS
36. URG, ACK, PSH, RST, SYN, FIN are exam-
31. All of the networks within the same ples of
metropolitan area that are connected to- A. tags
gether.
B. flags
A. Local Area Network(LAN)
C. reports
B. Subnet Address D. headers
C. Metropolitan Area Network (MAN
37. A wireless mobile device that can re-
D. Wide Area Network(WAN) ceive high-speed broadband internet ac-
cess from anywhere
32. A hypertext document with hyperlinks
A. 4G
A. HTTP
B. 4G Mobile Hotspot
B. Web Page
C. IPv4
C. Web Site D. IPv6
D. Web Browser
38. Which of the following is true about the
33. A WAN connects several LANs. Wans are IPv6 address that begins with 2002?
often limited to a corporation or an orga- A. It is the indicator for a local host.
nization, but are sometimes accessible to B. It is a site local address.
the public.
C. It is a global unicast address.
A. Local Area Network(LAN)
D. It is a link-local address.
B. Subnet Address
39. Uses a 128-bit address, supports 340 un-
C. Metropolitan Area Network (MAN
decillion IP addresses, and uses hexadeci-
D. Wide Area Network(WAN) mal numbers

29. D 30. A 31. C 32. B 33. D 34. D 35. D 36. B 37. A 38. C 39. A
1.1 OVERVIEW OF THE INTERNET 6

A. IPv6 C. Media Access Control address


B. IPv4 D. host address
C. IP 45. A is used to compare bits against the
D. TCP/IP IP address to determine the network ad-
dress.
40. A system of code that enables the author
to include hypertext linked in documents A. host address
B. subnet mask

NARAYAN CHANGDER
A. WWW
B. HTTP C. network address
D. loopback adapter
C. HTTPS
D. HTML 46. A collection of web pages located on the
web servers, which are host computer on
41. Port 23 the internet
A. telnet A. Web browsers
B. ftp B. Web site
C. ssh C. Web page
D. http D. HTTP
42. The system that provides the domain 47. How many zeros are there in one thou-
owner and contact information: sand?
A. WHOIS A. 0
B. Domain411 B. 1
C. WHAATZIT C. 2
D. IPDirectory D. 3
43. Which of these statements regarding De- 48. Which is a disadvantages of a client-server
nial of Service attacks is true? network?
A. Removing the ICMP protocol from the A. When server isn’t on, clients don’t
local host will prevent future attacks. power up
B. A SYN flood occurs when the steps of B. Clients can’t connect wirelessly to the
the three-way handshake are reversed. server
C. If the attacker spoofs their source IP C. Dependent on server-if it goes down,
address, firewall blocking will not help. clients stop working
D. The Transmission control block status D. Clients are more expensive than
immediately closes every valid connection servers
to the host, preventing legitimate traffic.
49. Is the text that you type into your internet
44. The physical address of a network card is browser when you want to go to a web-
its site
A. logical address A. URL
B. soft address B. RPM

40. D 41. A 42. A 43. C 44. C 45. C 46. B 47. D 48. C 49. A
1.1 OVERVIEW OF THE INTERNET 7

C. PPM 55. A TCP packet is a packet.


D. RUL A. connection-oriented

PRACTICE BOOK» NOT FOR SALE


50. If a network crosses a long distance, such B. connectionless
as between cities or countries, what is it C. public connection-oriented
called? D. private connectionless
A. LAN
56. A computer network is connected to-
B. MAN gether.
C. WAN A. One computer
D. PAN B. Two or more
E. SAN C. Three or more
51. It is usually called the web for short-is a D. Four or more
collection of different websites you can ac- 57. The subnet mask of 255.255. 255.248 is
cess through the Internet. in CIDR notation.
A. Internet A. /26
B. web browser B. /27
C. search engine C. /28
D. world wide web D. /29
52. What does a LAN stand for? 58. Business partners and suppliers of Mar-
A. Local Arena Network tin’s company can access certain parts of
B. Local Area Network the company network from their own com-
pany computer outside of Martin’s com-
C. Long Area Network pany. This is an example of a/an:
D. Local Arena Name A. extranet
53. What is the best defense against a DoS at- B. internet.
tack? C. intranet.
A. Switching to IPv6, which is immune D. throughput.
from these attacks.
59. a 32-bit address-72.44.192.233
B. Running a packet-filtering firewall
A. HTTP
C. Implementation of a flood guard to
stop packets. B. IPv6
D. Installation of NAT between the public C. IP
and private network. D. IPv4
54. What is the correct order of a three-way 60. The rules that describe how clients and
handshake in TCP/IP? servers communicate across a network
A. SYN-SYN/ACK-ACK A. IP
B. SYN-ACK-FIN B. TCP
C. SYN-ACK-SYN C. TCP/IP
D. SYN-ACK-SYN/ACK D. Protocols

50. C 51. D 52. B 53. C 54. A 55. A 56. B 57. D 58. A 59. D 60. D 61. A
1.1 OVERVIEW OF THE INTERNET 8

61. NAT uses to create/locate private IPs 66. A group of computers connected within a
as public address entries confined geographic area
A. unique port numbers A. Region
B. random number generators B. LAN
C. WAN
C. switch IPs
D. HTTP
D. RSA encryption
67. What are the Three common types of com-

NARAYAN CHANGDER
62. Consists of two or more LANs that span a puter Networks?
wide geographic area A. ROM, MAN, FAN
A. LAN B. MAN, LAN, WAN
B. Server C. RAN, PAN, RAM
C. Client D. NONE OF THE ABOVE

D. WAN 68. :80 is an example of


A. a socket
63. A group of computers and associated de-
B. a universal address
vices that share a common communications
line or wireless link, typically to a server. C. a public IP address
D. a Class A network mask
A. Local Area Network (LAN)
B. Subnet Address 69. For which two common tasks is Network
automation used? (Choose two.)
C. Metropolitan Area Network (MAN
A. device provisioning
D. Wide Area Network(WAN) B. accounting
64. A local or restricted communications net- C. data entry
work, especially a private network cre- D. reporting
ated using World Wide Web software. E. text editing
A. Internet 70. A ios a tool that allows you to cpature
B. Intranet raw data on a network.
C. Extranet A. interceptor
B. packet sniffer
D. BugNet
C. security scanner
65. Which of the following is true regarding D. network manager
FTPS?
71. A protocol that uses PPP and implements
A. It is a secure transmission method us- it over Ethernet to connect to an entire net-
ing SSL. work on the internet
B. It is a secure transmission method us- A. PPP
ing SSH. B. MPPP
C. It can safely be used with Telnet. C. IP
D. It is the same thing as SFTP. D. PPPoE

62. D 63. A 64. B 65. A 66. B 67. B 68. A 69. A 69. D 70. B 71. D 72. D
1.1 OVERVIEW OF THE INTERNET 9

72. Which is the largest network in the 78. Software applications that enable users
world? to easily access, view, and navigate web
pages on the internet

PRACTICE BOOK» NOT FOR SALE


A. Peer-to-peer
B. Intranet A. Web link
C. Extranet B. Web site
D. Internet C. Web browser
D. Web page
73. Combines 2 PPP connections in one high
speed transmission 79. Which best describes the results of the fol-
A. PPP lowing command syntax netstat-r
B. MPPP A. The network adapter will reset.
C. PPPoE B. The local routing table will appear.
D. IP C. The network connections will be listed
by web URLs instead of IP addresses.
74. VPN stands for what?
D. The active connection along with its
A. Virtual private network
owning process will appear.
B. Visual protocol network
80. What is not true about a link-local IPv6
C. Virtual protocol network
address?
D. Virtual packet network
A. It cannot be routed out of the local sub-
75. The internet is an example of a Net- net.
work. B. It can begin with FE80.
A. LAN C. It is generated automatically when
B. MAN IPv6 is installed.
C. WAN D. It can be routed throughout a business
D. PAN network, but not on the public Internet.
E. SAN 81. Which affects network performance ?
76. IPv6 site-local addresses begin with Select more than one answer

A. FEC0 A. The package you choose with your ISP


(e.g. FastFibre or Standard)
B. 2001
B. High Network Traffic
C. 0000
C. No. of Users
D. SI00
D. Bandwidth-i.e. data transfer rate
77. Identifies the network and host address
assigned to a device. 82. A worldwide network of interconnected
networks
A. Internet Protocol Address (IP Ad-
dress) A. WAN
B. Subnet Address B. LAN
C. Local Area Network(LAN) C. Internet
D. Metropolitan Area Network (MAN) D. WWW

73. B 74. A 75. C 76. A 77. A 78. C 79. B 80. D 81. B 81. C 81. D 82. C
1.1 OVERVIEW OF THE INTERNET 10

83. Which of these is the largest planet in the 88. Which format stores information using
Solar System? tags that are defined by the application?
A. Earth A. HTML
B. Mars B. XML
C. Mercury C. JSON
D. Jupiter D. NX-API
E. Pluto 89. The network address of a host with an

NARAYAN CHANGDER
84. Can be partially accessed by authorized IPV4 address of 172.16.50.1/16 is
outside users, enabling businesses to ex- A. 172
change information over the internet se- B. 172.16
curely.
C. 172.16.50
A. Internet
D. 172.16.50.1
B. Intranet
C. Extranet 90. A secured version of HTTP used to transfer
web pages from a secure web server to a
D. HairNet web client in encrypted information
85. The protocol by which data is sent from A. HTTPS
one computer to another on the Internet B. HTTP
A. Protocols C. PPP
B. IP D. PPPoE
C. TCP
91. The first global computer network funded
D. TCP/IP by the Department of Defense
86. What is the highest-grossing Marvel A. Internet
movie without the word ‘Avengers’ in the B. ARPANET
title?
C. ARPA
A. Black Panther
D. WWW
B. Captain Marvel
C. Thor 92. Which organization maintains the
databases about website owners?
D. Doctor Strange
A. ICANN
87. Which of these statements is not true B. TLDs
about IPV6 addresses?
C. IXPs
A. They are 128 bits in length.
D. ISPs
B. Subnet masks are no longer part of an
IPV6 address. 93. Most business FTP servers require user
C. It includes numbers and hexidecimal name and passwords because that data is
addresses. confidential

D. Private and Public addresses are still A. Email Protocol


part of IPV6. B. HTTPS

83. D 84. C 85. B 86. A 87. B 88. B 89. B 90. A 91. C 92. A 93. D 94. A
1.1 OVERVIEW OF THE INTERNET 11

C. HTTP 99. A TCP/IP suite protocol that enables the


D. FTP transfer of files between two computers
on the Internet

PRACTICE BOOK» NOT FOR SALE


94. What is true about a ping sweep? A. Email
A. ICMP queries each IP address on a B. HTTPS
host for a response.
C. FTP
B. MAC addresses are pinged for avail-
ability. D. HTTP

C. SYN and ACK packets are used to 100. Which of these types is connecting be-
query available hosts. tween countries:
D. A user must have administrative rights A. WAN
to scan each host. B. MAN
95. A protocol that allows a computer to con- C. LAN
nect to the internet over a phone line D. PAN
A. TCP/IP
101. Which connection status should be re-
B. IP viewed to determine if a remote host is
C. MPPP (Multi Link Point to Point) actively connected to a computer?
D. PPP (Point to Point) A. SYN RCVD
B. ESTABLISHED
96. TCP packets are
C. LAST ACK
A. connection-oriented
D. CLOSING
B. connectionless
C. at high risk for dropping 102. Stores incoming e-mail until users authen-
ticate and download it
D. the least common packet type
A. POP
97. The portion of the IP address that identi-
B. Email Protocols
fies the network the device is assigned to.
C. FTP
A. Internet Protocol Address (IP Ad-
dress) D. HTTP
B. Subnet Address 103. Connects several LANs. They are often
C. Metropolitan Area Network (MAN limited to a corporation or an organization,
but are sometimes accessible to the public.
D. Wide Area Network(WAN)
A. Internet
98. A wireless device that connects multiple B. Metropolitan Area Network (MAN)
users to the carrier’s 4G network, similar
to any local wireless network C. Wide Area Network(WAN)
A. 4G D. Local Area Network(LAN)
B. IPv4 104. Which IPV6 address is not valid?
C. 4G Mobile Hotspot A. 2000:343A::2BD1
D. IPv6 B. FEC0::2B:7:H210

95. D 96. A 97. B 98. C 99. C 100. A 101. B 102. A 103. C 104. B
1.1 OVERVIEW OF THE INTERNET 12

C. FEA0:0000:0000:2334:AB3:77:201A 110. Acts as a central repository of programs


D. ::1 and data to which all users connected to
the network have access
105. Is a network of online content that is for- A. Node
matted in HTML and accessed using HTTP
over the Internet. B. Network
A. WWW C. Network Server
B. Domain Type D. WWW

NARAYAN CHANGDER
C. HTTP 111. If a network is just the devices belonging
D. Domain Name to one person, what is it called?
A. LAN
106. Which of the following describes a secu-
rity tool for an administrator to find the B. MAN
lease holder of an IP address? C. WAN
A. WHOIS D. PAN
B. RIR E. SAN
C. IANA
112. How many sides does a hexagon have?
D. ICANN
A. 4
107. Which of the following handles notifica- B. 5
tions if TTL reaches I?
C. 6
A. The DHCP server
D. 3
B. The Session layer of the OSI model
C. ICMP 113. Which of the following scenarios best de-
scribe a situation in which a user with an
D. SNMP IP address of 169.254.11.123 cannot ac-
108. Which command syntax lists the current cess the network?
statistics of the Internet connection, includ- A. The computer cannot connect because
ing those that were sent and received? it is only configured for IPv6.
A. netstat-p B. There is a rogue DHCP server on the
B. netstat-e network.
C. netstat-a C. The DHCP server was unable to pro-
vide a leased address.
D. netstat-a
D. The address is a local host and can-
109. A collection of many different networks not be used to communicate with other de-
owned by many different entities that vices.
all share information and communicate to-
gether. 114. TTL stands for
A. Internet A. time to live
B. Intranet B. tunnel transport link
C. Extranet C. transport traffic link
D. PhishingNet D. time to link

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 13

115. Which organization is responsible for the storage?


control of IP addresses A. The user has no control over their data

PRACTICE BOOK» NOT FOR SALE


A. Your local domain IT B. Many programs can be run at the same
B. IXPs time, regardless of the processing power
of your device
C. IANA
C. Accessible anywhere with an internet
D. ISPs
connection
116. Which of these is an advantage of cloud D. Portability

1.2 PROTOCOL LAYERING


1. converts bits into an effect that can be sent 5. is rules and procedures for communica-
e.g. light / radio signal tion between network devices.
A. transport layer A. Protocols
B. applications layer B. extricate
C. physical layer C. Orders
D. data link layer D. Principle

2. The Performance of the data communica- 6. Which of these things does the internet
tion network depends on layer do?
A. The number of users A. Routes packets to the next host

B. The Transmission Media B. Breaks the data up into packets


C. Attaches a destination address
C. The Hardware and Software
D. Senses the medium before transmit-
D. All of the above
ting
3. Which of the following is an example of a 7. The purpose of the Application layer is
web browser?
A. Prepares or presents the data (email,
A. Google Chrome file, message) for /from transmission-
B. Microsoft Outlook including applying encryption/decryption
C. Mail B. Ensures reliable transmission of data
D. Mozilla Firefox across the network.
C. Ensures the data is correctly routed
4. Which of these are true for POP? through the network
A. Leaves a copy of your emails on the D. Responsible for encoding the data to
email server be transmitted on the actual cabled or
B. Deletes emails from the email server wireless channel.
on download 8. One of the following protocol suit are NOT
C. Securely transfers emails from server working together to provide emailing ser-
to client vice:
D. Saves space on the email server A. SMTP with IMAP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 14

B. SMTP with POP C. Datalink


C. SMTP with POP or IMAP D. Session
D. POP with IMAP
14. Choose all that are true about IP addresses
9. This protocol is used to access web pages A. They are used to let routers decide
and to communicate with web servers. where packets should go
The data is encrypted using the secure
B. You can use IP addresses to send post-
socket layer (SSL).

NARAYAN CHANGDER
cards and letters
A. HTTP
C. IP addresses are only put on the FIRST
B. HTTPS packet in a transmission
C. FTP D. Devices add the destination AND their
D. TCP own IP addresses to requests
E. IP 15. Which transport layer protocol will notice
10. Who is the coolest? if packets arrive out of order/sequence?

A. Kelly A. TCP
B. leah B. CCCP
C. Kelly C. UDP
D. Mr Cooley D. DCCP
E. Warren 16. who can each layer talk to?
11. Layer one of the OSI Model is? A. every layer
A. Physical B. just the one above
B. Application C. the one above and below
C. Internet D. Just the one below
D. Network to Network
17. It learns mac addresses by looking at the
12. A receiving host computes the checksum on mac address field in the frame
a frame and determines that the frame is A. Router
damaged. The frame isthen discarded. At
which OSI layer did this happen? B. Hub

A. session C. MAC Address Table

B. transport D. Switch
C. network 18. Transport Layer Protocol:TCP what does it
D. data link stand for?
A. Transport Control Protocol
13. In osi, which of the following layer pro-
vides error free delivery of the data B. Transmission Control Protocol
A. Network C. Translator Central Protocol
B. Transport D. Transmission Control Unit Protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 15

19. What are the characteristics of the secure 24. SMTP is used for ..
version of IMAP? Choose all that apply. A. Retrieving emails

PRACTICE BOOK» NOT FOR SALE


A. TCP port 143 B. Maintain CPU performance
B. Secure Sockets Layer (SSL) C. Downloading files
C. TCP Port 993 D. Sending emails from one server to an-
D. Transport Layer Security (TLS) other

E. TCP Port 995 25. Which of these is described as-this is


where the network hardware such as the
20. Data packets are usually bytes in size. NIC (network interface card) is located.
A. 50-1, 500 OS device drivers also sit here.
B. 300-1000 A. Link

C. 500-1, 500 B. Network


C. Application
D. 2000-15, 000
D. Transport
21. What’s the top-most layer of the Internet
protocol stack called? 26. Select the Layer that uses TCP and UTP to
pack and unpack data into/out of Packets
A. transport layer
B. link layer A. Application
C. internet layer B. Transport
D. application layer C. Internet
22. The purpose of the Transport layer is D. Link

A. Prepares or presents the data (email, 27. The OSI model consists of layers
file, message) for /from transmission- A. 3
including applying encryption/decryption
B. 5
B. Ensures reliable transmission of data
C. 7
across the network.
D. 8
C. Ensures the data is correctly routed
through the network 28. makes sure data is in correct format e.g.
D. Responsible for encoding the data to mp3
be transmitted on the actual cabled or A. session layer
wireless channel.
B. applications layer
23. Data is sent across a network as equal C. presentation layer
sized D. data link layer
A. Routers
29. This protocol is responsible for packet
B. Packets switching
C. 1 and 0s A. IMAP
D. Data B. SMTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 16

C. POP3 C. Dosser
D. TCP D. Booter
E. IP 35. An important protocol in the internet pro-
30. Which layer do HTTP, SMTP, FTP protocols tocol suite that enables two hosts to es-
belong in? tablish a connection and exchange data.

A. Layer 1-Physical A. Internet Protocol (IP)


B. Domain Name System (DNS)

NARAYAN CHANGDER
B. Layer 2-Data Link
C. Layer 3-Network C. Transmission Control Protocol (TCP)
D. User Datagram Protocol (UDP)
D. Layer 4-Transport
E. Layer 5-Application 36. What order do the layers work when re-
ceiving data across a network?
31. Choose all that are true
A. Link layer > Network layer > Trans-
A. The Internet works with packet switch- port layer > Application layer
ing
B. Application layer > Transport layer >
B. The Internet works with circuit switch- Network layer > Link layer
ing
C. Transport layer > Application layer >
C. Packet switched networks use band- Network layer > Link layer
width more efficiently than circuit switch-
D. Network layer > Link layer > Trans-
ing
port layer > Application layer
D. Packet switched networks rely on
routers 37. Which of these things can FTP do that
HTTP cannot?
32. What the purpose of Protocols?
A. Transfer files
A. to share information
B. Download files
B. to save information
C. Pause and restart downloads
C. to communicate between entities.
D. Restart a download from the start
D. to divide the information
38. , in a Web browser application, the Appli-
33. Which of these isn’t an advantage of cation layer protocol HTTP packages the
TCP/IP? data needed to send and receive Web page
A. Packets contain information allowing content.
them to be reassembled correctly A. Presentation Layer
B. Packets can avoid congestion individu- B. Application Layer
ally C. Session Layer
C. More efficient squatting of slav D. Network Layer
D. More efficient delivery of memes
39. UDP in the Internet Protocol suite is re-
34. What is used to DDOS? lated to
A. Shoer A. Layer 4
B. Kicker B. Layer 3

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 17

C. Layer 2 44. A selects a route and forwards a data


packet from one network to another
D. Layer 1

PRACTICE BOOK» NOT FOR SALE


A. Switch
40. Which of these are application layer proto- B. Rooter
cols?
C. Route
A. TCP
D. Router
B. HTTP
45. Layer 2-Network Layer-Provides the rout-
C. UDP ing of data across the network by making
D. SMTP use of addressing.
A. IP
41. POP3 is a protocol used for..
B. FTP
A. Reading Protocols C. POP IMAP
B. accessing emails D. TCP
C. downloading images from the server 46. Which of these Protocols deals with Email?
D. Sending files (1-4)
A. FTP
42. What is the Link (Data Link) Layer respon-
sible for ? B. ACP
C. SMTP
A. Responsible for File, Email and Data
Transfer D. none of above
B. Responsible for controlling the packag- 47. Which network layer do Wi-Fi and Ether-
ing and unpacking of data into and out of net operate at?
packets.+Sending and receiving of data. A. Application
C. Responsible for packet switch- B. Transport
ing.Used by routers.IP address assigned
C. Network
to every device.Every packet given IP ad-
dress. D. Link
D. Responsible for passing data over a 48. In what layer does the where the IP Ad-
physical network and into/out of devices. dressing and IP Routing happen?
E. Responsible for sending data across A. Network Layer
the CPU. B. Data Link Layer

43. You have a real-time video feed-which C. Transport Layer


transport layer protocol would be a good D. Session Layer
choice?
49. Virtual terminal is an example of the
A. TCP A. Application Layer
B. RSVP B. Presentation layer
C. UDP C. Transport
D. DCCP D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 18

50. seventh layer C. Network


A. physical D. Link
B. transport 56. Which of these is not a Protocol? (5-6)
C. network A. TCP/IP
D. data link B. DCHP
51. sixth layer C. HTTP

NARAYAN CHANGDER
A. session D. HTTPS
B. transport 57. manages the mapping between these
C. network logical addresses and physical addresses
A. Network
D. data link
B. Physical
52. The protocol suit that represent the main
C. Data Link
infrastructure of internet and other net-
works: D. Session
A. HTTP 58. ensures information is presented in a
B. FTP human-friendly way

C. TCP/IP A. session layer


B. applications layer
D. DHCP
C. physical layer
53. This layer is where the communication is
D. data link layer
set up between the two hosts. It controls
data flow.For example, splitting data into 59. IMAP stands for:
packets. A. Internet Message Access Protocol
A. Application layer B. Internetwork Mapping Access Proto-
B. Transport layer col
C. Network layer C. Internet Mapping Add Protocol
D. Data link layer D. Internetwork Message Added Proto-
col
54. A suite of security extensions for an inter-
net service that translates domain names 60. IMAP protocol is usually used at:
into IP addresses is known as: A. Outlook program
A. EDNS B. Web based email programs
B. DNSSEC C. Databases
C. Split DNS D. Desktop applications
D. DDNS 61. first layer
55. At which network layer are Source/Destination A. transport
IP Address information added to packets? B. data link
A. Application C. presentation
B. Transport D. application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 19

62. What does POP stand for? 67. This layer is where connections are made
between networks. Routers use it to di-
A. Proper Operating Procedure
rect data packets.

PRACTICE BOOK» NOT FOR SALE


B. Packet Orientated Post
A. Application layer
C. Plasma Oscillation Probe
B. Transport layer
D. Post Office Protocol
C. Network layer
63. Select ALL of the Protocols used by APPs D. Data link layer
on the Application Layer below
68. What does HTTPS stand for? (1-4)
A. HTTP
A. Hypertext Transfer Protocol Secure
B. FTP
B. Hyper Text Protocol Secure
C. IMAP
C. Hidden Text Transfer Protocol Station
D. SMTP
D. Hypertext Transfer Protocol Station
E. POP3
69. What does FTP stand for?
64. The MAC sub-layer resides in which OSI
Layer? A. Free To Play
A. Transport B. Full Time Position
B. Network C. File Transfer Protocol
C. Data Link D. File Technology Profile
D. Physical
70. Which layer in the OSI reference model is
responsible for determining the availabil-
65. What is IMAP used for?
ity of the receiving programand checking
A. To download emails stored on a re- to see if enough resources exist for that
mote server to a local client communication?
B. To manage emails on a server so mul- A. transport
tiple clients can access the same email ac-
B. network
count together
C. presentation
C. To send emails and forward them be-
tween mail servers D. session
D. To move files across the internet from E. application
a server to a client computer
71. Which protocol holds the email until you
66. LDAPS is an example of: actually delete it?
A. Authentication protocol A. POP3
B. Secure directory access protocol B. IMAP
C. Address resolution protocol C. SMTP
D. File exchange protocol D. FTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 20

72. How DHCP works? D. Responsible for passing data over a


A. It lease the IP address for pre- physical network and into/out of devices.
configured timing E. Responsible for sending data across
the CPU.
B. It reserve the IP address for devices
for all the time 76. Application Layer 4-Provides user access
C. It manually set the IP address to each to applications websites, files, email.
device A. IP

NARAYAN CHANGDER
D. It creates domain for the network B. FTP, HTTP, SMTP
where it is installed in
C. TCP
73. The purpose of the Network layer is D. ETHERNET
A. Prepares or presents the data (email, 77. Traffic in the network is measured by
file, message) for /from transmission-
including applying encryption/decryption A. Blocking Probabilities

B. Ensures reliable transmission of data B. grade of service


across the network. C. relative congestion
C. Ensures the data is correctly routed D. erlangs
through the network
78. This protocol is used to access web pages
D. Responsible for encoding the data to and to communicate with web servers.
be transmitted on the actual cabled or The data is not encrypted.
wireless channel.
A. HTTP
74. The Two Networks and Transport-Layer B. HTTPS
protocols commonly used on the Internet
are C. FTP
D. TCP
A. TCP and SPX
E. IP
B. TCP and IP
C. BGP and OSPF 79. In which layer of the protocol stack does
FTP, SMTP, POP and IMAP work at?
D. TCP and IPx
A. Physical layer
75. What is the Transport Layer responsible B. Transport layer
for ?
C. Application layer
A. Responsible for File, Email and Data
Transfer D. MAC layer

B. Responsible for controlling the packag- 80. Where does routing occur within the DoD
ing and unpacking of data into and out of TCP/IP reference model?
packets.+Sending and receiving of data. A. application
C. Responsible for packet switch- B. internet
ing.Used by routers.IP address assigned
to every device.Every packet given IP ad- C. network
dress. D. transport

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 21

81. A layer is group of protocols which have C. presentation


similar
D. application

PRACTICE BOOK» NOT FOR SALE


A. Names
B. Functions 86. PPP, Ethernet protocols are layer
C. Protocols A. data link
D. Filters B. network
82. Which network layer does the POP3 net- C. presentation
work protocol operate at?
D. session
A. Data Link Layer
B. Network Layer 87. Which protocols could be used when using
a email client?
C. Transport Layer
A. HTTP
D. Application Layer
B. HTTPS
83. How is the IP protocol used?
C. POP3
A. This protocol is used on the transport
layer. It is responsible for packet switch- D. SMTP
ing.
E. IMAP
B. This protocol is used on the network
layer. It is responsible for packet switch- 88. The difference between IMAP and POP
ing. protocols:
C. This protocol is used on the transport A. IMAP allows to download emails once
layer. It is in charge of splitting data into the user access the email account while
packets and reassembling once it reaches POP not
the receiving device.
B. POP allows to download emails once
D. This protocol is used on the network
the user access the email account while
layer. It is in charge of splitting data into
IMAP not
packets and reassembling once it reaches
the receiving device. C. Both protocols allow to download

84. Which protocol enables secure, real-time D. Both protocols doesn’t allow to down-
delivery of audio and video over an IP net- load
work?
89. A protocol used to receive email. With
A. S/MIME
Email is saved on a server even after it
B. RTP is downloaded to a client.
C. SIP A. Transmission Control Protocol (TCP)
D. SRTP
B. Internet Message Access Protocol
85. second layer (IMAP)

A. transport C. Post Office Protocol 3 (POP3)


B. data link D. User Datagram Protocol (UDP)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 22

90. The purpose of the Link layer is files located on another PC and also pro-
A. Prepares or presents the data (email, vide files to other PC.According to the
file, message) for /from transmission- statement above.Which network architec-
including applying encryption/decryption ture is that?
A. Client server
B. Ensures reliable transmission of data
across the network. B. Peer to peer
C. Ensures the data is correctly routed C. LAN

NARAYAN CHANGDER
through the network D. MAN
D. Responsible for encoding the data to 94. In respect of osi model, LANs implement
be transmitted on the actual cabled or
wireless channel. A. Lower two Layers
B. All seven Layers
91. Which of these are correct?
C. Upper Five Layers
A. The APPLICATION layer en-
D. None of above
codes/decodes the message in a form
that is understood by the sender and the 95. A network protocol for secure file transfer
recipient. over Secure Shell (SSH) is called:
B. Transport layer-breaks down the mes- A. TFTP
sage into small chunks (packets). Each B. SFTP
packet is given a packet number and the
total number of packets. C. Telnet
D. FTPS
C. Network layer-adds the sender’s IP ad-
dress and that of the recipient. The net- 96. Which network layer does the SMTP pro-
work then knows where to send the mes- tocol operate at?
sage, and where it came from.
A. Transport Layer
D. Data link layer-enables the transfer of
B. Data Link Layer
packets between nodes on a network, and
between one network and another. C. Application Layer
E. MAC addressing is used by the Net- D. Network Layer
work/Internet layer. 97. third layer
92. This protocol is used to receive emails and A. session
allows you to synchronise your emails be- B. data link
tween devices.
C. physical
A. IMAP
D. application
B. SMTP
98. Which of the following is an example of a
C. POP3 email client?
D. TCP A. Google Chrome
E. IP B. Microsoft Outlook
93. A network with all the nodes acting as C. Mail
both servers and clients .A PC can access D. Mozilla Firefox

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 23

99. What does FTP stand for? (1-4) B. POP (Post Office Protocol)
A. Flat Transfer Procedure C. HTTP (Hyper Text Transfer Protocol)

PRACTICE BOOK» NOT FOR SALE


B. File Transfer Protocol D. IMAP (Internet Message Access Proto-
col)
C. Flat Transfer Protocol
D. File Transferring Protocol 104. What does S mean in HTTPS?
A. Safe
100. Which of these is described as-this is
B. Secure
where the network applications, such as
web browsers or email programs, operate. C. Soft
A. Link D. Stanford
B. Network 105. Responsible for final transmission of
C. Application digital data bits from the Physical layer
of the sending (source) device over net-
D. Transport work communications media to the Phys-
ical layer of the receiving (destination) de-
101. Protocol is
vice
A. a controlled sequence of messages A. Network Layer
that is exchanged between two or more
systems to accomplish a given task. B. Physical Layer

B. is physical exchanged between two or C. Transport Layer


more person to accomplish the task. D. Data Link Layer
C. computers connected to a network are 106. What’s the second layer down of the In-
broadly categorized as servers or work- ternet protocol stack called?
stations.
A. transport layer
D. is a telecommunications device that B. link layer
permits two or more users to conduct a
conversation when they are too far apart C. internet layer
to be heard directly. D. application layer

102. Which of the following protocols allow 107. What are the main reasons for using lay-
for secure file transfer? Choose all that ers for network communication? (Tick 2
apply. answers)
A. FTPS A. It will transfer data quicker. This
means that files and documents will send
B. TFTP more efficiently.
C. FTP B. Layers are self contained. This means
D. SFTP that it does not need to consider what the
other layers are doing.
E. SCP
C. A layer can be changed without the oth-
103. The protocol used with financial sites ers being affected.
such as banks or PayPal is called D. It makes communication less expen-
A. HTTPS (Hyper Text Transfer Protocol sive. This means that money can be spent
Secure) on other hardware.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 24

108. Select TWO rules TCP/IP must follow? 112. Transport Layer Protocol:UDP-Select ALL
A. Senders computer name the true statements about it

B. Packets are numbered A. Establishes a connection between


sending and receiving devices.
C. Error Check
B. Breaks data into packets without num-
D. None of the above bering them.
109. The client PC doesn’t have to store any C. Packets are Read by receiving device

NARAYAN CHANGDER
data because the server PC store all the in the order they arrive, even if that not
data . Based on the statement above . the order they were sent.
Which network architecture is that?
D. only sends each packet once, and
A. Peer to peer doesn’t check packets have been received.
B. Bus topology This saves time but no way of knowing if
packets have been lost in transit.
C. Star topology
E. will check all packets have been
D. Client server transferred correctly. If not the miss-
ing/corrupted packets can be resent.
110. What is the Internet (Network) Layer re-
sponsible for ?
113. A protocol is..
A. Responsible for File, Email and Data
A. a decision made by the router
Transfer
B. a set of rules computers must follow
B. Responsible for controlling the packag-
ing and unpacking of data into and out of C. a way of connecting a server
packets.+Sending and receiving of data. D. essential to the CPU
C. Responsible for packet switch-
ing.Used by routers.IP address assigned 114. A network management protocol that as-
to every device.Every packet given IP ad- signs IP addresses on a network. It is part
dress. of the larger set of built-in networking pro-
tocols known as TCP/IP.
D. Responsible for passing data over a
physical network and into/out of devices. A. Dynamic Host Configuration Protocol
(DHCP)
E. Responsible for sending data across
the CPU. B. Subnetting
C. Subnet Mask
111. What order do the layers work when
sending data across a network? D. Simple Mail Transfer Protocol (SMTP)
A. Link layer > Network layer > Trans-
115. Which TWO of these protocols are for re-
port layer > Application layer
ceiving email?
B. Application layer > Transport layer >
A. SMTP (Simple Mail Transfer Protocol)
Network layer > Link layer
B. IMAP (Internet Message Access Pro-
C. Transport layer > Application layer >
tocol)
Network layer > Link layer
C. POP (Post Office Protocol)
D. Network layer > Link layer > Trans-
port layer > Application layer D. FTP (File Transfer Protocol)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 25

116. Choose all that are true about MAC ad- C. Having Terminal Transfer Protocol
dresses D. Having Text Transfer Protocol

PRACTICE BOOK» NOT FOR SALE


A. Every MAC address is 100% unique
122. What is a protocol
B. All network devices have a MAC ad-
dress A. A set of rules Blin
C. Routers and switches don’t need MAC B. A set of rules governing the exchange
addresses of data between packets
D. MAC addresses can tell you where a C. A set of rules governing the exchange
device is on the Internet or transmission of data between devices
117. The protocol used to upload a new web- D. none of above
page to a server is called
123. Which email protocol deletes the email
A. FTP (File Transfer Protocol) from the mail server once you have down-
B. SMTP (Simple Mail Transfer Protocol loaded it?
C. HTTP (Hyper Text Transfer Protocol) A. SMTP
D. HTTPS (Hyper Text Transfer Protocol B. POP3
Secure)
C. TCP
118. when different devices can communicate D. IMAP
A. compromise
124. At which network layer are mes-
B. testify
sages/data broken down into packets
C. synergy ready for transport across the network?
D. compatibility A. Application
119. Which of these are “Link Layer” proto- B. Transport
cols? C. Network
A. IP
D. Link
B. Ethernet
125. TCP/IP is related to
C. WiFi
D. FTP A. ARPANET
B. ISO-OSI
120. In which protocol layer does POP hap-
pen? C. DECNET
A. Transport Layer D. ISRO
B. Internet Layer 126. Which network layer does a web
C. Application Layer browser operate at?
D. Network layer A. Application
121. HTTP stands for: B. Transport
A. Hyper Text Transfer Protocol C. Network
B. Hyper Transmission Text Protocol D. Link

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 26

127. Which of the following is a disadvantage D. Domain Name System (DNS)


of a mesh network topology?
132. Before data transmission begins, devices
A. If the central switch or server fails, the send messages to one-another, completing
whole network is down a task called?
B. Requires a high performance switch or A. Data Transmission
server in the centre as all traffic passes
through it. B. Handshaking Process
C. Network Protocol

NARAYAN CHANGDER
C. Very expensive due to the amount of
cabling required. D. Packet Switching
D. It can handle very high data traffic
133. The main job of DNS protocol:
rates
A. It translates between domain names
128. This layer is where the hardware oper- and IP addresses
ates (Such as NICs, WiFi and Ethernet).
B. It automatically assigns IP addresses
A. Application layer to network devices
B. Transport layer C. It transfers web pages
C. Network layer D. It enables file sharing across the net-
D. Data link layer work

129. Which protocols could be used when us- 134. Which of the following is Class D IP Ad-
ing a web browser? dress?
A. HTTP A. 243.10.20.30
B. HTTPS B. 225.10.0.1
C. POP3 C. 126.10.25.1
D. SMTP D. 191.168.10.1
E. IMAP 135. Which of the following refers to a crypto-
graphic network protocol for secure data
130. Which layer does the Ethernet and Wifi
communication, remote command-line lo-
protocol belong in?
gin, remote command execution, and other
A. Layer 1-Physical secure network services?
B. Layer 2-Data Link A. Telnet
C. Layer 3-Network B. SSH
D. Layer 4-Transport C. Bcrypt
E. Layer 5-Application D. TFTP
131. The principal communications protocol in 136. This protocol is used for sending or re-
the internet protocol suite that is used to trieving files from client to server (or
route information over the Internet. server to client). It can be used to send
A. Internet Protocol (IP) files between devices.
B. Transmission Control Protocol (TCP) A. HTTP
C. User Datagram Protocol (UDP) B. HTTPS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 27

C. FTP 142. Internet Layer:Select ALL true state-


ments
D. TCP

PRACTICE BOOK» NOT FOR SALE


A. This layer is used by your router. It
E. IP
is responsible for packet switching (Each
137. The protocol that controls the addressing packet can choose fastest possible route
of packets is called on a network).

A. IP (Internet protocol B. Internet Protocol operate on this layer,


establishing connections between differ-
B. TCP (transmission control protocol) ent routers and handling network traffic.
C. FTP (file transfer protocol) C. IP addresses are unique numbers
D. Ethernet protocol (37.153.62.136) assigned to every device
connected to an IP network. Every packet
138. What is the port used by Post Office Pro- sent is given an IP address.
tocol 3 (POP3) for secure connection? D. Layer is used by web browsers to ac-
A. 993 cess websites and communicate with web
servers
B. 143
C. 995 143. Network protocols are (choose all
that are true)
D. 110
A. Controlled by the government
139. Which of the following is not an applica- B. Only used for WiFi
tion layer protocol?
C. Sets of rules that set out how devices
A. DNS will communicate
B. Ethernet D. Things like Bluetooth and Ethernet
C. FTP
144. With which of the following charecteris-
D. SMTP tics, the design issue of the physical layer
does not deals?
140. What does SMTP stand for? (1-4)
A. Mechanical
A. Server Mail Transfer Protocol
B. Electrical
B. Simple Mail Transition Protocol
C. Functional
C. Simple Mail Transfer Protocol
D. None of the Above
D. Sequential Mail Transfer Protocol
145. Which of these is described as-addresses
141. What type of network does the Ethernet and packages data for transmission.
system work in? Routes the packets across the network.
A. WAN A. Link
B. CAN B. Network
C. LAN C. Application
D. BAN D. Transport

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 28

146. Which of the following refers to a se- 150. Which of these things does the transport
cure implementation of a protocol used for layer do?
synchronizing clocks over a computer net- A. Routes packets to the next host
work?
B. Breaks the data up into packets
A. NTPsec
C. Attaches a destination address
B. SNMPv3 D. Senses the medium before transmit-
C. SRTP ting

NARAYAN CHANGDER
D. IPsec 151. Which protocol holds the email only until
you receive it?
147. It is a unique identifier assigned to net-
A. SMTP
work interfaces for communications on the
physical network segment. B. FTP
A. Frame Check Sequence (FCS) C. IMAP

B. Switch D. POP3

C. Mac Address 152. who directs packets around a network


D. Ports A. router
B. switch
148. The protocol used for normal web re-
C. hub
quests (such as to see a webpage) is called
D. repeater
A. HTTP (hyper-text transfer protocol
153. Link Layer:Select ALL true statements
B. FTP (file transfer protocol)
A. On the Link Layer two protocols are
C. POP (Post Office protocol) used to pass data over a physical network
D. IP (Internet protocol) and into/out of devices.
B. Ethernet is a protocol used for Wired
149. What is the Application Layer responsible Networks on this layer.
for ?
C. Wi-Fi protocol is used on this layer for
A. Responsible for File, Email and Data Wireless Networks can be 2.4 GHz or 5
Transfer GHz radio frequencies
B. Responsible for controlling the packag- D. Remember each device has an NIC-
ing and unpacking of data into and out of responsible for transferring electrical sig-
packets.+Sending and receiving of data. nals or radio frequencies back into binary
C. Responsible for packet switch- and visa versa they operate on this layer.
ing.Used by routers.IP address assigned E. Pop Protocol is used to retrieve emails,
to every device.Every packet given IP ad- but to just a single device / client.
dress.
154. Which version(s) of the SNMP protocol
D. Responsible for passing data over a offer(s) authentication based on commu-
physical network and into/out of devices. nity strings sent in an unencrypted form?
E. Responsible for sending data across Choose all that apply.
the CPU. A. SNMPv1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 29

B. SNMPv2 160. Application Layer Protocol:HTTP stands


C. SNMPv3 for?

PRACTICE BOOK» NOT FOR SALE


A. Hyper Text Transfer Protocol
D. SNMPv4
B. Hyperlink Texting Translator Protocol
155. Which of these are true for IMAP?
C. Hyper Text Transmission Protocol
A. Permanently downloads emails from
D. High Text Transition Protocol
server to client
B. Synchronises folders on server and all 161. Which three statements accurately de-
clients scribe Layer 2 Ethernet switches? (Choose
three.)
C. Leaves a copy of your emails on the
email server A. Spanning Tree Protocol allows
switches to automatically share VLAN in-
D. Is the oldest email protocol formation.
156. Select ALL the layers of TCP/IP B. Establishing VLANs increases the num-
ber of broadcast domains.
A. Utility Layer
C. Switches that are configured with
B. Transport Layer VLANs make forwarding decisions based
C. Internet Layer on both Layer 2 and Layer 3address infor-
D. UDP Layer mation.
D. Microsegmentation decreases the
157. Which of the following protocols are used number of collisions on the network.
for securing HTTP connections? Choose all
E. In a properly functioning network with
that apply.
redundant switched paths, each switched
A. SCP segment will contain oneroot bridge with
B. EFS all its ports in the forwarding state. All
other switches in that broadcast domain
C. SSL will have onlyone root port.
D. TLS
162. This layer is where the applications oper-
E. STP ate (e.g. using a web browser, email client
or FTP client)
158. correct order of layers
A. Application layer
A. APTSNDP
B. Transport layer
B. APSTDNP
C. Network layer
C. APSTNDP
D. Data link layer
D. APSTNPD
163. After the Application layer comes
159. What is data transported using in a LAN? layer
A. Frames A. Network
B. Pixels B. Transport
C. Packets C. Presentation
D. Routes D. Data Link

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 30

164. The protocol for SENDING an email is C. POP3


A. SMTP (Simple Mail Transfer Protocol) D. TCP
B. POP (Post Office Protocol) E. IP
C. FTP (File Transfer Protocol)
170. Which network layer does Ethernet oper-
D. HTTP (Hyper Text Transfer Protocol) ate at?
165. Select the Layer that uses WiFi, Ethernet A. Transport Layer
protocols to convert data into electronic

NARAYAN CHANGDER
B. Data Link Layer
signals (Ethernet) or radio-waves (WiFi)
C. Network Layer
A. Application
D. Application Layer
B. Transport
C. Internet 171. Select the network layer where IP ad-
D. Link dress/Packet Number/Error check is com-
pleted.
166. Which of these is a type of encryption A. Application Layer
A. Distributed denial of service
B. Transport Layer
B. Caeser Cipher
C. Internet Layer
C. Plaintext
D. Link/Physical Layer
D. SMTP
172. The protocol that manages the creation of
167. Which layer would you expect to use the packets is called
FTP protocol to upload files to a server?
A. TCP (transmission control protocol)
A. Application layer
B. IP (Internet protocol)
B. Transport layer
C. POP (Post Office protocol)
C. Network layer
D. SMTP (simple mail transfer protocol)
D. Link layer

168. A protocol used to receive email. Email 173. fourth layer


is deleted from a server after it is down- A. session
loaded to a client.
B. transport
A. Simple Mail Transfer Protocol (SMTP)
C. physical
B. Post Office Protocol 3 (POP3)
D. application
C. Internet Message Access Protocol
(IMAP) 174. A protocol used to send email.
D. Domain Name System (DNS) A. Internet Message Access Protocol
(IMAP)
169. It is in charge of splitting data into pack-
ets and reassembling once it reaches the B. Hypertext Transfer Protocol Secure
receiving device. (HTTPS)
A. IMAP C. Simple Mail Transfer Protocol (SMTP)
B. SMTP D. Post Office Protocol 3 (POP3)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 31

175. How is the TCP protocol used? 179. The protocol that enables file sharing be-
tween hosts:
A. This protocol is used on the transport

PRACTICE BOOK» NOT FOR SALE


layer. It is responsible for packet switch- A. HTTP
ing. B. FTP
B. This protocol is used on the network C. SMTP
layer. It is responsible for packet switch-
ing. D. DNS

C. This protocol is used on the transport 180. Data Link Layer & Physical Layer-Layer
layer. It is in charge of splitting data into 1
packets and reassembling once it reaches A. ETHERNET
the receiving device.
B. IP
D. This protocol is used on the network
C. TCP
layer. It is in charge of splitting data into
packets and reassembling once it reaches D. HTTPS
the receiving device.
181. What goes into packet of data? SELECT
176. Network Protocols are divided into ALL

A. Pinapples A. Checksum (way to find if errors have


occurred during transfer)
B. Rules
B. Destination IP
C. Parts
C. Source IP
D. Layers
D. Data
177. A protocol that governs the transfer of E. Coordinates of Pixels
web content between computers.
182. Flow control in OSI model is done by
A. Post Office Protocol 3 (POP3)
A. Data Link
B. Hypertext Transfer Protocol Secure
B. Network
(HTTPS)
C. Application
C. Simple Mail Transfer Protocol (SMTP)
D. Session
D. Hypertext Transfer Protocol (HTTP)
183. What is the purpose of the HTTP proto-
178. Which of the following is NOT an advan- col? (1-4)
tage of a star network topology?
A. When transferring large les, it is used
A. There is no central node to fail to organise them and process the HTML
B. Simple to add or remove a node as it code on the webs page
has no effect on any other node B. It is used for email communication and
C. Good security-no workstation can in- sending emails
teract with another without going through C. It makes the transfer of a webpages
the server first from the servers to the user’s device
D. Very few data collisions as each node D. It allows data to be communicated
has its own cable to the server through a 4 Layer model

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 32

184. Which of the following correctly describe 188. This is a protocol that dictates how data
steps in the OSI data encapsulation pro- is sent over a WAN
cess? (Choose two.) A. HTTP
A. The transport layer divides a data B. TCP/IP
stream into segments and may add relia-
C. FTP
bility and flow control information.
D. SMTP
B. The data link layer adds physical
source and destination addresses and an 189. Which of these is not an email protocol?

NARAYAN CHANGDER
FCS to the segment. A. SMTP
C. Packets are created when the net- B. POP3
work layer encapsulates a frame with
C. IMAP4
source and destination hostaddresses
and protocol-related control information. D. FTP
D. Packets are created when the network 190. An important protocol in the internet pro-
layer adds Layer 3 addresses and control tocol suite that is generally used when
information to a segment. speed in transmission is more important
than accuracy since the sending computer
185. Which of these are transport layer proto- doesn’t verify that the packets were cor-
cols? rectly received.
A. FTP A. User Datagram Protocol (UDP)
B. TCP B. Domain Name System (DNS)
C. UDP C. Hypertext Transfer Protocol (HTTP)
D. IP D. Hypertext Transfer Protocol Secure
(HTTPS)
186. A network administrator is verifying the
configuration of a newly installed host by 191. What does Protocol mean?
establishing an FTPconnection to a remote A. Rules
server. What is the highest layer of the B. Security
protocol stack that the network adminis-
C. Services
trator isusing for this operation?
D. Orders
A. application
B. presentation 192. Select all the True statements:
A. A network protocol is an agreed way
C. session
of how to communicate over a network.
D. transport
B. WiFi networks use radio frequencies
187. It is a protocol that provides reliable com- in the 2.4 GHz or 5 Ghz frequency ranges.
munication or service. C. WAP stands for Wide Area Protocol
A. TCP D. 2.4 GHz frequency networks are
slower than 5GHz networks, but have a
B. UDP
stronger signal range.
C. DNS E. WiFi networks typically create a ring
D. HTTP/s network topology

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 33

193. Which of these are features of a WAN? B. Frame


(select all that apply)
C. Segment

PRACTICE BOOK» NOT FOR SALE


A. these usually cover a wide geographic
D. bit
area.
B. these are often under collective or dis- 199. opens a connection between 2 WANs
tributed ownership.
A. session layer
C. these usually cover relatively small ge-
B. applications layer
ographical areas.
D. these are often owned and con- C. physical layer
trolled/managed by a single person or D. data link layer
organisation.
200. HTTP, FTP are protocol of which OSI
194. NFS stands for: Model layer
A. Network File System A. Physical layer
B. Network Fiber System B. Network layer
C. National Filing System
C. Transport layer
D. Network Folder System
D. Applicational layer
195. What’s the third layer down of the Inter-
net protocol stack called? 201. Which of these is described as-this layer
sets up the communication between the
A. transport layer two hosts and they agree settings such as
B. link layer ‘language’ and size of packets.
C. internet layer A. Link
D. application layer B. Network
196. In which layer does TCP happen? C. Application
A. Transport Layer D. Transport
B. Internet Layer
202. Select the Layer that uses IP protocol to
C. Application Layer assign IP addresses to ever packet..
D. Network Layer A. Application
197. What does SMTP stand for? B. Transport
A. Simple Message Transmission Proto- C. Internet
col
D. Link
B. Simple Mail Transfer Protocol
C. Shift Manager Training Programme 203. A LAN works in a

D. Small Mail Transfer Protocol A. Small area


B. Large area
198. What is the protocol data unit in layer 1
in the OSI Model? C. Wide area
A. Packet D. Long area

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 34

204. Application Layer Protocol:IMAP is used B. A set of specifications one must follow
for? to communicate
A. Used by Web Browsers to access web- C. A globally adopted protocol
sites and communicate with web servers. D. Layers of the networking model
B. A more secure version of HTTP uses
209. This protocol is used to receive emails. It
Encryption
will delete the email from the server once
C. A more secure version of HTTP uses you have downloaded it to your device.

NARAYAN CHANGDER
Huffman Trees
A. IMAP
D. Used to access, edit and move files be-
B. SMTP
tween devices on a network. e.g. to ac-
cess files on a server from a client com- C. POP3
puter. D. TCP
E. Used to retrieve emails from a server. E. IP

205. A protocol is 210. Application Layer Protocol:POP3 stands


for?
A. A set of rules for transmitting data
across a cable A. Packet Office Protocol
B. A set of rules for transmitting electric- B. Post Officer Protocol
ity across a network C. Pop Official Protocol
C. A set of rules for ah blin who cares. D. Post Office Protocol
D. A set of rules for transmitting data 211. A protocol that helps internet users and
across a network network devices discover other devices us-
206. Which of the following refers to a dep- ing a human-readable hostname instead of
recated TLS-based method for securing numeric IP addresses.
SMTP? A. Transmission Control Protocol (TCP)
A. PPTP B. User Datagram Protocol (UDP)
B. STARTTLS C. Domain Name System (DNS)
C. L2TP D. Simple Mail Transfer Protocol (SMTP)
D. SMTPS 212. Application Layer Protocol:POP3 is used
for?
207. Which of the following is the odd one
out? FTP, HTTP, IMAP, HTTPS A. Used by Web Browsers to access web-
sites and communicate with web servers.
A. IMAP
B. A more secure version of HTTP uses
B. FTP Encryption
C. HTTPS C. Used to retrieve emails from a server
D. HTTP to a single client.
D. Used to access, edit and move files be-
208. What is a Standard? tween devices on a network. e.g. to ac-
A. A set of programs that enable commu- cess files on a server from a client com-
nication puter.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 35

E. Used to retrieve emails from a server. B. IMAP

213. What does IMAP stand for? C. DHCP

PRACTICE BOOK» NOT FOR SALE


A. Internet Message Access Protocol D. POP
B. Interactive Mail Access Protocol
C. Integrated Memory Array Processor 219. Which of these is an “Application Layer”
protocol?
D. Intelligent Multi-Access Platform
A. IP
214. Which two (2) of these does SMTP not
do? B. Ethernet
A. Transfers emails from server to client C. WiFi
B. Transfers emails from client to client D. FTP
C. Transfers emails from server to server
D. Transfers emails from client to server 220. This protocol is used to send emails.
A. IMAP
215. are rules that govern a communica-
tion exchange B. SMTP
A. Media C. POP3
B. Inerfaces
D. TCP
C. Protocols
E. IP
D. All the above

216. Which of these is an “Network Layer” 221. A protocol that combines HTTP with the
protocol? Secure Sockets Layer (SSL) protocol to se-
A. IP curely transfer web content between com-
puters.
B. Ethernet
A. Hypertext Transfer Protocol Secure
C. WiFi
(HTTPS)
D. FTP
B. Simple Mail Transfer Protocol (SMTP)
217. Which layer does the IP protocol belong
in? C. Post Office Protocol 3 (POP3)

A. Layer 1-Physical D. Internet Message Access Protocol


(IMAP)
B. Layer 2-Data Link
C. Layer 3-Network 222. Which of these are internet (network)
D. Layer 4-Transport layer protocols?
E. Layer 5-Application A. NTP
218. It is the protocol that is responsible for B. TCP
automatically assign IP addresses to net-
work devices: C. POP3
A. DNS D. IP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 36

223. Hub, Modem are devices for which 227. divides information into packets
layer? A. data link layer
A. responsible for final transmission of B. transport layer
digital data bits from the Physical layer
of the sending (source) device over net- C. presentation layer
work communications media to the Phys- D. applications layer
ical layer of the receiving (destination) de-
vice. 228. Which of these are true for TCP? (Select

NARAYAN CHANGDER
all that apply)
B. checks for physical transmission
A. This protocol operates at the Transfer
errors and packages bits into data
Layer
“frames”.
B. This protocol operates at the Link
C. support routing
Layer
D. manages the sequence and flow C. this protocol always resends lost pack-
ets
224. Layer 3-Transport:Provides transport of
data between devices by splitting files into D. this protocol does not resend lost pack-
data packets and checking that they have ets
been sent and received correctly.
229. Application Layer Protocol:HTTP is used
A. TCP for?
B. FTP, HTTP, SMTP A. Used by Web Browsers to access web-
sites and communicate with web servers.
C. IP
B. A more secure version of HTTP uses
D. HTTPS Encryption
225. A secure version of the HTTP proto- C. A more secure version of HTTP uses
col offering traffic encryption is known Huffman Trees
as:Choose all that apply. D. Used to access, edit and move files be-
A. HSPA tween devices on a network. e.g. to ac-
cess files on a server from a client com-
B. HTTP over SSL puter.
C. HSRP E. Used to retrieve emails from a server.
D. HTTP over TLS 230. The Layer responsible for end to end de-
E. HTTPS livery of the entire message is
A. Data Link
226. Which of the following protocols was de-
signed as a secure replacement for Tel- B. Transport
net? C. Physical
A. CHAP D. Internet
B. FTP 231. fifth layer
C. SNMP A. session
D. SSH B. transport

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 PROTOCOL LAYERING 37

C. network D. to allow communication between dif-


D. application ferent devices on the same network

PRACTICE BOOK» NOT FOR SALE


232. HTTPS is different than HTTP that it: 237. Which of the following is IANA registered
port?
A. sends and receive messages in en-
crypted form A. 1022
B. sends and receive messages in com- B. 1024
pressed form C. 1023
C. sends and receive messages in de- D. 4952
crypted form
238. What is the procol that is responsible for
D. sends and receive messages in plain
sending emails.
form
A. SMTP
233. is the “traffic policeman” of a network
B. POP3
A. network layer
C. IMAP
B. transport layer
D. SFTP
C. presentation layer
239. Application Layer Protocol:IMAP stands
D. applications layer
for?
234. Which layer communicates using bits? A. Internal Message Access Protocol
A. Layer 1-Physical B. Internet Media Access Protocol
B. Layer 2-Data Link C. Internet Message Access Protocol
C. Layer 3-Network D. Internet Memory Access Protocol
D. Layer 4-Transport
240. Choose all that are true. ‘IP addresses
E. Layer 5-Application are hierarchical’ means that
235. converts packets into 1’s and 0’s A. IP addresses can tell routers which
country or zone they point to
A. network layer
B. Some IP addresses are more powerful
B. transport layer
than others
C. presentation layer
C. IP addresses can breed like viruses
D. data link layer
D. IP addresses are basically random
236. For what two purposes does the Ethernet numbers
protocol use physical addresses? (Choose
two.) 241. How many layers make up the Open Sys-
tems Interconnection Model (OSI)
A. to uniquely identify devices at Layer 2
A. 9
B. to allow communication with devices
on a different network B. 6

C. to differentiate a Layer 2 frame from a C. 8


Layer 3 packet D. 7

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 38

1.3 INTERNET HISTORY


1. Firewalls were introduced decades after C. Web 3.0
the birth of the internet. What year were D. none of above
Firewalls introduced?
A. 2001 7. What year was Microsoft founded?
B. 2003 A. 1822

NARAYAN CHANGDER
C. 2005 B. 1937
D. 2007 C. 1962

2. Who invented the WWW? D. 1975

A. Marc Andreessen 8. What year was the first computer game


B. Tim Berners-Lee introduced?
C. Charley Kline A. 1822
D. Coldplay B. 1937
C. 1962
3. what is the name of each network in the
right order D. 1975
A. star, ring, mess, LAN, WAN 9. DARPA stands for?
B. ring, mess, LAN, WAN, star A. Data Advanced Research Projects
C. mess, LAN, WAN, star, ring Agency
D. LAN, WAN, star, ring, mess B. Defense Advanced Research Product
Agency
4. What is a Sub Domain?
C. Data based Advanced Research Prod-
A. Types of Website
uct Agency
B. Website Location
D. Defense Advanced Research Projects
C. Website Name Agency
D. none of above
10. which one is wide area network?
5. What is the internet? A. LAN
A. A national network connecting thou- B. WAN
sands of computers together.
C. star
B. A global network connecting millions
of computers together. D. ring
C. Google. 11. when was computers invented?
D. A really cool invention. A. 1956
6. Limited interactions B. 1945
A. Web 1.0 C. 1980
B. Web 2.0 D. 1936

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 39

12. The Space Race happened between two na- 18. Year of the history of computer networks
tions except rebuilt.

PRACTICE BOOK» NOT FOR SALE


A. Asia A. In 1978
B. United States B. In 1990
C. USSR C. In 1952
D. none of above D. In 1965
13. What was the name of the first computer 19. Also called the “ Semantic Web “.
game?
A. Web 1.0
A. Donkey Kong
B. Web 2.0
B. Spacewar
C. Web 3.0
C. Frogger
D. Web 4.0
D. Minesweeper
20. An email address is usually in the form
14. He is known as the inventor of the world
wide web. A. username@postservername
A. Vinton Cerf B. mail server name username
B. Ray Tomlinson C. username mail server name
C. Tim Berners-Lee D. mailservername@username
D. Robert Khan 21. The is an Internet protocol for translat-
ing domain names to IP addresses.
15. Company that launched the first mobile
phone with internet access? A. domain name
A. Samsung B. IP address
B. Nokia C. hierarchy
C. Motorola D. domain name system (DNS)
D. Iphone 22. What browser do we use here at the
16. What was the name of the re that devel- school? Hint-you can look on your com-
oped the United States in the year 1960? puter.
A. interconnected A. Firefox
B. Internet B. Google Chrome
C. network of networks C. Safari
D. none of above D. Internet Explorer

17. Best thing of the internet. 23. Which search engine website released in
1997?
A. It connect people, countries, cultures
and information A. Bing
B. Read Books B. Google
C. It makes your own food C. Yahoo
D. Brushes your teeth D. Ask Jeeves

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 40

24. Who is the creator of Facebook? 30. When was the First email sent?
A. Tim Berners Lee A. 1969
B. Mark Zuckerberg B. 1970
C. Martin Sataruja C. 1971
D. none of above D. 1972
25. This is the year when email was invented. 31. Which of the following is NOT an example

NARAYAN CHANGDER
A. 1991 of entertainment on the internet?
B. 1971 A. Music
C. 1969 B. Social networking
D. 1994 C. Games
D. Movies/TV shows
26. Who was the first person to send a mes-
sage over the internet? 32. What is the language of the internet?
A. Tim Berner-Lee A. HTML
B. Charley Kline B. English
C. Thomas Edison C. Spanish
D. Michael Kors D. Tech
27. In 1989 what was the name of the person 33. The probability of failure-free operation of
who proposed the WWW a software application in a specified envi-
A. Ray Tomlinson ronment for a specified time.
B. Ada Lovelace A. Software Reliability
C. Tim Burners-Lee B. Software Quality
D. Charles Babbage C. Software availability
28. It is easiest to imagine the Internet as D. Software Safety
A. spider web 34. In what year did the Internet become uni-
B. American military versal?
C. from interconnected computer net- A. January 1, 1983
works B. January 1, 1984
D. Internet service C. January 1, 1985
29. In this technique, there is no direct contact D. none of above
between users and their programs during
execution. 35. What is the difference between the Inter-
net and the Web?
A. Time Sharing
A. There is no difference.
B. Batch Processing
B. The web deals with web browsers.
C. System Processing The internet is a much larger network of
D. Message Passing connected computers.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 41

C. The Internet is uniquely American, the 40. What is a comprehensive network of com-
Web is World-Wide. puters?

PRACTICE BOOK» NOT FOR SALE


D. The World Wide Web is for residential A. Internet
use, the Internet is for businesses ie. Wal-
B. World Wide Web
mart.
C. Google
36. Origin of the internet.
D. Domain Name System
A. In USA
B. In China 41. What is Download used for?
C. In Brazil A. Search for information and data
D. In Portugal B. Store information and data

37. A website is a place on the internet where C. Download information and data
you can find information or do some activ- D. none of above
ities.
42. From ARPANET, the network’s name be-
A. correct
came
B. vale
A. ANSNET
C. don’t know
B. NSFNET
D. hard question
C. INTERNET
38. Who invented the World Wide Web in D. none of above
1989?
A. Steve Jobs 43. What was the first mechanical Computer
called?
B. Tim Berners-Lee
C. Zendaya A. Difference Engine

D. Bill Gate B. ABC(Atanasoff-Berry Computer)


C. ENIAC
39. Which of the following ideas were seen
or mentioned in the video “The Internet:IP D. Apple
Addresses and DNS? ”
44. These are irrelevant or inappropriate mes-
A. Back in the 1970s, there was no stan- sages sent on the Internet to a large num-
dard method for networks to communi- ber of recipients.
cate.
A. SPAM
B. Vint Cerf, Bob Kahn and Alan Turing in-
vented the Internetworking Protocol that B. Fake News
made the Internet possible. C. Virus
C. The Internet is a network of networks. D. Trojan
D. The Internet is really a design philos-
45. What is a Home page?
ophy and an architecture expressed in a
set of protocols. A. Is the last page that pops up after we
E. The internet design philosophy has al- open any browser
lowed the Internet to adapt and absorb B. Is the first page that pops up after we
new communication technologies. open any browser

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 42

C. Is the next page that pops up after we B. TCP


open any browser C. IP
D. none of above D. HTTP
46. When Internet arrived in Portugal? 52. What is Universal Design?
A. In October of 1964 A. Ensures that web designers will create
B. In July of 1964 websites people with disabilities can use

NARAYAN CHANGDER
C. In April of 1964 B. Ensures that all computers will be in
D. In September of 1964 good working order by 2020.
C. A plan for all websites to look the same
47. Who is considered the “Father of the Inter- in the future
net”?
D. A plan for all websites to be combined
A. Vinton Cerf into a single, massive, universal website
B. Steve Jobs
53. Who had the original IDEA for the inter-
C. Bill Gates net?
D. Zendaya A. Bob Khan
48. What does the Internet come from? B. Vinton Kerf
A. International + Networking C. Spiderman
B. Interaction + Networking D. Nikola Tesla
C. Information + Networking 54. The internet started in the
D. none of above A. 1940’s
49. Where was the second computer located? B. 1960’s
A. UCLA C. 1990’s
B. Stanford D. none of above
C. USSR 55. Wikipedia the world’s history database
D. Estonia was launched in
A. 1999
50. What was the first digital Computer
called? B. 2000
A. Difference Engine C. 2001
B. ABC(Atanasoff-Berry Computer) D. 2004
C. ENIAC 56. A type of technique in which dumb termi-
D. Apple nals are connected to a central computer
system.
51. This protocol defines how messages are A. Time Sharing
formatted and transmitted, and what ac-
tions web servers and browsers should B. Message passing
take in response to various commands. C. Batch environment
A. WWW D. User environment

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 43

57. The Advanced Research Projects Agency 62. What does WWW. stand for?
Network was better known as what?
A. World Wide Web

PRACTICE BOOK» NOT FOR SALE


A. DEFENSENET
B. World Web Writing
B. INTERNET
C. Wacky World Web
C. SKYNET
D. Words With Waves
D. ARPANET
63. Computers can interpret information
58. what is internet
A. Web 1.0
A. It is a worldwide computer network.
B. Web 2.0
B. It’s the WWW
C. Web 3.0
C. it is a web page
D. none of above
D. It’s a DNS

59. What is a “network”? 64. when was the first message sent over the
internet?
A. Group of 2 or more computer systems
linked together. A. 1991

B. When a website is down, the computer B. 1982


uses a cached version. C. 1976
C. Three or more computers that are bro- D. 1969
ken or offline.
D. A webpage with a hyperlink to one or 65. In which year was the Internet more mas-
more pages on the Internet sive?
A. 1990
60. What is a Search Engine?
B. 1920
A. * A type of website that has a role to
find information on various websites that C. 1991
users know well. D. 1898
B. * A type of website that has a role to
find information on various websites that 66. What does ARPA stand for?
users do not know or do not know. A. Advanced Research Projects Agency
C. * A type of website that has a role to B. Advanced Research Protocol Agency
find information.
C. Advanced Research Project Agency
D. none of above
D. none of above
61. What year was the computer mouse in-
vented? 67. What launched in 2005?
A. 1946 A. Twitter
B. 1964 B. Amazon shopping
C. 1975 C. Ebay
D. 1812 D. Youtube

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 44

68. who invented the internet 73. What is a Cyberbully?


A. Robert E. Kahn, Vint Cerf A. One who mistreats or harasses an-
other person using electronic methods
B. bob kahn
B. One who sends e-mails.
C. vint cerf
C. One who mistreats and physically in-
D. none of above jures another person at school.
D. A mean person.
69. Social Media

NARAYAN CHANGDER
A. Web 1.0 74. What was the network that became the
basis of the Internet?
B. Web 2.0
A. DARPA
C. Web 3.0
B. ARPA
D. none of above C. ARPANET
70. In 1958, ARPA was created which stands D. TCP/IP
for 75. The name of the first network connec-
A. Arpanet Research Projects Agency tion that became the basis of the Internet
was?
B. Advanced Research Projects Associa-
tion A. UCLAnet

C. Advanced Research Projects Agency B. ARPAnet


C. KLINEnet
D. none of above
D. WEBnet
71. The “thunderscience.org” of “http://thunderscience.org/folder”
76. Originally, the internet was used by scien-
is
tist and researchers to
A. protocol A. communicate during the cold war
B. domain name B. store large files on cloud servers
C. path C. find jobs
D. sub domain D. shop

72. What is a Website? 77. He is the inventor of E-mail.


A. Robert Khan
A. Is the application of each company in
the world that this service can be viewed B. Vinton Cerf
and used on the Internet. C. Ray Tomlinson
B. Is the title of each company in the D. Tim Berners-Lee
world that this service can be viewed and
used on the Internet. 78. In 1998, what became a big trend?
A. Photo editing
C. Is a service of each company in the
world that this service can be viewed and B. Blogging
used on the Internet. C. Video shorts
D. none of above D. Quiz making

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 45

79. The Internet Network was eventually 85. What organization sets standards and con-
turned over to the from DARPA so it trols for the net to function effectively and
would continue with its original mission of efficiently which also assigns unique iden-

PRACTICE BOOK» NOT FOR SALE


advanced research and development. tifiers for use on the internet such as do-
A. Defense Communication Agency main names, internet protocols (IP), etc.?
B. Department of Defense A. W3C (World Wide Web Consortium )
C. ICANN B. ICANN (Internet Corporation for As-
D. none of above signed Names and Numbers)
C. NSF (National Science Foundation)
80. He is also known as the father of the In-
ternet. D. none of above
A. Ray Tomlinson
86. In what year did the Internet come to Cam-
B. John Louis Uru bodia?
C. Alan M. Turing A. May 1998
D. Vint Cerf
B. May 1997
81. In what year was the first mechanical com- C. May 1999
puter invented?
D. none of above
A. 1822
B. 1937 87. Who invented the first system to send mail
C. 1962 back and forth across the internet?
D. 1975 A. Ray Tomlinson

82. The World Wide Web started in the B. Bill Gates


A. 1950’s C. Jeff Bezos
B. 1960’s D. Mark Zuckerberg
C. 1990’s
88. When was the first digital computer in-
D. none of above vented?
83. Who invented the computer mouse? A. 1822
A. Dr. Douglas Engelbart B. 1937
B. Ade Lovelace C. 1962
C. Steve Jobs
D. 1975
D. Bill Gates
89. The internet grew as tiny a tree acom, the
84. What is a domain?
Arpanet network set up in 1969
A. Is the name of the company in the Web-
A. In 1979
site
B. Is a program in the Website B. In 1980
C. Is the location in the Website C. In 1999
D. none of above D. In 1969

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 46

90. Who is the founder of Microsoft? 96. What is a collection of web pages fol-
lowing the http protocol that can be ac-
A. Bill Gates
cessed via the Internet from any part of
B. Steve Jobs the world?
C. Charles Babbage A. Internet
D. Professor John Vincent Atanasoff B. World Wide Web
C. Google
91. A is a human-readable way of locating

NARAYAN CHANGDER
D. Domain Name System
an Internet site.
A. domain name 97. which one is local area network?
A. LAN
B. IP address
B. WAN
C. hierarchy
C. ring
D. domain name system (DNS)
D. star
92. The name of the first browser on the Inter- 98. According to the lesson, what did Vint Cerf
net was? co-create?
A. Firefox Web Browser A. the zipper
B. Netscape Web Browser B. the internet
C. High View Web Browser C. the ballpoint pen
D. Mosaic Web Browser D. the hard drive
99. Where does .gov come from?
93. Which shopping giant launched in 1995?
A. Governing
A. Lovefilm
B. Government
B. Tesco C. Govern
C. Amazon D. none of above
D. Ebay 100. What’s the name of the inventor of the
Difference Engine?
94. Meaning of “www”.
A. Albert Einstein
A. world wide internet
B. Stephen Hawking
B. world wide web
C. Charles Babbage
C. world wide community D. Konrad Zuse
D. world wide government
101. Who invented the first computer program
95. Year the internet arrived in Portugal. was used to help the Analytical Engine cal-
culate number?
A. 70’s
A. Steve Jobs
B. 80’s B. Ade Lovelace
C. 50’s C. Bill Gates
D. 60’s D. Dr. Douglas Engelbart

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 47

102. Artificial Intelligence 108. University that sent the first message.
A. Web 1.0 A. University of Glamorgan

PRACTICE BOOK» NOT FOR SALE


B. Web 2.0 B. Oxford Brokes University
C. Web 3.0 C. RMIT University
D. none of above
D. University of California
103. which network looks like a circle?
109. What is Search on the Internet used for?
A. ring
A. For information on each website
B. star
C. mess B. For playing games on each site
D. none of above C. Click on the link on each website

104. What was the name of the first internet D. none of above
browser with a graphical interface?
110. Who invented the World Wide Web
A. Firefox (WWW)?
B. Netscape A. Vint Cerf
C. Erwise
B. Tim Berners-Lee
D. Google
C. Robert Kahn
105. He is one of the two fathers of the inter-
D. JC R Licklider
net.
A. Gary Thuerk 111. TCP stands for?
B. Robert Tomlinson A. Transmission control program
C. Robert Khan B. Transmission control protocol
D. Shiva Ayyadurai C. Transfer control program
106. How many years ago was the internet D. Transfer control protocol
released to the public?
A. 52 112. What year was the Internet invented?
B. 28 A. 1975
C. 13 B. 1961
D. What do you mean it hasn’t come out C. 1988
yet
D. 1991
107. ARPANET was composed of the following
four California universities except 113. Why was the internet invented?
A. University of California Santa Barbara A. For an American military project.
B. University of California Los Angeles B. So people could look up information.
C. University of Ohio C. So people could use social networking.
D. Stanford Research Institute D.For a NASA project.
E. University of Utah D. For a NASA project.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 48

114. An Ethical use of the web prevents: 120. The Internet is a project of DARPA which
A. Plagiarism wasused for the development of new tech-
nology for what purpose?
B. Cyber Bullying
A. Commercial use
C. Slander
B. Military use
D. All of the above
C. Research and development
115. Which of the following is a popular use
D. none of above

NARAYAN CHANGDER
of the web?
A. E-commerce 121. A is an arrangement with the biggest
category at the top and subcategories be-
B. Social networking
low, like a triangle.
C. Cloud computing
A. domain name
D. All of the Above
B. IP address
116. What was the first graphical web C. hierarchy
browser?
D. domain name system (DNS)
A. Apple
B. Mosaic 122. Which organization is located at MIT
( Massachusetts Institute of Technology)
C. Google that creates standards and ways to im-
D. Yahoo prove the quality of the web?

117. The genius who created the world wide A. NSF (National Science Foundation
web is B. ICANN (Internet Corporation for As-
A. Robert Kahn signed Names and Numbers)
B. Robert Taylor C. W3C ( World Wide Web Consortium )
C. Tim Berners-Lee D. none of above
D. none of above 123. When was the first workable prototype
of the Internet?
118. The first email was sent in the
A. 1950s A. 1960’s

B. 1960s B. 1970’s

C. 1970s C. 1980’s

D. 1980s D. 1990’s

119. Which of the following could be a subdo- 124. What social media giant launched in
main of the domain bicycles.com? 2004?
A. bicycles.com.org A. Twitter
B. bicycles.org B. Facebook
C. bicycles.co.uk C. Myspace
D. about.bicycles.com D. Instagram

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 49

125. Where is the “top level domain A. To develop standards for the World
name” located in the following Wide Web.
URL:www.nchs18.org?

PRACTICE BOOK» NOT FOR SALE


B. To prosecute copyright violations.
A. At the beginning:www C. They host the entire Internet on a sin-
B. At the end:.org gle web server.
C. In the middle:nchs18 D. They decide which websites should be
D. None of the above included in the World Wide Web.

131. The company that created the first order-


126. Why is news and information such a
ing system via the internet?
great benefit of the interent?
A. Pizza Hat
A. Because we don’t have to watch the
news on TV B. Pizza Out
B. Because a lot of people hate reading C. Pizza Hut
books D. Pizza In
C. Because we wouldn’t know what was
going on in the world 132. What is Upload used for?

D. Because you can find almost anything A. Upload information and data
you want to know on the internet B. Download information and data

127. The “Victorian internet” is actually? C. Search for information and data

A. Telegraph D. none of above

B. Batch Environment 133. the first letter sent over the internet is?
C. Unit Environment A. AND
D. System Environment B. GI

128. The internet is sometimes simply called C. IN


the? D. LO
A. TNC
134. What is a Web Page?
B. Pisonet
A. Is each type of Website
C. Net
B. Is each service of the Website
D. Netflix
C. Is each page of the Website
129. Packet switching was invented in? D. none of above
A. 1960’s 135. What company was the first to import In-
B. 1980’s ternet to Cambodia?
C. 2000’s A. Opennet
D. 1990’s B. Ezcome

130. What is the purpose for the World Wide C. Camnet


Web Consortium (W3C)? D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 50

136. What is Link used for? 142. What was the first government network
A. Upload information to use TCP/IP protocol?
A. Netscape
B. Search
B. .gov
C. Link a website from one page to an-
other C. Arpanet
D. none of above D. Napster
143. Instant communication is one great bene-

NARAYAN CHANGDER
137. In what year did these websites launch?
fit of the interent. Which of the following
Twitter, Spotifty and Netflix.
is NOT an example of that.
A. 2003 A. .E-mail
B. 2004 B. Instant messaging
C. 2005 C. Searching Google
D. 2006 D. Chat rooms
138. Writable phrase 144. What was the most popular web browser
in 1995?
A. Web 1.0
A. Mosiac
B. Web 2.0
B. Google Chrome
C. Web 3.0
C. Netscape Navigator
D. none of above
D. Internet Explorer
139. What is .com from? 145. What was the products that IBM became
A. Communication well known for before computers?
B. Commercial A. Calculators
C. Company B. Typewriters and business machines
D. none of above C. Keyboards
D. none of above
140. The “http” of “http://thunderscience.org/folder”
is 146. The “folder” of “http://thunderscience.org/folder”
is
A. protocol
A. protocol
B. domain name
B. domain name
C. path
C. path
D. sub domain
D. sub domain
141. What year did Disney + release, replac- 147. Person who created the first email pro-
ing the failed predecessor Disney Life. gram?
A. 2019 A. Ray Tomlnson
B. 2020 B. Ray Milton
C. 2021 C. Ray Axel
D. none of above D. Ray Jackson

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 51

148. Which one is not a Web Browser? 154. Internet can help you find the shortest
A. Internet Explorer route.

PRACTICE BOOK» NOT FOR SALE


B. Netscape A. True
B. false
C. Chrome
C. True and false
D. Facebook
D. All of the above
149. Who helped popularize the internet?
155. Who invented DNS?
A. The people
A. Paul Mockapetris
B. Web
B. Steve Jobs
C. The Government
C. Bill Gates
D. Nikola Tesla
D. Tim Berners-Lee
150. A technique that marked the beginning of
computer communications. 156. Which one is not Search Engine?

A. Batch Environment A. *www.amazone.com

B. Message passing B. *www.google.com,


C. www.puc.edu.kh
C. User Environment
D. www.facebook.com
D. Time Sharing
157. When was the first graphical viewer of
151. When was the internet created?
the World Wide Web created?
A. 2000’s
A. 1960’s
B. 1990’s B. 1970’s
C. 1940’s C. 1980’s
D. 1960’s D. 1990’s
152. When was the Internet made available to 158. Vinton Cerf and Robert Kahn created the
the general public? standard protocol in ARPANET called
A. 1988 A. Transmission Control Protocol
B. 1991 B. Internet Protocol
C. 1965 C. Transmission Control Protocol / Inter-
D. 1999 net Protocol
D. none of above
153. It is the early packet-switching network
and the first network to implement the 159. It is the web version that is limited or no
TCP/IP protocol suite. interaction with its users.
A. DARPA A. Web 1.0
B. WWW B. Web 2.0
C. HTTP C. Web 3.0
D. ARPANET D. Web 4.0

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 52

160. What does HTTP stand for? 166. Initially, there were more than 2.4 billion
A. File Transfer protocols people on the Internet
A. correct
B. Internet Protocol
B. vale
C. Hypertext Transfer Protocol
C. don’t know
D. Hydrotherapy training pandas
D. hard question
161. Who adopted TCP/IP on january, 1983?

NARAYAN CHANGDER
167. Cerf was the recipient of the ACM Alan
A. ARPANETI
M. Turing which is also known as?
B. FFG A. Nobel Prize of Internet Science
C. ABBOT B. Nobel Prize of Computer Science
D. ARPANET C. Nobel Prize of Computer Development
162. Who toyed with the idea of a “ world D. Nobel Prize of Internet Development
wireless system”?
168. ISP comes from the word:
A. Noah Tesla
A. Internet Service Projector
B. Gary Tesla
B. Internet Service Provider
C. Nikola Tesla
C. Internet Service Programmer
D. Joshua Tesla
D. none of above
163. Who invented the World Wide Web?
169. The social media giant known as MyS-
A. Tim Berners-Lee pace launched in
B. Charley Kline A. 2000
C. Thomas Edison B. 2001
D. Michael Kors C. 2003
D. 2005
164. What’s the name of the inventor of the
first digital computer? 170. When was the first message sent over
A. Albert Einstein the internet?
B. Stephen Hawking A. 1991
C. Charles Babbage B. 1982
D. Professor John Vincent Atanasoff C. 1976
D. 1969
165. in wide area network how man comput-
ers can you have connected? 171. What does the word Internet mean?
A. 11 or more A. network of networks
B. 10 or more B. Red
C. 1 or more C. telephone
D. 2 or more D. computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 INTERNET HISTORY 53

172. What is the WWW? 178. He is the co-inventor of the TCP/IP Pro-
A. World Web Wide tocols.

PRACTICE BOOK» NOT FOR SALE


B. Wide World Web A. Robert Kahn

C. World Wide Web B. Ray Tomlinson


C. Vint Cerf
D. none of above
D. JC R Licklider
173. What invention replaced the transistors,
allowing for another decrease in size and 179. Fibre Optic allows signals to travel us-
in speed? ing light, this allowed a faster internet
connect. What year was Fibre Optic re-
A. Transistors
leased?
B. Integrated Circuits
A. 2008
C. Vacuum Tubes
B. 2009
D. Mouse C. 2010
174. what do you need internet D. 2013
A. computer 180. This web version enables for two-way
B. books communication that gives more interaction
C. the armchairs with the users.

D. nose A. Web 1.0


B. Web 2.0
175. Where was the first computer located?
C. Web 3.0
A. UCLA
D. Web 4.0
B. Stanford
181. Who are the inventors of the internet?
C. USSR
A. Robert Kahn
D. Estonia
B. Ray Tomlinson
176. Who is the father of HTML? C. Alan M. Turing
A. Tim Berners Lee D. Vint Cerf
B. Mark Zuckerberg
182. when was the internet made?
C. Martin Sataruja
A. 1983
D. none of above
B. 1979
177. Put these in chronological order: C. 1940
A. TCP/IP developed, DNS established, D. 1944
WWW
183. who controls the internet?
B. DNS established, TCP/IP developed,
WWW A. ICANN
C. TCP/IP developed, WWW, DNS estab- B. DNS
lished C. IANA
D. none of above D. all the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 STANDARDS AND ADMINISTRATION 54

184. What is a Web Browser? 187. The first internet message was sent from
to Stanford.
A. Is a program for playing games on our
computer A. UT Austin
B. Is a program for accessing the Inter- B. Harvard
net on our computer. C. Duke
C. Is a program for enabling Email on our D. UCLA
computer.

NARAYAN CHANGDER
188. Inventor of the internet?
D. none of above
A. Department of War
185. The browser is B. Department of Child
A. a terminal device on a telecommunica- C. The US Department of Defense
tions line that allows two or more speak-
D. Department of Food
ers to carry on a conversation when they
are not within direct earshot. 189. When was the first website released
B. a pair of lace speakers placed over the when the WWW was born.
ears for listening. A. 1989
C. a television receiving device that con- B. 1990
verts a signal received by radio or cable
C. 1991
network into a moving image and accom-
panying sound. D. 1994
D. a software program that greatly simpli- 190. ARPANET stands for?
fies the user’s work when visiting differ-
A. Advanced Research Project Agency
ent locations on the Internet.
Network
186. What year was the birth of the internet? B. Advanced Research Programmed Auto
Network
A. 1966
C. Advanced Research Project Automatic
B. 1968
Network
C. 1969
D. Advanced Research Project Autho-
D. 1971 rized Network

1.4 STANDARDS AND ADMINISTRATION


1. What is the difference between HTTP and 2. An internet protocol is
HTTPS A. Fast data transfer
A. HTTPS uses encryption B. Rules for sending data
B. HTTPS is only used in Wi-Fi networks C. A type of bandwidth
C. HTTP is a theoretical model, HTTPS is D. none of above
the application
3. which of these statements describe the
D. HTTP has levels of data protection role of the POP3 protocol?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 STANDARDS AND ADMINISTRATION 55

A. Client / server Protocol B. Encrypt data for transmission across a


B. Delivers stored e-mails network

PRACTICE BOOK» NOT FOR SALE


C. Provides security C. mainly used to allow secure remote lo-
gins
D. Allows the creation of e-mails
D. implements anti-virus software on a
4. What is the aim of a ‘protocol’ network
A. To take control of a network 9. How is a Router and a Switch different?
B. To outline how network communica-
A. Switches are used on the internet,
tion can be encrypted
routers are only used within a LAN
C. To set out rules to allow data to be
B. Switches are essential for a WAN,
communicated effectively
Routers are not
D. There is no consensus on what a Pro-
C. Switches connect LAN devices to-
tocol is
gether, Routers communicate across
5. The International Organization for Stan- mediums
dardization (ISO), established in D. Routers are Switches are interchange-
A. 1947 able
B. 1957 10. What is the aim of MAC address?
C. 1967 A. To uniquely identify a point on a net-
D. none of above work to allow packets to be sent to the
correct destination
6. the following are examples of LAN except
B. To uniquely identify every device, so
A. The computer network of an interna- that communication between devices can
tional corporation be achieved
B. A computer network on the floor of an C. To generally identify an end-point in
office building a network to support communication and
C. The computer network in your house packet routing
D. none of above D. To identify a sub-set of end points, de-
vices or network components during any
7. It tells the sender about the readiness of given communication
the receiver to receive the data
A. semantics 11. How does SMTP and POP3 differ?

B. syntax A. SMTP and POP3 operate in the same


way
C. timing
B. SMTP transfers e-mails to clients from
D. none of above servers, POP3 does not
8. which of these statements describe the C. POP3 transfers e-mails to clients from
role of SSH? servers, SMTP does not
A. To provide a secure channel for other D. SMTP is the old version of the newer
transmissions POP3 Protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 STANDARDS AND ADMINISTRATION 56

12. It tells the meaning of each section of bits C. To generally identify an end-point in
and indicates the interpretation of each a network to support communication and
section packet routing
A. timing D. To identify a sub-set of end points, de-
B. syntax vices or network components during any
C. semantics given communication

D. none of above 15. The mission of the is advancing tech-

NARAYAN CHANGDER
13. Standards organization covering the entire nology for the benefit of humanity
field of worldwide telecommunication are A. ITU
efficiently produced in a timely manner
B. IEEE
A. ITU
C. EIA
B. IEEE
C. ANSI D. none of above
D. none of above 16. is a private nonprofit orgfanization that
14. What is the aim of an IP address? oversees the development of voluntary
consensus standards
A. To uniquely identify a point on a net-
work to allow packets to be sent to the A. ISO
correct destination B. ANSI
B. To uniquely identify every device, so
C. ITU
that communication between devices can
be achieved D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
2. Application Layer

2.1 Introduction
1. In the event that there is no NTP Protocol 4. Select every email protocol
on the Server, what problem will occur? A. IMAP
A. can work normally B. SMTP
B. Failed to retrieve data from the server. C. POP3
C. causing the client and server time to D. TCP/IP
be out of sync
5. What kind of protocol is a web browser?
D. right on all counts A. NTP
2. Which three protocols operate at the B. FTP
application layer of the TCP/IP model? C. HTTP
(Choose three.) D. DNS
A. TCP
6. Which protocol is used as the transport
B. ARP protocol for a video application?
C. DNS A. TCP
D. SMTP B. UDP
C. FTP
E. TFTP
D. RDC
3. In a mesh topology the number of cables
required to form a network is 7. FTP uses and port no data and Con-
trol connection
A. n
A. 20, 21
B. n-1 B. 19, 20
C. n(n-1)/2 C. 21, 22
D. One backbone and n drop line D. 22, 23

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 58

8. sometimes referred to as just “POP, “ is 13. Which of the following attribute is used for
a simple, standardized method of deliver- a cookie to last beyond a single browsing
ing e-mail messages. A POP3 mail server session?
receives e-mails and filters them into the
A. Average
appropriate user folders. When a user con-
nects to the mail server to retrieve his B. Lifetime
mail, the messages are downloaded from C. Maxage
mail server to the user’s hard disk.
D. Lowage

NARAYAN CHANGDER
A. POP3 Post Office Protocol
B. DHCP Dynamic Host Configuration Pro- 14. Protocol used when sending Mails
tocol
A. IMAP
C. NNTP Network News Transfer Proto-
col B. SMTP
D. FMTP Forwarding Mail Transfer Proto- C. POP3
col D. HTTPS
9. Which protocol would download the email
15. Which protocol is used for sending
from to your computer and delete it from
emails?
the server?
A. FTP A. FTP
B. SMTP B. IMAP
C. POP3 C. SMTP
D. IMAP D. POP3
10. UDP and TCP are both layer protocols.
16. The IETF
A. data link
A. Is responsible for regulating the inter-
B. Network net.
C. Transport B. Develops and promotes mandatory In-
D. none of the above ternet standards
11. The protocol used to convert IP Address to C. Is a group of volunteers, engineers
Domain Name is and network designers who oversee inter-
A. HTTPS net standards

B. FTP D. I a group of U.S. engineers who devel-


oped the internet
C. DNS
D. Nothing is right 17. OSI 7 Layer was developed from which or-
ganization?
12. How many bits are in an IPV6 address?
A. iOS
A. 32
B. 64 B. ISO
C. 128 C. SSO
D. 256 D. CISCO

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 59

18. The conversation between your computer 23. What is layer 7 of the OSI model?
and a server when requesting a website is A. Application
mainly made up of requests

PRACTICE BOOK» NOT FOR SALE


B. Presentation
A. “Ask”
C. Session
B. “Help” D. Transport
C. “Get”
24. Telnet
D. “Ack”
A. 21
19. The function of the FTP Protocol is B. 22
A. that serves to Upload File from Clienc C. 23
or Download File from Server D. 24
B. Responsible for sending and receiving 25. Which on of the following is the function
e-mails. of the Presentation Layer?
C. serves to link time A. Create an maintain dialog between
D. Convert the IP Address to be in the source and destination applications
form of a Domain name. B. Compressing data
C. Flow control
20. What HTTP method is used when the user
first loads a webpage? D. Choose the best path to route packets

A. GET 26. What are the upper three layers of the OSI
Model? (Choose three)
B. POST
A. Data Link
C. PUT
B. Session
D. HTTP
C. Application
21. Which part of the architecture sends a D. Transport
POST request? E. Presentation
A. Client 27. The application one uses to access web
B. Server pages is called
C. Database A. web browser

D. Internet B. word processor


C. presentation software
22. What is the PDU? D. Steam software manager
A. Personal Data Unit
28. FTP uses the services of
B. A message
A. IP
C. Professional Desktop Unit B. TCP
D. Protocol Data Unit C. PPP
E. File storage D. UDP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 60

29. Which layer is responsible for formatting 34. What does ISP stand for?
data, compression and encryption? A. Internet Service Provider
A. Application B. Internet Switch Protocol
B. Presentation C. Internet Service Protocol
C. Session D. Internet Switch Provider
D. Transport 35. Which two tasks does the Dynamic Host
Configuration Protocol perform? (Choose

NARAYAN CHANGDER
30. is a communications profile designed
two)
to support the exchange of data between
flight data or flight plan processing sys- A. Set the IP gateway to be used by the
tems network.
A. FMTP-Flight Message Transfer Proto- B. Configure IP address parameters from
col DHCP server to a host.

B. NNTP-Network News Transfer Proto- C. Assign and renew IP address from the
col default pool.
D. Perform host discovery used
C. POP3-Post Office Protocol
DHCPDISCOVER message.
D. DHCP-(Dynamic Host Configuration
E. Monitor IP performance using the
Protocol
DHCP server.
31. An FTP protocol is used for 36. What layer is responsable for moving data
A. Copying files from one host to another through the network connection?
B. Distributing web pages A. Application layer
C. Accessing emails B. Session layer
D. Creating secure communications C. Presentation layer
D. Transport layer
32. FUNCTIONS OF APPLICATION LAYERThis
layer provides access for global informa- 37. Identify the incorrect statement
tion about various services. A. FTP stands for File Transfer Protocol
A. Directory Services B. FTP uses two parallel TCP connections
B. File Transfer, Access and Management C. FTP sends its control information in-
(FTAM) band
C. Network Virtual Terminal D. FTP sends exactly one file over the
data connection
D. Mail Services
38. The part of the internet that users can ac-
33. Disadvantages of HTTP Protocol Which of cess using web browsers such as Google
the following is wrong? Chrome is called the?
A. Difficult to prevent data theft A. World Wide Web
B. can detect information easily B. The Intranet
C. Text can be converted or edited easily. C. HTTP
D. all wrong D. The Deep Web

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 61

39. Which of the following is needed to access 44. Which of these is NOT part of TCP’s role?
email when sender and receiver are on the
A. Sets the rules for how devices connect
same system

PRACTICE BOOK» NOT FOR SALE


on a network
A. IP
B. Makes sure data is correctly send and
B. MAC Address delivered
C. Mail Server C. To direct packets between routers
D. User Agent D. Splits data into packets

40. Which of the following is NOT a proper con- 45. is a network management protocol
tent type for an HTTP response? used to dynamically assign an Internet Pro-
A. HTML document tocol (IP) address to any device, or node,
on a network so they can communicate us-
B. JSON data ing IP. DHCP automates and centrally man-
C. JPEG image ages these configurations rather than re-
quiring network administrators to manu-
D. POST request ally assign IP addresses to all network de-
vices. DHCP can be implemented on small
41. Which one of the following is an Applica-
local networks as well as large enterprise
tion Layer protocol?
networks.
A. IPv4
A. DHCP (Dynamic Host Configuration
B. Ethernet Protocol)
C. TCP B. POP3 (Post Office Protocol)
D. SMTP C. NNTP (Network News Transfer Proto-
col)
42. Why is the application layer important?
D. FMTP (Forwarding Mail Transfer Proto-
A. The application layer provides trans- col)
port services to the network.
B. The application layer provides the MAC 46. The Acronym MIME stands for
address. A. Multipurpose Internet Mail Extension
C. The application layer provides the ap- B. Multipurpose Internet Mail Email
plication an interface to the network.
C. Multiple Internet Mail Extension
D. The application layer is not needed.
D. Multiple International Mail End
43. Which message does an IPv4 host use to
reply when it receives a DHCPOFFER mes- 47. T/F:What are considered types of
sage from a DHCP server? servers? (choose all that apply)
A. DHCPACK A. File
B. DHCPDISCOVER B. Print
C. DHCPOFFER C. Web
D. DHCPREQUEST D. Email

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 62

48. Which one of the following Email proto- C. Streaming Live


cols keeps the original messages in the D. Sending a music file
server?
A. POP3 54. What OSI layer is responsible for Encryp-
tion?
B. SMTP
A. Application layer
C. IMAP
B. Session layer
D. TCP

NARAYAN CHANGDER
C. Presentation layer
49. dns Domain Name Service
D. Transportation layer
A. 53
B. 67 55. In which type of network is the data ac-
cessed from a peer device without the use
C. 68 of a dedicated server?
D. 22
A. Peer-to-Peer Networks
50. Which protocol would you use to transfer B. Client-Server Networks
files?
C. Two-Tier Networks
A. FTP
D. Three-Tier Networks
B. SMTP
C. POP3 56. Which one of the following tool is used
to manually query the name servers to re-
D. HTTP solve a given host?
51. Which one of the following protocols de- A. ipconfig
fine an automated service that matches re- B. tracert
source names with the required numeric
network address? C. netstat
A. DHCP D. nslookup
B. DNS 57. Which protocols provide reliable data
C. HTTP transfer
D. FTP A. UDP

52. Which of the following is a store and for- B. TCP


ward application on internet? C. Both TCP and UDP
A. Message D. None of them
B. Video
58. When a website wants to communicate
C. Email with your web browser securely, it first
D. Audio sends a
A. A baloney sandwich
53. When will it be appropriate to use UDP in-
stead of TCP? B. A secure packet
A. Sending an email C. An encryption key
B. Sending an image D. Digital Certificate

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 63

59. Which protocol would you use to create a B. .edu.au


copy of the email from your email server? C. .tafeqld.edu.au

PRACTICE BOOK» NOT FOR SALE


A. FTP
D. mail.tafeqld.edu.au
B. IMAP
65. What OSI layers are grouped into the TCP
C. POP3
application layer?
D. HTTP
A. Application layer
60. The File Transfer Protocol is called to be B. Session layer
C. Presentation layer
A. In-Band
D. Transport layer
B. Off-Band
E. Internet layer
C. Out-of-Band
D. Under-Band 66. What is Hypertext used for?
A. Creating websites
61. What hardware is responsible for running
the Application layer? B. Sending emails
A. Routers C. Saving programs
B. Switches D. Storing data
C. Servers 67. Which of these devices are not able to run
D. Models the Application layer?

62. Select the protocols that belong to the A. Desktops


TCP/IP Application layer. B. Routers
A. TELNET C. IPhones
B. HTTP D. Smart Watches
C. ICMP E. Clients
D. UDP
68. One of the advantages of UDP?
E. SNMP
A. Secure
63. In DNS which of the following flag bit in- B. Larger
dicates whether the message is a query or
a reply? C. Smaller
A. 1 & 10 D. Faster
B. 0 & 1 69. Which one of the following is NOT an Email
C. 10 & 0 protocol?
D. 1 & 0 A. SFTP
B. SMTP
64. Which one of the following is an example
of a top-level domain? C. POP
A. .au D. IMAP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 64

70. Email is emerging as one of the most D. File Transfer, Access and Management
valuable services on the internet today. (FTAM)
Most of the internet systems use as
a method to transfer mail from one user 75. Which of the following is an email proto-
to another is a push protocol and is col?
used to send the mail whereas POP (post
A. TCP
office protocol) or IMAP (internet message
access protocol) are used to retrieve those B. IMAP
mails at the receiver’s side.

NARAYAN CHANGDER
C. UDP
A. HTTP
D. FTP
B. FTP
C. SMTP 76. smtp Simple Mail Transfer Protocol
D. TELNET A. 21
71. What layer formats data for encryption? B. 25
A. Presentation layer C. 23
B. Application layer D. 53
C. Transport layer
D. Session layer 77. DHCP-Dynamic Host Configuration Proto-
col
72. What do websites use to remember who
A. 67
you are?
A. biscuits B. 68

B. cookies C. 80
C. crackers D. 443
D. cupcakes
78. Which of the following domain name is re-
73. Which of the following is an internet pro- cently added?
tocol?
A. .biz
A. HTTP
B. .gov
B. HTML
C. .net
C. CSS
D. UTP D. .int

74. FUNCTIONS OF APPLICATION LAYERIt al- 79. Which is the first of the four layers in the
lows a user to log on to a remote host. The TCP/IP model?
application creates software emulation of
A. Internet
a terminal at the remote host.
A. Network Virtual Terminal B. Transport

B. Mail Services C. Application


C. Directory Services D. Link

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 65

80. When a client is requesting an initial ad- 84. Which protocol is used to transfer files
dress lease from a DHCP server, why from one computer to another?
is the DHCPREQUEST message sent as a

PRACTICE BOOK» NOT FOR SALE


A. FTP
broadcast?
B. DNS
A. The client does not yet know the IP ad-
dress of the DHCP server that sent the of- C. HTML
fer.
D. HTTP
B. The client may have received offers
from multiple servers, and the broadcast 85. FUNCTIONS OF APPLICATION LAYER This
serves to implicitly decline those other of- layer provides the basis for E-mail for-
fers. warding and storage.
C. The DHCP server may be on a different A. Mail Services
subnet, so the request must be sent as a
broadcast. B. Network Virtual Terminal

D. The client does not have a MAC ad- C. Directory Services


dress assigned yet, so it cannot send a D. File Transfer, Access and Management
unicast message at Layer 2. (FTAM)
81. Which two protocols belong in the TCP/IP
86. During an FTP session the data connection
model application layer?
may be opened
A. EIGRP
A. Only once
B. DNS
B. Twice
C. OSPF
C. Many times
D. ICMP
D. NONE
E. DHCP

82. The function of the correct application 87. File Transfer Protocol (FTP) is a / an
layer is A. Transport Layer Protocol
A. Acts as a interface between the user B. Network Layer Protocol
and the application.
C. Application Layer Protocol
B. Serves to forward data to the data link
layer. D. Physical Layer Protocol
C. responsible for data processing
88. The HTTP protocol:
D. Acts as a renderer to the presentation
layer. A. The GET request results in all of the
page data being displayed.
83. Which protocol governs the way we trans-
B. Data sent by the server is sent in one
fer and load hypertext?
file, broken up into various packets.
A. FTP
C. Data sent by the server is sent in sev-
B. SMTP eral files broken up into packets.
C. POP3 D. Data sent by the server arrives at the
D. HTTP client in the order it is sent.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 66

89. RDP-Remote Desktop Protocol 95. is a networking protocol and software


A. 3389 program used to access remote comput-
ers and terminals over the Internet or a
B. 21 TCP/IP computer network. Designed for
C. 441 remote server access, management and
D. 80 client/server architectures, Telnet works
through a purpose-built program that pro-
90. Which of the following does bit torrent vides connectivity between a remote com-
puter/server and host computer. Upon

NARAYAN CHANGDER
suits for distributing digital media over a
network? providing correct login and sign-in creden-
A. Digital Network tials, a user may access a remote system’s
privileged functionality.
B. Peer to Peer Network
A. HTTP
C. Client Server Network
B. FTP
D. Token Ring Network
C. SMTP
91. During an FTP session the control connec- D. TELNET
tion is opened
A. Once 96. When a DHCP server is configured,
which two IP addresses should never be
B. manytimes
assignable to hosts? (Choose two)
C. Twice
A. network or subnetwork IP address
D. NONE
B. broadcast address on the network
92. Which layer is responsible for creating and C. IP address leased to the LAN
maintaining dialogs?
D. IP address used by the interfaces
A. Application
E. manually assigned address to the
B. Presentation clients
C. Session
97. DHCP is usually employed for end user de-
D. Transport vices. For which one of the following de-
93. What protocol is used for file-sharing and vices is a static address used?
print services on Microsoft networks? A. laptop computer
A. HTTP B. desktop computer
B. HTTPS C. gateway device
C. SMTP D. mobile device
D. SMB
98. Which part of the architecture sends the
94. Another name for a web address is initial HTTP request?
A. HTTP A. Client
B. HTML B. Server
C. URL C. Database
D. CSS D. HTML

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 Introduction 67

99. Which of these layers are only present in designed specifically for newsgroup arti-
the OSI model? cles.a newsgroup may be similar to a fo-
rum, where users can read posts from

PRACTICE BOOK» NOT FOR SALE


A. Application layer
other users and submit their own.
B. Transport layer
A. NNTP-Network News Transfer Proto-
C. Internet layer col
D. Session layer B. FMTP-Forwarding Mail Transfer Proto-
col
100. It’s also one of the oldest protocols in use
C. POP3-Post Office Protocol
today, and is a convenient way to move
files around. An server offers access D. DHCP-Dynamic Host Configuration
to a directory, with sub-directories. Users Protocol
connect to these servers with an client,
103. FUNCTIONS OF APPLICATION LAYER It is
a piece of software that lets you download
a standard mechanism to access files and
files from the server, as well as upload
manages it. Users can access files in a re-
files to it is a useful tool for moving in-
mote computer and manage it. They can
formation from the computer you’re work-
also retrieve files from a remote computer.
ing on to the server where a website is
hosted. If you want to install WordPress A. File Transfer, Access and Management
on a web server, for example, you’re go- (FTAM)
ing to need to copy the files over.It’s B. Directory Services
also occasionally used as a way to share
C. Network Virtual Terminal
files. One person may upload a file to an
server then share a link to it with an- D. Mail Services
other person
104. Mode of data transfer in FTP, where all
A. HTTP the is left to TCP
B. FTP A. Stream mode
C. SMTP B. Block mode
D. DHCP C. Compressed mode
D. None of the mentioned
101. Which protocol is responsible for trans-
ferring computer files between client and 105. Suppose you wanted to do a transaction
server on a computer network? from a remote client to a server as fast
A. SMTP as possible. Would you use UDP or TCP?
Why? (Choose all that apply)
B. FTP
A. UDP:Less Overhead
C. TCP/IP
B. TCP:as fast as UDP bout guaranteed
D. HTTP
C. UDP:If no confirmation is required
102. is the protocol used to connect to D. TCP:If confirmation is required
Usenet servers and transfer newsgroup
articles between systems over the Inter- 106. In FTP, well-known port(s) is (are)
net. It is similar to the SMTP protocol used.
used for sending email messages, but is A. 1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 68

B. 2 108. is the underlying protocol used by the


C. 3 World Wide Web and this protocol defines
how messages are formatted and trans-
D. 4 mitted, and what actions Web servers and
107. Which of these layers are only present in browsers should take in response to vari-
the TCI/IP model? ous commands.

A. Application layer A. HTTP


B. FTP

NARAYAN CHANGDER
B. Transport layer
C. Internet layer C. SMTP
D. Session layer D. TELNET

2.2 CLIENT-SERVER PARADIGM


1. What is an advantage of a LAN? D. Local Analogue Network
A. You can save money by sharing periph- 5. Which email protocol allows an email client
erals like printers. to read mail stored on the mail server?
B. It is limited to a small area. A. IMAP4
C. Can cover near infinite geographical B. SMTP
distance.
C. TCP
D. Expensive to setup.
D. POP3
2. In the URL “krunker.io/? game
=SYD:h12zs” what is the name of the 6. In what scenario would server-side script-
variable highlighted in red. ing be preferred over client-side script-
ing?
A. game
A. Database management
B. krunker
B. Form validation
C. syd
C. User interface
D. h12zs
D. Client-side validation
3. Each statement in PHP and Javascript ends
with 7. Which best describes a server?
A. A new line A. A computer that stores data
B. A colon B. A computer that stores software
C. A semi-colon C. Central computer-provides clients
with functionality
D. A curly bracket
D. A computer within a network
4. LAN stands for
8. In the client-server model, what is the pri-
A. Local Area Network mary protocol used for communication be-
B. Large Area Network tween a browser & web server?
C. Little Area Network A. FTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 69

B. TCP 14. Antionette has a created a game instance


C. HTTP on a server. Select the variables that she
could change

PRACTICE BOOK» NOT FOR SALE


D. SSL
A. Number of players = 10
9. Which of the following is true?
B. Maps to play on
A. In a ring network there are no colli-
sions because data packets travel only in C. Game modes
one direction
D. Names of people who can’t play
B. In a bus network there are no colli-
sions because data packets travel only in 15. Where is data stored in a client-server net-
one direction work?
C. In a ring network there are no colli- A. In the cloud
sions because data packets travel on dif-
ferent cables B. On each PC
D. none of above C. In the switch
10. which refers to a p2p D. Centrally
A. all clients are equal but some are more
16. What does the ‘thickness’ of a client refer
equal than others
to?
B. none of the clients are equal
A. How clever the client is
C. all the clients are equal
D. none of above B. The size of the cables
C. The level of processing and storage
11. php is a language that runs on
A. Client D. The depth of the computer case
B. Server 17. What is meant by a data packet?
C. kα i fα two
A. A unit of data that travels along a net-
D. none of above work
12. http://www .bbc.co.uk/index.htmlWhat B. The number of errors found in data
part of the URL in red- when it has been transmitted
A. The protocol prefix C. The data a computer needs to connect
B. The domain name to a network
C. The file path D. A connection point in a network that al-
D. The file name lows data to be shared

13. Which scripting language is commonly 18. What does a server store?
used for server-side scripting?
A. Client data
A. PHP
B. JavaScript B. Software and client data

C. Python C. Back up files


D. Ruby D. Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 70

19. What is meant by latency in the perfor- 24. Which is NOT true of JSON?
mance of a network? (6-9)
A. More complicated for a human to read
A. The amount of time data takes to travel
B. More compact code
from the source to the destination
B. The maximum rate that data can be C. Easier for computers to parse
transferred at D. Easier to create
C. The number of errors that are found in
25. Web application is usually an example of
a data packet after transmission

NARAYAN CHANGDER
client-server application. The client appli-
D. The route a packet takes when it is be- cation is
ing transmitted
A. The browser
20. Which is NOT true of the websocket pro-
B. The XAMPP
tocol?
C. The Apache
A. Provides a persistent, bi-directional
real-time communication channel be- D. The MySQL
tween client and server
26. This is a krunker.io multiplayer URL.
B. Is an example of a modern API used
Which part of the URL shows the server
for communication
we are playing on. “krunker.io/?
C. Typical uses are online gaming and in- game=SYD:h12zs”
stant messaging
A. game
D. Increases data usage
B. SYD (for sydney)
21. Which transmission media is capable of
C. h12zs
having a much bigger bandwidth?
A. Coaxial D. krunker.io

B. Twisted pair cable 27. Which of these is not a benefit to cloud


C. Plastic computing?
D. Fibre optoc A. Saves storage space on your PC
22. A is any computer connected to a net- B. Gives you access to files from any com-
work. puter
A. desktop C. Protects your files from being lost due
to PC failure
B. host
C. server D. Completely protects your information
from cloud hackers
D. client
28. Which of the following languages is used
23. When does the server wait for a request
for client-side scripting on the web?
from one of the clients?
A. Never A. HTML
B. Sometimes (Every hour) B. Javascript
C. Quite often (Every 30 minutes) C. PHP
D. Always D. VBA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 71

29. What does CRUD stand for? C. identical


A. create, retrieve, update, delete D. none of above

PRACTICE BOOK» NOT FOR SALE


B. capture, repeat, update, delete
35. Where are you most likely to find a peer-
C. create, return, undo, decide to-per network?
D. condition, release, upscale, document A. In a large organisation
30. Which one of these items is not an advan- B. In a home
tage of a client-server network?
C. In a large office
A. No central point of failure
D. Across several offices in a company
B. Central control of security
C. Easier to supervise network perfor- 36. To put files from your local computer onto
mance a remote server or public web host.

D. Easier to perform software upgrades A. hosting plan


B. search engine optimization
31. What are the advantages of a peer to peer
network? C. upload
A. More stylish D. FTP
B. Relatively cheap, low maintenance
37. Which is a disadvantage of a peer to peer
C. Faster network?
D. More effective A. Central management is more difficult
32. In what scenario would client-side script- B. Peer to peer networks are expensive
ing be preferred over server-side script- C. No central management, can be slow
ing?
D. Peer to peer networks are difficult to
A. Form validation
maintain
B. User authentication
38. Which of these terms refers to the max-
C. Database query
imum rate at which data can be trans-
D. Server load balancing ferred?
33. In web applications HTML pages are A. Error detection
stored in B. Packet switching
A. Client computer
C. Bandwidth
B. Server computer
D. Transmission media
C. Third party computer between Client
and Server 39. JavaScript is a scripting language that runs
D. Parts in client, parts in server on
A. Client
34. ll devices on a p2p network have an
status B. Server
A. equal C. kα i fα two
B. unequal D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 72

40. is an HTTP method that deletes data 45. DOM stands for?
from the server. A. Document Object Model
A. GET B. Digital Object Model
B. POST C. Document Outlay Model
C. PUT D. none of above
D. DELETE 46. Which one of these items is true of a peer-
to-peer network?

NARAYAN CHANGDER
41. The advantages of a client-server network
include: A. No network wide security in place
A. security is created, managed and en- B. Central control of security
forced C. Has a central point of failure
B. backup of data is centralised D. Easier to perform network wide back-
ups
C. many computers have access to cen-
tralised resources 47. Which device performs the function of de-
D. All options termining the path that massages should
take through internetwork?
42. Which of the following is not a type of A. A router
server?
B. A firewall
A. File Server
C. A web server
B. Email Server
D. A DSL Modem
C. Webpage Server
48. Which email protocol allows an email client
D. PowerPoint Server to download email messages to the local
computer?
43. In a client-server network:
A. IMAP4
A. there can only be one server
B. SMTP
B. there is one “client” and many
“servers” which provide printing, file stor- C. TCP
age and Internet access. D. POP3
C. there may be hundreds of clients 49. Which scripting language is commonly
D. All files and software are held by the used for client-side scripting?
server. A. PHP

44. HTML can be used to create ‘static’ web B. JavaScript


pages. For a client-server application, the C. Python
web page is ‘dynamic’ thanks to D. Ruby
A. CSS
50. https://mail.google .com/mail/index.htmlWhich
B. Javascript part of the URL is in red?
C. PHP A. The domain suffix
D. Javascript and PHP B. The protocol prefix

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 73

C. The domain name A. True


D. The file path B. False

PRACTICE BOOK» NOT FOR SALE


51. Peer-to-peer networks: C. None of the Above
A. can only be used by up to ten people D. none of above
B. are less vulnerable to viruses than
standalone computers 55. How do you display a message in PHP?

C. are a type of client-server network A. Echo (”Hello”)


D. are sometimes used for illegal file B. print (”Hello”)
sharing of copyright material such as mu- C. msgbox (”Hello”)
sic and films
D. alert (”Hello”)
52. What are an advantages of a client-server
network? (tick all that apply) 56. Question 4:Which of these statements is
A. Data can be backed up centrally. true?
B. Users can log in from any computer on A. A client-server network has a central
the network computer that provides services to the
rest of the network
C. Data can be held and organised cen-
trally. B. A client-server network is cheap and
D. Cheap to setup easy to set up

E. Requires little administration C. A client-server network cannot be


used to share files
53. The HTTP status code with the format 1xx
D. Each computer on a client-server net-
is an
work is maintain separately
A. Informational response that means
the request was received or being pro- 57. Which of these components is internal to
cess. a computer and is required to connect the
B. Success response that means the re- computer to a network?
quest was successfully received, under- A. Wireless Access Point
stood and accepted.
B. Network Interface card
C. Redirect response that means further
action must be taken or the request needs C. Switch
a redirect.
D. Hub
D. Client error response that means the
server does not have what the request 58. The card or port where the network cable
needs. is connected is known as
E. Server error response that means the A. network interface card (NIC).
server failed to fulfill an apparent valid re-
quest. B. DNS
C. DHCP
54. True or False:Client Server Networks have
different clients on the server. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 74

59. Why is a client reliant on a server? B. A protocol that state the error check-
A. The client might might get abducted ing that will be used in communication
without the server C. A database query
B. The server prevents the client from D. A protocol that splits data up in to pack-
breaking down ets and then reassembles it
C. Client retrieves saved data and soft- 64. choose 2:on a client server it is easier to
ware from the server

NARAYAN CHANGDER
D. The clients does not power on without A. manage backups
the server
B. manage security files
60. Which of the following is a disadvantage C. to set up
of a peer to peer network?
D. use as it does not need specialist staff
A. Files and folders cannot be centrally
backed up. 65. What is a client server managed by?
B. Does not need an expensive server A. Computer
as individual workstations are used to ac- B. Server
cess files. C. Motherboard
C. The server is expensive to purchase D. Microwave
D. Files are stored in a centralised loca-
tion, meaning it is easier to backup. 66. Fill in the missing gap:Peer-to-Peer Net-
works is an that splits tasks between
61. is a remote computer which provides infor- pairs.
mation (data) or access to particular ser- A. Program
vices.
B. Application
A. Client
C. Programme
B. Host
D. AI
C. Server
67. With a peer-to-peer model files are saved
D. none of above to
62. What is the function of the DNS server? A. To a file server
A. It maps the IP address to MAC address B. The hard disk of the workstation
B. It translates a computer domain name C. The cloud
to the associated IP address D. none of above
C. It manages the domain that clients are
68. Which is not true in a client-server net-
assigned to
work?
D. It accepts HTTP requests from clients
A. A server manages access to the inter-
and server
net
63. What is an API? B. A client makes requests to the server
A. A set of protocols which define how for data and connections
two applications interact with each other C. A server runs a backup of data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 75

D. Each peer is responsible for its own 73. What is a disadvantage of a LAN?
backup A. Site (software) licences are likely to be

PRACTICE BOOK» NOT FOR SALE


cheaper than buying several standalone li-
69. Spot the Error:Advantages of a Peer-to-
cences.
Peer Network are:-All computers have
an equal status.-Each device acts as a B. Security is good-users cannot see
client and a server.-Additional hardware other users’ files unlike on stand-alone
is needed.-All devices request and provide machines.
network services. C. if the main cable fails or gets damaged
A. The question is wrong! the whole network will fail
B. ADVANTAGE 1 is wrong! D. Purchasing the network cabling and
file servers can be expensive.
C. ADVANTAGE 2 is wrong!
D. ADVANTAGE 3 is wrong! 74. Which of the following languages is used
for server side scripting on the web?
E. ADVANTAGE 4 is wrong!
A. HTML
70. Which is an advantage of client-server net- B. Javascript
works?
C. PHP
A. Files/Internet connection/hardware D. VBA
can be shared
B. The network never stops functioning 75. Which of these is a characteristic of a
LAN?
C. The network is always fast and reliable
A. It covers a wide geographical area
D. A client’s data is backed up every
B. Computers are connected together us-
minute
ing a leased line or a satellite
71. What are the roles of the server? (tick all C. Users can share files and peripherals
that apply). D. Data can only be transmitted at a very
A. Waits for a request from the client. slow rate
B. Acknowledges a request from the 76. What does a client server store?
client.
A. Passwords
C. Requested data is sent back to the
B. Personal data
client.
C. Access information
D. Waits for a reply
D. Images
E. Sends a reply
77. What is the process of using third party
72. What is the server in a Client Server Net- servers to store data and run online appli-
work? cations?
A. A phone, tablet, computer A. Data Center Processing
B. A File Server B. Cloud Computing
C. A Box C. Networking
D. A hub/router D. Internet Usage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 76

78. Most web applications nowadays are ex- 83. Which is not an advantage of the client-
ample of client-server application that in- server model?
corporates a database such as MySQL.
A. Easier to manage security of files
This database is usually stored in
A. Client computer B. Easier to take backups of all shared
data
B. Server computer
C. Third party computer between Client C. Easier to install software updates to
and Server all computers

NARAYAN CHANGDER
D. Parts in client, parts in server D. Offers a single point of failure

79. Which of these are functions that servers 84. How does client-side scripting differ from
can perform? server-side scripting?
A. Controls the level of user access to
A. Execution location
files and software
B. Controls installation of software on the B. Programming language
client computers C. Execution speed
C. Controls access to network printers
D. Functionality
and managing print queues
D. Controls client computer access to the 85. Who would you use to make your website
Internet accessible to everyone on the WWW?
E. All of the above
A. Web server
80. Which of the following is not a type of
B. Web host
server?
A. File Server C. URL
B. Email Server D. none of above
C. Webpage Server
86. To make a computer becomes a web server
D. PowerPoint Server this software could be installed
81. the service providers A. Apache
A. Client
B. Javascript
B. Servers
C. PHP
C. Host
D. none of above D. Visual Basic

82. Which of the following is an example 87. is the provider of a resource or a ser-
of what is usually done using client-side vice.
scripting?
A. desktop
A. Accessing web databases
B. host
B. Simple validation of user input
C. Create stylesheet files using PHP C. server
D. Complex calculations D. client

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 77

88. In the client-server model devices are con- C. Many users, separated by large dis-
nected to the server via a central.. tances, can run a program or application
at the same time

PRACTICE BOOK» NOT FOR SALE


A. Server
B. Cable D. The cloud stores user data but not soft-
ware
C. Laptop
D. Switch/hub 93. URL stand for?
A. UNION RESOURCE LOCATOR
89. Spot the error:Advantages of a Client
Server Network are:-Relies on a central B. UNIFORM RESOURCE LOCATOR
server.-Clients don’t need to request ser-
C. UNIDENTIFIED RESOURCE LOCATION
vices from the server.-Additional hard-
ware is needed. D. none of above
A. The question is wrong!
94. Choose one reason why a developer might
B. ADVANTAGE 1 is wrong! use client-side scripting
C. ADVANTAGE 2 is wrong! A. It’s easier to write for a client
D. ADVANTAGE 3 is wrong! B. So the client can access the database
E. The answers are wrong! C. It allows some of the processing to be
done by the user’s machine
90. Which of these is NOT an advantage of net-
works? D. The client computer is more powerful
than the server
A. Sharing peripheral devices such as
printers and scanners
95. Which best describes a peer to peer net-
B. Possible to communicate globally work?
C. Can protect against viruses A. To peers connected together
D. PCs can be backed up and updated by B. Devices connected together-without a
one central PC server
91. is an HTTP method that updates data C. To piers connected together
already on the server. D. Two devices connected together-
A. GET without a client
B. POST
96. Which is NOT an advantage of a thin-
C. PUT client?
D. DELETE A. Easy and cheap to set up new clients
92. Which of the following is true of cloud com- B. Hardware and software changes only
puting? need to be implemented on the server
A. The network server is located on a C. Greater security as clients have fewer
satellite orbiting the earth rights
B. CLOUD stands for Connected Links On D. May require greater bandwidth to
Unlimited Devices cope with client requests

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 78

97. Which one of these items is true of a client- 102. What is cloud storage?
server network?
A. Storing data on the server of another
A. Needs a network manager to run the company, accessible through the Internet
network
B. Storage accessible anywhere with an
B. No centralised management internet connection
C. All computers have equal status C. Running programs on a remote server,
D. No dependency on a server accessible with an Internet connection

NARAYAN CHANGDER
D. All of the above
98. In cloud computing:
A. Software and applications are com- 103. How does a hub differ from a switch?
monly accessible via a web browser on A. A switch sends data packets to all
any computer devices on the network, whereas a hub
B. A single network server runs the cloud sends the packets to only the intended re-
services cipients

C. Users have access to unlimited free B. A hub sends data packets to all devices
storage of data on the network whereas a switch allows
the network to connect to the internet
D. There is no danger of sensitive data be-
ing hacked C. A hub sends data packets to all devices
on the network whereas a switch sends
99. In PHP assigning value to a variable may the packets to only the intended recipients
look like this:
A. $ myname = “Vanness” D. none of above
B. myname = “Vanness”
104. is an HTTP method that retrieves
C. $myname = “Vanness” data from the server.
D. var myname = “Vanness” A. GET

100. http://www.bigserver.co.uk/public/ B. POST


about.htmlWhat part of the URL in red C. PUT
the-
D. DELETE
A. The file path
105. Which of the following is a disadvantage
B. The domain name
of a client-server network?
C. The protocol prefix
A. Files and folders cannot be centrally
D. The file name backed up.
101. is the service or resource requester B. Does not need an expensive server
as individual workstations are used to ac-
A. desktop cess files.
B. host C. The server is expensive to purchase
C. server
D. Files are stored in a centralised loca-
D. client tion, meaning it is easier to backup.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 79

106. What is Representational State Transfer 111. True or False:Peer-to-Peer Networks


(REST) used for? need hardware
A. True

PRACTICE BOOK» NOT FOR SALE


A. AN API that enables CRUD to be
mapped to SQL functions B. False
B. A protocol for addressing data packets C. None of the Above
C. A protocol that allows files to be up- D. none of above
loaded to a server
112. A peer-to-peer network:
D. A security method
A. usually links just two computers
107. Which of these is an example of a modern B. allows computers on the network to ex-
API used for communication? change files with each other
A. Websocket protocol C. is often used by people working in a
large organisation
B. TCP/IP
D. is not vulnerable to hacking
C. JSON
D. HTTP 113. is an HTTP method that submits data
to the server.
108. Which of these is a benefit of a peer-to- A. GET
peer network? B. POST
A. Antivirus scans can be run across all C. PUT
computers from one computer
D. DELETE
B. All software updates can be run across
all computers from one computer 114. Which server has the role of hosting and
matching web addresses to IP addresses?
C. All computers can be maintained from
one computer A. A web server

D. Files and peripherals can be shared B. An applications server


C. A name server
109. Laptops, PCs/workstations, tablets, D. none of above
printers, smartphones, games consoles
and smart TVs are Examples of 115. What do Peer-to-Peer Networks form?
A. NIC A. Nodes
B. Network device B. Phones
C. End devices C. Networks
D. Servers
D. none of above
116. What is JSON or XML used for?
110. Which hardware component allows a PC
or a laptop to connect to a network? A. Standard methods for transferring
data between a server and an application
A. A router
B. For uploading files to a server
B. A network interface card (NIC)
C. Requesting a webpage
C. A modem D. Enables CRUD to be mapped to data
D. none of above SQL functions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 CLIENT-SERVER PARADIGM 80

117. https://mail.google .com/mail/index.htmlWhat


123. What is not a benefit of networking?
part of the URL in red- A. Share hardware
A. The domain suffix B. Share software
B. The protocol prefix C. Share viruses
C. The domain name D. Share workstations
D. The path
124. What is a standalone computer?

NARAYAN CHANGDER
118. Cloud computing is used for: A. A computer that is not connected to a
A. social networking network
B. online data storage B. A computer that is being used as a
server
C. online data storage
C. A computer that does not have any pe-
D. All options
ripherals attached to it
119. is a computer ( Host ) i.e. capable of re- D. A computer that is used by only one
ceiving information person
A. Client
125. What is the main difference between
B. Host client-side and server-side scripting?
C. Server A. Execution on the client
D. none of above B. Execution on the server
120. Which best describes a client? C. Language used

A. A computer connected to a client- D. Execution on both client and server


server network 126. What is one of the roles of the client?
B. Something that serves the server A. Sends a request to the server.
C. A client belongs to the server B. Waits for a request
D. Something that is connected to the C. Sends data back to the client
main computer
D. Acknowledges requests
121. The CRUD operation ‘Retrieve’ would
127. Which network topology would you typi-
map to which SQL database function?
cally find in most homes?
A. SELECT
A. Star
B. INSERT
B. Bus
C. UPDATE
C. Mesh
D. DELETE
D. WiFi
122. what does p2p stand for 128. When would you use a LAN?
A. peer two peer A. Whilst writing an essay.
B. point 2 point B. When sending emails in your home.
C. pear too pear C. When sending emails from England to
D. peer to peer Australia.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 CLIENT-SERVER APPLICATIONS 81

D. When buying your weekly shop at B. Water Area Network


Sainsbury’s.
C. World Area Network

PRACTICE BOOK» NOT FOR SALE


129. What does WAN stand for?
A. Wide Area Network D. Win And No

2.3 CLIENT-SERVER APPLICATIONS


1. Which Internet Explorer zone is the least A. Make sure all systems are Windows 7
secure? or later
A. Internet zone B. Install Applocker
B. local intranet zone C. Set a security baseline
C. trusted sites zone D. Install Windows Defender
D. restricted sites zone 6. Bob needs to restrict the websites the em-
ployee can go to. What are some of her
2. A tool(s) to detect and protect against ma- options?
licious email is/are
A. Applocker
A. Bayesian filter
B. Setup Content Zones
B. Sender Policy Framework
C. Windows Firewall
C. UAC
D. Bayesian Filter
D. MBSA
7. What is the most common way people’s
3. You want to make your computer resistant computers get infected by a virus?
to online hackers and malicious software.
A. Receive a call
What should you do?
B. Install a new hardware
A. Configure a forward proxy
C. Download email attachments
B. Install anti-virus software
D. None of these
C. Enable spam filtering
D. Turn on Windows Firewall 8. You need to install a domain controller in
a branch office. You also need to secure
4. What the common way used to define how theinformation on the domain controller.
long a password is in Windows? You will be unable to physically secure the
server. Which should you implement?
A. registry
A. Read-Only Domain Controller
B. Users applet in the Control Panel
B. Point-to-Point Tunneling Protocol
C. group policies
(PPTP)
D. NTFS files C. Layer 2 Tunneling Protocol (L2TP)
5. Donna wants to implement User Access D. Server Core Domain Controller
Control (UAC) across his Microsoft Win-
dows network. What does she need to do 9. How is adware malicious?
to accomplish this? A. Deletes files.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 CLIENT-SERVER APPLICATIONS 82

B. Inappropriate and wastes your time/ 15. Phishing is an attempt to:


C. Slows your pc down. A. Obtain information by posing as a
D. Spies on you, collecting your informa- trustworthy entity.
tion B. Limit access to e-mail systems by au-
thorized users.
10. The purpose of User Account Control (UAC)
is to: C. Steal data through the use of network
intrusion.
A. Encrypt the user’s account

NARAYAN CHANGDER
D. Corrupt e-mail databases through the
B. Limit the privileges of software
use of viruses.
C. Secure your data from corruption
D. Facilitate Internet filtering 16. You suspect a user’s computer is infected
by a virus.What actions should you take?
11. What is spyware?
A. Restart the computer in safe mode
A. Causes adverts to appear on screen.
B. Replace the computer’s hard disk drive
B. Software that deletes your files
C. Disconnect the computer from the net-
C. Slows your pc down. work in connected to business network
D. Collects information from you and D. Run an on demand antivirus scan of all
transfers it across the internet. files
12. Why would a company use Windows 17. How does the sender policy framework
Server Update Services (WSUS) sever? (SPF) aim to reduce spoofed email?
Choose the best two answers
A. It provides a list of IP address ranges
A. to test updates before installing them
for particular domains so senders can be
B. update workstations and servers verified.
C. manage costs B. It includes an XML policy file with each
D. keep all systems with all the same email that confirms the validity of the mes-
patches sage.
C. It lists servers that may legitimately
13. Why is a trojan horse sneaky?
forward mail for a particular domain.
A. It is very inviting
D. It provides an encryption key so that
B. It creeps into your computer authenticity of an email message can be
C. It looks legitimate but really it isn’t validated
D. Because of the romans
18. What does implementing Windows Server
14. Which technology enables you to filter Update Services (WSUS) allow a company
communications between a program and to manage?
the Internet? A. Shared private encryption key updates
A. RADIUS server B. Updates to Group Policy Objects
B. Antivirus software C. Active Directory server replication
C. Software firewall D. Windows updates for workstations
D. BitLocker To Go and servers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 CLIENT-SERVER APPLICATIONS 83

19. How can a trojan infect your pc? 24. Physically securing servers prevents:
A. On memory sticks. A. Theft

PRACTICE BOOK» NOT FOR SALE


B. Through email attachments. B. Compromise of the certificate chain
C. By being disguised as legitimate soft- C. Man-in-the middle attacks
ware.
D. Denial of Service attacks
D. Dodgy web links
25. What are two attributes that an email
20. How does a computer virus infect a pc? message may contain that should cause a
A. Email attachments user to question whether the message is a
B. Attached to files on memory sticks phishing attempt?

C. Suspicious web links A. An image contained in the message +


s pelling and grammar errors
D. All of the above
B. Threats of losing service + Use of bold
21. The purpose of Microsoft Baseline Security and italics
Analyzer is to: C. Spelling and grammar errors +
A. List system vulnerabilities. Threats of losing service
B. Apply all current patches to a server. D. Use of bold and italics + An image con-
C. Set permissions to a default level. tained in the message
D. Correct a company’s security state 26. Keeping a server updated:
22. Evaluate the statement pick the correct an- A. Maximizes network efficiency
swer for the underlined phrase.A mail sys- B. Fixes security holes
tem administrator scans for viruses in in-
coming emails to increase the speed of mail C. Speeds up folder access
processing. D. Synchronizes the server
A. Decrease the chances of a virus get- 27. Evaluate the statement pick the correct an-
ting to a client machine swer for the underlined phrase.The Win-
B. Verify that the senders of the mes- dows Firewall protects computers from
sages are legitimate unauthorized network connections.
C. Ensure that all links in the messages A. Email viruses
are trustworthy B. Phishing scams
D. No change is needed.
C. Unencrypted network access
23. Evaluate the statement pick the correct an- D. No change is needed
swer for the underlined phrase. A user
who receives a large number of emails sell- 28. Which two security settings can be con-
ing prescription medicine is probably re- trolled by using group policy? (Choose
ceiving pharming mail . two.)
A. Malware A. Password complexity
B. Spoofed mail B. Access to the Run As command
C. Spam C. Automatic file locking
D. No Change is Needed D. Encrypted access from a smart phone

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 PEER-TO-PEER PARADIGM 84

29. Windows Server Update Services (WSUS) A. Open email attachments if they look in-
is a tool that: teresting
A. Updates data stored in Windows B. Use up-to-date anti-virus software and
servers always download the latest definitions
B. Manages the services that run on a C. Only download files from reputable in-
server ternet sites
C. Updates licensing for Windows D. None of these
servers

NARAYAN CHANGDER
D. Manages updates for Microsoft soft- 32. What is the primary advantage of using
ware Active Directory Integrated Zones?
A. Zone encryption
30. Lisa is trying to get rid of a virus that has
invaded their network. It seems to keep B. Password protection
changing making it difficult to detect. Lisa C. Non-repudiation
is facing what type of malware?
D. Secure replication
A. polymorphic virus
B. cookie 33. What is an example of non-propagating
malicious code?
C. retro virus
A. A back door
D. spyware
B. A hoax
31. Which of the following is BAD advice for
protecting your computer against infec- C. A Trojan horse
tion? D. A worm

2.4 PEER-TO-PEER PARADIGM


1. What is meant by CAT on a UTP / STP type A. Centralized / structured
cable? B. De-centralized / structured
A. Cat C. Centralized / unstructured
B. Category D. De-centralized / unstructured
C. Caterpillar
4. Which of the following accounts cannot be
D. Catering
linked to most P2P apps or services?
2. Which of the following features is not im- A. Credit card
portant when comparing P2P apps and ser-
B. Checking account
vices?
C. Debit card
A. Users
D. Certificate of deposit
B. Safety and privacy
C. Fees 5. IP 129.12.25.25 is class IP
D. Data plan rates A. A

3. Which of the following best describes the B. B


Bitcoin structure? C. C

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 PEER-TO-PEER PARADIGM 85

D. D 11. Most P2P apps or services can be linked


to checking accounts, debit cards or
6. The largest P2P networks are these types

PRACTICE BOOK» NOT FOR SALE


A. certificate of deposits
A. Botnets
B. IRC B. money market accounts

C. Torrent sites C. credit cards


D. Open Source program shares D. stocks and bonds

7. Peer to peer is a series connection be- 12. Which of the following policies used by
tween PC to PC or PC to Switch without BitTorrent is used to replace peers with
involving a computer faster download peers and also to give
A. workstation new peers who have no pieces to share
the option to download?
B. client
C. waiter A. Optimistic Unchoking

D. extra B. Strict Priority


C. Anti-snubbing
8. Which of the following types of P2P sys-
tems distinguish between superpeers and D. Upload Only
normal peers assigned to a superpeer, so
that the superpeer stores what content 13. I am satisfied with the way of teaching
each of its assigned peers has? and learning (PNP) delivered by Mr. Mohd
A. Structured P2P system Effendy and I scored as much as

B. Unstructured P2P system, centralized A. 100%


model B. A hundred percent
C. Unstructured P2P system, decentral- C. Hundred Percent
ized model
D. Full Marks
D. Unstructured P2P system, hierarchical
model 14. Which of the following is a PUBLIC IP
9. What is one of the hardest problems for type?
P2P networks to solve? A. 10.1.1.100
A. File addressing B. 172.16.8.200
B. Name resolution C. 192.166.10.1
C. Access logging
D. 10.100.10.1
D. File sharing
15. Which of the following best describes the
10. This P2P network is an IP telephony ser-
Napster structure?
vice
A. Skype A. Centralized / structured

B. Bonjour B. De-centralized / structured


C. IRC C. Centralized / unstructured
D. Gnutella D. De-centralized / unstructured

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 PEER-TO-PEER PARADIGM 86

16. Which of the following techniques to con- 21. When comparing P2P apps, it’s important
trol flooding in Gnutella involves starting to pay attention to fees, safety and pri-
with a low TTL and increasing it until the vacy and
searched content is found? A. how many businesses accept the app
A. Random walk
B. which of your friends and family mem-
B. Multiple-walker random walk bers use it
C. State keeping C. Brand name recognition

NARAYAN CHANGDER
D. Expanding ring D. Logo design and colors
17. Which was the 1st large-scale file sharing 22. Another term for unstructured networks is
P2P network?
A. Centralized
A. Gnutella
B. Ad hoc
B. BitTorrent
C. Chaotic
C. Napster
D. Nebula
D. PirateBay
23. Which of the following statements regard-
18. Which of the following best describes the
ing the Kademlia P2P system is false?
BitTorrent structure?
A. If we use 160-bit keys, each node will
A. Centralized / structured
store 160 k-buckets
B. De-centralized / structured
B. The distance between keys is calcu-
C. Centralized / unstructured lated using a bitwise XOR
D. De-centralized / unstructured C. Each key/value pair is stored only in
the node with the closest ID to the key
19. What does the time-to-live (TTL) param-
eter that Gnutella assigns to each search D. Each k-bucket i of node P contains up
message indicate? to k nodes that are at distance [2i, 2i+1)
A. The validity time of the message from P

B. The number of neighboring nodes to 24. Which of the following policies used by Bit-
which the message will be forwarded Torrent is to request all missing sub-pieces
C. The maximum number of nodes that to complete a download from all peers that
can receive the message have them?
D. The maximum number of times the A. Rarest Piece First
message can be forwarded B. End Game Mode
20. Which of these statements is correct when C. Strict Priority
referring to P2P networks? D. Random First Piece
A. All devices are equal
25. What is the Random walk technique to con-
B. There is one central device trol flooding in Gnutella?
C. All devices are equal but some are A. Limit to one the number of neighboring
more equal than others nodes to which each Query message is for-
D. none of above warded

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 PEER-TO-PEER PARADIGM 87

B. Increasing the maximum number of A. The node would locally save the
times a Query message can be forwarded key/value pair passed as a parameter
until the searched content is found

PRACTICE BOOK» NOT FOR SALE


B. If the node has saved the passed key
C. Limit the maximum number of times a as a parameter, it would return the associ-
Query message can be forwarded ated value, otherwise it would return the
k nodes with ID closest to the key that it
D. Save recently sent Query messages to
is aware of
avoid resending the same message to the
same node C. The node would return the k nodes
with ID closest to the key passed as a pa-
26. Which of the following RPCs would be in- rameter that it is aware of, in any case
voked in a Kademlia P2P system when a
D. The node would return the value asso-
user wants to insert a key/value pair?
ciated with the key passed as a parameter,
A. STORE in either case
B. FIND NODE
31. This P2P uses either TCP or UDP on port
C. FIND NODE + STORE 6346
D. FIND VALUE A. Gnutella

27. Which P2P network is also known as Ap- B. Napster


ple’s “zero-configuration networking”? C. Skype
A. Bonjour D. Bitcoin
B. Gnutella 32. Connecting a PC to a switch requires a
C. Napster type cable, while a PC to PC cable requires
a type cable.
D. GrannySmyth
A. straight, crossover
28. What is the main function of a peer to peer B. crossover, straight
connection?
C. straight, straight
A. control users
D. crossover, crossover
B. file sharing
C. security 33. Which of the following policies used by Bit-
Torrent serves to minimize the number of
D. centralized network incomplete pieces and therefore maximize
the number of pieces we have to share?
29. One of the advantages of peer to peer net-
works is A. Rarest Piece First
A. low cost B. Strict Priority
B. need a server C. Random First Piece
C. network security D. End Game Mode
D. user control 34. What’s the purpose of the Bitcoin net-
work?
30. What would be the behavior of a Kadem-
lia P2P system node if it receives an RPC A. p2p money transfer
FIND VALUE invocation? B. p2p private communication

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 PEER-TO-PEER PARADIGM 88

C. p2p Skype calling by double-checking the recipient’s informa-


D. p2p cryptokitties tion before sending and
A. by typing in the recipient’s information
35. What is the appropriate command if a user by hand
wants to test connectivity to IP address
B. by asking the recipient to send you a
10.10.10.10
payment request first
A. ipconfig 10.10.10.10
C. by contacting the recipient beforehand
B. tracert 10.10.10.10 to tell them you’re sending money

NARAYAN CHANGDER
C. ping 10.10.10.10 D. by texting the recipient to make sure
D. netsh 10.10.10.10 they received the money
40. Botnets are created to
36. How can you get your money back if you
send a P2P payment to the wrong per- A. file share
son? B. DDos
A. Contact a credit bureau C. Spam
B. Contact your P2P app or service and D. identity theft
request to stop the payment E. banking fraud
C. Try to contact the person you sent the
payment to 41. Which of the following policies used by Bit-
Torrent consists of sending pieces to the
D. Contact the police peers with the best upload speed?
37. Which of the following policies used by Bit- A. Optimistic Unchoking
Torrent is to not send chunks to a peer B. Unchoking
when more than a minute has passed with- C. Anti-snubbing
out receiving a chunk from it?
D. Upload Only
A. Optimistic Unchoking
B. Rarest Piece First 42. Which of the following safety and privacy
features is not included in a P2P app or
C. Anti-snubbing service?
D. Upload Only A. Representative call for confirmation of
payments over $100
38. Which of the following policies used by Bit-
Torrent is to download the pieces that are B. Verification of payment amount before
least common among peers first? sending
A. Rarest Piece First C. Opt-out of data sharing

B. Strict Priority D. A user PIN

C. Random First Piece 43. What is the name of the capital of Pa-
hang?
D. End Game Mode
A. Week
39. You can protect yourself against sending B. Kuantan
a P2P payment to the wrong person by
using an app or service that asks you C. Bentong
to confirm the payment before it is sent, D. Mersing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 PEER-TO-PEER PARADIGM 89

44. This application-based P2P operates exclu- A. PNRP


sively on TCP ports 6660-6669
B. AARP

PRACTICE BOOK» NOT FOR SALE


A. Bitcoin
C. MSRP
B. Skype
D. MSNP
C. Napster
D. IRC 49. By 2004 25% of all internet traffic was
A. BitTorrent
45. The peer to peer network between PC to
PC is limited to the number of PCs of B. Napster
only. C. Bitcoin
A. 1
D. Botnet
B. 2
C. 3 50. The computer is divided into 2 parts viz

D. 4 A. Hardware and Operating Systems


B. Software and Operating System
46. Which of the following ways is not some-
thing you can do to protect yourself C. Hardware and Software
against sending payment to the wrong per- D. Hardware and Applications
son when using a P2P payment app or ser-
vice? 51. This P2P operates on ports 7777 and
A. Double-check the recipient’s email or 8888:
phone number before sending the pay- A. Bonjour
ment
B. Gnutella
B. There is no way to protect yourself
against sending payment to the wrong C. Skype
person when using a P2P app or service D. Napster
C. Ask the recipient to send you a pay-
ment request 52. Which port block would you expect bot-
nets to work in?
D. Use a P2P payment app or service that
asks you to confirm the payment before it A. 0-1023
is sent B. 1024-49, 151
47. Which of the following policies used by Bit- C. 49, 152-65, 535
Torrent applies only at the beginning of a
D. Ports > 65, 536
download?
A. Rarest Piece First 53. Which of the following is an OUTPUT de-
B. Strict Priority vice?

C. Random First Piece A. Keyboard


D. End Game Mode B. Mouse
C. Projector
48. The Microsoft P2P identification solution
is called D. Hard disk

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.5 SOCKET INTERFACE PROGRAMMING 90

54. A peer C in a P2P BitTorrent system is C. Spotify


downloading a file containing four blocks D. IRC
(block 0, , block 3). Peer C is connected
with three other peers A, B, D that down- 57. What is the maximum data transmission
load the same file. Peer A currently has speed for CAT5e cable?
blocks (0, 3); peer B has blocks (0, 1); and A. 10 Mbps
peer D has blocks (2, 3). If peer C has al-
ready downloaded block 2, what will be B. 100 Mbps
the next block it will download?

NARAYAN CHANGDER
C. 1 Gbps
A. Bloc 0 D. 10 Gbps
B. Bloc 1 58. This P2P network provides security
C. Bloc 2 through Block Chain technology
D. Bloc 3 A. Bitcoin
B. Gnutella
55. Given a P2P Gnutella system consisting of
11 peers organized following a ring topol- C. BitTorrent
ogy, in which each peer has as neighbors D. Napster
its two predecessors and two immediate
successors (that is, 4 neighbors per peer), 59. If a user has 4 PCs, what hardware is
what would be the minimum value of TTL needed to enable a peer to peer network
that ensures that the Query descriptor for to be connected?
a given lookup reaches all peers? A. waiter
A. 1 B. router
B. 2 C. switch
C. 3 D. printer
D. 4 60. IP 10.10.200.225 is IP.
56. The original copyright infringement P2P A. private
network B. public
A. Pirate Bay C. special
B. Napster D. normal

2.5 SOCKET INTERFACE PROGRAMMING


1. UDP sockets are tuple A. TCP connection
A. 1 B. UDP connection
B. 2 C. FTP connection
C. 3 D. HTTP connections
D. 4 3. class is used to create server socket.
2. Stream Socket means it uses A. SocketServer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.5 SOCKET INTERFACE PROGRAMMING 91

B. ServerSocket 9. is the Standard API for Networking


C. Socket A. Sockets

PRACTICE BOOK» NOT FOR SALE


D. socketserver B. Ports
C. PCI
4. Single-thread TCP sockets are used for
D. NIC
A. One server-one client communications
B. One server-multiple client communica- 10. For Creating a Socket, the syntax is
tions A. int sockid = socket(IP number, Port
Number, MAC Address);
C. e-mail distribution
B. int sockid = socket(TCPNo, type,
D. social media
portno);
5. Multi-thread socket programming allows C. int sockid = sockid(family, type, proto-
for col);
A. Servers to connect with multiple D. int sockid = socket(family, type, proto-
clients col);
B. Clients to connect to multiple servers 11. UDP sockets trace lost packets by
simultaneously
A. RequestCheck command
C. Both of these
B. AutoCorrect command
D. Neither of th
C. Verify command
6. is known as passive socket D. Lost packets are not checked in UDP
A. Client Socket 12. The RFC that established socket program-
B. Server Socket ming was:
C. Port Socket A. 147
D. none of the above B. 153
C. 3542
7. A stream is
D. 256
A. A TCP data transport link
13. What can happen if you do not close a
B. A group of socket connections
socket when you finish using it?
C. A group of packets
A. You could be subjected to DoS attack
D. A UDP transport link B. Your computer will be stuck in a loop
8. Client Socket does C. You create a logic error
A. initiates the communication D. You cannot use the port address again
B. must know the address and the port of 14. What must be done before disconnecting a
the server socket?
C. It is an active socket A. Ending the data stream
D. All of the Above B. Telling the server good-bye

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.5 SOCKET INTERFACE PROGRAMMING 92

C. Flushing the cache 20. Multiple port numbers are used on the
client side to define
D. Nothing, you can simply “unplug” with
no ill effects A. Multiple simultaneous server connec-
tions
15. Which of the following are the methods
B. Multiple server connections to differ-
available in ServerSocket class?
ent servers
A. accept() C. Multiple receive sockets

NARAYAN CHANGDER
B. close() D. This just isn’t done
C. OutputStream()
21. The socket model was based on:
D. InputStream()
A. Berkeley Software Distribution
16. What happens if you fail to stop the B. Microsoft architecture
stream before closing the socket?
C. Linux architecture
A. Data loss D. Unix programming model
B. Nothing
22. Sockets are different from ports because
C. Logic error
A. They included IP addresses
D. Socket lockup
B. They are in the Application Layer
17. The client in socket programming must C. They use the OSI model
know D. They are just another term for the
A. IP Address of Server same thing
B. Port number of Server 23. TCP socket programming is:
C. Both A and B A. connection-oriented
D. Neither A nor B B. connectionless

18. Which socket function is responsible for C. dependent on the host operating sys-
freeing up the ports used by the socket? tem
D. dependent on the client operating sys-
A. socket open
tem
B. socket send
24. In UDP sockets, the 2-tuple structure con-
C. socket bind
tains
D. socket close A. Server IP and port number
19. Once a server accepts a TCP socket, it is B. Client IP and port number
handed off to: C. Client and server IP numbers
A. Domain controller D. Client and server port numbers
B. Worker object
25. The correct syntax for receive socket is
C. Dynamic cache
A. int status = recv(sockid, & for-
D. Overflow stack eignAddr, addrlen);

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.5 SOCKET INTERFACE PROGRAMMING 93

B. int count = recv(sockid, recvBuf, bu- A. >256


fLen, flags); B. >1024

PRACTICE BOOK» NOT FOR SALE


C. int count = recv(sockid, msg, msgLen, C. >32K
flags);
D. Any may be used
D. int s = recv(sockid, & clientAddr, & ad-
drLen); 29. When a SERVER uses UDP, what must
the programmer ensure is explicitly iden-
26. This function in socket assocates and re- tified?
serves a port for use by the socket.
A. Client IP address
A. Listen
B. Client port number
B. create
C. Both
C. bind D. None of these
D. connect
30. TCP sockets are tuple
27. The Sequence of Connection exchange for A. 1
Server Socket is
B. 2
A. receive()→send()→close()→socket()→bind()→listen()→accept()
C. 3
D. 4
B. socket()→bind()→listen()→accept()→close()→>receive()→send()
31. Big Endian & Little Endian machines deals
with
C. listen()→accept()→receive()→send()→close()→socket()→bind()
A. Size of Socket
D. socket()→bind()→listen()→accept()→receive()→send()→close()
B. Network Byte Ordering

28. User-defined socket programming occurs C. Network Bit Size


with ports D. Brothers of Endian

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3. Transport Layer

NARAYAN CHANGDER
3.1 Introduction
1. Which protocol or service uses UDP for A. Providing network access
a client-to-server communication and TCP B. Tracking individual conversations
for server-to-server communication?
C. Determining the best path to forward
A. HTTP a packet
B. FTP
D. Translating private IP addresses to
C. DNS public IP addresses
D. SMTP
5. A link has a transmission speed of 106
2. What kind of port must be requested from bits/sec. It uses data packets of size
IANA in order to be used with a specific 1000 bytes each. Assume that the ac-
application? knowledgment has negligible transmission
delay, and that its propagation delay is
A. registered port the same as the data propagation delay.
B. private port Also assume that the processing delays at
C. dynamic port nodes are negligible. The eciency of the
stop-and-wait protocol in this setup is ex-
D. source port actly 25%. The value of the oneway prop-
agation delay (in milliseconds) is
3. The combination of an IP address and a
port number is called a A. 4
A. transport address B. 8
B. network address C. 12
C. socket address D. 16
D. none of the above 6. Address used in Application layer of
4. What is a responsibility of transport layer TCP/IP?
protocols? A. specific

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 95

B. port the threshold at the start of the first trans-


C. logical mission is 8 MSS. Assume that a timeout
occurs during the sixth transmission. Find

PRACTICE BOOK» NOT FOR SALE


D. physical the congestion window size at the end of
the 12th transmission.
7. Data-link and physical layers in OSI are
represented in the TCP/IP as the A. 6
A. Application B. 7
B. Transport C. 8
C. Internet D. 9
D. Host-to-network 12. What does the port number in a TCP con-
nection specify
8. A wireless host needs to request an IP ad-
dress. What protocol would be used to A. it specifies the communication process
process the request? on the two end systems
A. FTP B. it specifies the quality of the data and
connection
B. TCP
C. it specifies the size of data
C. UDP
D. all of these answers
D. DHCP
E. ICMP 13. In the slow start phase of the TCP conges-
tion control algorithm, the size of the con-
9. Although there are several ways to gestion window
achieve process-to-process communica- A. does not increase
tion, the most common is through the
paradigm. B. increases linearly
A. Client-server C. increases quadratically
B. Client-client D. increases exponentially
C. Server-server 14. Who assigns Registered Ports
D. none of the above A. ICANN

10. Select Multiple:Which of the following B. IANA


statements are true about TCP? C. RIPE
A. Its reliable D. IETF
B. Its connection-oriented 15. What is a function of Layer 4 of the OSI
C. Faster than UDP model?
D. Used in applications where data cor- A. to apply framing information to the
rectness and order matters packet, based on the attached media

11. Consider an instance of TCP’s Additive In- B. to describe the ordered delivery of
crease Multiplicative Decrease (AIMD) al- data between source and destination
gorithm where the window size at the C. to specify the packet type to be used
start of the slow start phase is 1 MSS and by the communications

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 96

D. to represent data to the user, including C. 3


encoding and dialog control
D. none of the above
16. User datagram protocol (UDP) is called
connectionless because 20. Which two services or protocols use the
preferred UDP protocol for fast transmis-
A. it sends data as a stream of related
sion and low overhead? (Choose two)
packets
A. FTP
B. it sends data as a stream of related

NARAYAN CHANGDER
packets B. DNS
C. neither of these answers C. HTTP
D. all UDP packets are treated indepen- D. POP3
dently by transport layer
E. VoIP
17. A PC that is communicating with a web
server has a TCP window size of 6, 000 21. Which of the following functionalities must
bytes when sending data and a packet size be implemented by a transport protocol
of 1, 500 bytes. Which byte of informa- over and above the network protocol?
tion will the web server acknowledge af-
A. Recovery from packet losses
ter it has received four packets of data
from the PC? B. Detection of duplicate packets
A. 6001 C. Packet delivery in the correct order
B. 3001 D. End to end connectivity
C. 1501
D. 1500 22. Let the size of congestion window of a TCP
connection be 32 KB when a timeout oc-
18. What is a socket? curs. The round trip time of the connection
is 10 msec and the maximum segment size
A. the combination of the source and des-
used is 1 KB. The time taken (in msec) by
tination IP address and source and desti-
the TCP connection to get back to 32 KB
nation Ethernet address
congestion window is
B. the combination of a source IP ad-
dress and port number or a destination IP A. 200ms
address and port number B. 300ms
C. the combination of the source and des- C. 320ms
tination sequence and acknowledgment
numbers D. 120ms
D. the combination of the source and des-
23. Which protocol is used the most in the
tination sequence numbers and port num-
transport layer
bers
A. UDP
19. To use the services of UDP, we need
socket addresses. B. TCP
A. 4 C. FTP
B. 2 D. PPP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 97

24. What is the value of the receiver window 29. UDP is called a transport protocol.
(rwnd) for host A if the receiver, host B, A. connectionless, reliable
has a buffersize of 5000 bytes and 1000

PRACTICE BOOK» NOT FOR SALE


bytes of received and unprocessed data? B. connection-oriented, unreliable
A. 1000 C. connectionless, unreliable
B. 4000 D. none of the above
C. 5000 30. Consider the following statements regard-
D. 6000 ing the slow start phase of the TCP con-
gestion control algorithm. Note that cwnd
25. An ACK number of 1000 in TCP always stands for the TCP congestion window
means that and MSS denotes the Maximum Segment
Size.The cwnd increase by 2 MSS on every
A. 999 bytes have been successfully re-
successful acknowledgement. The cwnd
ceived
approximately doubles on every success-
B. 1000 bytes have been successfully re- ful acknowledgedment. The cwnd increase
ceived by 1 MSS every round trip time. The cwnd
C. 1001 bytes have been successfully re- approximately doubles every round trip
ceived time. Which one of the following is correct

D. None of the above A. Only (ii) and (iii) are true


B. Only (i) and (iii) are true
26. UDP packets have a fixed-size header of
bytes. C. Only (iv) is true

A. 16 D. Only (i) and (iv) are true

B. 8 31. One of the responsibilities of the transport


C. 40 layer protocol is to create a communi-
cation.
D. none of the above
A. host-to-host
27. Which transport layer feature is used to B. process-to-process
guarantee session establishment?
C. node-to-node
A. UDP ACK flag
D. none of the above
B. TCP 3-way handshake
C. TCP port number 32. What are three responsibilities of the
transport layer? (Choose three.)
D. UDP sequence number
A. Meeting the reliability requirements of
28. Which transport layer feature is used to applications, if any
establish a connection-oriented session? B. Multiplexing multiple communication
A. UDP sequence number streams from many users or applications
on the same network
B. UDP ACK flag
C. Identifying the applications and ser-
C. TCP 3-way handshake
vices on the client and server that should
D. TCP port number handle transmitted data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 98

D. Directing packets towards the destina- 38. deal with the physical aspects of mov-
tion network ing data from one device to another
E. Conducting error detection of the con- A. User Support Layer
tents in frames
B. Link Layer
33. A port address in UDP is bits long
C. Transport Layer
A. 8
D. Network Support Layers
B. 16

NARAYAN CHANGDER
C. 32 39. What does a client do when it has UDP
datagrams to send?
D. none of the above
A. It just sends the datagrams.
34. The acknowledgement number in Selective
Repeat defines the sequence number of the B. It queries the server to see if it is
packet ready to receive data.
A. that is next expected. C. It sends a simplified three-way hand-
B. that is received safe and sound. shake to the server.

C. that is discarded. D. It sends to the server a segment with


the SYN flag set to synchronize the conver-
D. that is received and corrupted.
sation.
35. Transport layer protocols deals with
40. Which flag in the TCP header are used in a
A. application to application communica-
TCP three-way handshake to establish con-
tion
nectivity between two network devices?
B. process to process communication
A. ACK
C. node to node communication
B. FIN
D. man to man communication
C. RST
36. Which of the following does UDP guaran-
tee? D. URG
A. Congestion control 41. Which three application layer protocols
B. connection-oriented delivery use TCP? (Choose three.)
C. flow control A. SMTP
D. none of the above B. FTP
37. What is the purpose of using a source port C. SNMP
number in a TCP communication?
D. HTTP
A. to notify the remote device that the
conversation is over 42. UDP is an acronym for
B. to keep track of multiple conversations A. User Delivery Protocol
between devices
B. User Datagram Procedure
C. to assemble the segments that arrived
out of order C. User Datagram Protocol
D. to inquire for a non-received segment D. none of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 99

43. What is a characteristic of UDP? 48. A connectionless transport layer protocol


A. UDP datagrams take the same path treats each message as

PRACTICE BOOK» NOT FOR SALE


and arrive in the correct order at the des- A. free
tination. B. independent
B. Applications that use UDP are always C. dependent
considered unreliable.
D. combined
C. UDP reassembles the received data-
grams in the order they were received. 49. Which of the following is not a transport
layer service?
D. UDP only passes data to the network
when the destination is ready to receive A. Host to host communication
the data. B. process to process communication
44. A PC is downloading a large file from a C. encapsulation and decapsulation
server. The TCP window is 1000 bytes. D. multiplexing and demultiplexing
The server is sending the file using 100-
byte segments. How many segments will 50. Which two flags in the TCP header are
the server send before it requires an ac- used in a TCP three-way handshake to es-
knowledgment from the PC? tablish connectivity between two network
devices? (Choose two.)
A. 1 segment
A. ACK
B. 10 segments
B. FIN
C. 100 segments
C. PSH
D. 1000 segments
D. SYN
45. Transport layer aggregates data from dif- E. URG
ferent applications into a single stream be-
fore passing it to 51. Suppose two hosts use a TCP connection to
transfer a large file. Which of the follow-
A. network layer
ing statements is/are False with respect
B. data link layer to the TCP connection? 1. If the sequence
C. application layer number of a segment is m, then the se-
quence number of the subsequent segment
D. physical layer
is always m+1.2. If the estimated round
46. Solution to congestion is trip time at any given point of time is t sec,
A. Fast retransmit and recovery the value of the re-transmission timeout is
always set to greater than or equal to t
B. Slow start sec.3. The size of the advertised window
C. Restart transmission never changes during the course of the TCP
D. Time freezing connection.4. The number of unacknowl-
edged bytes at the sender is always less
47. POP3 port number is than or equal to the advertised window
A. 23 A. 3 only
B. 110 B. 1 and 3 only
C. 161 C. 1 and 4 only
D. 80 D. 2 and 4 only

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 100

52. While opening a TCP connection, the initial 56. The source port address on the UDP user
sequence number is to be derived using a datagram header defines
time-of-day(ToD) clock that keeps running A. the sending computer
even when the host is down. The low or-
der 32 bits of the counter of the ToD clock B. the receiving computer
is to be used for the initial sequence num- C. the process running on the sending
bers. The clock counter increments once computer
per millisecond. The maximum packet life- D. none of the above
time is given to be 64s. Which one of the

NARAYAN CHANGDER
choices given below is closest to the min- 57. Which are the different phases in a connec-
imum permissible rate at which sequence tion oriented service?
numbers used for packets of a connection A. Connection estalishment
can increase?
B. Data transfer
A. 0.015/s
C. Connection tear down
B. 0.064/s
D. connection checking
C. 0.135/s
58. What is assigned by the transport layer to
D. 0.327/s
identify an application or service
53. What happens if part of an FTP message A. Segment
is not delivered to the destination? B. Packet
A. The message is lost because FTP does C. Port
not use a reliable delivery method.
D. IP Address
B. The FTP source host sends a query to
the destination host. 59. Flow control can be implemented through
C. The part of the FTP message that was
lost is re-sent. A. Sockets
D. The entire FTP message is re-sent. B. Ports
C. Interfaces
54. Maximum size of TCP header is
D. Buffers
A. 80 bytes
60. In the sending computer, UDP receives a
B. 60 bytes
data unit from the layer.
C. 20 bytes
A. Application
D. 40 bytes B. Transport
55. UDP needs the address to deliver the C. IP
user datagram to the correct application D. none of the above
process.
61. The maximum window size for data trans-
A. . Port
mission using the selective reject protocol
B. Application with n-bit frame sequence numbers is:
C. Internet A. 2n
D. none of the above B. 2(n−1)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 101

C. 2n − 1 67. Socket address is the combination of


D. 2n−2 A. IP address + MAC Address

PRACTICE BOOK» NOT FOR SALE


62. Transport layer protocols deals with B. IP address + Port Number
A. none of the mentioned C. Port number + MAC Address
B. process to process communication D. IP address + MAC Address + Port
C. node to node communication Number
D. application to application communica-
tion 68. What does UDP depend on to move pack-
ets around the network?
63. Which Flag bit in TCP header must be
set when a client initiates a 3-Way Hand- A. Network Connection
shake? B. User
A. RST C. IP
B. ACK
D. Ethernet Cord
C. FIN
D. SYN 69. Which of the following is not a field in TCP
header?
64. Transport layer encapsulates data from dif-
ferent applications before passing it to A. Sequence number
A. Physical layer B. Fragment offset
B. Data link layer C. Checksum
C. Network layer D. Window size
D. MAC sub layer
70. Which protocol provides a connection-
65. Why does HTTP use TCP as the transport oriented reliable service for sending mes-
layer protocol? sages
A. to ensure the fastest possible down- A. IP
load speed
B. because HTTP is a best-effort protocol B. TCP

C. because transmission errors can be C. UDP


tolerated easily D. all of these answers
D. because HTTP requires reliable deliv-
ery 71. Which flag in the TCP header is used in re-
sponse to a received FIN in order to ter-
66. An endpoint of an inter-process communi- minate connectivity between two network
cation flow across a computer network is devices?
called
A. FIN
A. socket
B. pipe B. ACK

C. port C. SYN
D. machine D. RST

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 102

72. Transmission control protocol (TCP) is 76. Which two fields are included in the
A. all of the mentioned TCP header but not in the UDP header?
(Choose two.)
B. uses a three way handshake to estab-
lish a connection A. window
C. receives data from application as a sin- B. checksum
gle stream C. source port
D. connection oriented protocol
D. destination port

NARAYAN CHANGDER
73. Select the correct reponsibility of a trans- E. sequence number
port layer.
A. Identifying frames 77. Which one of the following is a version of
UDP with congestion control?
B. Identifying routing information
C. Segmenting data and reassembling A. datagram congestion control protocol
segments B. stream control transmission protocol
D. none of above C. structured stream transport
74. What important information is added to D. user congestion control protocol
the TCP/IP transport layer header to en-
sure communication and connectivity with 78. The passing of the data and network in-
a remote network device? formation down and back up through the
A. timing and synchronization layers of the receiving device is made pos-
sible by an
B. destination and source port numbers
A. Protocol suite
C. destination and source physical ad-
dresses B. service
D. destination and source logical network C. interface
addresses
D. modularity
75. Consider a TCP connection in a state where
there are no outstanding ACKs. The sender 79. Congestion usually happens when
sends two segments back to back. The A. network load < network capacity
sequence numbers of the first and second
segments are 230 and 290 respectively. B. network load > network capacity
The first segment was lost, but the second C. network load = network capacity
segment was received correctly by the re-
D. network load != network capacity
ceiver. Let X be the amount of data carried
in the first segment (in bytes), and Y be
80. The network layer in OSI is represented in
the ACK number sent by the receiver. The
TCP/IP as
values of X and Y (in that order) are
A. 60 and 290 A. Host-to-Network

B. 230 and 291 B. Internet


C. 60 and 231 C. Transport
D. 60 and 230 D. Application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 103

81. Electronic mail uses which application layer 87. Which two types of applications are best
protocol suited for UDP? (Choose two.)

PRACTICE BOOK» NOT FOR SALE


A. HTTP A. applications that need data flow con-
B. FTP trol
C. SMTP B. applications that require reliable deliv-
ery
D. SIP
C. applications that handle reliability
82. Which of the below statements is false? themselves
Round Trip Time in the real world changes
over time because D. applications that need the reordering
of segments
A. packets may take different routes
E. applications that can tolerate some
B. network load can change over time
data loss, but require little or no delay
C. packets can be unnecessarily retrans-
mitted 88. The speed mismatch between the sender
D. round trip time is an estimate and receiver is called
A. Error control
83. The TCP/IP PDU sed in host-to-network
layer B. speed control
A. segment C. Flow Control
B. packet D. Transmission control
C. frame
89. Which transport layer protocol would be
D. datagram used for VoIP applications?
84. What does TCP stand for A. Session Information Protocol (SIP)
A. Trusted Control Protocol B. Transmission Control Protocol (TCP)
B. Transport Control Protocol C. User Datagram Protocol (UDP)
C. Trusted Computer Platform D. VoIP Transfer Protocol
D. Transmission Control Protocol
90. Which of the following layer of OSI model
85. Socket-style API for windows is called also called end-to-end layer
A. wsock A. presentation layer
B. winsock B. network layer
C. wins C. session layer
D. sockwi D. transport layer
86. Address used in the Internet layer of
91. User datagram protocol is called connec-
TCP/IP
tionless because
A. specific
A. all UDP packets are treated indepen-
B. port dently by transport layer
C. logical B. it sends data as a stream of related
D. physical packets

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 104

C. it is received in the same order as sent 97. Transmission control protocol


order A. is a connection-oriented protocol
D. it sends data very quickly B. uses a three way handshake to estab-
lish a connection
92. Which of the following is transport layer
protocols used in networking? C. receives data from application as a sin-
gle stream
A. TCP
D. all of the mentioned

NARAYAN CHANGDER
B. UDP
C. ICMP 98. UDP uses to handle incoming user data-
grams that go to different processes on
D. ARP the same host.
93. Which transport layer protocol ensures re- A. flow control
liable same-order delivery? B. Multiplexing
A. ICMP C. Demultiplexing
B. IP D. none of the above
C. TCP 99. Which of the following statements are
D. UDP TRUE? (S1) TCP handles both congestion
and flow control (S2) UDP handles conges-
94. Which transport layer protocol statement tion but not flow control (S3) Fast retrans-
is true? mit deals with congestion but not flow con-
A. TCP is faster than UDP. trol (S4) Slow start mechanism deals with
both congestion and flow control
B. TCP has fewer fields than UDP.
A. S1, S2 and S3 only
C. UDP provides reliability.
B. S1 and S3 only
D. UDP is a best-effort delivery protocol.
C. S3 and S4 only
95. Which of the following functions does UDP D. S1, S3 and S4 only
perform?
100. The transport layer address is called
A. process-to-process communication
A. MAC address
B. host-to-host communication
B. IP address
C. end-to-end reliable data delivery
C. Port number
D. none of the above D. Service number
96. What is the maximum size of data that the 101. Transport layer aggregates data from dif-
application layer can pass on to the TCP ferent applications into a single stream be-
layer below? fore passing it to
A. Any size A. physical layer
B. 216 bytes-size of TCP header B. network layer
C. 216 bytes C. data link layer
D. 1500 D. application layer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 105

102. Four way Association is established in 107. Which layer is responsible for establish-
ing a temporary communication session be-
tween the source and destination host ap-

PRACTICE BOOK» NOT FOR SALE


A. TCP
plications?
B. UDP
A. Network Layer
C. SCTP
B. Physical Layer
D. DCTP
C. Transport Layer
103. A TCP Transaction consist of 3 phases. D. Application Layer
Which of the following is not one of these
phases 108. When the IP layer of a receiving host re-
A. Reliable, in-order data exchange ceives a datagram,

B. Connection Establishment A. delivery is complete

C. Connection Termination B. a transport layer protocol takes over

D. Reliable, unordered data exchange C. a header is added


D. none of the above
104. What is the name of the PDU at the Trans-
port Layer? 109. UDP uses to handle outgoing user
A. Segment datagrams from multiple processes on one
host.
B. Packet
A. flow control
C. Frame
B. Multiplexing
D. Data
C. Demultiplexing
E. Bits
D. none of the above
105. What happens if the RTT value is esti-
mated too short 110. HTTP/HTTPS port number
A. premature time out resulting in unnec- A. 80 and 443
essary packet retransmissions B. 80 and 445
B. premature time out means packet loss C. 67 and 68
does not need to be addressed
D. 161 and 69
C. premature time out means the timeout
value needs to be reduced for the network 111. Error control at the transport layer can be
D. premature time out means sending implemented through and
host sits idle A. Sequence numbers and acknowledge-
ment numbers
106. TCP retransmissions are triggered by
B. Sequence numbers and buffers
A. timed events and duplicate acks
C. buffers and acknowledgement num-
B. timeout events and duplicate acks bers
C. timed events and received acks D. Socket address and acknowledgement
D. timeout events and received acks numbers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 106

112. A client creates a packet to send to a D. Received data is unacknowledged.


server. The client is requesting HTTPS
service. What number will be used as 117. Which three fields are used in a UDP seg-
the destination port number in the sending ment header? (Choose three.)
packet? A. Window Size
A. 443 B. Length
B. 161 C. Source Port
C. 110

NARAYAN CHANGDER
D. Acknowledgment Number
D. 80 E. Checksum
113. In the OSI model, what layer is the trans-
118. Which of the following is NOT true
port layer
about User Datagram Protocol in transport
A. Layer 7 layer?
B. Layer 1 A. Works well in unidirectional commu-
C. Layer 3 nication, suitable for broadcast informa-
tion.
D. Layer 4
B. It does three way handshake before
114. In Stop and Wait protocol both send and sending datagrams
receive window size is
C. It provides datagrams, suitable for
A. N modeling other protocols such as in IP tun-
B. 1 neling or Remote Procedure Call and the
C. 2n Network File System

D. 2n-1 D. The lack of retransmission delays


makes it suitable for real-time applica-
115. In GoBackN protocol tions
A. Send and receive window are having
119. UDP packets are encapsulated in
size 1
A. an Ethernet frame
B. Send and receive window are having
size N B. an TCP segment
C. Send window size 1 and receiving win- C. an IP datagram
dow size N D. none of the above
D. Send window size N and receiving win-
dow size 1 120. Which two flags in the TCP header are
used in a TCP two-way handshake to ter-
116. Which two characteristics are associated minate session between two network de-
with UDP sessions? (Choose two.) vices? (Choose two.)
A. Destination devices receive traffic A. ACK
with minimal delay
B. FIN
B. Transmitted data segments are
C. PSH
tracked.
C. Destination devices reassemble mes- D. SYN
sages and pass them to an application. E. URG

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 107

121. After reaching congestion threshold, the loss (S4) The server moves LISTEN → SYN
data packets are increased RCVD → ESTABLISHED in the state
machine on no packet loss.

PRACTICE BOOK» NOT FOR SALE


A. Exponentially
B. Doubly A. S2 and S3 only

C. Linearly B. S1 and S4

D. Not increased at all C. S1 and S3


D. S2 and S4
122. Station A uses 32 byte packets to trans-
mit messages to Station B using a sliding 126. PDU for Application layer in TCP/IP
window protocol. The round trip time de- A. segment
lay between A and B is 40 ms and the bot-
tleneck bandwidth on the path A and B is B. frame
64 kbps. What is the optimal window size C. data
that A should use? D. packet
A. 5
127. On a TCP connection, current congestion
B. 10 window size is Congestion Window = 4
C. 40 KB. The window size advertised by the re-
ceiver is Advertise Window = 6 KB. The
D. 80
last byte sent by the sender is LastByte-
123. Which TCP header control bit is set on to Sent = 10240 and the last byte acknowl-
terminate a TCP conversation edged by the receiver is LastByteAcked =
8192. The current window size at the
A. UrG
sender is
B. ACK
A. 2048 bytes
C. PSH
B. 4096 bytes
D. FIN C. 6144 bytes
124. Which application would use the TCP D. 8192 bytes
transport layer protocol? (Choose two.)
128. Which of the following protocol is/are
A. FTP defined in Transport layer?
B. ICMP A. TCP & UDP
C. VoIP B. TCP
D. none of above C. FTP
125. Consider the three way handshake for D. UDP & FTP
TCP connection establishment Which of the
following statements are TRUE? (S1) Loss 129. Which of the following is a transport
of SYN + ACK from the server will not layer protocol?
establish a connection (S2) Loss of ACK A. stream control transmission protocol
from the client cannot establish the con- B. internet control message protocol
nection (S3) The server moves LISTEN →
SYN RCVD → SYN SENT → ESTAB- C. neighbor discovery protocol
LISHED in the state machine on no packet D. dynamic host configuration protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 108

130. What is the main function of Transport B. none of these answers


layer? C. Connected computers in the network
A. Provide encryption
D. Transmission capacity of a communica-
B. Provide end to end delivery tion channel
C. Send data physically
136. Consider the following statements.I. TCP
D. Data formatting connections are full duplex.II. TCP has
no option for selective acknowledgmentIII.

NARAYAN CHANGDER
131. The transport layer protocols used for TCP connections are message streams.
real time multimedia, file transfer, DNS
and email, respectively are: A. Only I is correct
A. TCP, UDP, UDP and TCP B. Only I and II are correct
B. UDP, TCP, TCP and UDP C. Only I and III are correct
C. UDP, TCP, UDP and TCP D. All of the Above
D. TCP, UDP, TCP and UDP 137. NAK is a acknowledgement
132. What information is used by TCP to re- A. Positive
assemble and reorder received segments? B. Negative
A. port numbers C. Neutral
B. sequence numbers
D. None of the above
C. acknowledgment numbers
138. UDP does not add anything to the ser-
D. fragment numbers
vices of IP except for providing com-
133. Which two traffic types require delay munication.
sensitive delivery? (Choose two.) A. Node-to-node
A. Email B. Process-to-process
B. Web C. Host-to-host
C. FTP D. none of the above
D. Voice
139. UDP packets are called
E. Video
A. user datagrams
134. Name the addressing used in host-to- B. Segments
network in TCP/IP model.
C. Frames
A. port
D. none of the above
B. physical
C. logical 140. Loss of data packet is indicated by
D. specific A. Repeated acknowledgements
B. No acknowledgement
135. What is the meaning of bandwidth in a
network? C. Message indicating loss of packet
A. Class of IP used in the network D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 109

141. Which action is performed by a client C. 256-1023


when establishing communication with a D. 256-1023
server via the use of UDP at the transport

PRACTICE BOOK» NOT FOR SALE


layer? 146. Which two operations are provided by
TCP but not by UDP? (Choose two.)
A. The client randomly selects a source
port number. A. Identifying the applications
B. The client sends a synchronization seg- B. Acknowledging received data
ment to begin the session. C. Tracking individual conversations
C. The client sets the window size for the D. Retransmitting any unacknowledged
session data
D. The client sends an ISN to the server E. Reconstructing data in the order re-
to start the 3-way handshake. ceived

142. TCP has which of the following character- 147. What type of applications are best suited
istics for using UDP?
A. connection establishment A. Applications that are sensitive to delay
B. all of these answers B. Applications that need reliable deliv-
ery
C. congestion control
C. Applications that require retransmis-
D. flow control sion of lost segments
143. Which field in the TCP header indicates D. Applications that are sensitive to
the status of the three-way handshake packet loss
process? 148. Peer to Peer file sharing is
A. window A. all of the mentioned
B. reserved B. scalable
C. checksum C. fault tolerant
D. control bits D. less secure
144. layer links the two subgroups in 149. Select the correct method used to setup a
TCP/IP and ensures that what the lower virtual circuit
layers have transmitted is in a form that A. SYN →<-SYN/ACKAck→
the upper layers can use
B. SYN →<-SYNAck→
A. Application
C. SYN →<-ACKAck→
B. Transport
D. SYN →<-ACKSyN/Ack→
C. physical, data-link and network
150. Transport layer may be responsible for
D. session flow and error Control, like the
145. What is the complete range of TCP and A. Physical layer
UDP well-known ports? B. Data link layer
A. 0 to 255 C. Network layer
B. 0 to 1023 D. Application layer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 110

151. In the sending computer, UDP sends a 156. Which of the following can be software?
data unit to the layer.
A. firewalls
A. Application
B. modems
B. Transport
C. routers
C. IP
D. none of the above D. gateway

152. Which factor determines TCP window 157. Which of the following mechanism over-

NARAYAN CHANGDER
size? come buffer overrun?
A. the amount of data to be transmitted A. Error Control
B. the number of services included in the
B. Congestion control
TCP segment
C. the amount of data the destination can C. Stream control
process at one time D. Flow Control
D. the amount of data the source is capa-
ble of sending at one time 158. Consider the following statements.I.
TCP connections are full duplex.II. TCP
153. The ports ranging from 49, 152 to 65, has no option for selective acknowledg-
533 can be used as temporary or private mentIII. TCP connections are message
port numbers. They are called the streams.Which of them is/are correct?
ports.
A. I
A. Well-known
B. I and II
B. Registered
C. Dynamic C. I, II, and III
D. none of the above D. II

154. Transport layer aggregates data from dif- 159. What does UDP stand for
ferent applications into a single stream be-
fore passing it to Network Layer. This pro- A. User Datagram Protocol
cess is called B. User Defined Primitive
A. Multiplexing C. User Dedicated Program
B. DeMultiplexing
D. User Datagram Piece
C. Connection
D. Connectionless 160. What does a protocol define

155. Which Flag bit in TCP header must be set A. protocol defines when data is commu-
when a TCP entity wants to terminate a nicated
connection? B. all of these answers
A. RST
C. protocol defines what data is commu-
B. ACK nicated
C. FIN D. protocol defines how data is communi-
D. SYN cated

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Introduction 111

161. The local host and the remote host are de- 166. The number of layers the original TCP/IP
fined using IP addresses. To define the pro- protocol suite .
cesses, we need second identifiers called

PRACTICE BOOK» NOT FOR SALE


A. four
B. five
A. UDP addresses
C. six
B. transport addresses
D. seven
C. port addresses
D. none of the above 167. What is a syn-flood attack?

162. In TCP numbering always start with A. A client requests a TCP connect to
a server, but doesn’t respond to the
A. 1 always server’s syn-ack.
B. 0 always B. A server ignores a client’s connection
C. random generated number attempt.
D. last connection last sequence no C. A client connects to the same server
multiple times.
163. Which number or set of numbers repre-
sents a socket? D. A client uses telnet to connect to a
server.
A. 10.1.1.15
B. 01-23-45-67-89-AB 168. Which of these is the most correct defini-
tion of a Transport layer?
C. 21
D. 192.168.1.1:80 A. The Transport Layer in the Open Sys-
tem Interconnection (OSI) model is faster
164. What is an advantage of UDP over TCP? for end-to-end transmission over a net-
work.
A. UDP communication is more reliable.
B. UDP communication requires less B. The Transport Layer in the Open Sys-
overhead. tem Interconnection (OSI) model is re-
sponsible for end-to-end delivery over a
C. UDP reorders segments that are re- network.
ceived out of order.
C. The Transport Layer in the Open Sys-
D. UDP acknowledges received data. tem Interconnection (OSI) model is faster
165. How does a networked server manage for end-to-end transmission over a net-
requests from multiple clients for different work, and which also simplifies the trans-
services? mission of information.

A. The server sends all requests through D. all of the above


a default gateway.
169. Which of the following applications used
B. Each request is assigned source and UDP?
destination port numbers.
A. Video conferencing
C. The server uses IP addresses to iden-
B. Music streaming
tify different services.
D. Each request is tracked through the C. Online game
physical address of the client. D. File Transfer (FTP)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 USER DATAGRAM PROTOCOL (UDP) 112

170. Ephemeral Ports-also known as? 173. Which of the following control is enabled
A. Well-known in UDP?

B. Registered A. Flow Control

C. Dynamic or Private B. Error Control


C. Congestion Control
D. none of above
D. None of the above
171. What OSI layer is responsible for estab-

NARAYAN CHANGDER
lishing a temporary communication session 174. Which three statements characterize
between two applications and ensuring UDP? (Choose three.)
that transmitted data can be reassembled A. UDP provides basic connectionless
in proper sequence? transport layer functions.
A. Session B. UDP provides connection-oriented,
B. Transport fast transport of data at Layer 3.
C. Data link C. UDP relies on application layer proto-
cols for error detection.
D. network
D. UDP is a low overhead protocol that
172. Let the size of congestion window of a does not provide sequencing or flow con-
TCP connection be 32 KB when a timeout trol mechanisms.
occurs. The round trip time of the connec- E. UDP relies on IP for error detection
tion is 100 msec and the maximum seg- and recovery.
ment size used is 2 KB. The time taken (in
msec) by the TCP connection to get back to 175. Which are the different phases in a con-
32 KB congestion window is nection less service?
A. 1100 to 1300 A. Connection estalishment
B. 800 to 1000 B. Data transfer
C. 1400 to 1600 C. Connection tear down
D. 1500 to 1700 D. connection checking

3.2 USER DATAGRAM PROTOCOL (UDP)


1. In UDP, Queues are associated with C. When transfer data from a web server
A. Slots to a browser
B. IP D. When you are at a coffee shop
C. Ports
3. Which is examples of UDP? (choose 2 an-
D. Packets swers)
2. When to use UDP? A. VoIP (Voice over IP)
A. When using Multicast or Broadcast to B. Online games
transfer
C. File transfer
B. When you request a web page in your
browser D. Simple Mail Transfer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 113

4. Which statement is correct? 8. UDP is suited for


A. UDP establish a connection before A. Network management services

PRACTICE BOOK» NOT FOR SALE


sending data B. Route updating services
B. UDP is a connection-less protocol
C. Reliable services
C. UDP is more reliable than TCP
D. interactive real time applications
D. UDP is slower than TCP
9. Which layer is UDP located?
5. is a process-to-process protocol that
adds only port addresses, checksum error A. Application
control, and length information to the data B. Transport
from the upper layer. C. Network
A. TCP D. Data link
B. IP
10. Which of the following are the fields in a
C. UDP
UDP header?
D. ARP
A. The IP address
6. Why TCP is more reliable than UDP? B. The Physical address
A. Because TCP guarantees delivery of C. The Source port number
data to the destination router
D. Error checking
B. Because TCP sacrifices speed in order
to ensure that data from the sender does 11. How much bytes fixed in UDP header?
reach the receiver A. 16 bytes
C. Because TCP isn’t more secure than B. 4 bytes
UDP
C. 32 bytes
D. Because TCP slower than UDP
D. 8 bytes
7. TCP numbers all that are transmitted
in a connection. 12. UDP Performs
A. packets A. Process to Process Communication
B. data bits B. Host to host communication
C. data bytes C. both
D. messages D. None of the above

3.3 TRANSMISSION CONTROL PROTOCOL (TCP)


1. Identify which of the following is an ad- ers can interoperate successfully.
vantage of using standards to develop and
C. Different manufacturers are free to
implements protocols.
apply different requirements when imple-
A. A particular protocol can only be imple- menting a protocol.
mented by one manufacturer.
D. Standards provide flexibility for man-
B. Products from different manufactur- ufacturers to create devices that comply

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 114

with unique requirements. A. Pass the packet to the transport layer

2. What should we do with Apple users? B. Remove the IP header

A. Burn them alive C. Reassemble the data once it receives


all the packets
B. Treat them nicely
D. none of above
C. Take them out to the sea and throw
them off the boat 8. What is TCP used for?

NARAYAN CHANGDER
D. Hang them upside down for 3 hours A. To send information across the inter-
net in packets
3. Which of the following protocols is used by
email servers to exchange messages with B. To ensure that information is sent to
oneanother? the correct computer
A. POP3 C. To send mail across the internet
B. IMAP D. To transmit webpages across the inter-
net
C. SMTP
D. HTTP 9. What is the role of the application layer of
the TCP/IP model
4. Which of these does NOT happen during
A. The Application Layer of the TCP/IP
the application layer
Model consists of various protocols that
A. Data is created perform all the functions of the OSI
B. Protocols are added model’s Application, Presentation and
Session layers. This includes interaction
C. Data is split into packets with the application, data translation and
D. none of above encoding, dialogue control and communi-
cation coordination between systems.
5. Which protocol would you use to transfer
hypertext? B. The application layer of the TCP/IP
model ensures that data gets sent to the
A. FTP correct computer, across a network, send-
B. SMTP ing back acknowledgements when data is
not sent.
C. POP3
C. The Application Layer is the layer in the
D. HTTP
TCP/IP model at which data is transmit-
6. what is the subnet mask of ted and received across the physical net-
192.168.1.2/24 work.
A. 255.255.255.0 D. The Application layer in the TCP/IP ref-
erence model is responsible for transfer-
B. 255.255.0.0
ring data between the source and desti-
C. 255.0.0.0 nation computers. The Internet layer ac-
D. 192.168.1.2 cepts data from the Transport layer and
passes the data to the Network Interface
7. What is the FIRST thing the destination layer. The following are the functions
does at the network layer with a packet of the Internet layer:Transmitting data to
it receives? the Network Interface layer. Routing the

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 115

data to the correct destination. This layer C. Transport


takes care of sending the data through the D. Application
shortest route if more than one route is

PRACTICE BOOK» NOT FOR SALE


available. In addition, if a route through E. Presentation
which a data is to be sent has problems, 15. What contains 4 pairs of wires that can
the data is sent through an alternate route transmit and receive data?
10. How is a MAC address created? A. UTP
A. It is hardwired by the manufacturer B. Physical layer
B. It is assigned by an Internet service C. Auxillary cables
provider D. Coaxial cables
C. It is generated by the customer
16. What information is found in the frame
D. none of above header?
11. what is tcp/ip A. Both are found in a frame header
A. protocol B. Destination MAC address of the next
B. internet device in the path to the ultimate destina-
tion
C. harbir
C. Source MAC address
D. layer
D. none of above
12. Which TCP/IP protocol sequence is cor-
rect? 17. Which of these statements are true about
packet switching
A. Application, Internet, Physical, Trans-
port A. It doesn’t waste bandwidth

B. Transport, Internet, Physical, Applica- B. It finds the most efficient route for
tion each packet

C. Application, Internet, Physical, Trans- C. Packets are put back together at the
port receivers device

D. Application, Transport, Internet, Phys- D. It has a dedicated path


ical 18. What does NIC stand for?
13. What layer in the TCP/IP stack is equiv- A. Network Interface Card
alent to the Transport layer of the OSI B. Network Interconnect Card
model?
C. Network Interchange Card
A. Application
D. Network Integrated Card
B. Host-to-Host
C. Internet 19. What is it called when a NIC attaches to a
frame when it wants every other NIC on
D. Network Access the network to read it?
14. What is layer 5 in the OSI model? A. Broadcast address
A. Network B. Biometric binding
B. Session C. IP address

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 116

D. Network reader 25. What information is found in a TCP


E. Comcast communicator header?
A. Destination port
20. is responsible for converting the higher
level protocol address (IP addresses) to B. Source port
physical network addresses. C. Both options are found in a TCP header
A. Internet Protocol(IP)
D. none of above

NARAYAN CHANGDER
B. Internet Control Message Proto-
col(ICMP)
26. Encryption takes place at what layer?
C. Address Resolution Protocol(ARP)
A. Application
D. Bootstrap Protocol(BOOTP)
B. Session
21. Which of the TCP/IP model layers has
C. Data Link
a PDU as a segment, but is responsible
for breaking down the message into pack- D. Presentation
ets?
E. Transport
A. Network
27. Why were the Data Link & Physical layers
B. Application
divided into two separate layers in the cur-
C. Transport rent TCP/IP model?
D. Internet A. Because the number of protocols grew
too large for the link layer to handle it by
22. Actual data may consist of itself
A. part of a streamed video
B. Because networks use different types
B. part of an email of transmission media (ethernet wire,
C. part of a web page fiber optic cable, and radio signals) to
transmit bits
D. All of these answers
C. Because the original TCP/IP model
23. FTP stands for transfer protocol. was too complicated for many typical uses
A. file
D. none of above
B. frame
C. folder 28. An IP address of a computer directly con-
D. none of above necting to the Internet should be(1) at
least 32 bits long(2) assigned to the net-
24. The character string TCP sends to secure work interface card of the computer by the
connection manufacturer(3) unique
A. number A. only
B. response B. only
C. checksum C. and (3) only
D. sequence number D. and (2) only

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 117

29. OSI model stands for? 34. Which is not a layer in the TCP/IP model?
A. Open System Interconnection Model A. Application

PRACTICE BOOK» NOT FOR SALE


B. Open Source Interconnection Model B. Tranmission
C. Open System Institution Model C. Internet
D. Open System Intercommunication D. Network
Model
35. On which layer TCP/IP is ACL APIC-EM
30. Which of the following statements about path?
Domain Name and Internet Protocol ad- A. Layer 1
dress is not correct? B. Layer 3
A. The Internet Protocol address of a C. Layer 2
common network device consists of four
sets of numbers. D. Layer 4

B. Domain Name can remain unchanged 36. Which protocol is used to send packets
even if the host computer is moved to a A. IP
different network.
B. FTP
C. Domain Name is normally easier to re-
C. SMTP
member.
D. TCP
D. Domain Name supports a faster con-
nection to the requested host computer. 37. Which layer does TCP operate on
31. A port address in TCP/IP is bits long. A. Application
A. 32 B. Transport

B. 48 C. Network

C. 16 D. Link

D. 64 38. Identify which of the following layers of


OSI model are comparable in function to
32. Which of the following is private IP ad- the application layer of the TCP/IP model?
dress? i. Applicationii. Presentationiii. Sessioniv.
A. 12.0.0.1 Transport
B. 168.172.19.39 A. i & ii

C. 172.15.14.36 B. iii & iv

D. 192.168.24.43 C. i, ii & iii


D. ii, iii & iv
33. Data packets are given an IP address at
which layer of the TCP/IP model? 39. The length of IP addresses will be changed
from 32 bits to 128 bits. What is the ma-
A. Application
jor reason for this change?
B. Transport
A. It is more difficult to hack networked
C. Internet computers.
D. Physical/network interface B. More IP addresses can be used.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 118

C. Less computational power is required 45. Which is NOT one of the application layer
of web servers. protocols?
D. More web content can be surfed. A. HTTP
B. FTP
40. Addressing used in transport layer of
TCP/IP. C. SMTP
A. specific D. IP

NARAYAN CHANGDER
B. port 46. is the protocol that hides the underly-
C. logical ing physical network by creating a virtual
network view.
D. physical
A. Internet Protocol(IP)
41. Data packets are divided at the layer B. Internet Control Message Proto-
of the TCP/IP protocol. col(ICMP)
A. Application C. Address Resolution Protocol(ARP)
B. Transport D. Bootstrap Protocol(BOOTP)
C. Internet
47. What term refers to addresses that orga-
D. Physical nizations use for nodes requiring IP con-
nectivity within enterprise networks, but
42. What is name of the protocol that matches do not require external connections to the
domain names to IP addresses? global Internet?
A. SMTP A. Private addresses
B. TCP B. Public address
C. IP C. Dynamic Host Configuration Protocol
D. DNS (DHCP) addresses
D. Dynamic addresses
43. The IP Address and port number form
what is called a 48. What is Pneumonoultramicroscopicsilico-
A. Socket volcaniosis

B. Rocket A. A disease caused by the inhalation of


Silica dust
C. Protocol
B. The fear of long words
D. Router
C. The condition where you get burned by
44. Why are IP addresses needed? a volcano or volcanic rock
A. So the user knows how to send emails D. The scientific term for Pneumonia

B. So the router can speak to WiFi 49. Which layer handles the formatting of ap-
C. So the Internet knows where to send plication data so that it will be readable by
information the destination system?

D. So the header can see the control in- A. Application


formation B. Session

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 119

C. Data Link 55. Which network service provides automatic


D. Presentation assignment of IP addresses to clients that
have been configured to do so?

PRACTICE BOOK» NOT FOR SALE


E. Transport
A. Dynamic Host Configuration Protocol
50. How many layers does the OSI model have (DHCP)
A. 2.123452 B. Transmission Control Protocol (TCP)

B. 2.6452 C. User Datagram Protocol (UDP)

C. 2.46413 D. Classless inter-domain routing (CIDR)

D. 2.32342 56. Packets are found at which layer?


A. Network
51. TCP attaches this to each segment so the
destination host can reorder segments as B. Transport
they arrive C. Session
A. checksum D. Data Link
B. sequence number E. Physical
C. three way handshake
57. What protocol(s) is used at the Network
D. flow control layer?

52. Which network hardware is used to for- A. Transmission Control Protocol (TCP)
ward data packets between networks? B. Both options are protocols used at the
A. Switch Network layer

B. Router C. Internet Protocol (IP)


D. none of above
C. Hub
D. Wireless access point 58. Define Hypertext Transfer Protocol (HTTP)
A. Protocol that manages the individual
53. Transport layer protocols
conversations.
A. convert the data into bits to be trans-
B. Protocol that encapsulates the TCP
mitted
segments into packets, assigns ad-
B. use port numbers to track sessions dresses, and delivers to the destination
C. address the traffic for its destination host.
C. An application protocol that governs
D. none of above
the way a web server and a web client in-
54. Select the following Application layer pro- teract.
tocols that are part of TCP/IP protocol D. Allows communication over a data link
suites.i. ARPii. DHCPiii. DNSiv. FTP and the physical transmission of data on
A. i & ii the network media.
B. ii & iii 59. What is a TTL value in a ping?
C. i, ii & iv A. Time to link
D. ii, iii & iv B. Time to live

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 120

C. Time to like 64. What kind of address is made up of hex


D. Time to leave pairs and stored on each device’s NIC?
A. MAC
60. What Windows feature allows a Dy-
B. TCP
namic Host Configuration Protocol (DHCP)
client computer to configure itself automat- C. IP
ically with an IP address in the range of D. DNS
169.254.0.1 to 169.254.255.254 if no
65. The database of IP-to-MAC address map-

NARAYAN CHANGDER
DHCP server is available?
pings
A. Automatic private IP addressing
(APIPA) A. NAT

B. Static addressing B. ARP table

C. Internet Protocol version 6 (IPv6) C. MAC address


D. NIC
D. Classless inter-domain routing (CIDR)
66. Which of the following protocols uses both
61. If you notice that a computer has an IP ad- TCP and UDP?
dress of 169.254.0.11, what can you con-
clude? A. FTP

A. The computer was unable to locate an B. SMTP


available Dynamic Host Configuration Pro- C. TELNET
tocol (DHCP) server. D. DNS
B. The computer is part of a Class C net-
67. is the protocol used by the transport
work,
layer for connectionless
C. The computer has been configured
A. IP
with static IP addressing.
B. UDP
D. The computer is acting as a proxy
server for clients on the same subnet. C. TCP
D. NTP
62. DHCP stands for host configuration
protocol. 68. What does MAC stand for?
A. dangerous A. media access control
B. dynamic B. multi access control
C. distributed C. media account control
D. domain D. multi address control
69. TCP/IP model stands for?
63. TCP groups a number of bytes together
into a packet called a A. Transporter Control Protocol/ Inter-
net Protocol Model
A. user datagram
B. Transaction Control Protocol/ Internet
B. segment
Protocol Model
C. datagram C. Transmission Control Protocol/ Inter-
D. packet net Protocol Model

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 121

D. Transmission Control Protocol/ In- C. Transport


tranet Protocol Model
D. Internet

PRACTICE BOOK» NOT FOR SALE


70. How many octets is an IPv4 address made
up of? 75. What is a network?
A. 1 A. Two or more computers connected to
B. 2 each other

C. 3 B. Computers in a circle
D. 4 C. Clients receiving data from servers

71. Which of the following is a function of a D. Spiders doing a job


switch? (1) Connects computers to form a
LAN.(2) Controls the network traffic in a 76. What does the command tracert do within
network.(3) Joins two networks.(4) Con- CMD
nects a LAN to the Internet. A. Send out a ping
A. and (2) only
B. DDOS’s someone
B. and (4) only
C. Causes a fire-see previous question on
C. , (2) and (4) only fire safety
D. , (3) and (4) only
D. Traces the route of the ping you’ve
72. What is done with the data at the physical sent
layer?
77. The payload part of a data packet will hold
A. The physical layer header is added to
what?
the frame to prepare it for transmission
A. Addresses
B. Both occur at the physical layer
C. The data is converted into its intended B. The actual data
transmission media (electrical, light, ra- C. Error checks
dio wave) and sent down its transmission
path D. none of above
D. none of above
78. What is a TLS handshake?
73. Which of the following is not the layer of A. A TLS handshake is communication be-
TCP/IP protocol. tween two end to end devices, using a se-
A. Physical layer ries Syns, and Acks, to ensure packets are
transferred?
B. link layer
C. network layer B. A TLS handshake is a handshake be-
tween switches
D. transport layer.
C. A TLS handshake is a handshake be-
74. Which is the first layer of the TCP/IP tween routers
model?
D. A TLS handshake is entirely redundant
A. Network and will drop packets without any ac-
B. Application knowledgement

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 122

79. IP is implemented at which OSI model 84. SMTP works at the layer of the
layer? TCP/IP model.
A. Transport A. physical/Network interface
B. Data Link B. transport
C. Logical Link Control
C. application
D. Session
D. internet
E. Network

NARAYAN CHANGDER
80. The first SYN message in the three-way 85. The protocol that operates at the Network
handshake layer of the OSI model to manage multicas-
ting
A. initial sequence number
B. check sum A. Internet Group Management Protocol

C. sequence number B. Internet Group Protocol


D. SYN C. IPv4
81. messages are never sent in response D. IPv6
to datagrams with a broadcast or a multi-
cast destination address. 86. What is the decimal equivalent of an octet
composed of all 1s?
A. ICMP
B. ARP A. 255

C. IP B. 111
D. BOOTP C. 100
82. Which statement is true about the TCP/IP D. 11111111
and OSI models?
87. A logical division of a computer network,
A. The TCP/IP transport layer and OSI
in which all nodes can reach each other by
Layer 4 provide similar services and func-
broadcast at the data link layer.
tions.
B. The first three OSI layers describe gen- A. multicast domain
eral services that are also provided by the B. ARP table
TCP/IP internet layer.
C. broadcast domain
C. The TCP/IP network access layer has
similar functions to the OSI network layer. D. lookup tables
D. The OSI Layer 7 and the TCP/IP appli-
88. Bits are packaged into frames at which
cation layer provide identical functions.
layer of the OSI model?
83. The three step process TCP uses to estab- A. Data Link
lish connectivity
B. Physical
A. check
B. control C. Application
C. three-way handshake D. Transport
D. checksum E. Presentation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 123

89. What is the Transport layer of the TCP/IP 92. Mr. Chan wants to register a domain
model responsible for? name by using his name, ‘Chan Tai Man’.
Which of the following domain names is

PRACTICE BOOK» NOT FOR SALE


A. The transport layer is responsible for
not valid?
error-free, end-to-end delivery of data
from the source host to the destination A. chantaiman.com.org
host. It corresponds to the transport B. chantaiman.co.uk
layer of the OSI model. The functions of
C. ChanTaiMan.Net
the transport layer are:It facilitates the
communicating hosts to carry on a conver- D. chantaiman.com.hk
sation. It provides an interface for the
users to the underlying network. It can 93. How many bits make up an Internet Proto-
provide for a reliable connection. It can col version 4 (IPv4) address and Internet
also carry out error checking, flow control, Protocol version 6 (IPv6) address, respec-
and verification. tively?
A. There are 32 bits in an IPv4 address
B. The transport Layer of the TCP/IP
and 128 bits in an IPv6 address.
Model consists of various protocols that
perform all the functions of the OSI B. There are 32 bits in an IPv4 address
model’s Application, Presentation and and 64 bits in an IPv6 address.
Session layers. This includes interaction C. There are 64 bits in an IPv4 address
with the application, data translation and and 128 bits in an IPv6 address.
encoding, dialogue control and communi-
D. There are 8bits in an IPv4 address and
cation coordination between systems.
32 bits in an IPv6 address.
C. Driving a car from your location, to
your destination. 94. Which layer does IP operate on
A. Application
D. none of above
B. Transport
90. TCP assigns a sequence number to each C. Network
segment that is being sent. The sequence
number for each segment is number of the D. Link
byte carried in that segment. 95. PDU used in the Transport layer of the
A. first TCP/IP.
B. last A. data

C. middle B. packet
C. datagram
D. zero
D. frames
91. What is the combination of the data and
96. In a LAN, an ethernet connection repre-
TCP header called?
sents which layer of the TCP/IP model?
A. frame A. Application
B. segment B. Transport
C. packet C. Internet
D. none of above D. Physical

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 124

97. Which are not one of the application layer B. Transport


protocols? C. Application
A. DNS
D. Network access
B. FTP
102. What are the mail protocols
C. SMTP
A. SNPT and POP
D. FNP
B. MTP AND POP3

NARAYAN CHANGDER
98. What advantage does the IPv6 standard
C. SMTP and POP3
have over the Internet Protocol version 4
(IPv4) standard? D. MTP and ETP
A. It vastly increases the available pool 103. Which layer 4 protocol is used for a Tel-
of IP addresses. net connection?
B. It enables greater data transmission A. IP
speeds.
B. TCP/IP
C. It supports the IPsec security feature,
which is unavailable in IPv4. C. TCP
D. It allows devices to self-assign an IP D. UDP
address from a server.
104. To traverse more than one LAN seg-
99. Amy owns a domain name, ‘amy- ment and more than one type of network
comp.com’. Which of the following URLs through a router.
is not owned by Amy? A. Travel
A. http://www.AmyComp.com/index.html B. intranetwork
C. internetwork
B. http://www.amycomp.com.hk/main.htm
D. protocol

C. http://www.amycomp.com/next 105. is protocol used by the Transport


level/index.html layer for connection-oriented
D. http://main.amycomp.com/register.htm A. IP
100. What three application layer protocols B. UDP
are part of the TCP/IP protocol suite? C. TCP
(Choose three.)
D. NCP
A. ARP
B. DHCP 106. If you use either Telnet or FTP, which is
the highest layer you are using to transmit
C. DNS data?
D. NAT A. Application
E. FTP B. Session
101. Which layer are packets found on? C. Presentation
A. Physical D. Transport

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 125

107. Which networking technology is currently 112. Which of the TCP/IP model layers is re-
recognized as the standard for computer sponsible for breaking down the message
networking? into packets?

PRACTICE BOOK» NOT FOR SALE


A. System network architecture A. Network
B. Transmission control protocol/Internet B. Application
protocol C. Transport
C. Open system Interconnect D. Internet
D. Open network architecture
113. What does OUI stand for?
108. The layers of the OSI model, from the top A. organizationally unique identifier
down, are:
B. organization unicorn identity
A. application, presentation, session,
C. ominous ubiquitous inquiry
transport, network, data link, physical
D. oreos under igloos
B. session, presentation, data transport,
MAC, network, physical 114. How do you feel about this quiz so far?
C. physical, data link, network, transport, A. It’s fun!
session, presentation, application B. I hate it.
D. presentation, application, session, net- C. Some of these questions are not what
work, transport, data link, physical was asked for
E. application, encryption, network, D. Why am I here?
transport, logical link control, physical
115. What term refers specifically to an IP ad-
109. What protocol is used to transfer files? dress that has been manually configured
A. FTP on a device by a network technician e.g.
B. HTTP for a printer.

C. BTEP A. A static address

D. NDP B. A dynamic address


C. A public address
110. Specialized devices that allow two or
D. A network address
more networks or multiple parts of one
network to connect and exchange data. 116. What is not incuded in a packet?
A. devices A. Sender IP address
B. connectivity devices B. Checksum
C. TCP/IP protocols C. Router ID
D. none of above D. Packet number
111. The decapsulation process is 117. Which of these is not a protocol
A. The opposite to encapsulation A. HTTP
B. The same as encapsulation B. FTP
C. The opposite to decapsulation C. TLS
D. none of above D. IPv6

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 126

118. Which of these are mail protocols? 124. In the current TCP/IP model, the Applica-
A. SMTP and POP tion, Presentation, & Session layers from
the OSI model are combined into which
B. TCP and FTP layer?
C. FTP and SMTP
A. Data Link
D. POP and IP
B. Physical
119. TCP is a(n) transport protocol. C. Transport

NARAYAN CHANGDER
A. Protocol delivery
D. Application
B. Reliable
E. Network
C. Best-effort delivery
D. Effortless delivery 125. What does LLC stand for?
A. Limited liability company
120. The number of layers in the TCP/IP pro-
tocol suite . B. Logical link control
A. Four C. LL Cool J
B. Five D. Lightly linked cord
C. Six E. Life line cable
D. Seven
126. ‘www.edb.gov.hk’ is translated into
121. A dynamic IP address is issued by a ‘210.245.204.96’ for web browsing.
A. DHCP server Which of the following provides this kind
of translation service?
B. FTP server
A. Domain Name Server
C. DNS server
B. Operating system
D. Gandalf the Grey
C. Browser
122. Which of the following are transport
layer protocols? D. Switch
A. TCP and UDP 127. What is the role of the datalink layer
B. IP A. To interrupt the flow of data
C. FTAM B. To sniff all the packages
D. IP and TFTP
C. the main processes of the data link
123. Ms Wong wants to register a new web layer are to deal with transmission er-
site for her company. What should she do? rors, regulate the flow of data, and pro-
(1) Choose a domain name that is easy to vide a well-defined interface to the net-
remember.(2) Choose an IP address that is work layer.
easy to remember.(3) Set up a file server. D. The data link layer links the other lay-
A. only ers of the OSI model together, so that the
B. only end to end devices are able to communi-
cate with each other. More so to ensure
C. and (2) only that network errors do not occur, with
D. and (3) only your internet line

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 127

128. What is the purpose of a subnet mask? B. Providing automatic assignment of IP


A. To show you an IP address addresses and other Transmission Con-
trol Protocol/Internet Protocol (TCP/IP)

PRACTICE BOOK» NOT FOR SALE


B. To identify the MAC address, within the configuration
IP address
C. Encrypting traffic between clients on
C. To identify the user identification side different network subnets
of an IP address
D. Serving as a default gateway for com-
D. To identify the network portion of an IP puters on a local network
address
134. What is a benefit of working in layers
129. PDU used in the Internet layer of TCP/IP
A. They are self contained
A. segment
B. It would be difficult to be responsible
B. packet
for all layers
C. datagram
C. Both of these answers
D. frames
D. none of above
130. The tables Web sites provide online ac-
cess to these databases correlating manu- 135. What function is performed at the Data
facturers with their respective OUIs Link layer?

A. lookup tables A. Move the data from device to device


across the network
B. domain server
B. Sequence the data for reassembly at
C. MAC address lookup tables the destination
D. Dynamic ARP table C. Packets are addressed so they can be
routed through the network to the desti-
131. The protocol(s) used at the Transport
nation
layer is
A. User Datagram Protocol (UDP) D. none of above

B. Transmission Control Protocol (TCP) 136. How many layers are there in the TCP/IP
C. Both are transport layer protocols model

D. none of above A. 7
B. 4
132. TCP and IP are mainly used for
C. 42
A. network communication
D. 10123
B. web authoring
C. system integration 137. How many layers are in the TCP/IP
model?
D. virus scan
A. 4
133. What is the primary purpose of a Domain
B. 7
Name System (DNS) server?
A. Translating names into numeric IP ad- C. 5
dresses D. 6

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 128

138. What term refers specifically to an IP ad- 143. Which 2 layers in the OSI model corre-
dress that has been manually configured spond to only one layer each in the TCP/IP
on a device by a network technician? model?
A. A static address A. Transport
B. A dynamic address B. Network
C. A public address C. Session
D. A network address D. Physical

NARAYAN CHANGDER
E. Data Link
139. Select statement which is TRUE about the
TCP/IP model and OSI models. 144. What is the native protocol of the Inter-
A. TCP/IP transport layer and OSI layer net, which is required for Internet connec-
4 provide similar services and functions. tivity?
A. Transmission Control Proto-
B. TCP/IP network access layer has sim-
col/Internet Protocol (TCP/IP)
ilar functions to the OSI network layer.
B. User Datagram Protocol (UDP)
C. OSI layer 7 and the TCP/IP application
layer provide identical functions. C. Dynamic Host Configuration Protocol
(DHCP)
D. The first 3 OSI layers describe gen-
eral services that are also provided by the D. Internet Protocol version 6 (IPv6)
TCP/IP internet layer. 145. Which of the following statements about
140. How many layers are OSI model and Internet Protocol version 6 (IPv6) is
TCP/IP model? false?
A. IPv6 is compatible with Internet Proto-
A. 4 layers, 7 layers
col version 4 (IPv4) and is widely used in
B. 7 layers, 4 layers production networks.
C. 7 layers both B. IPv6 has simplified address headers
D. 4 layers both and supports hierarchical addressing.
C. IPv6 supports time-sensitive network
141. Which of these are true about stack lay-
traffic and a new structure for unicast ad-
ers (choose one)
dressing.
A. They are self contained D. IPv6 greatly increases the available
B. It is an example of decomposition pool of IP addresses.
C. It prevents designers creating their 146. What are sets of clearly defined rules,
own models regulations, standards, and procedures
D. All of these answers that enable hardware and software de-
velopers to make devices and applica-
142. What is an IP address? tions that function properly at a particular
A. A way of sending information layer?
B. A way of indicating the location of a de- A. Protocol
vice B. TCP/IP
C. A way of deleting viruses C. Networks
D. A secure communication method. D. Interconnection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 TRANSMISSION CONTROL PROTOCOL (TCP) 129

147. How much data can a typical frame con- C. network layer
tain? D. transport layer.

PRACTICE BOOK» NOT FOR SALE


A. 2243 pixels
152. Which of the following is an invalid IP ad-
B. 768 bits
dress?
C. 500 bytes
A. 256.255.254.253
D. 1500 Bytes
B. 192.168.0.1
148. d layer of OSI model named as C. 10.10.10.10
A. Session layer
D. 4.3.2.1
B. Network layer
C. Transport layer 153. What information is included in the IP
header added to a TCP segment?
D. Application layer
A. Both answers are included in the IP
149. What are the 3 aspects of the fire trian- header
gle B. Destination IP address
A. Carbon Dioxide, heat, and water
C. Source IP address
B. Earth wind and fire
D. none of above
C. Fuel, oxygen and heat
D. Fire is hot. 154. The process of gauging the appropriate
rate of transmission based on how quickly
150. Routers operate at which layer of the OSI the recipient can accept data.
model? A. check sum
A. Physical
B. flow control
B. Network
C. sequence number
C. Session
D. three-way handshake
D. Transport
E. Data Link 155. Which of these is NOT part of the
header?
151. The of TCP/IP protocol is responsible
A. Packet Number
for figuring out how to get data to its des-
tination. B. Sender IP Address
A. application layer C. Size of Packet
B. link layer D. Name of File

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4. Network Layer

NARAYAN CHANGDER
4.1 Introduction
1. Routers operate at:(Choose two.) 4. The network layer is concerned with
of data.
A. Physical layer of the OSI model
A. bits
B. Application layer of the OSI model
B. frames
C. Layer 3 of the OSI model
C. packets
D. Network layer of the OSI model
D. bytes
E. Layer 5 of the OSI model
5. What is the command to display host rout-
2. The physical layer of the receiving de- ing tables?
vice passes bits up to which higher level
layer? A. show ip route

A. application B. netstat-r
C. arp-a
B. presentation
D. show run
C. network
D. data link 6. Which protocol gives a full route table up-
date every 30 seconds?
3. Which of the following is the widely used A. IEGRP
medium for networking due to relatively
low cost, ease of use, and fast network- B. RIP
ing speeds? C. ICMP
A. Unshielded Twisted-Pair (UTP) D. IP
B. Fiber-optic
7. Which statement about host forwarding
C. Coaxial Cable decisions is true?
D. Wireless A. A host cannot ping itself.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 131

B. A remote destination host is on the 11. Communication at data link layer is


same local network as the sending host.
A. node to node

PRACTICE BOOK» NOT FOR SALE


C. Local hosts can reach each other with-
out the need of a router. B. router to router

D. Routing is enabled on switches to dis- C. server to server


cover the best path to a destination. D. coast to coast
8. Suppose two IPv6 nodes want to inter-
operate using IPv6 datagrams, but they 12. POST stands for?
are connected to each other by interven- A. Pop on self test
ing IPv4 routers. The best solution here is
B. Power on series test

A. Use dual-stack approach C. Power on self test


B. Tunneling D. Pop on self test
C. No solution
13. When saving router configurations
D. Replace the system what is the proper command?
9. Which of the following statements de- A. copy router config
scribes an IPv6 enhancement over IPv4?
B. copy running-config startup-config
A. Checksums in the trailer have been en-
hanced in IPv6. C. copy run start

B. Supports end-to-end connectivity with- D. save running-config startup-config


out the need for NAT for private to public
conversion. 14. What are the advantages of IPv6 over
IPv4? Select more than 1 answer
C. IPv6 eliminates the need for packet
prioritization. A. Increased address space-128 bits in-
D. IPv6 has a smaller-sized IP header stead of 32 bits
field. B. Improved Packet Handling-simplified
header with fewer fields
10. Which of the following assertions is FALSE
about the Internet Protocol (IP)? C. Eliminate the needs of NAT-since there
is huge amount of addressing
A. It is possible for a computer to have
multiple IP addresses D. Requires NAT to use private address-
B. IP packets from the same source to ing internally and mapped to shared public
the same destination can take different address
routes in the network
15. Which of the following are network layer
C. IP ensures that a packet is discarded if protocols?
it is unable to reach its destination within
a given number of hops A. IPv6
D. The packet source cannot set the route B. TCP
of an outgoing packets; the route is de-
C. UDP
termined only by the routing tables in the
routers on the way D. HTTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 132

16. What is the encapsulation unit for Layer 22. IP media independent process allows for
3? transmission over what types of media?
A. segment A. copper
B. data B. fiber optics
C. packets C. wireless
D. frames
D. copper serial

NARAYAN CHANGDER
17. The network layer responds to request
from which layer? 23. designed for an Internet work environ-
ment with small wireless cells.
A. Transport layer
A. MMP
B. Data layer
B. RMDP
C. Application layer
D. Session layer C. RM2
D. Mobicast
18. Discarding policy is
A. Error control policy 24. One of the header fields in an IP data-
B. Closed loop congestion control policy gram is the Time to Live(TTL)field. Which
of the following statements best explains
C. Open loop congestion control policy the need for this field?
D. None of the above A. It can be used to prioritize packets
19. In closed-loop congestion control, policies B. It can be used to reduce delays
are applied to
C. It can be used to optimize throughput
A. Remove after congestion occurs
D. It can be used to prevent packet loop-
B. Remove after sometime ing
C. Prevent before congestion occurs
D. Prevent before sending packets 25. The network layer issues request to which
layer?
20. In virtual circuit network each packet con- A. Transport layer
tains
B. Data layer
A. only source address
C. Application layer
B. full source and destination address
C. all 0 D. Session layer

D. a short VC number 26. ARP (Address Resolution Protocol) is


working at
21. UDP is used for request/reply because of
A. low overheads A. data link layer

B. better performance B. network layer


C. both C. physical layer
D. none of these D. application layer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 133

27. During the boot process, where will the 32. How do you configure the default gateway
router bootstrap program look for the IOS of a switch?
image by default?

PRACTICE BOOK» NOT FOR SALE


A. ip default gateway
A. flash B. ip route 0.0.0.0 0.0.0.0 <interface>
B. NVRAM C. ip default-gateway
C. RAM D. default ip-gateway
D. ROM
33. What is the default subnet mask for a
28. Which of the following is not a function of Class B ip address?
Network Layer? A. 255.0.0.0
A. Packetizing B. 255.255.0.0
B. Error Control C. 255.255.255.0
C. Routing D. none of above
D. Forwarding
34. In TDM, multiple signals
29. The packet sent by a node to the source to A. share a common bandwidth
inform it of congestion is called
B. modulate subcarriers
A. Explicit
C. are sampled high speeds
B. Discard
D. take turns transmitting
C. Choke
35. The transport layer encapsulation PDU is?
D. Back pressure
A. Segment Header
30. The purpose of the Internet (or Network)
B. Packet Header
layer is
C. Frame Header
A. Prepares or presents the data (email,
file, message) for /from transmission- D. Bit
including applying encryption/decryption
36. Computer networks that provide only a
B. Ensures reliable transmission of data connection-oriented service at the net-
across the network. work layer is called .
C. Ensures the data is correctly routed A. Virtual circuit network (VC)
through the network
B. DATA GRAM
D. Responsible for encoding the data to
C. GRAM
be transmitted on the actual cabled or
wireless channel. D. DATA

31. What type of connectors do router have? 37. The purpose of the Transmission layer is
A. Serial Interface A. Prepares or presents the data (email,
file, message) for /from transmission-
B. Ethernet Interface including applying encryption/decryption
C. Mini USB Interface B. Ensures reliable transmission of data
D. Console/Aux Interface across the network.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 134

C. Ensures the data is correctly routed B. block all ICMP traffic


through the network C. stop incoming traffic from a specific IP
D. Responsible for encoding the data to address but allow outgoing traffic to same
be transmitted on the actual cabled or IP
wireless channel.
D. block TCP traffic from a specific user
38. IPv6 addressing uses? on a specific IP address on multi-user sys-
tem during 9:00PM and 5:00AM
A. 32 bits

NARAYAN CHANGDER
B. 48 bits 43. Why is IPv6 preferred over IPv4?
C. 64 bits A. Better performance in terms of subnet-
D. 128 bits ting
B. Increased address space
39. Routers contain a internet routing table.
What is the purpose of the routing table? C. Support higher transmission speed
A. Forward packets based on routers D. Suitable for both wired and wireless
availability networks
B. used by router to pass along frames to 44. GSM stands for
next hop
A. global system for mobile communica-
C. used by routers to pass bits to next tion
switch
B. General standard for mobile
D. used by routers to make best path de-
terminations C. global standard for mobile communica-
tion
40. Which IPv4 header field identifies the up-
D. none of these
per layer protocol carried in the packet?
A. Protocol 45. When transporting data from real-time ap-
plications, such as streaming audio and
B. Identification
video, which field in the IPv6 header can
C. Version be used to inform the routers and switches
D. Differentiated Services to maintain the same path for the packets
in the same conversation?
41. Which IPv4 address can be used to test the
TCP/IP protocol stack on a host? A. Next Header

A. 127.0.0.1 B. Traffic Class

B. 255.255.255.255 C. Differentiated Services


C. FF-FF-FF-FF-FF-FF D. Flow Label
D. ::1 46. What are three characteristics of the IP
Protocol?
42. A layer-4 firewall ( a device that can look
at all protocol headers up to the transport A. connectionless, connectionful, best ef-
layer) CANNOT fort
A. block HTTP traffic during 9:00PM and B. connectionless, best effort, media in-
5:00AM dependent

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 135

C. connectionful, best effort, media inde- 51. What are the purposes of the Network
pendent header? Select more than 1 answer.

PRACTICE BOOK» NOT FOR SALE


D. none of the above A. Ensures packet is sent in the correct
direction to the destination
47. Which one of the following is not a func- B. Contains information for network layer
tion of network layer? processing
A. routing C. Information in the header is used by a
B. inter-networking Router
D. Information eventually reaches the Ap-
C. congestion control
plication layer
D. error control
52. For which one of the following reasons
48. What does the number 72 identify in the does Internet Protocol (IP) use the timeto-
below IP address:72.22.7.90/8 live (TTL) field in the IP datagram header
A. Identify specific mouse A. Ensure packets reach destination
within that time
B. Identify network
B. Discard packets that reach later than
C. Identify specific computer that time
D. Identify interface C. Prevent packets from looping indefi-
nitely
49. [SELECT ALL THAT APPLY]What is meant
D. Limit the time for which a packet gets
byGeneralized Forwardingin a network
queued in intermediate routers.
switch/router?
A. Forwarding decision is based on the 53. Which layer of the OSI Model is Layer 3
service Port at the destination. A. Data Link Layer
B. Forwarding to an output Port is only B. Network Layer
based on final destination of the data- C. Transport Layer
gram.
D. Session Layer
C. Forwarding decision is based on
TCP/UDP information and destination ad- 54. Which port categories include inbound
dress. ports of HTTP, HTTPS, FTP, and DNS?
D. Forwarding the packet to one or more A. well-known ports
output Ports B. registered ports
C. dynamic ports
50. An organization has a class B network
and wishes to form subnets for 64 depart- D. private ports
ments. The subnet mask would be:
55. Network layer protocol exits in
A. 255.255.0.0 A. Host
B. 255.255.64.0 B. Switches
C. 255.255.128.0 C. Packets
D. 255.255.252.0 D. Bridges

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 136

56. Components in Header of a frame: 61. What are the features of a default gate-
way? Select more than 1 answer.
A. Header, data packet and trailer
A. It has an IP address in the same range
B. Packet, head, trailer as other hosts in the local network
C. Start of frame, address, type/length B. It accepts data into the local network
D. none of above and forwarding data out of the local net-
work
57. The Effect of performance in congestion

NARAYAN CHANGDER
C. It can route to the other networks
area is
D. It cannot be routed to another router
A. The capacity increases the delay de-
creases 62. Which IPv4 address can a host use to ping
the loopback interface?
B. The capacity increases the delay in-
creases A. 126.0.0.1
B. 127.0.0.0
C. The capacity increases the delay is
same C. 126.0.0.0
D. Non of the above D. 127.0.0.1

63. Which statement correctly describes net-


58. Which layer in the OSI model covers HTTP,
work latency?
FTP, and RDC?
A. The measure of the bits transferred
A. Physical across the media over a given period of
B. Session time.
C. Application B. The measure of the usable data trans-
ferred across the media.
D. Presentation
C. The capacity of a particular medium to
59. The Network Layer handles? carry data.

A. Addressing end devices D. The total amount of time it takes to get


from one device to another.
B. Encapsulation
64. [SELECT ALL THAT APPLY] The Network
C. Routing Layer can be divided into DATA Plane func-
D. De-encapsulation tionalities and CONTROL Plane functional-
ities. Which of the following are of the
E. All of the above DATA Plane?
60. Which layer in the OSI model is used to A. Management Functions
verify that data was delivered without er- B. Link Layer Functions
ror?
C. Routing Functions
A. Physical D. Input Ports Lookup Functions
B. Data Link
65. What command allows you to secure re-
C. Network mote access?
D. Transport A. line vty 0 4password

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 137

B. line vty 0 15password 71. Select all protocols involved in the applica-
C. line vty 1 5encrypt tion layer

PRACTICE BOOK» NOT FOR SALE


D. line vty 0 15encrypt A. HTTP
B. HTTPS
66. The command “show interfaces” is used
to look at which layer? C. SMTP
A. Layer 2 D. TCP
B. Layer 3 E. FTP
C. Layer 4
72. is responsible for tunneling multicast
D. Layer 7 packets to the MS’s currently subscribed
FA.
67. In an IP packet header the TTL stands for?
A. Multicast home agent
A. Total Time Live
B. Mobile multicast
B. Time To Live
C. Throttle Time Live C. Mobile station

D. Top Time Live D. Base station

68. In which switching method can packets be 73. Remote networks are?
routed around congestion? A. hosts that do not share the same net-
A. Packet switching work address
B. Circuit switching B. hosts that share the same network ad-
C. Public switched networks dress

D. frame switching C. host that are connected to a switch


and have the same IP address scheme.
69. What is the boot up sequence of a router? D. none of the above
A. POST, Load IOS, Load Startup, Boot-
strap Loader 74. What layer in the OSI model is used to en-
crypt data?
B. POST, Bootstrap Loader, Load IOS,
Load Startup A. Physical
C. Bootstrap Loader, Load IOS, POST, B. Session
Load Startup
C. Application
D. Load IOS, Load Startup, POST, Boot-
D. Presentation
strap Loader

70. The computation of the shortest path in 75. What model is used to describe how data
OSPF is usually done by communication occurs between hosts?
A. Bellman-ford algorithm A. server-centric model
B. Routing information protocol B. workgroup model
C. Dijkstra’s algorithm C. peer-to-peer model
D. Distance vector routing D. OSI reference model

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 138

76. If connectionless service is offered, pack- A. Accepted


ets are injected into the subnet individually B. Discarded
and routed independently of each other.
No advance setup is needed. In this con- C. Interpreted
text, the subnet is called a subnet. D. Interpreted incorrectly
A. Postgram 81. Packets of the same session may be routed
B. Datagram through different paths in:
A. TCP, but not UDP

NARAYAN CHANGDER
C. Virtual Circuit
D. Packet switched B. TCP and UDP
C. UDP, but not TCP
77. Which statement correctly describes frame
encoding? D. Neither TCP nor UDP
A. It generates the electrical, optical, or 82. MANET stand for
wireless signals that represent the binary A. Multi area network
numbers of the frame.
B. multi adhoc network
B. It uses the characteristic of one wave
to modify another wave. C. mobile area network
D. mobile adhoc network
C. It transmits data signals along with a
clock signal which occurs at evenly spaced 83. What stores Bootup information that pro-
time durations. vides the startup instructions?
D. It converts bits into a predefined code A. RAM
in order to provide a predictable pattern
B. ROM
to help distinguish data bits from control
bits. C. COM
D. root
78. what command allows you to enter into
global configuration mode? 84. Two computers C1 and C2 are con-
A. con t figured as follows. C1 has IP ad-
dress 203.197.2.53 and netmask
B. configure terminal 255.255.128.0. C2 has IP ad-
C. config t dress 203.197.75.201 and netmask
D. terminal config 255.255.192.0. which one of the fol-
lowing statements is true?
79. The field determines the lifetime of A. C1 and C2 both assume they are on the
IPv6 datagram same network
A. Hop limit B. C2 assumes C1 is on same network,
B. TTL but C1 assumes C2 is on a different net-
work
C. Next header
C. C1 assumes C2 is on same network,
D. Type of traffic but C2 assumes C1 is on a different net-
80. In version field of IPv4 header, when ma- work
chine is using some other version of IPv4 D. C1 and C2 both assume they are on dif-
then datagram is ferent networks.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 139

85. DNS stands for A. 245.248.136.0/21 and 245.248.128.0/22


A. dynamic name space

PRACTICE BOOK» NOT FOR SALE


B. domain name space B. 245.248.128.0/21 and 245.248.128.0/22

C. domain name system


C. 245.248.132.0/22 and 245.248.132.0/21
D. dynamic name system

86. What are called routers? D. 245.248.136.0/24 and 245.248.132.0/21


A. The devices that operates at session 90. Which statement describes crosstalk?
layer
A. The distortion of the network signal
B. The devices that operates at data layer from fluorescent lighting.
C. The devices that operates at applica- B. The distortion of the transmitted mes-
tion layer sages from signals carried in adjacent
D. The devices that operates at network wires.

87. How does the network layer use the MTU C. The loss of wireless signal over exces-
value? sive distance from the access point.

A. The network layer depends on the D. The weakening of the network signal
higher level layers to determine the MTU. over long cable lengths.

B. The network layer depends on the data 91. What PDU is received by the physical layer
link layer to set the MTU, and adjusts the for encoding and transmission?
speed of transmission to accommodate it. A. Frame
C. To increase speed of delivery, the net-
B. Segment
work layer ignores the MTU.
C. Packet
D. The MTU is passed to the network
layer by the data link layer. D. Data

88. In IPv4, only thing encapsulated in a frame 92. Which one of the following algorithm is not
is used for congestion control?
A. Unit A. traffic aware routing
B. Datagram B. admission control
C. Adresses C. load shedding
D. Data Frame D. routing information protocol

89. A n Internet Service Provider (ISP) 93. Which of the following is a characteristics
has the following chunk of CIDR- of IP?
based IP addresses available with A. Ensure reliable end to end data trans-
it:245.248.128.0/20. The ISP wants to mission
give half of this chunk of addresses to
Organization A, and a quarter to Orga- B. Collisions are avoided in different
nization B, while retaining the remaining transmission media
with itself. Which of the following is a C. Sender doesn’t know if the receiver is
valid allocation of addresses to A and B? listening or the message arrived on time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 140

D. It provides information on the B. Encapsulate Sender and Receiver IP


amounts of memory installed, what IOS address
images was loaded during boot and more C. Routing packets from source to desti-
nation
94. IP Addresses are protocols found at what
layer of the OSI Model? D. De-encapsulation
A. Layer 1 100. The show ip route command shows the
B. Layer 2 route sources. Which are the sources?

NARAYAN CHANGDER
A. L-directly connected local interface IP
C. Layer 3
address
D. Layer 4
B. C-directly connected network
95. The services that is provided by the data C. S-static route was manually config-
link layer is ured by administrator
A. frame D. O-OETI
B. framing E. E-EIGRP
C. framed 101. IPv6 was developed by
D. none of above A. IEEE
B. ICANN
96. DHCP is based on a model
C. IETF
A. peer to peer
D. NCS
B. client/server
102. A 4 byte IP address consists of
C. one to many
A. Only Network address
D. none of these
B. Both Network and host address
97. In IPv4, service type of service in header C. Only MAC address
field, first 3 bits are called
D. Only Host Address
A. Type of service
103. Network layer receives segment from
B. Code bits transport layer and the resulting PDU is
C. Sync bits called
D. Precedence bits A. Packet
B. Segment
98. Length of IPv6 address
C. Data
A. 48 bit
D. Frame
B. 32 bit
104. The command “show ip interface brief”
C. 64 bit is used to look at which layer?
D. 128 bit A. Layer 2
99. Which processes are adopted by the Net- B. Layer 3
work layer? Select more than 1 answer. C. Layer 4
A. Addressing end devices D. Layer 7

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 141

105. SIP can be used for A. 172.57.88.62 and 172.56.87.233


A. voice B. 10.35.28.2 and 10.35.29.4

PRACTICE BOOK» NOT FOR SALE


B. video C. 191.203.31.87 and 191.234.31.88
C. instant messaging D. 128.8.129.43 and 128.8.161.55
D. all the above
112. which one is the APIPA address?
106. IP-in-IP is method for A. 169.255.0.5
A. tunneling B. 169.254.255.254
B. encapsulation C. 169.255.254.255
C. error detection D. 169.255.255.254
D. routing
113. Network layer at source is responsible
107. How many layers are in the OSI model? for creating a packet from data coming
A. 3 from another
B. 4 A. Link
C. 6 B. Node
D. 7 C. Station
D. Protocol
108. IPv6 consists of bits.
A. 32 114. What identifies a directly connected net-
work?
B. 64
C. 128 A. L

D. 256 B. D
C. R
109. The network between 2 nodes is
D. C
A. cable
B. link 115. If a class B network on the Internet has
a subnet mask of 255.255.248.0, what
C. physical layer
is the maximum number of hosts per sub-
D. none of above net?
110. How many bits are in an ipv4 address? A. 1022
A. 16 B. 1023
B. 32 C. 2046
C. 64 D. 2047
D. 128 116. Which of the following is false with re-
111. The subnet mask for a particular network spect to the features of OSPF?
is 255.255.31.0. Which of the following A. Support for fixed-length subnetting by
pairs of IP addresses could belong to this including the subnet mask in the routing
network? message

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 142

B. More flexible link cost than can range 121. Which level is the network layer in the
from 1 to 65535 OSI model?
C. Use of designated router A. 3
D. Distribution of traffic over multiple B. 4
paths that have equal cost to the destina- C. 2
tion
D. 5
117. What statement describes an advantage

NARAYAN CHANGDER
that the IPv6 simplified header offers over 122. Which layer in the OSI model includes the
IPv4? cable and network adapters?

A. IPv6 has a smaller-sized IP header. A. Physical

B. Checksums in the trailer have been en- B. Session


hanced in IPv6. C. Application
C. Source and destination IP addresses D. Presentation
are smaller in IPv6.
123. What are the some of the fields in the
D. IPv6 provides end to end connectivity IPv4 Packet? Select more than 1 answer
and eliminates the need for NAT.
A. Source IP address
118. Data in network layer is transferred in B. Destination IP address
the form of
C. Protocol
A. Packets
D. Time-to-live
B. chunks
E. ID
C. Frame
D. information 124. What layer in the OSI model is responsi-
ble for logging on and off?
119. Which protocol is used to translate IP ad- A. Physical
dresses to MAC addresses?
B. Session
A. RARP
C. Application
B. ARP
D. Presentation
C. DNS
D. WINS 125. registration of mobile node is done
through
120. Which of the followin is correct for Vir- A. TCP
tual packet switched network
B. IP
A. avoid having to choose a new route for
every packet sent C. Mobile IP

B. route is used for all traffic flowing over D. UDP


the connection 126. SSH and Telnet are remote connection
C. each packet carries an identifier points. How would a technician connect
telling which virtual circuit it belongs to to the router?
D. All of the above A. Through the WAN Connection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 143

B. Through the LAN Connection 132. When a router receives a packet, what
C. The Console Port information must be examined in order for
the packet to be forwarded to a remote

PRACTICE BOOK» NOT FOR SALE


D. The Aux Port destination?
127. Which among the following features is A. Source IP address
present in IPv6 but not in IPv4? B. Destination IP address
A. Fragmentation C. Source MAC address
B. Header checksum D. Destination MAC address
C. Options
133. When a connectionless IP protocol is in
D. Anycast address
use in the OSI model, how are dropped
128. Dividing a network address into smaller packets detected and retransmitted?
networks can be called as A. Connectionless acknowledgements
A. encapsulation are used to request retransmission.
B. subnetting B. A Transport layer connection-oriented
protocols keep track of the data received
C. decapsulation and can request retransmission from the
D. fragmentation sending host.

129. Network layer is layer of OSI C. Network layer IP protocols manage


the communication sessions if connection-
A. 3 oriented transport services are not avail-
B. 4 able.
C. 5 D. The best-effort delivery process guar-
D. 1 antees that all packets that are sent are
received.
130. The 4-layer network model in ORDER
are: 134. Which of the following is FALSE about
IPv6?
A. Transport / Application / Link Layer /
Physical A. Header is fixed at 40 bytes or octets
long
B. Application / Transport / Internet /
Network (Data Link Access) B. IPv6 header is simplified but larger
C. FTP / TCP / IP / ETHERNET C. IPv4 fields such as Flag, Fragment off-
set and header checksum are removed
D. Physical / Link Layer / Transport / Ap-
plication D. IPv6 header is more complicated and
larger
131. IPv6 is designed to allow extension of
the 135. UDP destination port is set to
A. Protocol A. 404
B. Routes B. 80
C. DataSet C. 434
D. Headers D. 100

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 144

136. In IPv4, fragmented datagram’s frag- B. Internet Control Message Protocol


ment size should have first byte number C. Interconnect Control Message Proto-
divisible by col
A. 2 D. Interconnect Coordinate Message Pro
B. 4
141. Which value, that is contained in an
C. 8 IPv4 header field, is decremented by each
D. 16 router that receives a packet?

NARAYAN CHANGDER
137. The size of an IP address in IPv6 is A. Header Length
B. Time-to-Live
A. 4 bytes
C. Fragment Offset
B. 128 bits
D. Differentiated Services
C. 8 bytes
D. 100 bits 142. ICANN:Internet Corporation for Assigned
Names and Numbers task:
138. What are the three major phases to the
A. manages DNS
bootup process?
B. allocates addresses
A. Perform the POST and load the boot-
strap program. C. both answer
B. Locate and load the Cisco IOS soft- D. none of above
ware.
143. What is a basic characteristic of the IP
C. Locate and load the startup configura- protocol?
tion file or enter setup mode.
A. connectionless
D. Allocate resources from the BIOS.
B. media dependent
E. Locate the MAC and ARP tables.
C. user data segmentation
139. Which statement correctly describes sig- D. reliable end-to-end delivery
naling?
144. CoAP provides which of the following re-
A. It uses the characteristic of one wave
quirements?
to modify another wave.
A. Multicast support and simplicity
B. It converts bits into a predefined code
in order to provide a predictable pattern B. Low overhead and multicast support
to help distinguish data bits from control C. Simplicity and low overhead
bits.
D. Multicast support, Low over head, and
C. It transmits data signals along with a simplicity
clock signal which occurs at evenly spaced
time durations. 145. IPv4 Addressing contain?
D. It converts the frame binary numbers A. 32 bits
into electrical, optical, or wireless signals. B. 4 octets separated by dotted decimals
140. ICMP stands for C. 48 Bits
A. Internet Coordinate Message Protocol D. 128 Bits

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 145

146. What type of route is manually config- C. Application Layer


ured in a routing table, includes the desti- D. Physical Layer
nation network along with either the exit

PRACTICE BOOK» NOT FOR SALE


interface or a next hop address to direct 152. CoAP is specialized in
traffic towards the destination network? A. Internet applications
A. Directly-connected routes B. device applications
B. Local routes C. wireless applications
C. Static routes D. Wired applications
D. Dynamic routes 153. If the device determines that the desti-
nation IP address is within the same net-
147. How often does a RIPv1 router broad- work, then it will forward the packet to
cast its routing table by default?
A. Every 30 seconds A. To the router
B. Every 60 seconds B. To the destination directly
C. Every 90 seconds C. To itself
D. RIPv1 does not broadcast periodically D. All of them

148. Which layer of the OSI model is used 154. Which of the following are characteristics
to create a connection so that a host can of IP Protocol? Select more than 1 an-
transfer files? swer.
A. Physical A. Connectionless-no connection is estab-
lished before sending data packets
B. Session
B. Best effort delivery-does not guaran-
C. Application tee packet delivery
D. Presentation C. Stateful-information about connection
is retained for future use
149. IP is connectionless.
D. Media independent-operates indepen-
A. true dently of the medium carrying the data
B. false
155. What are advantages of dividing net-
C. Time oriented conection work transmission into layers? Select one
D. Connection oriented answer only
A. Network communication components
150. The data link layer is located between: are standardised which helps to ensure
A. application layer and transport layer that different types of hardware and soft-
B. transport layer and network layer ware are able to communicate.
B. Through separating the overall net-
C. network layer and physical layer
work communication processes it makes
D. none of above troubleshooting easier should an error oc-
cur.
151. IPSec is designed to provide security at
C. To ensure that if changes are made in
A. Transport Layer one layer they do not affect any other lay-
B. Network Layer ers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 146

D. Through dividing overall network com- C. Exchanging frames between nodes


munication into smaller, individual compo- over physical network media.
nents it makes the software development D. Performing error detection on re-
process more straightforward. ceived frames.
E. All of the above
161. Host can send packet to Select more
156. In , the router forwards the received than 1 answer.
packet through only one of its interfaces A. Itself-127.0.0.1

NARAYAN CHANGDER
A. Unicasting B. Local host-which is another host in the
B. Multicasting same network
C. Broadcasting C. Remote host-which is another host in
D. None of the above a different network
D. Only other hosts
157. IP stands for
A. Internet packet 162. Which key combination allows a user to
abort setup mode?
B. information protocol
A. Ctrl-C
C. internet protocol
B. Ctrl-Z
D. information packet
C. Ctrl-R
158. What command allows you to secure user D. Ctrl-Shift-6
EXEC mod
A. line console 0grep 163. Which command will help you provide le-
gal notification?
B. line console 0password
A. terminal banner
C. line console 0encrypt
B. terminal router
D. line console 0secure
C. banner motd
159. What’s the primary purpose of a router?
D. terminal motd
A. Deliver packets to PC’s on local seg-
ments. 164. which one is the loopback ip address?
B. It controls the data flow of Layer 2 ad- A. 169.254.0.1
dresses. B. 0.0.0.0
C. It provides Layer 2 address data seg- C. 127.0.0.1
mentation.
D. 128.0.0.1
D. Deliver packets to different networks
using the best available path. 165. In IPv4 protocol, each datagram is han-
dled
160. What is the purpose of the OSI physical
layer? A. independently

A. Controlling access to media. B. dependently

B. Transmitting bits across the local me- C. priority basis


dia. D. systematically

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 147

166. The data link layer of sending node needs B. Ensures reliable transmission of data
to across the network.

PRACTICE BOOK» NOT FOR SALE


A. encapsulate the datagram/packet C. Ensures the data is correctly routed
B. decapsulate the datagram/packet through the network
C. release the datagram D. Responsible for encoding the data to
be transmitted on the actual cabled or
D. none of above
wireless channel.
167. Propagation delay depends on
172. Frame contains
A. Packet length
A. Header, data packet and trailer
B. Transmission rate
B. Tail, data packet and header
C. Distance between the routers
C. Data packet, head, trailer
D. Speed of the CPU
D. none of above
168. In a network, if P is the only packet be-
ing transmitted and there was no earlier 173. The role of the Gateway is to?
transmission, which of the following de- A. Direct traffic routes to only one net-
lays could be zero work
A. Propagation delay
B. Direct traffic routes to other con-
B. Queuing delay nected networks
C. Transmission delay C. Has an IP address in the same address
D. Processing delay range as other host on the same network
D. Has a different IP address compared
169. Network layer provides delivery
to host systems on the same network
A. Host to Host
B. END to END 174. What is the purpose of show ip route?

C. HOST TO END A. Displays statistics for all routes on the


device
D. END TO HOST
B. Displays the contents of the IPv4 rout-
170. Which portion of the network layer ad- ing table stored in RAM
dress does a router use to forward pack-
C. Displays the IPv6 routes for all inter-
ets?
faces on a router
A. host portion
D. Show how the content of routes stored
B. gateway address in NVRAM
C. broadcast address
175. Which layer in the OSI model do MAC ad-
D. network portion dresses and switches use?
171. The purpose of the Network Access(or A. Physical
Data Link) layer is
B. Data Link
A. Prepares or presents the data (email,
file, message) for /from transmission- C. Network
including applying encryption/decryption D. Transport

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 148

176. What command do you use to save the C. DAT


configuration? D. IETF
A. cop r t
181. Which field in the IPv4 header is used
B. startup-config save
to determine the priority of each packet
C. copy running-config startup-config when setting precedence of one type of
D. save running-config data over another?
A. Time-to-Live

NARAYAN CHANGDER
177. Which of the following is NOT true with
respect to a transparent bridge and a B. Sequence Number
router? C. Acknowledgment Number
A. Both bridge and router selectively for- D. Differentiated Services
ward data packets
B. A bridge uses IP addresses while a 182. What is TRUE about the router? Select
router uses MAC addresses more than 1 answer

C. A bridge builds up its routing table by A. When router receives a packet, it


inspecting incoming packets reads the destination IP address from the
header to determine the destination net-
D. A router can connect between a LAN work address
and a WAN
B. Router will check the destination net-
178. Each packet is routed independently in work address in its routing table
networks C. If destination network address is
A. Datagram found in the routing table, it forwards the
B. Virtual circuit packet

C. Data D. If destination network address is NOT


found in the routing table, it discards the
D. all packet
179. Which statement describes bandwidth? 183. DHCP works in which layer of OSI model
A. The speed at which bits travel on the A. Session
network.
B. network
B. The theoretical capacity of a medium
to carry data. C. Datalink
C. The amount of data that can flow from D. transport
across the internet in a given amount of
time. 184. What is the purpose of default gate-
way?
D. The measure of usable data trans-
ferred over a given period of time. A. Enable routers to send packets using
the default routes
180. What is a technology commonly imple- B. Default gateways are layer 2 switches
mented in IPv4 networks? which forward packets to routers
A. TTL C. A list of gateways for linking wired to
B. NAT wireless networks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 149

D. Hosts will use the default gateway 190. TCP/IP and IPX/SPX are known as
when sending packets to remote net- A. IP address
works.

PRACTICE BOOK» NOT FOR SALE


B. Layer 3 Switch
185. Where are the router configuration files C. Protocol stack
saved to? D. Router ports
A. Flash
191. Which statement is true regarding class-
B. ROM less routing protocol?
C. NVRAM A. The use of discontinuous networks is
not allowed
D. PC RAM
B. Use of variable length subnet masks is
186. What route sources in show ip route com- permitted
mand means directly connected network? C. RIPv1 is a classless routing protocol
A. L D. IGRP supports classes routing within
the same autonomous system
B. C
C. S 192. The ip address 127.0.0.1 is referred to
as the loopback interface. Why?
D. D
A. The pining of the loopback interface
187. What are the common protocols associ- tests the TCP/IP stack of the local NIC
ated with the network layer? B. Is on the same network of the sending
host
A. Address Resolution Protocol
C. The host is on a remote network.
B. Reverse Address Resolution Protocol
D. none of the above
C. Internet protocol
193. When is the default gateway needed?
D. Neighbour Discovery Protocol
A. on all data transmission
188. What command will secure privileged B. only on data transmission on remote
EXEC mode. networks
A. enable encrypt C. On data transmission on Local Area
Networks
B. enable password
D. None of the above
C. password on
194. The address of a class B host is to be split
D. enable secret
into subnets with a 6-bit subnet number.
What is the maximum number of subnets
189. In ARP, a packet is encapsulated directly
and the maximum number of hosts in each
into a
subnet?
A. Datalink Integer
A. 62 subnets and 262142 hosts.
B. Network Frame B. 64 subnets and 262142 hosts.
C. Network Station C. 62 subnets and 1022 hosts.
D. Datalink Frame D. 64 subnets and 1024 hosts.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 150

195. Compared to IPv4 Header, IPv6 Headers 200. A computer can access devices on the
are? same network but cannot access devices
on other networks. What is the probable
A. has less field thus allowing for more
cause of this problem?
efficient packet handling
B. contains more fields and has more A. The cable is not connected properly to
overhead the NIC.

C. same number of fields and does the B. The computer has an invalid IP ad-
dress.

NARAYAN CHANGDER
same operations as IPv4
D. none of the above C. The computer has an incorrect subnet
mask.
196. ICMP is primarily used for D. The computer has an invalid default
A. error and diagnostic functions gateway address.
B. addressing 201. SDP stands for
C. forwarding A. Session Description Protocol
D. routing B. session dynamic protocol
197. What is meant by Destination-based For- C. System Description Protocol
wardingin a network switch/router? D. System dynamic protocol
A. Forwarding decision is based on the
service Port at the destination. 202. You type debug IP rip on your router con-
sole and see that 172.16.10.0 is being ad-
B. Forwarding to an output Port is based
vertised to you with a metric of 16. What
on final destination of the datagram.
does this mean?
C. Forwarding decision is based on
A. The route is 16 hops away Debug IP rip
TCP/UDP information and destination ad-
dress. B. The route has a delay of 16 microsec-
onds Debug IP route
D. None of the above
C. The route is inaccessible
198. What command allow you to interface a
D. The route is queued at 16 messages a
gigabyte ethernet port 0/1
second
A. int g0/1
203. Suppose computers A and B have IP ad-
B. interface g0/1
dresses 10.105.1.113 and 10.105.1.91
C. inter g0/1 respectively and they both use the same
D. interface ge0/1 netmask N. Which of the values of N given
below should not be used if A and B should
199. Firewalls helps to provide belong to the same network?
A. speed A. 255.255.255.0
B. protection B. 255.255.255.128
C. large bandwidth C. 255.255.255.192
D. latency D. 255.255.255.224

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 151

204. No overhead is used to guarantee packet 209. What is Routing?


delivery means that IP is ? (Pick two) A. to take the large network and filter it,

PRACTICE BOOK» NOT FOR SALE


A. Media Independent without changing the size of the network.
B. Best Effort B. to check messages are sent to the
right device.
C. Connectionless
C. the process of finding a path on which
D. Unreliable data can pass from source to destination
205. Mechanism that decides the best route D. provide optional services to an applica-
for data transmission tion developer

A. Switching 210. Identify the class of ip 129.13.42.99


B. Packeting A. A
C. Framing B. B

D. all C. C
D. D
206. What command do you use to configure a
device name? 211. In Internetwork, network layer is respon-
sible for
A. myname
A. Host to User Link
B. compname
B. User to Host IP
C. hostname C. Host to Host Delivery
D. namehost D. Host to Server communication
207. The Internet offers & network- 212. What show commands allows you to see
layer service all the configurations you entered into the
A. Connection oriented Router CLI?
A. show run
B. Reliable
B. show running-config
C. connectionless and unreliable
C. show all config
D. None of the above
D. show ip route
208. Which of the following IPv4 header field
213. Which of the following statements de-
statements is correct?
scribes characteristics of the IP protocol?
A. The source and destination IPv4 ad- A. Operates without a dedicated end-to-
dresses remain unchanged while travel- end connection and uses best effort in de-
ing from source to destination. livering packets.
B. The Time to Live field is used to deter- B. Detects and retransmits packets if er-
mine the priority of each packet. rors occur.
C. The Header Checksum identifies the C. Re-assembles out of order packets
upper layer protocol type. into the correct order at the receiver end.
D. The Version field identifies the next D. Guarantees delivery of packets to the
level protocol. destination network.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 152

214. Computer networks that provide only A. Interface List


a connectionless service at the network B. IPv6 Route Table
layer are called
C. IPv4 Route Table
A. Datagram
D. MAC Table
B. Virtual circuit network
C. Virtual 219. Which two of the following are private
IP addresses? (Choose 2.)
D. network

NARAYAN CHANGDER
A. 12.0.0.1
215. Which layer in the OSI model is included B. 168.172.19.39
in the TCP/IP model?
C. 172.20.14.36
A. Physical
D. 175.88.44.99
B. Data Link
E. 192.168.24.43
C. Transport
220. What are the most common ways to con-
D. Application
nect to Cisco switch, to access user EXEC
216. Two connected routers are configured mode. (Pick two)
with RIP routing. What will be the result A. Virtual Interface
when a router receives a routing update
B. Packet Tracer
that contains a higher-cost path to a net-
work already in its routing table? C. Team-Viewer
A. The updated information will be added D. Console Connection
to the existing routing table Debug IP rip
221. Network Layer PDU encapsulates what
B. The update will be ignored and no fur- information?
ther action will occur Debug IP route
A. Source IP Address
C. The updated information will replace
B. Destination IP Address
the existing routing table entry
C. Source MAC Address
D. The existing routing table entry will
be deleted from the routing table and all D. Destination MAC Address
routers will exchange routing updates to
222. What is the “C” routes in Cisco Routing
reach convergence
table?
217. What is the basic purpose of ARP? A. Information on:how the route was
A. To convert MAC addresses to IP ad- learned, its trustworthiness and rating
dresses B. Identifies a directly-connected net-
B. To list all configured interfaces on a work, automatically created when an in-
system terface is configured with an IP address
and activated.
C. To list the MAC name of a host machine
C. Identifies that this is a local interface.
D. To resolve IP addresses to MAC ad- This is the IPv4 address of the interface
dresses on the router.
218. What are the three sections displayed D. Indicated the routes which are config-
when “netstat-r” is entered? ured by users.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 153

223. A computer wants to send a packet to 227. What type of route is indicated by the
a destination host in a different network. routing code C in an IPv4 routing table on
How will the packet be sent? a Cisco router?

PRACTICE BOOK» NOT FOR SALE


A. The computer will issue an ARP re- A. Static route
quest to locate the MAC address of the de- B. Default route
fault gateway.
C. Directly connected route
B. The packet will be sent directly to the
D. Dynamic route that is learned through
destination host.
EIGRP
C. The computer will issue an ARP re-
quest to locate the destination host MAC 228. Which protocol support mobility for the
address. network layer
A. TCP
D. The computer will issue an ARP re-
quest to locate the the MAC address of the B. IP
switch. C. Mobile IP
224. What are the required steps for configur- D. UDP
ing an interface on a router? (Choose two) 229. Which of the following routing algo-
A. Provide Layer 3 addressing informa- rithms can be used for network layer de-
tion sign?
B. Add a description to the interface A. shortest path algorithm
C. Turn on routing on the interface B. distance vector routing

D. Activate the interface C. link state routing


D. all of the above
225. What application is automatically exe-
cuted when an IP address must be matched 230. When using Best Effort Process, what is
to a MAC address? the likelihood that all the packets will be
received?
A. ARP
A. The protocol is reliable and will receive
B. RARP all packets
C. DHCP B. The protocol is unreliable and might
D. DNS not receive all the packets
C. The protocol manages the process of
226. The address resolution protocol (ARP) is tracking packets and ensuring their deliv-
used for: ery
A. Finding the IP address from the DNS D. The protocol provides no capability of
packet retransmission if errors occur
B. Finding the IP address of the default
gateway 231. Which statement describes attenuation?
C. Finding the IP address that corre- A. The loss of wireless signal over exces-
sponds to a MAC address sive distance from the access point.
D. Finding the MAC address that corre- B. The distortion of the network signal
sponds to an IP address from fluorescent lighting.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 154

C. The weakening of the network signal 237. ARP stands for:


over long cable lengths. A. Address Resolution Phase
D. The distortion of the transmitted mes-
B. Address Resolution Protocol
sages from signals carried in adjacent
wires. C. Address Recall Protocol
D. ARP Resolution Protocol
232. Components in Trailer of a frame:
A. Packet, head, trailer 238. Which layer in the OSI model covers rout-

NARAYAN CHANGDER
ing between networks?
B. Start of frame, address, type/length
A. Physical
C. FCS/Frame check sequence and Stop
Frame B. Data Link
D. none of above C. Network
D. Transport
233. Example of proactive routing protocol
A. AODV 239. Which protocol do you use as the trans-
B. DSDV port protocol for a video application?

C. DSR A. TCP

D. all the above B. UDP


C. FTP
234. The network layer contains which hard-
ware device? D. RDC

A. Routers, Bridges 240. When configuring a host, the gateway


B. Bridges only was not configured. How will this affect
communication to and from this device?
C. Bridges and switches
A. Host communication will not be af-
D. Routers, Bridges and Switches fected.
235. Which media uses microwave signals to B. The host will not be able to communi-
represent bits? cate with devices by name.
A. Copper C. Communications will be limited to
B. Wireless hosts in the local network.

C. Fiber-optic D. No communication will be successful


to or from the host.
D. Point-to-Point
241. What are two functions that are provided
236. What command allows you to enter into by the network layer? (Choose two.)
privileged exec mode on a switch or
router? A. carrying data between processes that
are running on source and destination
A. enable hosts
B. stable B. providing end devices with a unique
C. topple network identifier
D. en C. placing data on the network medium

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Introduction 155

D. directing data packets to destination 246. What network intermediary device do


hosts on other networks you find at Layer 3?
A. Hub

PRACTICE BOOK» NOT FOR SALE


E. providing dedicated end-to-end con-
nections B. Switch
242. Within a production network, what is the C. Router
purpose of configuring a switch with a de- D. Layer 3 Switch
fault gateway address?
247. Header of datagram in IPv4 has
A. A switch must have a default gateway
to be accessible by Telnet and SSH. A. 0 to 20 bytes
B. 20 to 40 bytes
B. Hosts that are connected to the switch
can use the switch default gateway ad- C. 20 to 60 bytes
dress to forward packets to a remote des- D. 20 to 80 bytes
tination.
248. Which statement describes throughput?
C. The default gateway address is used
to forward packets originating from the A. The measure of the bits transferred
switch to remote networks. across the media over a given period of
time.
D. It provides a next-hop address for all
B. The measure of the usable data trans-
traffic that flows through the switch.
ferred across the media.
243. Which field is used to detect corruption in C. The theoretical capacity of a particular
the IPv4 header? medium to carry data.
A. Header Checksum D. The total amount of time it takes to get
B. Time to Live from one device to another.
C. Protocol 249. ARP protocol belongs to which layer?
D. Differentiated Services A. Physical Layer
B. Data Link Layer
244. A one-to-all communication between one
source and all hosts on a network is clas- C. Network layer
sified as D. Application Layer
A. Unicast 250. The data link layer of receiving node
B. Multicast needs to
C. Broadcast A. encapsulate the datagram/packet
D. None of the above B. decapsulate the datagram/packet
C. release the datagram
245. Which field in the IPv4 header is used
to prevent a packet from traversing a net- D. none of above
work endlessly? 251. A layer 3 switch is similar to a
A. Sequence Number A. Hub
B. Acknowledgment Number B. Router
C. Time-to-Live C. Switch
D. Differentiated Services D. Data Link

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 156

252. Default Gateway is configured on the D. Wrapping a foil shield around the wire
host pairs.
A. Statically
257. What is the command to enter a highly
B. Through DHCP secured encrypted password cisco?
C. Both Staticallyand through DHCP A. enable password cisco
D. Either statically or through DHCP B. enable secret cisco
253. What ports are defined above 49, 152? C. enable cisco

NARAYAN CHANGDER
A. well-known ports D. password cisco encrypted
B. registered ports 258. If an ARP request is broadcast, an ARP
C. dynamic ports reply is
D. sliding ports A. Universal
254. How many layers does the TCP/IP model B. Unicast
have? C. Muticast
A. 3 D. Bidirectional
B. 4
259. When using the netstat-r command on
C. 6 a host, you see a route 0.0.0.0 0.0.0.0.
D. 7 What does this route represent?

255. Cisco routers use a fast type of RAM A. The host has no routes available for
called what? forwarding packets.

A. NVRAM B. This is a route for testing local commu-


nication.
B. IOS2.0
C. Destinations without a specified route
C. SDRAM are forwarded to the gateway.
D. FVRAM
D. The host does not have an IP address
256. What technique is used with UTP cable configured.
to help protect against signal interference
260. Which layer of the OSI model includes
from crosstalk?
VLANs?
A. Twisting the wires together into pairs.
A. Physical
B. Terminating the cable with special
B. Data Link
grounded connectors.
C. Encasing the cables within a flexible C. Network
plastic sheath. D. Transport

4.2 NETWORK-LAYER PROTOCOLS


1. At which layer of the OSI model would a A. physical layer
physical address be encapsulated?
B. data link layer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 157

C. network layer 7. What network communication process de-


D. transport layer termines when a host should send mes-
sages?

PRACTICE BOOK» NOT FOR SALE


2. What is encryption? A. Time to live (ttl)
A. A secret code used to keep data safe
B. Flow control
B. A key which is applied to data to scram-
ble it C. Access method

C. A set of numbers used to replace let- D. Response timeout


ters in data that is transmitted
8. The owners of a large bakery have a Lo-
D. A message that is kept secret cal Area Network (LAN) with a star topol-
3. The OSI model has layers. ogy. They order their supplies over the
Internet. When data is transmitted from
A. 4 the bakery to the supplier, network pro-
B. 5 tocols are used.Define what is meant by a
‘network protocol’.
C. 6
A. A network protocol defines rules for
D. 7
data transmission
4. What is the maximum header size of an IP B. A network protocol is the radio waves
packet? used for data transmission.
A. 32 bits
C. A network protocol is the physical ca-
B. 64 Bits bles used for data transmission
C. 16 Bits D. none of above
D. 48 Bits
9. Which layer of the TCP/IP model splits
5. A protocol that downloads emails onto a data into packets and reassembles them
client computer and removes the mail mes- at the destination?
sage from the mail server.
A. Application
A. SMTP
B. Transport
B. SFTP
C. Internet
C. POP
D. IMAP D. Network Access

E. HTTPS 10. What hardware device routes packets


around the computers in your home and
6. Which of these Protocols deals with
to/from the internet?
Email?
A. HTTP, TLS and DNS A. Network interface card

B. POP, IMAP and SMTP B. Repeater

C. DCHP and FTP C. Router


D. IPv4 and IPv6 D. Bridge

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 158

11. What is an advantage of Wifi over Ether- in HTML, but adds a layer of secu-
net? Answers:3 rity/authentication.Used when accessing
A. Cheap set up costs a webpage/website where you may want
to encrypt data-e.g. a Bank website.
B. More exensive
A. TCP/IP (Transmission Control Proto-
C. Can connect multiple devices without col/Internet Protocol)
the need for extra hardware
B. HTTP (Hyper Text Transfer Protocol)
D. Less disruption to building due to no
C. HTTPS (Hyper Text Transfer Protocol

NARAYAN CHANGDER
wires being installed
Secure)
E. Faster transfer speeds
D. FTP (File Transfer Protocol)
12. This is the telecommunication protocol that 16. TCP/IP is a set of protocols based on lay-
all computers must use to be part of the In- ers.With regards to network protocols, de-
ternet. fine what is meant by a ‘layer’.
A. Internet Protocol A. A division of network functionality
B. FTP B. The hierarchy of network cables and
C. Border Gateway Protocol their associated speeds
D. DHCP C. Packets being sent in layers.
D. none of above
13. A MAC Address is usually recorded in
A. Binary 17. You would use TCP/IP to
B. Denary A. Send data across a network

C. Floats B. Add an extra level of security to a load-


ing webpage
D. Hexadecimal
C. Locate and load an HTML page
14. Allows an email client to download an D. none of above
email from an email server. It is sim-
ple and does not offer many features ex- 18. Ensures that communication between a
cept for download. Its design assumes host and a client are secured by encrypt-
that the email client downloads all avail- ing communications.
able email from the server, deletes them A. FTP
from the server and then disconnects.Used B. HTTPS
when sending an email to a friend from a
web browser or email client C. USD

A. POP (Post Office Protocol) D. URL

B. IMAP (Internet Message Access Pro- E. HTTP


tocol) 19. What are the two main frequencies used
C. SMTP (Simple Mail Transfer Protocol) for Wifi?
D. none of above A. 1.2 GHz
B. 2.4 GHz
15. Defines how multimedia webpages are
identified, requested and transferred. C. 5 GHz
Webpages are generally constructed D. 10 GHz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 159

20. What is the purpose of the default gate- D. Two devices using the same / overlap-
way address configured on a host? ping channels will amplify transfer speeds

PRACTICE BOOK» NOT FOR SALE


A. To allow traffic that is destined for 24. Which protocol would you use to send an
another network to be forwarded to the email form the client to the recipient?
router for network determination and de-
A. IMAP
livery.
B. SMTP
B. To forward traffic within the same net-
work. C. POP3
C. To broadcast messages out to other D. HTTP
hosts on the same network. 25. What protocol governs the transmission of
D. To connect to the DHCP server. data over a wired network?

21. An IPv6 address consists of bytes A. Wi-Fi


(octets). B. POP
A. 4 C. IP
B. 8 D. Ethernet
C. 16 26. This is one of two protocols that let a
D. None of the above network administrator supervise and dis-
tribute IP addresses from a central point.
22. Defines how multimedia webpages are It automatically sends a new IP address
identified, requested and transferred. when a computer is plugged into a differ-
Webpages are generally constructed ent place in the network.
in HTML.Used when accessing a web- A. DHCP
page/website where security isn’t an is-
sue. B. TCPMAN
C. TCP
A. TCP/IP (Transmission Control Proto-
col/Internet Protocol) D. UDP
B. HTTP (Hyper Text Transfer Protocol) 27. In the layer model, if one layer is improved
C. HTTPS (Hyper Text Transfer Protocol what happensto the other layers?
Secure) A. They are updated
D. FTP (File Transfer Protocol) B. They break

23. Explain why different wifi channels are C. They can no longer communicate
available.Answers:3 D. Nothing, layers are independent.
That’s thepoint of them
A. A channel is the range of frequencies
that will transmit data 28. Where is a MAC address stored?
B. Two devices using the same / overlap- A. In the computer
ping channels will be subject to interfer-
B. On the NIC
ence
C. As a list in the router
C. Choice of channel allows users to re-
duce / minimise interference from other D. In the modem
devices E. On the Internet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 160

29. The wifi connection can be set up on one of 34. Which protocol governs the transmission
five different frequency bands.(i) Identify of data in a wireless network?
what is meant by the frequency of a wifi
A. SMTP
signal.Answers:2
A. The rate at which the signal changes B. TCP
// number of times it repeats per unit of C. Wi-Fi
time
D. IP
B. Measured in GHz

NARAYAN CHANGDER
C. Measured in KHz 35. The DHCP server can provide the of
D. The frequency of connection from a de- the IP addresses.
vice to a router/hub/switch A. dynamic allocation
30. Ethernet is a protocol for data transmis- B. automatic allocation
sion in a
C. static allocation
A. Wired network
D. all of the above
B. Wireless network
C. Mail server 36. Provides the rules to be followed by a web
D. Web server server and a web browser when request-
ing and supplying data.
31. Which protocol is most commonly used to
deliver web pages? A. FTP
A. HTTP B. SFTP
B. HTML C. HTTP
C. CSS
D. HTTPS
D. FTP
E. SMTP
32. What type of message is sent to a specific
group of hosts? 37. What layer of the TCP/IP protocol model
A. unicast determines the best path through the net-
work?
B. multicast
C. broadcast A. application

D. static B. transport

33. Which are true about WiFi? C. internet


A. There are 2 main frequency bands for D. network access
WiFi
B. WiFi frequencies are measured in gi- 38. OSI stands for
gaHertz A. open system interconnection
C. You can use any frequency for WiFi sig- B. operating system interface
nals
C. optical service implementation
D. You can only use WiFi with a smart-
phone D. none of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 161

39. A bank uses a local area network to B. for unlimited period


connect all the computers in its head of- C. not time dependent
fice.Computers in the network can be iden-

PRACTICE BOOK» NOT FOR SALE


tified using both IP addresses and MAC ad- D. none of the above
dresses.Describe the difference between 43. Which of these is a valid IPv4 address?
IP addresses and MAC addresses.
A. 192.168.2.256
A. -IP addresses can be changed / are al-
B. 192.168.2.1000
located as needed-MAC addresses can’t
be changed / every device has a fixed MC C. 192.168.2.200
address D. 192.168.2.328
B. -IP(v4) addresses are 4 bytes long- 44. An IPv6 address is bits long.
MAC addresses are 6 bytes long
A. 32
C. -IP(v4) addresses are normally writ-
B. 64
ten in denary-MAC addresses are nor-
mally written in Hex C. 128
D. -IP addresses are configured by D. None of the above
software-MAC addresses are configured 45. What protocols are found in the Data Link
in hardware Access Layer?
E. -IP addresses are used for routing A. FTP, SMTP, POP, IMAP
across a WAN / internet-MAC addresses
B. Wi-Fi and Ethernet
are only used within the LAN
C. TCP and IP
40. What protocols are found in the Transport D. HTTPS and HTTP
Layer
46. Which message delivery type is used when
A. TCP
all devices need to receive the same mes-
B. TCP, IP sage?
C. FTP, IP, SMTP, Ethernet A. static
D. POP, TCP, IP B. unicast
C. multicast
41. Which of these describes an IPv4 ad-
dress? D. broadcast
A. Six sets of hexadecimal numbers be- 47. Defines how data is sent and transmitted
tween 00 and FF, separated with a colon and received over the internet. Defines
B. Four sets of numbers between 0 and four ‘layers’ for the transmission of data.
255, separated with a full stop Used whenever you send data to another
computer.
C. Eight groups of hexadecimal numbers
between 0000 and FFFF A. TCP/IP (Transmission Control Proto-
col/Internet Protocol)
D. Six sets of numbers between 0 and
B. HTTP (Hyper Text Transfer Protocol)
128, separated with a comma
C. HTTPS (Hyper Text Transfer Protocol
42. IP assigned for a client by DHCP server is Secure)
A. for a limited period D. FTP (File Transfer Protocol)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 162

48. What do you mean by broadcasting in Net- C. LAN


working?
D. SMTP
A. It means addressing a packet to all ma-
chine 52. Which protocols are used for receiving
B. It means addressing a packet to some email?
machine A. SMTP (Simple Mail Transfer Protocol)
C. It means addressing a packet to a par- B. POP (Post Office Protocol) & IMP

NARAYAN CHANGDER
ticular machine
C. FTP (File Transfer Protocol)
D. It means addressing a packet to ex-
cept a particular machine D. none of above

49. The owners of a large bakery have a Lo- 53. What is a network protocol?
cal Area Network (LAN) with a star topol-
A. Lets you connect to a device
ogy. They order their supplies over the
Internet. When data is transmitted from B. Agreed way of transferring files be-
the bakery to the supplier, network proto- tween devices on a network
cols are used.The owners of a large bakery
C. Agreed way of sending emails on a net-
have a Local Area Network (LAN) with a
work
star topology.Explain three reasons why
the bakery may use a star network topol- D. Agreed way of checking files for errors
ogy for their LAN.Answers:3
54. Which logical address is used for delivery
A. It is easy to add a new node or device
of data to a remote network?
B. Management of the network can be
done centrally A. destination MAC address

C. If a node or device fails it does not af- B. destination IP address


fect the rest of the network C. destination port number
D. Management of the network is done at D. source MAC address
each node in the network
E. Multiple routes for data to travel if one 55. Protocols are set of rules to govern
device fails. A. Communication
50. What type of data delivery uses data link B. Standards
layer addresses?
C. Metropolitan communication
A. delivery to a remote network
D. Bandwidth
B. delivery to local and remote networks
C. delivery to local networks 56. device works on network layer of OSI
model
D. delivery to a Wide Area Network
A. Hub
51. Which of the following is NOT a network
protocol? B. Switch
A. UDP C. Router
B. TCP D. Repeater

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 163

57. Which layer of the OSI and TCP/IP models 62. The shopping centre connects computers
defines services to segment and reassem- and other devices using Ethernet connec-
ble data for individual communications be- tions. The computers and devices are

PRACTICE BOOK» NOT FOR SALE


tween end devices? within a small office.Describe what Ether-
A. application net is and how it supports the transmis-
sion of data in the office.Answers:4
B. network
A. Ethernet is a protocol
C. transport
B. Ethernet is just a type of cable
D. Data Link
C. It is within the TCP/IP stack
58. Choose all that are true about WiFi D. It governs the connection of devices
A. WiFi is a wireless protocol within the office that governs the trans-
mission of data between devices inthe of-
B. WiFi is just a catchy name for the pro- fice
tocol IEEE 802.11
E. Uses cables to transmit data between
C. WiFi needs Ethernet cables to connect devices in a LAN
you to it
63. The checksum in a data packet is used to
D. WiFi is just another name for Internet

59. The protocol is the transmission mech- A. ensure that all the data has arrived
anism used by the TCP/IP suite. and is not corrupted
A. ARP B. ensure that the packet has been sent
B. IP to the right place
C. RARP C. tell the computer what protocols were
used
D. None of the above
D. ensure that the user is logged on
60. Allows the transfer of files between com-
64. In descending order how are the layers
putersUsed when uploading web pages to
sorted?
a web server; When downloading a file
from a website A. Data Link Access, Transport, Applica-
tion, Internet
A. TCP/IP (Transmission Control Proto-
col/Internet Protocol) B. Internet, Application, Data Link Ac-
cess, Transport
B. HTTP (Hyper Text Transfer Protocol)
C. Transport, Internet, Data Link Access,
C. HTTPS (Hyper Text Transfer Protocol Application
Secure)
D. Application, Internet, Application,
D. FTP (File Transfer Protocol) Data Link Access
61. Which email protocol keeps a copy of the 65. In IPv4, class has the greatest number
email on the mailserver? of addresses in each block.
A. POP A. A
B. SMTP B. B
C. IMAP C. C
D. none of above D. D

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 164

66. Which PDU is processed at the transport 71. DHCP is used for
layer of the TCP/IP model? A. IPV6
A. Packet B. IPV4
B. Bits C. both a & b
C. Segment D. None of the above
D. Frame
72. The number of addresses in a class C block
67. What is the purpose of the HTTP proto- is

NARAYAN CHANGDER
col? A. 65, 534
A. When transferring large files, it is B. 16, 777, 216
used to organise them and process the C. 254
HTML code on the webs page
D. NONE OF THE ABOVE
B. It is used for email communication and
sending emails 73. How can we examine the current routing
C. It makes the transfer of a webpages tables in command prompt?
from the servers to the user’s device A. using routestart
D. It allows data to be communicated B. using netstart
through a 4 Layer model C. using netstat
68. Which protocol is used to retrieve mail D. either a or b
from a remote server to a local email 74. Choose all the MAC addresses
client?
A. 00-06:5B-BC-7A-C7
A. SMTP
B. 135.58.24.17
B. FTP
C. 239.255.255.255
C. IMAP
D. 192.168.0.0
D. POP3
75. Which best describes 2.4 GHz Wifi Fre-
69. What is the term that is used to describe quency vs 5Ghz? Answers:3
the particular type of information provided
A. More widely used.
at each layer of a networking model?
B. Not as good at travelling through
A. frame
walls.
B. packet
C. Better range
C. protocol data unit (PDU)
D. More crowded.
D. segment
E. 24 channels which do not overlap so
70. A protocol that allows email messages to avoids interference.
be read and stored on a messaging server. 76. The Encryption method used on Secure In-
A. SMTP ternet transactions is called?
B. SFTP A. Public Key Encryption
C. POP B. Public Code Encrypting
D. IMAP C. Public Key Encrypting
E. HTTPS D. Private Key Encryption

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 165

77. What are the protocols in the application the document (1) Send receipt confir-
layer? mation (1) Each packet is checked for
errors(1) if corrupt a message is sent

PRACTICE BOOK» NOT FOR SALE


A. POP, FTP, SMTP, HTTP, TCP
back to sender (1)
B. SMTP, IP, POP, HTTPS, TCP
79. What protocols are found in the Internet
C. HTTP, FTP, SMTP, IMAP, POP, HTTPS Layer?
D. IP, FTP, IMAP, POP, SMTP A. POP
B. SMTP, HTTP, HTTPS
78. Bill needs to send a document across a net-
work to Ben. Write an algorithm to show C. IP
how packets are used to send the docu- D. FTP
ment, starting from when Bill clicks send
80. Why are standards important in network-
(sending), and finishing when Ben reads
ing?
the document (receiving).Which algorithm
best represents sending a packet? A. They allow hardware and software to
interact across different manufacturers
A. Bill’s computer splits data into equal
sizes packets (1)Each packet is given the B. They help keep systems private so that
address of Ben’s computer (1)Each packet other products can’t interact with them
is given a number (1)Each packet is given C. They allow governments to maintain
error checking data (1)The packets are complete control over the Internet
sent across the network (1) D. They provide paperwork for people
B. Ben’s computer checks if all packets who wouldn’t have anything else to do
have been received? (1)If No Check 81. Which of these if not A real IP address?
again (1) Increment timer (1) If
timer > max wait (1) Send timeout to A. 192.168.2.156
Bill’s computer (1)If Yes Reorder pack- B. 192.168.2.1
ets based on their number (1) Display C. 192.168.2.200
the document (1) Send receipt confir-
D. 192.168.2.328
mation (1) Each packet is checked for
errors(1) if corrupt a message is sent 82. Controlling access to a network by analyz-
back to sender (1) ing the incoming and outgoing packets is
called
C. Bill’s computer splits data into dif-
ferent sizes packets (1)Each packet is A. IP Filtering
given the address of Ben’s computer B. Data Filtering
(1)Each packet is given a with a zero
C. Packet Filtering
(1)Each packet is given erroneous data
data (1)The packets are sent across the D. Firewall Filtering
network (1) 83. A multicast message is sent from to
D. Ben’s computer checks if all packets
have been received? (1)If Yes Check A. one source; one destination
again (1) Increment timer (1) If
B. one source; multiple destinations
timer > max wait (1) Send timeout to
Bill’s computer (1)If No Reorder pack- C. multiple sources; one destination
ets based on their number (1) Display D. none of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 NETWORK-LAYER PROTOCOLS 166

84. Which of the four layers in TCP/IP will C. Packets are sent as one file
choose the route the data will take? D. Confirmation is sent back to confirm
A. Application that packets have been received
B. Internet 90. allow many devices to share limited
C. Link address space on a network.
D. Transport A. Multiple addressing
B. Port addressing
85. Each network interface controller has a

NARAYAN CHANGDER
unique C. Dynamic addressing
A. MAC address D. None of the above
B. IP address 91. Transmission control protocol (TCP) splits
C. Signal data into
D. Protocol A. segments
B. groups
86. The DHCP server
C. parcels
A. maintains a database of available IP
addresses D. packets

B. maintains the information about client 92. What is the purpose of protocols in data
configuration parameters communications?
C. grants a IP address when receives a A. specifying the bandwidth of the chan-
request from a client nel or medium for each type of communi-
cation
D. all of the above
B. specifying the device operating sys-
87. NAT stands for tems that will support the communication
A. network address transformer C. providing the rules required for a spe-
B. network address translator cific type of communication to occur
C. network address translation D. dictating the content of the message
sent during communication
D. Both b and c
93. Part of the TCP/IP Protocol and used to
88. Which PDU format is used when bits are
send email between systems.Used when
received from the network medium by the
sending an email to a friend from a web
NIC of a host?
browser or email client. Is used when
A. File email is delivered from an email client,
B. Packet such as Outlook Express, to an email
server or when email is delivered from one
C. Frame
email server to another.
D. Segment A. POP (Post Office Protocol)
89. Select TWO statements which TCP/IP pro- B. IMAP (Internet Message Access Pro-
cess follows tocol)
A. Request from client sent to server C. SMTP (Simple Mail Transfer Protocol)
B. Packets are sent in order D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 167

94. What is the function of IMAP? A. Less widely used.


A. Governs the downloading of emails be- B. Better at travelling through walls.

PRACTICE BOOK» NOT FOR SALE


tween a server and client, but the email
C. Worse range
still remains on the server. The email can
also be viewed offline. D. Less crowded.
B. Governs the sending and receiving of E. 14 channels which overlap causing in-
emails between server and client. terference.
C. Governs the sending and receiving of
emails between mail servers. 98. Which network protocol will be used for
banks’ websites?
D. Governs the data transmission of data
on a wired network. A. HTTPS
B. HTTP
95. Switch works on which layer of OSI
model? C. UDP
A. Data Layer D. SMTP
B. Session Layer
99. Another email protocol that us used to re-
C. Network Layer trieve email from mail servers. This is a
D. Application Layer more recent protocol. The emails are not
deleted from the server after downloading
96. DHCP Server provides to the client. them.Used when retrieving an email from
A. Protocol a mail server to read/download.
B. IP Address A. POP (Post Office Protocol)
C. MAC Address B. IMAP (Internet Message Access Pro-
D. Network Address tocol)
C. SMTP (Simple Mail Transfer Protocol)
97. Which best describes 5 GHz Wifi Fre-
quency vs 2.4 Ghz? Answers:3 D. none of above

4.3 UNICAST ROUTING


1. The Distance includes both the metric paths available to a destination network
of a network as advertised by the con- using the same routing protocol?
nected neighbour, plus the cost of reaching A. Lowest metric
that particular neighbour.
B. Lowest administrative distance
A. Administrative
C. Order of the paths in the routing table
B. Advertising
D. Priority value of protocol
C. Reporting
3. What route would have the lowest admin-
D. Feasible istrative distance?

2. Which factor determines the best path to A. a static route


forward a packet when there are multiple B. a directly connected network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 168

C. a route received through the OSPF D. eigrp [ASN]enable ipv6 unicast-


routing protocol routing
D. a route received through the EIGRP
routing protocol 8. what sends to all hosts on a specific net-
work
4. Which statement correctly describe the A. A limited broadcast
concepts of metric?
B. Unicast
A. Routes with the smallest metric to a

NARAYAN CHANGDER
destination indicate the best path. C. Directed broadcast
B. A router first installs routes with D. Multicast
higher administrative distances.
C. The value of the administrative dis- 9. host devices are assigned IPv4 addresses
tance can not be altered by the network dynamically using?
administrator. A. UPS
D. The metric is always determined B. IPV6
based on hop count.
C. IPV4
5. What is the purpose of adding an admin-
D. DHCP
istrative distance number to the end of a
static route?
10. Broadcast traffic is used to
A. To create a standard static route.
A. send packets to no one on the network
B. To create a default static route.
B. send packets to some host in the net-
C. To create a floating route.
work
D. To create a summary static route.
C. send packets to one hosts in the net-
6. What is a characteristic of a floating static work
route? D. send packets to all hosts in the net-
A. When it is configured, it creates a gate- work
way of last resort.
11. Which statement describes the effect of
B. It is simply a static route with
the copy run start command on a router
0.0.0.0/0 as the destination IPv4 address.
in enable mode?
C. It is a backup route configured with
a higher administrative distance than the A. The running configuration of the router
original destination route. is saved to NVRAM and used during the
boot process.
D. It is used to provide load balancing be-
tween static routes. B. The router reboots and loads the last
saved running configuration.
7. How do you enable EIGRP for IPv6 on a
router interface? C. A copy of the running configuration of
the router is sent by FTP to a designated
A. ipv6 eigrp [ASN] server.
B. eigrp [ASN]ipv6 unicast-routing D. A new running configuration is loaded
C. eigrp [ASN] enable ipv6 from flash memory to the router.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 169

12. Link State packets are transmitted through 17. Which router IOS commands can be used to
troubleshoot LAN connectivity problems?
(Choose three.)

PRACTICE BOOK» NOT FOR SALE


A. flooding
B. multicast routing A. ping
C. unicast routing B. tracert
D. through any of the mentioned C. show interfaces
13. Which command can you enter to D. All the above
route all traffic that is destined for
192.168.0.0/20 to a specific interface? 18. How are IP addressing designs affected by
VLAN implementations?
A. router(config)#ip route 192.168.0.0
255.255.240.0 GigabitEthernet0/1 A. VLANs do not support VLSM.
B. router(config)#ip route 0.0.0.0 B. VLANs do not use a broadcast address.
255.255.255.0 GigabitEthernet0/1 C. Each VLAN must have a different sub-
C. router(config)#ip route 0.0.0.0 0.0.0.0 net mask.
GigabitEthernet0/1 D. Each VLAN must have a different net-
D. router(config)#ip route 192.168.0.0 work number.
255.255.255.0 GigabitEthernet0/1
19. What is the purpose of issuing the ipv6
14. A limited broadcast is sent to By de- unicast-routing command on a router?
fault
A. To enable unicast routing.
A. 11011100011
B. To enable IPv6 routing.
B. 255.255.255.
C. 255.255.255.255. C. To unable multicast routing.

D. None of the above D. To disable routing protocols from us-


ing an interface.
15. Distance vector algorithm uses equa-
tion to find the least cost route. 20. What is the purpose of the POST operation
A. Euclid on a router?

B. Floyd Warshall A. determine whether additional hard-


ware has been added
C. Bellman Ford
B. locate an IOS image for booting
D. Pythagorus
C. enable a TFTP server
16. What is a disadvantage of using router-on-
a-stick inter-VLAN routing? D. set the configuration register
A. does not support VLAN-tagged packets 21. Which of the algorithm uses the concept of
B. does not scale well beyond 50 VLANs best spanning tree?
C. requires the use of more physical in- A. Path vector
terfaces than legacy inter-VLAN routing
B. distance vector
D. requires the use of multiple router in-
C. link state
terfaces configured to operate as access
links D. none of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 170

22. What is the functions of a router? 27. Which protocol is supported when OSPFv2
is used as the routing protocol?
A. It connects multiple IP networks.
A. NetBios
B. It manages the VLAN database.
B. LAT
C. It controls the flow of data via the use
of Layer 2 addresses. C. IPv4

D. It increases the size of the broadcast D. IPv6


domain. 28. What two things does RSTP reduce to

NARAYAN CHANGDER
speed up the computation process?
23. Which of the following commands should
be used before configuring IPv6 routes? A. Listening
A. router EIGRP B. Discarding

B. router OSPF C. Learning


D. Switch
C. ip routing
D. ipv6 unicast-routing 29. What two metrics are used by EIGRP to
select the best network route?
24. What does RSTP need, for a point-to-point A. bandwidth and delay
connection between switches to achieve
high speeds? B. bandwidth and resiliency
C. throughput and hop count
A. PortFast
D. throughput and delay
B. Full-Duplex
C. UplinkFast 30. What type of route allows a router to for-
ward packets even though its routing table
D. Backbone Fast contains no specific route to the destina-
tion network?
25. What type of IPv6 address is required as
a minimum on IPv6 enabled interfaces? A. dynamic route
A. static B. default route

B. global unicast C. destination route


D. generic route
C. link-local
D. loopback 31. What is the administrative distance of a
directly connected route?
26. What would be the first step in calculating A. 0
a summarized route for 5 networks?
B. 1
A. Starting from the far right, determine
C. 2
the octet in which all the numbers are the
same. D. 10
B. Determine the network with the low- 32. Which are NOT types of enterprise topolo-
est number. gies
C. Write all network numbers in binary. A. Star and Mesh Topologies
D. Write all subnet masks in binary. B. Partial Mesh and Full Mesh

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 171

C. Full Mesh and beast topology 38. what allows a host to send a single packet
D. Partial mesh and Stars A. Multicast transmission

PRACTICE BOOK» NOT FOR SALE


B. Broadcast transmission
33. is the multicast address used by
C. Unicast transmission
A. RIP
D. All of the above
B. IPV6
39. Devices can be assigned an IP address ei-
C. IPV4
ther?
D. DHCP
A. statically or dynamically
34. You can see the ASN with the show ip B. statically or multicast
command. C. dynamically or individually
A. protocols D. dynamically or symetrically
B. asn 40. A router has learned three possible routes
C. process that could be used to reach a destination
D. routing network. One route is from EIGRP and has
a composite metric of 20514560. Another
35. How many bits you can find in IPv6? route is from OSPF with a metric of 782.
The last is from RIPv2 and has a metric of
A. 128 bits
4. Which route or routes will the router
B. 64 bits install in the routing table?
C. 32 bits A. the OSPF route
D. 48 bits B. the EIGRP route
C. the RIPv2 route
36. Which command can you enter to set the
default route for all traffic to an inter- D. all three routes
face? 41. which of those are part of the largest pop-
A. router(config)#ip route 0.0.0.0 0.0.0.0 ulation of hosts includes?
GigabitEthernet0/1 A. Printers
B. router(config)#ip route 0.0.0.0 B. Routers
255.255.255.255 GigabitEthernet0/1
C. Switches
C. router(config-router)#default-
D. IPV6
information originate
D. router(config-router)#default- 42. You have configured the host computers on
information originate always a campus LAN to receive their DHCP ad-
dresses form the local router to be able to
37. Which protocol secures router manage- browse their corporate site. Which state-
ment session traffic? ment about the network environment is
true?
A. SSTP
A. It supports a DNS server for use by
B. POP
DHCP clients.
C. Telnet B. Two host computers may be assigned
D. SSH the same IP address.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 172

C. The DNS server must be configured 47. Routing tables of a router keeps track of
manually on each host. A. MAC Address Assignments
D. The domain name must be configured
B. Port Assignments to network devices
locally on each host computer.
C. Distribute IP address to network de-
43. Provide DMZ usage vices
A. guarantee user safety D. Routes to use for forwarding data to
B. prevent viruses from entering the com- its destination

NARAYAN CHANGDER
puter
48. In Link state routing a link represents
C. take care of the traffic on the network
A. a host
D. reduce redundant packets
B. a network
44. Which options describe routers compared
to switches? C. a packet
A. Use IP address tables for information D. none of the mentioned
lookup
49. What is a characteristic of legacy inter-
B. Concerned with packet forwarding VLAN routing?
C. Operate at Layer 3 of the OSI model A. Only one VLAN can be used in the topol-
D. all the above ogy.
45. Which command do you enter to filter only B. The router requires one Ethernet link
routing updates that are sent through in- for each VLAN.
terface GigabitEthernet0/0? C. Inter-VLAN routing must be performed
A. R1(config-if)#passive-interface Giga- on a switch instead of a router.
bitEthernet0/0. D. The user VLAN must be the same ID
B. R1(config-router)#no passive- number as the management VLAN.
interface GigabitEthernet0/0
50. What is the purpose of the EIGRP topology
C. R1(config-router)#passive-interface table? (Choose 2)
GigabitEthernet0/0
A. All EIGRP routers to have a consistent
D. R1(config-router)#passive-interface view of the entire network.
default
B. All known destination networks and
46. The network administrator configures subnets that are advertised by neighbour-
the router with the ip route 172.16.1.0 ing EIGRP routers are stored
255.255.255.0 172.16.2.2 command.
C. Best routes only
How will this route appear in the routing
table? D. neighbor peer details
A. C 172.16.1.0 is directly connected, Se- 51. In which true statement EIGRP configure?
rial0/0
A. R1(config)# ipv6 unicast-routing.
B. S 172.16.1.0 is directly connected, Se-
rial0/0 B. R1(config-rtr)# ipv6 router eigrp 1
C. C 172.16.1.0 [1/0] via 172.16.2.2 C. R1(config)# ipv6 router eigrp 1
D. S 172.16.1.0 [1/0] via 172.16.2.2 D. R1(config)# ip router eigrp

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 173

52. Which of the algorithm allows the sending B. 87


host to impose policy on route?
C. 89

PRACTICE BOOK» NOT FOR SALE


A. link state
D. 90
B. distance vector
C. path vector 58. Which command do you use to enter EIGRP
D. all the mentioned for IPv6 Router Configuration mode?
A. ipv6 router eigrp [ASN]
53. A network design team has mandated that
IP-only routing protocols be used in the B. router eigrp [ASN] ipv6
network. Which two routing protocols will
they want to use? C. eigrp v6 [ASN]

A. BGP & IS-IS D. eigrp [ASN] ipv6


B. OSPF & IS-IS
59. What is the funcation of ACL standard?
C. EIGRP & IS-IS
A. A standard access-list can only permit
D. none traffic based only on the source .
54. Which of the following are used to config- B. A standard access-list can permit or
ure an IPv6 static route? deny traffic based only on the source .
A. Network prefix and prefix length C. A standard access-list can only deny
B. Network prefix and subnet mask traffic based only on the source .
C. Source IP address D. A standard access-list can permit or
D. Destination IP address deny traffic based only on the destination.

55. Which step in the router boot process 60. What is the purpose of the 0.0.0.0 0.0.0.0
searches for an IOS image to load into the 10.10.1.1 command?
router?
A. To provide a default route for any non-
A. bootstrap matching network destination.
B. POST
B. To create a dynamic route for the
C. mini-IOS 10.10.1.1 network.
D. ROMMON mode
C. To create a static route for the
56. What is one of the purposes of route re- 10.10.1.1 network.
dundancy? D. To create a default gateway address
A. Minimize the effect of link failures for PC’s to forward packets.
B. Load balance across redundant paths
61. Link state routing uses algorithm.
C. Minimize the convergence time of STP
A. Quick Sort Algorithm
D. NONE
B. Floyd Warshall Algorithm
57. EIGRP packets are sent directly over IP us-
ing protocol number C. Bellman Ford
A. 88 D. Dijkstra’s

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 174

62. Which statement describes the process ID 67. Which statements about static routing are
that is used to run OSPF on a router? true?
A. It is globally significant and is used to A. It uses consistent route determina-
represent the AS number. tion.
B. It is locally significant and is used to B. It is best used for small-scale deploy-
identify an instance of the OSPF database. ments.
C. Routing is disrupted when links fail.
C. It is globally significant and is used to

NARAYAN CHANGDER
identify OSPF stub areas. D. all the above
D. It is locally significant and must be the 68. How is traffic routed between multiple
same throughout an area. VLANs on a multilayer switch?
A. Traffic is routed via subinterfaces.
63. What is the correct command?
B. Traffic is routed via physical inter-
A. ip unicast routing faces.
B. ipv6 routing unicast C. Traffic is broadcast out all physical in-
C. ipv6 unicast routing terfaces.
D. Traffic is routed via internal VLAN in-
D. ipv6 unicast-routing
terfaces.
64. A network design engineer is seeking a dy- 69. To populate the topology table, EIGRP runs
namic routing protocol that supports fast the algorithm
convergence in a Cisco environment. What
protocol allows for this? A. DUAL
B. SPF
A. EIGRP
C. Djikstra
B. OSPF
D. Bellman ford
C. RIP
70. If a router has four interfaces and each in-
D. IS-IS terface is connected to four switches, how
many broadcast domains are present on
65. what does (DHCP) stand for?
the router?
A. dynamic host configuration protocol A. 1
B. dynamic host communication protocol B. 2
C. direction host configuration protocol C. 4
D. dynamic host configuration partion D. 8
71. Which packet-switching method utilizes
66. The DHCP server provides
memory to route multiple packets using
A. Mac Address, Router Name the same destination route?
B. IP address, subnet mask, default gate- A. Cisco Express Forwarding
way B. Fast Switching
C. IPV6 number, subnet mask C. Process Switching
D. default gateway, router name D. Flow Process

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 175

72. Which of the following is not a least cost B. Hosts that receive particular multicast
algorithm? routers

PRACTICE BOOK» NOT FOR SALE


A. Distance vector C. Hosts that receive particular multicast
B. Link state data
D. none of above
C. Path vector
D. All the mentioned 78. If an interface is configured on a router but
the routing table does not show a directly
73. Switch in STP is also known as? connected route for the network, what is
A. Root Switch the probable issue?
B. BPDUs A. There is no active routing protocol.
C. Root Bridge B. The default-originate command was
not issued.
D. Root ports
C. The interface was not activated using
74. Which command enables IPv6 forwarding the no shut command.
on a Cisco router? D. A static route must be configured for a
A. ipv6 local directly connected network.
B. ipv6 host 79. The next statements for routing static,
C. ipv6 unicast-routing what is correct?
D. ipv6 neighbor A. In a small network that requires only
simple routing
75. What is the type of static routes in routing B. Routers learn and maintain routes to
tables? the remote destinations by exchanging
A. a built-in static route by IOS routing updates.
B. a static route shared between two C. Choosing the best path to destination
neighboring routers networks
C. a default static route D. none of above
D. a static route converted from a route 80. What does Router do in a network?
that is learned through a dynamic routing
A. Forwards a packet to all outgoing links
protocol
B. Forwards a packet to the next free out-
76. Which type of inter-VLAN communication going link
design requires the configuration of multi- C. Determines on which outing link a
ple subinterfaces? packet is to be forwarded
A. router on a stick D. Forwards a packet to all outgoing links
B. legacy inter-VLAN routing except the originated link
C. routing via a multilayer switch 81. Access control list typical function?
D. routing for the management VLAN A. Commands
77. multicast clients are? B. Firewalling
A. Hosts that receive particular Unicast C. Wildcard
data D. Exchanging data.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 176

82. Dynamic neighbour discovery is performed C. It loads the first image file in flash
by sending EIGRP Hello packets to the des- memory.
tination Multicast group address
D. It inspects the configuration file in
A. 224.0.0.10 NVRAM for boot instructions.
B. 224.0.0.5
86. With a broadcast, the packet contains a
C. 224.0.0.6 destination IPv4 address with all ones
D. 224.0.0.11 in the host portion (fill in the blank)

NARAYAN CHANGDER
A. 0s
83. A network engineer is tasked with sum-
marizing the routes to a remote site. B. 1s
What is the optimal route statement to C. 1s and 0s
connect to the 192.168.101.0/24 and
192.168.102.0/24 networks across the D. none of the above
corporate WAN?
87. Router(config)#ip route [network-
A. ip route 192.168.100.0 255.255.254.0 address] [Subnet Mask] [? or? ]
10.1.1.1
A. Address of next hop
B. ip route 192.168.100.0 255.255.252.0
10.1.1.1 B. Exit Interface

C. ip route 192.168.100.0 255.255.255.0 C. Default Route


10.1.1.1 D. Routing Table
D. ip route 192.168.101.0 255.255.254.0
88. A network administrator is troubleshoot-
10.1.1.1
ing an EIGRP problem on a router and
84. How does using the service password- needs to confirm the IP addresses of the
encryption command on a router provide devices with which the router has estab-
additional security? lished adjacency. The retransmit inter-
val and the queue counts for the adjacent
A. by encrypting all passwords passing
routers also need to be checked What com-
through the router
mand will display the required informa-
B. by encrypting passwords in the plain tion?
text configuration file
A. Router# show ip eigrp adjacency
C. by requiring entry of encrypted pass-
B. Router# show ip eigrp topology
words for access to the device
C. Router# show ip eigrp interfaces
D. by configuring an MD5 encrypted key
to be used by routing protocols to validate D. Router# show ip eigrp neighbors
routing exchanges
89. What EIGRP command can be used to en-
85. A Cisco router is booting and has just com- able unequal cost load sharing?
pleted the POST process. It is now ready
A. variance
to find and load an IOS image. What func-
tion does the router perform next? B. unequal cost
A. It checks the configuration register. C. maximum path
B. It attempts to boot from a TFTP server. D. eirgrp <as.no> variance

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 UNICAST ROUTING 177

90. What multicast address is added when you A. IP addresses and the speed/duplex
configurate an IPv6 address? settings

PRACTICE BOOK» NOT FOR SALE


A. FF02::1 B. IP addresses and the assigned inter-
face description
B. FF01::2
C. MAC addresses and the speed/duplex
C. ff02::5
settings
D. FF01:2
D. IP addresses and the port interface
91. What is a disadvantage of using multilayer status
switches for inter-VLAN routing? 95. On which two components of a router can
A. Multilayer switches have higher la- a copy of a running-configuration file be
tency for Layer 3 routing. saved manually by an engineer for backup
B. Multilayer switches are limited to us- purposes?
ing trunk links for Layer 3 routing. A. NVRAM & ROM
C. Multilayer switches are more expen- B. Flash & ROM
sive than router-on-a-stick implementa- C. RAM & & ROM
tions.
D. NONE
D. Spanning tree must be disabled in or-
der to implement routing on a multilayer 96. Which state is the EIGRP for IPv6 initially
switch. in?
A. The shutdown state.
92. why broadcast traffic should be limited?
B. The Active State.
A. to speed up the arival of the packets
C. Down State.
B. to minimize the speed
D. Init State.
C. so it does not adversely affect the per-
formance of the network or devices. 97. What is the administrative distance of a
D. to break the packets apart faster static route?
A. 0
93. Which statement about OSPF E1 routes
B. 1
are true?
C. 2
A. They are preferred over interarea
routes. D. 10
B. They use the OSPF cost from redistri- 98. Which type of static route that is config-
bution and the OSPF cost to the ASBR. ured on a router uses only the exit inter-
C. They use only the OSPF cost to the face?
ASBR from redistribution. A. recursive static route
D. NONE B. default static route

94. Which information is displayed when using C. directly connected static route
the show ip interface brief command? D. fully specified static route

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 178

4.4 NEXT GENERATION IP


1. What is the interface ID of the IPv6 ad- D. A tool used for monitoring network
dress 2001:DB8::1000:A9CD:47FF:FE57:FE94/64? traffic

6. What is the valid most compressed


A. 2001:DB8::1000:A9CD
format possible of the IPv6 address
B. FE94 2001:0DB8:0000:AB00:0000:0000:0000:1234?

NARAYAN CHANGDER
C. A9CD:47FF:FE57:FE94
D. 1000:A9CD:47FF:FE57:FE94 A. 2001:DB8:0:AB00::1234

2. what does E in hexadecimal represent in B. 2001:DB8:0:AB::1234


decimal? C. 2001:DB8::AB00::1234
A. 11 D. 2001:DB8:0:AB:0:1234
B. 15
7. Using Rule 1 and 2 reduce the
C. 16 IPv6 addresses to their shortest
D. 14 form.F00:0090:0000:0000:0000:0098:0000:0001

3. The IPv6 address achitecture does not A. F00:90:0:0:0:98:0:1


include which of the following address B. F00:90::98:0:1
types?
C. F00:0090::0098:0000:0001
A. Multicast.
D. F:9:0:0:0:98:0:1
B. Anycast.
C. Unicast. 8. How is an EUI-64 format interface ID cre-
ated from a 48-bit MAC address?
D. Broadcast.
A. by appending 0xFF to the MAC ad-
4. This IP address has 4 part. Each part con- dress.
tains 8 bit of numbersEach part is sep-
arated by periodsThe description above B. by prefixing the MAC address with 0xF-
refers to FEE.

A. IPv4 C. by inserting 0xFFFE between the upper


three bytes and the lower three bytes of
B. IPv6 the MAC address
C. Internet
D. by prefixing the MAC address with
D. Extranet 0xFF and appending 0xFF to it.
5. What is a subnet mask? 9. Which IPv6 address is valid?
A. A tool used for hacking into networks A. 2031:0:130F::9C0:876A:130B
B. A 32-bit number used to divide an IP
B. 2001:0DB8:0000:130F:0000:0000:08GC:140B
address into a network address and host
address
C. 2001:0DB8:0:130H::87C:140B
C. A security feature used to prevent
unauthorised access to a network D. 2031::130F::9C0:876A:130B

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 179

10. What is the name to identify the specific 15. Communicating between IPv4 and IPv6
computer or host of an ipv6 address? networks is done through

PRACTICE BOOK» NOT FOR SALE


A. global routing prefix A. Dual stacks
B. subnet portion B. Tunnels
C. interface ID C. Both
D. host ID D. Neither

11. You have a device with a MAC address of 16. In which two formats can the IPv6 address
32-89-87-03-a4-13. What will be the au- fd15:0db8:0000:0000:0700:0003:400F:572B
tomatically generated link-local address? be written?

A. fe80::3089:87ff:fe03:a413 A. fd15::db8::700:3:400F:572B

B. ff02::3089:87ff:fe03:a413 B. fd15:0db8:0000:0000:700:3:400F:572B

C. 2003::3289:8703:a413
C. fd15:0db8::7:3:4F:572B
D. fe80::3289:87ff:fe03:a413
D. fd15:db8:0::700:3:4F:572B
12. Which one is NOT Types of IPv6 Ad- E. fd15:db8::700:3:400F:572B
dresses?
17. This IP address has 8 parts. Each part
A. Unspecified, Loopback, Embedded
contains 16 bit of numbers.Each part is
IPv4
separated by colons.The description above
B. Global Unicast, Unique local Unicast refers to
C. Link-local Unicast, Multicast A. IPv4
D. Multicasting task B. IPv6
C. Internet
13. Which is NOT commonly available /64
subnets? D. Extranet
A. /48-65, 536 subnets 18. What is the purpose of the command
B. /52-4096 subnets ping::1?

C. /56-256 subnets A. It tests the internal configuration of an


IPv6 host
D. /60-6 subnets
B. It tests the multicast connectivity to all
14. Which command automatically generates hosts for the network
an IPv6 address from aspecified IPv6 pre- C. It tests the broadcast capability of all
fix and MAC address of an interface? hosts on the subnet
A. ipv6 address dhcp D. It tests the reachability of the default
B. ipv6 address autoconfig gateway for the network

C. ipv6 address 2001:DB8:5:112:2/64 19. Which IPv6 address is the equivalent


link-local of the IPv4 interface loopback address
D. ipv6 address 2001:DB8:5:112:2/64 127.0.0.1?
eui-64 A. ::1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 180

B. :: 25. The 24-bit manufacturer’s ID and 40-bit


C. 2000::/3 unique ID
D. 0::/10 A. EUI-64 identifier
B. unicast address
20. Which three are characteristics of an IPv6
anycast address? (Choose two) C. IPv6 loopback address
A. One-to-nearest communication model D. multicast address
B. One-to-many communication model

NARAYAN CHANGDER
26. In a networking that supporting IPv6,
C. A unique IPv6 address for each device which OSPF feature is no longer sup-
in the group ported?
D. Delivery of packets to the group inter- A. Multicast updates.
face that is closest to the sending device B. Authentication.
E. Any-to-many communication model C. Multiple areas.
21. The process of placing one message inside D. Router-ID.
another message format
27. What is the optimal subnet mask to use
A. Encapsulation when subnetting a network?
B. Protocol A. The one that maximises the number of
C. De-encapsulation subnets
D. Standard B. The one that maximises the number of
hosts per subnet
22. What is the syntax to input a link-local ad-
dress on a router interface? C. The one that balances the number of
subnets and hosts per subnet
A. ipv6 address FE80::1 link-local
D. The one that allows all devices on the
B. link-local ipv6 FE80::1 network to share the same broadcast do-
C. ipv6 FE80::1 link-local main
D. ipv6 address FE80::1
28. Which command can you enter to verify
23. How many total bits in Global Unicast that a 128-bit address is live and respond-
IPv6 Address? ing?
A. 128 bits A. traceroute
B. 64 bits B. telnet
C. 127 bits C. ping
D. 48 bits D. ping ipv6

24. Delivers packets to a single network ad- 29. What is the network address for the IPv6
dress address 2001:DB8:AA04:B5::1/64?
A. unicast address A. 2001::/64
B. IPv6 loopback address B. 2001:DB8:AA04:B5::/64
C. mulitcast address C. 2001:DB8::/64
D. anycast address D. 2001:DB8:AA04::/64

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 181

30. You want to ping the loopback address of C. 32


your local host(with IPv6). What will you D. 40
type?

PRACTICE BOOK» NOT FOR SALE


A. ping 127.0.0.1 36. Which type of address is routable?
A. Global
B. ping 0.0.0.0
B. Loopback
C. ping::1
C. Link local
D. trace 0.0.::1
D. Unique-local
31. Use rule 2 reduce the IPv6 addresses be-
37. Which is the command to prompt out all
low:FE95:FC6C:C540:0000:0000:0000:0000:9900
IPv4 addressing?
A. FE95:FC6C:C540:0:0:0:99
A. Ipconfig
B. FE95:FC6C:C540:0:0:0:9900
B. Ipconfig /all
C. FE95:FC6C:C540:9900
C. Ipv6config
D. FE95:FC6C:C540::9900
D. Ipv6config /all
32. How many bits are used in IPv6
38. Which of the following is the newer ver-
A. 4 sion of IP addresses because the previous
B. 108 version only provided 4 billion unique ad-
C. 32 dresses?

D. 128 A. IPv6
B. IPv4
33. Purpose of Internet Protocol Address.
C. IPv7
A. allow fast data transfer
D. IPv5
B. as internet service for network user
39. What is the minimum configuration for
C. as web server to store data
a router interface that is participating in
D. allows computers to send and receive IPv6 routing?
information
A. to have only a link-local IPv6 address
34. The following addresses have been B. to have both an IPv4 and an IPv6 ad-
shorted using Rule1 and/or Rule 2. Ex- dress
pand address below back to their pre-
C. to have a self-generated loopback ad-
ferred format. “::1”
dress
A. 0:0:0:0:0:0:0:000
D. to have both a link-local and a global
B. 0:0:0:0:0:0:0:1 unicast IPv6 address
C. 0:0:0:0:0:0:0:0001
40. For EIGRP neighbourship, addresses
D. 0000:0000:0000:0000:0000:0000:0000:0001 are used.
35. The header length for an IPv6 datagram A. Multicast
is: B. Link-Local
A. 8 C. Global Unicast
B. 20 D. Anycast

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 182

41. To make IPv6 addresses a little less im- 45. What is NOT advantages of subnetting by
posing, two rules were developed to make user groups?
them easier to work with. Which is the A. This allows you to optimize your rout-
rules? ing tables. All the networks within each
A. Rule 1:Omission of the Leading 0s location will aggregate to a single route.
B. Rule 2:Omission of the All-0 Hextets B. Subnetting by user groups makes it
much easier to implement a security pol-
C. Rule 2:Omission of the All-0 icy.

NARAYAN CHANGDER
D. Rule 1:Omission of the Leading 0s & C. Grouping by usage also helps track ad-
Rule 2:Omission of the All-0 Hextets dresses for
42. Which technology supports the stateless D. Grouping by usage also helps track ad-
assignment of IPv6 addresses? dresses for allocation

A. DNS 46. Multicast addresses can only be ad-


dresses and not addresses.
B. DHCPv6
A. multicast broadcast
C. DHCP
B. destination source
D. autoconfiguration
C. source destination
43. Which of these is NOT a hexadecimal D. none of above
digit?
47. A company uses the SLAAC method to con-
A. 0
figure IPv6 addresses for the employee
B. H workstations. Which address will a client
C. F use as its default gateway?
A. the all-routers multicast address
D. 9
B. the link-local address of the router in-
44. Which defines IP address? terface that is attached to the network
A. network that use internet technologies C. the unique local address of the router
to interconnect the intranet of its business interface that is attached to the network
partners D. the global unicast address of the
B. a global computer network providing a router interface that is attached to the net-
variety of information and communication work
facilities, consisting of interconnected net-
48. Unicast addresses:
works using standardized communication
protocols. A. Packets are delivered to a single host
interface
C. sequence of numbers that uniquely
identifies the location of each computer B. Packets are delivered to a single link-
or device connected to the Internet or any local address
other network C. Packets are delivered to a single net-
D. networks that covers a large geo- work address
graphical area suc as city, country or D. Packets are delivered to the loopback
world address::1/64

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 183

49. Which of the following descriptions about 54. Which IPv6 network prefix is only in-
IPv6 addresses are correct? (Multiple tended for local links and can not be
Choice) routed?

PRACTICE BOOK» NOT FOR SALE


A. IPv6 addresses are 64 bits in length. A. FF00::12
B. IPv6 addresses are 128 bits in length. B. FC00::/7
C. IPv6 extension headers are processed C. 2001::/3
randomly. D. FE80::/10
D. IPv6 extension headers are processed
in order. 55. Which two statements are correct about
IPv4 and IPv6 addresses? (Choose two.)
50. What is the term for the packet counter A. IPv4 addresses are 32 bit in length
that tells a packet when it should be
dropped in ipv4? B. IPv4 addresses are represented by
hexadecimal numbers
A. hop limit
C. IPv6 addresses are 64 bit in length
B. Time to live
D. IPv6 addresses are 32 bit in length
C. Round trip time
E. IPv6 addresses are represented by
D. type field hexadecimal numbers
51. How would the following IPV6 address be 56. How many step for developing an IPv6 ad-
compress 2002:0ec0:0200:0001:0000:04eb:44ce:08a2
dressing plan?
A. 2002:ec0:200:1::4eb:44ce:8a2 A. 1 step
B. 2002:ec:2:1:0:4eb:44ce:8a2 B. 2 step
C. 22:ec:2:1::4eb:44ce:8a2 C. 3 step
D. not thing at all D. non of above

52. Using Rule 1 ( Omission of the Leading 0s), 57. Your ISP has given you the IPv6 address
reduce the IPv6 addresses to their short- 3002:FE12:A231::/48. How many /64
ened form.0000:0000:0000:0000:0000:0000:0000:0001
subnets are available with this address?
A. 0:0:0:0:0:0:0:1 A. 65, 536
B. 0:0:0:0:0:0:0:0001 B. 65, 537
C. ::1 C. 65, 538
D. ::0001 D. 65, 539

53. A global IPv6 address is similar to: 58. Which statement is not the reason IPv6 is
A. An IPv4 public address widely use nowadays?

B. An IPv4 private address A. shortage of IPv4

C. A 6To4 tunnel address B. easy to remember

D. A specific apartment number in a build- C. increase availbility


ing D. growth of Internet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 184

59. A network administrator configures a A. Global Unicast


router to send RA messages with M flag B. Local-Link
as 0 and O flag as 1. Which statement
describes the effect of this configuration C. Anycast
when a PC tries to configure its IPv6 ad- D. Multicast
dress?
A. It should contact a DHCPv6 server for 64. Which of the following is NOT a valid MAC
all the information that it needs. address format?

NARAYAN CHANGDER
B. It should use the information that is A. 00:11:22:33:44:55
contained in the RA message exclusively. B. 00-11-22-33-44-55
C. It should use the information that is C. 001122334455
contained in the RA message and contact
D. 00-11-22-33-44-55-66
a DHCPv6 server for additional informa-
tion. 65. What is the function of Rule 2:Omission of
D. It should contact a DHCPv6 server for the All-0 HextetsRule?
the prefix, the prefix-length information, A. Rule 2 uses a double colon::to repre-
and an interface ID that is both random sent a all contiguous set of all zero hex-
and unique. texts.
60. What is the most common IPv6 prefix? B. Rule 2 uses a double colon::to repre-
A. /40 sent a single contiguous set of all zero hex-
texts.
B. /52
C. Rule 2 uses a double colon::to repre-
C. /64 sent a double contiguous set of all zero
D. /80 hextexts.

61. Use rule 1 reduce the IPv6 addresses be- D. Rule 2 uses a double colon::to repre-
low:2001:0000:0000:ABCD:FFFF:0000:0000:0002 sent a contiguous set of all zero hextexts.
A. 2001:0:0:ABCD:FFFF:0:0:0002 66. Which of the following is a valid IPv6 ad-
B. 21:0:0:ABCD:FFFF:0:0:2 dress

C. 2001::ABCD:FFFF:0:0:2 A. 2001:eb66:118:b35d:142:876:090:ec10

D. 2001:0:0:ABCD:FFFF:0:0:2
B. 2001:d1:67id:7f62:2d3:46d:564e:33r4
62. Which address type is not supported in C. 2001:18dh:79d4
IPv6?
D. 2001:10493::1493
A. private
B. multicast 67. What is the maximum number of bits in an
IPv6 address?
C. anycast
A. 32 bits
D. broadcast
B. 128 bits
63. What is the name of the address config-
ured on multiple routers for redundancy C. 256 bits
and performance D. 128 bits

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 185

68. With a Global Unicast Address, where 74. Dual-stack approach refers to
does the Global Routing Prefix typically A. implementing Ipv4 with 2 stacks
come from?

PRACTICE BOOK» NOT FOR SALE


B. implementing Ipv6 with 2 stacks
A. Created manually
C. node has both IPv4 and IPv6 support
B. Selected from open online registry
D. implementing a MAC address with 2
C. Purchased from ISP stacks
D. Traded from existing organizations
75. What is 1A in hexadecimal converted to
69. Which method is used to pass IPv6 traffic decimal?
through IPv4 network? A. 25
A. NAT overload B. 26
B. NAT-PT C. 160
C. Dual stack D. 96
D. 6to4 tunneling 76. Multicast is for
70. How many hextets in an IPv6 address? A. Multicast addresses are used to send
a single packet to single destinations si-
A. 4
multaneously.
B. 6
B. Multicast addresses are used to send
C. 10 a multiple packet to single destinations si-
D. 8 multaneously.
C. Multicast addresses are used to send
71. Which of the following is a Link Local Uni-
a single packet to multiple destinations si-
cast address?
multaneously.
A. 2003::6175
D. Multicast addresses are used to send
B. fc00::1e36:a0d9 a single packet
C. fe80::ea97:4402 77. What is the default CIDR value of an IPv6
D. 2003::90ac address?

72. Which IPv6 address is the all-router multi- A. /32


cast group? B. /64
A. FF02::1 C. /128
B. FF02::2 D. /0
C. FF02::3 78. What is the minimum configuration for a
D. FF02::4 router interface that is enabled for IPv6?
A. to have a link-local IPv6 address
73. IPv6 length
B. to have a self-generated loopback ad-
A. 64 bit dress
B. 96 bit C. to have both IPv4 and IPv6 address
C. 48 bit D. to have both link-local and global uni-
D. 128 bit cast IPv6 address

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 186

79. Delivers packets to the nearest interface 84. Which network technology allows devices
to communicate using both IPv4 and IPv6
A. unicast address
addressing at the same time?
B. EUI-64 identifier
A. dual stack
C. anycast address
B. tunneling
D. multicast address C. SLAAC
80. is necessary when the sender wants D. NAT64

NARAYAN CHANGDER
to use IPv6, but the receiver does not un-
derstand IPv6. 85. What is the most important motivating
factor for moving to IPv6?
A. Dual stack
A. better performance with IPv6
B. Header translation
B. IPv6 addresses that are easier to work
C. Conversion with
D. Tunneling C. better security with IPv6
D. depletion of IPv4 addresses
81. What DUAL stack networks can offer to
the end-user host? 86. For two hosts, each on a different net-
A. To pass IPv4 traffic on only IPv6 net- work, which of the following statements
work. are true? (Choose three.)
B. To pass IPv6 traffic on only IPv4 net- A. Both hosts will have the same IP ad-
work. dress
C. Address translation between LAN and B. Both hosts will have the same default
Internet. gateway address
D. To send IPv4 and IPv6 traffic. C. Both hosts will have different MAC ad-
dress
82. What two methods can be used to gener- D. Both hosts will have different IP ad-
ate an interface ID by an IPv6 host that is dress
using SLAAC? (Choose two.)
E. Both hosts will have different default
A. EUI-64 gateway address
B. random generation
87. What are the representation of 72 in the
C. ARP below IP address:72.22.7.90
D. DAD A. Identify specific mouse
B. Identify network
83. Using Rule 1 and 2 reduce the
IPv6 addresses to their shortest C. Identify specific computer
form.2001:0000:0000:ABCD:FFFF:0000:0000:0001D. Identify interface
A. 2001::ABCD:FFFF:0:0:1
88. Which is the correct format to use ping to
B. 2001::ABCD:FFFF::1 verify IPv4 connectivity?
C. 2001:0:0:ABCD:FFFF:0:0:1 A. ping 2001:DB8:1:4::A
D. 2001:0000:0000:ABCD:FFFF::0001 B. ping 2001:DB8:1:4::A/64

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 187

C. ping 10.10.1.100 93. How does subnetting improve network


D. ping 10.10.1.100/64 performance?

PRACTICE BOOK» NOT FOR SALE


A. By increasing the number of hosts on
89. A company uses the method SLAAC to con- a network segment
figure IPv6 addresses for the worksta-
tions of the employees. A network ad- B. By decreasing the number of hosts on
ministrator configured the IPv6 address on a network segment
the LAN interface of the router. The inter- C. By allowing all devices on the network
face status is up/up. However, the work- to share the same broadcast domain
stations on the LAN segment did not ob- D. By making it easier for attackers to
tain the correct prefix and prefix length. carry out network attacks
What else should be configured on the
router that is attached to the LAN segment 94. Which is the correct format to use a tracert
for the workstations to obtain the informa- to discover in IPv4 path?
tion?
A. tracert 2001:DB8:1:4::A
A. R1(config-if)# ipv6 enable
B. tracert 2001:DB8:1:4::A/64
B. R1(config)# ipv6 unicast-routing
C. tracert 10.10.1.100
C. R1(config-if)# ipv6 nd other-config-
D. tracert 10.10.1.100/64
flag
D. R1(config)# ipv6 dhcp pool < name of 95. What is advantages of subnetting by loca-
the pool > tion?
A. This allows you to optimize your rout-
90. What is IPV6 stand for?
ing tables. All the networks within each
A. Intel protocol version 6 location will aggregate to a single route.
B. internet provide vision B. This allows you to optimize your rout-
C. Internet Protocol version 6 ing tables.

D. internet protocol version 4 C. All the networks within each location


will aggregate to a single route.
91. The Global Routing Prefix is similar to D. Non all above
what IPv4 Concept
A. N 96. How many bits in an IPv6 address?

B. S A. 64 bit

C. H B. 96 bit

D. none of above C. 48 bit


D. 128 bit
92. Which of the following is FALSE regarding
the types of IPv6 addresses? 97. What replaced ARP in Ipv6?
A. Allcast A. DAD
B. Unicast B. SLAAC
C. Anycast C. ICMPv6
D. Multicast D. DHCPv6

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 188

98. Contract the following IPv6 ad- 103. Fully expand the following IPv6 ad-
dress:0000:0039:009e:0000:ad58:bfc5:4024:0073dress:3d:81:7c:6343:cde7:15dc:78:15
A. 0000:039:009e:0000:ad58:bfc5:4024:0073 A. 003d:0081:007c:6343:cde7:15dc:0078:0015

B. 0:39:9e:0:ad58:bfc5:4024:73
B. 003d:0081::007c:6343:cde7::15dc:0078:0015
C. 0000:39:09e:000:ad58:bfc5:4024:73
D. 00:39:9e:00:ad58:bfc5:4024:73
C. 3d:0081:007c:6343:cde7:15dc:0078:1500

NARAYAN CHANGDER
99. Which of the following IP address is
wrong? D. 003d0:0081:007c:6343:cde7:15dc:0078:0015
A. 192.168.0.1
B. 0.0.0.255 104. Using Rule 2 (Omission of the All-0 Hex-
tets), reduce the IPv6 addresses to their
C. 256.211.3.10
shortened form.2001:0000:0000:ABCD:FFFF:0000:0000:000
D. 1.1.1.1
A. 2001::ABCD:FFFF:0:0:1
100. What technology allows routers to as-
sign IPv6 addresses automatically? (only B. 2001::ABCD:FFFF::1
global routing prefix, prefix length, de- C. 2001:0:0:ABCD:FFFF:0:0:1
fault gateway, no DNS)
D. 2001:0000:0000:ABCD:FFFF::0001
A. Stateless DHCPv6
B. stateful DHCPv6 105. Which statements about IPv6 prefixes
C. SLAAC are true?
D. DAD A. FEC0::/10 is used for IPv6 broadcast.
101. Contract the following IPv6 ad- B. FC00::/7 is used in private networks.
dress:0000:0080:b9f3:a454:0000:97de:0098:a3d3
C. 2001::1/127 is used for loopback ad-
A. 0000:0080:b9f3:a454:0:97de:0098:a3d3 dresses.

B. 0000:80:b9f3:a454:0000:97de:0098:a3d3 D. FE80::/10 is used for link-local unicast


E. FF00::/8 is used for IPv6 multicast.
C. 0:80:b9f3:a454:0:97de:98:a3d3
D. 0000:080:b9f3:a454:0000:97de:0098:a3d3 106. What is the function of Rule 1:Omission
of the Leading 0s?
102. How can subnet masks be used to control
A. remove some the leading 0s in each in-
access to specific areas of a network?
dividual hextet.
A. By limiting access to certain subnets
B. remove all the leading 0s in each indi-
B. By allowing all devices on the network
vidual hextet.
to share the same broadcast domain
C. By increasing the number of hosts on C. not remove all the leading 0s in each
a network segment individual hextet.
D. By increasing the attack surface of the D. add all the leading 0s in each individual
network hextet.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 189

107. What type of address is automatically as- C. Global Routing Prefix, Subnet ID
signed to an interface when IPv6 is en- D. Global Routing Prefix, Subnet ID, Inter-
abled on that interface?

PRACTICE BOOK» NOT FOR SALE


face ID
A. unique local
113. How many bits are contained in each hex-
B. link-local
tet of an IPv6 address?
C. global unicast
A. 8
D. loopback
B. 16
108. Which of the following OSPF versions is C. 24
specific to IPv6?
D. 4
A. OSPFv2
B. OSPFv4 114. IPv4 Address Exhaustion is the concept
associated with what?
C. OSPFv3
A. A full subnet of addresses
D. OSPFv1
B. Private Address Ranges
109. FE80::/10 is used for?
C. Depletion of Public IPv4 Addresses
A. hosts on the same subnet to communi-
D. Lease timeouts of DHCP Addresses
cate
B. reserved for ISP routers 115. Messaging between an IPv6 router and
C. testing internet connectivity an IPv6 device, including dynamic address
allocation are as follows:
D. testing 6To4 tunnels
A. Router Solicitation (RS ) message
110. IPv6 loop-back address B. Router Advertisement (RA ) message
A. 127.0.0.1
C. Neighbor Advertisement ( NA ) mes-
B. Fe80::1 sage.
C. ::1 D. Neighbor Solicitation ( NS ) message.
D. ::2
116. Delivers packets to multiple addresses
111. Use rule 1 reduce the IPv6 addresses be- A. multicast address
low:0000:0000:0000:0000:0000:0000:0000:0000
B. anycast address
A. 0:0:0:0:0:0:0:0
C. unicast address
B. 00:00:00:00:00:00:00:00
D. IPv6 loopback address
C. 000:000:000:000:000:000:000:000
D. :: 117. Which command enables IPv6 routing on
a Cisco device?
112. Global Unicast IPv6 Address devide it 3
A. IPv6 Routing Enabled
parts, which is
B. IPv6 Route Capable
A. Global Routing, Subnet ID, Interface
ID C. IPv6 Unicast-Only
B. Global Routing Prefix D. IPv6 Unicast-routing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 190

118. Select the valid IPv6 address from given 123. How many bits in “Global Routing Pre-
ones. (Choose two) fix”?
A. FE63::0043::11:21 A. 16 bits
B. 191.2.1.2:2:11.1 B. 48 bits
C. 64 bits
C. 2001::98
D. 47 bits
D. 2002:c0a8:101::42
124. Which is unspecified IPv6 address

NARAYAN CHANGDER
E. :2001::
A. ::0/48
119. Which of the following techniques use na- B. ::0/128
tive IPv6 connectivity?
C. :0/16
A. dual stack
D. ::0/1
B. tunneling
125. You have a device with a MAC address of
C. translation e3-42-a4-02-6f-be. What will be the au-
D. all of the above tomatically generated link-local address?
A. fe80::e142:a402:6fbe
120. Use Combining Rule 1 and Rule 2 to
B. ff02::e142:a4ff:fe02:6fbe
reduce the size of IPv6 address be-
low:FE95:FC6C:C540:0000:0000:0000:0000:9800 C. fe80::e142:a4ff:fe02:6fbe
A. FE95:FC6C:C540::98 D. 2003::e342:a402:6fbe

B. FE95:FC6C:C540::9800 126. What value does an IPv6 link-local ad-


dress begin with?
C. FE95:FC6C:C540:9800
A. ::
D. FE95:FC6C:C54::9800
B. FC00::/7
121. what is the use of Multicast Addresses? C. FE80::/10
A. it is used to reach a group of devices D. ::1
running a common protocol or service
127. Using Rule 1 ( Omission of the Leading
B. it is used to send a single packet to one 0s), reduce the IPv6 addresses to their
or more destinations shortened form.2001:0000:0000:ABCD:FFFF:0000:0000:000
C. it is used to allows the Ethernet NIC to A. 2001::ABCD:FFFF:0:0:1
filter the frame B. 2001::ABCD:FFFF::1
D. none of above C. 2001:0:0:ABCD:FFFF:0:0:1
D. 2001:0000:0000:ABCD:FFFF::0001
122. An Internet Protocol is
A. Fast data transfer 128. Which type of IPv6 address is not
routable and used only for communication
B. A type of bandwidth on a single subnet?
C. A web server A. unspecified address
D. Rules for sending data B. unique local address

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 191

C. global unicast address 133. What is the purpose of 6to4 technol-


ogy?
D. link-local address

PRACTICE BOOK» NOT FOR SALE


A. To convert IPv4 port numbers to IPv6
129. For two hosts that are on the same net- port numbers
work, which of the following statements B. To carry IPv4 packets inside IPv6 pack-
are true? (Choose three.) ets.
A. Both hosts will have the same IP ad- C. To convert IPv4 addresses to IPv6 ad-
dress dresses.
B. Both hosts will have the same default D. To automatically assign IPv6 address
gateway address to a network adapter when no DNS server
C. Both hosts will have different MAC ad- can be reached
dress 134. IPV6 address has 8 parts.Each part con-
D. Both hosts will have different IP ad- tains how many bits?
dress A. 4 bits
E. Both hosts will have different default B. 8 bits
gateway address C. 16 bits
130. Using Rule 2 (Omission of the All-0 Hex- D. 32 bits
tets), reduce the IPv6 addresses to their E. 128 bits
shortened form.FE95:FC6C:C540:0000:0000:0000:0000:9800
135. IPv6 is represented by using a number
A. FE95:FC6C:C540::9800 system?
B. FE95:FC6C:C54:0:0:0:0:9800 A. binary
C. FE95:FC6C:C540::98 B. decimal
D. FE95:FC6C:C540::0:0:9800 C. octal
D. hexadecimal
131. Below is the basic structured of IPv4 ex-
cept 136. You have a device with a MAC address of
e4-36-f8-77-56-6c. What will be the au-
A. four octet
tomatically generated link-local address?
B. hexadecimal string A. ff02::e636:f8ff:fe77:566c
C. separate by dot B. 2001::e436:f8ff:fe77:566c
D. 32 bit C. fe80::e636:f8ff:fe77:566c
D. ff02::e436:f8ff:fe77:566c
132. Using Rule 1 ( Omission of the Leading
0s), reduce the IPv6 addresses to their 137. Which of the following is true when de-
shortened form.FF00:ACAD:0000:0000:1234:0000:0000:0001
scribing an anycast address?
A. FF00:ACAD::1234:0:0:1 A. Packets addressed to a unicast ad-
dress are delivered to a single interface.
B. FF00:ACAD::1234::1
B. Packets are delivered to all interfaces
C. FF00:ACAD::1234:0000:0000:0001
identified by the address. This is also
D. FF00:ACAD:0:0:1234:0:0:1 called one-to-many addresses.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 192

C. . This address identifies multiple inter- D. EIGRP, OSPF, and BGP are the only
faces and the anycast packet is only de- routing protocols that support IPv6.
livered to one address. This address can E. Link-local addresses are used to form
also be called one-to-one-of-many. routing adjacencies.
D. These addresses are meant for non-
routing purposes, but they are almost 142. what is the advantage of Solicited-
globally unique so it is unlikely they will Node?
have an address overlap. A. it is mapped to a special Ethernet mul-

NARAYAN CHANGDER
ticast address
138. What is a MAC address?
B. you can use it in context with specific
A. A protocol used to transmit data be- protocols such as DHCPv6
tween networks C. it allows packets to be sent to a group
B. A unique identifier assigned to a net- where it’s received and processed by all
work interface controller (NIC) IPv6 interfaces on the link or network.
C. An IP address used to identify a device D. none of above
on a network
143. Using Rule 1 and 2 reduce the
D. A security feature used to prevent IPv6 addresses to their shortest
unauthorised access to a network form.0000:0000:0000:0000:0000:0000:0000:0001
139. Your ISP has given you the IPv6 address A. 0:0:0:0:0:0:0:1
2000:ACAD:1234:6600::/56. What are B. 0:0:0:0:0:0:0:0001
the FIRST /64 subnets? C. ::1
A. 2000:ACAD:1234:6603::/64 D. ::0001
B. 2000:ACAD:1234:6602::/64
144. Which network migration technique en-
C. 2000:ACAD:1234:6601::/64 capsulates IPv6 packets inside IPv4 pack-
D. 2000:ACAD:1234:6600::/64 ets to carry them over IPv4 network in-
frastructures?
140. Which two are features of IPv6? A. Tunneling
A. Multicast B. Dual-stack
B. broadcast C. Translation
C. anycast D. Encapsulation
D. allcast 145. Which option is a valid IPv6 address?
141. Which statements about IPv6 and routing A. 2001:0000:130F::099a::12a
protocols are true? (Choose two) B. 2002:7654:A1AD:61:81AF:CCC1
A. EIGRPv3 was developed to support C. FEC0:ABCD:WXYZ:0067::2A4
IPv6 routing.
D. 2004:1:25A4:886F::1
B. OSPFv3 was developed to support
IPv6 routing. 146. How many bits is an IPv6 Address

C. Loopback addresses are used to form A. 32


routing adjacencies. B. 64

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 193

C. 96 152. Which of these is not a type of message


associated with ICMPv6?
D. 128

PRACTICE BOOK» NOT FOR SALE


A. Router advertisement
147. What does the Cisco EUI generation pro-
B. Router solicitation
cess use to create the Interface ID
C. neighbor advertisement
A. MAC Address
D. neighbor message
B. Predefined Code
C. Random Generation 153. Determine which of the IP Address is
valid?
D. Cisco Subscription Service
A. 192.258.5.99
148. What is the name for the host portion of B. 192.251.7
an ipv6 address?
C. 192.256.2.299
A. global routing prefix
D. 192.121.8.99
B. subnet portion
C. interface ID 154. How many bits do you need to represent
a hexadecimal number?
D. host ID
A. 1
149. What is the field in the IPv4 packet B. 2
header that tells a L3 device ( router )
when a packet should be dropped? C. 3

A. hop limit D. 4

B. Time to live 155. Multicast addresses


C. Round trip time A. Packets are delivered to multiple inter-
D. type field faces
B. Packets are broadcast to multiple net-
150. Which one is NOT IPv6 Address Cate- works
gories?
C. Packets are broadcast to every host on
A. Unicast, Multicast, Anycast a subnet
B. Unicast, D. Packets are broadcast to every host on
C. Multicast a network

D. Anknown cast 156. Anycast address are described as a


A. one-to-one-of-many packet delivery.
151. Below is basic structured of IPv6 except
B. one-to-nearest or one-to-one-of-many
A. 128 bits
packet delivery.
B. eight hexadecimal string
C. one-to-nearest packet delivery.
C. value 0 to 255
D. one-to-far or one-to-one-of-many
D. separate by colon packet delivery.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 194

157. IPv6 doesn’t support 162. Which two statements describe char-
acteristics of IPv6 unicast addressing?
A. Anycast
(Choose two)
B. Broadcast
A. Global addresses start with 2000::/3
C. Unicast B. Link-local addresses start with
D. Multicast FE00:/12
C. There is only one loopback address
158. Interface G0/0/1 on RTA contains

NARAYAN CHANGDER
and it is::1
a MAC address of 00e0-fc03-aa73
and is configured with the IPv6 ad- D. If a global address is assigned to an
dress 2001::2E0:FCFF:FE03:AA73. Which interface, then that is the only allowable
method is most likely to have been used address for the interface.
to configure the interface IPv6 address?
163. What is the prefix associated with the
A. DHCPv6 IPv6 address 2001:DB8:D15:EA:CC44::1/64?
B. Auto-link
A. 2001::/64
C. ARP
B. 2001:DB8::/64
D. EUI-64
C. 2001:DB8:D15:EA::/64
159. Using Rule 2 (Omission of the All-0 Hex- D. 2001:DB8:D15:EA:CC44::1/64
tets), reduce the IPv6 addresses to their
shortened form.0000:0000:0000:0000:0000:0000:0000:0001
164. Multicast Address starts with
A. 0:0:0:0:0:0:0:1 A. FD00:
B. 0:0:0:0:0:0:0:0001 B. FF00:
C. ::1 C. FE00:

D. ::0001 D. FE80:

165. Because you can have multiple IPv6 ad-


160. Data is sent one-to-one to each interface
dresses, which column replaces the inter-
A. Unicast face ip address column that was displayed
B. Anycast in the IPv4 brief?
A. Intf ID
C. Allcast
B. Nbrs F/C
D. Multicast
C. Cost
161. What is the term for the packet counter D. State
that tells a router when to drop a packet
in ipv6? 166. The IPv6 address “2001:db8:abc:1234:0290:27ff:fe17:fc0f/
A. time to live is assigned to a device. How was the in-
terface portion assigned?
B. round trip time
A. Manually, using DHCPv6
C. hop limit
B. Dynamically, using a random genera-
D. hop count tor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 195

C. Manually by an administrator 172. What type of IPv6 address is FE80::1?


D. Dynamically, using EUI-64 A. Link-Local

PRACTICE BOOK» NOT FOR SALE


167. What is the purpose of IPv6 B. Multicast
A. To replace IPv4 because IPv4 is too C. Global Unicast
short
D. Loopback
B. To replace IPv4 because the ammount
of IP address in IPv4 is almost exhausted.
173. Use Combining Rule 1 and Rule 2 to
C. Because newer computer only under- reduce the size of IPv6 address be-
stand IPv6 low:2000:0000:0000:0000:0000:ABCD:0000:0035
D. To stop connection of non per- A. 2000::ABCD:0:35
sonal computer devices such as smart-
phones/IPTV B. 2000::ABCD:0:0035

168. Which bit gets flipped in Cisco EUI gener- C. 2000::ABCD:0000:35


ation? D. 2000:0:0:0:ABCD:0:35
A. 1
174. Using Rule 1 ( Omission of the Leading
B. 4
0s), reduce the IPv6 addresses to their
C. 7 shortened form.FE95:FC6C:C540:0000:0000:0000:0000:980
D. 10 A. FE95:FC6C:C540::9800
169. Anycast addresses are B. FE95:FC6C:C54:0:0:0:0:9800
A. Only assigned to routers C. FE95:FC6C:C540::98
B. Only used as destination addresses
D. FE95:FC6C:C540::0:0:9800
C. Both are correct
D. Neither are correct 175. Which of these represents an IPv6 link-
local address?
170. Using both IPv4 and IPv6 at the same
time on the same equipment is known as: A. FE08::280e:611:a:f14f.3d69
A. Efficient Processing B. FE81::280f.512b:e14f:3d69
B. Dual Homing C. FE80::380e:611a:e14f:3d69
C. Dual Stack D. FEFE:0345:5f1b::e14d:3d69
D. Redundant Routing
176. Using Rule 1 and 2 reduce the
171. Using Rule 2 (Omission of the All-0 Hex- IPv6 addresses to their shortest
tets), reduce the IPv6 addresses to their form.FF00:ACAD:0000:0000:1234:0000:0000:0001
shortened form.FF00:ACAD:0000:0000:1234:0000:0000:0001
A. FF00:ACAD::1234:0:0:1
A. FF00:ACAD::1234:0:0:1
B. FF00:ACAD::1234::1 B. FF00:ACAD::1234::1

C. FF00:ACAD::1234:0000:0000:0001 C. FF00:ACAD::1234:0000:0000:0001
D. FF00:ACAD:0:0:1234:0:0:1 D. FF00:ACAD:0:0:1234:0:0:1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 196

177. Typically, which network device would be D. fd15:db8::700:3:400F:572B


used to perform NAT for a corporate envi- E. fd15:db8:0::700:3:4F:527B
ronment?
A. Switch 182. OSPFv3 runs over
B. DHCP server A. Links
C. Host Device B. Networks
D. Router C. None of Them

NARAYAN CHANGDER
E. server D. All of them

178. Using Rule 1 and 2 reduce the 183. Data is sent to many interfaces at once
IPv6 addresses to their shortest which have been grouped through a group
form.FE95:FC6C:C540:0000:0000:0000:0000:9800 address.
A. FE95:FC6C:C540::9800 A. Allcast
B. FE95:FC6C:C54:0:0:0:0:9800 B. Anycast
C. FE95:FC6C:C540::98 C. Unicast
D. FE95:FC6C:C540::0:0:9800 D. Multicast

179. IPV4 address has 4 part. Each part con- 184. Which of these addresses is correct
tains contains how many bits? A. 10.1.256.1
A. 4 bits B. 192:1:0:10
B. 8 bits C. 1.1.1.1.1
C. 16 bits D. 72.10.5.25
D. 32 bits
185. what command has to be run in the con-
180. Which two statements are true about fig line of a Cisco router in order to support
IPv6 Unique Local Addresses? IPv6?
A. They are identical to IPv4 private ad- A. ipv6 routing
dresses B. ipv6 switching-routing
B. They use the prefix FC00::/7 C. ipv6 unicast-routing
C. They are defined by RFC 1884 D. ipv6 unicast routing
D. They use the prefix FEC0::/10
186. How are link-local IPv6 addresses cre-
E. They can be routed on the IPv6 global ated?
internet
A. They use the device MAC address with
181. In which two formats can the IPv6 ad- a prefix of FF00.
dress fd15:0db8:0000:0000:0700:0003:400F:572BB. They are randomly generated and then
be written? (Choose two) prefixed with F808.
A. fd15:0db8:0000:0000:700:3:400F:527B C. A combination of the local-link prefix
FE80 and the 64-bit IPv6 identifier
B. fd15:0db8::7:3:4F:527B D. They are randomly generated and then
C. fd15::db8::700:3:400F:527B prefixed with FFCC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 NEXT GENERATION IP 197

187. What hextet in ipv6 will tell you the sub- B. The default gateway address is cor-
net? rectly configured.

PRACTICE BOOK» NOT FOR SALE


A. 1 C. All hosts on the local link are available.
B. 2 D. IP is properly installed on the host.
C. 3
193. What is the IPv6 equivalent of the Sub-
D. 4 net Mask
188. what is an All-nodes multicast group? A. Prefix-length
A. it is a multicast group that all IPv6- B. Interface
enabled devices join
C. Network
B. it is a multicast group that all IPv6
D. Subnet
routers join
C. multicast address is used to send a sin- 194. What type of communication is not sup-
gle packet to one or more destinations ported in IPv6?
D. none of above A. Anycast
189. IPv6 does not use type of address. B. Broadcast
A. broadcast C. Unicast
B. multicast D. Multicast
C. anycast 195. The following addresses have been
D. unicast shorted using Rule1 and/or Rule 2. Ex-
pand address below back to their pre-
190. The reserved IPv6 address of the net- ferred format. “FFFF::4E00:1235:0:34”
work interface card
A. FFFF:0000:0000:0000:4E00:1235:0000:0034
A. IPv6 loopback address
B. multicast address
B. FFFF:0:0:0:4E00:1235:0:34
C. anycast address
C. FFFF:0000:0000:0000:4E00:1235:0000:3400
D. unicast address

191. How many bits are contained in each field D. FFFF:0:0:0:4E00:1235:0:34


of an IPv6 address?
196. Which is true of site-local addresses
A. 8
A. They are globally searchable/routable
B. 16
B. Their scope is equivalent to a private
C. 24
IP address
D. 4
C. They are used for intranet connection
192. What is indicated by a successful ping to tests only
the::1 IPv6 address? D. They are allocated from global reserve
A. The host is cabled properly. addresses

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5. Data-Link Layer: Wired Networks

NARAYAN CHANGDER
5.1 Introduction
1. TYPES OF SWITCH IS / ARE 5. Why doesn’t modern ethernet require a
A. UNMANAGED media access control method?
B. MANAGED A. It uses one pair of wires for sending
data.
C. SMART / INTELLIGENT
D. ALL B. It uses all wires for communication.
C. It uses half duplex.
2. Connection to the line modems is / are
D. It uses full duplex.
A. 2-wire
B. 4-wire 6. What is the purpose of the CRC value that
C. 6-wire is found in the FCS trailer field of a frame?
D. both 2-wire & 4-wire A. To verify the integrity of the received
frame.
3. Wired ethernet is defined by which proto-
col? B. To verify the physical address in the
frame.
A. IEEE 802.11
C. To verify the logical address in the
B. IEEE 802.15
frame.
C. IEEE 802.11
D. To compute the checksum header for
D. IEEE 802.3 the data field in the frame.
4. This is the maximum speed limit that you
7. Directional capacity modems is / are
can achieve
A. Bandwidth A. half duplex
B. Throughput B. full duplex
C. Data rate C. both
D. Up Stream D. none

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Introduction 199

8. Which of the following is a data link pro- B. The receiving node identifies the be-
tocol? ginning of a frame by seeing a logical ad-
dress.

PRACTICE BOOK» NOT FOR SALE


A. ethernet
B. point to point protocol C. The transmitting node sends a beacon
to notify that a data frame is attached.
C. hdlc
D. The transmitting node inserts start
D. all of the mentioned and stop bits into the frame.
9. This technology can divide a switch into 14. What method is used to manage
small broadcast domains. contention-based access on a wireless net-
A. Routing Loop work?
B. VLAN A. priority ordering
C. VPN B. CSMA/CD
D. WLAN C. token passing

10. functions of data link layer D. CSMA/CA

A. Framing 15. The term “modem” stands for


B. Physical Addressing A. MODULATOR
C. controlling B. DEMODULATOR
D. All C. BOTH
11. What is the layer 2 broadcast address? D. NONE
A. FF:FF:FF:FF:FF:FF
16. Which topology type would use point-to-
B. 255.255.255.255 point, hub and spoke, or mesh topolo-
C. 255.255.0.0 gies?

D. AA:AA:AA:AA:AA:AA A. WLAN
B. WAN
12. CRC stands for
C. PAN
A. cyclic redundancy check
D. LAN
B. code repeat check
C. code redundancy check 17. This allows one or more links to be aggre-
gated together to form a Link. This pro-
D. cyclic repeat check
vides increased bandwidth and fault toler-
13. How does a receiving node identify the be- ance if one link fails the other one will take
ginning and end of frames received from a over the transmission.
continuous string of bits received from the A. Link aggregation
medium?
B. Trunk lines
A. The transmitting node sends an out-of-
C. STP
band signal to the receiver about the be-
ginning of the frame. D. Port Link

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Introduction 200

18. This will occur if two or more devices on C. mesh


the network attempt to send data at the D. star
same time.
A. Connection 24. What is the PDU for layer 2 in the OSI
model?
B. Encapsulation
A. Packet
C. Collision
B. Frame
D. Transmission

NARAYAN CHANGDER
C. Bits
19. Transmission type modems is / are D. Data
A. Asynchronous E. Segment
B. Synchronous
25. Choose the correct statement from the fol-
C. Both lowing
D. none A. PPP can terminate the link at any time
20. What is the maximum number of VLANs B. PPP can terminate the link only during
you can create on a switch? the link establishment phase
A. 4094 C. PPP can terminate the link during the
B. 4095 authentication phase

C. 4096 D. PPP can terminate the link during the


callback control phase
D. 4093
26. The protocol that converts MAC addresses
21. This must be implemented to avoid loops into IP addresses is called
(broadcast storm) when creating redun-
dant links. A. ARP

A. Spanning Tree Protocol B. RARP

B. Route Poisoning C. IP

C. Link Aggregation D. MAC

D. Teaming 27. A protocol used to map IP addresses to


MAC addresses.
22. Which of the following are layer 2 de-
vices? A. DHCP

A. NIC B. NAT

B. Hub C. DNS

C. Router D. ARP

D. Switch 28. Every network device has a special physi-


cal identification known as a address
23. What type of physical topology can be cre-
ated by connecting all Ethernet cables to a A. IP
central device? B. MAC
A. ring C. NONE
B. bus D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Introduction 201

29. Which statement describes the logical link 33. Types of Modems is / are
control sublayer in Ethernet standards? A. Directional capacity

PRACTICE BOOK» NOT FOR SALE


A. Logical link control is specified in the B. Connection to the line
IEEE 802.3 standard.
C. Transmission mode
B. The LLC sublayer adds a header and a
D. All
trailer to the data.
C. Logical link control is implemented in 34. Which of the following is used by the Data
software to communicate with the upper Link layer to determine the media access
layers of the protocol suite. control method to be used to put frames
onto the media?
D. The LLC sublayer is responsible for the
placement and retrieval of frames on and A. Type of data
off the media. B. Transport layer protocols
C. Layer 3 IP protocol
30. The PPP protocol
D. Logical Topology
A. Is designed for simple links which
transport packets between two peers 35. What type of access control is used for
B. Is one of the protocols for making an Wireless?
Internet connection over a phone line A. CMSA/Collision Avoidance
C. Is designed for simple links which B. CMSA/Collision Detection
transport packets between two peers and C. CMSA/Media Control
making an Internet connection over a
phone line D. CMSA/Media Access

D. Is used for sharing bandwidth 36. Which of the following is a function of the
MAC sublayer?
31. Packets are packaged into frames at which
A. It is responsible for Media Access Con-
layer of the OSI model?
trol.
A. data link
B. It handles communication between up-
B. transport per and lower layers.
C. physical C. It performs the function of NIC driver
software.
D. presentation
D. It adds control information to network
E. application
protocol layer data.
32. The type of communication where only one 37. hich scheme/ strategy is suitable to es-
device can transmit and the other can only tablish the communication between the ac-
receive data. Thecommunication is unidi- cess point (AP) and the infrastructure of
rectional, like a one-way road. LANs?
A. Simplex A. Wired
B. Half-duplex B. Wireless
C. Full-duplex C. Both a & b
D. duplexer D. Cannot Predict

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Introduction 202

38. TYPES OF ROUTER IS / ARE 43. Which category of HDLC frames undergoes
A. WIRED error and flow control mechanisms by com-
prising send and receive sequence num-
B. WIRELESS bers?
C. CORE A. U-frames
D. EDGE
B. I-frames
E. ALL
C. S-frames

NARAYAN CHANGDER
39. It is a 12-hexadecimal identifier of every D. All of the above
networking interface.
A. MAC address 44. A circuit board that is inserted on a com-
puter to connect to the network is called a
B. IP address
C. IPv6
A. HUB
D. Serial Number
B. NIC
40. The protocol that converts IP addresses C. SWITCH
into MAC addresses is called
D. ROUTER
A. ARP
B. RARP 45. Which of the following devices resides at
the data link layer of the OSI model?
C. IP
D. MAC A. Router
B. Passive hub
41. What are the frames issued by the sec-
ondary station of HDLC, known as? C. Ethernet switch
A. Link D. Repeater
B. Command
46. For devices to be members of a VLAN their
C. Response network data frames must conform to the
D. None of the above ?
A. IEEE 802.1Q
42. Which of the following correctly identifies
features provided by the frame header B. IEEE 802.1D
fields of the Data Link layer? C. IEEE 802.11
A. It identifies the Layer 3 protocol type D. IEEE 802.11ax
and establishes flow control fields.
B. It contains the Layer 3 source and des- 47. What do you call the link between two
tination addresses used for route determi- switches?
nation. A. Ethernet cable
C. It establishes port connections be-
B. Link aggregation
tween network applications.
C. Branch
D. It includes information about user ap-
plications. D. Trunk

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Introduction 203

48. FOR CONNECTING TWO DIFFERENT NET- A. Carrier Sense Multiple Access with Col-
WORK PATHS DEVICE IS USED lision Avoidance

PRACTICE BOOK» NOT FOR SALE


A. HUB B. Carrier Sense Multiple Access with Col-
lision Detection
B. SWITCH
C. Carrier Sense Multiple Access with fre-
C. BRIDGE
quency
D. ROUTER
D. Carrier Sense Multiple Access with no
49. TYPES OF HUB IS / ARE collision

A. ACTIVE 54. What conclusion can be drawn if the col-


B. PASSIVE lision is detected in CSMA/CD algorithm
while controlling the access in wireless
C. INTELLIGENT LANs?
D. ALL A. Non-reception of frame & necessity of
retransmission
50. Which consequences are more likely to oc-
cur during the frame transmission in Stop- B. No necessity of working in duplex
and-Wait ARQ mechanism? mode for the host
A. Loss of frame or an acknowledgement C. c. No necessity to prevent the signal
fading
B. Delay in an acknowledgement
D. d. All of the above
C. Normal operation
55. Select all Internet Protocol Suite that be-
D. All of the above
longs to the Data link layer
51. Which of the following is the multiple ac- A. MAC address
cess protocol for channel access control?
B. ARP
A. CSMA/CD
C. 802.3
B. CSMA/CA D. 802.11
C. Both CSMA/CD & CSMA/CA E. CSMA/CD and CSMA/CA
D. HDLC
56. NIC CONNECTED
52. Which among the following represents A. WIRED NETWORK
the objectives/requirements of Data Link
B. WIRELESS NETWORK
Layer?
C. BOTH
A. Frame Synchronization
D. NONE
B. Error & Flow Control
C. Both a & b 57. PPP provides the layer in the TCP/IP
suite.
D. None of the above
A. Link
53. This is deployed in a wired LAN to stop B. Network
transmissions if an incoming signal is de-
tected. It does this by sensing transmis- C. Transport
sion from other devices on the medium. D. Application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 204

58. Which protocol does the PPP protocol pro- C. BOTH


vide for handling the capabilities of the
D. NONE
connection/link on the network?
A. LCP 60. Which feature of Go-Back-N ARQ mech-
B. NCP anism possesses an ability to assign the
sliding window in the forward diretion?
C. TCP
D. Both LCP and NCP A. Control Variables

NARAYAN CHANGDER
59. NIC ALSO CALLED AS B. Sender Sliding Window

A. network adapter C. Receiver Sliding Window


B. network interface card D. Resending of frames

5.2 DATA LINK CONTROL (DLC)


1. In error correction the receiver asks 5. IDENTIFY THE CORRECT PREPOSI-
the sender to send the data again TION:DIVIDE THIS CAKE IN FOUR PARTS.
A. Forward A. BY
B. Backward
B. TO
C. Outward
C. INTO
D. Retransmission
D. none of above
2. It was my first experience flies on an air-
plane. I was very excited.
6. Which words make up the compound word-
A. fly rattlesnake?
B. flyers A. rattle + snake
C. fyling
B. rat + tle + snake
D. flyed
C. ratle + snake
3. The checksum is used in the internet by
several protocols although not at the D. rat + tlesnake
A. Session layer
7. A block of data is sent alongside a calcu-
B. Transport layer lated value. The receiving computer also
C. Network layer calculates what it believes should be the
D. Data Link layer value. The values are then compared to
see if an error has occurred during trans-
4. In a communications system, noise is most mission
likely to affect the signal
A. Parity Check
A. at the transmitter
B. Checksum
B. in the channel
C. in the information source C. Check Digit
D. at the destination D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 205

8. Then, it was time to blow out the candles 13. I comb my hairs four times in a day.
at my birthday cake while everybody sang A. comb
the birthday song.

PRACTICE BOOK» NOT FOR SALE


B. hair
A. in
C. day
B. on
D. none of above
C. over
D. none of above 14. If check sum 11011010 & complement
00000000 or result is zero then received
9. In block coding, our message is divided into data is
blocks, each of 105 bits, We add 25 redun-
A. Discarded
dant bits to each block then length n =
The resulting n-bit blocks are called B. retransmitted
A. 130, data words C. interrupted
B. 105, code words D. accepted
C. 130, code words 15. The acoustic channel is used for which of
D. 105, data words the following?

10. An airplane ride was a little bumpy due A. UHF communications


to turbulence or thankfully we arrived in B. single-sideband communication
Bangkok safely. This was indeed one of C. television communications
the most memorable experiences I’ve ever
had D. person-to-person voice communica-
tions
A. The, but
B. A, because 16. The between two words is the number
of differences between corresponding bits
C. An, then
A. Hamming code
D. a, after that
B. Hamming distance
11. Indicate the false statement. Modulation
C. Hamming rule
is used to
D. Hamming data
A. reduce the bandwidth used
B. separate differing transmissions 17. The Hamming can be easily found if we ap-
ply
C. ensure that intelligence may be trans-
mitted over long distances A. XOR operation
D. allow the use of practicable antennas B. XNOR operation
C. OR operation
12. Indicate the true statement. The process
of sending and receiving started as early D. AND operation
as
18. We then waited for we airplane. Luckily
A. the middle 1930s it was on time. We lined up and boarded
B. 1850 the airplane.
C. the beginning of the twentieth century A. They
D. the 1840s B. Us

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 206

C. Our C. phoned/ was writing


D. Them D. was phoning/ wrote

19. WHICH IS THE CORRECT FORM OF THE 24. Hamming code C(7, 4) can detect up to
GIVEN EXPRESSION? OPEN THE KNOT bit error & can correct up to bit error.
A. RELEASE THE KNOT A. 1, 2
B. UNTIE THE KNOT B. 2, 1

NARAYAN CHANGDER
C. TAKE THE KNOT C. 2, 3
D. none of above D. 3, 2

20. An extra bit added to a string of binary 25. Which error detection method is more effi-
code to ensure the number of 1-bits are ei- cient?
ther even or odd, depending upon the sys- A. Parity check
tem used.
B. Cyclic redundancy check
A. ARQ
C. Parity & Cyclic redundancy check
B. Parity Check
D. Hamming code
C. Checksum
26. A forward error-correcting code corrects
D. Check Digit errors by
21. Punctuate the following sentence:you A. requiring partial re-transmission of
work as a teacher in vivekanand school the signal
A. You work as a teacher in Vivekanand B. requiring re-transmission of the entire
School. signal
B. you work as a teacher in Vivekanand C. requiring no part of the signal to be re-
school. transmitted
C. You work as a teacher in vivekanand D. using parity to correct the errors in all
school. cases
D. you work as a teacher in vivekanand 27. Correct the sentence:Mans are busy in a
school meeting.
22. Check sum:sender side-The message is di- A. Men
vided into bit words & The value of the B. Mens
checksum word is set to
C. Man
A. 8, 0
D. all of these
B. 8, 1
28. WHICH WORD HAS TO BE REPLACED?
C. 16, 0
NONE OF THE WORKERS ARE HAPPY.
D. 16, 1
A. NONE
23. When Jack me, I a letter. B. ARE
A. phoned/ has been writing C. THE WORKERS
B. has phoned/ was writing D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 207

29. Check sum:Receiver side The message (in- B. Degree


cluding checksum) is divided into bit C. Generator
words & All words are added using

PRACTICE BOOK» NOT FOR SALE


complement. D. Monitor

A. 8, 1 35. Which of the steps is not included in the


process of reception?
B. 8, 2
A. decoding
C. 16, 1
B. encoding
D. 16, 2
C. storage
30. Correct the underline word.Reyansh plays D. interpretation
cricket very well. She is very energetic.
A. He 36. Which error detection method uses one’s
complement?
B. We
A. Simple parity check
C. They
B. Two dimensional parity check
D. You
C. CRC
31. The final number in a code of numbers. It D. Checksum
is calculated from all the other numbers in
the code. It’s purpose is to spot errors on 37. In a cyclic code, if a codeword is cyclically
data entry. shifted (rotated), the result is another
A. Parity Check A. Code word

B. Checksum B. data word


C. rotated word
C. Check Digit
D. shifted word
D. none of above
38. What is the check digit for this bar code?
32. Switching systems
163782356891
A. improve the efficiency of data transfer A. 8
B. are not used in data systems B. 9
C. require additional lines C. 3
D. are limited to small data networks D. 6
33. Choose correct proper noun for the follow- 39. Punctuate the following:we all are going
ing common noun:”shoes” to shimla this weekend
A. Action A. we all are going to Shimla this week-
B. Lays end?
C. Titan B. We all are going to shimla this week-
end.
D. Dairy Milk
C. We all are going to Shimla this week-
34. The divisor in the cyclic code is normally end.
called D. We all are going to shimla this week-
A. Redundancy end

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 208

40. Techniques for error detection is / are: B. It takes a long time to calculate
A. Simple Parity check C. It can only be done once
B. Two-dimensional Parity check D. It is expensive to design
C. Checksum 46. How does an ARQ check work?
D. Cyclic redundancy check A. The sender resends the data if it does
E. all options not receive confirmation after a certain
amount of time

NARAYAN CHANGDER
41. HE AND MYSELF WERE THERE.THE WORD
B. The sender compares the sent data to
MYSELF SHOULD BE REPLACED BY
the original and sees if an error occurred
A. I
C. The receiver checks with the sender to
B. ME find out whether the data was sent cor-
C. MINE rectly

D. none of above D. The sender checks whether the re-


ceiver has received the data by perform-
42. In an even parity scheme, what would ing a calculation on a check digit
be the correct parity bit for the binary
string:1010001 47. Correct the sentence.I have a dog. They is
black and white in colour.
A. 1 1101 0001
A. It
B. 0 1101 0001
B. We
C. 1 101 0001
C. You
D. 1101 0001 1
D. I
43. checksum scheme is based on , CRC is 48. Where you last Christmas holi-
based on days?
A. Addition, binary division A. did go
B. binary division, Addition B. do go
C. subtraction, binary division C. were go
D. binary division, subtraction D. was go
44. The taxi arrived promptly on five. We 49. CHOOSE THE CORRECT FORM OF THE
then quickly loaded our luggage and were HIGHLIGHED PART:HE SHOULD HAVE NOT
off to an airport. GONE WITHOUT ME.
A. at, the A. NOT SHOULD HAVE GONE
B. in, a B. SHOULD NOT HAVE GONE
C. the, a C. SHOULD HAVE GONE NOT
D. under, the D. none of above
45. Which is a disadvantage of parity check- 50. Fill in the blank:My name is Priya live
ing? in Mumbai.
A. We cannot locate where the error is A. She

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 209

B. We does not receive the ACKNOWLEDGMENT


C. I within the time specified in TIMEOUT.

PRACTICE BOOK» NOT FOR SALE


D. None of these C. The sender re-sends the data if the
sender does not receive the ACKNOWL-
51. We checked in and went to the departure EDGMENT within the time specified in
hall. Since we had not has time for break- TIMEOUT.
fast we ate at the airport. D. None of the above
A. the
56. My friends and relatives brought me won-
B. have derfully birthday gifts.
C. had A. wonderful
D. in B. wonderfulment

52. is added to the block if it contains odd C. wonderfuls


number of 1’s, and is added if it con- D. none of above
tains even number of 1’s
57. Indicate the false statement. Fourier anal-
A. 0, 0
ysis shows that a sawtooth wave consist
B. 0, 1 of
C. 1, 0 A. fundamental and subharmonic sine
D. 1, 1 waves
B. a fundamental sine wave and an infi-
53. I really enjoyed my first birthday party. I nite number of harmonics
think all of the guest had a great time too.
C. fundamental and harmonic sine waves
A. guests whose amplitude decreases with the har-
B. guested monic number
C. guesting D. sinusoidal voltages, some of which are
small enough to ignore in practice
D. none of above
58. A error means that two or more bits
54. My father said I could celebrate it by have in the data unit has changed.
a party for my friends and relatives.
A. Burst
A. has
B. Double bit
B. had
C. Single bit
C. having
D. Checksum
D. none of above
59. The Hamming distance between equal
55. What is the significance of TIMEOUT in Au- codeword is
tomatic Repeat Request?
A. 0
A. The transmission must be completed
successfully within TIMEOUT. B. 1

B. The sender prompts the receiver C. n


for ACKNOWLEDGEMENT if the sender D. n+1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 210

60. What is the check digit for this bar code? A. decorate
157842355654 B. decorates
A. 3 C. decorated
B. 7 D. none of above
C. 9
66. Although I rarely wake up so early in the
D. 5 morning, I did not feel sleepy at all. My
ride was uneventful and we arrived at

NARAYAN CHANGDER
61. What form of error correction does TCP
use? AUH terminal 3 before six in a morning.
A. Them, an
A. Parity Bits
B. Our, the
B. FEC
C. They, a
C. CRC
D. We, the
D. ARQ
67. WHICH PART OF THE SENTENCE HAS THE
62. What size error can Hamming code cor-
ERROR:HE IS ANNOYED WITH YOUR BE-
rect?
HAVIOUR.
A. Single-bit errors
A. IS ANNOYED
B. 2-bit errors
B. WITH
C. 4-bit errors
C. YOUR BEHAVIOUR
D. 8-bit errors
D. none of above
63. Which of the following is a benefit of FEC
68. Full duplex operation
over ARQ?
A. requires two pairs of cables
A. It reduces the amount of redundant
data being sent along with a frame. B. can transfer data in both directions at
once
B. It reduces the likelihood that data will
need to be retransmitted. C. requires modems at both ends of the
circuit
C. It can correct all forms of errors with-
out retransmission. D. all of the above
D. There are no benefits of FEC over ARQ. 69. Cyclic Redundancy check is used in
64. The Hamming distance d(10101, 11110) A. Codewords
is B. Datawords
A. 2 C. Network
B. 3 D. Encryption and Decryption
C. 4 70. Two bits are same (0+0 or 1+1), the re-
D. 5 sult is Two bits are different (0+1 or
1+0), the result is
65. My brother helped to decorating the house
with streamers and balloons. My father A. 0, 0
bought all kinds of food and drinks. B. 0, 1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 211

C. 1, 0 76. What is the check digit for this bar code?


D. 1, 1 163181316891

PRACTICE BOOK» NOT FOR SALE


A. 6
71. Arrange the following words in alphabeti-
B. 5
cal order:chair table cat purse
C. 9
A. cat, chair, purse, table
D. 7
B. chair, cat, purse, table
77. Correct the sentence:My wives works as
C. table, purse, chair, cat
a scientist in NASA.
D. cat, table, purse, chair
A. wive
72. Replace the underlined words with correct B. wife
pronoun.I and Neha are going to market. C. yives
A. You D. vife
B. We
78. Amplitude modulation is the process of
C. They
A. superimposing a low frequency on a
D. He high frequency
B. superimposing a high frequency on a
73. My whole family was going toThailand for
low frequency
our vacation. We were going to taking the
airplane to Thailand. C. carrier interruption
A. took D. frequency shift and phase shift
B. take 79. Last Sunday was my fourteenth birthday.
C. taked It was the important day for me.
A. a
D. takes
B. an
74. What type of error correction sends re-
C. this
dundant error correction code along with
a frame? D. none of above

A. ARQ 80. The whole family are involved in helping


B. CRC me plan the party.
A. is
C. FEC
B. was
D. Parity Bits
C. were
75. The Hamming distance between 100 and D. none of above
001 is
81. The guarantee the detection of upto x er-
A. 0
rors in all cases, the minimum Hamming
B. 1 distance in a block code must be
C. 2 A. X
D. 3 B. X + 1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 212

C. X − 1 87. Indicate the true statement. Most re-


ceivers conforms to the
D. X 2
A. amplitude-modulated group
82. When she reaches the place, it was silent B. frequency-modulated group
and deserted.
C. superheterodyne group
A. reach
D. tuned radio frequency receiver group
B. reached
88. The girl loved the doll so much that she

NARAYAN CHANGDER
C. reaching would treated it with great care.
D. none of above A. treats
B. treat
83. When I up this morning, my roommate
already. C. treating

A. am walking / leaves D. none of above

B. wake / has left 89. Digital signals

C. woke / had left A. do not provide a continuous set of val-


ues
D. was walking / left
B. represent values as discrete steps
84. The RS-232 interface C. can utilize decimal or binary systems
A. interconnects data sets and transmis- D. all of the above
sion circuit
90. First, her sisters made the invitation cards.
B. uses several different connectors After that, we sent them to all the guests.
C. permits custom wiring of signal lines A. his
to the connector pins as desired B. my
D. all of the above C. us
D. none of above
85. I think we from her soon.
A. hear 91. The baud rate
A. is always equal to the bit transfer rate
B. will hear
B. is equal to twice the bandwidth of an
C. have heard ideal channel
D. will have heard C. is not equal to the signaling rate
D. is equal to one-half the bandwidth of
86. Find the error and correct the sentence.I
an ideal channel
live in goa. It is a beautiful Place.
A. Goa, place 92. Which error checking method involves
counting the number of 1s to find whether
B. Goa it is even or odd?
C. place A. Check digit
D. Goa, Beautiful place B. Checksum

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 213

C. Echo Check 98. The checksum of 1111 and 1111 is


D. Parity Check A. 1110

PRACTICE BOOK» NOT FOR SALE


B. 0000
93. I read newspaper daily.Find the compound
word and split it in two smaller words. C. 1111
A. daily = dai + ly D. 0111

B. newspaper = news + paper 99. A form of error detection that uses a sys-
tem of acknowledgements and timeouts.
C. read = re + ad
A. Echo Check
D. none of above
B. Automatic Repeat ReQuests (ARQ)
94. WHICH PART OF THE SENTENCE HAS THE C. Check Digit
ERROR? I HAVE FORGOT TO BRING YOUR
D. none of above
PICTURE.
A. PRONOUN 100. The of error is more difficult than
A. Detection, Correction
B. INFINITIVE
B. Correction, Convolution
C. PRESENT PERFECT
C. Correction, Detection
D. none of above
D. Convolution, Detection
95. Two-dimensional parity-check can detect
101. My whole family was going to Kota Kin-
up to bit errors.
abalu for our vacation. We were going to
A. 1 taking the airplane to Kota Kinabalu.
B. 2 A. took
C. 3 B. take
D. 4 C. taked
D. takes
96. WHICH WORD HAS TO BE CORRECTED? I
FOUND ONE BOOK IN THE CLASS. 102. Our flight was at eight in the morning.
My whole family woke up at four. Us
A. FOUND
quickly got ready and waited for the taxi
B. ONE BOOK to arrive.
C. IN A. We
D. none of above B. Our
C. Them
97. What is a disadvantage of ARQ over FEC?
D. Me
A. You may retransmit data a lot, which
causes delays. 103. How many bits in the data unit has
B. It cannot fix all errors. changed in a single bit error
A. 1 bit
C. You have to send a lot of redundant
data which reduces data transfer speed. B. 2 bits
D. It isn’t practical for most types of net- C. 3 bits
work. D. 4 bits

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 214

104. Match the correct common noun with 109. A generator of cyclic code that contains a
its proper noun.city Ryan International factor of x+1 can detect all
Schoolman Mr. Shyamlalschool New York A. Even number of errors
A. city-New York, man-Mr. Shyamlal, B. Odd number of errors
school-Ryan International School
C. Single error
B. city-Mr. Shyamlal, man-New York,
D. Burst error
school-Ryan International School
110. She walked into the house and is greeted

NARAYAN CHANGDER
C. city-Ryan International School, man-
New York, school-Mr. Shyamlal by dusty furniture in the living room.
A. was
D. all of them are correct
B. are
105. Correct following the sentence.Monkeyies C. were
are jumping on the trees.
D. none of above
A. Monkeys
111. The three child chooses to join Drawing
B. Monkeies
Club.
C. Monkeyes A. children ; choose
D. None of these B. childs ; choice
106. Types of error / errors: C. childs ; choosing

A. Single bit error D. children, choosen

B. Multiple bits error 112. Choose correct common noun for the fol-
lowing proper noun:”Lotus Temple”
C. Burst error
A. monument
D. all options
B. city
107. Using even parity which of the following C. house
three 8 bit binary numbers has been trans- D. town
mitted incorrectly?
A. 0 1 0 1 1 0 0 1 113. HE WALKS AS IF HE IS A KING.
A. AS IF HE WAS
B. 1 0 0 1 0 0 0 1
B. AS IF HE WERE
C. 0 0 1 0 1 1 0 1
C. IF HE WAS
D. none of above
D. none of above
108. Identify the mistake and correct it.My 114. My mother bakes a chocolate cake for me.
mother wears beautiful airrings while go- When the important day arrived, I was so
ing to office. delighted.
A. earings A. bake
B. earrings B. baked
C. areings C. baking
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 DATA LINK CONTROL (DLC) 215

115. In an odd parity scheme, what would 121. WHICH PART OF THE WORD HAS ERROR
be the correct parity bit for the binary IN IT? I SAW A BAD DREAM LAST NIGHT.
string:1110111 A. SAW

PRACTICE BOOK» NOT FOR SALE


A. 1111 0111 B. BAD DREAM
B. 11111 0111 C. LAST NIGHT
C. 1011 0111 D. none of above
D. 1111 0111 1
122. In CRC code the divisor line and XOR is
116. There was many students who sneaked missing, if the corresponding bit in the di-
out from the class yesterday. visor is
A. are A. Zero
B. is B. one
C. were C. missing
D. am D. interrupted

117. Would you like to go to the movies to- 123. My mother tells me that she since she
morrow? -Sure. By then I my exam. was four.

A. will finish A. has been singing

B. finished B. has been sung


C. sang
C. will have finished
D. had sung
D. have finished
124. Tick all correctly written proper nouns
118. Be quiet! The baby
from the given options.
A. is sleeping
A. Jaipur
B. slept B. India Gate
C. was sleeping C. Independence Day
D. sleeps D. All of these
119. Error-correcting method / methods used 125. Tamara has draw a beautiful scenery of
in computer networks sunset.
A. Forward error correction A. draws
B. Backward error correction B. drawn
C. Both C. drone
D. None D. none of above
120. The pattern of 0’s and 1’s can be repre- 126. Any coding scheme needs to have at least
sented as a the parameters of
A. Cyclic code A. Codeword size
B. Modulo-2 B. Dataword size
C. Polynomial C. Minimum Hamming distance
D. Co-efficient D. All the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 MULTIPLE ACCESS PROTOCOLS (MAC) 216

127. Indicate the false statement. From the 128. In error correction the receiver cor-
transmitter the signal deterioration be- rects the error without requesting retrans-
cause of noise is usually mission
A. unwanted energy A. Onward
B. predictable in character B. Forward
C. present in the transmitter C. Backward
D. due to any cause D. Retransmission

NARAYAN CHANGDER
5.3 MULTIPLE ACCESS PROTOCOLS (MAC)
1. use of length field in a data frame 5. persistent method
A. total size of the frame A. continuously sense the medium
B. total size of the data B. randomly sense the medium
C. size of mac address
C. don’t sense the medium
D. none of the above
D. none of the above
2. Which multiple access technique is used by
IEEE 802.11 standard for wireless LAN? 6. Switch works in layer
A. CDMA A. datalink layer
B. CDMA/CD
B. physical layer
C. CDMA/CA
C. transport layer
D. None of the above
D. network layer
3. A TDMA system uses 25 MHz for the for-
ward link, which is broken into radio chan- 7. Who is the superior station in random ac-
nels of 200 kHz. If 8 speech channels are cess protocols?
supported on a single radio channel, how
many simultaneous users can be accommo- A. server
dated? B. master
A. 25 C. admin
B. 200
D. none of the above
C. 1600
D. 1000 8. In , each station is allocated a band to
send its data. In other words, each band
4. IEEE has defined the specifications for a is reserved for a specific station, and it be-
wired LAN, called , which covers the longs to the station all the time.
physical and data link layers.
A. CDMA
A. IEEE802.5
B. IEEE802.7 B. None of these

C. IEEE802.6 C. TDMA
D. IEEE802.3 D. FDMA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 MULTIPLE ACCESS PROTOCOLS (MAC) 217

9. ALOHA protocols relies on the of the 14. In , the stations share the bandwidth
receiver of the channel in time.

PRACTICE BOOK» NOT FOR SALE


A. timer A. None of these
B. acknowledgement B. TDMA
C. FDMA
C. retransmission
D. CDMA
D. none of the above
15. What is the use of k value in random ac-
10. TDMA is a multiple access technique that cess protocols?
has
A. max. no. of attempts
A. Different users in different time slots B. size of a data frame
B. Each user is assigned unique fre- C. no. of data frames
quency slots
D. size of the data frame
C. Each user is assigned a unique code
sequence 16. what is padding in a data frame?
A. adding 0’s to the data
D. Each signal is modulated with fre-
quency modulation technique B. adding 0’s to left handside of the data
C. adding 0’s to right hand side of the
11. what is the use of ack? data
A. receiver received the data D. adding 1’s to the data
B. data lost during transmission 17. What is the time duration of a bit if data is
C. informs sender about data error transmitted at 270.833 kbps in the chan-
nel?
D. informs receiver that data is sent by
the sender A. 270.833 s
B. 3 µ s
12. Each station on an Ethernet network has
C. 3.692 µ s
a unique address imprinted on its net-
work interface card (NIC). D. 3.692 s

A. 32bit 18. Meaning of Collision


B. 48 bits A. high voltage

C. 6 byte B. normal voltage


C. no voltage
D. 32bits
D. none of the above
13. In pure ALOHA, the vulnerable time is
19. In each station sends a frame when-
the frame transmission time.
ever it has a frame to send.
A. the same as
A. pure ALOHA
B. two times B. slotted ALOHA
C. three times C. both (a) and (b)
D. none of the above D. neither (a) nor (b)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 MULTIPLE ACCESS PROTOCOLS (MAC) 218

20. assigns a unique number to each IP net- C. CDMA cellular systems


work adapter called the MAC address. D. SDMA cellular systems
A. Media Access Control
26. of TDMA system is a measure of the
B. Metro Access Control
percentage of transmitted data that con-
C. Metropolitan Access Control tains information as opposed to providing
D. Both b and c above overhead for the access scheme.
A. Efficiency
21. The layer of Ethernet consists of the

NARAYAN CHANGDER
LLC sublayer and the MAC sublayer. B. Figure of merit
A. datalink layer C. Signal to noise ratio
B. physical layer D. Mean
C. transport layer 27. is a multiple-access method in which
D. network layer the available bandwidth of a link is shared
in time, frequency, or through code, be-
22. An Ethernet MAC sublayer receives 38 tween different stations.
bytes of data from the upper layer. How
many bytes of padding must be added to A. Controlled access
the data? B. Channelization
A. 8 C. Random access
B. 10 D. None of these
C. 9
28. p-persistent method
D. 7
A. probability outcome
23. This describes how the Ethernet proto- B. random outcome
col regulates communication among con-
nection points. C. continuous outcome
A. Carrier Sense Multiple Access/Collision D. none of the above
Detect
29. Preamble contains
B. Discontinuous transmission
A. Address
C. Aggregator
B. Data
D. Wait and response
C. Guard bits
24. Mention the use of backoff time. D. Trail bits
A. waiting time before resending the data
30. In Ethernet addressing, if the least signifi-
B. waiting time after resending the data
cant bit of the first byte is 0, the address
C. ack timer is
D. propagation time A. unicast
25. GSM is an example of B. multicast
A. TDMA cellular systems C. broadcast
B. FDMA cellular systems D. none of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 MULTIPLE ACCESS PROTOCOLS (MAC) 219

31. To avoid collisions on wireless networks, 37. Select the random access protocol from the
was invented. given list

PRACTICE BOOK» NOT FOR SALE


A. CSMA/CA A. Aloha
B. CSMA/CD B. reservation
C. both CSMA/CD and CSMA/CA
C. token passing
D. either CSMA/CD or CSMA/CA
D. poll/select
32. FDM consists of
38. The vulnerable time for CSMA is the
A. upstream frequency channels
propagation time.
B. downstream frequency channels
A. the same as
C. all of above
B. two times
D. none of above
C. three times
33. An Ethernet MAC sublayer receives 1600
bytes of data from upper layer. How D. None of these
many frames need to be sent?
39. are utilized to allow synchronization of
A. 1 the receivers between different slots and
B. 2 frames.
C. 3 A. Preamble
D. 4 B. Data
34. is a feature in CSMA/CD which is not C. Guard bits
present in CSMA.
D. Trail bits
A. retransmission
B. acknowledgement 40. In , the available bandwidth is divided
into frequency bands.
C. timer
D. jamming signal A. None of these
B. TDMA
35. what is the use of preamble field in a data
frame? C. FDMA
A. used to synchronize machines D. CDMA
B. used as an entry point
41. TDMA allows the user to have
C. used for error correction
A. Use of same frequency channel for
D. used for error control
same time slot
36. what is the maximum size of the data in B. Use of same frequency channel for dif-
Ethernet? ferent time slot
A. 1500
C. Use of same time slot for different fre-
B. 1650 quency channel
C. 1800 D. Use of different time slot for different
D. none of the above frequency channels

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 MULTIPLE ACCESS PROTOCOLS (MAC) 220

42. In , each station is forced to send only B. 1500


at the beginning of the time slot. C. 1516
A. pure ALOHA
D. 1520
B. slotted ALOHA
48. What is the size of MAC Address?
C. both (a) and (b)
D. neither (a) nor (b) A. 16-bits
B. 32-bits

NARAYAN CHANGDER
43. wireless networking uses what method as
the media access method? C. 48-bits
A. CSMA/CD D. 64-bits
B. CTS/RTS 49. synchronization overhead is required
C. CSMA/CA in TDMA due to transmission.
D. CSCD/CA A. High, burst

44. In Ethernet addressing, if all the bits are 1 B. High, continuous


then the address is C. Low, burst
A. unicast D. No, burst
B. multicast
50. The maximum throughput for pure ALOHA
C. broadcast is per cent.
D. none of the above A. 12.2
45. Because of transmissions in TDMA, the B. 18.4
handoff process in C. 36.8
A. Continuous, complex D. none of the above
B. Continuous, simple
51. non persistent method
C. Discontinuous, complex
A. continuously sense the medium
D. Discontinuous, simple
B. randomly sense the medium
46. what is the use of SEL frame in
poll/select? C. don’t sense the medium

A. it is used whenever the primary device D. none of the above


has something to send
52. This is what happens if two devices on the
B. it is used whenever the secondary de- same Ethernet network determine the net-
vice has something to send work is free, but attempt to transmit data
C. control frame at exactly the same time.
D. data frame A. overlap
B. crossover
47. what is the maximum size of the data
frame in Ethernet? C. collision
A. 1518 D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 LINK-LAYER ADDRESSING 221

5.4 LINK-LAYER ADDRESSING

PRACTICE BOOK» NOT FOR SALE


1. LANs and WANs are connected by B. A3:34:45:11:92:F1
A. switches C. A2:34:45:11:92:F1
B. routers D. none of above
C. hubs
7. ARP request is always
D. gateways
A. Unicast
2. A Frame with destination multicast has the
B. Multicast
address
C. Broadcast
A. A3:34:45:11:92:F1
B. FF:FF:FF:FF:FF:FF D. none of above

C. A2:34:45:11:92:F1 8. The Internet is a combination of networks


D. none of above glued together by
A. transmission media.
3. Communication at the data-link layer is
B. hubs and repeaters .
A. end-to-end C. routers .
B. node-to-node D. connecting devices .
C. host-to-host
9. The Physical address is also called as
D. process-to-process
A. Source address
4. *The data-link layer of the sending node
B. IP address
needs to the datagram received from
the network in a frame C. Logical address
A. decapsulate D. MAC Address
B. encapsulate and decapsulate
10. The data-link layer of the receiving node
C. capsulate needs to the datagram from the frame
D. encapsulate A. encapsulate
5. Protocol that maps Logical address to B. capsulate
Physical address is called as
C. encapsulate and decapsulate
A. Address Map Protocol (AMP)
D. decapsulate
B. Address Management Protocol (AMP)
C. Address Resolution Protocol (ARP) 11. One to Many Addressing is called as

D. Logical to Physical Protocol(LP2) A. Unicasting


B. Multicasting
6. A Frame with destination broadcast has
the address C. Broadcasting
A. FF:FF:FF:FF:FF:FF D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 222

12. A Frame with destination Unicast has the B. A3:34:45:11:92:F1


address C. FF:FF:FF:FF:FF:FF
A. A2:34:45:11:92:F1 D. none of above

5.5 WIRED LANS: ETHERNET PROTOCOL


1. What type of MAC address is 01-00-5E- A. NetBIOS

NARAYAN CHANGDER
00-00-C8?
B. UDP
A. A unicast MAC address.
C. IP
B. A broadcast MAC address.
D. TCP/IP
C. A multicast MAC address.
D. A supercast MAC address. 6. How many Hexadecimal digits are needed
to represent one byte?
2. If the encapsulated data within an Eth-
ernet broadcast frame is an IPv4 packet, A. 2
the host portion of the destination address B. 4
contains
C. 8
A. All 1s in binary
D. 16
B. All 0s in binary
C. No value 7. Which of the following standards is typi-
D. Every address in the LAN cally used in a rollover cable?

3. Ethernet uses the address to make A. RJ11


sure messages are received by the correct B. RS232
device.
C. RG58
A. MAC
D. RG6
B. IP
C. Binary 8. A router receives a packet from the Giga-
D. Switch bit 0/0 interface and determines that the
packet needs to be forwarded out the Gi-
4. The data link layer takes the packets from gabit 0/1 interface. What will the router
and encapsulates them into frames for do next?
transmission.
A. route the packet out the Gigabit 0/1 in-
A. network layer terface
B. physical layer B. create a new Layer 2 Ethernet frame
C. transport layer to be sent to the destination
D. application layer C. look into the ARP cache to determine
the destination IP address
5. Protocol suite used on the internet and on
most networks. Nearly all computers to- D. look into the routing table to determine
day use this protocol suite for communica- if the destination network is in the routing
tion. table

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 223

9. What protocol is used by a source host 14. This technology is used to distribute elec-
to determine the MAC address associated trical power along with network data on
with a known IPv4 address? twisted-pair (CAT 5 or higher). Power is

PRACTICE BOOK» NOT FOR SALE


A. Address Resolution Protocol (ARP) usually supplied by this type of specific
switch.
B. Neighbor Discovery (ND)
A. Ethernet Over Power
C. Automatic Private IP Addressing
B. Powered Ethernet Operation
(APIPA)
C. Power over Ethernet
D. Network Address Translation (NAT)
D. Power existing Device
10. Ethernet 100BaseFX networks use what
type of cabling? 15. The last three hexadecimal digits in the
MAC address are assigned by
A. Fiber optic
A. The vendor of the Ethernet de-
B. Shielded twisted pair
vice/interface
C. Coaxial
B. The IEEE
D. Unshielded twisted pair
C. The system administrator
11. What purpose does ARP serve? D. The user
A. translate URLs to IP addresses 16. What statement describes the function of
B. resolve IPv4 addresses to MAC ad- the Address Resolution Protocol?
dresses A. ARP is used to discover the IP address
C. provide dynamic IP configuration to of any host on a different network.
network devices B. ARP is used to discover the IP address
D. convert internal private addresses to of any host on the local network.
external public addresses C. ARP is used to discover the MAC ad-
dress of any host on a different network
12. Which of the following connectors is typi-
cally used on one end of a rollover cable? D. ARP is used to discover the MAC ad-
dress of any host on the local network.
A. LC
B. F-type 17. You want to connect the LAN port on
a router to the uplink port on a switch.
C. Serial
The switch does not support auto-MDI.<br
D. BNC />Which type of cable should you use?
13. When the store-and-forward method of A. Loopback
switching is in use, what part of the Eth- B. Crossover
ernet frame is used to perform an error
C. Straight-through
check?
D. Rollover
A. CRC in the trailer
B. source MAC address in the header 18. Your network follows the 100BaseFX
specifications for Fast Ethernet and uses
C. destination MAC address in the header half-duplex multi-mode cable. What is the
D. protocol type in the header maximum cable segment length allowed?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 224

A. 100m 23. Header of a frame generally contains


B. 412m A. synchronization bytes
C. 550m B. addresses
D. 1000m C. frame identifier
19. Which of the following is a true statement D. all of the mentioned
about the features and functions of the LLC
24. You have purchased a new router that you
sublayer in Ethernet standards?

NARAYAN CHANGDER
need to configure. You need to connect a
A. Logical link control is specified in the workstation to the router’s console port
IEEE 802.3 standard. to complete the configuration tasks.<br
B. The LLC sublayer adds a header and a />Which type of cable would you most
trailer to the data. likely use?
C. The data link layer uses LLC to commu- A. Rollover
nicate with the upper layers of the proto- B. Straight-through
col suite.
C. RG6
D. The LLC sublayer is responsible for the
D. Crossover
placement and retrieval of frames on and
off the media. 25. On Ethernet networks, the hexadecimal
20. This is a 48-bit, 12-digit hexadecimal num- address FF-FF-FF-FF-FF-FF represents the
ber that ranges from 0-9 or A-F. MAC address.

A. MAC Address A. broadcast

B. IP Address B. unicast
C. Subnet Mask C. multicast
D. Subnet Address D. anycast

21. Provides a central connection for multi- 26. Which advantage does the store-and-
ple media segments on the same subnet. forward switching method have compared
When a signal is received, it forwards that with the cut-through switching method?
signal only to the port where the destina- A. collision detecting
tion device is connected. (Full-Duplex)
B. frame error checking
A. Router
C. faster frame forwarding
B. Switch
D. frame forwarding using IPv4 Layer 3
C. Hub and 4 information
D. Server
27. You have a network connected using a
22. The Remote Desktop Protocol uses port physical bus topology. One of the cables
that connects a workstation to the bus
A. 3389 breaks.<br />Which of the following best
describes what effect this will have on net-
B. 53 work communications?
C. 22 A. Devices on one side of the break will
D. 445 be able to communicate with each other;

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 225

devices on the other side will not be able what affect this will have on network com-
to communicate. munications?

PRACTICE BOOK» NOT FOR SALE


B. All devices except the device con- A. Device A will not be able to communi-
nected with the drop cable will be able to cate with any other device.
communicate. B. Device A will be able to communicate
C. No devices will be able to communi- with any device except for device B.
cate.
C. Device A will be able to communicate
D. All devices will be able to communi- with all other devices.
cate.
D. No devices will be able to communi-
28. What is one advantage of using the cut- cate with any other device.
through switching method instead of the
32. An IP Address can be represented in which
store-and-forward switching method?
two ways
A. has a positive impact on bandwidth by
dropping most of the invalid frames A. Physical and Logical

B. makes a fast forwarding decision B. Decimal and Hexadecimal


based on the source MAC address of the C. Binary and Hexadecimal
frame D. Binary and Decimal
C. has a lower latency appropriate for
high-performance computing applications 33. The first three hexadecimal digits in the
MAC address are used to identify
D. provides the flexibility to support any
mix of Ethernet speeds A. The vendor of the Ethernet de-
vice/interface
29. An Ethernet frame is received and pro-
B. The network the Ethernet de-
cessed by a devices on the Ethernet LAN
vice/interface is part of
that belong to the same group.
C. The date the Ethernet de-
A. Unicast
vice/interface was manufactured
B. Multicast
D. The Ethernet protocol implemented by
C. Broadcast the device/interface
D. Anycast
34. The rate that data is transmitted is called
30. What type of Ethernet frame is received
and processed by every device on the Eth- A. bandwidth
ernet LAN?
B. download speed
A. Unicast address
C. upload speed
B. Multicast address
D. transmission speed
C. Broadcast address
D. Ethercast address 35. Device used to connect individual stranded
wires for wire management and identifica-
31. You have a network connected using a tion purposes in a networking closet.
full physical mesh topology. The link be-
tween device A and device B is broken.<br A. Switch
/>Which of the following best describes B. RJ-45

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 226

C. Patch Panel 41. Which address does a switch record in or-


der to build its MAC address table?
D. Keystone Wall Jack
A. The destination Layer 3 address of in-
36. The File Transfer Protocol uses port coming packets.
A. 25 B. The destination Layer 2 of outgoing
frames.
B. 443
C. The source Layer 3 address of outgo-
C. 21

NARAYAN CHANGDER
ing packets.
D. 80 D. The source Layer 2 address of incom-
ing frames.
37. A Cisco switch with memory buffering
is used to buffer frames in queues linked 42. Which of the following forwarding method
to specific incoming and outgoing ports. characteristics is not used in cut-through
A. store-and-forward switching?
A. low latency
B. fast-switching
B. may forward runt frames
C. port-based
C. checks the CRC before forwarding
D. cut-through
D. begins forwarding when the destina-
38. The Hypertext Transfer Protocol uses port tion address is received

43. This is a connectionless protocol and does


A. 443 not require an acknowledgement from the
B. 21 device it is sending data to. (Faster)
A. TCP
C. 25
B. IP
D. 80
C. UDP
39. What is a the physical address of a net- D. PoE
work devices?
44. The logical host address identifies a spe-
A. The IP Address
cific
B. The Subnet Mask
A. User on a network
C. The Subnet Address B. Network wire on a network
D. The MAC Address C. Specific network
40. Hexadecimal numbers are often preceded D. Host on a network
by to distinguish them from decimal 45. What is the minimum Ethernet frame
values. size?
A. 0x A. 56
B. Hx B. 63
C. 16x C. 64
D. Xx D. 65

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 227

46. What type of cabling is used with 51. A switch repeats the message to a branch
100BaseTX Fast Ethernet networks? of the network

PRACTICE BOOK» NOT FOR SALE


A. Cat 5 or higher A. only if the MAC address is on that
B. Fiber optic branch.
C. Cat 3 B. every time it receives a message.
D. Cat 4 C. when there is a collision.
47. You need to connect two switches using D. none of above
their uplink ports. The switches do not
support auto-MDI. Which type of cable 52. What is the minimum cable specification
should you use? that supports 1000 Mbps Ethernet?
A. Straight-through A. Cat 5
B. Loopback B. Cat 5e
C. Crossover C. Cat 6
D. Rollover D. Cat 7
48. When an ARP request frame is sent, which
53. With TCP/IP, the logical network and the
destination MAC address is used?
logical host addresses are combined into a
A. 0.0.0.0 single address called
B. 255.255.255.255 A. A Subnet Mask
C. FFFF.FFFF.FFFF
B. A MAC Address
D. 127.0.0.1
C. A Subnet Address
E. 01-00-5E-00-AA-23
D. An IP Address
49. What is the hexadecimal representation
for an Ethernet Broadcast address? 54. What are two actions performed by a
A. FF-FF-FF-FF-FF-FF Cisco switch? (Choose two.)
B. 00-00-00-00-00-00 A. building a routing table that is based
on the first IP address in the frame header
C. 11-11-11-11-11-11
D. 99-99-99-99-99-99 B. using the source MAC addresses of
frames to build and maintain a MAC ad-
50. What is the aim of an ARP spoofing at- dress table
tack? C. forwarding frames with unknown des-
A. to flood the network with ARP reply tination IP addresses to the default gate-
broadcasts way
B. to fill switch MAC address tables with D. utilizing the MAC address table to for-
bogus addresses ward frames via the destination MAC ad-
C. to associate IP addresses to the dress
wrong MAC address E. examining the destination MAC ad-
D. to overwhelm network hosts with ARP dress to add new entries to the MAC ad-
requests dress table

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 228

55. What is the maximum size of an Ethernet 60. An Ethernet MAC address consists of a 48-
frame? bit binary value. How many Hexadecimal
digits are needed to represent 48 bits?
A. 1518 bytes
A. 4
B. 56 bytes
B. 8
C. 128 bytes
C. 12
D. 1024 bytes
D. 16

NARAYAN CHANGDER
56. This is a 32-bit binary number represented 61. Which is a multicast MAC address?
as four octets (four 8-bit numbers). Each
octet is separated by a period. A. FF-FF-FF-FF-FF-FF
B. 5C-26-0A-4B-19-3E
A. MAC Address
C. 01-00-5E-00-00-03
B. IP Address
D. 00-26-0F-4B-00-3E
C. IPv6 Address
62. The media access control method of all Eth-
D. Physical Address
ernet networks is
57. Which of the following use the CSMA/CD A. CSMA/CA
access method? B. CSMA/CD
A. 10BaseFL C. Polling
B. Token Ring D. Token passing<br />
C. 1000BaseT 63. A network technician issues the arp-d *
D. FDDI command on a PC after the router that
is connected to the LAN is reconfigured.
58. Switches are used to improve transmission What is the result after this command is
speed by reducing the number of (se- issued?
lect all that apply) A. The ARP cache is cleared.
A. devices in a collision domain B. The current content of the ARP cache
B. collisions is displayed.
C. network congestion C. The detailed information of the ARP
cache is displayed.
D. nodes
D. The ARP cache is synchronized with
59. Connection-oriented protocol. Ensures de- the router interface.
livery of data by requiring the recipient
64. Which Gigabit Ethernet standard uses mul-
of a network transmission to send an
timode fiber optic cabling and supports net-
acknowledgement of each and every IP
work segments up to a maximum of 550
packet it receives.
meters long?
A. UPD A. 1000BaseCX
B. IP B. 1000BaseSX
C. TCP C. 1000BaseZX
D. UDP D. 1000BaseT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 229

65. Which of the following are acceptable 68. Which statement describes the treatment
types of values for the source MAC ad- of ARP requests on the local link?
dress?

PRACTICE BOOK» NOT FOR SALE


A. They must be forwarded by all routers
A. Unicast address on the local network.
B. Multicast address B. They are received and processed by ev-
ery device on the local network.
C. Broadcast address
C. They are dropped by all switches on
D. Ethercast address the local network.
66. A network is connected following the IEEE D. They are received and processed only
802.3 specifications. Which of the follow- by the target device.
ing best describes when a device can trans-
69. Your network follows the 100BaseTX
mit messages?
specifications for Fast Ethernet. What
A. The device is notified of its turn to send is the maximum cable segment length al-
messages. lowed?
B. The device transmits whenever it is A. 500m
ready.
B. 1000m
C. The device requests permission from C. 2000m
a controlling device.
D. 100m
D. The device listens to determine if the
transmission media is free. 70. Which of the following switching methods
E. The device with the token can use the utilizes the CRC value in a frame?
transmission media. A. cut-through
B. fast-forward
67. You have a network connected using a
physical star topology. One of the drop ca- C. fragment-free
bles connecting a workstation has been re- D. store-and-forward
moved.<br />Which of the following best
describes what affect this will have on net- 71. STP, UTP, Fiber Optic, Coaxial, and Radio
work communications? Waves are known as
A. All devices will be able to communi- A. Network Interface Cards
cate, except the device connected with the B. Switches
drop cable .
C. Servers
B. No devices will be able to communi-
cate. D. Network Media

C. All devices will be able to communi- 72. The logical network address identifies a
cate. network segment called a
D. Devices on one side of the missing ca- A. Subnet
ble will be able to communicate with each B. Server
other; devices on the other side of the
missing cable will not be able to commu- C. Domain
nicate. D. Website

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 230

73. The Secure Shell protocol uses port 78. A MAC address is the unique address
that is used when a frame is sent from a
A. 25
single transmitting device to a single des-
B. 80 tination device.
C. 443 A. Unicast
D. 22 B. Broadcast
C. Multicast
74. The minimum Ethernet frame size is

NARAYAN CHANGDER
bytes. Anything smaller than that should D. Simulcast
be considered a “runt frame”.
79. Provides a central connection for multi-
A. 16 ple media segments on the same subnet.
B. 32 When it receives a signal, it is repeated
out all other ports. (Half-Duplex)
C. 64
A. Switch
D. 128
B. Hub
75. What routing table entry has a next hop C. Server
address associated with a destination net- D. Network Interface Card
work?
80. Ethernet bandwidth in full-duplex mode is
A. directly-connected routes
B. local routes
A. 20 Mbps
C. remote routes
B. 10 Mbps
D. C and L source routes C. 30 Mbps
76. When a switch configuration includes a D. 50 Mbps
user-defined error threshold on a per-port
81. Given your knowledge of IP Protocol,
basis, to which switching method will the
which statement is most accurate.
switch revert when the error threshold is
reached? A. IP encapsulation is modified based on
network media.
A. fragment-free
B. IP relies on Layer 2 protocols for trans-
B. fast-forward mission error control.
C. cut-through C. MAC addresses are used during the IP
D. store-and-forward packet encapsulation.
D. IP relies on upper layer services to
77. Connects two network segments that handle situations of missing or out-of-
have different subnet addresses. order packets.
A. Server
82. The Domain Name System protocol uses
B. Hub port
C. Switch A. 22
D. Router B. 3389

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 231

C. 53 86. The OSI model


D. 445 A. divides network communication in to

PRACTICE BOOK» NOT FOR SALE


abstract layers.
83. Which of the following are potential issues
B. stands for Over Sequence Internet
of ARP operation?
model.
A. Manually configured ARP associations
C. deals only with the physical network.
could facilitate ARP poisoning or MAC ad-
dress spoofing. D. shows how switching works.
B. Large networks with limited band- 87. Which Ethernet sublayer is responsible for
width could experience data communica- communicating directly with the physical
tions delays if multiple ARP broadcasts layer?
are sent. A. LLC
C. Network attackers could manipulate B. MAC
MAC address and IP address mappings in
ARP messages in order to intercept net- C. Network
work traffic. D. Data Link
D. Multiple ARP replies result in the 88. A rule that identifies some aspect of how
switch MAC address table containing en- computers communicate on a network.
tries that match the MAC addresses of
A. Protocol
hosts that are connected to the relevant
switch port. B. Subnet
E. Manually configuring static ARP asso- C. TCP
ciations could facilitate ARP poisoning or D. IP
MAC address spoofing.
89. This is a unique hexadecimal identifier
84. When devices detect a collision they burned into the ROM (physically assigned
address) of every network interface.
A. exponentially back off
A. IP Address
B. back off
B. Subnet Mask
C. delay and resend
C. MAC Address
D. give up
D. Logical Address
85. What is the auto-MDIX feature?
90. A computer has to send a packet to a desti-
A. It enables a device to automatically nation host in the same LAN. How will the
configure an interface to use a straight- packet be sent?
through or a crossover cable.
A. The packet will be sent directly to the
B. It enables a device to automatically destination host.
configure the duplex settings of a seg-
B. The packet will be sent only to the de-
ment.
fault gateway.
C. It enables a device to automatically C. The packet will first be sent to the de-
configure the speed of its interface. fault gateway, and then from the default
D. It enables a switch to dynamically se- gateway it will be sent directly to the des-
lect the forwarding method. tination host.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 232

D. The packet will be sent to the default 95. A Layer 2 switch is used to switch incom-
gateway first, and then, depending on the ing frames from a 1000BASE-T port to a
response from the gateway, it may be port connected to a 100Base-T network.
sent to the destination host. Which method of memory buffering would
work best for this task?
91. The Hypertext Transfer Protocol over Se-
cure Socket Layer uses port A. port-based buffering

A. 80 B. level 1 cache buffering

NARAYAN CHANGDER
B. 443 C. shared memory buffering
D. fixed configuration buffering
C. 21
D. 25 96. What could cause a PC to access LAN but
cannot access devices on other networks.
92. What makes fiber preferable to cop-
A. The cable is not connected properly to
per cabling for interconnecting buildings?
the NIC.
(Choose three.)
B. The computer has an invalid IP ad-
A. greater distances per cable run
dress.
B. lower installation cost
C. The computer has an incorrect subnet
C. limited susceptibility to EMI/RFI mask.
D. durable connections D. The computer has an invalid default
E. greater bandwidth potential gateway address.

93. Which two functions or operations are per- 97. What statement describes a characteristic
formed by the MAC sublayer? (Choose of MAC addresses?
two.) A. They are only routable within the pri-
A. It is responsible for Media Access Con- vate network.
trol. B. They are added as part of a Layer 3
B. It performs the function of NIC driver PDU.
software. C. Each interface must be globally
C. It adds a header and trailer to form an unique.
OSI Layer 2 PDU. D. They have a 32-bit binary value.
D. It handles communication between up-
98. Which switching method uses the CRC
per and lower layers.
value in a frame?
E. It adds control information to network
A. cut-through
protocol layer data.
B. fast-forward
94. The first half (first 6 digits) of the MAC C. fragment-free
address is assigned to what?
D. store-and-forward
A. The region
B. The ISP 99. Which two statements describe features
or functions of the logical link control sub-
C. The manufacturer layer in Ethernet standards? (Choose
D. The host two.)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 233

A. Logical link control is implemented in C. MAC Address


software. D. Physical Address

PRACTICE BOOK» NOT FOR SALE


B. Logical link control is specified in the
IEEE 802.3 standard. 103. What are two services provided by the
OSI network layer
C. The LLC sublayer adds a header and a
trailer to the data. A. performing error detection

D. The data link layer uses LLC to commu- B. routing packets toward the destination
nicate with the upper layers of the proto- C. encapsulating PDUs from the trans-
col suite. port layer
E. The LLC sublayer is responsible for the D. placement of frames on the media
placement and retrieval of frames on and E. collision detection
off the media.
104. When two devices share a transmission
100. You need to transfer data from one lap- medium they are in the same (which
top to another, and you would like to use makes the most sense? )
an Ethernet cable. You do not have a hub
or a switch.<br />Which type of cable A. network
should you use? B. collision domain
A. Crossover C. Ethernet
B. Rollover D. LAN
C. Loopback 105. Which information is used by routers to
D. Straight-through forward a data packet toward its destina-
tion?
101. Users are complaining that sometimes
network communications are slow. You A. source IP address
use a protocol analyzer and find that B. destination IP address
packets are being corrupted as they pass C. source data-link address
through a switch. You also notice that this
only seems to happen when the elevator D. destination data-link address
is running. What should you do? 106. Identify both the minimum and maximum
A. Add a UPS system of an Ethernet frame.
B. Install shielded cables near the eleva- A. 56 bytes
tor B. 64 bytes
C. Add a dedicated A/C unit to the switch C. 128 bytes
closet
D. 1024 bytes
D. Install a dedicated power circuit for
the switch E. 1518 bytes

102. This is used to distinguish the network 107. Which destination address is used in an
and host address portions of an IP Ad- ARP request frame?
dress. A. 0.0.0.0
A. Default Gateway B. 255.255.255.255
B. Subnet Mask C. FFFF.FFFF.FFFF

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 234

D. AAAA.AAAA.AAAA 113. Gigabit Ethernet bandwidth in full-duplex


E. the physical address of the destination is
host A. 1, 000 Mbps
108. Which statement is true about MAC ad- B. 500 Mbps
dresses?
C. 10, 000 Mbps
A. MAC addresses are implemented by
software. D. 2, 000 Mbps

NARAYAN CHANGDER
B. A NIC only needs a MAC address if con-
114. How do you express 3F in decimal?
nected to a WAN.
C. The first three bytes are used by the A. 18
vendor assigned OUI. B. 34
D. The ISO is responsible for MAC ad- C. 45
dresses regulations.
D. 46
109. Which of the following is a recommended
order of converting numbers? E. 63
A. Decimal → Binary → Hexadecimal
115. When two or more devices try to send a
B. Decimal → Hexadecimal → Binary message at the same time using the same
C. Binary → Decimal → Hexadecimal transmission medium it is called a
D. Hexadecimal → Decimal → Binary A. Collision
110. Which switching method has the lowest B. Conflict
level of latency?
C. Delay
A. cut-through
D. Backoff
B. store-and-forward
C. fragment-free 116. What part of the Ethernet frame is used
D. fast-forward to perform an error check?
A. CRC in the trailer
111. The length for fiber optic cables typically
ranges from B. source MAC address in the header
A. 100 meters to 40 kilometers C. destination MAC address in the header
B. 200 meters to 60 kilometers
D. protocol type in the header
C. 300 meters to 200 kilometers
D. 500 meters to 100 kilometers 117. What happens if you change the network
card in a host?
112. How is the binary number 0000 1010 ex-
pressed in hexadecimal? A. The host keeps the original physical ad-
dress
A. 10
B. A B. The host gets a new physical address

C. F C. The host gets a new IP address


D. 91 D. The host gets a new Subnet Mask

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 WIRED LANS: ETHERNET PROTOCOL 235

118. Of the following, which two are functions B. IEEE


of the MAC sublayer?
C. EIA/TIA

PRACTICE BOOK» NOT FOR SALE


A. It’s responsible for Media Access Con-
trol D. air
B. It performs the function of NIC driver 123. A network administrator is connecting
software two modern switches using a straight-
C. It adds a header and trailer forming an through cable. The switches are new and
OSI Layer 2 PDU have never been configured. Which three
D. It handles communication between up- statements are correct about the final re-
per and lower layers sult of the connection? (Choose three.)
E. It adds control information to network A. The link between the switches will
protocol layer data work at the fastest speed that is sup-
ported by both switches.
119. How many bytes in length is a MAC ad-
dress? B. The link between switches will work as
full-duplex.
A. 2
C. If both switches support different
B. 4
speeds, they will each work at their own
C. 6 fastest speed.
D. 8 D. The auto-MDIX feature will configure
120. The Dynamic Host Configuration Protocol the interfaces eliminating the need for a
uses port crossover cable.
A. 67, 68 E. The connection will not be possible un-
less the administrator changes the cable
B. 55, 21
to a crossover cable.
C. 80, 443
D. 3389 124. Which Gigabit Ethernet standard can sup-
port long network segments up to a maxi-
121. The address 01-00-5E-0A-00-02 is an mum of 5 km when used with single-mode
example of what type of MAC address? fiber optic cable?
A. one that reaches every host inside a lo-
A. 1000BaseSX
cal subnet
B. an address that reaches one specific B. 1000BaseCX
host C. 1000BaseLX
C. an address that reaches every host in D. 1000BaseT
the network
D. an address that reaches a specific 125. TCP stands for
group of hosts
A. Transmission Configuration Protocol
122. What OSI physical layer term describes B. Transferred Control Protocol
the process by which one wave modifies
another wave? C. Transmission Control Program
A. modulation D. Transmission Control Protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 236

126. The maximum cable length for UTP and B. User Datagram Protocol
STP is C. User Designated Protocol
A. 300 Meters D. User Designed Process
B. 100 Meters
129. These identify the transmission speed
C. 10 Meters and cable type.
D. 500 Meters A. Standards

NARAYAN CHANGDER
127. What does the term “attenuation” mean B. Distance
in data communication? C. Protocols
A. loss of signal strength as distance in- D. Devices
creases
130. When a switch receives a Layer 2 broad-
B. time for a signal to reach its destina-
cast frame, what will it do with the
tion
frame?
C. leakage of signals from one cable pair
A. Drop the frame
to another
B. Send the frame out all ports except the
D. strengthening of a signal by a network-
port on which it received the frame
ing device
C. Send the frame to all ports that are
128. UDP stands for registered to forward broadcasts
A. User Data Provision D. Send the frame to all ports

5.6 CONNECTING DEVICES


1. A computer that gains itself of the services B. BNC
provided by servers. C. RS-232
A. Cable D. RJ-45
B. Server
4. A software or hardware used to prevent
C. Client
unauthorized access to the network.
D. Mainframe
A. Hub
2. What is the main reason for adding some- B. Firewall
body into the BCC list for an email?
C. Modem
A. It keeps them updated
D. Router
B. It adds them to the conversation
C. It adds them privately and hides them 5. Which network device are being describe
from view below:This device checks the incoming
data packet and works out the destination
D. It allows them to see older messages address and sends the data packet to the
3. Which connector is used for UTP cabling on computer with that address only
a network? A. Hub
A. RF-11 B. Switch

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 237

C. Bridge contain tables of IP addresses along with


D. Router optimal routes to other networks.

PRACTICE BOOK» NOT FOR SALE


A. Switches
6. They are computers used primarily by
B. Routers
large organizations for critical applica-
tions, bulk data processing such as cen- C. Hubs
sus, industry and consumer statistics, en- D. Bridges
terprise resource planning and transaction
processing. 11. a networking device whose software and
hardware are usually tailored to the tasks
A. Mainframe
of routing and forwarding information.
B. Print Server A. Modem
C. Desktop B. Hub
D. Laptop C. Spaceship
7. Which of the following devices is used to D. Router
amplify a signal in a network?
12. Which of the following network device has
A. MODEM the slowest type of connection?
B. Repeater A. DSL
C. Hub B. Router
D. RJ 45 Connector C. Dial-up modems
D. None Of The Above
8. What is IP used for?
A. To send information across the inter- 13. Which of the following component is inter-
net in packets nal to Compute rand is required to connect
the Computer to a network
B. To ensure that information is sent to
the correct computer A. wireless access point
B. network interface card
C. To send mail across the internet
C. switch
D. To transmit webpages across the inter-
net D. hub

9. many businesses use this Wi-Fi technology 14. A device that can be used to to connect dis-
to allow the public an access point to a similar types of Network is
wireless network A. repeater
A. hotspots B. bridge
B. coldspot C. gateway
C. satellites D. router
D. bluetooth 15. Used by businesses to promote them-
selves on the internet.
10. Devices that connect entire networks to
each other. They use IP addresses to for- A. Blogs
ward packets to other networks. They B. Microblogs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 238

C. Macroblogs 20. Hafsa thinks that the main disadvantage


from using this device results from a fact
D. B-blog
that any incoming signal on any of its ports
16. Which of these is a disadvantage of the is re-created or copied and sent out on all
ring topology? connected ports,
A. Hub
A. If one cable is disabled the whole net-
work can crash B. Switch

NARAYAN CHANGDER
B. If the central hub crashes the whole C. Access Point
network breaks D. Bridge
C. Only four computers can be attached 21. What do you call on the physical address
to the ring of the device?
D. Everyone has to sit facing each other A. IP Address

17. What is the basic purpose of a repeater in B. NIC Address


a network? C. MAC address
A. To regenerate a signal to improve its D. Serial number
strength over transmission distances
22. networks typically spans a town or
B. To join multiple computers together city and is owned by a single person or
within the same local area network (LAN) company, such as a local council or a large
C. To transmit both data and power along company.
a single cable A. WAN (Wide Area Network)
D. To inspect and forward data traffic us- B. MAN (Metropolitan Area Network)
ing layer 3 of the Open Systems Intercon- C. LAN (Local Area Network)
nection (OSI) model HIDE ANSWER
D. CAN (Campus Area Network)
18. What does URL stand for? 23. MODEM is
A. Uniform Reforce Locator A. Modulation Demodulation
B. Uniform Reforce Location B. Modulator Demodulator
C. Uniform Resource Locator C. Model Demodulator
D. Uniform Resource Location D. none of above

19. Which of the following answers refers to 24. NIC Stands for
a data link layer (Layer 2) device designed A. Network Intersection cord
to forward data packets between Local
B. Network Interface Card
Area Network (LAN) segments?
C. No Interface connection
A. Router
D.
B. Hub
25. You have learned that there are three
C. Switch
types of network topology. Which one is
D. Firewall NOT network topology?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 239

A. BUS 30. Which network device are being describe


below:This device will convert analogue
B. WAN
data into digital data and vice-versa

PRACTICE BOOK» NOT FOR SALE


C. RING A. Switch
D. STAR B. Modem
C. Router
26. A device that is used to connect a number
of LANs is- D. Bridge
A. Router 31. Which cloud storage are being describe be-
low:Customer and cloud storage provider
B. Repeater
are integrated and operate as a single en-
C. Bridge tity
D. All of these A. Public Cloud
B. Private Cloud
27. Provide network access to wireless de-
vices such as laptops and PDAs. Use radio C. Hybrid Cloud
waves to communicate with radios in com- D. none of above
puters, PDAs, and other wireless devices.
32. Which cloud storage are being describe be-
Have limited range of coverage.
low:Customer and cloud storage provider
A. Routers are different companies
B. WAP A. Public Cloud
C. Switches B. Private Cloud

D. Servers C. Hybrid Cloud


D. none of above
28. Which cloud storage are being describe be-
low:Combination of both cloud; some re- 33. computer network organized around an in-
sides in private cloud, while less sensitive dividual person. Personal area networks
data can be access from public cloud typically involve a mobile computer, a cell
phone and/or a handheld computing de-
A. Public Cloud vice such as a PDA.
B. Private Cloud A. PAN (Personal Area Network)
C. Hybrid Cloud B. CAN (Campus Area Network, Cluster
Area Network)
D. none of above
C. WAN (Wide Area Network)
29. Below are examples of good email neti- D. LAN (Local Area Network)
quette except for
34. A computer network is computers con-
A. Always check spelling and grammar nected together.
B. Use capital letters to highlight com- A. One computer
ments B. Two or more
C. Do not send spam C. Three or more
D. Respect people’s privacy D. Four or more

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 240

35. They are high-powered business comput- C. Message


ers. They are designed for specialized, D. Protocol
high-end applications like engineering pro-
grams such as CAD (Computer Aided De- 40. Personal internet journals where the
sign). They are used in 3-D graphics de- writer will type in their observations on
sign, video animation and virtual reality some topic and provide links to some rele-
simulation. vant websites
A. Desktop A. Blogs

NARAYAN CHANGDER
B. Laptop B. Microblogs
C. Server C. Macroblogs
D. Workstation D. B-blog
36. If all devices are connected to a central hub, 41. Disadvantages of networks?
then topology is called
A. Share files
A. Bus Topology
B. Viruses
B. Ring Topology
C. Share Internet
C. Star Topology
D. Roaming
D. Tree Topology
42. network designed for a town or city
37. To increase security of emails you need the
A. LAN
following except for
B. MAN
A. Use strong passwords
C. WAN
B. Use spam filters
D. PAN
C. Do not change password regularly
D. Run anti-virus and anti-spam software 43. What is a client?

38. A Network device has two ports. It splits A. Powerful Computers that provide ser-
one network to two networks to decrease vices to other computers
the number of collisions or it connects 2 B. Computers that ask for the services a
networks to one network.It uses the MAC server provides
address to take the decision for forward- C. Physical connection between devices
ing the packets.
D. A circuitboard with the components to
A. Switch send/receive data
B. Hub
44. Two or more computers connected close to-
C. Bridge gether in a local area e.g. building or office
D. Router is called?

39. A is a set of rules governing data com- A. WAN


munication between two devices. B. LAN
A. Sender C. The Internet
B. Medium D. Virtual Network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 241

45. Network devices called concentrators be- 49. Which of these is an advantage of the bus
cause they serve as a central connection topology?
point for a LAN. It extends the range of

PRACTICE BOOK» NOT FOR SALE


A. It is easy and cheap to set up
a signal by receiving then regenerating it
and sending it out all other ports. Allows B. It is useful for large companies
for collisions on the network segment and C. You can pick people up
are often not a good solution. D. Anyone can join
A. switch
50. What device is used to connect a number
B. Computer of computers together to make a LAN?
C. Router A. Hub/Switch
D. Hub B. Bridge

46. It is a device that connects printers to C. Router/Modem


client computers over a network. It ac- D. Server
cepts print jobs from the computers and
sends the JOBS to the appropriate print- 51. All of the following are examples of social
ers, queuing the jobs locally to accommo- networking websites except for
date the fact that work may arrive more A. Twitter
quickly than the printer can actually han- B. Instagram
dle.
C. Microsoft Word
A. Mainframe
D. Facebook
B. Print Server
52. POE is abbreviation for:
C. Network Printer
A. PowerOver Ethernet
D. File Server
B. Power on Edge
47. A device designed to filter and transfer IP C. Pass Over Enternal
packets between dissimilar types of com-
puter networks is called: D.

A. Hub 53. A small computing device, typically small


enough to be handheld
B. Switch
A. PDA
C. Load Balancer
B. WAP
D. Router
C. POE
48. Which network device are being describe D. Workstation
below:Take any data packet received at
one of its port and broadcast it to every 54. Which networking device is hardware-
computer in the network based rather than software-based and
only forwards packets to the destination
A. Hub
port based on media access control (MAC)
B. Switch addresses?
C. Bridge A. A switch
D. Router B. A repeater

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 242

C. A hub 60. provides wireless network communication


D. A bridge over short distances using radio or in-
frared signals instead of traditional net-
55. A network system that carry telephone work cabling
calls over the data networks and Internet.
A. WLAN (WIRLESS LOCAL AREA NET-
A. Hardware firewalls WORK)
B. VoIP B. PAN (Personal Area Network)

NARAYAN CHANGDER
C. Server C. CAN (Campus Area Network, Cluster
D. WAP Area Network)
56. Which of the three main topologies rely on D. LAN (Local Area Network)
a single main cable to transmit data pack-
ets? 61. It is a network security system that con-
trols the incoming and outgoing network
A. Ring
traffic based on an applied rule set It es-
B. Star tablishes a barrier between a trusted, se-
C. Bus cure internal network and another net-
work (e.g., the Internet) that is assumed
D. none of above
not to be secure and trusted. It exists both
57. A device that connects networks with dif- as a software solution and as a hardware
ferent protocols- appliance.
A. Switch A. Hub
B. Hub B. Firewall
C. Gateway C. Client
D. All of these D. Repeater
58. How many wires are connected in a RJ 45
connector? 62. What network device is used to connect
two LAN’s together that uses the same
A. 4 protocol?
B. 8 A. Hub/Switch
C. 2
B. Router/Modem
D. 16
C. Bridge
59. A network device has several ports and
D. Server
refers to a table of MAC addresses to de-
termine which port to use to forward the
63. Why do NICs do?
frame.It forwards the data to the exact
destination only. A. Allow devices to control one another
A. Bridge B. Allow devices to connect to a printer
B. Switch C. Allows devices to interface with one
C. Router another
D. Repeater D. Allow devices to connect to a network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 243

64. Which of the following devices is used to C. Intelligent device


connect two networks which are different D. none of above
in terms of cable?

PRACTICE BOOK» NOT FOR SALE


A. Gateway 70. A device that can operate in place of Hub
is a
B. Bridge
A. switch
C. Router
B. repeater
D. None of these
C. router
65. In email terminology, what does CC stand
D. none of above
for?
A. Correct Contact 71. What type of connector do twisted pair ca-
bles on computer networks use?
B. Constant Copy
A. RJ-11
C. Confirmed Contact
B. RJ-30
D. Carbon Copy
C. RJ-45
66. Which device filters data packets and only
D. NONE OF THE ABOVE
sends to those that require the data?
A. router 72. A group of computers and other devices
connected together is called a network,
B. switch
and the concept of connected computers
C. hub sharing resources is called
D. WAP A. Networking
67. What does e-mail stand for? B. Inter-Network
A. Electric Mail C. Inter-Connection
B. Electron Mail D. Computer Group
C. Electronic Mail 73. supplies networking capability to a group
D. Election Mail of computers in close proximity to each
other such as in an office building, a school,
68. allows computers, smartphones, or other or a home
devices to connect to the Internet or
A. LAN
communicate with one another wirelessly
within a particular area B. MAN
A. wifi C. WAN
B. html D. PAN
C. LAN 74. WAP stands for
D. ftp A. Wired Access Point
69. What is drawback of hub B. Wireless Access Point
A. Bluetooth and infrared C. Whatsapp
B. Poor security D. Wireless Account Permission

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 244

75. A server is 80. A type of network device that amplifies re-


A. A computer you use all the time ceived signal so it can be transmitted over
greater distance without loss in quality is
B. Provides services for clients called:
C. Connects all the other computers to-
A. Patch Panel
gether
D. Provides a WiFi signal B. Multiplexer
C. Repeater

NARAYAN CHANGDER
76. spans a large geographic area, such as a
state, province or country. WANs often D. Passive Hub
connect multiple smaller networks, such as
local area networks (LANs) or metro area 81. What networking device is software-
networks (MANs). based and makes decisions about whether
A. MAN to forward a packet based on whether the
destination is part of the same LAN or an-
B. WAN
other LAN?
C. PAN
A. A switch
D. LAN
B. A bridge
77. Which device broadcasts any data to all de-
vices on a network? C. A repeater

A. hub D. A router
B. switch
82. which type of computer on a network pro-
C. repeater vides something such as file space?
D. router A. Client
78. A device that connects the internal net- B. Server
works and the outside network (Internet).
In such a situation, it could also act as a C. Peer
proxy server and a firewall. D. Node
A. Gateway
B. Switch 83. A Network component with high-speed
network that consists of one or more hard
C. Repeater drives, a fiber optic cables connection, and
D. Hub an embedded operating system. It con-
nects to the network, allowing users on
79. Which of these is an advantage of the star the network to access and share files,
topology? stream media, and back up data to a cen-
A. Devices do not rely on each other to tral location
function
A. NAS
B. It looks nice
B. SAN
C. A central server is not needed
C. Router
D. Only one cable is needed to connect ev-
erything together D. WAP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 245

84. is any set of instructions that tells the 89. What is a server?
hardware what to do and how to do it.
A. Powerful Computers that provide ser-

PRACTICE BOOK» NOT FOR SALE


A. Peripherals vices to other computers
B. Hardware B. Computers that ask for the services a
C. Software server provides
D. router C. Physical connection between devices
85. What is the function of Network Interface D. A circuitboard with the components to
Cards? send/receive data
A. connects the clients, servers and pe- 90. Routing tables of a router keeps track of
ripherals to the network through a port
B. allows you to segment a large network
A. MAC address of assignments
into smaller, efficient networks
B. Port assignment to network devices
C. connects networks with different pro-
tocols like TCP/IP C. Distribute IP addresses to network de-
D. boost the signal between two cable vices
segments or wireless access points D. Routes to use for forwarding data to
its destination
86. computer network that connects comput-
ers within a limited area such as a home, 91. Unique address given to each device on the
school, computer laboratory, or office internet
building, using network media
A. Media Access Control address
A. LAN
B. Internet Protocol address
B. MAN
C. WAN C. Data Packets address

D. NET D. Data Protocol address

87. Which network is able to connect and send 92. Which is the correct answer to the be-
data to each computer via central hub or low:”A computer that does not communi-
switch without looking where the data is cate with other devices”
sent? A. LAN
A. Star
B. WAN
B. Router
C. Stand-Alone
C. Bus
D. Server
D. LAN
93. network that covers a broad area using
88. Ethernet Twisted pair cable has how many
leased telecommunication lines
conductors?
A. 6 CONDUCTORS A. LAN
B. 8 conductors B. MAN
C. 10 conductors C. WAN
D. 12 conductors D. NET

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 246

94. In almost all cases, this device is respon- A. LAN


sible for sending out WIFI signals in your B. WAN
home for you to connect to.
C. TCP/IP
A. Router
D. DSL
B. Hub
C. TCP IP 99. network that allows information to be
shared between devices over LAN
D. MAC

NARAYAN CHANGDER
A. wifi
95. Is an electronic device that connects to
B. hotspots
the Internet via an ISP (Internet Service
Provider). It converts digital data to ana- C. ethernet
log signals for transmission over a phone D. server
line.
100. A device that amplifies a signal as it
A. Modem
passes through it to counteract the effects
B. Hub of attenuation.
C. Repeater A. Server
D. Switch B. Client
96. networks connect computers together C. Cable
over large physical distances, remotely D. Repeater
connecting them over one huge network
and allowing them to communicate even 101. A network device that transfers small
when far apart. amounts of DC current over Ethernet cable,
A. WAN (Wide Area Network) along with data, to power other network
devices such as Wi-Fi access points.
B. MAN (Metropolitan Area Network)
A. WAP
C. LAN (Local Area Network)
B. NIC
D. CAN (Campus Area Network)
C. POE
97. *Performs more than one function. *More
D. EAP
convenient to purchase and configure just
one device. *Combines the functions of 102. Which is not a wired method of connect-
a switch, a router and a wireless access ing to the internet?
point into one device. The Linksys E2500
A. Dial-up
is an example of it.
B. Cable
A. Switch
C. ADSL
B. POE
D. HTTPS
C. WAP
D. Multipurpose Devices 103. Which best describes the function of a
router?
98. Which is the correct answer to the be-
low:”A number of devices that communi- A. Receives Internet signal-shares signal
cate with each other without the need of with network
the internet” B. Connects the computers to the printer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 CONNECTING DEVICES 247

C. Connects the clients to the server C. Connecting computers in one room


D. Protects the server from hackers and D. Connecting computers in LANs

PRACTICE BOOK» NOT FOR SALE


viruses
108. allows information to be delivered to
104. arge computer network that spans a other computers or electronic devices con-
metropolitan area and falls between a LAN nected to the network
and a WAN A. network
A. LAN B. web browser
B. MAN C. hub
C. WAN D. country
D. NET
109. networks connect computers to-
105. small device that connects computers to- gether over relatively small distances,
gether such as within a single building or within
a small group of buildings.
A. wifi
A. WAN (Wide Area Network)
B. server
B. MAN (Metropolitan Area Network)
C. queue
C. LAN (Local Area Network)
D. hub
D. CAN (Campus Area Network)
106. A Network component that consists of
110. Which BEST describes the function of a
one or more hard drives, an Ethernet con-
switch?
nection, and an embedded operating sys-
tem. It connects to the network, allowing A. Connects printers together in a LAN
users on the network to access and share B. Connects devices together in a WAN
files, stream media, and back up data to a
C. Sends specif data packets to specific
central location
computer
A. NAS
D. Shares Internet connection on a LAN
B. SAN
111. Which topology allow to connect comput-
C. Router
ers including server in a ring?
D. WAP
A. Star
107. What is Ethernet cable used for? B. Tree
A. Connecting computers wirelessly C. Ring
B. Connecting computers in WANs D. LAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6. Wireless Networks and Mobile IP

NARAYAN CHANGDER
6.1 Introduction
1. Which is not a cause for undesired energy 4. A address is usually contained in the
wastage in WSNs? packet showing where the message has
A. Sensing of events come from and where it is going to. What
is this address called
B. Idle listening
A. Device Address
C. Overhearing in case of densely de-
ployed sensor networks B. Static Address
D. Collision of transmitted frames C. IP Address
D. none of above
2. Which of the following is true for Peer-To-
Peer networks.Answers:3 5. Question 6:Which of these is a benefit of
A. The network relies on a central server a peer-to-peer network? (6-9)
B. All computers have equal status A. Antivirus scans can be run across all
computers from one computer
C. No additional hardware / software
needed to set up this type of network B. All software updates can be run across
all computers from one computer
D. Each device can act as a client and a
server C. All computers can be maintained from
one computer
E. Additional hardware would be needed
e.g. high end powerful servers D. Files and peripherals can be shared

3. Near Field Communication (NFC) is consid- 6. Which of these is a device found within a
ered a computer?
A. Wireless Local Area Network A. Network Interface Card
B. Wireless Wide Area Network B. URL
C. Wireless Personal Area Network C. Router
D. None of the above D. LAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 249

7. Which of the following best describes Describe the benefits of implementing


DNS? a virtual network in the shopping cen-
tre.Answers:3

PRACTICE BOOK» NOT FOR SALE


A. When you type that URL into the web
browser the computer will query a server A. Increased security need to log
to find the IP address onto the virtual network people using
B. a network of servers-Some servers the shopping centre wifi cannot log onto
will run applications-Some servers will the irtual network
store data B. Users can only see the data/files/people
C. In order to let other people see your related to them.., no access to other
web site, it will be placed on a web server. data/files/people they should not have
access to
D. none of above C. Security handled by the cloud third
party handles security issues
8. Which of the following phone generation
D. Company will set up individual physical
support calls within one country
networks for security
A. 4G
E. Company does not need to set up indi-
B. 2G vidual networks
C. 3G
12. Which of these Wi-Fi Protected Setup
D. 1G
(WPS) methods is vulnerable?
9. Question 5:Where are you most likely to A. PIN method
find a peer-to-per network? (1-4)
B. push-button method
A. In a large organisation
C. piconet method
B. In a home
D. NFC method
C. In a large office
D. Across several offices in a company 13. Which of the following best describes the
cloud?
10. A(n) is a network that connects com-
A. When you type that URL into the web
puters and devices in a limited geograph-
browser the computer will query a server
ical area, such as a home, school, office
to find the IP address
building, or closely positioned group of
buildings. B. a network of servers-Some servers
A. wireless LAN (WLAN) will run applications-Some servers will
store data
B. wide area network (WAN)
C. In order to let other people see your
C. local area network (LAN) web site, it will be placed on a web server.
D. personal area network (PAN)

11. The shopping centre has many staff mem- D. none of above
bers, and management workers who need
14. Which of these is a vulnerability of MAC
to communicate and share files via the
address filtering?
network. The network technician has
suggestedimplementing a virtual network. A. The user must enter the MAC.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 250

B. MAC addresses are initially exchanged B. ESS


between wireless devices and the AP in an C. SSID
unencrypted format.
D. BSS
C. APs use IP addresses instead of
MACs. 20. A home network is an example of
D. Not all operating systems support A. LAN
MACs. B. WAN
C. MAN

NARAYAN CHANGDER
15. Which protocol is a signaling communica-
tion protocol used for controlling multime- D. WLAN
dia communication sessions? 21. Which of these protocols is most secure?
A. session initiation protocol A. WEP
B. session modelling protocol B. WAP
C. session maintenance protocol C. WPA
D. resource reservation protocol D. WPA2

16. What is the fastest type of transmission 22. Which of these is a benefit of an Ad Hoc
media? Network
A. Fibre Optic A. It’s a flexible network

B. Ethernet B. They are less secure so more people


can access them.
C. Coaxial
C. They are very organised..
D. Gold Cable D. Very high speeds.
17. Which of these IEEE WLANs has the high- 23. A company, OCR Supermarkets, has su-
est data rate? permarket stores throughout the coun-
A. 802.11b try. The computers for each store
connect to the central office using a
B. 802.11n
Wide Area Network (WAN).OCR Super-
C. 802.11g markets use a client-server network to
D. 802.11ac connect the checkout computers to the
store’s server.Describe four benefits to
18. The 802.11n gave us the ability to use OCR Supermarkets of using a client-server
two different frequencies Which two network instead of a peer-to-peer net-
? work.Answers:4
A. 11 and 54 MHz A. All files can be stored centrally so
workers can access files from any com-
B. 5 and 24 GHz
puter all computers can update the
C. 2.4 and 11 MHz central database / file Peer-to-peer
D. 2.4 and 5 GHz files might be stored on their own comput-
ers / spread across many computers
19. Which of the following terms identifies a B. Backups are central all data is
network based on a given name? backed up each time individual com-
A. DS puters do not need to backup their own

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 251

data Peer-to-peer may need to per- B. Fewer cables are needed


form their own backups. C. Files are easier to share

PRACTICE BOOK» NOT FOR SALE


C. Monitor clients to ensure they are D. Installs can be done on many comput-
working correctly ers at once
D. Upgrade software centrally so you
do not have to install on each computer in- 27. If Cora tries to access a free public Wi-Fi at
dividually Central security (antivirus / fire- a local coffee shop that requires her to first
wall) do not need to install protection agree to an Acceptable Use Policy (AUP)
on all computers Peer-to-peer individ- before continuing, what type of AP has she
ual security may need to be installed on encountered?
individual computers A. web-based
E. -easy to share data-”more secure” B. captive portal
C. rougue
24. A law firm currently use a Local Area Net-
work (LAN) linked to a Wide Area Net- D. internet content filter
work (WAN). They want to upgrade their
28. operates in this frequency range ?
system to utilise cloud storage.Explain
three disadvantages to the law firm of A. 2.4 GHz
storing their data in the cloud.Answers:3 B. 54 Mbps
A. You need a constant internet connec- C. 11 Mbps
tion (1) which-lawyers who travel a lot
D. 5 GHz
may not always have (1)
B. -Reliant on third party to carry out se- 29. Which of these would NOT affect the
curity procedures (1) but the firm are still speed of a network
legally responsible if things go wrong (1) A. low bandwidth
C. -It is environmentally friendly (1) B. large distance from devices/routers/switches
D. -Data stored in the cloud will be vul-
nerable to hacking and other threats (1) C. large number of network users
which the firm have no control over (1)
D. RAM being full
E. -Cheaper as don’t need own infrastruc-
ture (1) 30. deals with the issues of creating and
maintaining routing tables.
25. Which is the best description of the Inter-
A. Forwarding
net?
B. Routing
A. A network of interconnected computer
networks C. Tunneling
B. WiFi and Ethernet all connected D. None of the above
C. The cloud 31. Which SSD has the highest capacity?
D. All the webpages in the world A. RAM
26. Which of these is NOT an advantage of net- B. Optical Storage
working computers? C. Solid State Storage
A. Printers can be shared D. Magnetic Storage Devices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 252

32. On one specific day the network wifi 36. On-Demand Routing Protocol examples
transmission speed is significantly slower are follows, except
than on previous days.Describe the factors A. AODV
that can influence the wifi transmission
speed.Answer:2 B. DSR
C. TORA
A. Number of people accessing the net-
work the more people = the more D. LAR
data being transmitted the more data E. CGSR

NARAYAN CHANGDER
being transmitted = more collisions
37. Tunnelling technique is use in
B. Interference e.g. electrical inter-
ference stops/slows the transmission A. WAP
of data B. Mobile IP
C. Number of people accessing the net- C. WLL
work the less people = the slower the D. none of above
data will tarnsfer the less data being
transmitted = more collisions 38. Which of the following is an example of a
peripheral device?
D. Speed of transmission media:
WIFI is slower than Ethernet. A. Printer
B. Speaker
33. Networks send and receive messages in
small units. These units are known as C. USB
what? D. All THREE
A. Data 39. Which of the following phone generation
B. Pockets starts using Smart Phone
C. Packets A. 1G
D. Files B. 2G
C. 3G
34. Which network hardware is used to con-
D. 4G
nect networks to other networks such as
the internet? 40. Which type of transmission media is the
A. Hub least expensive to manufacture?
B. Switch A. Coaxial
C. Router B. Twisted pair cable

D. none of above C. Plastic


D. Fibre optic
35. The field that covers a variety of computer
networks, both public and private, that 41. Which of these is NOT a risk when a
are used in everyday jobs. home wireless router is not securely con-
figured?
A. Artificial Intelligence
A. An attacker can steal data from any
B. ML folder with file sharing enabled.
C. Network Security B. Usernames, passwords, credit card
D. IT numbers, and other information sent over

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 253

the WLAN could be captured by an at- 47. The technique that makes possible the task
tacker. of listening and talking in communication
system is called

PRACTICE BOOK» NOT FOR SALE


C. Only 50 percent of the packets will be
encrypted. A. Simplexing
D. Malware can be injected into a com- B. Duplexing
puter connected to the WLAN. C. Modulating
42. Expansion of WAP D. Multiple access technique
A. Wired Access Protocol 48. What are the classes of nodes in cooja sim-
B. Wireless Application Protocol ulator
C. Wired Application Protocol A. Emulated nodes
D. none of above B. Cooja nodes
C. all of this above
43. What are the execution model
D. none of this
A. cycle driven simulation
B. discrete event simulation 49. Care of Address is
C. all of this above A. Address of HA
D. none of this B. Address of CN
C. Address of MS
44. What does SSID stand for?
D. Adress of FA
A. Service Set Identifier
B. System Signal Identifier 50. Which is not a benefit of using virtual net-
works?
C. Single Source Interrogative Device
A. You don’t have to re-wire to add new
D. Signal Station Intercept Device machines
45. The maximum no. of nodes allowed in B. More secure
ARPA adhoc networks. C. Can allow one group of devices to not
A. 128 see another
B. 138 D. You don’t have to be connected to the
internet
C. 256
D. 160 51. Which statement is false?
A. Routers connect 2 or more devices to-
46. In practical IPv6 application, a technol-
gether
ogy encapsulates IPv6 packets inside IPv4
packets, this technology is called B. WAPs can be connected to via WIFI
and Bluetooth
A. Tunneling
C. Gold Cable is a type of Transmission
B. Hashing Media
C. Routing D. A NIC allows data packets to travel to
D. NAT and from a computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 254

52. is a network standard that specifies no A. WPA-Enterprise


central computer or device on the network
B. WPA-PSK
should control data can be transmitted.
C. AES
A. 802.11
B. Ethernet D. Bluetooth

C. Bluetooth 56. Pick the Ad Hoc Network example.


D. LTE A. Tethering and personal hotspots.

NARAYAN CHANGDER
53. What is the Extensible Authentication Pro- B. Open WiFi
tocol (EAP)?
C. Personal Area Networks
A. a framework for transporting authenti-
D. Bluetooth
cation protocols
B. a subset of WPA2 57. Requirements of Mobile IP include
C. the protocol used in TCP/IP for au- A. Scalability
thentication
B. Security
D. a technology used by IEEE 802.11 for
encryption C. all the above
D. none of the above
54. A bank uses a local area network to con-
nect all the computers in its head office.The 58. Each device on a network is known as
bank network uses failover.Describe what what:
is meant by failover and justify the need
for failover in the network.Answers:2 A. Node
A. -Redundant components / hardware / B. Link
capacity (servers / disks / routers etc) is C. Connection
built into the network-If there is a failure,
network automatically switches to use the D. Wireless
spare capacity
59. To which class the following IP address be-
B. -Allows the bank to continue to oper- longs to:15.10.10.1
ate / avoids network downtime-avoiding
A. Class A
loss of income / customer dissatisfaction
/ loss of records / other example related B. Class B
to the bank C. Class C
C. A failover team is on site so that if the
D. Class D
network fails they have the skills to get it
back up and running. 60. The 802.11b and the 802.11g wireless
D. The network needs to be temporarily technologies operate at what frequency
shutdown however the time is kept to a range ?
minimum to avoid losing money for the A. 2.4 GHz
business
B. 3.4 GHz
55. If Sheila wanted to connect headsets to her
C. 4.4 GHz
smartphones, she should use this wireless
technology ? D. 5.4 GHz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 255

61. Registration Reply in mobile IP is con- B. He should ensure that the driver
veyed in a wasn’t accidently updated through the
Windows Update.

PRACTICE BOOK» NOT FOR SALE


A. TCP packet
C. He should check for a BIOS firmware
B. UDP packet
update.
C. IP packet
D. He should check the switch on the lap-
D. None of the above top to ensure that the WiFi radio is on.

62. What is the unauthorized access of infor- 66. Which of these is a WAN?
mation from a wireless device through a A. The internet
Bluetooth connection called?
B. Costa WIFI
A. bluejacking
C. Your phone personal hotspot
B. bluesnarfing
D. Burnt Mill Academy Network
C. Bluetooth snatching
67. Which Protocol uses CSMA/CA
D. Bluetooth spoofing
A. HTTP
63. Sending requests to a single server using B. Wi-Fi
hijacked machines is an example of [1-
C. TCP
3]
D. IP
A. Phishing
E. Ethernet
B. DDOS
C. Worm 68. What is the purpose of a switch?

D. Virus A. Directs data in a network


B. Passes data between computers and
64. Which of these is the correct definition of the modem
a router?
C. Allows connections to multiple devices
A. Forwards data packets along a net-
D. To play Nintendo games
work
B. Corrects errors that are found in data 69. is the subnet that the Mobile Node vis-
packets its.

C. A type of transmission media that pro- A. Care-of Address


vides the greatest bandwidth B. Home Agent
D. A server within a network C. Foreign Network
D. Foreign Agent
65. Leonard worked on Penny’s wireless lap-
top this morning running a Windows Up- 70. A Virtual Network is available within
date. Now Penny comes into Leonard’s what type of network?
apartment and says she can’t access the in-
A. LAN
ternet. What should Leonard check FIRST
? B. WAN
A. He should make she has properly con- C. MAN
nected to her WiFi antenna D. SAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 256

71. A WEP key that is 128 bits in length D. An internet service that translates al-
A. has an initialization vector (IV) that is phabetic names into IP addresses
the same length as a WEP key of 64 bits
75. Which of these is a benefit of cloud com-
B. cannot be cracked because it is too puting?
long
A. It can reduce costs for a company as
C. cannot be used on access points that they do not need to buy additional hard-
use passphrases ware to store data

NARAYAN CHANGDER
D. is less secure than a WEP key of 64 bits
B. It is the cheapest option for a company
because shorter keys are stronger
to store their data as they do not need to
72. The wireless technology 802.11g uses this pay for cloud computing
radio band and transmits at a maximum C. Data can be accessed anywhere as an
speed of what ? internet connect is not needed to access
A. 2.4 GHz, 11 Mb/sec data and software stored in cloud comput-
ing
B. 5 GHz, 11Mb/sec
C. 2.4 GHz, 54 Mb/sec D. Data will always be more secure in a
cloud computing system
D. 5 GHz, 54 Mb/sec
76. Message sent:“hello how are you? ”
73. Which of these is a benefit of cloud com-
The packets are split as follows:Packet
puting? (3-6)
1:“hello”Packet 2:“how”Packet
A. It can reduce costs for a company as 3:“are”Packet 4:“you? ”Packets are
they do not need to buy additional hard- received at their destination as fol-
ware to store data lows:Packet 1, Packet 3, Packet 4, Packet
B. It is the cheapest option for a company 2What would this message be if the pack-
to store their data as they do not need to ets were read in the order in which they
pay for cloud computing arrived? How might this problem be
solved?
C. Data can be accessed anywhere as an
internet connect is not needed to access A. Hello how are you?
data and software stored in cloud comput- B. you? hello are how
ing
C. hello are you? how
D. Data will always be more secure in a
cloud computing system D. none of above

74. Which of these is a correct definition of 77. Question 2:Which of these is a character-
DNS? (6-9) istic of a LAN? (3-6)
A. An internet service that is used to de- A. It covers a wide geographical area
tect errors
B. Computers are connected together us-
B. An internet service that stores data in ing a leased line or a satellite
large quantities for different companies
C. Users can share files and peripherals
C. An internet service that provides a
messaging service for users to communi- D. Data can only be transmitted at a very
cate slow rate

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 257

78. Which of these is a correct definition of C. receiving


DNS? D. communicaions device

PRACTICE BOOK» NOT FOR SALE


A. An internet service that is used to de-
tect errors 83. Which are examples of a LAN?
B. An internet service that stores data in A. Home network
large quantities for different companies B. School Network
C. An internet service that provides a C. Network in a Shop
messaging service for users to communi-
D. The internet
cate
E. A multi-site network several miles
D. An internet service that translates al-
apart
phabetic names into IP addresses
84. Which statement is true about a VPN?
79. What is IrDA mean
A. You can access the Internet anony-
A. Infrared Data Association
mously via an encrypted connection to a
B. integrated data associate server
C. inverted data act B. It’s when you share your phone’s WiFi
D. none of above with a friend
C. VPNs are illegal
80. A(n) is a space station that receives mi-
crowave signals from an earth-based sta- D. It stands for Virtual Public Network
tion, amplifies the signals, and broadcasts
85. If a node is continuously sending packets
the signals back over a wide area to any
via a route, it has to make sure that the
number of earth-based stations.
route is held upright. This is called as
A. Bluetooth
A. Route maintenance
B. communications device
B. Route discovery
C. Ethernet C. Route optimization
D. communications satellite D. Routing
81. Brenda’s Internet Cafe is installing a wire- 86. In distance vector routing, each node peri-
less network for it’s customers to use. odically shares its routing table with
This standard would enable their cus- and whenever there is a change.
tomers to have the most bandwidth ?
A. every other node
A. 802.11a
B. its immediate neighbors
B. 802.11b
C. one neighbor
C. 802.11g
D. none of the above
D. 802.11n
87. If a new computer is connected to a net-
82. is the time it takes a signal to travel work, can provide it with all the nec-
from one location to another on a network. essary information for full system integra-
A. sending tion into the network.
B. latency A. DHCP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 258

B. DNS C. Ad Hoc networks communicating to ea-


C. Home Agent chother.

D. Home Network D. 5 computers or more connected to a


traditional network.
88. Select the drawbacks of an Ad Hoc Net-
work 93. The 802.11g wireless technology trans-
fers data at what speed ?
A. They are less secure and more open to
attacks. A. 11Mbps

NARAYAN CHANGDER
B. Phones and other wireless devices can B. 20 Mbps
sign up. C. 54 Mbps
C. They have reduced speeds. D. 64 Mbps
D. More unorganised.
94. The “ “ has a list of all domain names
89. what kind of waves do WiFi networks and their associated IP addresses.
use? A. Domain Name Server
A. microwave B. Internet
B. radio C. World Wide Web
C. sound D. WAP
D. light
95. mode is used whenever either end of
90. The best location for an omni-directional a security association is gateway
antenna in your home or office is ? A. Tunnel
A. On the roof B. Encapsuling
B. Adjacent to the outside wall C. Gateway
C. Near the center D. Transport
D. In a basement
96. Foreign agents and home agents advertise
91. A(n) is any type of hardware capable their presenceperiodically using
of transmitting data, instructions, and in-
A. ICMP messages
formation between a sending device and a
receiving device. B. Agent Advertisement Messages
A. communications satellite C. Packet Header
B. Bluetooth D. Routing protocols
C. communications device 97. AES-CCMP is the encryption protocol stan-
D. Ethernet dard used in
A. Bluetooth
92. What is streaming?
B. WPA2
A. Data sent to a device in a constant flow
when on the internet.. C. IEEE 802.11
B. Throwing your tablet into a river. D. WPA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 259

98. Select the objects that make up a tradi- C. DHCPOFFER


tional network. D. DHCPRELEASE

PRACTICE BOOK» NOT FOR SALE


A. Computers
104. Hugh runs his company from a single
B. Cables and wires. small office where he has two additional
C. Mobile phones and tablets. members of staff, each with their own
D. Routers computer. The computers are connected
together in a network.(i) Explain why
99. what are the main approaches to key man- Hugh’s network is a LAN.Answers:2
agement? A. Small geographical area // same room
A. key predistribution
B. Only uses internal hardware // does
B. key transport not use external hardware / telephone
C. all of this above lines
D. none of this above C. Broad geographical area // same
room
100. Protocol enables user to access inter-
D. uses external hardware // does not
net in mobile devices
use only internal hardware / telephone
A. HTTP lines
B. WLL
105. What is meant by latency in the perfor-
C. WAP mance of a network?
D. none of above A. The amount of time data takes to travel
from the source to the destination
101. The introduction of the 802.11n came
with this new feature that increased both B. The maximum rate that data can be
range and speed transferred at
A. CSMA/CA C. The number of errors that are found in
a data packet after transmission
B. MIMO
D. The route a packet takes when it is be-
C. SSID
ing transmitted
D. WPA-PSK
106. A law firm currently use a Local Area Net-
102. are radio waves that provide a high- work (LAN) linked to a Wide Area Net-
speed signal transmission. work (WAN). They want to upgrade their
A. microwaves system to utilise cloud storage.Define
B. ethernets what is meant by a Wide Area Network.

C. communications satellites A. The computers are geographically re-


mote/ distanced/ more than a mile apart
D. communications devices
B. Communication medium is not owned
103. Servers reply to the client’s DHCPDIS- by the law firm
COVER request with and offer a list C. The computers are geographically
of configuration parameters. close/ less than a mile apart
A. DHCPREQUEST D. Communication medium is owned by
B. DHCPACK the law firm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 260

107. Which of the following elements is most C. Coaxial Cable


likely to be an issue for Ping flood? D. none of above
A. Confidentiality
113. A network that is centered around an in-
B. Integrity dividual is called a ?
C. Availability A. LAN
D. Non-repudiation. B. PAN
is a way for computers and devices C. Cloud

NARAYAN CHANGDER
108.
that have appropriate wireless capability D. MAN
can communicate via radio waves with
other computers or devices. 114. If a client leaves a subnet, it should re-
lease the configuration received by the
A. Bluetooth
server using
B. LTE
A. DHCPOFFER
C. TCP/IP
B. DHCPDISCONNECT
D. Wi-Fi C. DHCPACK
109. Which language used in WAP enabled de- D. DHCPRELEASE
vices
115. The medium access control (MAC) is a sub-
A. HTML layer Of
B. WML A. data link layer
C. XML B. network layer
D. none of above C. physical layer
110. Which of these are the objectives of net- D. application layer
work security?
116. is an end-system or router that can-
A. Identification change its point of attachment to the inter-
B. Authentication net using mobile IP
C. Access control A. Corresponding Node
D. Lock B. Mobile Node
C. Foreign Agent
111. denotes the length of time the adver-
tisement for agents is valid. D. Home Agent
A. Lifetime 117. What is cloud computing? (1-4)
B. TTL A. Storing large amounts of data on a sin-
C. hop limit gle computer
D. checksum B. Using the internet to store and access
data and programs remotely
112. Which is the faster wired transmission C. Storing hard copies of data as a
media? backup
A. Ethernet/Twisted Pair D. Using the internet to communicate
B. Fibre Optic with other users

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 261

118. Why is a rogue AP a security vulnerabil- 122. Which of the following phone generation
ity? is based on Internet Protocol (IP)

PRACTICE BOOK» NOT FOR SALE


A. It uses the weaker IEEE 802.15.ax pro- A. 1G
tocol.
B. 2G
B. It allows an attacker to bypass many
C. 3G
of the network security configurations.
D. 4G
C. It requires the use of vulnerable wire-
less probes on all mobile devices. 123. Which of the following is a drawback of
D. It conflicts with other network fire- wired networks? [2 answers]
walls and can cause them to become dis- A. Adding more users is easy
abled.
B. It costs more to install and maintain
119. What problem can occur through using than a wireless network
cloud computing?
C. Devices can move around when they
A. There can be privacy and security is- are connected
sues
D. Health and safety can be affected due
B. More hardware needs to be added to to many cables being present
a company network to store data
124. It help prevent attackers from monitoring
C. Only a small amount of data can be
or recording traffic between resources and
stored
computers.
D. Only a small amount of software can
A. Data Encryption
be stored
B. Firewall
120. What is meant by hosting? (3-6)
C. Antivirus
A. A service that allows individuals and
D. none of above
organisations to make their website avail-
able on the world wide web
125. Which technology is predominately used
B. A service that creates websites for for contactless payment systems?
companies
A. wireless local area network (WLAN)
C. A service that transmits data in a net-
B. Bluetooth
work
C. near field communication (NFC)
D. A service that translates alphabetic
names into IP addresses D. Temporal Key Integrity Protocol (TKIP)

121. Which of these are NOT used to transmit 126. Specification for a wireless LAN are
data in a network called
A. Radio waves in the air A. Standard 802.3z
B. Fibre optic cable B. Standard 802.3u
C. Metal cables made of copper C. Standard 802.3x
D. High tensile steel cables D. IEEE 802.11

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 262

127. Which description below is a Class C net- 132. John tests the rooms in his home and
work address? finds that those on the east side of his
A. network. host. host.host house don’t get a good wireless signal and
can’t use the network. What can he do to
B. network.network.host.host correct the situation ?
C. network.network.network.host A. Buy a more powerful WAP
D. none of above B. Upgrade to 802.11g
C. Install a second WAP

NARAYAN CHANGDER
128. What is the primary weakness of wired
equivalent privacy (WEP)? D. Install a router
A. It functions only on specific brands of 133. Question 8:Which transmission media is
APs. capable of having a much higher band-
B. Its usage creates a detectable pat- width? (6-9)
tern. A. Coaxial
C. It slows down a WLAN from 104 Mbps B. Twisted pair cable
to 16 Mbps.
C. Plastic
D. Initialization vectors (IVs) are difficult
D. Fibre optic
for users to manage.
134. The destination sequence distance vector
129. Which of the following is a technique to routing can be viewed as which one of the
mask the source IP address of a network following?
attack?
A. Reactive routing protocol
A. DDoS
B. Proactive routing protocol
B. Replay
C. Hybrid routing protocol
C. Sniffing
D. Multicast routing protocol
D. Spoofing
135. Responsible for ensuring data packets
130. Data transmitted over a network is bro- are transferred quickly and reliably across
ken down into “ “ a network through a router via the best
A. Packets path
B. Sections A. TCP/IP
C. Blocks B. IP

D. Network Points C. ISPs


D. TCP
131. An IP address
136. Which of the following best describes the
A. Can be routable (global) or non-
hosting?
routable (local)
A. When you type that URL into the web
B. Is unique for every computer in the browser the computer will query a server
world to find the IP address
C. can be purchased from Microsoft B. a network of servers-Some servers
D. Is permanently ‘stamped’ on every net- will run applications-Some servers will
work interface card store data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 263

C. In order to let other people see your 140. is a series of network standards that
web site, it will be placed on a web server. specifies how two wireless devices com-
municate over the air with each other.

PRACTICE BOOK» NOT FOR SALE


D. none of above A. 802.11
B. Bluetooth
137. Which of the following preventative mea-
C. LTE
sures only allows users to access the net-
work based on a white list of accepted de- D. TCP/IP
vices?
141. Designed for “quick-and-dirty” jobs, this
A. MAC Filtering wireless network is very small ?
B. Rogue AP Detection A. LAN
C. OFDM B. MAN
D. FHSS C. PAN
D. WAN
138. A law firm currently use a Local Area Net-
work (LAN) linked to a Wide Area Net- 142. What problem can occur through using
work (WAN).They want to upgrade their cloud computing? (3-6)
system to utilise cloud storage.Which be- A. There can be privacy and security is-
low are advantages to the law firm of stor- sues
ing their data in the cloud.Answers:3
B. More hardware needs to be added to
A. It would offer additional storage (1) a company network to store data
so the firm can take on more cases C. Only a small amount of data can be
(1) stored
B. It would allow their employees to work D. Only a small amount of software can
from anywhere (1) so they can take cases be stored
from other countries (1)
143. Which statement is false regarding pack-
C. The third party provides security (1) so
ets?
the firm saves money on staff and soft-
ware/hardware (1) A. Data transmitted over a network is
broken down into packets
D. -Reliant on third party to carry out se-
curity procedures (1) but the firm are still B. Each packet contains IP addresses
legally responsible if things go wrong (1) C. Packets only have a certain time to live
E. -Issues regarding data ownership (1)- D. Packets cannot contain videos
Implications of Data Protection Act (1)
144. .... is responsible for tunneling multicast
packets to the MS’s currently subscribed
139. what does mbps stand for?
FA.
A. megabytes per second
A. Home agent
B. megabits per second B. Mobile multicast
C. megabandwidth per second C. Mobile station
D. megashark battles pokemonshark D. Base station

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 264

145. Which layer Iin WAP performs security 150. Zoe is organising a LAN-party. Her
friends will each bring a computer to the
A. WAE
party so that they can play games against
B. WST each other.Describe what is meant by a Lo-
cal Area Network (LAN).Answers:3
C. WTP
A. Computers are connected to each
D. WTLS
other-
146. WPA stands for: B. The computers are geographically re-

NARAYAN CHANGDER
mote/ more than a mile apart
A. Wi-Fi Protected Access
C. Communication medium is not owned
B. Wireless Protection Access by the group
C. Wi-Fi Private Access D. Dedicated wired or WiFi connections
D. Wireless Private Access owned by the group
E. Restricted to a small geographical
147. is the subnet the MN belongs towith area
respect to its IP address
151. Which octet determines the class of an IP
A. Home Network address?
B. Home Agent A. First
C. Foreign Network B. Second
D. Foreign Agent C. Third
D. Fourth
148. A shopping centre allows customers to
access free wifi whilst shopping.(a) The 152. Which network hardware is used to send
users can access the Internet via the wifi data packets between computers without
connection.Identify four network hard- knowing which destination PC will receive
ware devices that can be used to support the packet. It broadcasts the packet to
the wifi connections.Answers:4 all connected PC’s and uses up more band-
width as a result.
A. Wireless access point (WAP)
A. Hub
B. Hub/
B. Switch
C. Router/Modem
C. Router
D. Switch
D. none of above
E. Ethernet cables
153. Which of these statements is true?
149. address is used when mode moved to A. A client-server network has a central
foreign network computer that provides services to the
A. HA address rest of the network

B. MS Adress B. A client-server network is cheap and


easy to set up
C. Care of Address of FA
C. A client-server network cannot be
D. address of CN used to share files

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 265

D. Each computer on a client-server net- the whole office. Therefore, what stan-
work is maintain separately dard should be used when replacing these
WAPs?

PRACTICE BOOK» NOT FOR SALE


154. It is a kind of threats that targets failing
or disabling network services: A. 802.11a
A. Unauthorized access B. 802.11b
B. Man in the middle attack C. 802.11ac
C. Denial of service D. 802.11g
D. war drivers E. 802.11n

155. WiFi is considered a 160. is a network protocol that defines


A. Wireless Local Area Network how two Bluetooth devices use short-
range radio waves to transmit data.
B. Wireless Wide Area Network
A. 802.11
C. Wireless Personal Area Network
D. None of the above B. Bluetooth
C. LTE
156. How many layers in WAP Stack
D. TCP/IP
A. 3
B. 4 161. The full form of SSL is
C. 5 A. Serial Session Layer
D. 6 B. Secure Socket Layer
157. The amount of data that can pass through C. Session Secure Layer
the transmission medium per second, often D. Series Socket Layer
called the bit-rate
A. Mobility 162. What is the purpose of a VPN?

B. Interference A. creates a safe and encrypted connec-


tion over a less secure network
C. Bandwidth
B. allows you to use any network in the
D. Cost
area
158. Question 10:Which of these components C. decrypts data on a network to make it
is internal to a computer and is required to accessible by anyone
connect the computer to a network? (1-4)
D. Allows you to make a network that no-
A. Wireless Access Point one else can connect to
B. Network Interface card
163. Which of these is NOT a type of wireless
C. Switch AP probe?
D. Hub
A. wireless device probe
159. QRT Corporation wants to increase the B. WNIC probe
wireless speeds in its office building. The
current location of the WAPs does a good C. dedicated probe
job for wireless connectivity throughout D. AP probe

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 266

164. A preshared key (PSK) of fewer than 169. Which of these is true about peer-to-peer
characters may be subject to an attack if networks?
that key is a common dictionary word. A. They are illegal
A. 20 B. Resources are not held on a central
B. 32 server

C. 48 C. They are mainly used on the ‘dark web’


D. They are only used with a home hub.
D. 64

NARAYAN CHANGDER
170. Bluetooth falls under the category of
165. This device connects two dissimilar net-
A. local area network (LAN)
works together
B. short area network (SAN)
A. Hub
C. paired-device network (PDN)
B. gateway
D. personal area network (PAN)
C. switch
171. is used by many companies to hide
D. non of the above internal resources and to use only some
globally available addresses
166. The 802.11A wireless technology oper-
ates at what frequency range ? A. Firewalls
B. Network Address Translation
A. 7 GHz
C. Home Agent address
B. 5 GHz
D. Unicast routing
C. 3 GHz
172. Identify key mechanism in Mobile IP
D. 1 GHz
A. Agent discovery
167. This wireless standard is backwards- B. Tunnelling
compatible with 802.11g?
C. Registration
A. 802.11a D. Re registration
B. 802.11b
173. Which of the following class of IP pro-
C. 802.11n vides a maximum of only 254 host ad-
D. 802.11q dresses per network ID?
A. A
168. Question 1:What is a standalone com- B. B
puter? (1-4)
C. C
A. A computer that is not connected to a
D. D
network
B. A computer that is being used as a 174. Computers on this network are over a
server large geographical area:
A. WAN
C. A computer that does not have any pe-
ripherals attached to it B. LAN
D. A computer that is used by only one C. MAN
person D. SAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 267

175. allows the encapsulation of packets 180. If no agent advertisements are present
of one protocol suite into the payload por- or the inter-arrival time is too high, and
tion of a packet of another protocol suite an MN has not received a COA by other

PRACTICE BOOK» NOT FOR SALE


A. Minimal encapsulation means, the mobile node must send
B. Generic routing encapsulation A. Agent Solicitation
C. IP-in-IP encapsulation B. Registration
D. encapsulation and optimization C. Agent Advertisement
D. Enquiry message
176. WPA replaces WEP with
A. WPA2 181. If a server receives a with arejection,
B. Temporal Key Integrity Protocol (TKIP) it can free the reserved configuration for
other possible clients.
C. Cyclic Redundancy Check (CRC)
A. DHCPACK
D. Message Integrity Check (MIC)
B. DHCPRELEASE
177. What is meant by a data packet? (6-9)
C. DHCPRESPONSE
A. A unit of data that travels along a net-
D. DHCPREQUEST
work
B. The number of error found in data 182. Which of the following is true for Client
when it has been transmitted Server networks.Answers:3
C. The data a computer needs to connect A. The network relies on a central server
to a network B. All computers have equal status
D. A connection point in a network that al-
C. All clients (devices) request services
lows data to be shared
from the server (e.g. print services / file
178. Penny got Sheldon to upgrade her inter- services)
nal Wi-Fi card on her laptop earlier and D. Each device can act as a client and a
now the signal power to connect to the server
WAP in her office is Low! What is prob-
E. Additional hardware would be needed
ably wrong ?
e.g. high end powerful servers
A. Wi-Fi card drivers are not installed
B. The laptop’s memory is faulty 183. What is the speed of the 1st generation
of wireless telephone technology?
C. The laptop’s battery is dead
A. 64kbps
D. One of the antenna wires is unplugged
B. 2.4 kbps
179. To provide both power and a network
C. 2000kbps
connection you can plug a single Ethernet
cable into the WAP because of this feature D. 100Mbps

184. Encrypting messages through movement


A. PoE of each letter a certain number of places to
B. SID the left in the alphabet
C. ESSI A. Cipher
D. PoW B. Key

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 268

C. Policies B. WAP (Wireless Access Point)


D. Strong Passwords C. NIC (Network Interface Controller)

185. Question 4:Which of these statements is D. Transmission Media


true? (3-6) 190. what are the requirements need for net-
A. A client-server network has a central work security?
computer that provides services to the A. confidentially
rest of the network
B. integrity

NARAYAN CHANGDER
B. A client-server network is cheap and
C. all of this above
easy to set up
D. none of this
C. A client-server network cannot be
used to share files 191. Which of the following is wide-area wire-
D. Each computer on a client-server net- less networks?
work is maintain separately A. Bluetooth

186. Wireless broadband (WiMax) is consid- B. Ultra-wideband


ered a C. Near-field communications
A. Wireless Local Area Network D. Wi-Fi
B. Wireless Wide Area Network E. 3G and 4G
C. Wireless Personal Area Network 192. Question 9:Which type of transmission
D. None of the above media is the least expensive to manufac-
ture? (6-9)
187. Which of the following class of IP pro-
A. Coaxial
vides a maximum of 16, 777, 214 host
addresses per network ID? B. Twisted pair cable
A. A C. Plastic
B. B D. Fibre optic
C. C 193. Which of the following is short-range
D. D wireless networks?
A. Bluetooth
188. Which word/s means ‘ the amount of
data that can be transmitted in a fixed B. Ultra-wideband
amount of time’ C. Near-field communications
A. bandwidth D. Wi-Fi
B. network access time E. 3G and 4G
C. online traffic 194. Trying to access data by going through
D. webspeed lists of possible passwords is called
A. A Brute Force attack
189. A networking hardware device that al-
lows a Wi-Fi device to connect to a wired B. Phishing
network. C. Blagging
A. Router / Switch D. DOS attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 269

195. What transmission media would you use 199. What are the benefits of the Cloud? An-
to connect to a network interface card swers:3
(NIC) in a wired network?

PRACTICE BOOK» NOT FOR SALE


A. increase storage e.g. from mobile
A. ethernet cable phones
B. Fibre optic B. Access files from anywhere in the
world
C. Twisted pair
C. Collaborate with others from around
D. Twin and earth the world
196. A(n) is a navigation system that con- D. Protect all of your files on a local
sists of one or more earth-based receivers server
that accept and analyze signals send by E. It’s free
satellites in order to determine the re-
ceiver’s geographic location. 200. The “ “ is the collections of billions of
webpages that are hosted on webservers
A. Bluetooth
connected to the internet.
B. LTE
A. World Wide Web
C. TCP/IP
B. Internet
D. GPS C. HTTP
197. Which of these is NOT hardware used to D. URL
create a network?
201. Why are there about 20 wireless access
A. Hub points around school?
B. SSD A. We got a really good price for buying
C. Wireless Access Point in bulk

D. Switch B. They have short ranges, so you need


them every 30 metres or so
198. A bank uses a local area network to C. Because there are more students with
connect all the computers in its head of- phones these days
fice.State which ways the local area net-
D. Every extra one makes the WiFi
work can be used to monitor the work of
stronger.
employees.Answers:3
A. record log on / log off times-remote ac- 202. The 802.11 wireless standard operates
cess / view users’ screens at two frequency bands. They are ?
B. -audit printing-keylogging A. 900 MHz

C. -monitor internet usage / downloads- B. 2.4 GHz


monitoring emails / files sent / copied- C. 4 GHz
inspect files in users’ areas D. 5 GHz
D. .-CCTV-Security patrols
203. MTU stands for
E. -Supervisor watching their employees
from home.-Decoding what staff do on de- A. Minimum Transmission Unit
vices when they are out of the office. B. Minimum Transport Unit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 270

C. Maximum Transport Unit 209. To share files and printers without a WAP
D. Maximum Transmission Unit you can take advantage of this wireless
network
204. There is Classes of IP address version A. Infrastructure
4.
B. Ad hoc
A. 5 C. Multiple access
B. 3 D. WAN

NARAYAN CHANGDER
C. 4
210. Which is a feature of a Client-Server Net-
D. 2 work?
205. What two types of connectivity can net- A. Central Hub
works make use of? B. All devices have an equal status
A. Bluetooth and infrared C. No expensive hardware required
B. Wired and wireless D. Each device can be a client and server
C. Blu-ray and DVD 211. Performs a ‘barrier’ between a potential
D. none of above attacker and the computer system
A. Packet sniffing
206. which type of authentication is least se-
cure B. Firewalls

A. PIN C. Brute force attacks


D. SQL injection
B. Password
C. passphrase 212. Give one benefit to Hugh’s customers of
accessing the website using a URL rather
D. finger print scan
than using an IP address.
207. help to apply the advertisements in A. Easier to remember
correct order. B. Shorter to type in
A. Sequence numbers C. Only need to use numbers
B. Checksum D. none of above
C. TTL
213. The standard is used to transmit data
D. Header length wirelessly to each other via infrared light
waves.
208. is a network standard that defines
A. IrDA
how high-speed cellular transmissions use
broadcast radio to transmit data for mo- B. NFC
bile communications. C. RFID
A. 802.11 D. TCP/IP
B. Ethernet
214. Which 802.11 network has a mizimum
C. Bluetooth throughput of 11 Mbps ?
D. LTE A. 802.11a

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 271

B. 802.11b B. Ultra-wideband
C. 802.11g C. Near-field communications

PRACTICE BOOK» NOT FOR SALE


D. 802.11n D. Wi-Fi

215. The core of a(n) consists of dozens or E. 3G and 4G


hundreds of thin strands of glass or plastic
220. Which of the following is a benefit of a
that use light to transmit signals.
wireless network?
A. coaxial cable
A. They are convenient, as you can con-
B. twisted-pair cable nect automatically
C. fiber-optic cable B. They are extremely secure and cannot
D. TCP/IP be hacked
C. Distance from the WAP makes no dif-
216. What is meant by a virtual network? (3-
ference to signal quality
6)
D. none of above
A. A network that is controlled by a cen-
tral server 221. To connect to the internet through a
B. A network that is used only to share network-aware smartphone, tablet, or
software other mobile device you need this ?
C. Controlling computers and devices re- A. 802.11b
motely using the internet B. 802.11n
D. A network that is built using only wire- C. MAC filtering
less connection points
D. Cellular wireless network
217. This wireless networking standard sup-
port data throughput of up to 11 Mbps 222. A school has all of its computers in a lo-
cal area network (LAN).Which below are
A. 802.11a
benefits of a LAN? Answers:3
B. 802.11b
A. Can share files / can work collabora-
C. 802.11c tively on same filesCan share hardware
D. 802.11g resources / suitable example
B. Can access their files from any com-
218. tries to keep micro-mobility support puter / classroomCan work together from
as transparent as possible for both home different computers using instant messag-
agents and mobile nodes ing
A. IPv6
C. Centralised deployment of software to
B. HAWAII all computers
C. Reverse Tunneling D. Can access only the files saved on their
D. Cellular IP local computerCan only access printers
that are directly connected to their com-
219. Which of the following is medium-range puters.
wireless networks? E. Can access files from home.Can log
A. Bluetooth into the network from anywhere

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 272

223. Which technology should be used instead roam from one AP coverage area to an-
of LEAP? other.
A. STREAK D. Some versions of operating systems
B. PEAP favor a network that broadcasts an SSID
over one that does not.
C. LEAP-2
D. REAP 228. A “ “ is an interconnection device that
connects two or more devices together and

NARAYAN CHANGDER
224. Which IS NOT a benefit of a wireless net- helps in solving the issue of data collisions.
work?
A. Switch
A. Cheap-No cables
B. Router
B. More reliable than a wired network
C. WAP
C. Cables don’t restrict movement
D. Less chance of getting tangled cable D. NIC

225. Which is a feature of a Peer-to-Peer Net- 229. What is meant by a virtual network?
work? A. A network that is controlled by a cen-
A. Central Hub tral server
B. All devices have an equal status B. A network that is used only to share
C. Expensive hardware usually required software
D. All services have to be requested from C. Controlling computers and devices re-
the server motely using the internet

226. A router D. A network that is built using only wire-


less connection points
A. Turns ethernet signals into Internet
signals 230. Carrier Sense Multiple Access (CSMA) is
B. Directs network traffic based on IP ad- based on medium called
dresses A. Listen and talk
C. Cannot be used in a LAN-only on the B. Listen before sending
Internet
C. Sense before transmit
D. Repeats incoming packets to ALL ports
D. Sense before Collision
227. Which of these is NOT a limitation of turn-
ing off the SSID broadcast from an AP? 231. Which is not a benefit of the cloud?
A. Users can more easily roam from one A. Increase storage e.g. from mobile
WLAN to another. phones
B. The SSID can easily be discovered,
B. Access files from anywhere in the
even when it is not contained in beacon
world
frames, because it still is transmitted in
other management frames sent by the AP. C. Collaborate with others from around
the world
C. Turning off the SSID broadcast may
prevent users from being able to freely D. It can never lose/corrupt files

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 273

232. Sheldon is shopping for a new wireless 237. A company, OCR Supermarkets, has su-
router for Leonard as a Birthday Present. permarket stores throughout the country.
Which wireless router will give the fastest The computers for each store connect to

PRACTICE BOOK» NOT FOR SALE


throughput for Leonard ? the central office using a Wide Area Net-
A. 802.11a work (WAN).Identify two differences be-
tween a WAN and a LAN (Local Area Net-
B. 802.11b work).
C. 802.11g
A. WAN is over a large geographical area
D. 802.11n
/ needs totransmit over a large distance
233. The primary design of a(n) is to //a LAN is over a small geographical area.
capture the transmissions from legitimate
B. LAN is over a large geographical area
users.
/ needs totransmit over a large distance
A. rogue access point //a WAN is over a small geographical
B. WEP area.
C. evil twin C. WAN uses externalhardware / infras-
D. Bluetooth grabber tructure / cables / network //LAN has
its owninfrastructure / cables / network /
234. Which is a disadvantage of a wireless hardware due to distance / practicalities
network?
A. Signal can be too strong D. LAN uses externalhardware / infras-
tructure / cables / network //WAN has
B. You need a radio to receive signals its owninfrastructure / cables / network /
C. Signal can be weak hardware due to distance / practicalities
D. Your wireless device can get lost
238. Which SSD is cheapest?
235. If measured outdoors, the 802.11g wire-
less standard gives data throughput of up A. Optical
to and a range of up to
B. Solid
A. 11 Mbps / 140 meters
B. 11 Mbps / 120 meters C. Magnetic
C. 54 Mbps / 250 meters D. none of above
D. 54 Mbps / 140 meters
239. Question 7:Which of these is the correct
236. What is meant by hosting?
definition of a router? (1-4)
A. A service that allows individuals and
organisations to make their website avail- A. Forwards data packets along a net-
able on the world wide web work
B. A service that creates websites for B. Corrects errors that are found in data
companies packets
C. A service that transmits data in a net-
work C. A type of transmission media that pro-
vides the greatest bandwidth
D. A service that translates alphabetic
names into IP addresses D. A server within a network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Introduction 274

240. defines the current location of the 245. A Wireless Access Point (WAP) is
MNfrom an IP point of view. A. A ‘hotspot’
A. Care-of Address B. A way of connecting to a network wire-
B. Home Network lessly

C. Home Agent C. Way of transmitting radio waves


D. none of above
D. Foreign Agent
246. A wireless access mode that has clients

NARAYAN CHANGDER
241. Speeds of up to 150 Mbps can be ob- communicate with each other without the
tained by this wireless standard ? user of a wireless access point.
A. 802.11a A. decentralized LAN
B. 802.11b B. ad-hoc mode
C. 802.11g C. wireless mesh
D. 802.11n D. none of above

247. IP telephone devices can be used with no


242. Which of these is a benefit of virtual net-
external power from a wall outlet because
work? (6-9)
they utilize this feature ?
A. They have a higher level of security
A. VPN
than other remote connections
B. PoE
B. There is no need for any hardware to
connect a computer to a network C. QoS
D. WEP
C. There is no need for any software to
connect a computer to a network 248. Data being transported on a network.
D. They stop any errors occurring in the A. data
transmission of data in a network
B. traffic
243. To which class the following IP address C. packet
belongs to:223.11.3.6 D. none of above
A. Class A 249. A(n) is a network that covers a large
B. Class B geographical area using a variety of wired
or wireless transmission media.
C. Class C
A. wireless LAN (WLAN)
D. Class D
B. local area network (LAN)
244. Which of these technologies is NOT found C. wide area network (WAN)
in a wireless broadband router?
D. personal area network (PAN)
A. wireless probe
250. The Wi-Fi standard that operates at the
B. router shortest distance is ?
C. firewall A. 802.11a
D. access point B. 802.11b

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 WIRELESS LANs 275

C. 802.11g computer. As a result less bandwidth is


used..
D. 802.11n

PRACTICE BOOK» NOT FOR SALE


A. Hub
251. You must have this to connect to a net- B. Switch
work
C. Router
A. Network Interface Card D. none of above
B. Wireless Application Protocol
253. A Class 3 Bluetooth device has a maxi-
C. Wi-Fi mum distance of ?
D. Ethernet Cable A. 100 meters
B. 5 meters
252. Which network hardware is used to
send data packets between computers and C. 1 meter
sends the packet to only the destination D. 10 meters

6.2 WIRELESS LANs


1. Which of the following BEST describes he B. IEFT CoAP
prevailing network topology used?
C. RFID/NFC
A. Star
D. IEEE 802.15.4.LoWPAN
B. Full Mesh
C. Hybrid 5. A short range technology that can connect
multiple devices such as smartphones and
D. Ring speakers in a small area.
2. Which of the following spread spectrum A. Infra-red
techniques were used in the original IEEE
B. Wi-Fi
802.11 standard?
C. Drone
A. FHSS and DSSS
B. THSS and FHSS D. Bluetooth

C. THSS and DSSS 6. Bluetooth uses


D. Hybrid technique A. orthogonal frequency division multi-
plexing
3. What is the data rate of HomeRF 2.0?
B. time division multiplexing
A. 10 Mbps
B. 54 Mbps C. frequency hopping spread spectrum

C. 200 Mbps D. channel division multiplexing


D. 1 Mbps 7. A network interface card is
4. enables seamless integration of LoW- A. A card used to join two networks
PAN devices with internet leveraging B. Hardware that joins a device to a net-
A. IETF 6LoWPAN work

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 WIRELESS LANs 276

C. Like a business card used at network- B. Data sent to your device in a continu-
ing meetings ous flow.
D. Used to send greetings on National C. Where a smart phone acts as an ac-
Network Interface Day cess point allowing other devices to share
its mobile broadband connection.
8. What is the access point (AP) in a wireless
D. A computer network used for data
LAN?
communication between devices
A. device that allows wireless devices to

NARAYAN CHANGDER
connect to a wired network 13. supports low energy radio operation

B. wireless devices itself A. IETF 6LoWPAN


B. IEFT CoAP
C. both device that allows wireless de-
vices to connect to a wired network and C. RFID/NFC
wireless devices itself D. Bluetooth
D. all the nodes in the network 14. A wireless spectrum is described as
9. Which of the following frequencies is not A. states what frequency to use in a wire-
used in WiMAX for communication? less network
A. 2.3 GHz B. Enlists available frequencies to use
B. 2.4 GHz C. Defines wave sizes and category
C. 2.5 GHz D. Classifies frequencies approved by a
regulatory organization
D. 3.5 GHz
15. how many types of authentication
10. Which of these is FALSE about LANs?
A. 2
A. LAN stands for Local Area Network B. 1
B. LANs cover a small area or single build- C. 3
ing
D. 4
C. LANs are usually wired with Ethernet
cable 16. What is WISP?
D. LANs cannot use fibre optic cable A. Wideband Internet Service Protocol
B. Wireless Instantaneous Source
11. When designing and understanding site Provider
survey considerations, what process
C. Wideband Internet Source Protocol
should be first initiated?
D. Wireless Internet Service Provider
A. Cost Benefit Analysis
B. Equipment Sourcing 17. Which of the following wireless technolo-
gies are deprecated and should not be used
C. Customer Interview due to their known vulnerabilities?
D. Initial walk-through A. WPA2
12. What is “Tethering”? B. WAF
A. A standard for connection sockets for C. WEP
connecting devices. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 WIRELESS LANs 277

18. Mostly is used in wireless LAN 23. Virtual terminal protocol is an example of
A. time division multiplexing A. Network layer

PRACTICE BOOK» NOT FOR SALE


B. orthogonal frequency division multi- B. Application layer
plexing C. Transport layer
C. space division multiplexing D. Physical layer
D. channel division multiplexing 24. Sending data to your device in a continu-
ous flow whilst you are connected to the
19. A technique used to prevent frequency
internet, without saving it to the device is
overlapping that causes interference when
known as what?
mounting several access points?
A. Streaming
A. Use different access point brands
B. Downloading
B. Change password for every access
point C. Saving
D. Opening
C. Use a low powered access point
D. Alternately change the frequency 25. Which of the following is the 802.11 High
Rate Standard?
20. Which of the following should the tech- A. IEEE 802.15
nician expect when disabling SSID broad-
cast? B. IEEE 802.11b
C. IEEE 802.15.4
A. Not everyone will be able to view all
available access points D. IEEE 802.11g
B. Data encryption would be more secure 26. Bluetooth Technology was designed to run
over wireless connection. on what type of network?
C. Access points will be known by users A. Personal Area Network
informed of its presence
B. Wide Area Network
D. A user would need to manually type C. Metropolitan Are Network
the SSID to connect
D. Local Area Network
21. WiMAX provides
27. Nowadays, what do customers look for in
A. simplex communication considering internet services?
B. half duplex communication A. Cost
C. full duplex communication B. Frequency
D. no communication C. Topology
D. Speed
22. how many main encryption methods?
28. What is the name of 300 MHz of unli-
A. 3
censed spectrum allocated by FCC in ISM
B. 2 band?
C. 4 A. UNII
D. 5 B. Millimetre wave

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 WIRELESS LANs 278

C. Unlicensed PCS 34. HIPER-LAN stands for


D. Bluetooth A. High Precision Radio Local Area Net-
29. Which of the following specifies a set work
of media access control (MAC) and phys- B. High Performance Radio Local Area
ical layer specifications for implementing Network
WLANs?
C. High Precision Radio Land Area Net-
A. IEEE 802.16 work

NARAYAN CHANGDER
B. IEEE 802.3
D. Huge Performance Radio Link Access
C. IEEE 802.11 Node
D. IEEE 802.15
35. In wireless ad-hoc network
30. Type of troubleshooting methodology
where a guide is used to move forward A. access point is not required
of the troubleshooting process. B. access point is must
A. Ocular
C. nodes are not required
B. Structured
D. all nodes are access points
C. Shoot from the hip
D. Layered 36. An interconnected collection of piconet is
31. Adheres to approach for managing re- called
sources and support mapping to HTTP. A. scatternet
A. RETful B. micronet
B. IoT
C. mininet
C. Restful
D. multinet
D. RESTful
32. Which one of the following event is not 37. oWPAN Adaption layer contains?
possible in wireless LAN? A. Header compression
A. acknowledgement of data frames
B. Fragmentation
B. multi-mode data transmission
C. All the above
C. collision detection
D. connection to wired networks D. None of the above

33. When a wireless network in a small office 38. An organization that develops communica-
is being set up, which type of IP address- tion standards in electrical, computer, en-
ing is typically used on the networked de- gineering, and related disciplines?
vices?
A. IEEE
A. private
B. Six Sigma
B. public
C. wireless C. ANSI
D. network D. ISO

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 WIRELESS LANs 279

39. WiMAX MAC layer provides an interface 45. IEEE 802.11s


between A. Fast roaming
A. higher transport layers and physical

PRACTICE BOOK» NOT FOR SALE


B. Wireless mesh networking
layer
C. c
B. application layer and network layer
D. radio resource measurement
C. data link layer and network layer
D. session layer and application layer 46. Wireless standards that describes a trans-
fer rate 600 Mbps at 2.4 or 5 GHz?
40. Bluetooth is the wireless technology for
A. 802. 11
A. local area network
B. 802. 11n
B. personal area network
C. 802. 11ac
C. metropolitan area network
D. 802. 11a
D. wide area network
47. Which of the following WLAN standard
41. Bluetooth supports has been named Wi-Fi?
A. point-to-point connections A. DSSS IEEE 802.11b
B. point-to-multipoint connection B. IEEE 802.6
C. both point-to-point connections and C. IEEE 802.15.4
point-to-multipoint connection
D. IEEE 802.11g
D. multipoint to point connection
48. What is the full form of WLAN?
42. A device operating at network layer is
called A. Wide Local Area Network
A. Router B. Wireless Local Area Network
B. Equalizer C. Wireless Land Access Network
C. Bridge D. Wireless Local Area Node
D. Repeater 49. Unauthorised access of information from
a wireless device through a bluetooth con-
43. Which of the following modulation
nection is called
schemes is supported by WiMAX?
A. bluemaking
A. binary phase shift keying modulation
B. bluesnarfing
B. quadrature phase shift keying modula-
tion C. bluestring
C. quadrature amplitude modulation D. bluescoping
D. all of the mentioned 50. Which of these may affect a network’s
44. In wireless network an extended service availability? (choose three)
set is a set of A. Being in a rural locations
A. connected basic service sets B. Being in a developing country
B. all stations C. Having an expert user
C. all access points D. Using too many applications
D. connected access points E. Mobile network coverage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 280

6.3 WIRELESS NETWORKS


1. An electromagnetic (EM) field that is gen- C. Star
erated by a network cable or network de- D. Infrastructure
vice, which can be manipulated to eaves-
drop on conversations or to steal data. 6. A type of cable that has a Teflon coating
A. data emanation that makes them more impervious to fire.
A. plenum-rated

NARAYAN CHANGDER
B. electromagnetic interfearence
C. crosstalk B. flame retardant
D. none of above C. RJ-45 T rated
D. none of above
2. The process of transferring a mobile sta-
tion from one base station to another is 7. Which network can result in devices slow-
A. Mobile Switching ing down when other devices access
them?
B. Roaming
A. Client server network
C. Hand off
B. Peer to peer network
D. Forward channel
C. Both client server and peer to peer
3. IPv4 IP addresses are bit binary num-
D. none of above
bers
A. 2 8. What type of handovers is supported by
LTE?
B. 8
A. Hard handover only
C. 32
B. Soft handover only
D. 128
C. Hard and soft handover
4. Which term describes the physical layout
D. Hard, soft and softest handover
of a Network?
A. Topology 9. Which of the following is a benefit of a
wired network? [2 answers]
B. Topping
A. They are usually quicker than wireless
C. Topiology
networks
D. Toppology
B. They are much cheaper than wireless
5. A student has completed his part of a networks
group research paper, and needs to share C. They are more secure than a wireless
it with a classmate. He sees the class- network
mate as they’re crossing the parking lot
between classes. Which WLAN architec- D. They are much easier to install than
ture could they use to transfer the file wireless networks
from one laptop to the other? 10. What type of attack is a wireless disasso-
A. Ad hoc ciation attack?
B. Mesh A. Downgrade attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 281

B. Brute-force attack 16. Bluetooth uses


C. Denial of Service (DoS) attack A. Frequency Hopping Spread Spectrum

PRACTICE BOOK» NOT FOR SALE


D. Cryptographic attack B. Orthogonal Frequency Division Multi-
plexing
11. A wireless device that also acts as a
router, firewall, and IP proxy. C. Time Division Multiplexing
A. router D. Channel Division Multiplexing
B. wireless access point
17. Which one of these should NOT slow down
C. Wi-Fi the performance of a network?
D. none of above
A. Lots of users on at once
12. What is the range of asynchronous user B. Everyone on WiFi instead of cabled
data rates provided by HIPER-LAN? connections
A. 1-100 Mbps C. Lots of malware infections
B. 50-100 Mbps
D. Using fibre optic cable to join different
C. 1-20 Mbps parts together
D. 500 Mbps to 1 Gbps
18. Which protocols are used for e-mails?
13. Unauthorised access of information from
A. IMAP, SMTP, POP
a wireless device through a bluetooth con-
nection is called B. IMAP, SMTP, TCP/IP
A. Bluemaking C. IMAP, HTTP, POP
B. Bluesnarfing D. FTP, SMTP, POP
C. Bluestring
19. The IEEE standard used for the implemen-
D. Bluescoping
tation of most modern WLANs is known as
14. Which Carrier Sense technology is used on
wireless networks to reduce collisions? A. 802.11
A. CSMA/CD B. 802.1x
B. 802.3
C. 802.3
C. 802.11
D. 802.1q
D. CSMA/CA
20. What is A2DP (advanced audio distribu-
15. In a GSM architecture, which system
tion profile)?
stores the IMEI numbers of all working mo-
bile phones under the network? A. a bluetooth profile for streaming audio
A. HLR B. a bluetooth profile for streaming video
B. VLR C. a bluetooth profile for security
C. EIR D. a bluetooth profile for file manage-
D. AUC ment

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 282

21. OFDMA stands for 26. A is a data communication system


A. omnidirectional frequency division spanning states, countries, or the whole
multiple access world.
B. orthogonal frequency duplex multiple A. MAN
access B. WAN
C. orthogonal frequency divider multiple C. LAN
access
D. none of the above

NARAYAN CHANGDER
D. orthogonal frequency division multiple
access 27. Which of the following would be the best
solution for securing a small network lack-
22. Why do computers need a MAC address?
ing an authentication server?
A. So the internet knows where to deliver
A. WPA-PSK
data
B. WPA2-Enterprise
B. So the postman knows where to de-
liver a letter C. WPA2-PSK
C. So a network knows where to send D. WPA-Enterprise
data
28. This is the family of specifications for wire-
D. So the servers know where to deliver
less local area networks (WLANs) devel-
letters to
oped by a working group of the Institute of
23. A standards and trade organization com- Electrical and Electronics Engineers (IEEE).
posed as an alliance of trade associations A. 3G
for electronics manufacturers in the United
States. B. 802.11

A. TIA/EIA C. 802.3
B. CompTIA D. 802.5
C. IEEE 29. A disturbance that can affect electrical cir-
D. none of above cuits, devices, and cables due to electro-
magnetic conduction and possibly radia-
24. What is a Network? tion.
A. Mobile Service Provider A. electromagnetic crosstalk
B. A number of devices linked together to
B. crosstalk
allow them to share resources.
C. electromagnetic interference
C. A TV Channel
D. none of above
D. none of above
25. Antennas that are designed to emit equally 30. provides control over the usage of mo-
in all directions. bile devices within a designated area.
A. Omni-directional Antennas A. Geofencing
B. Directional antennas B. Quarantine network
C. - C. Geolocation
D. - D. GPS tagging

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 283

31. Which order are the layers in when receiv- C. Both client server and peer to peer
ing data? D. none of above

PRACTICE BOOK» NOT FOR SALE


A. Link, Network, Transport, Application
37. Which network can deny requests from
B. Application, Transport, Network, Link users if they do not have the right access
C. Link, Transport, Network, Application level?
D. Application, Network, Transport, Link A. Client server network
B. Peer to peer network
32. Which of the following standard commit-
tee specifies Bluetooth and other Personal C. Both client server and peer to peer
Area Networks (PAN)? D. none of above
A. IEEE 802.11b 38. Which of these 802.11 standards is the
B. IEEE 802.15 best choice for upgrading a network to run
up to 600 Mbps while maintaining back-
C. IEEE 802.11g
ward compatibility with 802.11b equip-
D. IEEE 802.16 ment?
33. what are the 3 ways to connect to a net- A. 802.11a
work B. 802.11b
A. LAN, WAN, wireless C. 802.11n
B. wireless, wired, mobile D. 802.11g
C. Bluetooth, wired, mobile 39. Which one of these best describes a
D. hot spot wired mobile router?
A. A device used to print documents.
34. MIMO technology makes advantage of a
natural radio wave phenomenon called B. A cable used to connect computers to-
gether.
A. Reflection
C. A device used to connect to the inter-
B. Refraction net.
C. Multipath D. none of above
D. Diffraction
40. Taking a secret message and reproducing
35. An interim encryption protocol used with the original plain text is known as?
wireless networks; replaced WEP. A. Vigenere Cipher
A. Wi-Fi Protected Access B. Encryption
B. RADIUS C. Random Substitution cipher
C. WPA-2 D. Decryption
D. none of above 41. SSID is a case-sensitive, alpha-numeric
string that is up to 32-sentences .
36. Which network is easier to keep track of
files as they are all stored in a central lo- A. True
cation? B. False
A. Client server network C. -
B. Peer to peer network D. -

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 284

42. Is a wireless media that is limited to low- 47. What is the average uploading speed of
speed, short-range communications, but 4G LTE network?
has the advantage of communicating with A. 1-3 Gbps
many devices at the same time
B. 2-5 Gbps
A. Radio Frequency (RF)
C. 1-3 Mbps
B. Bluetooth
D. 2-5 Mbps
C. Infrared (IR)

NARAYAN CHANGDER
D. Micro waves 48. The first wireless encryption protocol.
Since it is considered a weak encryption,
43. A hacker takes advantage of a Bluetooth it is not recommended.
connection to send a virus to a user’s A. RADIUS
phone. What kind of security breach has
occurred? B. WAP

A. Data breach C. WEP

B. Bluejacking D. none of above

C. War driving 49. Which of these security methods use a


D. Bluesnarfing common shared key configured on the
WAP and all wireless clients? (choose 3)
44. Which of the following technologies cre- A. WEP
ates a WPAN, allowing users to connect
various personal devices. B. WPA Personal

A. 802.11 C. WPA Enterprise

B. NFC D. WPA2 Personal

C. Bluetooth E. WPA2 Enterprise

D. Z-Wave 50. A form of this that is measured interfer-


ence between two pairs in a single cable,
45. Encrypt the word alphabet using a Caesar measured on the cable end nearest the
cipher with a shift of 3 transmitter.
A. DVSDULQV A. close end crosstalk
B. DOOFOHDU B. far end crosstalk
C. DOSKDEHW C. near end crosstalk
D. DORQHBHV D. none of above

46. Which network will allow you to login 51. What are the main parts of a Mobile Sta-
from any device on the network? tion in a GSM Network?
A. Client server network A. MT-Mobile Terminal
B. Peer to peer network B. SIM-Subscriber Identity Module
C. Both client server and peer to peer C. Both A and B
D. none of above D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 285

52. What does a WAP allow devices to do? B. Files and peripherals can be shared
A. Access the internet with wires C. Antivirus scans can be run across all

PRACTICE BOOK» NOT FOR SALE


B. Join a network (with cables) computers from one computer

C. Join a network (with wires) D. All software updates can be run across
all computers from one computer
D. Join a network (without wires)
58. what dose WAN stand for?
53. A security protocol designed to strengthen
existing WEP implementations without re- A. walking area network
quiring the replacement of legacy hard- B. wide area network
ware is called:
C. wired area network
A. PEAP
D. wireless area network
B. TKIP
59. Which one sends data to all devices, and
C. CCMP
makes no decisions?
D. WPA2
A. A hub
54. ESS stands for: B. A router
A. Extended Service Set C. An access point
B. Enhanced Set Service D. A switch
C. Enhanced Service Settings
60. Correctly identify the characteristics of the
D. Extended Supported Service IEEE 802.11g wireless standard.
55. Which of these would best describe a bio- A. Maximum data signaling rate of 54
metric access mechanism? Mbps
A. A physical access card B. 2.4 GHz frequency range
B. A fingerprint C. Maximum data signaling rate of 11
Mbps
C. The outline of a door key
D. 5.0 GHz frequency range
D. A pseudo-random token generator
E. Multiple In Multiple Out (MIMO)
56. *CBT Question What most affects signal
quality of a wireless LAN? 61. *Which type of device provides warning of
unauthorized attempts to access network?
A. A Encryption using WEP.
*answer choices
B. B Insulation on connecting network ca-
bles. A. *CMOS

C. C Construction material of the build- B. *BIOS


ing. C. *IDS
D. D Access point driver upgrade. D. *UPS

57. Which of these is a benefit of a peer-to- 62. Which of the following subsystem pro-
peer network? (6-9) vides radio transmission between mobile
A. All computers can be maintained from station and MSC?
one computer A. BSS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 286

B. NSS 68. *CBT (2019) Which device if attached to a


C. OSS UPS could cause it to fail as it will exceed
standard load levels recommendations? *
D. BSC
A. *Laser printer.
63. A device used to test a cable or wire.
B. *Personal computer.
A. continuity tester
C. *Surge protector.
B. wire tester
D. *Gateway router.

NARAYAN CHANGDER
C. multimeter
D. none of above 69. A BTS is also called by general public?
64. What does “MAC” stand for in “MAC AD- A. Mobile tower
DRESS”?
B. Exchange
A. Media Access Card
C. Charging Point
B. Multi Area Connection
C. Media Access Control D. None

D. Multi Access Connector 70. What is the main purpose of a peer to peer
65. Which networking device sends data to all network?
devices connected to it and lacks the intel- A. To control the security of the network.
ligence to determine the best path for data
B. To share files and resources between
packets?
devices.
A. A hub
C. To manage the users on the network.
B. A router
D. To back up data to a central location.
C. An access point
D. A switch 71. Hosting means
66. Which network allows you to share files A. A company with lots of servers run
and resources across your devices? your website or online shop
A. Client server network B. Downloading songs from a P2P net-
B. Peer to peer network work
C. Both client server and peer to peer C. Translating IP addresses into URLs
D. none of above D. Pretending to be someone you are not
on the Internet
67. What is a MAN?
A. A WAN and a LAN that are connected 72. Which of the following would be most
together likely to experience interference from cord-
B. A metropolitan Area network, it inter- less telephones? (choose TWO)
connects users with computer resources A. Bluetooth
in a geographical area
B. 802.11b
C. An Ethernet cable connected to a com-
puter to produce a LAN C. 802.11a
D. Sankey Mesh D. Infrared

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 287

73. What is Packet switching? 78. If you wanted to adjust the boundary
A. Switching numbers and letters to the range of a wireless network, which WAP
configuration setting should you change?

PRACTICE BOOK» NOT FOR SALE


correct order
A. SSID broadcast
B. Breaking up a file into small pieces and
putting those pieces back together at their B. Power level controls
destination C. Maximum Transmission Unit (MTU)
C. Breaking a box and throwing the D. Quality of Service (QoS)
pieces along a pathway
79. A type of port that includes a crossover
D. throwing pieces of data along a path connection.
74. What is a computer called when it is not A. port 22
connected to a network? B. MDI-X
A. A server C. cross port interface
B. A standalone D. none of above
C. A client 80. Which piece of Packet Header data allows
D. none of above your computer to reassemble the data?
A. Packet Number
75. The most common type of patch cable, it
is the type that you would use to connect B. Recipient Address
a computer to a central connecting device C. Size of Packet
like a switch. D. none of above
A. network cable
81. Question 1:What is a standalone com-
B. straight through cable puter?
C. RJ-45 A. A computer that is not connected to a
D. none of above network
B. A computer that is being used as a
76. Which of these will make your wireless server
network “invisible” to war driving attack-
ers? C. A computer that does not have any pe-
ripherals attached to it
A. Disable SSID broadcast
D. A computer that is used by only one
B. Implement WPA2 Personal person
C. Change the default SSID
82. Goals of IDS
D. Change the default channel A. Mobility and allow for a stable connec-
77. WLANs use high power levels and gener- tion
ally require a license for spectrum use. B. Take action and allowing an attack to
the network
A. True
C. Identify abnormal behavior of network
B. False
or misuse of resources
C. Either true or false D. Different ways to transmit data se-
D. None curely and safely

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 288

83. What is the technical word for ‘Delay’? 88. An interconnected collection of piconet is
called
A. Bandwidth
A. Scatternet
B. Latency
B. Micronet
C. Backbone router
C. Mininet
D. Web Server
D. Multinet
84. Which of these is most associated with the 89. How many bits is an IPv4 address?

NARAYAN CHANGDER
802.1X standard?
A. 16
A. Ethernet topology
B. 32
B. Network Access Control
C. 64
C. Ethernet trunking D. 128
D. Spanning Tree Protocol
90. Which network can continue to function if
85. Identify the correct IEEE 802.11a wireless a device fails?
standard characteristics. A. Client server network
A. Maximum data signaling rate of 54 B. Peer to peer network
Mbps C. Both client server and peer to peer
B. 5.0 GHz frequency band D. none of above
C. Carrier Sense Multiple Access/Collision
91. Hexagon shape is used for radio coverage
Avoidance
for a cell because.
D. 2.4 GHz frequency band A. It uses the maximum area for cover-
E. Maximum data signaling rate of 11 age
Mbps B. Fewer number of cells are required
86. A port-based network access control used C. It approximates circular radiation pat-
to secure wireless connection. tern

A. MDI-X D. All of the above

B. IEEE 802.1P 92. Which of these is a characteristic of a LAN?


(3-6)
C. IEEE 802.1X
A. It covers a wide geographical area
D. none of above
B. Users can share files and peripherals
87. A form of cross talk interference, mea- C. Computers are connected together us-
sured at the cable end farthest from the ing a leased line or a satellite
transmitter.
D. Data can only be transmitted at a very
A. far end crosstalk slow rate
B. end-point crosstalk 93. WiMAX is mostly used for
C. destination crosstalk A. Local Area Network
D. none of above B. Metropolitan Area Network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 289

C. Personal Area Network 99. It is a wireless networks that can operate


D. Wide Area Network without access points:

PRACTICE BOOK» NOT FOR SALE


A. Ad hoc
94. What does the Application do when receiv-
ing a file? B. ESS
A. Encodes the data C. BSS
B. Displays the data D. SSID
C. Splits it into packets
100. Which of the following refers to a wire-
D. Attaches the MAC addresses
less protocol designed to provide commu-
95. A network composed of at least one WAP nication between appliances in a home au-
and at least one computer or handheld de- tomation network?
vice that can connect to the WAP. A. FCoE
A. Wi-Fi
B. SDN
B. home network
C. Z-Wave
C. wireless LAN
D. SIEM
D. none of above
96. CDMA stands for: 101. In , the router may forward the re-
ceived packet through several of its inter-
A. Code-Division Multiple Access
faces.
B. Carrier Division Multiple Access
A. unicasting
C. Compact Digital Multiplex Arrange-
ment B. multicasting
D. none of the above C. broadcasting

97. Which of these is NOT correct of packet D. none of the above


switching?
102. Choose the appropriate wireless bound-
A. Messages cannot be easily inter- aries”Charlie uses the IrDA port to connect
cepted her PDA to her laptop to upload files.”
B. Establishes a route on which to send
A. WPAN
data packets
B. WLAN
C. Packets need to be re-ordered
D. Maximises the use of the network C. WWAN
D. WMAN
98. Which of these IS an advantage of copper
cables over fibre optic cables?
103. What are the main parts of a BSS (Base
A. They are more robust Station Subsystem) in a GSM network?
B. They enable data to travel faster A. BTS-Base Transceiver Station
C. They are cheaper than fibre optic ca- B. BSC-Base Station Controller
bles
C. A and B
D. They can be used over longer dis-
tances D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 290

104. Which of these would be the result of B. WLAN


SSID broadcast suppression?
C. WWAN
A. Non-authenticated users will not be
able to connect to the wireless network D. WMAN
B. The network will be configured as an 109. *The movement of people in a population,
open wireless network as from place to place, from job to job, or
C. All wireless data will be encrypted from one social class or level to another.

NARAYAN CHANGDER
D. The wireless network will not appear A. Mobility
in the list of available networks
B. Flexibility
105. Which network will copy files between
devices and create duplicate fiies, making C. Scalability
it difficult to keep track of where the files D. Probability
are stored and which ones are the most up
to date? 110. Which option refers to a channel access
A. Client server network method used in 2G GSM networks?
B. Peer to peer network A. CSMA/CA
C. Both client server and peer to peer B. TDMA
D. none of above C. CSMA/CD
106. A is a LAN that uses no physical D. CDMA
wires which requires computers and de-
vices to have built-in wireless capability 111. What is a computer network?
or the appropriate wireless network card,
USB adapter, or other wireless device. A. A single computer not connected to
any others.
A. wireless LAN (WLAN)
B. wide area network (WAN) B. Lots of computers in one place.

C. local area network (LAN) C. Computers that are connected to-


gether by cables of WiFi.
D. metropolitan area network (MAN)
D. none of above
107. Which signaling method uses a narrow
frequency band and hops data signals in 112. Is a wireless computer network that links
a predictable sequence? two or more devices using a wireless dis-
A. FHSS tribution method (often spread-spectrum
B. DSSS or radio) within a limited area such as a
home, school, computer laboratory, or of-
C. OFDM fice building.
D. CDMA
A. WPAN
108. Choose the appropriate wireless bound- B. WLAN
aries’Natasha calls her friend Carios on
her cell phone” C. WWAN
A. WPAN D. WMAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 291

113. Which one of these best describes a mesh 118. A metric that compares the amount of us-
topology? able data and the background noise that is
being sent over a transmission channel is

PRACTICE BOOK» NOT FOR SALE


A. All devices are connected to a central
switch. known as:

B. All devices are connect to each other. A. BRI

C. The computers are all connected to a B. SNR


central printer. C. RFI
D. none of above D. SVC
114. What does “MAC” stand for in “MAC Ad- 119. What is the definition of Internet
dress”?
A. Local wide collection computers
A. Media Access Control
B. International browsing programs
B. Mandatory Access Control
C. Worldwide collection of networks
C. Micro Access Control
D. Organization that provides WWW
D. Media Access Certificate

115. Which Bluetooth class has the highest 120. What tool should you use to troubleshoot
power output? wireless signal loss and low wireless net-
work signal coverage?
A. Class 1
A. Protocol analyzer
B. Class 2
B. WAP power level controls
C. Class 3
C. Logical network diagram
D. NFC
D. Network mapper
116. Which of the following indicates poor net-
work performance? 121. Which of the following controls access to
A. Low Bandwidth a shared transmission medium in 802.11
networks?
B. Good signal quality
A. CWDM
C. Low Number of Users
B. CSMA/CD
D. Expensive Hardware
C. CDMA
117. Too many users/devices can slow down
D. CSMA/CA
the local area network because
A. The router cannot process the data 122. What is the maximum channel bandwidth
packets quick enough. of the 802.11ac standard.
B. The bandwidth is being shared be- A. 20 MHz
tween the users.
B. 22 MHz
C. The devices are not all connecting us-
C. 40 MHz
ing Ethernet
D. 80 MHz
D. All of the devices are connected using
WiFi E. 160 MHz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 292

123. A tool used to terminate twisted pair ca- C. Private lines leased from BT
ble to a patch panel. D. Ethernet cables
A. signal terminator
129. The layer adds a header to the packet
B. punch down tool coming from the upper layer that includes
C. grounding wire the logical addresses of the sender and re-
ceiver.
D. none of above
A. data link

NARAYAN CHANGDER
124. UMTS use which multiple access tech- B. network
nique?
C. physical
A. CDMA D. none of the above
B. TDMA
130. A user swipes her smartphone across a
C. FDMA tag on a poster to obtain showtimes for a
D. SDMA movie she wants to see later that evening.
What wireless technology transmitted the
125. Which signaling method breaks data into data?
pieces and sends the pieces across multiple
A. Bluetooth
frequencies in a defined range?
B. WiMAX
A. FHSS
C. NFC
B. DSSS
D. Infrared
C. OFDM
131. *Which antenna is designed to be very di-
D. CDMA rectional?
126. What do networks allow data to be A. *A. Yagi antenna
shared between? B. *B. parabolic antenna
A. Computer to human communication C. *C. Omni Directional
B. Computer to device communication D. none of above
C. Computer to GPU communication 132. Bluetooth supports
D. Computer to computer communication A. point-to-point connections
127. Which topology requires a multi point B. point-to-multipoint connection
connection? C. both point-to-point connections and
A. Bus point-to-multipoint connection
D. multipoint to point connection
B. Star
C. Mesh 133. What would you disable to prevent
broadcasting of the wireless network
D. Ring name?
128. MyBank plc runs a private WAN. What A. MAC filtering
will join it all together? B. Shared secret key
A. Normal telephone wires C. SSID broadcast
B. The Internet D. 802.1x

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 293

134. Is a wireless computer network that links B. Speed


two or more devices within a limited area C. Mobility
such as a home, school, computer labora-

PRACTICE BOOK» NOT FOR SALE


tory, or office building D. Flexibility

A. WPAN E. Scalability

B. WLAN 140. A Caesar cipher is an example of a


C. WWAN A. transposition cipher
D. WMAN B. bimodal cipher

135. For encryption, WiMAX supports C. substitution cipher

A. Advanced Encryption Standard D. substantial cipher

B. Triple data Encryption Standard 141. An Intrusion Detection System (IDS)?


C. Advanced Encryption Standard and A. can be configured to allow the intruder
Triple data Encryption Standard IP when an alert is generated
D. Double data Encryption Standard B. opening the network connection for an
active and passive attack
136. WiMAX stands for
C. inspects network activities and identi-
A. Wireless Maximum Communication fies suspicious patterns that may indicate
B. Worldwide interoperability for Mi- a network attack
crowave Access D. an identifier for the correct usage of
C. Worldwide international Standard for particular computer or total network
Microwave Access
142. Which is a disadvantage of WiFi?
D. Wireless internet Maximum Communi-
cation A. You can use it in a range of ‘hard to
reach’ locations making users more mo-
137. WiMAX provides bile
A. Simplex communication B. It is simple to join a WiFi network
B. Half duplex communication C. It reduces Health & Safety issues by
C. Full duplex communication removing wires

D. no communication D. None of them

138. Which is not part of a data packet? 143. In a piconet, one master device

A. Destination address A. Can not be slave

B. Payload B. Can be slave in another piconet

C. Route instructions C. Can be slave in the same piconet

D. Error control bits D. Can be master in another piconet

139. Wired Network is better than Wireless 144. Which transmission media is the most ex-
Network in the following Aspects (Choose pensive?
All Correct Answers): A. Plastic
A. Security B. Twisted pair cable

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 294

C. Fibre optic C. The network uses terminators


D. Coaxial D. The Server is usually based in the mid-
dle of the network
145. A common type of interference that oc-
curs when the signal that is transmitted 150. Which of these do you need to implement
on one copper wire or pair of wires cre- 802.1x authentication on a wireless net-
ates an undesired effect on another wire work?
or pair of wires.
A. WPA2

NARAYAN CHANGDER
A. interfearence
B. wire jabber B. TKIP

C. crosstalk C. WPA
D. none of above D. RADIUS

146. Which of the following EAP options relies 151. Which property of OFDMA system allows
on client-side and server-side certificates adjacent subcarriers to be used without in-
for authentication? terference?
A. EAP-TLS A. Orthogonality
B. PEAP B. Orthodoxy
C. EAP-TTLS
C. Octagonality
D. EAP-FAST
D. Originality
147. What does an SSID represent?
152. What is a standalone computer? (1-4)
A. The logical name of the wireless net-
work A. A computer that is being used as a
B. The type of 802.11 standard in use server
C. The strength of the wireless signal B. A computer that is not connected to a
network
D. The manufacturer of a wireless access
point C. A computer that does not have any pe-
ripherals attached to it
148. Which of the following is NOT a portable
device on a network? D. A computer that is used by only one
person
A. Desktop PC
B. Laptop 153. Which of the choices listed below would
C. Smartphone allow for setting up three Wireless Access
Points (WAPs) on non-overlapping chan-
D. Tablet nels?
E. E-book reader
A. 1
149. Which is a feature of a Mesh Network? B. 5
A. Data can be transmitted from different
C. 6
devices simultaneously
D. 9
B. Devices are dependent on a central
server E. 11

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 295

154. Allows long range wireless communica- C. VLR, EIR


tion: D. All the above

PRACTICE BOOK» NOT FOR SALE


A. Access point
160. Which of these statements is true? (3-6)
B. Client A. A client-server network cannot be
C. Wireless Bridge used to share files
D. Antenna B. A client-server network has a central
computer that provides services to the
155. What do networks allow you to share? rest of the network
A. information C. Each computer on a client-server net-
B. dinner work is maintain separately
C. cars D. A client-server network is cheap and
easy to set up
D. desks
161. Which is an advantage of using a net-
156. Common examples of wireless networks worked computer?
include
A. Fairly expensive
A. Mobile phone cellular networks B. More exposed to hackers
B. WiFi C. Able to share files
C. Bluetooth D. More complicated to set up
D. All the above 162. Which of the following is a challenge with
157. Devices that provide the connectivity to wired networks? [2 answers]
a WiMAX network are known as A. Wireless networks are easily created
A. Subscriber Stations B. They cost more to install and maintain
than a wireless network
B. Base Stations
C. Devices can move around when they
C. Gateway are connected
D. Switch Stations D. none of above
158. The advantage of using frequency reuse 163. UMTS is also known as
is A. IS-95
A. Increased capacity B. GPRS
B. Limited spectrum is required C. CdmaOne
C. Same spectrum may be allocated to D. W-CDMA
other network
164. An optimal Wireless Access Point (WAP)
D. All of the above antenna placement provides a countermea-
159. What are the main parts of a NSS (Net- sure against
work and Switching Subsystem) of a GSM A. War chalkling
Architecture? B. Spoofing
A. MSC-Mobile Switching Center C. War driving
B. HLR & AuC D. Inside threat

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 296

165. Which signaling method breaks data into 170. TDMA stands for:
very small data streams in order to send A. Time Domain Multiple Access
the information across long distances?
B. Time-Division Multiple Access
A. FHSS
C. Tone Division Multiple Access
B. DSSS
D. none of the above
C. OFDM
171. In delivery, the deliverer of the IP
D. CDMA

NARAYAN CHANGDER
packet and the destination are on differ-
ent networks.
166. Which of the following is ordered cor-
rectly in terms of cables bandwidth? A. a connection-oriented
(Highest bandwidth on the left ) B. a direct
A. CoAxial, Fibre Optic, Ethernet C. an indirect
B. Ethernet, CoAxial, Fibre Optic D. none of the above
C. Fibre Optic, Ethernet, CoAxial 172. i am a at home with 3 ipads 2 iphones
D. Fibre Optic, CoAxial, Ethernet and 1 laptop what should i use to connect
them to my network
167. A twisted pair cable that has an alu- A. wired
minum shield inside the plastic jacket that
surrounds the pairs of wires. B. mobile

A. shielded twisted pair C. wireless


D. none of above
B. EMI resistant cable
C. aluminum cable 173. Which is the most reliable type of topol-
ogy?
D. none of above
A. Partial Mesh
168. Which of these is not an advantage of a B. Sankey Mesh
Network?
C. Full Mesh
A. Shared files and resources
D. Star
B. Less vulnerable to hackers
174. One of the following is an Advantage of
C. Data can be shared across a range of Wireless Network
users
A. Security
D. User accounts can be created
B. Interferences
169. What type of technology is used to con- C. Expandability
tactless payment transactions? D. Unstable connection
A. NFC E. speed
B. SDN
175. What is bandwidth?
C. PED
A. The different channels which can be
D. WAP used using WiFi.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 297

B. The amount of data that can be trans- B. Homogeneous system used in wire-
ferred in a given time. less

PRACTICE BOOK» NOT FOR SALE


C. The distance between the router and C. Very important for security
the device which is furthest away. D. All of the mentioned
D. The amount of users which can use
181. IEEE 802.15 for creating
your network connection at a given time.
A. Wireless Private Area Networks
176. A trademarked term for WLAN.
B. Short range
A. wireless transmission C. Low cost
B. SSID D. All of the above
C. Wi-Fi
182. A type of port that does not include a
D. none of above crossover.
177. Which 802.11 standard introduced A. MDI
“channel bonding”, that ability to combine B. Port 68
adjacent channels to increase the amount
C. non-cross port
of available bandwidth?
D. none of above
A. 802.11a
B. 802.11b 183. Which network is easier to perform back-
ups and manage security such as user ac-
C. 802.11g cess levels?
D. 802.11n A. Client server network
E. 802.11ac B. Peer to peer network
178. Question 5:Where are you most likely to C. Both client server and peer to peer
find a peer-to-peer network? D. none of above
A. In a large organisation 184. A type of patch cable. This type is used to
B. In a home connect like devices to each other (for ex-
ample, a computer to another computer),
C. In a large office
or a switch to another switch.
D. Across several offices in a company
A. straight through cable
179. Which 802.11 standard functions in both B. crossover cable
the 2.4-GHz and 5-GHz bands? C. RJ-45 cable
A. 802.11g D. none of above
B. 802.11ac
185. What three channels are suggested to
C. 802.11b avoid overlapping wireless signals?
D. 802.11n A. 2, 4, 7
180. Sensor Network is B. 3, 7, 11

A. Heterogeneous system consisting of C. 1, 6, 11


tiny sensors D. 4, 7, 11

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 298

186. Which of the following are examples of 191. What type of key is not shared and com-
client requests? puters cannot decrypt a message without
it?
A. Logging in
A. Free key
B. Printing a document
B. Private key
C. Saving a file to the network
C. Public key
D. Accessing different drives on the net-
work D. Personal key

NARAYAN CHANGDER
E. All of these 192. Increases the strength of wireless signal
A. Access point
187. Which one of these provides security for
wireless networks? B. Client
A. 802.11g C. Wireless Bridge
B. CSMA/CD D. Antenna
C. WAP 193. A small portion of the original file
D. WPA A. Piece
B. Packet
188. The purpose of a SWITCH is
C. Section
A. To allow a computer to connect to the
internet D. Portion
B. To enable devices on a network to con- 194. IDS Stands for
nect with each other and send/receive
A. A-Induction Detection System
data
B. B-Intrusion Detection System
C. To enable one network to connect to
another network C. C-Inspection Detection System
D. To support wireless networking D. D-Illegal Detection System

189. What is a benefit of a wired network 195. Anything that disrupts or modifies a sig-
over a wireless network? nal that is traveling along a wire.
A. crosstalk
A. Increased costs
B. undesired effect
B. Technical Knowledge
C. interference
C. Faster Data Transfer Speeds
D. none of above
D. Easier to hack
196. With which of the following standards is
190. Soft handoff is IEEE 802.11n not backwards compatible?
A. Break before make A. 802.11g
B. Make before make B. 802.11ac
C. Both A and B C. 802.11b
D. None of these D. 802.11a

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 299

197. A switch is a faster and more sophis- 202. Routing between autonomous systems is
ticated router. referred to as

PRACTICE BOOK» NOT FOR SALE


A. two-layer A. interdomain routing
B. four-layer B. intradomain routing
C. three-layer C. both a and b
D. none of the above D. none of the above

198. This is an industry specification that de- 203. Which of the following is not a part of
scribes how mobile phones, computers, characteristic of 4G network?
and PDAs can easily interconnect with each A. Multirate management
other using a short-range wireless connec-
tion. B. Fully converged services
C. Software dependency
A. Bluetooth
D. Diverse user devices
B. EMI
C. D-AMPS 204. Which type of connection is generally
more reliable and quicker?
D. IrDA
A. Wireless (WIFI)
199. Which of the following technology does B. Ethernet (Wired)
not use MIMO?
C. Switch
A. 4G
D. Bandwidth
B. Wifi
C. WiMax 205. Is a wireless media that relatively low
energy and cannot penetrate through
D. AMPS walls or other obstacles. However, it is
commonly used to connect and move data
200. Which two standards support a data rate between devices such as Personal Digital
of 54 Mbps and operates at 5.75 GHz? Assistants (PDAs) and PCs.
(choose TWO)
A. Radio Frequency (RF)
A. 802.11a
B. Bluetooth
B. 802.11b
C. Infrared (IR)
C. 802.11g
D. Micro waves
D. 802.11n
206. A type of fiber optic cable that has a
201. *The ability of increased and expand the larger fiber core capable of carrying mul-
network tiple rays of light.
A. Mobility A. multi-mode
B. Flexibility B. dense fiber optic cable
C. Scalability/Expandability C. high bandwidth fiber
D. Probability D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 300

207. What frequency band does 802.11ac op- 212. Bluetooth is the wireless technology for
erate at?
A. 5.0 GHz A. Local Area Network
B. 2.4 GHz B. Personal Area Network
C. 5.4 GHz C. Metropolitan Area Network
D. 2.0 GHz D. Wide Area Network

NARAYAN CHANGDER
208. Which options describes a wireless net- 213. In 2007, announced its plan to trans-
work topology in which client devices com- mit its network to 4G standard LTE with
municate directly with each other without joint efforts of Vodafone group.
the use of an Access Point.
A. Verizon Wireless
A. IEEE 802.3af
B. AirTouch
B. Star topology
C. Netflix
C. Ad hoc mode
D. V Cast
D. IEEE 802.3
E. Infrastructure mode 214. What is the domain name?

209. Which organization is responsible for de- A. The domain name identifies the server
veloping LTE standards? that hosts the website.

A. UMTS B. The domain name identifies the coun-


try the server is based in.
B. 3GPP
C. Uniform resource locator.
C. 3GPP2
D. The IANA
D. ISO
215. In a piconet, there can be up to parked
210. Which modulation scheme is used by Blue-
nodes in the network.
tooth?
A. 63
A. DQPSK
B. MSK B. 127

C. GFSK C. 255

D. BPSK D. 511

211. what is the task of the DNS? 216. What is the name of a database used
mainly that stores information of a sub-
A. translate a domain name into the cor- scriber along with eligible services under
rect IP address roaming or another MSC area?
B. translate an IP address into a domain
A. HLR
name
B. VLR
C. Gives names to websites which aren’t
named C. EIR
D. Leaves websites alone D. AuC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 301

217. A popular category of twisted pair that 222. LEACH is a which type of protocol
supports speed up to 100 Mbps. A. Hierarchical

PRACTICE BOOK» NOT FOR SALE


A. category 5e B. Flat
B. category 5a C. All of the mentioned
C. category 6e D. None of them
D. none of above
223. Where are you most likely to find a peer-
218. An enclosure formed by conducting mate- to-per network? (1-4)
rial or by a mesh of such material. A. In a large office
A. Clean room B. In a large organisation
B. Faraday cage C. In a home
C. Radio Frequency Cage (RF Cage) D. Across several offices in a company
D. none of above
224. Why do devices need an IP address?
219. In a GSM architecture, which system pro- A. So the printer knows where we are
vides Authentication and Encryption ser- B. So we can use the computer
vices?
C. So we can use the network
A. HLR
D. So we can use the internet
B. VLR
C. EIR 225. Most networks are connect using cables.
What are the most common type of cables
D. AUC used in network?
220. Which one of these best describes a star A. Ethernet
topology? B. Internet
A. All devices are connected to a central C. Cablenet
switch.
D. none of above
B. All devices are connect to each other.
226. The input and output ports of a router
C. The computers are all connected to a
perform the layer functions of the
central printer.
router.
D. none of above
A. physical and data link
221. When would you use MAC filtering on B. network
your wireless network?
C. transport
A. You want to prevent your wireless net-
D. none of the above
work from appearing in a search list
B. You want to require encrypted commu- 227. What is a WAN?
nication on your wireless network A. Lots of LANS that are linked together
C. You want to restrict all Apple comput- that spans a large geographical distance.
ers from joining the wireless network B. Lot’s of pans that are linked together.
D. You want to prevent specific worksta- C. Something that covers a small geo-
tions from joining the wireless network graphical area

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 302

D. Lot’s of houses connected together 234. Two channels that do not overlap are
with electrical wire used together in an effort to double the
physical data rate.
228. What is a VPN?
A. Multiple Input Multiple Output
A. Virtual Planning Net
B. Dual channeling
B. Visual Procedure Network
C. channel bonding
C. Virtual Private Network
D. none of above
D. Visual Private Net

NARAYAN CHANGDER
229. Bluetooth standard is named after 235. Which network hardware component
must each device have to connect to a net-
A. King Ronaldo Bluetooth work? The component is usually build into
B. Pope Vincent Bluetooth the device.
C. King Herald Bluetooth A. A router
D. Pope Francis Bluetooth B. An Ethernet cable
230. A scatternet can have maximum C. Network Interface Card (NIC)
A. 10 piconets D. none of above
B. 20 piconets 236. Which one of the following wireless
C. 30 piconets transmission types does NOT require a
D. 40 piconets clear LOS to function?
A. Satellite
231. Also known as STA
B. Infrared
A. Access point
C. Wi-Fi
B. Client
C. Wireless Bridge D. WiMAX

D. Antenna 237. Choose the appropriate wireless bound-


aries”Burt uses a wireless Bluetooth head-
232. How do wired networks connect to other
set to listen to music from his MP3
devices?
player‘’
A. Radio frequencies
A. WPAN
B. Microwave signals
B. WLAN
C. Ethernet cables
C. WWAN
D. Barbed wire
D. WMAN
233. Choose the appropriate wireless bound-
aries”Trishna uses her laptop computer at 238. The information to be communicated in a
a wireless Hot Spot to check her email‘’ data communications system is the
A. WPAN A. Medium
B. WLAN B. Protocol
C. WWAN C. Message
D. WMAN D. Transmission

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 303

239. Which technologies are used by 802.11ac 244. What is the minimum number of devices
to increase network bandwidth? (choose required for a functioning network?
TWO)

PRACTICE BOOK» NOT FOR SALE


A. 1
A. 8 MIMO streams
B. 2
B. 40 MHz bonded channels
C. 10
C. 160 MHz bonded channels
D. 20
D. 4 MIMO strream

240. What is the correct name given to the ca- 245. Which of these is NOT a valid MAC Ad-
ble that can be used to network computers dress?
together? A. gf:98:a1:h5:k4:89
A. VGA B. d5.cf.1e.ef.af.4d
B. HDMI
C. AA:AA:AA:AA:AA:AA
C. Ethernet
D. ab:ab:ab:ab:ab:ab
D. USB
246. Why is packet switching efficient?
241. What is a node?
A. Small packets travel faster
A. A computer
B. A server B. Some cables cannot handle larger
packets
C. A peripheral
C. Each packet is sent down the fastest
D. A tablet or smartphone
route at that time
E. Any device connected to the network
D. none of above
242. MIMO was initially developed in the year
247. Which of these is the correct definition of
A. 1980
a router? (1-4)
B. 1990
A. Forwards data packets along a net-
C. 1985 work
D. 1975 B. Corrects errors that are found in data
packets
243. You’ve just completed a survey of the
wireless signals traversing the airspace in C. A server within a network
your employer’s vicinity, and you’ve found
D. A type of transmission media that pro-
an unauthorized AP with a very strong sig-
vides the greatest bandwidth
nal near the middle of the 100-acre cam-
pus. What kind of threat do you need to
248. What is the nominal range of Bluetooth?
report to your boss?
A. Rogue access point A. 1 Km

B. War driving B. 10 m
C. Bluesnarfing C. 1 m
D. Hidden node D. 10 Km

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 304

249. What are the three main parts of a GSM C. 2.4 GHz
Architecture or Structure? D. 5.75 GHz
A. Mobile Station
254. *Which statement is FALSE about wire-
B. BSS-Base Station Subsystem less networks?
C. NSS-Network and Switching Subsys- A. *A. Wireless networks are convenient.
tem
B. *B. Wireless networks are slower
D. All the above than wired LANs.

NARAYAN CHANGDER
250. What network has the server placed in C. *C. Wireless networks use radio trans-
the centre and the devices around it? mitters.
A. Ring D. *D. Wireless networks are faster than
wired networks
B. Bus
C. Star 255. A operates in both the physical and
the data link layer.
D. Mesh
A. router
251. You just settled in for some study time B. bridge
at the local coffee shop, and you pause
long enough to connect your computer to C. repeater
the Wi-Fi so you can listen to some music D. passive hub
while you study. As you’re about to sign
in, you realize you clicked on an SSID called 256. SSID is an abbreviation of:
“Free Coffee and Internet.” What kind of A. See Set Identity
security trap did you almost fall for? B. Set submission Identification
A. Guest network C. nothing
B. Bluejacking D. Service Set Identifier
C. Evil twin
257. Which of these would be the best way to
D. Brute force attack enable manual IP addressing on a SOHO
network?
252. Which of these best describes a wide
area network (WAN)? A. Create a pool of IP address in the wire-
less router
A. A network that covers a small geo-
graphical area. B. Disable DHCP on the wireless router
B. A network that covers a large geo- C. Build a separate DMZ network for all
graphical area. servers
C. A network limited to just one room. D. Configure each device to be in a differ-
ent VLAN
D. none of above
258. Which of the following best describes a
253. What is the frequency of 802.11a net- wide area network?
working?
A. Devices connected together over a
A. 900 MHz small geographical location such as a
B. 1.2 GHz building. These are connected using

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 305

wired (Ethernet) or wireless (WiFi) tech- C. Wi-Fi


nologies. D. none of above

PRACTICE BOOK» NOT FOR SALE


B. Local area networks connected to-
gether in different geographical locations. 263. BLE uses band
These are connected using telephone A. 2.4 GHZ
lines, satellite or radio links. B. 3
C. Devices connected together in differ- C. 5.2
ent geographical locations. These are
D. NONE OF THE ABOVE
connected using telephone lines, satellite
or radio links. 264. The shape of the cellular region for max-
D. Local area networks connected to- imum radio coverage is
gether over a small geographical location A. Circular
such as a building. These are connected B. Square
using wired (Ethernet) or wireless (WiFi)
technologies. C. Oval
D. Hexagon
259. What is a Virtual Network?
A. A smaller private network that is part 265. How would you configure two APs con-
of a larger physical network nected to the same wired network, so that
clients can connect to either AP and have
B. Two or more physical networks con- the ability to roam between them?
nected without cables
A. Same SSID, different channel
C. A network that lets you access another
B. Different SSID, same channel
network from a remote location
C. Different SSID, different channel
D. All of the above
D. Same SSID, same channel
260. A wiring color scheme.
266. Which network requires speciailist soft-
A. 568A ware to run?
B. 567A A. Client server network
C. 893B B. Peer to peer network
D. none of above C. Both client server and peer to peer
261. Which switching method offers a a dedi- D. none of above
cated transmission channel?
267. Which of the following would be the best
A. Packet switching reason not to use WPS on your wireless
B. Circuit switching router?
C. Virtual-circuit packet switching: A. The WPS process contains a crypto-
graphic vulnerability
D. Datagram packet switching:
B. WPS is only available for Windows de-
262. A common wireless access mode that vices
uses a wireless access point. C. The WPS process is too complex for
A. infrastructure mode most people
B. WAP D. It’s easy to brute force the WPS PIN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 306

268. Which frequencies are defined by 802.11 273. Which of the following is not a character-
for wireless networking? (choose TWO) istic of 3G network?
A. 2.4 GHz A. Communication over VoIP
B. 5.75 GHz B. Unparalleled network capacity
C. 900 MHz C. Multi-megabit Internet access
D. 1.9 GHz D. LTE based network
274. Choose the appropriate wireless bound-

NARAYAN CHANGDER
269. Which of these statements about Clients
and Servers is FALSE? aries”Ron uses his cell phone to view a
web page on the internet‘’
A. Servers sometimes have a ‘failover’
partner as a backup. A. WPAN
B. Servers can authenticate log-ins B. WLAN
C. Clients usually have more storage C. WWAN
space than servers D. WMAN
D. Clients can use software running on 275. Which of these statements about the ad-
servers vantages of networks, are true? (1-4)
270. Which of the following is not a standard A. They enable data to be shared be-
of 3G? tween different users and devices
A. UMTS B. Sending data via a network ensures
that it is safe from viruses
B. Cdma2000
C. Organisations can save money on buy-
C. TD-SCDMA
ing peripherals, as devices can be shared
D. LTE on a network
271. HIPER-LAN stands for D. No additional staff / equipment is
needed
A. High Precision Radio Local Area Net-
work 276. Which network has no centralised man-
B. High Performance Radio Local Area agement of the network, meaning that all
Network devices need their updates and security in-
stalled individually?
C. High Precision Radio Land Area Net-
A. Client server network
work
B. Peer to peer network
D. Huge Performance Radio Link Access
Node C. Both client server and peer to peer
D. none of above
272. Why does the wire inside an Ethernet ca-
ble need to be twisted? 277. Which of the following best describes a
A. To make the inside look nicer local area network?
B. To reduce the chance of interference A. Devices connected together over a
small geographical location such as a
C. To allow the light to travel through building. These are connected using
more quickly wired (Ethernet) or wireless (WiFi) tech-
D. To increase the cost of the cables nologies.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 307

B. Local area networks connected to- “Free Coffee and Internet.” What kind of
gether in different geographical locations. security trap did you almost fall for?
These are connected using telephone

PRACTICE BOOK» NOT FOR SALE


A. Guest network
lines, satellite or radio links.
B. Bluejacking
C. Devices connected together in differ-
ent geographical locations. These are C. Evil twin
connected using telephone lines, satellite D. Brute force attack
or radio links.
282. Choose the appropriate wireless bound-
D. Local area networks connected to- aries’Jim connects to the wireless network
gether over a small geographical location at his school to do research on a new tech-
such as a building. These are connected nology”
using wired (Ethernet) or wireless (WiFi)
A. WPAN
technologies.
B. WLAN
278. Which of the following is an application
C. WWAN
layer service?
D. WMAN
A. File transfer and access
B. Mail service 283. Which of the following are characteris-
tic features of the 802.11b wireless stan-
C. Remote log-in dard?
D. All the above A. Carrier Sense Multiple Access/Collision
Detection
279. Provides anywhere, any time connectiv-
ity B. 2.4 GHz frequency range

A. Mobility C. Maximum data signaling rate of 11


Mbps
B. Flexibility
D. 5.0 GHz frequency range
C. Scalability
E. Maximum data signaling rate of 54
D. Probability Mbps
280. i have a small business with 5 desktops 284. Which of the following scheme is used by
on one floor what would be the best op- Bluetooth?
tion to use for my network A. Frequency hopping TDD scheme
A. wired B. Frequency hopping FDD scheme
B. wireless C. DSSS TDD scheme
C. mobile D. DSSS FDD scheme
D. none of above
285. Used to connect to a wireless access
281. You just settled in for some study time at point.
the local coffee shop, and you pause long A. wireless network adapter
enough to connect your smartphone to the B. router
Wi-Fi so you can listen to some music while
you study. As you’re about to sign in, you C. proxy server
realize that you clicked on an SSID called D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 308

286. What does WiFi mean? B. reliable


A. Wireless Fidelity C. both a and b
B. A trademarked term meaning IEEE D. none of the above
802.11x
292. A wireless device used to extend the cov-
C. Wireless Frequency
erage of a wireless network.
D. All of the above
A. wireless extender

NARAYAN CHANGDER
287. *This is the smallest wireless network B. wireless repeater
used to connect various peripheral devices
C. repeater router
such as mice, keyboards and PDAs to a
computer. All of these devices are dedi- D. none of above
cated to a single host with usually use IR
293. A mechanism used to identify wireless
or Bluetooth technology.
networks.
A. WPAN
A. service set identifier
B. WLAN
B. network name
C. WWAN
C. Network Identifier (NID)
D. WMAN
D. none of above
288. How is data sent to and from a WAP?
294. Which of these are NOT protocols?
A. Tidalwaves
A. ITMAP
B. Microwaves
B. POP
C. Radiowaves
C. HTTPS
D. Babywaves
D. FTP
289. What technology does Bluetooth use to
take advantage of the 79 channels allo- 295. Which network has no dependence on a
cated to the Bluetooth band? server in order to access files, programs
and other resources?
A. ZigBee
A. Client server network
B. DSSS
B. Peer to peer network
C. RTS/CTS
C. Both client server and peer to peer
D. FHSS
D. none of above
290. what does LAN stand for
A. local antenna network 296. What is a Network Interface card?

B. local area network A. It connects your computer to a com-


puter network
C. local airforce network
B. It provides a better connection to your
D. local air network provider
291. The Internetworking Protocol (IP) is a C. Makes the computer a stand-alone
protocol. computer
A. connection-oriented D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 309

297. MSC Consists of 303. Which term describes a set of rules that
A. HLR computers on a network use to communi-
cate with one another?

PRACTICE BOOK» NOT FOR SALE


B. VLR
A. Method
C. SIM
D. EIR B. Protocol
C. Instruction
298. standards support which type of commu-
nication path sharing technology? D. Conduct
A. CSMA/CD
304. An interference that can come from
B. CSMA/CA AM/FM transmissions and cell phone tow-
C. Token-passing ers.
D. Polling A. electromagnetic crosstalk
299. Which network can become overloaded B. radio effect
and slow down if too many users are ac- C. radio frequency interference
cessing the server at once?
D. none of above
A. Client server network
B. Peer to peer network 305. Question 2:Which of these is a character-
C. Both client server and peer to peer istic of a LAN?
D. none of above A. It covers a wide geographical area

300. The cornerstone of any wireless network B. Computers are connected together us-
is: ing a leased line or a satellite
A. Broadcast point C. Users can share files and peripherals
B. Computer point D. Data can only be transmitted at a very
C. An access point slow rate

D. Transmission point 306. Which network stops all users from being
301. When data are transmitted from device able to login if the main server breaks?
A to device B, the header from A’s layer 4 A. Client server network
is read by B’s layer.
B. Peer to peer network
A. Transport
C. Both client server and peer to peer
B. Application
D. none of above
C. Physical
D. None of the above 307. Which of the following would not be in-
cluded in a data packet?
302. It is considered to be more than one BSS:
A. Source IP address
A. Ad hoc
B. BSS B. Destination address
C. ESS C. MAC address
D. SSID D. Error Checking

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 310

308. A degradation of signal as it travels. 313. What is the lowest layer of the OSI
model at which wired and wireless trans-
A. attenuation
missions share the same protocols?
B. degradation
A. Layer 1
C. packet loss
B. Layer 2
D. none of above
C. Layer 3
309. What is the host name part of D. Layer 4

NARAYAN CHANGDER
http://www.google.com?
A. http 314. A is a device that operates only in the
physical layer.
B. www
A. bridge
C. google
B. router
D. .com
C. passive hub
310. What frequencies does Wi-Fi use in the D. repeater
UK?
A. 2.4GHz, 5GHz and 9GHz 315. What is the term used by ITU for a set of
global standards of 3G systems?
B. 2.6GHz, 3.9GHz an
A. IMT 2000
C. 1.2GHz and 5GHz
B. GSM
D. 2.4GHz and 5GHz
C. CDMA
311. broadcasts packets, but creates loops D. EDGE
in the systems.
A. Forwarding 316. Bluetooth operates in which band?
B. Flooding A. Ka Band
C. Backwarding B. L Band
D. none of the above C. Ku Band
D. 2.4 GHz ISM Band
312. Which of the following is not a character-
istic of the 802.11n wireless standard? 317. Which of the following statements is
A. Multiple Input/Multiple Output true?
(MIMO) A. The Internet consists of millions of
B. Operates at both the 2.4 and 5.0 GHz web pages linked together.
ranges B. The Internet is a web page created by
C. Maximum data signaling rate of up to a business.
600 Mbps
C. The WWW consists of millions of web
D. All listed characteristics are correct. pages linked together.
E. At least one of the listed characteris- D. WWW is the unique identity of a web
tics is incorrect or incomplete. page.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 311

318. A connection provides a dedicated B. Peer to peer network


link between two devices.
C. Both client server and peer to peer

PRACTICE BOOK» NOT FOR SALE


A. primary
D. none of above
B. multipoint
C. point-to-point 324. What is a hub?
D. secondary A. It connects multiple ethernet devices
together, making them act as a single de-
319. A method that sends two or more frames vice
in a single transmission.
B. It sends data to all the computers.
A. frame aggregation
C. It allows the computers to run at a
B. multi-frame transmission faster clock speed
C. multiple input multiple output (MIMO) D. It increases the graphical perfor-
D. none of above mance of a computer

320. Encryption is? 325. Wireless Network is better than Wired


A. A secret code used to keep data safe Network in the following Aspects (Choose
All Correct Answers):
B. A key which is applied to data to scram-
ble it A. Security
C. A set of numbers used to replace let- B. Speed
ters in data that is transmitted
C. Mobility
D. A message that is kept secret
D. Flexibility
321. What wireless data encryption method is E. Scalability
the most secure?
A. WEP 326. Which of the following leads to evolution
of 3G networks in CDMA systems?
B. TKIP
A. IS-95
C. WAP
D. WPA B. IS-95B
C. CdmaOne
322. Is a wireless media that can penetrate
through walls and other obstacles, allow- D. Cdma2000
ing a much greater range
327. *Networks that provide coverage over
A. Radio Frequency (RF) extremely large areas. A good example of
B. Bluetooth a it is the cell phone network. These net-
C. Infrared (IR) works are often regulated by government
agencies.
D. Micro waves
A. WPAN
323. Which network is expensive to set up and
B. WLAN
requires IT specialists to maintain the net-
work and server? C. WWAN
A. Client server network D. WMAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 312

328. Which of the following is not a standard 333. Which network is easy to maintain
of WLAN? with no need for expensive hard-
ware/software to set up.
A. HIPER-LAN
A. Client server network
B. HIPERLAN/2
B. Peer to peer network
C. IEEE 802.11b
C. Both client server and peer to peer
D. AMPS
D. none of above

NARAYAN CHANGDER
329. *CBT 2019Which wireless network topol-
ogy allows two laptops to communicate 334. Which of these servers would probably
without using a wireless access point or NOT be found in a school LAN?
router? A. Proxy server
A. *AD hoc mode B. File server
B. *Single point Network C. Print server
C. *Virtual Private Network D. Web server
D. *Infrastructure mode
335. Which of the following factors can affect
330. A is a set of rules that governs data the performance of wireless connections?
communication. A. Range (The distance the device is away
A. protocol from the router)
B. forum B. Interference from other devices
C. standard C. Physical obstructions such as thick
walls.
D. none of the above
D. All of these factors
331. Which of these statements is TRUE about E. All of these factors except the range.
a LAN?
A. A LAN connects computers in a small 336. Disabling SSID broadcasts:
area such as an office or a small site A. Is one of the measures used in the pro-
B. A modem is needed to connect a com- cess of securing wireless networks.
puter to a LAN B. Makes a WLAN harder to discover
C. A LAN consists of only one computer C. Blocks access to a WAP
D. A LAN can connect geographically dis- D. Prevents wireless clients from access
tant sites together the network.

332. IEEE is an abbreviation of: 337. Which of the following is/are essential
A. The Institute of End Effort and Ethical components of a sensor node?

B. The Institute of Electrical and Electron- A. Sensing unit


ics Engineers B. Processing unit
C. - C. Transmitting unit
D. - D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 313

338. A is a data communication system B. Networking compatibility standards


within a building, plant, or campus, or be- C. 802 Wireless Standards
tween nearby buildings.

PRACTICE BOOK» NOT FOR SALE


D. none of above
A. LAN
344. A method that uses multiple antennas,
B. MAN
increasing the number of signals for in-
C. WAN creased bandwidth.
D. none of the above A. multiple input multiple output
339. A wiring color scheme more common than B. full duplex
the older 568A. C. multi antenna channeling
A. 568A D. none of above
B. 668A 345. What do you need to connect networks
C. 568B together?
D. none of above A. keyboard
B. client
340. WiFi uses:
C. printer
A. RD technology
D. router
B. RA technology
C. RP technology 346. An advantages of network is

D. RF technology A. Users can see each others areas


B. Servers may crash, so no work can be
341. Which of these is the correct explanation done
of bandwidth?
C. Users can share resources like print-
A. BANDWIDTH is the speed at which ers and files
data travels through a network
D. Viruses can spread easily
B. BANDWIDTH is the amount of data
that can be transmitted over a network in 347. Why are hubs not very efficient?
a given time A. Ethernet protocols are slower than IP
C. BANDWIDTH is the number of direc- B. Because witches use switches
tions that data can travel in C. There might be too many people
D. none of above logged on

342. What does PAN stand for? Is it: D. They transmit data on ALL ports

A. Personal Area Network 348. refers to a wireless connectivity tech-


nology used for monitoring sensor data col-
B. Private Area Network
lected from low-powered sports and fit-
C. Personal Access Network ness equipment.
D. Private Access Network A. CAN
343. A standard used to ensure compatibility B. WTLS
between devices. C. UAV
A. IEEE 802.11 D. ANT+

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 314

349. What is the role of a server on a client C. Mobile phone towers


server network? D. Fibre cables
A. To respond to requests from the
server. 354. Which of these is usually encoded in a
MAC address?
B. To send requests to the server for pro-
cessing. A. Manufacturer’s identification number

C. To process the requests on the net- B. X.509 SSL certificate

NARAYAN CHANGDER
work. C. Checksum of packet data
D. To process requests and respond to D. IEEE 802 network segment index
the client.
355. You can find a LAN at
350. A MAC address is A. School
A. The address of a device on the World B. Home
Wide Web
C. Starbucks
B. The address of a website or server
D. All of them
C. An identifier assigned to a particular
type of device on a network 356. The most common of all copper-based ca-
bles. Has eight wires; they are copper
D. A unique address assigned to a device
conductors that transmit electric signals.
on a network
These eight wires are grouped into four
351. What network covers a LARGE geograph- pairs.
ical area? A. straight through cable
A. LAN B. twisted-pair cable
B. WAN C. RJ-45
C. BAN D. none of above
D. KAN
357. A method in which a wireless bridge is
352. Which of the following describes highly used to connect different 802.11 stan-
directional antenna types used for long- dards.
range, point-to-point bridging links? A. mode switch
A. Yagi antenna B. 802X
B. Omnidirectional antenna C. bridge mode
C. Dipole antenna D. none of above
D. Dish antenna
358. CBT2019*Which IEEE standard covers the
E. Parabolic antenna implementation of wireless Personal Area
Network (PAN)?
353. Radio waves form a part of the elec-
tromagnetic (EMF) spectrum. What else A. 802.11
does? B. 802.03
A. Ordinary light C. 802.05
B. A light bulb D. 802.15

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 315

359. A type of wireless encryption used with 365. Which of these is FALSE?
WPA. A. Cloud storage is 100% free

PRACTICE BOOK» NOT FOR SALE


A. WPA-2 B. Cloud storage reduces the need to
B. RADIUS spend money on hardware
C. temporal key integrity protocol C. Cloud storage is a flexible way to in-
D. none of above crease and decrease your storage capac-
ity
360. WiMAX MAC layer provides an interface
D. Cloud storage removes the need to
between
take responsibility for backing up data
A. Higher transport layers and Physical
layer 366. Which network can apply user access lev-
els to different users?
B. Application layer and Network layer
C. Data link layer and Network layer A. Client server network

D. Session layer and Application layer B. Peer to peer network


C. Both client server and peer to peer
361. The strength of the signal from the mo-
bile phone tower is indicated by D. none of above
A. How big the tower is 367. Which option is a common antenna type
B. The number of bars on your phone used as standard equipment on most Ac-
cess Points (APs) for indoor Wireless Local
C. Where the tower is located
Area Network (WLAN) deployments?
D. The size of your phone
A. Omnidirectional antenna
362. MIMO stands for B. Dish antenna
A. Many input many output C. Unidirectional antenna
B. Multiple input multiple output D. Yagi antenna
C. Major input minor output
368. A type of wireless repeater that connects
D. Minor input minor output different 802.11 standards.
363. Which one of the following wireless A. wireless bridge
transmission types requires a clear LOS to B. wireless repeater
function?
C. wireless extender
A. Bluetooth
D. none of above
B. NFC
C. Infrared 369. What are the characteristic features of
WPA/WPA2 Enterprise mode?
D. Wi-Fi
A. Suitable for large corporate networks
364. What does “NIC” stand for?
B. Does not require an authentication
A. Network Interface Controller server
B. National Internal Communication C. Suitable for all types of wireless LANs
C. Network Interface Communication D. Requires RADIUS authentication
D. Native Interface Communication server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 316

370. Cable television is an example of 376. What is the channel bandwidth of the
A. TDMA IEEE 802.11a standard?
B. FDMA A. 20 MHz
C. CDMA B. 22 MHz
D. SDMA C. 40 MHz
371. Which of these best describes a local area D. 80 MHz
network (LAN)?

NARAYAN CHANGDER
A. A network that covers a small geo- 377. Which network will store all user profiles,
graphical area. paswords and access information in one lo-
B. A network that covers a large geo- cation?
graphical area. A. Client server network
C. A network connected to another net- B. Peer to peer network
work.
C. Both client server and peer to peer
D. none of above
D. none of above
372. *The signal loss its strength because of:
A. Switch 378. Which protocol is responsible for send-
B. Repeater ing/receiving packets on the internet?
C. Interference with other waves A. Http
D. none of above B. Ftp
373. Which 802.11 standard can be used in C. IMAP
both the 2.4-GHz and the 5-GHz bands?
D. TCP/IP
A. 802.11g
B. 802.11n 379. Which antenna would you select to dis-
C. 802.11b perse the radio signals evenly in a 360-
degree pattern?
D. 802.11a
A. Directional
374. Which is a factor in poor network perfor-
mance? B. Omni-directional
A. The number of users C. Multi-directional
B. Standalone machines D. Uni-directional
C. A high network bandwidth
D. A switched off PC 380. IEEE 802.11g is backwards compatible
with which other 802.11 standard(s)?
375. A DNS server
A. 802.11n
A. Is another name for a router
B. 802.11a
B. Is the central server on a typical LAN
C. Looks up IP addresses from URLs C. 802.11b
D. Organises data in packets D. 802.11ac

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 317

381. What best describes an intrusion detec- C. BBOG


tion system? D. none of above

PRACTICE BOOK» NOT FOR SALE


A. It is configured not to respond to
PINGs. 387. A wireless encryption protocol used with
WPA2.
B. It sets a negative option for IPCON-
FIG. A. RADIUS
C. It logs packets for unused ports. B. Secure Shell Encryption Standard
D. It runs a file integrity check. C. Advanced Encryption Standard
D. none of above
382. WiMAX uses the
A. Orthogonal Frequency Division Multi- 388. What does a switch do?
plexing A. Directs data from the server to a com-
B. Time Division Multiplexing puter and vice versa
C. Space Division Multiplexing B. Directs data from the computers and
tablets
D. Channel Division Multiplexing
C. Directs software to the server
383. ‘Witches use switches’ helps us to re-
D. Allows computers to connect to the
member that
main tablet
A. Switches forward data ‘intelligently’
389. “The world’s largest computer network
B. Switches work by magic and spells
which connects millions of computer all
C. Switches are efficient, but not as much over the world.” This is the definition for
as hubs
D. Switches use CAT5 Ethernet and A. Communication
witches usually have a cat
B. Network
384. What does VPN stand for? C. Internet
A. Virtual Private Network D. World Wide Web
B. Virtual Personal Network
390. A type of fiber optic table that is meant
C. Virtually Private Network to carry a single ray of light.
D. Virtually Personal Network A. Single Photon Transmission (SPT)
385. Which layer splits data into packets? B. half-duplex
A. Transport Layer C. single mode
B. Application Layer D. none of above
C. Network Layer 391. Which transmission media is capable of
D. Link Layer having a much higher bandwidth? (6-9)

386. A wiring color scheme based on blue, or- A. Plastic


ange, green, and brown. B. Twisted pair cable
A. BGOB C. Fibre optic
B. BOGB D. Coaxial

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 WIRELESS NETWORKS 318

392. when two nodes that are outside 394. Each Mobile Terminal is identified by a
each other’s range performs simultaneous unique number?
transmission to a node that is within the A. IMEI
range of each of them resulting in a colli-
sion. That means the data from both par- B. SIM
ties A and C will be lost during the colli- C. IMSI
sion.know as D. None
A. Hidden terminal

NARAYAN CHANGDER
395. What is 3GPP?
B. Exposed terminal
A. Project based on W-CDMA
C. Both a and b B. Project based on cdma2000
D. None of the above C. Project based on 2G standards
393. A type of cable that transmits light (pho- D. Project based on 2.5G standards
tons) instead of electricity, and this light
396. Which of the following wireless network
is transmitted over glass or plastic.
topologies contain an access point?
A. coax cable A. Peer-to-Peer topology
B. photon transmission cable B. Ring topology
C. fiber optic cable C. Infrastructure topology
D. none of above D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
7. Physical Layer and Transmission
Media

7.1 Introduction
1. Data transmission can transmit data like B. Signalling
A. text, audio C. Data
B. images, video D. Physical Components
C. both a and b
5. What is the major factor that makes coax-
D. none of above ial cable less susceptible to noise than
twisted-pair?
2. When do you use cross over cable? Select
more than 1 answer. A. inner conductor
A. Connect Switch to Router B. diameter of the cable
B. Connect Switch to Switch C. outer conductor
C. Connect Router to Router D. insulating material
D. Connect Host to Host 6. The physical layer is responsible for
3. Transmission type which transmits data A. line coding
one character at a time, with the sender B. channel coding
and receiver not synchronized with each
other is termed as C. modulation
A. synchronous D. all of the mentioned
B. ethernet 7. TCP/IP standards are implemented in the
C. asynchronous software and governed by (a)
D. internet A. IEEE
B. IANA
4. Physical Layer standards address which 3
functional areas? C. IETF
A. Encoding D. ISI

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 320

8. At the lower end of the electromagnetic A. Simplex


spectrum we have
B. Half-duplex
A. radio waves
C. Full duplex
B. power and voice
D. All of above
C. ultraviolet light
D. infrared light 13. Telephone is an example of
A. Half Duplex

NARAYAN CHANGDER
9. The following are correct statement, EX-
CEPT B. Full Duplex
A. In a copper-based network, the bits in C. Simplex
the form of electrical signals.
D. a and b
B. Transmission media is a communica-
tion channel that carries the information 14. Microwaves are
from the sender to the receiver.
A. omnidirectional
C. Transmission media can be a com-
puter, server, tablet, and mobile phone. B. Unidirectional
D. In a fiber-based network, the bits in C. Bidirectional
the form of light pulses.
D. None of the above
10. It is also known as unbounded otherwise
wireless transmission media. It doesn’t 15. The physical layer is concerned with
require any physical medium to transmit A. bit-by-bit delivery
electromagnetic signals.
B. process to process delivery
A. Transmission Media
C. application to application delivery
B. Guided Media
D. port to port delivery
C. Unguided Media
D. Wired network media 16. In an optical fiber, the inner core is the
cladding.
11. What is the definition of a bandwidth?
A. more dense than
A. the speed at which bits travel on the
network B. less dense than
B. the amount of data that can flow from C. me density as
one place to another in a given amount of
time D. another name for

C. the measure of usable data trans- 17. Radio communication frequencies range
ferred over a given period of time from
D. the speed of bits across the media A. 3 kHz to 300 kHz
over a given period of time
B. 300 kHz to 3 GHz
12. Which data communication method is used
C. 3 KHz to 300 GHz
to transmit the data over a serial commu-
nication link? D. 3 KHz to 3000 GHz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 321

18. Which of the following is not a guided C. roughness of connecting fiber faces
medium?
D. all of the choices

PRACTICE BOOK» NOT FOR SALE


A. twisted-pair cable
B. coaxial cable 23. Select 3 examples of encoding methods

C. fiber-optic cable A. Manchester encoding


D. atmosphere B. 8B/10B

19. A network administrator is troubleshoot- C. 4B/5B


ing connectivity issues on a server. Using D. 11B/12B
a tester, the administrator notices that the
signals generated by the server NIC are 24. The physical layer provides
distorted and not usable. In which layer of A. mechanical specifications of electrical
the OSI model is the error categorized? connectors and cables
A. data link layer
B. electrical specification of transmission
B. network layer line signal level
C. presentation layer C. specification for IR over optical fiber
D. physical layer D. all of the mentioned
20. Which fo the following wireless standards
is used for Personal Area Neworks (PANs) 25. The modulation techniques used to convert
and allow devices to communicate over dis- analog signal into digital signal are
tances of 1-100 meters? A. a.Pulse code modulation
A. Zigbee B. b.Delta modulation
B. WiMAX C. c.Amplitude modulation
C. Wi-Fi D. Both a and b
D. Bluetooth
26. In transmission, bits are transmitted
21. When a beam of light travels through me- simultaneously, each across its own wire.
dia of two different densities, if the angle
of incidence is greater than the critical an- A. Asynchronous serial
gle, occurs B. Synchronous serial
A. reflection C. Parallel
B. refraction D. (a) and (b)
C. incidence
27. is a type of transmission impairment
D. criticism
in which outside source such as cross talk
22. When making connections in fiber optics, corrupt a signal
which of the following could contribute to A. Attentuation
signal distortion?
B. Noise
A. inner cores of connecting fibers angu-
larly or laterally misaligned C. Distortion
B. a gap between connecting inner cores D. Decibel

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 322

28. Using the Shannon formula to calculate the 33. (a) measures the amount of data that can
data rate for a given channel, if C = B, then flow from one place to another in a given
amount of time. i.e. bits/sec
A. the signal is less than the noise A. Bandwidth
B. the signal is less than the noise B. Latency
C. the signal is equal to the noise C. Throughput
D. not enough information is given to an- D. Goodput

NARAYAN CHANGDER
swer the question
34. Signaling method is how bit values, “1”
29. Which transmission media provides the and “0” are represented on the medium.
highest transmission speed in a network? It varies based on the type of medium used.
A. coaxial cable Which are the mediums?
A. Electrical Signal
B. twisted pair cable
B. Light Signal
C. optical fiber
C. Microwaves
D. electrical cable
D. Ultraviolet
30. Which of the following is not a Unguided
media? 35. What are some of the limitations of wire-
less media? Select more than 1 answer.
A. Radio Wave
A. Effective coverage depending on loca-
B. Micro Wave
tions
C. Satellite
B. Interference-microwave oven, fluores-
D. Infrared cent light
31. Which of the following are characteristics C. Security-anyone can gain access to the
of copper media? Select more than 1 an- transmission
swer. D. Shared medium-many users accessing
A. Cheap results in reduced bandwidth
B. Easy to install E. Safer than UTP cable
C. Limited in distance 36. Which procedure is used to reduce the ef-
D. Cannot be affected by interference fect of crosstalk in copper cables?
A. wrapping the bundle of wires with
32. The Physical layer standards are imple- metallic shielding
mented in hardware and are governed
by many organizations such as Select B. requiring proper grounding connec-
more than 1 from the options. tions
A. ISO C. avoiding sharp bends during installa-
tion
B. EIA/TIA
D. designing a cable infrastructure to
C. ITU-T avoid crosstalk interference
D. ANSI E. twisting opposing circuit wire pairs to-
E. IEEE gether

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 323

37. Twisting in a twisted-pair help reduce the 42. The method of communication in which
transaction takes place in both directions,
but only in one direction at a time, is

PRACTICE BOOK» NOT FOR SALE


A. length
called?
B. cost
A. Simplex
C. noise
B. Four wire circuit
D. None of the choices are correct
C. Full duplex
38. What is the minimum sampling rate re- D. Half-duplex
quired in order to recovered the informa-
tion signal? 43. cable consists of an inner copper core
and a second conducting outer sheath.
A. The sampling rate must be at least the
same as the highest frequency of the in- A. Twisted-pair
telligence signal. B. Shielded twisted-pair
B. The sampling rate must be at least 2 C. Coaxial
times the highest frequency of the intelli-
D. Fiber-optic
gence signal.
C. The sampling rate must be at least 1.5 44. the frequency of the analog carrier signal
times the highest frequency of the intelli- is varied proportional to the digital infor-
gence signal. mation signal.
D. The sampling rate must be at least 3 A. ASK
times the highest frequency of the intelli- B. PSK
gence signal.
C. FSK
39. What is a characteristic of UTP cabling? D. MSK
A. cancellation
45. A signal is measured at two different
B. woven copper braid or metallic foil points. The power is P1 at point first point,
C. cladding and power is P2 at second point. The dB
is zero means
D. immunity to electrical hazards
A. P2 is zero
40. Bandwidth is typically measured in B. P2 equal to P1
A. Bits per second C. P2 larger than P1
B. Bits per miliseconds D. P2 smaller than P1
C. Bytes per second
46. What do you understand by Network In-
D. Total no. of bytes terface Card (NIC)
41. multiple links on 1 physical line A. It is a hardware component that con-
nects a device to the network
A. Multiplexing
B. It is a card that stores interface data
B. Demultiplexing related to the network
C. Carrier C. Some devices can have more than 1
D. Synchronous NIC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 324

D. Some devices may have just one NIC, C. fiber-optic


while others may have multiple NICs
D. none of above
E. Can support wired and/or wireless
connections 52. IEEE 802.11 is the standard for

47. In fiber optics, the signal source is A. WiFi


waves. B. Bluetooth
A. light C. Cable

NARAYAN CHANGDER
B. LED
D. WiMax
C. radio
D. infrared 53. Which transmission media has the highest
transmission speed in a network?
48. are used for cellular phone, satellite,
A. coaxial cable
and wireless LAN communication.
B. twisted pair cable
A. Radio Waves
B. Micro Waves C. optical fiber

C. Infrared waves D. electrical cable


D. All the above 54. Radio waves, micro-waves and infrared
waves are types of
49. Video broadcasting uses transmission
A. Asynchronous A. wireless transmission

B. Synchronous B. guided transmission


C. Isochronous C. both a and b
D. None of the above D. None

50. What are TRUE about the Physical Layer? 55. In an environment with many high-voltage
Select 3 from the options. devices, the best transmission medium
A. Accepts frame from the Data Link layer would be
and encodes it as a series of signals to A. twisted-pair cable
transmit
B. coaxial cable
B. Transports bits across the network me-
dia C. optical fiber
C. It is the 2nd layer in the OSI reference D. the atmosphere
model
56. What are the three different types of mul-
D. It is the 1st layer in the OSI reference
tiplexing?
model
A. TDMA, FDMA, CDMA
51. Which media uses patterns of light to rep-
resent bits? B. TDAM, FDMA, SDMA
A. copper C. TDD, FDMA, CDMA
B. wireless D. FDD, TDD, TDMA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 325

57. A group of newly hired entry-level net- A. amplitude


work engineers are talking about the net- B. frequency
work cabling they are going to have to in-

PRACTICE BOOK» NOT FOR SALE


stall as a team. What is a characteristic of C. power
Ethernet straight-through UTP cable? D. bandwidth
A. It can only use the T568A standard at 62. are the highest frequency electromag-
both ends of the cable. netic waves in use for data communica-
B. It can be used to connect two network tions
hosts. A. visible light waves
C. It is Cisco proprietary. B. cosmic rays
D. It is susceptible to interferences from C. radio waves
EMI and RFI.
D. gamma rays
58. Which is TRUE about Transmission Me- 63. Transmission media belongs to which
dia? layer?
A. Transmission media is a communica- A. Physical
tion channel that carries the information
from the sender to the receiver. B. Network

B. Data is transmitted through electro- C. Transport


magnetic signals. D. Application
C. It is a physical path between transmit- 64. Term that refers to loss of strength of a
ter and receiver in data communication. signal is called
D. All of the above A. attenuation
59. Type of computer data transmission in B. distortion
which start/stop transmission bits are not C. Noise
required is termed as
D. Impairments
A. synchronous
65. The sample and hold circuit generates
B. pulse waveform.
C. asynchronous A. PAM
D. intermittent B. FM
60. Which type of network cable is commonly C. PCM
used in backbone networks and telephone D. AM
companies?
66. Which of the following measurements in-
A. Coaxial cable
cludes any latency encountered during
B. Fiber-optic cable data transmissions?
C. Twisted-pair cable A. Throughput
D. Shielded twisted-pair cable B. Bandwidth
61. The radio communication spectrum is di- C. Data rate
vided into bands based on D. Speed

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 326

67. In fiber optics, the signal is waves. B. Because UTP counters Crosstalk by
A. light twisting and placing the cables close to-
gether
B. radio
C. None of them
C. infrared
D. none of above
D. very low frequency
73. Why are two strands of fiber used for sin-
68. (a) converts the stream of bits into a for- gle fiber optic connection?

NARAYAN CHANGDER
mat that can be recognized by the next de- A. The two strands allow the data to
vice in the network path. travel for longer distances without de-
A. Encoding grading.
B. Encapsulation B. They increase the speed at which the
data can travel.
C. De-Encapsulation
C. They prevent crosstalk from causing
D. Decoding interference on the connection.
69. Channel capacity unit is: D. They allow for full-duplex connectivity.
A. bit / symbol 74. This kind of transmission media is also
B. symbol / bit known as wired otherwise bounded me-
dia.
C. bit / sec
A. Transmission Media
D. sec / bit
B. Guided Media
70. Which of the following is an advantage to C. Wireless network media
using fiber optics data transmission?
D. Unguided Media
A. resistance to data theft
75. Which of the following is NOT a feature of
B. fast data transmission rate Guided Media?
C. low noise level A. High Speed
D. all of above B. Secure
71. are used for cellular phone, satellite, C. Used for comparatively shorter dis-
and wireless LAN communications.A) B) In- tances.
frared waves D. The signal is broadcasted through air
A. Radio waves 76. Transmission media directly controlled by
B. Infrared waves A. Physical Layer
C. Microwaves B. Data Link Layer
D. none of the above C. Transport Layer
72. Why UTP cable does not use shielding to D. Network Layer
counter the effects of EMI and RFI? 77. Which type of cable connection would be
A. Because UTP cable is auto immune to used in Packet Tracer to connect a FastEth-
EMI and RFI. ernet port on a PC to a switch port?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 327

A. Console cable 83. Which of the following are standards of


B. Crossover cable UTP Cabling? Select more than 1 answer.

PRACTICE BOOK» NOT FOR SALE


C. Fiber A. CAT 3
D. Straight-through cable B. CAT 4
78. Guide media provide the connection from C. CAT 5 & 5e
one device to another device through
D. CAT 6
A. Twisted Pair
E. CAT 7
B. Fiber Optic
C. Coaxial Cable 84. Bits can be send over guided and unguided
D. All of above media as analog signal by
A. digital modulation
79. Wireless transmission of signals can be
done via B. amplitude modulation
A. radio waves C. frequency modulation
B. microwaves D. phase modulation
C. infrared
D. all of the mentioned 85. Which of the following is not a transmis-
sion medium?
80. What is the main functionality of the trans-
mission media? A. telephone lines

A. It determines the characteristics of B. coaxial cables


medium and signal. C. modem
B. To carry the information in the form of
D. microwave systems
bits.
C. It supports the physical layer. 86. Which fo the following wireless standards
D. It carries the data from the transmit- is best suited for industrial and IoT envi-
ter to the receiver. ronments?

81. Before data can be trasmistted they must A. Zigbee


be transformed to B. WiMAX
A. Periodic signal C. Wi-Fi
B. electromagnetic signal
D. Bluetooth
C. Low frequency sine waves
D. None of these 87. What type of cable is used to connect a
workstation serial port to a Cisco router
82. Transmission media are usually catego- console port?
rized as
A. rollover
A. fixed or unfixed
B. guided or unguided B. crossover
C. determinate or indeterminate C. straight-through
D. metallic or non-metallic D. coaxial

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 328

88. Which of these is the name for the capacity 93. Which of the following are properties of
of a medium to carry data? Fiber-Optic cabling? Select more than 1
option.
A. bandwidth
A. More expensive than UTP cable
B. throughput
B. Transmit over longer distance at
C. goodput amount of time, including de-
higher bandwidth
lays, for data to travel from one given
point to another. measure of the trans- C. Less susceptible to attenuation

NARAYAN CHANGDER
fer of bits across the media over a given D. Immune to RFI, EMI
period of time. measure of usable data
transferred over a given period of time E. Use electrical signal to transmit data
D. none of above 94. Which of the following primarily uses
guided media?
89. What does UTP stands for?
A. cellular telephone system
A. Unshielded Twisted pair
B. local telephone system
B. Uniformly twisted pair
C. satellite communications
C. Unshielded Connecter pair
D. radio broadcasting
D. None
95. The physical layer translates logical com-
90. Which of the following performs modula- munication requests from the into
tion and demodulation? hardware specific operations.
A. fiber optics A. network layer
B. switch B. data link layer
C. modulator C. transport layer
D. modem D. application layer

91. When we talk about unguided media, usu- 96. The following are the factors you need to
ally we are referring to consider in selecting the right type of me-
A. metallic wires dia, EXCEPT

B. nonmetallic wires A. Required throughput

C. the atmosphere B. Cabling Distance

D. optical fibers C. Noise Resistance


D. SIgnal
92. Sampling is a process in which of con-
tinuous time signal is measured at discrete 97. Which media uses electrical pulses to rep-
instants. resent bits?
A. frequency A. copper
B. wavelength B. wireless
C. amplitude C. fiber-optic
D. phase D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 329

98. Which of the following to be considered as 103. In electromagnetic spectrum for wireless
a broadband communication? communication, reserved range for Radio
waves and microwaves is known as

PRACTICE BOOK» NOT FOR SALE


A. Fiber optics
A. ground propagation
B. Multiplexing
B. sky propagation
C. Microwave circuit
C. line-of-sight propagation
D. Both a and c
D. None
99. Value of the decibel is positive, if signal is 104. Which is TRUE about Unguided Media?
A. Attenuated A. The signal is broadcasted through air
B. Distorted B. Used for larger distances
C. Noisy C. Both A and B
D. Amplified D. None of the above
105. Which media uses patterns of mi-
100. Fiber vs CopperSelect more than 1 an-
crowaves to represent bits?
swer.
A. copper
A. Fiber supports up to 100Gbpswhile
Copper only supports up to 10Gbps B. wireless
B. Fiber supports longer distance C. fiber-optic
(100’000m) while Copper only 100m D. none of above
C. Fiber optic is less expensive than Cop- 106. The sequence of operations in which PCM
per media is done is
D. Completely immune to RFI and EMI A. Sampling, quantizing, encoding
E. Needs high installation skills for Fiber B. Quantizing, encoding, sampling
Optics C. Quantizing, sampling, encoding

101. Which type of UTP cable is used to con- D. None of the above
nect a PC to a switch port? 107. Which of the following communication
A. crossover modes support two-way traffic but in only
one direction at a time?
B. rollover
A. simplex
C. console
B. half duplex
D. straight-through
C. three-quarters duplex
102. Which wireless technology is used on D. none of the above
smart phones to transmit data to another
108. Which of these is a measure of the trans-
device within only very close proximity?
fer of bit across the media?
A. NFC A. bandwidth
B. Wi-Fi B. throughput
C. 3G/4G C. goodput
D. Bluetooth D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Introduction 330

109. A network administrator is designing 114. Smoke signals are an example of commu-
a new network infrastructure that in- nication through
cludes both wired and wireless connectiv- A. a guided medium
ity.Under which situation would a wire-
less connection be recommended? B. an unguided medium
A. The end-user device only has an Ether- C. a refractive medium
net NIC D. a small or large medium
B. The end-user device area has a high

NARAYAN CHANGDER
concentration of RFI 115. What is one advantage of using fiber op-
tic cabling rather than copper cabling?
C. The end-user device requires a dedi-
cated connection because of performance A. It is easier to terminate and install
requirements than copper cabling
D. The end-user device needs mobility B. It is able to be installed around sharp
when connecting to the network. bends
110. The RG number gives us information C. It is able to carry signals much farther
about than copper cabling
A. twisted pairs D. It is usually cheaper than copper ca-
B. coaxial cables bling
C. optical fibers 116. The capacity of the medium to carry data
D. radio governance is known as

111. Which of the following could affect Cop- A. Throughput


per medias? B. Bandwidth
A. EMI-Electromagnetic Interference C. Speed
B. RFI-Radio Frequency Interference D. Data rate
C. Crosstalk
117. The wavelength of a signal depends on
D. Ultraviolet Ray
the
112. analog multiplexing technique to combine A. frequency of the signal
optical signals
B. medium
A. WDM
C. phase of the signal
B. TDM
C. FDM D. propagation speed
D. AM 118. Transmission media lie below the
layer.
113. The copper wire is the example of
A. Unguided media A. physical
B. Guided media B. network
C. Group media C. transport
D. None D. application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.2 DATA AND SIGNALS 331

7.2 DATA AND SIGNALS

PRACTICE BOOK» NOT FOR SALE


1. It is a relative measure of signal loss or 6. It is the weakening of a signal’s strength
gain and it is used to measure the loga- due to noise, distance or other external
rithmic loss or gain of a signal. factors.
A. Data Rate A. Amplification
B. Decibel B. Attenuation
C. Data Rate C. Decibel
D. Baud Rate D. Modulation
7. The range of frequencies that a signal
2. It is best describe as the set of all tex-
spans from minimum to maximum is called
tual characters or symbols and their cor-
the ?
responding binary patterns.
A. Spectrum
A. Data
B. Bandwidth
B. Data Codes
C. Period
C. Text Codes
D. Phase
D. Binary Codes
8. What are the characteristics that data and
3. A process of sending data over a signal by signals have in common?
varying either its amplitude, frequency, or A. They are represented as continuous
phase. waveforms only
A. Amplification B. They are represented in the form of bi-
B. Attenuation nary 1s and 0s only
C. Decibel C. They can exist in either analog or digi-
tal form
D. Modulation
D. Not in the choices
4. It is best describe as the unwanted elec-
9. It is a digital encoding scheme that trans-
trical or electromagnetic energy that de-
mits 1s as zero voltages and 0s as positive
grades the quality of signals and data.
voltages.
A. Data A. Manchester Digital Encoding Schemes
B. Signal B. NonReturn to Zero Inverted (NRZI)
C. Communication C. 4B/5B Digital Encoding Scheme
D. Noise D. NonReturn to Zero-Level (NRZ-L)
5. It is the number of times a signal makes a 10. Signal generation is required for communi-
complete cycle within a given time frame. cation, one of the signal properties should
be,
A. Amplitude
A. allocate the total capacity of a trans-
B. Phase
mission medium
C. Frequency B. determine when a signal begins to ar-
D. Period rive and when it ends

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.3 DIGITAL TRANSMISSION 332

C. capable of being propagated through C. Period


the transmission system D. Phase
D. two parties to engage in a telephone
conversation 12. Converting analog data to digital signals is
generally called ?
11. It is the absolute value of the difference
A. Attenuation
between the lowest and highest frequen-
cies. B. Amplification

NARAYAN CHANGDER
A. Frequency C. Modulation
B. Bandwidth D. Digitization

7.3 DIGITAL TRANSMISSION


1. What is the bit rate, if we digitize the hu- 5. Quadrature amplitude modulation is a com-
man voice, assuming 8 bits per sample? bination of &
A. 32 kbps A. ASK & FSK
B. 128 kbps B. FSK & PSK
C. 64 kbps C. PSK & QAM
D. 256 kbps D. ASK & PSK

2. Reverse process of modulation 6. In which technique, eight consecutive zero-


level voltages are replaced by the se-
A. Modulator quence 000VB0VB?
B. Modulation A. B8ZS
C. Demodulation B. HDB3
D. Demodulator C. 8B/10B

3. is a technique of analog-to-digital con- D. All of the above


version.
7. Both stations can transmit and receive si-
A. Pulse code modulation multaneously.
B. Pulse mode coding A. Simplex
C. line coding B. Half-Duplex
D. scrambling C. Full-Duplex
D. Answer NOT given
4. What are the problems with the unipolar
scheme? 8. Modulation is converting
A. DC component A. Digital signal to Analog data
B. lack of voltage B. Analog signal to Digital signal
C. Lack of synchronization C. Digital data to Analog data
D. PC component D. Digital Data to Analog signal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.3 DIGITAL TRANSMISSION 333

9. In asynchronous transmission, bit rep- B. Modulation


resents start bit & represents stop bit. C. Demodulation

PRACTICE BOOK» NOT FOR SALE


A. 1, 0 D. Demodulator
B. 1, 1
15. It is the device which receives the data
C. 0, 1 messages.
D. 0, 0 A. Message
10. In mBnL coding, first two letters define the B. Sender
pattern, and the second two define the
C. Receiver
pattern.
D. Transmission Media
A. Signal, Line
E. Protocol
B. Line, Data
C. Data, Data 16. Which is an example of an analog signal?
(Choose 3)
D. Data, Signal
A. Blu Ray
11. Which of the following are Digital-to-
B. VHS Tape
analog conversion techniques?
C. Human voice
A. AM
D. Broadband
B. QAM
E. Baseband
C. ASK
D. PSK 17. A PCM encoder includes which three pro-
cesses?
E. FSK
A. Sampling
12. Timing becomes very important in which
B. Quantizing
transmission method?
C. Modulating
A. Parallel
D. Encoding
B. Synchronous
C. Asynchronous 18. in NRZ-L encoding scheme, bit 1 is draw
D. Isochronous
A. at positive axis
13. Line coding, block coding and scrambling
B. at negative axis
are conversion techniques for
C. negative to positive axis
A. Analog to analog conversion
B. Analog to digital conversion D. positive to negative axis

C. Digital to analog conversion 19. The communication is unidirectional.


D. Digital to digital conversion A. Simplex

14. Extract original baseband information sig- B. Half-Duplex


nal C. Full-Duplex
A. Modulator D. Answer NOT given

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.3 DIGITAL TRANSMISSION 334

20. List the process of Pulse Code Modula- B. Frequency


tion(PCM) C. Phase
A. Scrambling
D. All of the above
B. Sampling
26. The two binary, one quaternary (2B1Q)
C. Quantization
means
D. Encoding
A. the 4-bit patterns encoded as one sig-
21. Each station can both transmit and receive,

NARAYAN CHANGDER
nal element belonging to a four-level sig-
but not at the same time. When one device nal
is sending, the other can only receive, and B. the 2-bit patterns encoded as one sig-
vice-versa. nal element belonging to a four-level sig-
A. Simplex nal
B. Half-Duplex C. the 2-bit patterns encoded as one sig-
C. Full-Duplex nal element belonging to a two-level sig-
nal
D. Answer NOT given
D. the 4-bit patterns encoded as one sig-
22. transmission enables moving data bit nal element belonging to a two-level sig-
by bit nal
A. Full duplex
27. In encoding, the transional show at bit
B. Asynchronous 0.
C. Parallel A. NRZ
D. Serial B. manchester
23. Popular forms of information include text, C. Differential Manchester
pictures, audio, video etc.
D. RZ
A. Message
B. Sender 28. uses 1 cable to send and 1 cable to
receive. The signal uses the mode to
C. Receiver transfer the data. (Choose 2 answers)
D. Transmission Media A. Baseband
E. Protocol
B. Broadband
24. Line coding schemes are C. Simple Mode
A. unipolar D. Simplex Mode
B. polar E. Half-Duplex Mode
C. bipolar
29. List the techniques in serial transmission
D. semipolar
A. synchronous
25. In phase shift keying, the of the carrier
B. Asynchronous
is varied to represent two or more differ-
ent signal elements. C. isochronous
A. Amplitude D. misochronous

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.4 ANALOG TRANSMISSION 335

30. The data rate defines the number of bits 32. Analog signal transmit data through a tech-
sent per sec-bps. It is often referred to nique called
the

PRACTICE BOOK» NOT FOR SALE


A. Transmit
A. bit rate B. Transmission
B. signal rate
C. Modulation
C. baud rate
D. Incoding
D. none of above
E. Transceiver
31. It is a set of rules that governs the data
communications. It represents an agree- 33. Which of the following are line coding
ment between the communicating devices. schemes?
A. Message A. Unipolar,
B. Sender B. Polar
C. Receiver C. Multitransition
D. Transmission Media D. Bipolar
E. Protocol E. Multiline

7.4 ANALOG TRANSMISSION


1. phone uses 4. Your LED TV uses which Modulation
A. Orthogonal frequency division multi- A. Phase shift keying
plexing B. Amplitude shift keying
B. Frequency division multiplexing C. Frequency shift keying
C. Time division multiplexing D. Any of the above
D. None of the above
5. What do you mean by premphasis?
2. What do you mean by Demphasis? A. Boosting high frequency components
A. Reducing signal amplitude by equal before modulatior
proportions after demodulator in FM re- B. Attenuating high frequency compo-
ceiver nents
B. Reducing frequency in fm C. Keeping amplitude constant
C. Incerasing SNR D. None of the above
D. Decreasing SNR
6. Premphasis and Demphasis are used in FM
3. Analog Telephone system uses systems?
A. PCM A. As they boost signal to noise ratio
B. TDM B. They keep constant SNR
C. None of the above C. Noise reduction
D. none of above D. Signal reduction

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.5 BANDWIDTH UTILIZATION 336

7.5 BANDWIDTH UTILIZATION


1. Frequency hopping involves a periodic B. Synchronous TDM
change of transmission C. FDM
A. Signal D. WDM
B. Frequency
7. The state when dedicated signals are idle
C. Phase are called

NARAYAN CHANGDER
D. Amplitude A. Death period
2. Multiplexing is used in B. Poison period
A. Packet switching C. Silent period
B. Circuit switching D. Stop period
C. Data switching 8. Synchronous Time-Division Multiplexing
D. Packet & Circuit switching (TDM) is not efficient because of
A. higher data rate
3. Which multiplexing technique used to
transmit digital signals? B. infinite frames
A. FDM C. empty slots
B. TDM D. Both A and C

C. WDM 9. In TDM, the transmission rate of a multi-


D. FDM & WDM plexed path is always the sum of the
transmission rates of the signal sources.
4. How many types of multiplexing tech- A. Greater than
niques are
B. Lesser than
A. one
C. Equal to
B. two
D. Equal to or greater than
C. three
10. DSSS system spreads the baseband signal
D. four
by the baseband pulses with a pseudo
5. If there are n signal sources of same data noise sequence.
rate, then the TDM link has slots. A. Adding
A. n B. Subtracting
B. n/2 C. Multiplying
C. n*2 D. Dividing
D. 2n 11. Which of the following is not a character-
6. Multiplexing technique, in which each in- istic of PN sequence?
put connection has an allotment in the out- A. Nearly equal number of 0s and1s
put even if it is not sending data is B. Low correlation between shifted ver-
A. Asynchronous TDM sion of sequence

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.5 BANDWIDTH UTILIZATION 337

C. Non deterministic 17. Why spread spectrum technique is ineffi-


D. Low cross-correlation between any cient for a single user?

PRACTICE BOOK» NOT FOR SALE


two sequences A. Large transmission bandwidth
12. If link transmits 4000frames per second, B. Small transmission bandwidth
and each slot has 8 bits, the transmission C. Fixed transmission bandwidth
rate of circuit this TDM is
D. Fixed null bandwidth
A. 32kbps
18. Multiplexing provides
B. 500bps
A. Efficiency
C. 500kbps
B. Privacy
D. 32bps
C. Anti jamming
13. The sharing of a medium and its link by
two or more devices is called D. Both Efficiency & Privacy

A. Fully duplexing 19. The bandwidth of the channel used in


B. Multiplexing the hopset is called a) Hopping band-
widthb) Total hopping bandwidthc) Instan-
C. Micropleixng taneous bandwidthd) 3 dB bandwidth
D. Duplexing
A. Hopping bandwidth
14. Which of the following is not a property of B. Total hopping bandwidth
spread spectrum techniques?
C. Instantaneous bandwidth
A. Interference rejection capability
D. 3 dB bandwidth
B. Multipath fading
20. What is the set of possible carrier frequen-
C. Frequency planning elimination
cies in FH-SS?
D. Multiple user, multiple access inter-
face A. Hopset
B. Hop
15. The processing gain of FH systems is given
by ratio of C. Chips
A. Hopping bandwidth and hopping pe- D. Symbols
riod 21. In multiplexing, channels are separated by
B. Instantaneous bandwidth and hopping unused strips of bandwidth guard bands-
duration to prevent
C. 3 dB bandwidth and bit rate A. Synchronization
D. Total hopping bandwidth and instanta- B. Overlapping
neous bandwidth
C. random motion of electrons
16. In TDM, slots are further divided into D. Both B & C
A. Seconds
22. The period of a PN sequence produced by a
B. Frames linear m stage shift register cannot exceed
C. Packets symbols.
D. Bits A. m

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.6 TRANSMISSION MEDIA 338

B. 3m D. 2m-1
C. 2m

7.6 TRANSMISSION MEDIA


1. a. Facilitates the sharing of resourcesd. C. Analoging
Reduces the cost of communication D. De-Digitizing

NARAYAN CHANGDER
A. data communication media
6. Below are the advantages of a network
B. network topology except
C. data flow A. Information security
D. advantages of using a network. B. Transferring hardware
2. Definition of a network is C. Sharing hardware
A. Collection of data and information D. Data backup
B. Collection of computer and software c 7. Which type of transmission media requires
C. Collection of computer connected to- a physical path between devices?
gether via communication devices and A. Guided transmission media
transmission media
B. Wireless transmission media
D. Collection of computer and devices
connected together via communications C. Digital transmission media
devices and transmission media D. Optical transmission media

3. This type of twisted pair cable is a cabling 8. State TWO types of transmission media:
that consists of one or more insulated wire A. Protocol
pairs encased in a plastic sheath.
B. Guided
A. STP
C. Unguided
B. UTP
D. Algorithma
C. Cat 6
D. STPO 9. cables are mainly used on cable televi-
sion
4. The computer or device that is used for A. Foil shielded cable
sending data is called
B. Coaxial cable
A. Sender
C. Twisted pair cable
B. Reciever
D. Fiber optic cable
C. Manager
D. Follower 10. This type of twisted pair cable consists of
twisted pair wires that are not only indi-
5. The conversion from digital signals to ana- vidually insulated but also surrounded by
log signals and vice versa is called a shielding made of foil.
A. Modem/Demodem A. STPO
B. Modulation/Demodulation B. STP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.6 TRANSMISSION MEDIA 339

C. UTP 16. Which technology is utilized by internet


hotspots?
D. UTPA

PRACTICE BOOK» NOT FOR SALE


A. Bluetooth
11. Choose Wireless transmission media (You
B. Satellite
can choose more than one answer)
A. Wi-Fi C. Point to Point

B. Modem D. WI-FI

C. Microwave 17. If the satellite is in geosynchronous orbit,


D. Hotspot its distance from the sending station
A. is constant
12. Computers send and receive data in the
form of signals. B. varies according to the time of the day

A. Analog C. varies according to the radius of the


orbit
B. Modulated
D. none of the choices
C. Demodulated
D. Digital 18. A cable that consists of color coded pairs
of insulated copper wires that are twisted
13. Communication without wires, in a around each other to form pairs that are
straight line is accomplished using: encased in a plastic sheath.
A. Twisted pairs A. coaxial cable
B. Microwaves B. twisted pair cable
C. Satallite C. fiber optic cable
D. Fibre Optics D. none of above

14. Fibre optic cables consist of very fine 19. The type of propagation used in radio com-
strands of glass or plastic fibre; transmit- munication is highly dependent on the
ting data via of the signal
A. magnetic pulses A. data rate
B. light pulses B. frequency
C. electricity C. baud rate
D. none of above D. power

15. Which transmission media has “up to 1 20. The 2.4 Ghz frequency range is divided
Gbps” bandwidth? into
A. Copper (Ethernet) A. 12 Channels
B. Fibre Optic B. 13 Channels
C. Wireless C. 14 Channels
D. none of above D. 15 Channels

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.6 TRANSMISSION MEDIA 340

21. The core of the optical fibre is 27. What are the different types of wired
transmission media
A. opaque and conducting material.
A. Coaxial cable Twisted pair Fiber-optic
B. opaque and dielectric material.
cable
C. transparent and conducting material. B. Satellite
D. transparent and dielectric material. C. Narrow band
22. Bandwidth NOT measured in: D. Broad band

NARAYAN CHANGDER
A. Mbps 28. Each wire is protected with plastic wrap,
Which wire is described above
B. Hbps
A. Twisted pair
C. Kbps
B. Universal trigger point
D. Gbps
C. Unshielded twisted pair
23. Why do users sometimes want to change D. Universal serial bus
the frequency channel of the Wireless de-
vice? 29. What type of cable is commonly used for
cable television?
A. To make it louder
A. Fiber-Optic Cable
B. To prevent interference
B. Coaxial Cable
C. To make it quieter
C. Twisted-Pair Cable
D. To choose their favourite channel
D. Microwave Transmission
24. we connect to wifi using 30. A system of conductors used to convey
A. electrical signals electric power or signal between two or
more points
B. radio signals
A. Channels
C. light signals
B. Optical cables
D. none of above
C. Transmission lines
25. Choose types of transmission mode TRUE: D. Waveguides
A. Highway 31. Optical fibre based on the principle of
B. Simplex A. total internal reflection.
C. Half-Duplex B. total internal refraction.
D. Full-Duplex C. diffraction.
D. interference.
26. What is guided transmission media?
A. A type of computer network 32. Propagation time is proportional to dis-
tance and proportional to propaganda
B. A physical connection between devices speed.
C. A communication technology A. inversely; directly
D. A form of wireless communication B. directly; inversely

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.6 TRANSMISSION MEDIA 341

C. inversely; inversely 38. A modem contained within a computer sys-


tem unit is called a/an modem.
D. directly; directly
A. External

PRACTICE BOOK» NOT FOR SALE


33. Rules used to allow successful data trans- B. Internal
mission are called
C. Wireless
A. Interconnections D. Wired
B. Medium 39. Which is an Advantage of Twisted pair
C. Protocols A. It offers very poor security
D. Networks B. They are easily break
C. It is the least expensive media of trans-
34. Which of the following is NOT a data trans- mission for short distances
mission channel?
D. none of above
A. Computers
40. A device installed in a smartphone that re-
B. Telephone Lines ceives radio waves from a wireless router
C. Microwave Links is known as
A. Wireless transmitter
D. Satellites
B. Wireless point
35. Which of the following is not a guided/ C. Wireless antenna
wired transmission media?
D. Wireless adapter
A. Twisted pair
41. connection is a connection in which
B. Coaxial cable the data flow in both directions simulta-
C. Fiber optic cable neously.
A. Simplex Connection
D. Atmosphere
B. Half Duplex Connection
36. These types of cable require highly skilled C. Full Duplex Connection
personals to install them D. All above
A. Twisted pair cable
42. Data is transmitted using light through
B. Firewalls a(n) cable.
C. Fiber optic A. Fibre Optic
B. Coaxial
D. Coaxial
C. Twisted Pair
37. If a satellite is in geosynchronous orbit, it D. Infra-red
completes one orbit in
43. VLF propagation occurs in
A. one hour
A. the troposphere
B. 24 hours B. the ionosphere
C. one month C. space
D. one year D. sea water

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.6 TRANSMISSION MEDIA 342

44. What is the most common type of guided C. Full Duplex Connection
transmission media? D. All above
A. Fiber-Optic Cable
50. The abbreviation STP stands for:
B. Coaxial Cable
A. Shielded Twisted Pair
C. Twisted-Pair Cable
D. Microwave Transmission B. Straight Through Process
C. Single Topology Protocol
45. What are two types of Twisted Pair? (Se-

NARAYAN CHANGDER
lect two answers) D. Shave Time Pair
A. Broadband 51. Which transmission media has “up to 600
B. Shielded Twisted Pair Mbps” bandwidth?
C. Fiber Optic A. Copper (Ethernet)
D. Unshielded Twisted Pair B. Fibre Optic
46. Which type of transmission media doesn’t C. Wireless
require a physical connection between de- D. none of above
vices?
A. Guided transmission media 52. What is data communication?

B. Wireless transmission media A. Transfer of data from one point to the


next.
C. Digital transmission media
B. Transfer of electronic data from one
D. Optical transmission media point to the next over a communication
47. Full Duplex data flow means: medium.
A. data travels in both directions, but only C. sending information
one direction at a time. D. none of the above
B. data travels in only one direction.
53. How are Wi-Fi signals broadcasted?
C. -data travels in both directions at the
same time. A. Through radio waves using wireless
Access point
D. data does not travel.
B. Through a Switch
48. Types of communication media
C. Through the air waves
A. Twisted and coaxial cables
D. All the above
B. duplex
C. Bluetooth 54. Choose any Data Communication Compo-
nent below:
D. wired and wireless
A. Sender
49. is a connection in which the data flows
B. Message
in only one direction, from the transmitter
to the receiver. C. Media Transmission
A. Simplex Connection D. Receiver
B. Half Duplex Connection E. Protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.6 TRANSMISSION MEDIA 343

55. Digital signals consist of binary digits B. Fiber-Optic Cable.


A. 0 & 1 C. Shielded Twisted Pair Cable.

PRACTICE BOOK» NOT FOR SALE


B. 2 & 3 D. Unshielded Twisted Pair Cable.
C. 8 & 16 58. Choose any GUIDED transmission media is
D. 9 & 0 TRUE:
A. Twisted Pair
56. All are conducting media Except?
B. Coaxial Cable
A. Twisted-wire pair
C. Fiber Optic
B. coaxial cable
D. Infrared
C. fiber optic
D. Electrical wires 59. cable is divided into two categories,
shielded and unshielded
57. Which one of the following ‘Network Me- A. Twisted pair cable
dia’ is not susceptible to Electromagnetic
Interference (EMI) and features high data B. Coaxial cable
transmission rate over long distances? C. Fiber-optic cable
A. Coaxial Cable. D. Optic cable

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8. Multimedia and Quality of Service

NARAYAN CHANGDER
8.1 Introduction
1. What term describes a slideshow that C. SVG
plays continuously?
D. Raster
A. Looping
B. Neverending 5. To convert a conventional image to a digi-
tal image, is used.
C. Cycling
A. computer
D. Autoplaying
B. scanner
2. the combined use of different types of me-
dia C. camera
A. enhance D. speaker
B. analyze
6. control how the presentation changes
C. multimediamultimedia from one slide to the next.
D. illustrations A. Animations
3. The images is in so you can look at it B. Transitions
from all sides.
C. Backgrounds
A. application
D. Theme
B. integrated
C. related 7. Which feature can you use to present
slides automatically in a slide show?
D. 3-D
A. Animations
4. Which type of image file is constructed by
a series of pixels to form an image? B. Slide layouts
A. PDF C. Templates
B. Vector D. Timings

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 345

8. Projects have (select all that apply) 13. Which of the following statements is TRUE
A. vague goals about the text media element?

PRACTICE BOOK» NOT FOR SALE


A. typeface can be divided into three
B. a clear beginning and end
B. sans serif is used for document print-
C. assigned resources
ing purpose
D. organized sequence of activities, tasks
C. text media element can be eliminated
and events
totally
9. Digital images can be edited by using D. text element can supplement the video
editors. as subtitle
A. audio 14. What happens when you drag an anima-
B. video tion in the Animations panel of your pre-
C. graphic sentation software?

D. animation A. You control how each slide replaces


the previous one.
10. Text is combination of (1) , (2) and B. You change the order of animations.
(3) to form a sentence or word that is
C. You attach multiple animations to an
used to avoid misunderstanding
object.
A. 1. Alphabet 2. Numbers 3. Symbols
D. You add an animation to a slide.
B. 1. Alphabet 2. Numbers 3. Letters
15. a software graphics program that allows
C. 1. Letters 2. Numbers 3. Characters
the user to draw or paint bitmapped im-
D. none of above ages on a computer.

11. a small rectangular pattern of thick and A. Painting software


thin black lines printed on a product, or B. Drawing software
on its container, so that the details of the C. Office suite
product can be read by and recorded on a
computer system D. none of above

A. Universal Product Code 16. The extended Gap model of service quality
B. Voice recognition system identifies how many gaps?
A. 5
C. Cathode-ray tube
B. 6
D. none of above
C. 7
12. Cassie wants to remove a dead tree in
D. 8
the background of a picture. Which image
editing feature permits her to retouch the 17. You must consider this when choosing the
photo? format for multimedia projects.
A. Aspect ratio A. Information and Audience
B. Cloning B. Command Key
C. Filtering C. Age and Purpose
D. Rotating D. Video Games

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 346

18. David needs to email some photographs to B. Design


his cousin. He wants to ensure that the C. Workspace
photos can be opened without the need
for special software. What factor is David D. Code
considering? 23. You have just completed a course about
A. Color Depth graphics software and you are excited to
B. Compression use your new skills. For which task can
you use graphics software?

NARAYAN CHANGDER
C. Portability
A. Spreadsheets
D. Transparency
B. Slide show creation
19. All the links in tis e-zine are to football C. Word processing
A. simulation D. Digital photo editing
B. integrated
24. buying and selling of products or ser-
C. 3D vices over electronic systems such as the
D. related Internet and other computer networks and
it also consists of the exchange of data
20. Gilah is creating a graphic that will be to facilitate the financing and payment as-
used on her school’s Web site, in newslet- pects of business transactions
ters, and on sports uniforms. She needs
A. Internet banking
to choose an image file format that will
not lose quality when the image is resized. B. Online Service
Which graphic format should Gilah use? C. E-commerce
A. GIF D. Online Seller
B. Vector
25. The concept of quality requires a business
C. Raster to:
D. JPEG A. Produce goods that are better than the
competition
21. The width of the bandwidth in the network
or the consumption value of data transfers B. Produce goods that are reasonably
used between client and server devices priced
within a certain time, where the value is C. Provide services that are fit for pru-
calculated in units of bits (bits per second) pose
is the meaning of D. Provide services that are value for
A. VPS money? Increased costs from products
B. Bandwidth that do not meet standards
C. Throughput 26. Which of the following statements is true
D. analog signal regarding cropping or resizing an image in
graphic editing software?
E. Digital signal
A. Resizing an image deletes the unused
22. What are the two types of views in portion of the image.
Google Web Designer? B. Cropping an image keeps the unused
A. Panel portion of the image.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 347

C. Resizing an image does not reduce its 32. what is a whole bunch of images being
file size. shown to us quickly

PRACTICE BOOK» NOT FOR SALE


D. Cropping an image reduces its file size. A. AAC
B. key frame
27. Text is a element.
C. video
A. static
D. none of above
B. dynamic
C. hypertext 33. Mrs. Clay is designing a poster to thank
the students who donated at the blood
D. hypermedia drive. She wants to insert the students’
names around the outline of a heart. To
28. The most basic building block of the Web
get this effect she must:
A. HTML
A. Point Type
B. PERL
B. Area Type
C. ASP C. Type on Path
D. PHP D. Text Wrap
29. Jill has created an animated graphic for a 34. Sarah receives company faxes on her com-
company’s website. This graphic should be puter. What file format is recommend for
saved as a: fax storage?
A. JPEG A. JPEG
B. GIF B. GIF
C. TIFF C. TIFF
D. PDF D. PDF

30. In the past, Web pages used text and 35. Layla is creating a presentation to high-
graphics. light her company’s latest product. She
would like to add the company log and con-
A. static
tact information to each slide. Which op-
B. dynamic tion should Layla use to automatically add
C. hypermedia these elements to all of the slides in the
presentation?
D. link
A. Master panel
31. the effective data transfer rate (rate) B. Slide template master
which is measured in bits per second is the
meaning of C. Slide master
D. Slide layout master
A. downlink rate
B. uplink rate 36. What is multimedia?
C. Throughput A. A field concerned with the use or pro-
cessing of multiple types of data such as
D. transfer rate audio, text, images to represent informa-
E. bandwidth tion.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 348

B. A field concerned with the use or pro- 41. You have created a slide with an image of
cessing of multiple types of data such as waves and small boat. You would like the
audio, video, text, images to represent in- boat to appear sailing on the water, with
formation. waves along its side. Which of the follow-
C. A field concerned with the use or pro- ing will achieve that effect when you se-
cessing of multiple types of data such as lect the boat?
audio, video, text to represent informa- A. Send backward
tion. B. Send forward

NARAYAN CHANGDER
D. A field concerned with the use or pro- C. Keep back
cessing of multiple types of data such as
video, text, images to represent informa- D. Bring forward
tion. 42. According to the planning and costing
37. File format extension for animation is stages, three elements can vary in project
estimates. What are they?
A. *.png
A. Computers, climate, and pressure
B. *.jpg
B. Time, money, andpeople
C. *.gif
C. Permissions, workflow, and data
D. *.pdf
D. Age, class, anddomain
38. Yuki is creating a memory book for her 43. A multimedia project such as games and
friend’s birthday. Which file type should educational materials should consider fea-
she use to print the pictures? tures below (select all that apply)
A. SVG A. multi-platform and multi operating sys-
B. DRW tems
C. Raster B. single or multi user and user sign-in
D. Vector C. database
D. rewards and scoring
39. Which program is an example of graphics
editing software? E. personalized experience
A. Google Slides 44. Which of the following is NOT an advan-
B. Google Docs tage of a vector graphic?

C. Microsoft Outlook A. Supports millions of colors

D. Adobe Photoshop B. Small File Sizes


C. Resolution Independent
40. Some shopping websites use reality to
D. Easily editable
advertise their products online.
A. simulation 45. Ms. Matthews is printing posters of her
students’ artwork. Since the images will
B. virtual
be printed, they will need:
C. application A. a higher resolution for better print
D. 3-D quality.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 349

B. a lower resolution for smaller file size. 50. a high level programming language de-
signed to reduce the complexity and
C. a higher resolution to display on a mon-
amount of source code required to create

PRACTICE BOOK» NOT FOR SALE


itor
a program.
D. a lower resolution in order to down-
A. Very high level language
load faster.
B. Visual programming
46. To edit letters and numbers, editors C. Scripting lunguage
are used.
D. Simple Branching
A. text
51. Which of the following file format is com-
B. graphic
mon to many Internet applications since it
C. video display images with relatively small file
size?
D. animation
A. GIF
47. NC State is adding a pizza place to its food B. JPEG
court for students. To promote the grand
opening a graphic designer is using the C. PNG
marquee tool to draw a circle to add the D. BMP
possible toppings inside a pizza graphic.
This is an example of: 52. To enhance the appearance of a flyer, Zach
decides to include a circular path for his
A. Point Type text to follow. This is an example of:
B. Area Type A. Point Type
C. Type on Path B. Area Type
D. Text Wrap C. Type on Path
D. Text Wrap
48. How do you copy formatting from one
paragraph to another? 53. Amir is searching on his computer for a file
A. Use copy and paste that he created and saved in Pixlr’s native
file format. Which type of file should he
B. Use the Paint Format tool be searching for?
C. Use the Fill tool A. EPS
D. Use cut and paste B. PDF
C. PXD
49. What is not included in the VOIP software
is D. PSD
A. Skype 54. Erica is designing an advertisement for her
B. Protocol yard sale. To ensure that the objects align
with the edges or center point of other ob-
C. Google Talk jects she should use:
D. Yahoo Messenger A. Smart Guides
E. X-Lite B. Stacking Order

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 350

C. Line A. Fly all the presenters to the home of-


D. Shape fice and train them together.
B. Have Dina fly out to teach each presen-
55. *.mov is the file format for ter all the details.
A. audio C. Include all the information in an email
B. video and make sure the presenter prints it.
C. graphic D. Add the details in the Slide Notes.

NARAYAN CHANGDER
D. animation 60. Which model is the only QoS model with
no mechanism to classify packets?
56. defined as variation of delay or variation
of packet arrival time is a QoS parameter A. IntServ
A. Rate B. DiffServ
B. Jitter C. best-effort
C. Latency D. hard QoS

D. Packet loss 61. Nelson is creating a presentation for his


E. Throughput class. The presentation includes photos of
his classmates throughout the year. He
57. What do you call the format you choose would like some of the photos to fit inside
for your file, which provides a consistent shapes. Which method should Nelson use
appearance to your slide presentation? to achieve this effect?
A. Slide pattern A. Format > Shapes
B. Slide layout B. Crop > Shapes
C. Slide thumbnail C. Reset > Shapes
D. Slide panel D. Insert > Shapes

58. Which image format would be most likely 62. Briefly describe the purpose of audio to in-
used for a photo directory in web or print crease the understanding of complex con-
publishing? tents through audio explanation
A. SVG A. The use of voice in WAZE helps driver
to focus on the driving by looking to the
B. DRW
map only
C. AI B. The use of voice in WAZE helps driver
D. PNG to focus on the driving while listening to
the direction given by the WAZE without
59. Dina is responsible for creating presen- looking to the map only
tations which different employees of her
company will use in different parts of the C. Sound effect such as crying sound will
country. What’s the most efficient way help the audience to understand the illus-
for Dina to be sure each employee has all tration captured from the drama or movie
the details he or she needs in their presen- D. Sound effect such as crying sound will
tation, without adding too much detail to helps the audience to understand caption
the slides themselves? captured from the drama or movie

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 351

63. To show a video in Google Slides (but not 68. VoIP-based applications that can be used
needed for PowerPoint), you must first up- on PCs/Laptops are
load your video to:

PRACTICE BOOK» NOT FOR SALE


A. Zooper
A. YouTube B. Vmware
B. Facebook C. Net Framework
C. Flickr D. Virtualbox
D. Dropbox E. X-Lite
64. A student would like to remove her 69. which does not include bandwidth manage-
boyfriend from her prom photo. Which ment in the network
image editing technique should she con-
sider? A. single queue
A. Aspect Ratio B. cake tree
B. Cropping C. shared/up to
C. Layering D. delay pools
D. Rotating E. uplink

65. State a purpose of using text in multime- 70. There are 4 basic types of image. They
dia production. are:
A. To present information more attrac- A. Binary, Greyscale, True colour, Red-
tively. green-blue (RGB)
B. Can help organize thoughts and illus- B. Greyscale, True colour, Red-green-
trate processes blue (RGB), Indexed
C. To provide information C. Binary, Greyscale, True colour, Red-
green-blue (RGB)
D. To communicate ideas, thoughts, and
facts. D. Binary, Greyscale, True colour or red-
green-blue (RGB), Indexed.
66. Dennis has saved a photograph and has
lost data during compression. What type 71. How will you use multimedia for effective
of compression has occurred? learning?
A. Lossy A. creating learning activities
B. Lossless B. use clear and concise sentences
C. Resolution C. be aware of your visual quality
D. Color Mode D. multimedia content helps to vary and
enhance the learning process, and leads
67. a system for connecting computers into to better knowledge retention
networks (= groups of computers that are
used together) 72. Which option is used as a filter?
A. LANs A. Crop
B. WANs B. Resize
C. Ethernet C. Brighten
D. Wifi D. Dry brush

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 352

73. Here is the function of the firewall namely 77. The Charlotte Knight’s have opened up a
new stadium. Their logo needs to be re
sized to fit on flyers, posters, and bill-
A. The link between 2 different networks
boards. To maintain the graphic quality
B. Manage and control network traffic when scaled the logo should be created as
C. Connecting between 2 networks to the a:
internet using 1 IP A. JPEG Graphic
D. Programs that make requests for con- B. PNG Graphic

NARAYAN CHANGDER
tent from the internet/intranet C. Vector Graphic
74. You want each slide in your presentation D. Raster Graphic
to have a colored shape in the top-left cor-
78. Below are the reasons we need compres-
ner that contains an image. You intend to
sion, except:
use a different image on each slide, but
you want to use the same size and color A. Multimedia data is good in quality.
shape for all images. Which method is the B. Limited network bandwidth.
most efficient way for you to do this?
C. Limited storage space.
A. Add the shape and set the color using D. Increasing resolution, sampling rate,
a pre-designed presentation template. more bits per pixel, will help improve me-
B. Create each shape and image in a dia quality at the expense of increasing
graphics program and then insert the de- media size.
sired image into each slide.
79. Which choice lists two image formats that
C. Create a shape containing an image, support transparency?
and then copy and paste it into each slide.
A. GIF and PNG
D. Add the shape and set the color using
B. TIFF and JPEG
the slide master.
C. PNG and TIFF
75. Bobby has saved a photograph without D. JPEG and GIF
losing data. What type of compression has
occurred? 80. A video consists of a sequence of
A. Lossy A. Frames
B. Lossless B. Signals

C. Resolution C. Packets
D. Slots
D. Color Mode
81. Which QoS model uses the DSCP bit to
76. Which of the following is an example of an mark packets and provides 64 possible
editing tool? service classes to use?
A. Lasso A. Intserv
B. Clone Stamp B. FIFO
C. Blur C. best-effort
D. Zoom D. DiffServ

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 353

82. Briefly describe why video does not effec- C. Line


tively illustrate abstract concepts D. Shape

PRACTICE BOOK» NOT FOR SALE


A. video capture abstract concept such
as molecule atom and electron 87. Project initiation

B. Video does not capture abstract con- A. consists of those processes per-
cept such as molecule atom and electron formed to observe project execution so
that potential problems can be identified
C. Video is a realistic moving images in a timely manner and corrective action
while abstract concept is realistic in visu- can be taken
ally but not realistic ideally
B. includes planning of time, cost and re-
D. Video is not a realistic moving images sources adequately to estimate the work
while abstract concept is not realistic in needed and to effectively manage risk dur-
visually but realistic ideally ing project execution
83. Which of the following is a raster graphics C. involves coordinating people and re-
format sources, as well as integrating and per-
forming the activities of the project in ac-
A. SVG
cordance with the project management
B. JPG plan.
C. PPI D. determines the nature and scope of
D. DPI the project

84. connects a word or phrase to another 88. Which type of traffic does Cisco recom-
screen in a multimedia program. mend be placed in the strict priority queue
(PQ) when low latency queuing (LLQ) is be-
A. Hypermedia
ing used?
B. Linear interactivity
A. video
C. Non-Linear interactivity
B. data
D. Hypertext
C. voice
85. Project management is a of principles, D. management
, procedures and practices used to en-
sure the “projects” are completed on , 89. the configuration action on NAT that func-
on budget and as required tions to configure with the aim of changing
a private IP to a public IP is
A. perception, methodologies, time
A. accept
B. major, hardware, schedule
B. dst-nat
C. matter, software, schedule
C. Masquerade
D. set, methodologies, time
D. Redirect
86. Ed is creating a poster to promote the up-
coming 5K race. He needs to align objects 90. Vector graphics are:
with the edges or center point of other ob- A. resolution-dependent
jects. Ed should use: B. made up of pixels
A. Smart Guides C. not able to be resized without losing
B. Stacking Order quality

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 354

D. made up of mathematical equations 96. A text-based command that functions to


monitor network connections on a com-
91. The maximum data rate for wireless com- puter, be it a local network (LAN) or in-
munication with 802.11g specifications is ternet network is
A. ping.
A. 5 Mb/s
B. netstat
B. 11 Mb/s
C. 15 Mb/s C. tracert.

NARAYAN CHANGDER
D. 54 Mb/s D. looklan.
E. 100 Mb/s E. host.

92. Trevor is creating an image that will be 97. In project management, WBS is an
used in varying sizes so it needs to be acronym to
saved in a format that will allow him to A. World Business Structure
scale it without altering the quality. Which
image type should he create? B. Wireless Business System
A. Raster graphics C. Work Breakdown Structure
B. Vector graphics D. Work Based System
C. JPEG 98. A type of audio in which the computer in-
D. Lossy graphics terprets notes
93. DHCP Pools is A. AAC
A. Contains a list of leased IP addresses B. MP3
B. Contains the time limit for leasing the C. MIDI
IP Address D. WAV
C. Berisi IP address Client
99. Protocols that are at the transport layer
D. Contains the IP address of the router
and have functions used in HTTP, HTTPS
94. for example, the bandwidth you have is applications. SMPT. FTP, SSH are..
64 kbps then you want to download a file A. tcp
from the internet that is 128 kb in size,
how long does it take to download B. udp

A. 1 second C. icmp
B. 2 sec D. ggp
C. 3 sec E. ipconfig
D. 4 sec 100. Which of the following tools can be used
95. What are the advantages of multimedia? to analyze service quality problems?
A. human interface usability requirement A. Blueprinting
B. host computing power requirement B. TQM
C. enhances personal communication C. ISO 9000
D. network latency D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 355

101. A combination of and entertainment 106. Main processes involved in project time
makes learning enjoyable in schools. management include (select all that ap-
ply)

PRACTICE BOOK» NOT FOR SALE


A. business
A. Activity definition
B. education
B. Activity sequencing
C. public
C. Activity duration estimating
D. home
D. Schedule development
102. To check the routing table that has been
configured, using the command? 107. Explain how multimedia are important
nowadays?
A. Router#show running-config
A. It increases learning effectiveness
B. Router#show ip route and is more productive than traditional
C. Router#show ip protocols learning methods
D. Router#show routing table B. proven to be beneficial to the commu-
nity at large
103. The following program that works as a C. can be seen in the entertainment in-
proxy server is dustry
A. Samba D. disseminates data from one region of
B. Squirrel the world to another
C. Pythons 108. How do you use the elements in your pre-
D. Squid sentation?

E. Apache A. storage cost


B. processing cost increases
104. What is the NAT configuration that must
C. reduce training costs
be applied to the proxy so that all clients
from the proxy can connect to the internet D. facilitates laziness
A. chain:srcnat | out-interface:sumber 109. Which option is used to resize and rotate
internet | action:masquerade a image?
B. chain:dstnat | out-interface:sumber A. Anchor
internet | action:masquerade
B. Free Transform
C. chain:srcnat | in-interface:sumber in- C. Opacity
ternet | action:masquerade
D. Constrain Proportions
D. chain:dstnat | in-interface:sumber in-
ternet | action:masquerade 110. Engineers design cars before producing
them by using a multimedia application
105. animation refers to called
A. movement of created picture A. Computer-Aided Coding
B. real pictures in motion B. Computer-Aided Development
C. created video C. Computer-Aided Design
D. still picture D. Computer-Aided Documentation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 356

111. a network of computers interconnected 116. James is drawing circles that are all filled
over large distances, often by optical fi- with a pattern. He wants to change the
bres or microwave communications. pattern to a solid fill. Which type of graph-
ics is he editing?
A. LANs
A. Raster Graphics
B. WANs
B. JPEG Graphics
C. Ethernet
C. TIFF Graphics
D. ISP

NARAYAN CHANGDER
D. Vector Graphics
112. Streaming stored audio/video, files are
compressed and stored on a 117. one of the simplest bandwidth manage-
ment
A. Server
A. cake tree
B. Domain
B. shared/up to
C. Internet
C. single queue
D. IP
D. delay pools
113. a type of television that shows clear, E. pcq
high-quality pictures on a wider screen
than standard television 118. An attack method using malicious code by
A. High Definition TV inserting viruses, worms or trojan horses
is a logical attack called
B. Blu-ray
A. SQL Injection
C. Optical character recognition
B. Request Flooding
D. Universal Product Code
C. Social Engineering
114. Which QoS model is most resource inten- D. Malicious Code
sive and provides the highest QoS guaran-
E. Packet Sniffer
tee?
A. Soft QoS 119. video cameras can transfer video
clips directly to the computer for editing.
B. Intserv
A. Profesional
C. DiffServ
B. Digital
D. best effort
C. Analogue
115. According to the Gap model of service D. Portable
quality, “not having the right service de-
sign & standards” is 120. What is Mrs. Thompson’s Snail’s name?
A. Gap 1 A. Slow Down
B. Gap 2 B. Hippie
C. Gap 3 C. Smiley
D. Gap 4 D. Warp Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 357

121. The menu on Winbox that is used to man- 126. Max is working on a diagram to show
age bandwidth is.. the upcoming weather patterns. To place
the sun behind the cloud he needs to adjust

PRACTICE BOOK» NOT FOR SALE


A. tails
the:
B. mangle
A. Smart Guides
C. qos
B. Stacking Order
D. bandwidth C. Line
E. ip → queues D. Shape
122. What is the name of the slide that con- 127. Which of the following is not a forms of
tains the default styles, arrangement, and graphics?
options for all layouts in a presentation?
A. Vector
A. Slide master
B. Photograph
B. Slide template
C. Charts
C. Slide layout master D. Animation
D. Slide theme
128. What setting would you use for a slide
123. A system that aims to translate IP Ad- show to play continuously?
dress so that it can become a Public IP is A. Looping
A. Translation B. Timing
B. Nat C. Speed
C. Routing D. Multimedia
D. Subnetting 129. A company’s website displays an ani-
mated truck. Which file format would be
124. What does lossy compression do? most appropriate?
A. Throw away information A. PDS
B. Add information B. GIF
C. Multiply information C. JPEG
D. none of above D. PNG

125. Ms. Osteen gives her class an assign- 130. “Newspaper is not a multimedia product”
ment to insert background color that grad- Do you agree with the statement above?
ually changes from blue to green. To ac- Justify your answer in with a support from
complish this design effect the students any definition you know.
must add a: A. Yes. Newspaper is one the multime-
A. Pattern dia product based on the definition which
“multimedia is the use of text, graphic to
B. Fill
convey information”
C. Swatch
B. No. Multimedia is any combination of
D. Gradient text, graphics, sound, animation and video

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 358

delivered to you by computer or other 135. The work tool used to determine how
electronic or digitally manipulated means. strong the power of the light signal that
C. Disagree . Multimedia is any combi- has entered the fiber optic cable is
nation of text, graphics, sound, animation A. fusion splicer
and video delivered to you by computer or
B. stripper/miller
other electronic or digitally manipulated
means. C. cleaver
D. Agree. Multimedia is any combina- D. Optical Power Meter (OPM)

NARAYAN CHANGDER
tion of text, graphics, sound, animation
E. Optical Time Domain Reflectometer
and video delivered to you by computer or
(OTDR)
other electronic or digitally manipulated
means. 136. Which of the four navigational structures
allows users to freely navigate through
131. is a horizontal bar chart with a list of
the content of the project, unbound by pre-
activities on the left and a timeline on the
determined routes?
horizontal axis.
A. PERT chart A. Hierarchical

B. Activity-on-diagram chart B. Linear

C. Gantt chart C. Nonlinear


D. Network diagram chart D. Composite

132. What could this be an example of to 137. This file format supports transparency
help color images 11111111 00000000 but does not support animation.
00000000 A. PNG
A. MIDI
B. TIFF
B. RGB
C. EPS
C. binary
D. SVG
D. none of above
138. Crucial determinants of multimedia con-
133. Sound Forge is an example of editors. tent are (select all that apply)
A. text
A. objective of the application
B. graphic
B. cost and rights
C. audio
C. creation of assets breakdown
D. video
D. disc space
134. If frames are displayed on screen fast
enough, we get an impression of 139. When was multimedia more popular?
A. Signals A. 1970’s
B. Motions B. 1980’s
C. Packets C. 1990’s
D. Bits D. 2000’s

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 359

140. Multimedia Application is 145. A can be added to your presentation


and then used to go to a variety of loca-
A. Environment & Application
tions for example, a web address, an

PRACTICE BOOK» NOT FOR SALE


B. Make use of audio, text and graphics e-mail address, a custom show or docu-
to deliver capabilities of system to user ment, just to name a few.
C. Hardware and software systems for A. graphic
handling multiple digital media. B. menu
D. none of above C. video
D. Hyperlink
141. The gap between customer perception
and customer expectation, also called the 146. Which type of image format is con-
Service Gap is structed using proportional formulas
A. Gap 7 rather than pixels?

B. Gap 2 A. JPEG
B. Raster
C. Gap 3
C. PNG
D. Gap 5
D. Vector
142. The following are three types of Video
147. Anahi is creating a graphic that will be
Camera except
used on her company’s Web site, in print
A. Professional Video Camera materials, in advertising and on uniforms.
She needs to choose an image file format
B. Digital Camera
that will not lose quality when the image
C. Compact Digital Camera is resized. Which graphic format should
D. Camcorder Anahi use?
A. Raster
143. A protocol at the transport layer that is B. Bitmap
connection oriented and reliable but has a
high data transfer delay is C. TIFF

A. FTP D. Vector

B. IRC 148. What option is used to combine several


objects so that they can be treated as a
C. TCP single unit?
D. UDP A. Align
E. HTTP B. Group
C. Distribute
144. What does the timeline allow you to do?
D. Order
A. Create a google web design
B. Create animations 149. The installation of two WiFi antennas
must meet the unobstructed conditions
C. Create keyframes called
D. Create animations using keyframes A. Point to multipoint

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 360

B. Point to point 153. What happens when an edge router us-


C. LOS ing IntServ QoS determines that the data
pathway cannot support the level of QoS
D. Direct requested?
E. dB
A. Data is forwarded along the pathway
150. DJ’s Restaurant is newly remodeled and using a best-effort approach.
looking to create a new logo and billboard.
B. Data is forwarded along the pathway
The better choice for the file format is:

NARAYAN CHANGDER
using DiffServ.
A. JPEG Graphic
C. Data is not forwarded along the path-
B. PNG Graphic way.
C. Vector Graphic
D. Data is forwarded along the pathway
D. Raster Graphic using IntServ but not provided preferen-
151. A network administrator at that time tial treatment.
wanted to configure by equalizing the time
154. Which slideshow tool is used to automat-
of each computer to connect to the server
ically apply changes to all of the slides in
computer network or commonly referred
a presentation?
to as the NTP server. And by using the
NTP server protocol, what communication A. Slide panel
port connection is suitable for use?
B. Slide layout
A. UDP port number 110
C. Slide thumbnail
B. TCP port number 114
C. UDP port number 123 D. Slide master

D. D. UDP port number 143 155. What term describes images that are
E. E. Port TCP name 123 made up of pixels and cannot be resized
without losing quality?
152. All the following questions are true about
system functions except A. DPI
A. Knowledge Management System B. Opaque
(KMS) to predict the weather and observe
C. Vector
what happening to surrounding
B. Geographical Information Systems D. Raster
(GIS) to select the suitable land for the
crop to plant 156. Valerie is creating images to include on
her company website. The compression
C. Decision Support System (DSS) to help type she is using reduces the file size with-
decision makers compile useful informa- out deleting any of the image data. Which
tion from a combination of raw data, doc- type of compression is she using?
uments, and personal knowledge, or busi-
ness models to identify and solve prob- A. lossless
lems and make decisions B. lossy
D. network tool such as mobile phone, ra-
C. portable
dio and wireless network to promote your
product or contact with the buyer D. transparent

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 361

157. Companies nowadays make multimedia 162. The ‘People’ element of services leads to
to promote their products. which gap?

PRACTICE BOOK» NOT FOR SALE


A. encyclopaedias A. Gap 5
B. opportunity B. Gap 6
C. catalogues C. Gap 3
D. indirectly D. Gap 2
158. Malachi has to create vector graphics 163. A student needs to reduce the size of a
that can be opened by all of his clients, no object in his graphic design project. Which
matter which design editors their compa- image editing technique should he use?
nies use. Which file format should he use
to make sure they can all open his files? A. Scaling
A. TIFF B. Layering
B. EPS C. Fill
C. PNG D. Gradient
D. BMP
164. There are main elements in multime-
159. The SMTP port on the email server is dia.
A. 80 A. two
B. 25 B. three
C. 143 C. four
D. 21 D. five
E. 444
165. Which of the following will allow you to
160. An improvement to the CD-ROM is the have an image on that allows the back-
that can store better quality video ground to show through when placed on
top of it?
A. VCD
A. Transparency
B. DVD
B. Opaque
C. Blu-ray
C. Blur
D. Tape
D. Clear
161. The menu on Winbox that is used to mark
data packets or traffic on the network is.. 166. Which device would be classified as a
A. tails trusted endpoint?

B. mangle A. switch
C. qos B. router
D. bandwidth C. firewall
E. ip → queues D. ip phone

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 362

167. John has chosen several graphics for his 172. While editing an image, Lucy clicked on
webpage promoting the local farmers mar- one of the image handles and dragged it
ket. He wants to ensurethat customers to the right in order to change the display
are able to view the graphics immediately. size of the image. This caused the image
Why is vector the preferred format for his to be distorted. Which of the following did
graphics? she change?
A. Small file size and loads quickly A. Aspect ratio
B. Large file size and loads quickly B. Color Depth

NARAYAN CHANGDER
C. Can be edited in draw programs C. Transparency
D. Can be time consuming to create D. Rotation

168. The total of estimated hours for each task 173. In interactivity, the user does not
times your hourly billing rate is presented have the freedom to view the content they
in want.
A. budget A. linear

B. milestones B. non-linear

C. proposal C. text

D. grant chart D. audio

174. The SERVQUAL instrument identifies how


169. Which of the following is the characteris-
many dimensions of service quality?
tics of interactive multimedia?
A. 7
A. users play the passive role
B. 5
B. users cannot control the sequence of
the contents C. 4
C. users control the flow of the contents D. 8
D. no flexibility for the users 175. What is the name of the effect that con-
trols how each slider replaces the previous
170. In the Service Quality formula, when SQ one?
= P < E, it implies
A. Animation
A. Satisfactory quality
B. Transition
B. Unacceptable quality
C. Link
C. Excellent quality
D. Theme
D. none of above
176. What is the advantage of multimedia for
171. Graphics or text in motion. students?
A. Animation A. lose attention
B. Multimedia B. limited interaction for students
C. iMovie C. used to convey information
D. Simulations D. understand the concept easily

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 363

177. In medicine, doctors can practise or be A. developing the scope statement


trained in performing high-risk surgery by B. identifying deliverables and creating
using surgery

PRACTICE BOOK» NOT FOR SALE


the work breakdown structure
A. two-dimension C. finalize all activities across all of the
B. space process groups to formally close the
project or a project phase
C. virtual
D. estimating the resource requirements
D. media
for the activities
178. A series of graphics that outline the vi- 182. A student would like to remove a
sual details of a multimedia project is stranger from the edge of a beach photo.
called: Which image editing technique should she
A. a storyboard use?
B. a pictogram A. Aspect Ratio
C. an icon B. Cropping
D. a composite C. Layering
D. Rotating
179. Project management tools are used to
A. assist project managers and their 183. Two-way data communication that can be
teams in various aspects of project man- done simultaneously is
agement A. Simplex data communication
B. discuss schedule development with B. Duplex data communication
the help of Gantt charts, PERT, CPA, and C. Full Duplex data communication
critical chain scheduling
D. Half Duplex data communication
C. identify how to control changes to a E. Responsive data communication
project schedule and use software to man-
age time 184. In the TCP/IP network protocol, a port
D. define schedules and activities and dis- is a mechanism that allows a computer to
cuss activity duration estimation support multiple connection sessions with
other computers and programs on the net-
180. The following are the positive effects of work. Telnet using ports
ict and multimedia use in agriculture ex- A. Port 20
cept
B. Port 21
A. help agriculture increase the produc-
C. Port 23
tivity of crop
D. Port 25
B. improving marketing access
E. Port 80
C. opens up new business opportunities
around the world 185. is the file format for text.
D. Increasing the product cost and im- A. jpg
prove the quality of product B. doc
181. Project planning deals with the following C. midi
activities EXCEPT D. wma

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 364

186. Which is NOT a file format for recorded C. Filters


music D. Transforming
A. AAC
191. Switch(config-if) switchport trunk al-
B. MP3 lowed vlan add 10, The command above
C. GIF is the command for
D. none of above A. cancels the trunk between switch 1
and switch 2
187. Which “rule” should you follow to avoid

NARAYAN CHANGDER
using too much text on your slides? B. delete switch 1 configuration

A. 6 x 6 C. create a switch configuration 2

B. 7 x 7 D. create a switch configuration 2

C. 3 x 3 E. allowed vlan

D. 8 x 8 192. Choose the most correct answer to ex-


plain the application of multimedia in public
188. Currently, the use of computer networks places.
is very rapid. Almost all agencies use the
internet in their network. Thus, it is very A. Digital billboards-Plasma displays with
important to guarantee the level of secu- interactive overlays that enable direct
rity. In this case, the firewall has a very touch interaction
important role because B. Plasma poster-Primarily used for ad-
A. Is a type of network security that has vertising, but they can also serve public
a high level of security service purposes

B. Serves to regulate, filter, and control C. Information kiosk-Multimedia will be-


data traffic that is permitted to access pri- come available at stand-alone terminals
vate networks or kiosks to provide information and help

C. Can prevent all kinds of cyber crime at- D. Plasma poster-Multimedia will be-
tacks come available at stand-alone terminals
or kiosks to provide information and help
D. Is a network security that uses the
IEEE standard 193. Project execution is also known as
phase.
189. Chrome, Safari, Firefox and Internet Ex-
plorer are all examples of? A. closing

A. Browsers B. planning

B. Interpreters C. initiation

C. Compilers D. implementation

D. Web Authoring Software 194. The application is because it combines


many features.
190. A graphic designer needs to scale and ro-
tate a photograph. Which image editing A. integrated
technique should he use? B. application
A. Adjustment Layer C. virtual
B. Cropping D. related

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 365

195. Insufficient market research and under- C. Constrain Proportions


standing of customer needs leads to which D. Crop
gap in service quality?

PRACTICE BOOK» NOT FOR SALE


201. Below are three important technologies
A. Gap 1
contribute towards the advancement of
B. Gap 2 multimedia applications, except:
C. Gap 3 A. Knowledge-Based Intelligence Tech-
D. Gap 5 nology
B. Networking Technology
196. Which image file format can support both
animation and transparency? C. Coding and Compression Technology

A. BMP D. Storage and Computation Technology

B. GIF 202. Multimedia System should possess fol-


lowing features, except:
C. TIFF
A. Very high processing power
D. JPEG
B. Multimedia operating software to sup-
197. Virtual reality is environment. port multiple types of system
A. real C. File system capable of handling multi-
B. artificial media information
C. natural D. Efficient and High I/O Rate Device

D. normal 203. When QoS is implemented in a converged


network, which two factors can be con-
198. a high-speed real-time interface for serial trolled to improve network performance
bus and isochronous/synchronous data for real time traffic? (Choose two.)
transfer between enabled devices
A. packet addressing
A. USB
B. Delay
B. i.LINK C. packet loss
C. FireWire D. Jitter
D. none of above
204. Which of the followings are NOT continu-
199. Which raster image format is best used ous media elements?
for webpages but is not suitable for A. Audio
print?
B. 2-D animation
A. TIFF C. images
B. PNG D. 3-D animation
C. EPS
205. The title of a slide is entered into the ti-
D. BMP tle:
200. Which option is used to delete unwanted A. table.
areas of a graphic image? B. text box.
A. Cross Process C. placeholder.
B. Anchor D. slide master.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 366

206. A network engineer performs a ping test 210. Provides services to user applications.
and receives a value indicating the time it This layer is responsible for exchanging
takes for a packet to travel from source to information between computer programs,
destination device and back. What value such as e-mail programs, and other ser-
is appropriate to describe the illustration vices running on the network, such as
above? printer servers or other computer applica-
A. Bandwidth tions.
A. Presentation Layer
B. Jitter

NARAYAN CHANGDER
B. Session Layer
C. Latency
C. Application Layer
D. Priority
D. Transport Layer
207. Building a simple wireless computer net-
E. Network Layer
work at home and in a small office is quite
easy to do with the availability of various 211. The following parameters in QoS related
kinds of network devices, especially wire- to the average speed of the network in
less routers that are already integrated sending packets to the destination address
with modems. are
A. create a user profile and password A. Delay
B. create firewalls B. Jitter
C. create dhcp C. Throughput
D. create security profiles D. Network Access
E. fill ip statically 212. is not a multimedia element
208. If the IP number is not recognized in the A. Text
network, a message will appear? B. Data
A. Time to Leave C. Image
B. Time for Love D. Video
C. Time With you
213. The trunk switch works for
D. Request Time Output
A. Set internet connection
E. Request time Out
B. Connecting the same vlan with differ-
209. What is an disadvantage of a bitmapped ent switches
image? C. Set switch ports
A. They don’t look as realistic as vector D. Adding a new host
graphics.
214. Jamel wants to apply formatting to the
B. They are not as colourful.
placeholders in her slide presentation so
C. They have a small file size that they are consistent throughout the
D. They have a large file size because in- presentation. What should she use to ac-
formation has to be stored about every complish this?
pixel A. Slide layouts

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 367

B. Themes or designs 220. Statements below are related to image


C. Slide backgrounds quality. Which one is incorrect?

PRACTICE BOOK» NOT FOR SALE


D. Format painter A. Resolution is number of pixels to rep-
resent a single image.
215. Which object would you add to a slide to
help organize names and email address to B. Colour Depth is number of colours per
make it easier to read? pixel which also represents number of
colours supported.
A. Table
C. Higher resolution image can represent
B. Textbox
picture with more detail or display in
C. Rectangle larger dimension.
D. Bullet list D. Image size = resolution x colour
216. Storyboards can be used for the follow- depth
ing purpose EXCEPT
221. The end of each phase of the development
A. blue print for the entire project of a multimedia project is a natural place
B. trading purpose to set
C. communication tool A. prerequisites
D. conceptual model B. scopes
217. In Luk & Leyton’s extended Gap Model, C. contingencies
what dimension was added to the original D. milestones
gap model to give Gap 6 and 7?
A. Customer needs 222. the type of bandwidth whose frequency
B. Employee perception is used in radio signals in units of hertz
(Hz) is
C. Customer perception
A. digital bandwidth
D. None of the above
B. bandwidth downlink
218. Which of the following is an example of
a selection tool C. bandwidth uplink
A. Color Picker D. bandwidth analog
B. Brush E. bandwidth throughput
C. Move
223. When using IP 192.168.1.1/27, then
D. Sharpen the PC is configured as
219. A manufacturer makes chocolate bars. A. IP Address:192.168.1.1Subnet
All of the chocolate bars are passed Mask:255.255.255 128
through a machine to check for production B. IP Address:192.168.1.1Subnet
mistakes before being boxed. Mask:255.255.255 192
A. product development
C. IP Address:192.168.1.0Subnet
B. product recall Mask:255.255.255 192
C. quality assurance D. IP Address:192.168.1.0Subnet
D. quality control Mask:255.255.255 128

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 368

224. multimedia is a combination between 229. Define multimedia interactivity


multimedia technology and Internet tech- A. refers to the way users interact with
nology. others
A. CD-ROM
B. refers to two way communication
B. Web-based
C. refer to the way user interact with a
C. Tape-based program
D. TV-based D. refers to one way communication

NARAYAN CHANGDER
225. What program is needed to view web 230. “ font is what you use, and typeface
pages? is what you see.” Differentiate serif and
A. Browser Sans serif
B. Interpreter A. Sans Serif is Typeface that have
C. Compiler line/curve at the end of the character.
Serif is Typeface that does not have line/
D. Web Authoring Software curve at the end of the character.
226. Which raster image format produces a B. Serif is the type of writing whereas
large file size that does not lose quality, sans serif is the style of writing.
and is best used when saving photographs C. Serif is Typeface that have line/curve
for print? at the end of the character. San serif is
A. PSD Typeface that does not have line/ curve at
B. GIF the end of the character.
C. PNG D. Sans serif is the type of writing
whereas serif is the type of writing.
D. TIFF
231. What functionality is needed in a router
227. How many levels of priority are possible
to provide remote workers with VoIP and
when using class of service (CoS) marking
video conferencing capabilities?
on frames?
A. IPSec
A. 3
B. 8 B. QoS

C. 24 C. PPPoE

D. 64 D. VPN

228. Tom has created a vector graphic of a bas- 232. Which of the following is the field con-
ketball to put on his webpage. Regardless cerned with the computer controlled inte-
of how much the graphic is enlarged or re- gration of text, graphics still and moving
duced, the graphic definition and quality re- images, animation, sounds and any other
main the same. This graphic is: medium?
A. Resolution Independent A. Multimedia
B. Resolution Dependent B. Digital Multimedia
C. Lossy C. Multi Media System
D. Pixelated D. Digital Animation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 369

233. Under which condition does congestion A. Internet


occur on a converged network with voice, B. ToolBook
video, and data traffic?

PRACTICE BOOK» NOT FOR SALE


C. Software
A. if the request for bandwidth exceeds
the amount of bandwidth available D. Interactivity
B. if video traffic requests more band- 238. You have an image of a building but there
width than voice traffic requests are people standing on the far left side.
C. if voice traffic latency begins to de- You would like to remove those people.
crease across the network Which tool do you need?
D. if a user downloads a file that exceeds A. Cropping
the file limitation that is set on the server B. Clipping
234. Project closing is C. Snipping
A. processes performed to observe D. Cutting
project execution so that potential prob-
lems can be identified in a timely manner 239. You want to transform an image with
and corrective action can be taken. artistic effects. Which menu would you
look under?
B. the processes used to complete the
work defined in the project plan to accom- A. Filter
plish the project’s requirements B. Edit
C. the formal acceptance of the project C. View
and the ending thereof.
D. File
D. to plan time, cost and resources ade-
quately to estimate the work needed and 240. Which method can be used to rearrange
to effectively manage risk during project the order of slides in your presentation?
execution
A. Press SHIFT+UP ARROW to move the
235. Advantage of using vector image slide up one position.
A. Minimal support for transparency B. Right-click the slide and drag it to a
new position within the slide thumbnail
B. No background
panel.
C. Easily converted
C. Select Move Slide from the Format
D. Photo realistic menu.
236. These formats are known to exhibit crisp D. Drag the slide to a new position within
and clear images. the slide thumbnail panel.
A. Vector 241. Any program that carries out a specific
B. Raster task for a user is an
C. JPEG A. related
D. PNG B. user

237. refers to the way users communicate C. integrated


with a multimedia application or program. D. application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 370

242. In a QoS model, which type of traffic typ- B. Clone Stamp


ically affords the most preferential treat- C. Adjustment Layer
ment over all other application traffic?
D. Blend Mode
A. Web Traffic
B. Email 248. What’s 3D?
C. Voice Traffic A. the quality of being four-dimensional
D. File Traffic B. the quality of being two-dimensional

NARAYAN CHANGDER
C. the quality of being three-dimensional
243. Which of the following is NOT a multime-
dia production team members? D. the quality of a horizontal display reso-
lution
A. Audio specialists
B. Multimedia programmers 249. is a dynamic element.
C. Animators A. Text
D. Sales agents B. Video

244. What is the benefits od advantage multi- C. Hypertext


media? D. Graphic
A. Improve communication 250. which of the following is not a soft mea-
B. Resource intensive sure of service quality?
C. Limited interaction A. Consumer panel
D. Information overload B. Transaction analysis
245. What does HTML stand for? C. Mystery shopper
A. Hyper Text Modelling Language D. Cause and effect study
B. Heuristic Text Markup Language 251. is the process of giving the illusion of
C. Hyper Text Markup Language movement to objects.
D. Heuristic Text Modelling Language A. Programming
B. Animation
246. To connect 2 pieces of the same VLAN but
on different switches must use mode C. Event
A. Packing D. none of above
B. Trunking 252. The server that functions as a provider
C. Configurasi Terminal of access / exchange of data transfers be-
tween 2 computers is
D. Disable
A. Mail server
E. Desirable
B. Web server
247. A photo restoration company needs to re-
move a stain from a photograph. What C. Web browser
image editing technique should be used? D. FTP server
A. Gradient E. DNS server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 371

253. Software that can run on any hardware 258. parameter that describes a condition that
platform (PC, Mac, SunSparc, etc.) or soft- shows the total number of lost packets ie
ware platform (Linux, MacOS, Unix, Win-

PRACTICE BOOK» NOT FOR SALE


A. jitter
dows, etc.).
B. packet loss
A. Binary compatible
C. latency
B. Platform independent
D. rate
C. Cross platform
D. none of above E. delay

254. Which of the following is considered a 259. Which statement of WBS below is incor-
slide object? rect?
A. Placeholder A. WBS is useful for complex projects
B. Border B. WBS defines the work required to
achieve an objective
C. Paragraph
C. WBS provides timing of activities
D. Bullet
D. WBS is a tool for planning & schedul-
255. Which image file format is an uncom- ing a project
pressed raster file which may contain dif-
ferent depths of color depths per pixel, or 260. Brad is creating a flyer to promote Spe-
may be saved in grayscale? cial Olymipics. The flyer has a spiral path
A. PNG connecting the event name to the descrip-
tion. The spiral path is an example of a:
B. GIF
A. Smart Guides
C. JPEG
B. Stacking Order
D. BMP
C. Line
256. What is the name of the miniature slides
that appear along the left side in your pre- D. Shape
sentation software as you work on creat-
261. Which image file format should be used
ing your slideshow?
to save an image with a transparent back-
A. Thumbnails ground for use on a Web page?
B. Previews A. JPG
C. Snapshots B. BMP
D. Shortcuts C. TIFF
257. Janice created a collage of her friends for D. PNG
a school project. She used individual pic-
tures of each friend to create one picture. 262. Which file format would you use to cre-
Which editing feature did she use? ate a logo?
A. Cloning A. Bitmap
B. Scaling B. Raster
C. Layering C. Vector
D. Rotating D. PDF

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 372

263. Steve is creating a presentation that he 267. What controls the backgrounds, font
plans to use for in-person conferences, styles, font colors, and object styles for
Web conferences, and on his Web site. all slides within a presentation?
Why is a slide presentation a good choice A. A slide layout
for meeting his needs?
B. A master
A. The use of presentations as a way to
C. A style
communicate is declining, so he should
make multiple attempts to reach his audi- D. A theme

NARAYAN CHANGDER
ence. 268. Hypermedia is used to connect a multime-
B. Presentations can be viewed using a dia application to another
projection system, over the Internet, and A. text
as videos.
B. audio
C. He is using software that requires
C. graphic
the purchase of templates to create
professional-looking presentations. D. media

D. Presentations should be used more 269. Which of the following is a true state-
than once because they are often difficult ment about data compression?
to create. A. Data compression techniques can be
used to reduce the size of a file for stor-
264. What two fields are available in the IPv4 age or transmission
and IPv6 headers to mark packets for
QoS? (Choose two.) B. Data compression techniques can only
be used for certain types of data
A. The type of service
C. Data compression techniques cannot
B. Traffic Class be applied to files being transmitted over
C. Priority the internet.
D. none of above
D. VLan ID
270. Typeface is
265. Which image file format is the best for-
A. a family of graphic characters
mat to use for photographs on the Web?
(font) that usually includes many type
A. TIFF sizes and styles.
B. GIF B. Different fonts that does not have any
similarities
C. EPS
C. The letters that can be found on the
D. JPG keyboard face
266. By default, what chain is included in the D. none of above
proxy firewall filter feature
271. What is a Multimedia System?
A. input, output, forward A. Multimedia system is a field that sup-
B. scrnat, dstnat port the integrated processing of several
media types with at least one time depen-
C. prerouting, postrouting
dent or continuous media (e.g. video, au-
D. drop, reject dio).

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 373

B. Multimedia system is a system or ap- 275. Which option is used to specify how the
plication that support the integrated pro- canvas is modified?
cessing of several media types with con- A. Crop

PRACTICE BOOK» NOT FOR SALE


tinuous media (e.g. video, audio).
B. Constrain Proportions
C. Multimedia system is a system or ap- C. Cross Process
plication that support the integrated pro-
cessing of several media types with at D. Anchor
least one time dependent or continuous 276. Which image file format is a large raster
media (e.g. video, audio). It should allow file that is used when saving photographs
interactivity with the user. for print only?
D. Multimedia system is a system or ap- A. JPEG
plication that support the integrated pro- B. GIF
cessing of time dependent or continuous
media (e.g. video, audio). It should allow C. PNG
interactivity with the user. D. TIFF

272. Which of the following characteristics in- 277. Which of the following controls how each
dicates the amount of detail in a raster slide replaces the previous one?
graphic, or PPI? A. Transitions
A. Quality B. Collaborations

B. Size C. Animations
D. Movements
C. Resolution
278. You have been asked to design a logo for
D. Format
community organization. What kind of im-
273. The Toy Plane Company wants an ani- age would you create?
mated logo that will fly across the com- A. Raster
pany’s website home page. Which format B. Vector
will allow the image to be animated?
C. Transparent
A. Sail.ai D. Opaque
B. Sail.gif
279. This makes you think you really are
C. Sail.jpg flying to the moon.
D. Sail.pdf A. virtual
B. application
274. Amy is creating the artwork for the cover
of the yearbook. She wants to ensure that C. simulation
all of the graphics print in full so they must D. integrated
be on the:
280. Why would a high resolution picture you
A. Smart Guides took and then emailed to yourself not look
B. Artboard as crisp and have colors that were not ex-
actly the same?
C. Clipboard
A. the picture saved in the email con-
D. Path tained fewer pizels than the original

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 374

B. the picture saved in the email con- 285. Negative impact of using ICT & Multime-
tained more pixels than the original dia in Manufacturing
C. The picture saved in the email was en- A. reduce the product development cost
crypted
B. reducing the job opportunity for citizen
D. none of above
C. shorten a product’s time to market
281. Paula is taking pictures of her vacation to D. stay ahead of the competition
post on the family website. She wants her

NARAYAN CHANGDER
family to be able to access the files from 286. Digital audio quality can be increased by
various devices and browsers. Which fac- increasing the following:
tor is she considering? A. Bits per sample
A. Color Depth B. Sampling rate
B. Compression
C. Compression ratio
C. Portability
D. Number of channels
D. Transparency
287. Video compression is performed to re-
282. DMAIC in Six Sigma stands for duce the size of stored video and data rate.
A. Define-measure-analyze-improve- Which of the following statement is cor-
control rect?
B. Define-measure-analyze-improve- A. Video stream can be compressed be-
create cause it contains temporal redundancy
C. Design-measure-analyze-improve- that can use intra-frame compression.
control B. Video stream can be compressed be-
D. Define-manufacture-analyze-improve- cause it contains spatial redundancy that
control can use inter-frame compression.
C. MPEG-1 produces compressed data
283. What is the impact of using multimedia in rate of 1.5 Mbps.
our life?
D. Compressed data rate of MPEG-2 for-
A. develop higher-order thinking skills
mat is 2-4 Mbps.
B. motivate to do things in own way
288. file format for graphic
C. It represents stores and transmits all
information digitally A. .exe
D. negatively influence their behavioral B. png

284. Which of the following is NOT a charac- C. .docx


teristics of Multi Media System? D. none of above
A. They are computer controlled.
289. Windows movie maker is a editor.
B. The information they handle must be
A. audio
represented manually.
B. video
C. Multi media are integrated.
D. The interface to the final user may per- C. text
mit interactivity. D. graphic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 375

290. Which term is used to describe bitmap im- 294. A collection of pages containing text and
ages? images typically presented on screen.

PRACTICE BOOK» NOT FOR SALE


A. EPS A. Slideshow
B. SVG B. Background
C. Vector C. Theme
D. Raster D. Animations

291. this is element of multimedia except 295. To receive signal, a translator is needed
to decode signal and encode it again at a
A. text
A. High Quality
B. audio
B. Lower Quality
C. graphic
C. Same Quality
D. movie
D. Bad Qualit
292. Define video
296. What is the default queuing method used
A. A source of presenting highly effective on the LAN interfaces of Cisco devices?
information
A. FIFO
B. A product of an The illusion of motion
created by the consecutive display of im- B. WFQ
ages of static elements C. CBWFQ
C. product of an illusion of movement D. LLQ
made up from series of still images when
it shown rapidly 297. Mike is creating a flow chart to show the
steps to change a tire. The flow chart
D. A product of recording moving images
will be viewed in various sizes. Why
using a camera or video machine
should the flow chart be created as a vec-
293. Maria is creating a presentation to high- tor graphic?
light her company’s latest product. It’s a A. Can support high color depths
very long presentation, and she wants to
B. Resolution Dependent
be sure it’s as perfect as she can make it.
What step does she need to take before C. Retain original quality when scaled
submitting it to her boss? D. Large File Sizes
A. Add music or videos so it doesn’t get
boring. 298. Mary is creating a basic line art graphic.
She does not want to save the graphic as
B. Use the spell-check and automatic cor- a GIF or TIFF file. Whatfile format would
rections tools to check for spelling, gram- be the best alternative?
mar, and punctuation.
A. PSD
C. Make the font different for every slide,
to add interest. B. PDF
C. JPEG
D. Change the formatting using a slide
master. D. PNG

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 376

299. Which of the following are dynamic ele- C. after, before


ments in Multimedia? D. in between, after
A. Video
305. Which of the following is FALSE about
B. Text lossy compression?
C. Animation A. data quality will remain the same as
D. Image original data
E. Audio B. JPEG is using lossy compression

NARAYAN CHANGDER
C. Data will be loss to certain extend
300. Term hypertext invented by
D. Compression rate is higher compared
A. Mark Antony
to lossless
B. Ted Nelson
306. A bride wants the photographer to make
C. Mathew Causy
some of her wedding photos black and
D. none of above white. Which image editing technique
should the photographer use?
301. Which of the following options can be
used to format text on a slide? A. Adjustment Layer
A. Fill Color B. Cropping
B. Align C. Aspect Ratio

C. Line Color D. Transparency

D. Group 307. What is lossy compression?

302. Access to information in the multimedia A. Losing most of the information in the
content is flexible in a interactivity. compression process

A. hypertext B. Losing the quality in the compression


process
B. hypermedia
C. Losing the size in the compression pro-
C. linear cess
D. non-linear D. none of above
303. Ports 80 and 443 are used for respec- 308. Which “lossless” image type is best
tively suited for Web pages, but is not suitable
A. TCP dan ICMP for print?
B. HTTP dan HTTPS A. PSD
C. ICMP dan TCP B. TIFF
D. HTTPS dan HTTP C. SVG
D. PNG
304. A project schedule is created the
scope planning has created the WBS and 309. Project constraints are (select all that
project resource planning. apply)
A. before, after A. time
B. when, over B. cost

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 377

C. quality 315. Which effect is added to text and objects


D. scope so they will be revealed or appear and
disappear on the slide when you click the

PRACTICE BOOK» NOT FOR SALE


310. Multimedia means the use of more than mouse button?
one in communication. A. Animation
A. file B. Transition
B. media C. Link
C. sound D. Theme
D. number
316. File formats are just a way of storing
311. Virtual reality is created by on disk so that certain software knows
how to interpret it
A. computer hardware
A. data types
B. computer software
B. numbers
C. computer hardware and software
C. 0s and 1s
D. computer hard disk
D. none of above
312. E-Government is a government services
through information and communication 317. Still images are generated in two (2)
technologies (ICT) to provide better public ways:bitmap and vector drawn. State the
services to citizens and businesses. It can advantage of using bitmap image.
be further categorized as Government-to- A. Easily converted
Citizen (G2C) or B. Larger file size
A. Government-To Business C. Minimal support for transparency
B. Government-To Banking D. Easily scalable
C. Government-To People
318. Which of the following is NOT true about
D. Government-To World GIFs?
313. interactivity is a two-way communi- A. They are only animated
cation process. B. Often used for memes
A. Linear C. They are low quality
B. Non-linear D. none of above
C. Hypertext 319. Briefly describe what is online marketing
D. Hypermedia A. Online marketing is a set of powerful
314. Kathryn is combining a collection of tools and methodologies used for promot-
spring break pictures into a collage. Which ing products
image editing technique should she be us- B. Online marketing is a set of powerful
ing? tools and methodologies used for promot-
A. Clone Stamp ing services through the internet

B. Layering C. Online marketing is a set of powerful


tools and methodologies used for promot-
C. Rotating ing products and services through the In-
D. Scaling ternet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 378

D. Online marketing is a set of powerful email > Check Cache on Disk > Click Ap-
tools and methodologies used for promot- ply > OK
ing products through the Internet C. IP > Proxy > On the Extra Tab: Fill
320. What shape are all file formats? Cache Administrator with Admin email >
Check Cache on Disk > Click Apply > OK
A. oval
D. IP > Proxy > On the Action Tab: Fill
B. rectangular Cache Administrator with Admin email >
C. circles Check Cache on Disk > Click Apply > OK

NARAYAN CHANGDER
D. none of above 325. Which statement is true about using
graphics in presentations?
321. Which image format is commonly used for
digital photos, and Web and print publish- A. Graphics are pretty but cannot commu-
ing? nicate messages.
A. DRW B. Graphics can be used only if they are
your own original creations.
B. Vector
C. Graphics should not be used to attract
C. SVG attention.
D. Raster D. Graphics can be used to evoke emo-
tions.
322. Jack would like to apply a stained glass
effect to his photograph. Which image 326. When testing your product, you should:
editing technique should he use?
A. Concentrate on software configuration
A. Adjustment Layer
B. Focus on making the product work per-
B. Cropping fectly on one system
C. Filters C. Spend time configuring and testing
D. Transparency various platforms
D. Examine the bytes of data in the sector
323. The multimedia element that explains
idea through a picture is called 327. What is the leading source of photo and
A. text graphics around the globe?
B. graphic A. Stock Photo Library
C. animation B. World Wide Web
D. video C. Online Video Clips
D. Scanned Images
324. What is the sequence of steps for config-
uring a proxy server on a proxy? 328. What is the advantage of a vector im-
A. IP > Web Proxy > On the General Tab: age?
Fill Cache Administrator with Admin email A. Images can be scaled up or down with
> Check Cache on Disk > Click Apply > no loss of quality
OK B. Individual pixels can be changed,
B. IP > Web Proxy > On the Advanced which makes very detailed editing pos-
Tab: Fill Cache Administrator with Admin sible

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 379

C. They have a large file size B. Choose music that fits the atmosphere
D. none of above you wish to create.

PRACTICE BOOK» NOT FOR SALE


C. Use as many special effects as you
329. A network administrator is deploying can.
QoS with the ability to provision a dedi-
cated queue for voice traffic so that voice D. Always test a project with potential
traffic is forwarded before network traf- users.
fic in other queues. Which queuing method
334. What are the 5 examples of multime-
will be the best choice?
dia?
A. FIFO
A. deeper understanding
B. LLQ
B. more appealing
C. according to
C. easy to use
D. WFC
D. Text, image, audio, video and anima-
330. Which keyboard key is used to exit pre- tion
sentation mode?
335. There are 5 IPs as follows: 1)
A. Break
192.168.99.12) 116.123.99.23)
B. Home 192.168.99.994) 192.168.90.985)
C. Esc 116.168.90.1 IPs that can be connected
to each other are shown in the number
D. End
A. 1 and 2
331. In what field/area of Multimedia can sim-
B. 2 and 5
ulate the effects of viruses and diseases to
the human body to clearly find and develop C. 1 and 3
ways of preventing them. D. 1, 3, and 4
A. Education
336. The following is not a Qos parameter
B. Entertainment
A. rate
C. Businesses
B. latency
D. Medicine
C. packet loss
332. TIFF files are best used for:
D. jitter
A. Both Web and print publishing.
E. distortion
B. Web publishing only.
C. Neither web publishing nor print pub- 337. These images are those that you trans-
lishing. fer from printed photos and graphics using
scanning devices which you can transfer to
D. Print publishing only.
your computer for modification.
333. When using sound elements in your mul- A. Scanned Images
timedia project, which of the following
B. Personal and Professional Photos
statements is not true?
A. Always provide a toggle switch to dis- C. Stock Photo Library
able the sound. D. Online Stock Photos

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 380

338. The multimedia which is delivered 343. Which of the following is a vector graph-
through Web pages is called multi- ics format?
media.
A. SVG
A. TV-based
B. JPG
B. CD-based
C. Tape-based C. PPI
D. Web-based D. DPI

NARAYAN CHANGDER
339. What are ways that you can share your 344. Multimedia enhances the information for
Presentation so others can view it?
A. better communication and understand-
A. On a shared network drive only
ing
B. Published to the Internet only
B. poor communication and understand-
C. Published to the Internet or Cloud, pro-
ing
jector, or emailed to someone
D. Emailed to someone or on a projector C. misunderstanding

340. Who developed the Gap model of Service D. none of above


quality?
345. What term is used to describe how clear
A. Christian Gronroos or see-through an object appears?
B. Parasuraman, Zeithaml & Berry
A. Clarity
C. Zeithaml & Bitner
B. Resolution
D. Luk & Leyton
C. Background
341. Project scheduling tools include the fol-
lowing (select all that apply) D. Transparency
A. Gantt chart is a common tool used for
displaying project schedule information 346. Trent has scanned several digital pho-
tographs. He wants to add the scanned
B. PERT analysis is a means of evaluating photos to his Web site. He has asked you
schedule risk on projects if he should save the scanned images as
C. Critical path analysis is an important vector or raster. Which statement is the
tool for developing and managing project best response?
schedules
A. Scanned images can only be saved as
D. Critical chain scheduling is a technique raster images by using specialized conver-
that accounts for resource constraints sion software.
342. Zero Defections is a component of which B. Scanned images can only be saved as
of the following tools of improving Service vector images by using specialized conver-
Quality? sion software.
A. Pareto Chart C. The raster file format should not be
B. Fishbone chart used for Web publishing.
C. Blueprinting D. The vector file format is best used with
D. TQM digital photographs.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 381

347. Phil is opening a new gym and wants an A. The network device sends the received
expert to design his logo. Which file for- traffic immediately.
mat would the developer use to save the

PRACTICE BOOK» NOT FOR SALE


B. The network device will drop the arriv-
artwork? ing packets.
A. GIF C. The network device drops all traffic in
B. JPEG the queue.
C. AI D. The network device queues the re-
ceived traffic while sending previously re-
D. PNG ceived traffic.
348. All the following statements are correct 352. Project management skills include
about video, except: (select all that apply)
A. Video is captured and recorded as a se- A. Planning
quence of images. B. Communication
B. Each image captured from video is C. Delivering results
known as frame.
D. Monitoring risks
C. Digital video is recorded as ordered se-
E. Developing the system
quence of analogue still image or frame.
D. Recording and playback speed of video 353. Lacie wants to make a picture of a tree
is measured in frame per second (fps). look taller than it really is. Which image
editing feature should she change?
349. Kevin is creating a detailed graphic for his A. Aspect ratio
t-shirt business. Which of the following
B. Filter
tools should he use tohave anchor points,
paths and allow the creation of straight C. Gradient
lines, bezier lines, and shapes in countless D. Rotating
combinations?
354. Which queuing method provides user-
A. Selection Tool defined traffic classes where each traffic
B. Pen Tool class has a FIFO queue?
C. Pathfinder Tool A. FCFS
D. Image Trace Tool B. WFQ
C. CBWFQ
350. Movements, like objects spinning and fly-
D. FIFO
ing across the screen are called
A. text 355. Which of the following will allow you to
have an image on that allows the back-
B. video ground for other images to show through
C. graphic when placed on top of it?
D. animation A. Transparency
B. Opaque
351. What happens when the memory queue
of a device fills up and new network traffic C. Blur
is received? D. Clear

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 382

356. Which image file format creates a large 361. State two (2) examples of nonlinear in-
raster file best used for print but not rec- teractivity product
ommended for use on the Web? A. Movie and Website
A. PNG B. Movie and clip video
B. GIF C. Website and courseware
C. JPG D. Website and Clip video
D. TIFF

NARAYAN CHANGDER
362. Which image format is best used for pho-
357. A photographer would like to apply a tographs and offers a small file size?
brick wall texture to the background of A. PNG
a photo. What image editing technique
B. GIF
should be used?
C. BMP
A. Fill
D. JPEG
B. Clone Stamp
C. Adjustment Layer 363. Which option is used to maintain width
and height rations when resizing an im-
D. Blend Mode age?
358. Sarah is a designer of wedding invita- A. Constrain Proportions
tions. She emails prototypes of her work B. Anchor
to potential clients. What file format
should she choose to ensure the fonts and C. Free Transform
graphics are embedded in her files? D. Opacity
A. JPEG 364. which of the following is a file format for
B. GIF a multimedia element of video?
C. TIFF A. wav
D. PDF B. wmv
C. wma
359. Mary is using vector graphics to illustrate
weather patterns. To give the graphics a D. bmp
customized outline she needs to adjust the: 365. An athletic company needs to save their
A. Stroke logo in a format that supports 16 million
B. Fill colors and transparency for their website.
Which file is the best option to use?
C. Swatches
A. ball.jpg
D. Gradients
B. ball.gif
360. What do you learn from this topic? C. ball.ai
A. increase positive emotion D. ball.png
B. improved problem solving
366. People who create multimedia projects
C. word exploration also known as
D. access to give information A. Multimedia Developer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 383

B. Multimedia Title D. Visually inspecting two cars of each


C. Multimedia Project colour for defects in the paintwork

PRACTICE BOOK» NOT FOR SALE


D. none of above 371. Music and speech can be stored in the
computer as files.
367. The working tool used to connect fiber op-
tic cables is A. audio
A. fusion splicer B. video
B. stripper/miller C. text
C. cleaver D. graphic
D. Optical Power Meter (OPM) 372. Raster images are best used for:
E. Optical Time Domain Reflectometer A. photos
(OTDR)
B. illustrations
368. Which slide layout is automatically ap-
C. logos
plied when you create a new slide using
the New Slide command? D. typography
A. Title and Body 373. Which of the following statements re-
B. Title and Two Column garding animation in a slide use is true?
C. Title Only A. An object can have up to three stacked
D. Title Slide animations.
B. Animations occur On Click by default.
369. Which of the following is the best way
to remember the points you want to C. Animations can be set to occur when a
make during the presentation of your slide specific key is pressed.
show? D. A slide can only have one animation.
A. Memorize all of the content.
374. The Agency/Organization that issues the
B. Use talking points as the slide text and 802.11 standard is
then read each slide.
A. ISO
C. Add speaker notes to each slide.
B. ETSI
D. Add talking points in text boxes off the
slides. C. IEEE
D. TIA
370. Which of the following would be an ex-
ample of quality assurance activity for a E. IETF
car manufacturer?
375. An athletic company wants to use an ani-
A. Driving every tenth car to test that the mated graphic on their website. Which file
brakes are working correctly is the best option to use?
B. Holding a meeting with production op- A. ball.jpg
eratives on how to improve the manufac-
B. ball.gif
turing process
C. Increasing the amount of money that C. ball.ai
the operations function can spend D. ball.png

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Introduction 384

376. Brian hired a developer to create, save D. generally consists of estimating time
and archive an original artwork for his and cost for activities
new lawn service. Which file format
would the developer use to save the art- 380. Bob is drawnig a diagram to lay out his
work? vegatable garden. He uses paths to show
where the rows will be planted. At the
A. GIF
start and end of each path there is a/an:
B. JPEG
A. Anchor Point

NARAYAN CHANGDER
C. AI
B. Line Segment
D. PNG
C. Path
377. Before you begin developing any multi-
D. Smart Guide
media project, you should not:
A. Developa system for communication 381. How does multimedia affects your life as
between you, the client, and the team. a student?
B. Organize a method for tracking the re- A. learning process
ceipt ofthe material.
B. Create new friendship
C. Establish a management structure
C. better knowledge
withmilestones.
D. Accept unlimited feedback and modifi- D. provide opportunities
cations.
382. The best point to do focus group testing
378. Sharing an image online generally re- is with the
quires which of the following? A. concept
A. Low resolution B. prototype
B. High resolution C. beta
C. Blurring
D. gold master
D. Kaleidoscope
383. The cause of poor QoS is
379. Project monitoring
A. Rate
A. consists of the processes used to com-
plete the work defined in the project plan B. Packet loss
to accomplish the project’s requirements C. Jitter
B. consists of those processes per- D. Latency
formed to observe project execution so
that potential problems can be identified E. Noise
in a timely manner and corrective action
can be taken 384. Who conceptualized the 80:20 principle?

C. involves coordinating people and re- A. Zeithaml


sources, as well as integrating and per- B. Parasuraman
forming the activities of the project in ac-
C. Pareto
cordance with the project management
plan D. Ishikawa

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 385

385. Katie is touching up a photograph and D. Lingo


needs to replace the blemishes on her skin
with an area that is clear. Which image 388. Which queuing algorithm has only one

PRACTICE BOOK» NOT FOR SALE


editing technique will Katie use? queue and treats all packets the same?

A. Cloning A. CBWFQ

B. Cropping B. LLQ

C. Layering C. FIFO

D. Rotating D. according to

389. The following are the advantages of


386. The general rule of thumb when working
VoIP, namely
with computers and new technology under
a deadline is that everything will: A. Voice quality is not as clear as the
PSTN network
A. require resourcesthat exceed the bud-
get B. There is a pause in communication
B. go according to plan C. User restrictions
C. take longer to dothan you think it will D. Custom configuration
D. be manageable by theproduction team E. No additional fees required

387. a sequencer for displaying, animating, 390. Which of the following can be applied
and playing Cast members, and it is made to text and objects so that they can be
up of frames that contain Cast members, revealed on the slide when you click the
tempo, a palette, timing, and sound infor- mouse button?
mation A. Movements
A. Cast B. Collaborations
B. Score C. Transitions
C. Stage D. Animations

8.2 COMPRESSION
1. Which is bigger? D. none of above
A. MB (Megabyte) 3. How many bytes are in a gigabyte?
B. TB (Terabyte) A. 1, 000
C. GB (Gigabyte) B. 1, 000, 000
D. KB (Kilobyte) C. 1, 000, 000, 000
2. These files are still usable even when data D. 1, 000, 000, 000, 000
has been removed during compression.
4. What would be the best file formats to
A. Lossy compression choose for a photograph?
B. Lossless compression A. PNG
C. Both lossy and lossless compression B. JPEG

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 386

C. MP3 D. Eliminates unnecessary information in


D. MP4 a file to reduce file size

E. GIF 10. is a problem solving approach (typi-


cally an algorithm) to find a satisfactory
5. Lossy or lossless? This type of compres- solution where finding an optimal or exact
sion does not get rid of any data solution is impractical or impossible.
A. Lossy A. Compression

NARAYAN CHANGDER
B. Lossless B. Heuristic
C. Both C. Algorithm
D. none of above D. none of above
6. Which of the following is not an image 11. What is a reason why you need a codec?
file?
A. To play movies
A. PNG
B. To create JPG images
B. JPEG
C. To get onto the internet
C. Bitmap
D. To search for files
D. MPEG
12. The redundancy is zero when
7. What is lossless compression?
A. The probabilities are positive powers
A. No information is lost but file size is in-
of two
creased
B. The probabilities are negative powers
B. There is no loss of information at all
of two
after compression
C. Both
C. Files which have the exact same data
after compression D. None of the above
D. Compression involves an algorithm 13. Lossy compression
8. Where does the user work with files and A. Permanently removes data from a file
programs on a computer? B. Always leads to a noticeable loss of
A. ROM quality
B. BIOS C. Aims to remove redundant data
C. RAM D. Can return the original file to its origi-
D. Hard Disk nal quality
E. Would be a sensible choice for a music
9. What does Lossy Compression do to download site.‘
files?
A. Increases the file size and keeps the 14. Lossy compression Choose 3
same quality A. Permanently removes data from a file
B. Eliminates no information at all B. Always leads to a noticeable loss of
C. Decreases the file size and keeps the quality
same quality C. Aims to remove redundant data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 387

D. Can return the original file to its origi- 20. Which of these are Lossy file type.
nal quality A. MP3

PRACTICE BOOK» NOT FOR SALE


E. Would be a sensible choice for a music B. FLAC
download site.‘
C. Audio
15. Lossless compression does what? D. none of above
A. Encrypts data
21. Which bit is reserved as a parity bit in an
B. Re-codes data ASCII set?
C. Erases data A. Sixth
D. Replicates data B. Seventh

16. Compressed files consume less storage C. Eighth


space and transmit than uncompressed D. Ninth
files
22. Lossy or lossless? The file size is reduced
A. much more slowly by making the whole file smaller
B. much more quickly A. Lossy
C. larger B. Lossless
D. more information C. Both
17. What does redundant mean D. none of above
A. Compression 23. Which of the following can use lossless
B. Not required compression?

C. Repeated A. Word document

D. Expanded B. Audio file


C. Video file
18. How is the resolution of an image calcu-
D. Image file
lated?
E. All of them
A. Width in pixels * height in pixels
B. Colour depth * number of pixels 24. File compression can be lossy or lossless.
Lossy compression works by removing or
C. Number of pixels squared simplifying some of the detail from image
D. Sample rate * sample resolution * or sound data so that the file becomes
length in seconds smaller. How does a lossless compression
reduce file size?
19. Which of the following is not stored as
A. It removes and throws away some of
Metadata about an image?
the information.
A. Height
B. It converts repeating values into an en-
B. Colour Depth coded form that takes less space.
C. Resolution C. It relies upon a link to the internet.
D. Number of people in the image D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 388

25. I compress a 400GB file to 80GB. What is C. .xls


my % compression? D. .wav
A. 80%
31. The idea with wavelets is to represent a
B. 40%
complicated function by
C. 20%
A. simple basic functions
D. 60%
B. sinus functions
26. Application of LZW

NARAYAN CHANGDER
C. lines
A. GIF
D. square functions
B. Zip
C. PNG 32. Colour depth defines

D. All of the above A. How many bits are needed to store


each pixel
27. Which of the following codecs is also a con-
B. How many pixels are in an image
tainer?
C. The file size of a bitmap image
A. MP4
B. Bink D. The sample rate of sound

C. AAC 33. I write a poem 100 characters long. I com-


D. MP3 press this to a string that is 30 characters
long and a “key” that is 10 characters
28. What is Lossless Compression? (4-6) long. What is my % compression?
A. No information is lost but file size is in- A. 30%
creased
B. 40%
B. There is no loss in information at all af-
ter compression C. 70%
C. Files which have the exact same data D. 60%
after compression
34. The Lines in a Binary tree are known as
D. Compression that involves an algo- what
rithm
A. Nodes
29. Which of the following are not in a com- B. Leaf
pressed format?
C. Branch
A. JPEG
D. Stem
B. MPEG
C. Bitmap 35. Select the advantages for lossy compres-
D. MP3 sion (more than one answer!)
A. Makes the file much smaller
30. What file extension can be used to save
raster images? B. Will send much quicker
A. .jpeg C. A very simple algorithm
B. .doc D. The quality will not be affected much

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 389

36. A programmer is writing a system that is 41. compression is another technique that
intended to be able to store large amounts changes the original file a little bit.
of personal data. As the programmer de- A. Lossy

PRACTICE BOOK» NOT FOR SALE


velops the data system, which of the fol-
B. Lossless
lowing is LEAST likely to impact the pro-
grammer’s choices in designing the struc- C. Compressed
ture of the system? D. File
A. Maintaining privacy of the information 42. How do compression programs reduce file
stored in the data set. sizes
B. Scalability of the system. A. Removes sections of text
C. Structuring the metadata of the infor- B. squeezes information into smaller bits
mation for analysis.
C. Removes spaces
D. The frequency of a particular item oc-
D. Re-codes common information
curring in a data set.
43. An analogue to digital converter takes the
37. Compression packages which use an LZ77- analogue singal from a microphone and
based algorithm followed by a variable- converts it to a rapid sequence of digital
length coder. values. This process is called
A. PKZip A. tasting
B. Zip B. sampling
C. PNG C. measuring
D. All of the above D. frequency
38. JPEG stands for 44. Lossy or lossless? This type of compres-
A. Joint Photo Exempted Grade sion makes the file smaller
A. Lossy
B. Joint Photographic Experts Group
B. Lossless
C. Junior Photographic Export Group
C. Both
D. none of above
D. none of above
39. Which one of these codecs is commonly
used to make sound in games? 45. Which of the following file formats is used
for video?
A. Quicktime
A. MPEG
B. VP9
B. MP3
C. MP4
C. BMP
D. Bink D. VIDE
40. How many bytes are in 2MB? 46. How many bits are used in ASCII?
A. 2, 000000 (2 million) A. 16
B. 2000 (2 thousand) B. 1
C. 2, 000, 000, 000 (2 billion) C. 7
D. none of above D. 8

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 390

47. Milan took a photograph with her high res- C. Quicktime


olution digital camera. Then, she emailed D. AAC
a copy of the picture to herself to use in
a school project. When Milan downloaded 51. What would be the best file formats to
the picture from her email, she noticed that choose for a video file?
it did not look as crisp and the colors were A. PNG
not exactly the same. Which of the fol-
lowing could be a possible explanation for B. JPEG
difference in image quality?

NARAYAN CHANGDER
C. MP3
A. The picture saved in the email con- D. MP4
tained fewer pixels than the original im- E. GIF
age.
B. The picture saved in the email con- 52. Asymmetrical encryption techniques
tained more pixels than the original im- choose 2 possible answers
age. A. Are the most secure types of encryp-
C. The picture saved in the email was en- tion
crypted. Data encryption causes informa- B. Use a single key to encode/decode
tion loss. C. Use multiple keys to encode/decode
D. The picture saved in the email was en- D. uses different WiFi channels for each
crypted. Milan needs to decrypt the pic- secure message
ture to restore the original image quality.
53. What is the term used to define what must
48. FLAC and WAV are both examples of be known about a bitmap, for it to be rep-
A. Audio files using lossy compression. resented accurately?
B. Audio files using lossless compres- A. Microdata
sion. B. Metadata
C. Video files using lossy compression. C. Megadata
D. Video files using lossless compres- D. none of above
sion.
54. Vector images are used mostly for:
E. Image files using lossy compression
A. photography
49. Bitmap (.bmp) files use which of the fol-
B. digital logos or illustrations
lowing types of compression?
C. newspaper layouts
A. WinZip
D. typesetting
B. Lossy
C. Lzip 55. What is the bit rate?
D. Lossless A. the number of bits used per second of
audio
50. Which of the following is NOT a video B. the number of bits available for each
file? clip
A. MP4 C. uses between 8 and 32 bits per char-
B. MOV acter

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 391

D. a method of converting an analogue B. The data is transformed to always


sound signal into a digital file make it smaller. It can always be recon-
structed back to the original.

PRACTICE BOOK» NOT FOR SALE


56. LZ78 has compression but very de-
C. The data is transformed to usually
compression.
make it smaller. It cannot always be re-
A. fast, slow constructed back to the original.
B. slow, fast D. The data is transformed to always
make it smaller. It cannot always be re-
C. None of these
constructed back to the original.
D. none of above
61. Which of the following would not be suit-
57. Which one of these files is NOT good to able for Lossy Compression?
use on a website? A. Images
A. JPG B. Music
B. RAW C. Videos
C. GIF D. Text
D. PDF 62. What image file format are used for short
animations
58. The more compressed the file, the more no-
ticeable that data has been removed. A. PNG
A. Lossy compression B. RAW

B. Lossless compression C. TIFF


D. GIF
C. Both lossy and lossless compression
D. none of above 63. Based on your experience with text com-
pression, which of the following sentences
59. Adaptive dictionary- would compress the BEST?
A. holding strings previously found in the A. The quick brown fox jumped over the
input stream lazy dog.
B. sometimes allowing the addition of B. Buffalo buffalo Buffalo buffalo buffalo
strings but no deletions buffalo Buffalo buffalo.
C. allowing for additions and deletions of C. How much wood would a woodchuck
strings as new input symbols are being chuck if a woodchuck could chuck wood?
read D. JavaScript scripts are actually differ-
D. Both (A) and (B) ent scripts than Java scripts.

E. Both (A) and (C) 64. Binary notation uses only 0-1. The deci-
mal system uses
60. What is the most important quality of loss-
A. 1-10
less compression?
B. 0-9
A. The data is transformed to usually
make it smaller. It can always be recon- C. 1-100
structed back to the original. D. 0 to infinity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 392

65. I compress a 20MB file to 15MB. What is C. Download MKV player software
my % compression?
D. Use an Android phone
A. 15%
B. 5% 71. Which of the following are sound file
types?
C. 25%
A. MP3
D. 75%
B. FLAC
66. Once the file has been compressed, it can-

NARAYAN CHANGDER
not be decompressed back to the original C. AAC
file. D. JPEG
A. Lossy compression
B. Lossless compression 72. Which of these are lossless file type.

C. Both lossy and lossless compression A. MP3


D. none of above B. PNG

67. These files will remove data in the com- C. JPEG


pression process in order to make the file D. none of above
smaller
A. Lossy compression 73. An alphabet consist of the letters A, B, C
and D. The probability of occurrence is P(A)
B. Lossless compression
= 0.4, P(B)= 0.1, P(C) = 0.2 and P(D) =
C. Both lossy and lossless compression 0.3. The Huffman code is
D. none of above A. A = 0 B = 111 C = 110 D = 10
68. Which type of compression would a pro- B. A = 0 B = 11 C = 10 D = 111
gram need to use?
C. A = 0 B = 111 C = 11 D = 101
A. Lossy compression
D. A = 01 B = 111 C = 110 D = 10
B. Lossless compression
C. Doesn’t matter. It can use either lossy 74. How many bytes are in a megabyte?
or lossless compression. A. 100
D. none of above
B. 1000
69. What piece of hardware would you use to C. 1, 000, 000
input sound into a computer?
D. 1, 000, 000, 000
A. Speaker
B. Analogue to digital converter 75. In modern technology what unit of mea-
C. Microphone surement would be used for screen size?
D. Digital to analogue converter A. Pixel per inch(PPI)

70. What must you do to play MKV files? B. Dots per inch(DOP)
A. Connect to the Internet C. Pixels per metre(PPM)
B. Use Windows Media Player D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 393

76. What are the advantages of MIDI format? C. Lossy


Select all that apply. D. Lossless

PRACTICE BOOK» NOT FOR SALE


A. Compact
81. Run-length encoding
B. Can listen to it anywhere
A. is Lossless
C. Easy to modify
B. is Lossy
D. Can change instruments
C. Can only be used for text
77. Which image type is best for internet ani- D. Records the number of repeats of an
mations? individual element
A. GIF E. Can be used for a wide variety of file
B. TIFF types
C. BMP
82. B is how many bytes?
D. JPG
A. 3, 500
78. Increasing the sample rate of a recording B. 3, 500, 000
will result in
C. 3, 500, 000, 000
A. Higher-quality sound recording
D. 350, 000
B. Increased file size
83. Which is a disadvantage of your file being
C. Better compression
lossy?
D. Higher colour depth
A. reduced file size
E. Increased amplitude
B. reduced download size
79. Give three reasons why file compression C. quality loss
is useful
D. easy uploading
A. Compressed files require less storage
space than uncompressed ones 84. What is compression?
B. Compressed files upload and down- A. A method by which a file may be con-
load faster than uncompressed ones verted to another
C. Compressed files enable online B. A method by which a file is reduced to
streaming services to provide a good save space
transfer speed and reduce the risk of C. A method to minimize the time for a file
buffering to be download
D. Analog-to-digital converters often D. A method by which you press down on
have a file size limit for attachments so something hard
compressing a file means that you are
less likely to hit that limit 85. Information is the

80. What is an SVG image file and what type A. data


of compression does it use? B. meaningful data
A. Bitmap image file C. raw data
B. Vector image file D. Both A and B

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 394

86. How do you calculate the number of bits 91. Which of the following is not true if you
of a body of text in ASCII? increase the sample rate?
A. Number of characters * 7 A. Better quality of recording
B. Number of characters (including B. Needs greater storage space
spaces) *7 C. Larger file size
C. bits in Huffman * 7 D. Decrease in quality
D. bits in Huffman / 7

NARAYAN CHANGDER
92. Which of these image types lets you have
transparency?
87. Why is compression important?
A. PNG
A. Helps computer process bytes faster
B. JPG
B. Slows down computer
C. BMP
C. Gives your ISP more power
D. TIFF
D. Deletes your images so you have more
space 93. JPEG Stands for?
A. Joint Photo Exempted Grade
88. The character set for representing binary
as letters, numbers and symbols is called B. Joint Photographic Experts Group
C. Junior Photographic Export Group
A. SQL D. none of above
B. ASCII 94. What is Lossless Compression?
C. DECIMAL A. No information is lost but file size is in-
D. ALPHABET creased
B. There is no loss of information at all
89. The acronym CODEC stands for after compression
A. Code Creator C. Files which have the exact same data
B. Coder Declaration after compression
C. Coder Decoder D. Compression involves an algorithm
D. Common Decoder 95. The basic idea behind Huffman coding is to

90. Reducing file size has the advantages of A. compress data by using fewer bits to
encode fewer frequently occuring charac-
ters
A. Streaming over the internet is faster
B. compress data by using fewer bits to
for a given bandwidth
encode more frequently occuring charac-
B. Web pages using smaller image files ters
will load quicker
C. compress data by using more bits to
C. Less storage space is taken up on de- encode more frequently occuring charac-
vices using those files ters
D. Decompressing a file increases load D. expand data by using fewer bits to en-
on the CPU. code more frequently occuring characters

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 395

96. What would be the best file formats to B. Reduce storage requirements
choose for a music file? C. Improve quality of file

PRACTICE BOOK» NOT FOR SALE


A. PNG D. Improve file transfer speed
B. JPEG E. Change file format
C. MP3
101. How many bits make up one byte?
D. MP4
A. 4
E. GIF
B. 16
97. Which of the following statements are
C. 8
true for Lossless Compression
D. 10
A. Lossless compression reduces the size
of algorithm whilst keeping all of the orig- 102. What is measured when the wave is sam-
inal data pled?
B. Lossless compression removes unnec- A. Amplitude
essary data to reduce the file size
B. Hertz
C. Lossless compression increases the
file size C. Bit rate

D. Lossless compression shortens the D. Frequency


ASCII data to reduce the file size
103. What is the resolution for web?
98. When do we use lossless compression? A. 72
A. When we want to keep ALL of the orig- B. 150
inal data
C. 300
B. When we want to keep SOME of the
D. 600
original data
C. When we do NOT want to keep any of 104. Lossy or lossless? Used for web
the original data images as it gives the smallest file
size-this makes images easier to up-
D. When the file has been corrupted.
load/download/share.
99. Lossless compression A. Lossy
A. Is used when not all the information is B. Lossless
needed
C. Both
B. Is not as effective as lossy compres-
sion D. none of above

C. Can fully regenerate the original file 105. Based upon your experience with text
D. Includes files such as .ZIP compression, which of the following sen-
tences would compress best?
E. Would be a sensible choice for a music
download site A. The quick brown fox jumped over the
lazy dog.
100. What is file compression used for? B. How much wood would a woodchuck
A. Increase streaming speed chuck if a woodchuck could chuck wood?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 396

C. Buffalo buffalo Buffalo buffalo buffalo 111. Select the advantages for lossless com-
buffalo Buffalo buffalo pression
D. JavaScript scripts are actually differ- A. Makes the file much smaller
ent scripts than Java scripts. B. Will send quicker
106. What does lossy compression do to C. A very simple algorithm
files? D. The quality will not be affected much
A. It increases the file size and keeps the

NARAYAN CHANGDER
same quality. 112. A song is digitally recorded by an artist
and saved to a file. Then, the artist runs a
B. It permanently eliminates all informa- program that takes the file as input and
tion on a file. produces a new file. The new file does
C. It decreases the file size and keeps the not include any sound data recorded that
same quality. cannot be heard by the human ear. The
artist then saves the new file over the
D. It eliminates unnecessary information
original file. Which of the following is true
and reduces the file size.
about the transformation of the digitally
107. Huffman trees use the of each char- recorded song data?
acter to work out their encoding. A. This is a lossy transformation of data
A. Frequency that results in a smaller file size.
B. Order in ASCII B. This is a lossy transformation of data
that results in a larger file size.
C. Number value
C. This is a lossless transformation of
D. none of above data that results in a smaller file size.
108. How many kilobytes are in a megabyte? D. This is a lossless transformation of
A. 10 data that results in a larger file size.

B. 100 113. How many bits are in a byte?


C. 1, 000 A. 10
D. 1, 000, 000 B. 8
C. 100
109. How many bits are in a TB?
D. 1000
A. 1, 000, 000, 000, 000
B. 8, 000, 000, 000, 000 114. which of the following is true of lossy and
lossless compression techniques?
C. 1, 000, 000, 000
A. Lossy compression techniques are no
D. 8, 000, 000, 000
longer commonly used.
110. kB is how many MB? B. Lossless compression is fully re-
A. 0.35 versible, meaning the original file can be
recreated bit for bit.
B. 0.035
C. Lossless compression throws away
C. 0.0035 unimportant details that a human being
D. 0.00035 will likely be unable to detect.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 397

D. Lossy compression is only possible on C. Information is lost when compressed


files that are at least one gigabyte in size D. none of above
before compression.

PRACTICE BOOK» NOT FOR SALE


120. A Huffman code:A = 1, B = 000, C = 001,
115. Which is the best format to compress an D = 01, P(A) = 0.4, P(B) = 0.1, P(C) = 0.2,
AVI video to? P(D) = 0.3 The average codeword length
A. MP3 is
B. MP4 A. 6
C. AAC B. 3.1
D. WAV C. 5.2
D. 2.1
116. These files do not remove data during the
compression process. 121. What is a .bmp?
A. Lossy compression A. Windows Computer executable file,
B. Lossless compression program or application file. (Similar to
.app)
C. Both lossy and lossless compression
B. Flash video files
D. none of above
C. Bitmap image file is used to store
117. Asymmetrical encryption Which bitmap digital images. Typically found in
statement is False Windows digital images.
A. Often requires considerable process- D. Audio Video Interleave file is a video
ing power and audio file created by Microsoft.
B. Is impossible to break 122. A larger video file size usually results in
C. Is being threatened by the possibility quality.
of quantum computing A. lower
D. Can be brute-force attacked B. lossy
E. Is very widely used, even in small busi- C. higher
nesses D. poor
118. Full form of GIF 123. A Huffman encoder takes a set of charac-
A. Graphics Interchange Form ters with fixed length and produces a set
of characters of
B. Graphics Inter Format
A. random length
C. Graphics Interchange Format
B. fixed length
D. Graphics Interact Format
C. variable length
119. Match the keyword to its mean- D. constant length
ing:Lossless compression
A. No information is lost when com- 124. Which of these codecs generally has the
pressed biggest file size?

B. A file that takes up less space than the A. AVI


original file B. MP4

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 398

C. MP3 C. Higher quality files


D. WMV D. Reduced amount of processing power
125. Refers to compression when the image is E. Limited RAM
reduced without any quality loss
131. Lossy or lossless? All information and
A. Lossy quality is kept
B. RGB
A. Lossy

NARAYAN CHANGDER
C. 72 PPI
B. Lossless
D. Lossless
C. Both
126. What is a clock cycle?
D. none of above
A. A computer clock compared to an ex-
ternal clock 132. This type of compression reduces the en-
B. Amount of time to back up memory tire file without removing any data.

C. CPU’s processing speed A. Lossy compression


D. none of above B. Lossless compression
C. Both lossy and lossless compression
127. What does a .wav file save?
A. Sound D. none of above

B. Video 133. Which file type is used for Sound


C. Picture A. .MP3
D. Sound & Video B. .PNG
128. Which of these terms is a type of data C. .PSD
compression?
D. .DOCX
A. resolution
B. zipping 134. Binary Trees are algorithms which com-
puters traverse by abstracting the data
C. inputting
A. Left and Right
D. caching
B. Up and Down
129. I have a video that’s 25 megabytes. How
many gigabytes is that? C. Diaganol

A. 0.25 D. none of above


B. 0.025 135. Symmetrical encryption techniques
C. 25, 000 A. Are the most secure types of encryp-
D. 25, 000, 000 tion
130. What are the key reasons for compress- B. Use a single key to encode/decode
ing data? C. Use multiple keys to encode/decode
A. Less space needed for storage D. Is most commonly used for financial
B. Less time to transmit transactions in banks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 399

136. Which kind of file would be hurt most by 142. Dictionary based compression choose
a lossy compression algorithm? 3 answers

PRACTICE BOOK» NOT FOR SALE


A. A text document A. Is a lossless compression format
B. An audio file containing music B. Creates a dictionary of common letter
C. An audio file containing speech combinations to encode words with fewer
characters
D. A digital photograph
C. Creates a dictionary of smaller letters
137. The amplitude of a sound wave is so less space is used
A. how high the wave is from the crest or
D. Sends the dictionary with the data
trough
B. the frequency at which it is sampled E. Doesn’t need to send the dictionary
with the data
C. the speed at which it travels through
air 143. In order for sound to be stored in a com-
D. none of above puter it must be converted to

138. Digital pictures use data compression to A. Analogue


accomplish which of the following goals? B. Digital
A. Save space on a hard drive. C. Buddhism
B. Provide a crisp and clear image D. JPEG
C. Eliminate redundant data.
D. none of above 144. What is the resolution for Print?
A. 72
139. How many bytes are in a terabyte?
B. 150
A. 1, 000
B. 1, 000, 000 C. 300

C. 1, 000, 000, 000 D. 600


D. 1, 000, 000, 000, 000 145. Compression that removes Redundant
140. What does “lossy compression” mean? Data
A. information not needed is deleted. A. Lossy compression
B. increases the amount of data in the B. Replacement tecnhology
file.
C. What is encoding?
C. gives a shiny look when saved.
D. What is lossless compression?
D. does not impact quality when saved.
146. How many Bytes are used in Unicode?
141. How many bits are in 2 kilobytes?
A. 2, 000 A. 8

B. 8, 000 B. 16
C. 16, 000 C. 1
D. 32, 000 D. 2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 400

147. Select the advantages for lossy compres- 152. Which is not an example of a text file
sion unit?
A. Makes the file much smaller A. Kilobyte
B. Will send much quicker B. Megabyte
C. A very simple algorithm C. Millionbyte

D. The quality will not be affected much D. Gigabyte

NARAYAN CHANGDER
153. What type of compression has been used
148. What does Lossy Compression do to
on the following data? 4C2L4C1M
files? (4-6)
A. Run-Length Encoding
A. Increases the file size and keeps the
same quality B. Dictionary Compression
B. Eliminates no information at all C. Variable-Length Encoding

C. Decreases the file size and keeps the D. none of above


same quality 154. How many bits of data does a computer
D. Eliminates unnecessary information in store Binary in
a file to reduce file size A. 2
149. Which is a lossless file format? B. 4

A. .DOC C. 8

B. .JPG D. 16

C. .TIFF 155. Media files which can be transmitted


over the Internet would be best to use
D. .INDD
A. Lossy compression
150. What is meant by bit depth? B. Lossless compression
A. The number of samples taken per sec- C. Both lossy and lossless compression
ond
D. none of above
B. The amplitude of each sample
156. The colors of the pixels in a digital image
C. The number of bits used per second of
are often represented by red, green, and
audio
blue values between 0 and 255 (an RGB
D. The number of bits used to store each triplet). A photographer is manipulating
sound sample a digital image to lighten it because all of
the RGB values in the image are less than
151. What do we call the smallest unit of data 100, making it very dark. He does this by
that can be represented in an image? adding 20 to the R, G, and B values of each
A. Pixel pixel, then overwriting the original image.
What type of transformation is the photog-
B. Dot rapher using on the digital image?
C. Colour A. Lossless transformation
D. Bit B. Lossy transformation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 401

C. Multiband transformation 162. How many colours can a JPG file dis-
play?
D. Chrome sampling transformation
A. 256

PRACTICE BOOK» NOT FOR SALE


157. How much is 1 byte B. 12, 496
A. 6 bits C. 16, 777, 214
B. 8 bits D. 64, 332, 961, 042
C. 12 bits 163. What is the smallest representable part
D. 16 bits of an image?
A. Pixel
158. Which of the follow statements it true of B. Bit depth
MIDI files?
C. Sample
A. It is the most used file format to store
D. Resolution
sound.
164. Which of files is suitable for sound record-
B. It was developed recently in 2010.
ing?
C. Automatically saved in a digital and not A. GIF
analogue format.
B. MPEG
D. It can’t be used on computers.
C. WAV
159. Which file types support transparency? D. JPEG
A. GIF & BMP 165. ASCII Stands for
B. JPEG & PNG A. American Standard Code for Informa-
tion Interchange
C. EPS & SVG
B. American Scientific Code for Informa-
D. GIF & PNG tion Interchanging
160. is reencoding a file in a way that uses C. Absolute Standard Codes for Instruc-
fewer bits than the original, but keeps tion Interchange
most or all of the information intact. D. none of above
A. Encoding 166. File compression is used to
B. Compression A. make file sizes smaller
C. Expansion B. stop people pirating music
D. Summarizing C. to prevent files being edited
D. annoy people
161. What file extension can be used to save
vector images? 167. LZ77 and LZ78 are the two algorithms
used for
A. .eps
A. Lossy data compression
B. .jpeg B. Lossless data compression
C. .tiff C. Both
D. .gif D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 402

168. While using image compression algo- 172. A JPG image file lets you have
rithms we know that jpeg is a lossy file A. Super-high quality image with large
format for image compression and png file size
files use a lossless compression format.A
software development company is build- B. Low quality image with large file size
ing a custom application for the govern- C. High quality image with small file size
ment. The software will scan images of
D. Poor quality image with low file size
citizens of the country and store it in a
database. The images can then be pulled

NARAYAN CHANGDER
173. Which of the following cannot use lossy
up with other necessary information as compression?
needed. What would be the image for-
A. Word document
mat that can be best suitablefor this soft-
ware? B. Audio file
A. PNG C. Video file
B. JPEG D. Image file
C. Neither PNG or JPEG E. All of them
D. Both PNG and JPEG 174. What is compression? (1-4)

169. Lossy or lossless? Some quality is lost A. To convert one file to another
B. To reduce the size of data to save
A. Lossy
space
B. Lossless
C. To minimize the time taken for a file to
C. Both be downloaded
D. none of above D. To compress something by pressing it
very hard
170. How many megabytes are in a ter-
abyte? 175. A character set is
A. 1, 000 A. What language can be used in a com-
puter system
B. 1, 000, 000
B. The fonts that a computer has in-
C. 1, 000, 000, 000
stalled.
D. 1, 000, 000, 000, 000 C. The possible characters that can be
represented by a computer system.
171. MP3 and WMA files are both examples
of D. none of above
A. Audio files using lossy compression. 176. Which of these file types is best for
B. Audio files using lossless compres- printing or scanning large photographic im-
sion. ages?
C. Video files using lossy compression. A. TIFF

D. Video files using lossless compres- B. JPG


sion. C. PNG
E. Image files using lossy compression D. DOC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 403

177. Why is it necessary to compress files? 182. Select the types of compression there are
A. File compression enables data to be A. Loss

PRACTICE BOOK» NOT FOR SALE


transferred quickly. B. Lossy
B. Disk space needed on internet servers C. Lossed
is reduced. This allows the servers to
D. Lossless
store more files / information with less
disk space. 183. In dictionary techniques for data com-
C. File compression is a process to re- paction, which approach of building dictio-
duce the disk space to store that file. nary is used for the prior knowledge of
probability of the frequently occurring pat-
D. File compression is a mandatory pref- terns?
erence for some of the internet servers to
transfer files. A. Adaptive dictionary
B. Static dictionary
178. This type of compression is best used for
C. Both
media files.
D. None of the above
A. Lossy compression
B. Lossless compression 184. What three colours are used to produce a
broad array of colours in a computer sys-
C. Both lossy and lossless compression tem?
D. none of above A. Green, Red, Orange
B. Red, Green, Blue
179. I have an mp3 file that’s 3.5mb. How
many bytes is that? C. Yellow, Green, Red
A. 3, 500 D. none of above
B. 3, 500, 000 185. Define the term ‘sampling’.
C. 3, 500, 000, 000 A. Snapshots of sound are taken at regu-
lar intervals
D. 3, 500, 000, 000, 000
B. The number of samples taken each
180. PSD stand for second
A. Photoshop Document C. The number of bits used per second of
audio
B. Pixel Superior Data
D. The number of bits available for each
C. Photo Sample Department clip
D. Picture Simple Dots
186. Static dictionary-
181. Compression makes file sizes A. permanent
A. Bigger B. sometimes allowing the addition of
strings but no deletions
B. Smaller
C. allowing for additions and deletions of
C. Keeps them the same
strings as new input symbols are being
D. none of above read

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 404

D. Both (A) and (B) 192. What unit is sample rate measured in?
E. Both (A) and (C) A. Bits per second (bps)
187. How many bytes are in a kilobyte? B. Hertz (Hz)
A. 100 C. Megabits per second (Mbps)
B. 1000 D. none of above
C. 1, 000, 000
193. Which of these is NOT a way to view the

NARAYAN CHANGDER
D. 1, 000, 000, 000 codecs installed on your computer?
188. Which of the following is the first phase A. The MSINFO32 application on Win-
of JPEG? dows
A. DCT Transformation B. Windows Media Player
B. Quantization C. Third party Applications
C. Data Compression D. Microsoft Word setings
D. None of the above
194. A bitmap image of 20 by 20 pixels using
189. Which order is correct? a colour dept of 8 bits would have a file
A. Bit, Nybble, Byte, Kilobyte, Megabyte, size of around:
Gigabyte, Terabyte A. 400 bytes
B. Bit, Byte, Nybble, Megabyte, Kilobyte.
B. 3200 bytes
Gigabyte, Terabyte
C. 40 bytes
C. Bit, Nybble, Byte, Megabyte, Kilobyte,
Gigabyte, Terabyte D. 320 bytes
D. none of above
195. AVI files are examples of
190. Which 3 statements best describe Loss- A. Audio files using lossy compression.
less compression
B. Audio files using lossless compres-
A. Is used when not all the information is sion.
needed
C. Video files using lossy compression.
B. Is not as effective as lossy compres-
sion D. Video files using lossless compres-
C. Can fully regenerate the original file sion.

D. Includes files such as .ZIP E. Image files using lossy compression


E. Would be a sensible choice for a music 196. Which of the following is true if you de-
download site crease the bit rate?
191. B is how many GB? A. File size increases
A. 0.0035 B. Sound quality increases
B. 0.035 C. Sound quality decreases
C. 0.35 D. Number of sound samples taken per
D. 3.5 second increases

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 405

197. Bits are needed for standard encod- C. 4


ing if the size of the character set is X D. none of above

PRACTICE BOOK» NOT FOR SALE


A. X+1
203. Which of these files can be lossy?
B. log(X)
A. AVI
C. X2
B. WAV
D. 2X
C. MP4
198. How do you move through a Huffman
tree? D. BMP
A. 0 = right 1= left 204. An AVI file usually has a file size
B. 1 = left 2 = right A. small
C. 0 = left 1 = right B. lossy
D. 0 = middle 1 = back C. large
199. Which of these are pixel based graphic D. compressed
files?
205. Encryption choose 3 possible answers
A. raster
A. Uses at least one key to cipher data
B. vector
B. Is only used on text
C. velociraptor
C. Can be symmetric or asymmetric
D. bitterraster
D. Is impossible to break
200. A disadvantage of lossless compression
is E. Has developed a lot as processing
power has increased
A. There is a big reduction in file size
B. There is only a slight reduction in file 206. Run-length encoding choose 3 an-
size swers
C. There is no reduction in quality A. is Lossless
D. Cannot be used on text or software B. is Lossy
files C. Can only be used for text
201. The word “PIXEL:” is a short for which D. Records the number of repeats of an
of the following? individual element
A. Perfect elements E. Works best on compression on images
B. Picture Elements rather than text
C. None of the above 207. An advantage of lossless compression is
D. none of above
A. All data is lost
202. There are different types of compres-
sion B. The file size stays the same
A. 2 C. All of the important data is kept
B. 3 D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 406

208. Match the keyword to its meaning:Lossy 212. How many colours can a bitmap using 2-
compression bit colour depth contain?
A. No information is lost when com- A. 2
pressed B. 4
B. A file that takes up less space than the C. 8
original file
D. 16
C. Information is lost when compressed

NARAYAN CHANGDER
D. none of above 213. JPEG (JPG) files are an example of
A. Audio files using lossy compression.
209. An author is preparing to send their book
to a publisher as an email attachment. B. Audio files using lossless compres-
The file on their computer is 1000 bytes. sion.
When they attach the file to their email, it C. Video files using lossy compression.
shows as 750 bytes. The author gets very
D. Image files using lossless compres-
upset because they are concerned that part
sion.
of their book has been deleted by the email
address.If you could talk to this author, E. Image files using lossy compression
how would you explain what is happening
to their book? 214. What vector file is used with HTML and
web page design?
A. The file is smaller. However, the infor-
mation may not be lost. A. PDF

B. The email automatically compressed B. SVG


the data. C. TIFF
C. My prior emails have been transmitted D. BMP
without the information being lost.
215. I compress a 1000kB file to 400kB. What
D. My prior text messages have been
is my % compression?
transmitted without being lost.
A. 400%
210. Name one common file format that is
B. 600%
LOSSY
C. 40%
A. .PSD
D. 60%
B. .TIFF
C. .JPG 216. JPEG Stands for (4-6)
D. .BMP A. Joint Photo Exempted Grade
B. Joint Photographic Experts Group
211. Which formula shows how to work out
the percentage a file has been compressed C. Junior Photographic Export Group
by? D. none of above
A. bits in (Huffman *7) /100
217. Which of these file types are good
B. bits in ASCii-bits in Huffman if you need a transparent background?
C. difference in bits / bits in ASCII * 100 HINT:Choose 2.
D. none of above A. PNG

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 407

B. GIF 223. Lossy or lossless? This type of compres-


C. JPG sion gets rid of some information

PRACTICE BOOK» NOT FOR SALE


D. PDF A. Lossy
B. Lossless
218. High quality media files created during
production would most likley use C. Both
A. Lossy compression D. none of above
B. Lossless compression
224. Match the keyword to its mean-
C. Both lossy and lossless compression ing:Compressed file
D. none of above A. No information is lost when com-
pressed
219. Each individual element within a Binary
tree is called a: B. A file that takes up less space than the
original file
A. Branch
B. Node C. Information is lost when compressed

C. Leaf D. none of above


D. Circle 225. Dictionary based compression
220. When recording sound, the number of A. Is a lossless compression format
samples recorded per second is called the: B. Creates a dictionary of common letter
A. sample rate combinations to encode words with fewer
B. sample resolution characters

C. colour depth C. Creates a dictionary of smaller letters


so less space is used
D. File size
D. Sends the dictionary with the data
221. What is a memory cache?
E. Doesn’t need to send the dictionary
A. Amount of memory the computer has with the data
for jobs
B. Outdated memory storage 226. What affects the quality of an audio
clip?
C. Temporary storage device that keeps
data for quick access A. Its amplitude
D. none of above B. The number of pixels in the sound
C. Its sample rate
222. The following run of characters is en-
coded using RLE compression-the original D. none of above
run is 12 bytes, but how many bytes is
the compressed file? aaabbbcccccd 227. Applications of Huffman Coding
A. 7 bytes A. Text compression
B. 12 bytes B. Audio compression
C. 6 bytes C. Lossless image compression
D. 8 bytes D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 408

228. When you carve a graphics file, recover- 233. Which best describes Lossless Compres-
ing the image depends on which of the fol- sion?
lowing skills? A. No information is lost but file size is in-
A. Recovering the image from a tape creased
backup B. There is no loss in information at all af-
B. Recognizing the pattern of the data ter compression
content C. Files which have the exact same data

NARAYAN CHANGDER
C. Recognizing the pattern of the file after compression
header content D. Compression that involves an algo-
D. Recognizing the pattern of a corrupt rithm
file
234. Huffman coding is an encoding algorithm
229. What is the maximum number of values used for
that can be represented in 8 bits? A. lossless data compression
A. 16 B. broadband systems
B. 256 C. files greater than 1 Mbit
C. 65, 536 D. lossy data compression
D. 128 235. B is how many kB?
230. The following is true about metadata: A. 350
A. It is data about data. B. 3500

B. It is corrupted data. C. 3500000

C. It significantly increases file sizes. D. 35000

D. none of above 236. GIF and BMP files are both examples of
A. Audio files using lossy compression.
231. What type of data do MIDI files record?
Select all that apply. B. Audio files using lossless compres-
sion.
A. Speech
C. Video files using lossy compression.
B. Note
D. Image files using lossless compres-
C. Velocity sion.
D. Instrument E. Image files using lossy compression
232. How many colours can be represented 237. Which of the following are not in a com-
with a 4 bit colour depth? pressed format? (7-9)
A. 2 A. JPEG
B. 4 B. MPEG
C. 16 C. Bitmap
D. 256 D. MP3

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 COMPRESSION 409

238. When is Run Length Encoding used? B. reduce download time


A. When we want to compress patterns C. lower quality

PRACTICE BOOK» NOT FOR SALE


of data D. can’t get original back
B. When we want to decompress pat-
terns of data 244. What is meant by Colour Depth?

C. When we want to encode running A. Number of pixels in the image


videos B. The number of colour available for
D. none of above each image
C. How pixelated the image is
239. Indicate if this file format uses lossy com-
pression, lossless compression or is uncom- D. none of above
pressed:MPEG 245. The code for representing binary as let-
A. Lossy compression ters and numbers is called
B. Losseless compression A. SQL
C. Uncompressed B. ASCII
D. none of above C. DECIMAL
D. ALPHABET
240. I have a text file that’s 500 kilobytes.
How many megabytes is that? 246. A user takes an image and uses a pro-
A. 0.5 gram to make the file size of the im-
age smaller.The image appears to look the
B. 5
same. What has the program done?
C. 50
A. Transferred the file
D. 5000
B. Compressed the file
241. A JPEG file uses which type of compres- C. Corrected the file
sion?
D. Deleted the file
A. WinZip
247. compression means that the file is
B. Lossy
identical, bit for bit, to the original uncom-
C. Lzip pressed file.
D. Lossless A. Lossy
242. Which of the following codecs generally B. Lossless
has the lowest file size? C. Compressed
A. WAV D. File
B. Quicktime 248. Which of these file types are best for web
C. MP3 animation?
D. MP2 A. GIF

243. Which is an advantage of your file being B. TIFF


lossy? C. EPS
A. quality is loss D. PDF

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 410

249. The codec created by Apple is 253. Which compression allows the image to
be reversed back?
A. VP9
A. Lossless
B. AVI
B. Lossy
C. Quicktime
C. Glossy
D. MP3
D. none of above
250. MP4, MPEG and MOV files are all exam-

NARAYAN CHANGDER
254. What sample rate is used for CD quality
ples of
sound?
A. Audio files using lossy compression.
A. 44, 100 Hz
B. Audio files using lossless compres- B. 88, 200 Hz
sion.
C. 22, 100 Hz
C. Video files using lossy compression.
D. none of above
D. Video files using lossless compres-
sion. 255. How would you encode 8xxxxxY;;;;;;;;;>
using RLE.
E. Image files using lossy compression
A. 81x5Y1;9>1
251. stores a graphic file; 8 bit colour depth B. 185x1Y9;1>
so 256 colours available; suitable for lo-
gos; transparency possible; lossless com- C. 8xY;>
pression D. 186x1Y6;1>
A. .gif 256. What type of compression would a
B. .png Python coding file need to use?
C. .bmp A. Lossy compression
D. .jpg B. Lossless compression
C. Doesn’t matter. It can use either lossy
252. Which type of compression is best suited or lossless compression.
to compressing the data:How much wood
would a woodchuck chuck if a woodchuck D. none of above
could chuck wood? 257. Which of these file formats is lossy?
A. Run-length encoding A. AI
B. Dictionary encoding B. TIFF
C. Variable-length encoding C. JPG
D. none of above D. PNG

8.3 MULTIMEDIA DATA


1. What does a QR code stands for? B. Quuik Response Code

A. Qick Response code C. Quick Response code

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 411

D. Quake Response code 7. Select the BEST statement refer to the


word ‘Software’
2. A sound, especially when recorded, trans-

PRACTICE BOOK» NOT FOR SALE


A. tells the hardware what to do
mitted, or reproduced.
B. nonlinear digital video editing applica-
A. Audio
tion
B. Video C. ordinary computer with some built-in
C. Graphics features
D. Animation D. provide structured linked elements
through which user can navigate
3. Examples of web editor are Microsoft
FrontPage and ADOBE Dreamweaver 8. Media refers to

A. Text based A. information

B. CD Based B. way through which information can be


shared
C. WYSIWYG
C. data and instructions
D. none of above
D. way through which data and instruc-
4. Select the multimedia element.It helps to tions can be shared
illustrate ideas through still pictures 9. It is entered into and stored in a computer,
A. Audio it is generally referred to as data?
B. Video A. COMPUTER
C. Animation B. INFORMATION
D. Graphic C. COMMUNICATION
D. TECHNOLOGY
5. “How in information encoded in the com-
puter” 10. There are types of graphics used in
A. Representation media multimedia application.
A. two
B. Presentation media
B. five
C. Transmission media
C. four
D. Perception media
D. three
6. The glass fiber cables that make up much
of the physical backbone of the data high- 11. What is a slide deck presentation?
way are, in many cases, owned by: A. A television interview or news report
A. local governments B. A speech to be delivered before an au-
dience
B. Howard Johnson
C. A sequence of slides incorporated with
C. television networks
text, sound, graphics, and animation
D. railroads and pipeline companies
D. Information presented using more
E. book publishers texts than graphics and animation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 412

12. Select the TRUE statement about Optical 16. This means a medium of communication.
Character Recognition (OCR) software A. Media
A. OCR Software can trigger common B. Multi-
menu events such as Save, Open, Quit,
and Print C. Audio
B. OCR Software can teach the system to D. Video
recognize other commands that are more
specific to your application 17. Which of the following is a format that

NARAYAN CHANGDER
can be exported from Adobe Audition soft-
C. OCR Software can convert paper docu- ware?
ments into a word processing document
on your computer without retyping or A. sold
rekeying. B. JPEG
D. OCR Software use special color- C. XXWT
correction hardware to ensure that what
D. Reader
they see on screen matches precisely
what will be printed 18. MPEG stands for:
13. Which of the following produces graph- A. Moving Picture Experts Group
ics image files that are small, download B. Maintain Picture Experts Group
quickly, & are easily resized without af-
fecting image quality? C. Movie Picture Experts Group

A. Bitmap graphics D. Main Picture Expert Group

B. Vector graphics 19. Which of the following is the primary com-


C. Streaming graphics ponent of multimedia?

D. Raster graphics A. audio


B. animation
14. Which audio file format is the native sound
format for windows? C. text

A. Ogg Vorbis D. video

B. Wave form 20. Electronic books and magazine are a


C. Audio Interchange File Formatt (AIFF) A. Software product
D. MPEG-1 Audio Layer-3 (MP3) B. Educational product
15. What symbol is used to end an element C. Entertainment product
of HTML tagging, e.g. <b>Hello!< b> D. Information product
What goes before the send ‘b’?
21. are typical examples of static images.
A. *
A. Photographs
B.
normalfont B. File
C. / C. Jokes
D. ( D. Messages

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 413

22. Which of the options shows (an) exam- 27. You have been assigned to develop a mul-
ple(s) of multimedia? timedia kiosk for a shopping complex that
will allow users to locate specific shops.

PRACTICE BOOK» NOT FOR SALE


A. Computer-generated graphics
Which device is the MOST suitable for this
B. Digital pictures project?
C. Television series
A. GPS Tracker
D. Video games, movies, and television
B. Touch Screen Monitor
23. has increasingly entered the main- C. Joystick
stream ofgraphic design as its ease of use
D. LCD Projector
improves
A. Image-editing applications 28. How does MOOC work?
B. 3-D modeling software A. Aim to have a lifetime courses.
C. OCR software B. It is where you can apply a job.
D. Painting software C. Aim to connect learners from across
the globe with educators and with each
24. All of the following are ecommerce advan- other.
tages for customers, except one. Which of
the following is NOT an ecommerce advan- D. It is where you can share messages
tage for customers: through MOOC.
A. Convenience 29. Memory can be define as below EXCEPT
B. Easier Comparison Shopping A. each byte stored in unique location
C. Wider Selection of Goods called an address
D. Possible Security Risk B. consists of one or more chips on moth-
erboard or other circuit board
25. Photo essay of your community service is
an example of what type of media? C. electronic components that store in-
structions, data, and results
A. newspaper
D. it is measures in points
B. pictures
C. graph 30. In multimedia, audio could come in form of
the following, except
D. internet
A. speech
26. Local area networks (LANs) and wide area
B. sound effects
networks (WANs)
C. music score
A. can connect the members of a work-
group D. wave
B. an consume great amounts of time as 31. The role is to do research on the con-
you prepare for delivery by testing and de- tent of a multimedia program
veloping workarounds and tweaks
A. Project Manager
C. have improved over the years to pro-
vide faster data transfersacross wider B. Subject Matter Expert
buses C. Instructional Designer
D. none of above D. Graphic Artist

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 414

32. Each webpage has its own unique C. 3-D Modeling and Animation Tools
A. database connection D. Image-Editing Tools
B. personal search engine 38. What is MOOC in Media Information Tech-
C. animation scheme nology?
D. universal resource locator (URL) A. Media Open Online Course
B. Massive Open Online Course
33. Which of the following is NOT an advan-
tage of Multimedia C. Multimedia Open Online Course

NARAYAN CHANGDER
A. Easy to use D. Macro Open Online Course
B. Expensive 39. “Where is information stored”
C. Gains and Holds attention A. Storage media
D. Trendy B. Transmission media
34. What is the attributes of a ‘Embedded C. Representation media
Database’? D. Presentation media
A. Uses graph structures 40. Listed below are refer to kerning, EXCEPT
B. Built in an application A. Condensed
C. Links objects together B. Expanded
D. Used for business C. Regular
35. Which of the following is the correct com- D. Larger
bination of multimedia elements and stan-
41. If you are designing an e-storytelling book,
dard file formats?
you need to convert the paper document
A. Audio (date) into word processing document on your
B. Audio (wav) computer without retyping or rekeying by
using
C. Video (.doc)
A. Barcoding
D. Graphic (http)
B. Optical Character Recognition Soft-
36. Barbara wants to make herself look taller ware
in a photo. What should she chnage about
C. Voice Recognition System
her photo?
D. Quick Response Codes
A. Rotation
B. Aspect Ratio 42. Card-and page-based systems typically
provide two separate layers on each
C. Fill
card:a that can be shared among many
D. Transformation cards, and a foreground layer that is spe-
cific to a single card.
37. are specialized and powerful tools for
creating, enhancing, and retouching exist- A. background layer
ing bitmapped images. B. Icon-or object-based
A. Sound-Editing Tools C. Time-based tools
B. Painting and Drawing Tools D. Adobe’s Director

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 415

43. a software package designed to create 48. It is a visual storytelling tool that creates
electronic presentations consisting of a se- highly engaging presentations.
ries of separate pages or slides.

PRACTICE BOOK» NOT FOR SALE


A. Google Docs
A. Microsoft powerpoint B. Bing
B. Microsoft word C. Audacity
C. Microsoft excel D. Prezi
D. none of above 49. Traditionally create bitmap images, which
are created by coloring the individual pix-
44. Multimedia Content Production (MCP) is
els in an image.
the second most important category for
the term multimedia. State the function A. Painting Program
(MCP). B. Drawing Program
A. Communication media C. Image Editing Program
B. Terms in the Advertising Industry D. Audio Capture and Editing Software
C. The medium used in the media (mass) 50. What are the stages of a Multimedia
D. Produce multimedia products such as Project?
video, animation, audio, music & film A. Planning and costing

45. The roles are to decide on the best B. Creativity


educational strategies and practices to C. Delivering
present the information D. Communication
A. Project Manager
51. What is the legacy plug-in created by Ap-
B. Subject Matter Expert ple Computer for running video files & au-
C. Instructional Designer dio files?

D. Graphic Artist A. C#
B. QuickTime
46. What multimedia is best to use if you were
C. Adobe Flash Player
tasked to explain the similarities between
linear and non-linear text? D. Microsoft Silverlight
A. text and graphics 52. is using more than 1 medium (way or
B. audio means) of expression or communication.
A. Medium
C. video
B. Multimedia
D. animation
C. Format
47. Advertisements are trying to get you to D. Basics
A. do something
53. Which of these is not a category a of mul-
B. believe something timedia?
C. buy something A. Software products
D. all of the above B. Entertainment products

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 416

C. Information products 59. Which of the following is displayable on a


D. Educational products web page after installation of a browser
plug-in?
54. which of the following is not the compo- A. Windows 7
nent of multimedia?
B. Adobe Flash
A. text
C. Mozilla
B. audio
D. Internet Explorer

NARAYAN CHANGDER
C. music
E. Firefox
D. video
60. Which of the following media is part of
55. Which activity is most likely protected by
multimedia content. Click what is appro-
fair use?
priate
A. A. Emailing copyrighted songs to your
A. Visual media
friends
B. text media
B. B. Adding a website’s photograph to
your blog without the author’s permission C. audio media
C. C. Using a clip from a movie for a D. motion media
school project
61. How many types of data model are there
D. Both a and c in database system?
56. It is electronic media possessing both a A. 3
sound and a visual component? B. 4
A. VISUAL C. 5
B. SOUNDS D. 6
C. AUDIOVISUAL
62. The illusion of motion created by the con-
D. MUSICS
secutive display of images of static ele-
57. are often the first working drafts of ments
your project, typically for internal circula- A. animation
tion only, and can have problems or be in-
B. video
complete.
C. video streaming
A. ASCII text files
D. storyboard
B. Alpha releases
C. Stampers 63. Multimedia is a communication process,
D. Beta releases based on computer technology that com-
bines the use of digital elements. State
58. What do the letters URL stand for? the elements.
A. Universal Resource Locator A. Text
B. Unbelievable Resource Locator B. Radio
C. Uniform Resource Locator C. Paper
D. Undergound Railway Line D. Graphic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 417

64. , such as CorelDraw, FreeHand, Illus- 69. One of the major goals of HTML5 is to:
trator, Designer, and Canvas, is dedicated A. eliminate the need to comply with W3C
to producing vector-based line art easily

PRACTICE BOOK» NOT FOR SALE


standards.
printed to paper at high resolution.
B. eliminate the use of browser plug-ins.
A. Painting software
C. eliminate the use of Cascading Style
B. Drawing software Sheets (CSS).
C. Animation Tools D. eliminate the use of scripting lan-
D. Image-Editing Tools guages.

65. Which of the following file extensions re- 70. Non linear editing can cause where edit
fer to Audio files. and re-edit and re-edit again can cause
video to be less true than the original ma-
A. MP3
terial
B. AVI
A. video loss
C. MP4
B. generation loss
D. WAV
C. quality loss
E. FLAC
D. editing loss
66. A class in which a tutor gives intensive in- 71. Apart from Adobe Audition software,
struction in some subject to an individual what software can adjust the sound of mu-
student or a small group of students. sic and voice recordings?
A. Print media A. Adobe Audition
B. Presentation B. Adobe Flash Player
C. Game C. Adobe Premiere Pro
D. Tutorials D. Adobe Photoshop CC
67. Which of the following is NOT a technol- 72. Multimedia developers will often attach
ogy likely to prevail as a delivery means more than one monitor to their computers
for interactive multimedia files? because
A. copper wire A. it enhances data transfer between
B. glass fiber computers
C. radio/cellular B. they can compare images on different
monitors
D. floppy disk
C. it enables cross-platform testing
E. CD-ROM
D. they can have more windows visible at
68. A form of multimedia that includes sound. one time
A. Media
73. Multimedia is widely used to add special
B. Multimedia to movies.
C. Audio A. arrangement
D. Video B. attachments

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 418

C. control separate functions, rather than as a se-


D. effects quence of statements that performs a spe-
cific task?
74. What is the typical amount you should add A. Event-driven programming
to the total cost of your project to cover in-
B. Object-oriented programming
evitable unexpected costs?
C. Interactive programming
A. There should be nounexpected costs.
D. Procedural programming

NARAYAN CHANGDER
B. Five to ten percent
C. Ten to fifteen percent 79. Multimedia means the use of more than
one in communication or presentation.
D. Twenty to twenty-fivepercent
A. number
75. Online marketing, Internet banking and
B. media
Web-based learning is an example of mul-
timedia application. Briefly describe one C. file
advantage of all the application D. sound
A. An ease to use and reach application
to user 80. is the electronic or mechanical con-
version of images of typed, handwrit-
B. Promote the product online ten or printed text into machine-encoded
C. Transaction can be made anywhere text, whether from a scanned document,
anytime a photo of a document, a scene-photo or
from subtitle text superimposed on an im-
D. Increase the customer for each com-
age.
pany
A. DVD
76. Using a Web editor requires you to B. OCR Software
have HTML knowledge to get started
C. Flash Memory or Thumb Drives
A. Text based
D. CD-ROM
B. CD Based
C. WYSIWYG 81. People might use a word processing pro-
gram to:
D. none of above
A. Communicate with people
77. An agent for something. Used for dissem- B. Edit video
ination (distribute) and representation of
information. C. Sort and organize information to refer-
ence later
A. media
D. Create and edit text documents
B. multimedia
C. multimedia systems 82. Provide a structure of linked elements

D. graphics A. Virtual Reality


B. Multimedia Project
78. What is the term for the programming con-
cept in which a program is handled as a C. Hypermedia
collection of individual items that perform D. Authoring Tools

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 419

83. Definition of multimedia B. The OGG video format is a free open-


A. presentationof information by using a source solution that is compatible with all
browsers.

PRACTICE BOOK» NOT FOR SALE


combination of text, audio, graphic andan-
imation. C. The MP4 video format is natively sup-
B. presentationof information by using a ported by Internet Explorer 9 and does not
combination of text, audio, graphic, video require a plug-in.
andanimation. D. The OGG video format is natively sup-
C. presentationof information by using a ported by Internet Explorer 9 and does not
combination of text, audio, graphic, video require a plug-in.
and interactivity.
87. Using a multimedia directory and an
D. none of above are examples of multimedia application for
finding information.
84. Which tag defines the sections in a HTML
page so that styles can be applied to spe- A. text
cific sections of the page only? B. joystick
A. <div> C. voice over
B. <sec> D. encyclopaedia
C. <h1>
88. four basic stages in a multimediapro-
D. <br> ject:planning and costing, designing and
producing, ,
85. Which of this is NOT the properties of a
database system. A. fixing
A. Allow inconsistency B. selling
B. Involves transaction C. testing
C. Reduce redundancy D. delivering
D. Allows sharing 89. Universal Serial Bus (USB) is a standard
86. Stephen is creating video tutorials to sell for connecting devices to a computer. It
his company’s products. The target audi- recognizes the devices by
ence will consist of company employees A. ATA
using primarily new computers with the B. IDE
Windows operating systems and Internet
Explorer 9. Stephen is debating whether C. Mirroring
to publish the videos using the MP4 or D. Plug and Play
the OGG video format. Both formats are
compatible with the HTML5 video element, 90. Which is the native audio format for Mi-
which he is using in his tutorials. Which crosoft Windows?
of the following would be a reason for A. Audio Interchange File Format (AIFF)
Stephen to choose one format over the
over? B. Ogg Vorbis (OGG)

A. The MP4 video format is a free open- C. Waveform (WAV)


source solution that is compatible with all D. Moving Picture Experts Group, Audio
browsers. Layer-3 (MP3)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 420

91. Refer to various physical means for stor- 96. is data in the form of words or alpha-
ing computer data, such as magnetic tapes, betic characters.
magnetic disks, or digital optical disks (CD-
A. Audio
ROM, CD, DVD)
A. Storage media B. Video
B. Transmission Media C. Animation
C. Perception media D. Text

NARAYAN CHANGDER
D. Representation media
97. What is presentation software?
92. It is the oldest form of motion picture tech-
nology capable of capturing lifelike video- A. A. A program used to collect data
style images. B. B. A program used to display informa-
A. PRINT MEDIA tion usually in the form of a slideshow
B. TELEVISION C. C. A computer program that generates
C. MOVIES a worksheet

D. IMAGES D. Both B & C

93. What kind of file formats are .au, .mp3, 98. Which of the following is the integration of
.aiff, & .wav? text, sound, graphics, animation and video
A. Video into a single unit?
B. Graphics A. website
C. Document B. webpage
D. Audio C. multimedia
94. A search that matches pages / documents D. presentation
to a work (product) input on a website is
known as a 99. Which of the following best define the
A. box word media?
B. square A. used for communication
C. search bar B. it is traditional media only
D. chocolate bar C. it is news online
95. are people who provide material such D. used for music
as video footage, audio tracks, competi-
tions and other materials. They’re experts 100. Which element is used in contents, menus,
in the subject matter of the application and navigational buttons?
ensure its technical accuracy.
A. Graphic
A. Content providers
B. Project managers B. Audio

C. System designers C. Text


D. Editors D. Video

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 421

101. Which of the following is true about 106. It is an episodic series of spoken word
client-side JavaScript? digital audio files that a user can download
to a personal device for easy listening.

PRACTICE BOOK» NOT FOR SALE


A. It needs HTML to run
B. It requires server-based programs to A. Vlog
add interactively to webpages B. Podcast
C. It is a stand-alone, object-oriented C. Blog
programming language
D. PowerPoint presentation
D. It is the Microsoft version of Python

102. Linear editing 107. Making the background of an image see-


through refers to what term?
A. works hand-in-hand with fast and pow-
erful computers. A. Color Depth
B. causes generation loss B. Transparency
C. plays end to end in one direction, usu- C. Portability
ally pertains to videotape editing.
D. Lossy
D. provides an on screen map of what the
final video sequences should look 108. A placeholder is a model slide.

103. Select the correct user interface princi- A. True


ple”Every user interface uses the same B. False
words or commands to perform the same
functions” C. May be
A. Navigation D. Don’t Know
B. Clarity
109. Which are following NOT refer to multi-
C. Consistency media development stages?
D. Personalization A. Testing
104. Which video file format is a royalty-free, B. Planning
open video & audio format supported by C. Delivering
Google?
D. Production
A. .WEBM
B. .FLAC 110. is the use of a computer to present
C. .MOV and combine text, graphics, audio, and
video with links and tools that let the user
D. .MP3 navigate, interact, create, and communi-
cate.
105. News about a national issue
A. audio A. Multimedia

B. pictures B. Network
C. newspaper C. Satellite
D. smart art on cycle D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 422

111. Which of the following advances in multi- A. Sony Vegas


media were made in the early 1970’s? B. Final Cut Pro
A. Advances in the ability to fit more text C. Adobe Lightroom
in a presentation
D. Adobe Premiere Pro
B. Advances in making supercomputers
C. Advances in integrating computers 116. Graphics composed of rectangular grids
with CD’s of pixels.

NARAYAN CHANGDER
D. Advances in graphics, movies, and au- A. Vector graphics
dio B. Virtual actors
112. Multimedia play’s important role today. C. Bitmap graphics
Which of the following BEST describe mul- D. Bit depth
timedia?
117. Which of the following file extensions re-
A. moving images and text
fer to Image files.
B. images and audio
A. GIF
C. integration of still and moving images,
text, and sounds by means oftechnology B. MOV

D. programs that combine text and im- C. BMP


ages on a television screen D. WAV

113. means that the user is able to make E. JPEG


an immediate response to what is happen- 118. and 3D animation can be edited by using
ing and modify the process. Effectively, editors.
there is a dialogue between the user and
the computer or communications device A. video
and the data access and transfer can be B. audio
non-linear.
C. graphics
A. Interactivity
D. animation
B. animation
119. Which style of brackets are used in
C. immersion
HTML?
D. multimedia
A. [ ]
114. Which one of these apps are used on a B. { }
daily basis
C. ( )
A. TikTok
D. < >
B. WhatsApp
C. Facebook 120. Sound intensity or amplitude is

D. All of the above A. The lightness of the sound.


B. The loudness of the sound.
115. Which of the following is not software
that can produce Multimedia Content Pro- C. The brightness of the sound.
duction? D. The complexity of the sound.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 423

121. Multimedia is whereas an EPS file includes the bitmap


A. a way to store data information for the image as well.

PRACTICE BOOK» NOT FOR SALE


B. a type of spreadsheet 125. Which of the following best describes hy-
C. a range of ways to communicate infor- permedia?
mation A. Hypermedia is a linear multimedia
project, where user is not given much in-
D. a type of database
teraction of the elements.
122. is responsible for gathering and pub- B. Hypermedia is a linear multimedia
lishing news in the form of newspapers or project, where user is able to control the
magazines. elements to access information.
A. Print Media C. Hypermedia is a nonlinear multimedia
B. Website project, where user is able to navigate
through the content by providing a struc-
C. Game
ture of links.
D. Simulation
D. Hypermedia is a nonlinear multime-
123. What is a security risk that comes with dia project, where user is able to re-
downloading extensions? ceive information just by clicking on well-
designed buttons.
A. Extensions can not be disabled or unin-
stalled once they have been downloaded 126. What is name of a person who creates a
B. There are no security risks that come database software?
with downloading extensions A. End user
C. All extensions contain malware B. Application developer
D. Extensions can disguise themselves as C. Administrator
legitimate programs while actually acting D. Programmer
as malware
127. “Audio editing is the function of selecting,
124. What is the main difference between a cutting, & joining parts of audio data re-
PostScript (PS) file and an Encapsulated ceived”. Based on the information stated,
PostScript (EPS) file? which software is most suitable to use for
A. A PS file compresses graphics, audio editing.
whereas an EPS file compresses audio A. Adobe Premiere Pro
or video content.
B. Adobe Dreamweaver
B. PS is the audio format used by UNIX
C. Adobe Audition CS6 / CC
servers, whereas EPS is the audio format
used by Windows servers. D. Adobe Flash 2.0 Script & 3.0 Script
C. A PS file is used to transport text files 128. Following are typical methods for word
between operating systems and applica- searching in hypermedia system, EXPECT
tions, whereas an EPS file is used to trans- A. Word relationship
port audio or video content between oper-
ating systems and applications. B. Categories
D. A PS file contains instructions that C. Adjacency
determine the display of the graphic, D. Alternative

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 424

129. Most multimedia systems use this as it is C. Storage media


a clear way to communicate and is an effi-
D. Transmission media
cient way to provide instructions to users.
A. Sound 135. Apart from forming a special effect of
B. Text transition (trasnsition) such as ‘dissolves
fades’. State other advantages of using
C. Animation this video editing application.
D. Graphics
A. Adjust audio with video

NARAYAN CHANGDER
130. How many PPI are usually needed for B. Adding special effects
professional and commercial prints such as
advertising hordings for the quality to be C. Superimpose images or text
acceptable. D. Cut a part of the video for a specific
A. 150 use by using the ‘magic wind tools’.
B. 250
136. A presentation element that organizes
C. 300 the presentation into a series of illustra-
D. 500 tions displayed in sequence for the pur-
pose of pre-visualizing the final show
131. is a method for wiring up computers
between Windows and Macintosh. A. storyboard

A. Client/server B. video streaming


B. Ethernet C. animation
C. ISP D. audio
D. Wi-Fi
137. Codes, conventions, formats, symbols
132. It refers to recording data on a recordable and narrative structures that indicate the
or rewritable DVD. meaning of media messages to an audi-
A. DVD Authoring Software ence?

B. DVD Burning A. MESSAGES


C. Video Editing Software B. MEDIA LANGUAGES
D. Audio and Editing Software C. INFORMATION LANGUAGES
133. With reference to multimedia elements, D. LANGUAGES
pick the odd one out of the following
138. It is a form of multimedia that engages
A. graphic
the audience and uses interactivity to tell a
B. animation story such as combo of texts, photographs,
C. video audios etc.
D. voice script A. Journalism

134. “How do humans perceive information” B. Education and training


A. Perception media C. Website
B. Representation media D. Sales and marketing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 425

139. Multimedia is 144. It refers to any or a combination of


A. a way to store data various means of communication such as
the newspaper, magazines, computer, cell-

PRACTICE BOOK» NOT FOR SALE


B. a type of spreadsheet phones, tablets, and other electronic gad-
C. a range of ways to communicate infor- gets that use the internet.
mation A. internet
D. a type of database B. website
140. As the message traveled, it looks for C. multimedia
in the script of each object; if it finds a
D. mobile application
matching handler, the authoring system
then executes the task specified by that 145. Temporary storage area used to store
handler. video or audio data ready for playing.
A. handlers A. Streaming
B. messages B. Downloading
C. backgrounds C. Buffer
D. elements D. Cloning
141. These are objects that do not move like 146. Which statement best describes how mul-
text and graphics. timedia helps students in education?
A. Static elements A. It replaces teacher lectures.
B. Dynamic elements B. It replaces direct textbook reading.
C. Platform C. It allows students to control all their
D. none of above learning.
142. Which language is considered the best D. It helps students learn in new and
language for creating large applications? stimulating ways and allows them to ap-
ply their knowledge creatively
A. C
B. Java 147. Listed below are the factors needed in
creating multimedia product EXCEPT
C. JavaScript
A. productivity
D. C++
B. hardware
143. You want to be able to access active con-
C. education
tent directly from your browser. Which
type of application provides the efficient D. software
integration of multimedia formats with a
browser or computer that will enable you 148. Refers to the physical means-cable of
to do this? various type (coaxial cable, twisted pair,
fiber optics), radio tower, satellite-that al-
A. Plug-in low the transmission of telecommunication
B. Object signals.
C. Viewer A. Transmission media
D. Applet B. Storage media

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 426

C. Perception media C. Multimedia


D. Representation media D. Infographics

149. are authoring systems, wherein el- 154. Educational website helps make the pro-
ements and eventsare organized along a cess of learning entertaining and attrac-
timeline, with resolutions as high as or tive to the audience, especially in today’s
higher than1/30 second generation. Which of the following BEST
describe computer-based training?
A. time-based

NARAYAN CHANGDER
A. a video game
B. icon-based
B. a method of training a computer to re-
C. page-based
ject viruses
D. date-based
C. a method of education that allows peo-
150. If the client changes his or her mind later ple to learn at their own pace, usinginter-
in the process, any revisions of the previ- active software.
ously approved materials would require a D. a method of training the computer to
, meaning that the client agrees to pay perform routine tasks
the additional costs for making edits.
155. What principle do you apply in evaluating
A. CMP multimedia that points to the followers of
B. RFP media content?
C. sign-off A. location
D. change order B. content
C. context
151. A search that matches pages / docu-
ments to a work (product) input on a web- D. network
site is known as a
156. are authoring systems, wherein-
A. box multimedia elements and interaction cues
B. square (events) are organized as objectsin a struc-
tural framework or process
C. search bar
A. card-based
D. chocolate bar
B. icon-based
152. Listed below are animation techniques C. object-based
EXCEPT
D. time-based
A. path-based animation
157. A or allows your project to play
B. cell-based animation
back withoutrequiring the full authoring
C. script based software and all its tools and editors.
D. spatial compression A. run-time version
153. These are resources and materials that B. standalone
offer a variety of flexible supports C. macintosh
A. Podcast D. segment
B. Social Media E. synchronization

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 427

158. Which of these is an example of MASS 163. Text that can provide links to related con-
media? tent in a multimedia application is called

PRACTICE BOOK» NOT FOR SALE


A. Television A. hyperlink
B. Internet B. JavaScript
C. Newspaper C. hypertext
D. All of the above D. Multimedia

159. Which of the following inspire the United 164. Multimedia is made up of words.
States to form a new way of communicat- A. 2
ing, now commonly known as the Inter-
net? B. 3

A. Gulf War C. 1

B. Vietnam War D. 4

C. World War II 165. State one IMAGE file format that is suit-
D. Cold War able for transferring file over Internet.
A. png
160. Which of the following is not an are of
application in multimedia system? B. jpeg

A. Education C. gif

B. News Delivery D. tiff

C. Training 166. Choose the CORRECT match


D. None of the above A. Green + Blue = Cyan
B. Blue + Green = White
161. The definition of media is:
C. Red + Green = Maroon
A. the analysis and evaluation of media
messages D. Red + Green + Blue = Black
B. a form of communication often 167. In which of the following do all the file
through the use of technology formats refer to video?
C. the use of technology A. AVI, MP4, MPEG
D. the internet B. AVI, MP4, WAV
162. It is the simplest and oldest resource, this C. MP3, PNG, WMA
can be used in writing instructions, making D. MP3, MP4, MPEG
announcements, giving information, and
narrating events. 168. Interactive digital television is a
A. video A. Software product
B. animation B. Educational product
C. text C. Entertainment product
D. graphics D. Information product

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 428

169. Where can these multimedia features be B. storyboard


found:banner, video, animation, podcast, C. audio
quiz, game, questionnaire, link, hotspot,
menu, and button? D. video streaming
A. database 175. VR stand for
B. spreadsheet A. video raster
C. leaflet B. variable rate

NARAYAN CHANGDER
D. Website / presentation C. virtual reality
170. Transmit information via such media as D. virtual response
AR advertising, billboards, blimps, and fly-
ing billboards. 176. What is the wrong statement about cap-
tured and synthesized media
A. DIGITAL MEDIA
A. Captured media refers to information
B. INDOOR MEDIA types captured and digitized from the real
C. OUTDOOR MEDIA world analog signal.
D. PRINT MEDIA B. Synthesized media refers to informa-
tion types synthesized by the computers.
171. Multimedia of elements grabs the
viewer’s attention and retains it. C. Examples of captured media include
digital bitmap image captured from a digi-
A. mixture tal camera.
B. combination D. An example of captured media is a
C. control computer generated animation
D. contribution
177. Which of the following statements is NOT
172. Multimedia is so hot because of what true about FireWire?
two general factors (Two answers) A. It was introduced by Apple in the
A. Technology Push 1980s
B. Market Pull B. The transfer speed is 12Mbps
C. Needs of the people C. It can connect multiple computers and
peripheral devices (peer-to-peer)
D. Changing environment
D. It is the industry standard and pro-
173. The first slide of a presentation is called vides support for high-bandwidth serial
title slide. data transfer, particularly for digital video
A. True and mass storage
B. False 178. with icons or objects is perhaps the
C. May be simplestand easiest authoring process
D. Don’t Know A. Simple branching

174. A broad term for words used to express B. Object-based authoring programs
a concept C. Visual programming
A. text D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 429

179. Which of these is an example of a “do- A. To enable static webpages to render


main name”? dynamically

PRACTICE BOOK» NOT FOR SALE


A. www.office.com B. To supplement multimedia content in
B. Microsoft PowerPoint websites

C. HTML C. To retrieve certain files when the pro-


gram needed to open a file type is not in-
D. CSS
stalled on your computer
180. Data which describes other data is called D. To temporarily store multimedia data
downloaded from a website
A. data-sets
185. Why is it important to have an adequate
B. information
amount of disk cache space when down-
C. megadata loading multimedia objects?
D. metadata A. Because plug-ins can store a portion
of the multimedia object data in the cache
181. The sound produced by vibration, as per- and begin streaming delivery as the file
ceived by the sense of hearing downloads
A. audio
B. Because plug-ins for viewing multime-
B. text dia objects often require a large amount
C. video of disk cache space

D. animation C. Because all multimedia objects must


be completely downloaded to your hard
182. Which multimedia will best help you drive before you can view them
make it easier if you are to present a re-
D. Because multimedia objects are
search proposal?
stored in the disk cache on the hard drive
A. Infographic until you decide to view them
B. Slide deck presentation
186. The advantages of cache memory are
C. Video
A. It stores data for temporary use.
D. Vlog
B. Cache memory has limited capacity.
183. A series of digital-media files which are
distributed over the internet using syndica- C. It stores the program that can be exe-
tion feeds for playback on portable media cuted within a short period of time.
players and computers. D. It stores data for temporary use.
A. BROADCAST
187. which of these is not an animation style
B. PODCAST
C. PEDICAST A. entrance

D. ANYCAST B. exit
C. emphasis
184. What is the primary goal of an exten-
sion? D. edit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 430

188. allows direct communication and B. Original works of authorship only on-
sharing of peripheral resources such as file line, not in print
servers, printers, scanners and network C. Original works of authorship only in
routers. print, not online
A. MAN D. Original works of authorship online as
B. WAN well as in print
C. AMN 194. It refers to the conventional means of

NARAYAN CHANGDER
D. LAN mass communication practiced by various
communities and cultures.
189. CPU Operations
A. TRADITIONAL MEDIA
A. Fetch
B. MULTIMEDIA ARTIST
B. Encode
C. COMMUNICATION AND TECHNOLOGY
C. Decode
D. MODERN DEVELOPMENT
D. Execute
195. In1980’s, ISP is a company that pro-
190. What kind of file formats are .gif, .jpg, vides individuals and other companies ac-
.png, & .tif? cess to the internet and other related ser-
A. Audio vices such as Web site building and virtual
hosting. What does ISP stand for?
B. Document
A. International Service Protocol
C. Graphics
B. Internal Services Protection
D. Video
C. Internet Service Provider
191. Which of the following is not a digital me- D. Internet Search Program
dia
196. JM and Rence made a tiktok because it
A. Graphics
was their bonding.
B. Clicking a mouse
A. Text Material
C. Video
B. Photo & Still Images
D. Animation
C. Audio Files
192. is an application that allows you D. Video Presentation
to send and receive messages over cell
E. Infographic
phones.
A. Animated service 197. You want to give your Web site users the
ability to view high-quality video. Connec-
B. Message service
tion speed is not an issue. Which file for-
C. MMS mat could you use?
D. Multimedia A. AVI

193. Copyright laws protect: B. PDF

A. no longer protect original works of au- C. WAV


thorship D. MPEG

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 431

198. The following considerations must be fol- C. i, ii and iii


lowed in presenting information using mul- D. All of the above
timedia EXCEPT

PRACTICE BOOK» NOT FOR SALE


A. Inappropriate tone of the message 202. If you have budget constraints, you can
certainly produce a multimedia project on
B. Content of the message a slower or limited-memory computer. On
C. Target audience the other hand, it is profoundly frustrating
to face memory shortages time after time,
D. Availability of resources for production
when you are attempting to keep multi-
199. Choose the TRUE statement about Opti- ple applications and files open simultane-
cal Character Recognition (OCR) software ously. Identify the hardware that can be
upgraded in order to allow a computer to
A. OCR Software use special color-
run smoothly
correction hardware to ensure that what
they see on the screen matches precisely A. Plug-and-play
what will be printed B. Random access memory
B. OCR Software can teach the system to C. Read-only memory
recognize other commands that are more
D. Small computer system interface
specific to your application
C. OCR Software can convert paper docu- 203. Your friend messages you through a voice
ments into a word processing document message on Messenger.
on your computer without retyping or A. Text Material
rekeying.
B. Photo & Still Images
D. OCR Software can trigger common
menu events such as Save, Open, Quit, C. Audio Files
and Print D. Video Presentation

200. Which file format designates an Ap- E. Infographic


ple QuickTime Movie file, which supports 204. Transmit information electronically via
video, animation, text and audio? media such as films, radio, recorded music,
A. MOV or television.
B. SWF A. BROADCAST MEDIA
C. MPEG B. MULTIMEDIA
D. AVI C. INFORMATION
D. MASS MEDIA
201. Select the TRUE statements about SCSIi.
It may connect internal devices such as 205. A model slide on which text and back-
hard drivesii. It may also connect exter- ground are formatted in a specific way is
nal devicesiii. It is often preferred for real called
time video editing, network server, and
mirroring situationiv. Its standards sup- A. Modeler
port hot-swapping and plug-and-play B. Practice sheet
A. i and ii C. template
B. ii and iii D. Theme

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 432

206. Typically create vector graphics, which 211. Why are audio & video files compressed
use mathematical formulas to represent before they are transferred across the in-
image content instead of pixels ternet?
A. Painting Program A. To shorten the amount of time re-
quired to download them
B. Drawing Program
B. To remove any redundant information
C. Image Editing Program
C. To provide efficient integration of mul-
D. Audio Capture and Editing Program

NARAYAN CHANGDER
timedia formats with the browser & com-
puter
207. What assigns an intensity value to each
pixel, ranging from 0-255 for each of the D. To enable audio & video files to be
three color components in a picture? viewed and/or heard as part of a standard
HTML document
A. Color Mode
212. In a multimedia system, a and
B. RGB speaker are used for providing sound.
C. CMYK A. mouse
D. Color Depth B. pointer
C. microphone
208. What is considered as one of the most
popular multimedia applications because D. scanner
of its movies and video games?
213. Lindsey decided to make her profile pic-
A. Advertisement ture black and white. What image editing
B. Entertainment technique should she use?
A. Blend Modes
C. Education
B. Layering
D. Industrial
C. Layer Masks
209. What is used to improve the interactivity D. Adjustment Layer
of multimedia applications? It is embed-
ded within an HTML document. 214. Define which statement are TRUE refer
to san serif
A. CSS
A. Have a little decoration at the end of a
B. HTML5 letter stroke
C. JavaScript B. Without decoration at the end of a let-
D. Java ter stroke
C. Example:Times New Roman, Century
210. is the recording, reproducing, or and Bookman
broadcasting of moving visual images.
D. Common use for printed media
A. Game
215. What do you not need to making Multi-
B. Video media?
C. Audio A. Hardware
D. Graphics B. Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 433

C. Intangible things B. beta testing


D. Authoring Systems C. gold master

PRACTICE BOOK» NOT FOR SALE


E. Cute things D. release

216. A good way for communication and helps 221. Multimedia games are a
us to understand the messages that some- A. Software product
one’s trying to convey because of the com-
bination of text, graphics, audio, video, B. Educational product
and animation using computer. It is called C. Entertainment product
D. Information product
A. media
222. JPEG may be expanded as
B. newspaper
A. Joint photographic Exports Group
C. multimedia
B. Joint Physical Experts Group
D. hypermedia
C. Joint Physical Exports Group
217. How many formats of multimedia are
D. Joint Photographic Experts Group
there?
A. 4 223. Once the Storyboard is confirmed, the
multimedia developers will start the
B. 5
Phase
C. 6
A. Design
D. 7
B. Evaluation
218. Carla is an author on Wattpad and she C. Implementation
wants to publish her work.
D. Publishing
A. Text Material
224. represented in binary format
B. Photo & Still Images
A. Vector
C. Audio Files
B. Digital
D. Video Presentation
C. Analog
E. Infographic
D. Bitmap
219. The video signal is magnetically written
to tape by a 225. What is multimedia system
A. track A. Multimedia system is a field involving
computer-controlled integration of text,
B. helical head
graphics, still images, animations, audio
C. spinning recording head and/or video where every type of informa-
D. tape path tion can be represented, stored, transmit-
ted and processed digitally.
220. A program that has not yet been intro- B. Multimedia system is a system capa-
duced to the public but is being released to ble of processing multimedia data that in-
a select few to test is happened in clude continuous media such as video and
A. alpha testing audio.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 434

C. Multimedia system is a system to cre- 231. These are graphic visual representations
ate multiple data of information, data, or knowledge in-
tended to present information quickly and
D. Multimedia system is a system to orga-
clearly
nize the data
A. Vlog
226. What is Haptics Technology? B. Infographics
A. It is technology. C. Blog

NARAYAN CHANGDER
B. It is one of the type of technology. D. PowerPoint presentation
C. Combining hard sensor information.
232. Individual dots which make up bitmap
D. Feedback technology that takes advan- graphics.
tage of the users sense of touch by apply-
A. Multimedia
ing force.
B. Morphing
227. Advertising, digital catalogues, simula- C. Megapixel
tions are examples of use of multimedia
in D. Pixel

A. Education 233. What image editing term means the en-


larging or shrinking of a graphic?
B. Business
A. Transforming
C. Entertainment
B. Scaling
D. none of above
C. Aspect Ratio
228. Where to use multimedia? D. Adjustment Layer
A. Business
234. Which of the following is NOT the charac-
B. Video teristics of Multimedia
C. Animation A. Message
D. Text B. Audio/Video
C. Interesting
229. OCR stand for
D. Interactivity
A. Optical Character Recognition
E. Design
B. Option Civil Right
C. Outsized Character Reader 235. James wants to make the background of
a photo of himself see-through, so that he
D. none of above can change the background. What should
he change about the background of his im-
230. Which of these is a form of media? age?
A. Television A. Fill
B. Internet B. Aspect Ratio
C. Newspaper C. Transparency
D. All of the above D. Rotation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 435

236. Three considerations for are C. graphic


A. frame rate, color depth, image size D. animation

PRACTICE BOOK» NOT FOR SALE


B. frame rate, color depth, image color 242. What are the types of Media?
C. frame rate, color code, image color A. Print media
D. frame size, color depth, image color B. Television
237. On which field does multimedia play a vi- C. Movies
tal role as it encourages the learners to D. Computer
interact inside the class?
243. What does lossless mean?
A. Industrial
A. reduces file size by eliminating some
B. Education data
C. Entertainment B. reduces file size without losing data
D. Advertisement C. how an image is saved to reduce file
size
238. CSS stands for?
D. how easy it is to transfer, view, and
A. Cascade Styling Sheet
edit files
B. Cascading Styling Sheet
244. Multimedia in education can be used
C. Cascading Style Sheet
A. as video, podcasts, animations
D. Coded Style Sheet
B. to store data
239. What is media? C. to create a chart
A. Tools used to store and share informa- D. to network computers
tion or data
245. MPEG codecs use
B. Tools used on a workbench
A. lossless compression schemes
C. Information that is stored.
B. lossy compression schemes
D. none of above
C. lost compression schemes
240. The process of teachers and students com- D. loss compression schemes
bining spoken words with audio, video,
simulations and other interactive digital 246. Video refers to
materials is known by which of the follow- A. movement of created pictures
ing terms? B. real pictures in motion
A. Mixed media learning C. created video
B. Multiple learning D. still picture
C. Multimodal learning
247. The main difference between DVD and
D. Multifaceted learning Blu-ray Disc is
241. The multimedia element that makes ob- A. disc diameter
ject move is called B. data transfer rate
A. audio C. storage size
B. video D. image compression

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 436

248. What is defined as the behaviors shown 253. “Which medium is used to transmit data”
by the person or individual that uses the
A. Transmission media
application or product over the net?
B. Storage media
A. user participation
C. Perception media
B. user as a contributor
D. Representation media
C. user experience
D. user demand 254. Which of the following is a miniature

NARAYAN CHANGDER
Java program that is downloaded into a
249. is used for deleting or rearranging Web browser when a user requests a Web
scenes, adding voice-overs, and adding page?
other special effects
A. ActiveX control
A. Painting Program
B. Viewer
B. Drawing Program
C. Plug-in
C. Image Editing Program
D. Java applet
D. Video Editing Software
255. is a vital element of multimedia
250. refers to how easy it is to open, mod-
menus, navigation systems, and content.
ify, and view the files on computers us-
ing different operating systems, software, A. audio
and browsers. B. video
A. Compression C. text
B. Portability D. graphic
C. Transparency
256. Barcode readers are probably the most
D. Color Depth
famous optical character recognition de-
251. are authoring systems, wherein vice in use today which can
theelements are organized as pages of a A. read graphics into a computer
book or a stack of cards
B. recognize the numeric characters of
A. card-based the universal product code pattern
B. cover-based C. scan voice and display in the computer
C. page-based D. scan and save the text in the computer
D. paper-based
257. Select the multimedia element. A multi-
252. What is the moving images of artwork media application may require the use of
called? speech, music and sound effects.
A. video A. Audio
B. animation B. Video
C. virtual reality C. Animation
D. picture D. Graphic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 437

258. The use of in multimedia material 263. In multimedia system sounds, is the
makes it easier to search and view related terminology used in analog form.
content.

PRACTICE BOOK» NOT FOR SALE


A. digital
A. linkage B. analog
B. hyperlink C. multimedia
C. link
D. midi
D. connection
264. Unit used to measure the resolution of
259. The physical and electronic parts of a com- digital cameras. Refers to 1 million pixels.
puter, rather than the instructions it fol-
A. Multimedia
lows.
B. Morphing
A. Hardware
C. Megapixel
B. Software
D. Pixel
C. Time-based tools
D. Card-or page-based tools 265. Which of the following file extensions
refere to video files.
260. What is the term for mathematical state-
ments that describe a series of points to A. MP3
be connected to create an image? B. AVI
A. Bitmap graphics C. MP4
B. Raster graphics D. TIF
C. Streaming graphics E. GIF
D. Vector graphics 266. What image file type is recommended for
261. Which of the following is an disadvan- fax storage?
tage of multimedia? A. PSD
A. It is portable and flexible B. TIFF
B. It may lead to information overload C. PDF
C. It is interactive D. PNG
D. It is multisensorial
267. The exchange of information and the ex-
262. The implementation of an image capture pression of feeling that can result in under-
hardware used for building employee ID standing?
and badging databases, scanning medical A. INFORMATION
insurance cards, for video annotation, and
B. MEDIA
for real-time teleconferencing is the exam-
ple of multimedia in C. COMMUNICATION
A. school D. TECHNOLOGY
B. business 268. There are three tracks in video tape
C. public places which are
D. home A. audio, video and control tracks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 438

B. audio, video and scan tracks 273. Buying and selling goods and services on
C. audio, video and image tracks the Internet is called ?

D. audio, video and path tracks A. E-mail


B. E-Commerce
269. Additional notes can be inserted on the
preview box. C. E-bay
A. True D. none of above

NARAYAN CHANGDER
B. False 274. Select CORRECT statements about digital
C. May be video.
D. Don’t Know A. Digital video device produces excellent
finished products at a double of the cost of
270. It is a recording of moving visual images analog.
made digitally.
B. Digital video eliminates the image-
A. Audio degrading analog-to-digital conversion.
B. Video C. Getting the rights for digital video is
C. Text easy.
D. Picture D. Producing digital video is fast and not
time consuming.
271. Maria is doing her homework while talk-
ing to her mom on a video call. 275. Identify another way of saying DPI (Dots
per inch).
A. Text Material
A. Screen resolution
B. Photo & Still Images
B. quality
C. Audio Files
C. resolution
D. Video Presentation
D. Printer resolution
E. Infographic

272. Choose the wrong statement about dis- 276. Multimedia tools include
crete and continuous media A. databases
A. Discrete media refers to media involv- B. spreadsheets
ing space dimension only (e.g. still im- C. leaflets
ages, text and graphics).
D. Videos, animations, sound, words, im-
B. Discrete media is also referred to as
ages
static mediaContinuous media refers to
time-based media (e.g. sound, moving im- 277. What type of text that used for body of
ages, and animation) where media con- text to guide the reader’s eyes along the
tent may change over time. line of text?
C. Discrete media is similar to captured A. Arial
media
B. Verdana
D. Continuous media is also referred to
as dynamic media or time-based media or- C. Palatino
temporal media. D. Genera

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 439

278. Graphics created entirely on a computer, C. Content on the Internet is typically per-
using 2D or 3D graphics software. manent

PRACTICE BOOK» NOT FOR SALE


A. Computer Aided Design D. Deleting a photo or video means it can
B. Computer Generated Imagery never be viewed again
C. Digital Rights Management
284. Which of the following explains well with
D. Dots per inch
the word “MONITORING
279. Multimedia is used in A. Observing
A. playing games
B. Analyze data from the content
B. playing music
C. watching films C. Determine action for a certian meeting

D. all of the above


D. none of above
280. It is used to gather, process, and commu-
nicate own info and ideas. 285. What image file type is best used for an-
A. Links imated graphics?
B. Navigational tools A. GIF
C. Different tools
B. TIFF
D. Computer
C. PNG
281. It is more interactive medium of mass me-
dia, and can be briefly described as a net- D. JPEG
work of networks.
A. NETWORKING 286. “Which medium is used to output infor-
mation from the computer or input in the
B. INTERMET computer”
C. ETHERNET
A. Presentation media
D. INTERNET
B. Representation media
282. In a video camera, the sensor that picks
up light is called a CCD. CCD stands for: C. Perception media
A. color-coding data D. Transmission media
B. custom color descriptor
C. chroma-calculation daemon 287. What is hypermedia?

D. charge-coupled device A. Hypermedia is media that is very fast


E. carbon crystal digitizer B. Hypermedia is media that that includes
videos
283. Which comment is most true?
A. You can completely control who can C. Hypermedia is media that is interac-
see your online content tive when clicked on
B. Content on the Internet is never per- D. Hypermedia is media that only in-
manent cludes text.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 440

288. Several options like this are examples 293. Which statement about vector graphics is
of:-Text is encoded in ASCII-An audio data true?
stream in PCM (Pulse Coded Modulation)- A. Vector graphics have much larger file
Image in JPEG format-Video in MPEG for- sizes than raster graphics.
mat
B. Vector graphics are pixel-based.
A. Representaton media
C. GIFs and JPGs are vector graphics.
B. Presentation media
D. Vector graphics are saved as se-

NARAYAN CHANGDER
C. Transmission data quences of vector statements.
D. Perception media 294. Web pages that use ActiveX:
289. This is the process of presenting a topic A. may not render properly in Web
to an audience. browsers other than Internet Explorer or
Mozilla Firefox.
A. Print media
B. cannot run Java applets.
B. Website
C. can include animation, audio and
C. Simulation video.
D. Presentation D. may not render properly in Internet Ex-
plorer or Mozilla Firefox.
290. lTwo-dimensional still figure or illustra-
tions 295. Which one of the following IS NOT / ARE
NOT typically part of a multimedia specifi-
A. graphics cation?
B. animation A. text
C. video B. odors
D. storyboard C. sound
D. video
291. The “ROM” in “CD-ROM” stands for:
E. pictures
A. random-order
B. real-object memory 296. Processor market are
A. Intel
C. read-only memory
B. Microsoft
D. raster-output memory
C. AMD
E. red-orange memory
D. Lenovo
292. The role is to develop the graphic el-
297. It is profoundly frustrating to face mem-
ements of the program
ory shortages time after time when you
A. Project Manager are attempting to keep multiple applica-
tions and files open simultaneously. Iden-
B. Subject Matter Expert
tify the hardware that can be upgraded in
C. Instructional Designer order to allow a computer to run smoothly
D. Graphic Artist A. RAM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 441

B. ROM A. a sequence of slides that usually incor-


C. CPU porate text, sound, graphics, and anima-
tion

PRACTICE BOOK» NOT FOR SALE


D. none of above
B. a speech
298. is one of the distinct parts of MIDI C. information presented using more text
that stores all the data and information. than graphics and animation
A. physical connector D. a television interview or news report
B. message format
303. is/are typically read by the built-in
C. storage format camera on a smartphone or mobile device
D. wav and may contain link information to quickly
access a website.
299. Which system enables users to select
A. Quick Response (QR) codes
video and audio content when they want
it? B. Unicode
A. Video on demand C. ASCII code
B. Online participation D. Codecs
C. Online courseware and tutorials 304. a method in which pictures are ma-
D. Online environment nipulated to appear as moving images. 2D
must be drawn and 3D is computer gener-
300. Why is the acceptance of HTML5 in the ated (works with curves and graphs).
Web community a benefit to users of mo-
bile devices? A. Animation

A. The use of HTML5 makes the need for B. Graphics


JavaScript obsolete. C. Video
B. The use of HTML5 makes downloading D. Audio
and installing plug-ins easier and faster.
305. Amount of data used to represent a sin-
C. The use of HTML5 can help conserve
gle sample in a video or audio file.
battery power.
A. Bit rate
D. The use of HTML5 makes the need for
CSS obsolete. B. Bit depth
C. Bitmap graphics
301. is one of the distinct parts of MIDI
that controls the stored data and the con- D. Color balance
nected devices.
306. What is hypertext?
A. physical connecter
A. Hypertext is text that is very large
B. message format
B. Hypertext is text that is highlighted
C. storage format
C. Hypertext is that is moving
D. wav
D. Hypertext is when you click on high-
302. Which of the following BEST describe pre- lighted word on a web page to go to a new
sentation? link

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 442

307. It is characterized by computer- 312. What multimedia resource allows you to


controlled, integrated production, manip- combine the use of texts, images and other
ulation, presentation, storage and com- media such as audio clips and videos?
munication of independent information,
A. text
which is encoded at least through con-
tinuous (time-dependent) and a discrete B. audio
(time-independent) medium. C. graphics
A. Multimedia System D. powerpoint presentation

NARAYAN CHANGDER
B. Multimedia
313. Which of the following languages is an
C. Presentation media
object-oriented programming language de-
D. Perception media veloped by Sun Microsystems that is often
308. In Google, what is the system that orders used when data needs to be shared across
the results? a network?

A. Index A. JavaScript
B. Cookies B. Java
C. Spider program C. LiveScript
D. Page rank D. Python
309. What are some types of Authoring 314. The purpose of any is to test the ini-
Tools? tial implementation of your idea and im-
A. Icon-and Object-Based prove upon it based on test results.
B. Card-and Page-Based A. executive summary
C. Project-Based B. proposal
D. Time-Based C. prototype
310. A is represented by a dot or square D. creative strategy
on a computer monitor display screen.
A. Vector 315. Which of the following is not a key prop-
erty of multimedia
B. Bitmap
A. Independent media
C. Pixel
B. Dependent media
D. none of above
C. Integration
311. Why is multimedia used?
D. Computer-Controlled systems
A. It makes a product look more profes-
sional 316. What type of software/app do you need
B. It is more interesting and engaging on a computer to view web pages?
than just boring pain text A. Camera
C. It appeals to more people as some like
B. Web Browser
reading text, others prefer to listen and
some like watching content C. Web Server
D. All of these options D. Text Editor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 443

317. Select CORRECT statements about analog D. Refers to the communication channels
video through which we disseminate news.

PRACTICE BOOK» NOT FOR SALE


A. Output of the CCD is processed by the 322. Select the correct user interface principle”
camera into four channels of color infor- Users can make their own personal or indi-
mation in analog video. vidual learning by using tracking or book-
B. Composite analog video has all the marks . “
video components which are brightness, A. Navigation
light and synchronization
B. Clarity
C. Higher in quality is the signal that
makes up Separate Video (S-Video) C. Consistency

D. Each frame is represented by a fluctu- D. Personalization


ating voltage signal known as an analog 323. Transition speed and sound can be from
wave form the group.
318. Multimedia means using ways of A. preview
communication. B. timing
A. one C. background
B. multiple D. view
C. seven
324. The software vehicle, the messages, and
D. slide the content presented on a computer or
television screen together make up:
319. What image file type is the industry stan-
dard for editing raster graphics? A. a multimedia project
A. TIFF B. a CD-ROM
B. JPEG C. a web site
C. PSD D. a multimedia title
D. PNG E. an authoring tool

320. It is a media and content that uses a dif- 325. Non-physical creations such as stories,
ferent content form. music, works of art, and computer soft-
ware are called.
A. Media
A. Free downloads
B. Multimedia
B. Interesting property
C. Audio
C. Intellectual property
D. Video
D. Restricted permission work.
321. What is motion and information media?
326. It is the conversion of sound from analog
A. Form of media that has the appear- format to digital format.
ance of moving texts and graphics.
A. Sampling
B. Electronic media possessing both a
sound and visual component. B. Digitizing
C. We can see and understood by observ- C. Trimming
ing the visual aspect of any object. D. none of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 444

327. The roles are to define the scope of 332. Light passes from an object through the
the project and discuss with the client. video camera lens and is converted into an
electrical signal by a
A. Project Manager
A. signal converter
B. Subject Matter Expert
B. camera focus device
C. Instructional Designer
C. light converter
D. Graphic Artist
D. charge coupled device

NARAYAN CHANGDER
328. VR stands for:
333. What type of multimedia format would
A. virtual reality
show you how to properly make your
B. visual response bed?
C. video raster A. Game
D. variable rate B. Website
E. valid registry C. Presentation
D. Tutorial
329. Which of the following is considered an
event-driven scripting language? 334. Which of the following plug-ins was de-
A. C++ veloped by Microsoft & is a software de-
velopment tool used to write & run Inter-
B. C
net applications?
C. JavaScript
A. Flash Player
D. Java B. Windows Media Player
330. The technology of electronically captur- C. Silverlight
ing, recording, processing, storing, trans- D. QuickTime
mitting, and reconstructing a sequence of
still images representing scenes in motion. 335. What is defined as a personal website or
A. Audio social media account where a person regu-
larly posts short videos?
B. Video
A. E-Mail
C. Graphics
B. Facebook
D. Text
C. Vlog
331. In phase the multimedia developers D. Youtube
will use a Checklist to test the multimedia
program. If there are any errors, the pro- 336. Select the multimedia element. *.swf
grammer will fix the program. *.gif are the file format for element.
A. Design A. Audio
B. Evaluation B. Video
C. Implementation C. Animation
D. Publishing D. Graphic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 445

337. The use of media including text, graphics, 342. Which of the following methods is not the
video and sound elements of an application audio generation method
to provide links to related content in a mul-

PRACTICE BOOK» NOT FOR SALE


A. waveform method
timedia application is known as
B. carousel method
A. HTML
C. parametric method
B. Streaming
D. none of above
C. Hypertext
343. What does GIF stand for?
D. Hypermedia
A. Great Image File
338. A is usually the first software tool
B. Good Image Format
computer users learn
C. Graphics Interchange Format
A. word processor
D. Graphics Interchange File
B. keyboarding
C. office suite 344. A little extra padding to cover the in-
evitable unexpected costs, usually around
D. none of above 10-15% is a
339. According to the text, which of the fol- A. contingencies budget
lowing statements describes a successful B. extra budget
graphic approach?
C. GST
A. Using simple screens with lots of white
D. emergency budge
space
B. Creating background images with lots 345. How many data types can Multimedia
of color Database accept?
C. Applying a variety of decorative pat- A. 3
tern borders B. 4
D. Employing at least five different fonts C. 5
340. It came from the two words multi and me- D. 6
dia. 346. What is the term for an element on a
A. Video webpage that contains data & procedures
B. Media for how that item will reacts when acti-
vated?
C. Multimedia
A. Object
D. Picture
B. Extension
341. Which CANNOT be done using video edit- C. Add-on
ing software?
D. Viewer
A. Incorporating transitions
347. What would be the best feature to add
B. Superimposing
to a blog if you want to survey people on
C. Synchronizing sound with the video a certain topic?
D. Change color of video A. Polls

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 446

B. Media 352. Connects internal and external peripheral


C. Comments equipment and devices.
D. None of the above A. SCSI
B. IDE
348. “Improves the quality of presentation
and retains attention of audience” is the C. SATA
advantage of D. USB
A. Text

NARAYAN CHANGDER
353. GIF stands for?
B. Animation
A. Graphic Interconnection File
C. Audio
B. Graphical Interface Format
D. Multimedia
C. Graphic Information Format
349. Slide shorter view displays of the D. Graphics Interchange Format
slide.
354. An assembly of people with a common
A. thumbnails
internet interest where they become the
B. template main means of mass communication.
C. view A. PEOPLE MEDIA
D. property B. INTERNET
350. You use a proprietary Windows-based C. MESSAGES
program to create designs and layouts for D. MULTIMEDIA
your freelance greeting card business. You
want to share samples of your work on 355. The process of making a static image look
your Web site for potential new customers like it is moving.
to review. You convert the file format of A. text
your designs so that customers can view
accurate renderings of them, regardless B. animation
of the local operating system, settings or C. audio
browser each individual uses to view your
D. video
site. Which file format should you use?
A. OGG 356. Computer based training is a
B. DOC A. Software product
C. MP3 B. Educational product
D. PDF C. Entertainment product
D. Information product
351. Mr. Luis gave an assignment to his stu-
dents by making a data analysis. 357. The language used to define the structure
A. Text Material of web pages is called
B. Photo & Still Images A. CSS
C. Audio Files B. JavaScript
D. Video Presentation C. HTTP
E. Infographic D. HTML

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 447

358. To check the sound card/device available 363. provide a visual programming ap-
in a computer, go to proach to organizing and presenting mul-
timedia.

PRACTICE BOOK» NOT FOR SALE


A. control panel and select Sounds
B. drive C:and open Windows folder A. Card-and page-based authoring tools

C. run command and type dxdiag B. Time-based authoring tools


D. both a and c C. Icon-based and object-based tools
D. Blu-ray discs
359. Which of the following graphics file for-
mat is written in a page description lan- 364. Choose the INCORRECT storage device
guage that is undreadable, & can be for a computer
printed only on a specific type of printer?
A. Compact disc read only memory
A. PNG
B. FireWire
B. TIFF
C. Thumb drives
C. EPS
D. Blu-ray discs
D. PS
365. Microphone is part of Multimedia
360. What is Three-dimensional media? hardware component.
A. Occupies space defined through the di- A. input
mension of depth only.
B. output
B. Occupies space defined through the di-
mension of width only. C. storage

C. Occupies space defined through the di- D. processor


mension of height, and space. 366. RGB are
D. Occupies space defined through the di- A. Display color
mension of height, width and depth.
B. Printed color
361. What kind of file formats are .avi, .mp4,
C. Additive color
.ogg, .webm, & .mov?
D. Photostat color
A. Audio
B. Video 367. Identify the items for which Vector graph-
ics are usually used.
C. Documents
A. CAD (Computer aided design)
D. Graphics
B. 3D printing
362. A project that is shipped or sold to con-
C. Logos
sumers or end users, typically in a box or
sleeve or on the Internet, with or without D. Maps
instructions, is: E. 3D Models
A. a CD-ROM
368. starts playback as soon as enough
B. an authoring tool data has transferred to the user’s com-
C. a multimedia project puter to sustain this playback
D. a multimedia title A. Recording video

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 448

B. Playback video 374. The following are films that have been
C. Streaming video produced using Adobe Primere Pro soft-
ware except.
D. Playing video
A. doraemon
369. Produced by vibration, perceived by the B. Dust To Glory
sense of hearing.
C. Superman Return
A. audio
D. Captain Abu Raed

NARAYAN CHANGDER
B. animation
C. graphics 375. Which image file type is a replacement
for GIF or TIFF files?
D. text
A. PSD
370. Which of the following is not one of the
B. JPEG
5 elements of multimedia formats?
A. Audio C. PNG

B. Video D. PDF

C. Game 376. The various multimedia authoring tools


D. Text can be categorized into three groups,
based on the method used for sequenc-
371. In multimedia system sounds, is the ing or organizing multimedia elements and
terminology used in the digitized form of events:
sound. A. Card-or page-based tools
A. digital
B. Time-based tools
B. analog
C. Icon-based tools
C. midi
D. sound-based
D. multimedia
E. movement-based
372. depict all the tasks along a timeline
377. Select the correct user interface principle”
A. Gantt charts Clearness of labels on all icon as well as
B. Milestones easy to understand. “
C. Proposal A. Navigation
D. Budget B. Clarity

373. Which of the following graphics file for- C. Consistency


mat is widely used for complex graphics D. Personalization
because it uses lossy compression & sup-
ports 16 million colors? 378. A collection of web pages is called a
A. JPEG A. web server
B. GIF B. web browser
C. TIFF C. website
D. EPS D. WiFi

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 449

379. Which of the following products can be B. to store data


used to expand a two-dimensional pho- C. to create a chart
tograph into a three-dimensional environ-

PRACTICE BOOK» NOT FOR SALE


mental? D. to network computers
A. QTVR 384. What is an extension?
B. MOV A. A self-contained program that can be
C. Windows Media Player run anywhere on a network, including
D. Flash Player within a browser from the Internet
B. A miniature Java program downloaded
380. The sending of video over the Internet into a web browser when a user requests
that can be displayed by the viewer in real a webpage
time. Media is sent in a continuous stream
of data and is played as it arrives C. A scaled-down version of an applica-
tion
A. video streaming
D. The evolution of plug-in technology de-
B. storyboard signed to supplement & improve your web
C. multimedia experience
D. animation
385. When streaming audio or video media,
381. Whae are add-ons? what do you call the place where you
download a small part of the media file
A. Scaled-down versions of an applica-
before playing it?
tion necessary to retrieve certain files
when the program needed to open a file A. RAM
type is not installed on your computer B. Core Memory
B. Extensions & plug-ins used to ex- C. Application
tend the functionality of the Firefox web
browser D. Buffer

C. Standards-based plug-ins that play 386. The internet was off and you needed to
streaming audio & video communicate with your mom immediately,
D. Algorithms used by video & audio so you messaged her in another way.
player plug-ns to compress & decompress A. Text Material
files
B. Photo & Still Images
382. This refers to applications that are used C. Audio Files
for integration and creation of links, docu-
ments, and data sets. D. Video Presentation

A. Video E. GIFs & Animation


B. Hyperlink 387. Which one best describes an animation?
C. Text A. static image
D. Software and data B. still images
383. Multimedia in education can be used C. moving images
A. as video, podcasts, animations D. stable images

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 450

388. What is the term for an algorithm used by D. images composed of grids of pixels
HTML5 to compress & decompress files? that have a fixed resolution and cannot be
A. Codec resized without losing image quality
B. Plug-in 393. JPEG is a file format for
C. Add-on A. animation
D. Viewer B. audio
389. Which of the following scripting lan- C. graphic images

NARAYAN CHANGDER
guages is vendor-specific to Microsoft and D. video
may not be supported by browsers other
than Windows Internet Explorer? 394. Which is not the characteristic of multime-
A. JavaScript dia systems?
B. VBScript A. They must be computer-controlled
C. JScript B. They are segregated
D. LiveScript C. The information they handle must be
represented digitally
390. You and your friend are having fun with
the memes that are moving. D. The interface to the final user permits
interactivity
A. Text Material
B. Photo & Still Images 395. This is an image or visual representation
C. Audio Files of an object.

D. Video Presentation A. Video


E. GIFs & Animation B. Audio
C. Text
391. How much elements in multimedia?
D. Graphics
A. 4
B. 7 396. John sees a beautiful sunset. That’s why
C. 5 he captures it immediately.
D. 6 A. Text Material
B. Photo & Still Images
392. What is color depth?
A. a mathematical model that describes C. Audio Files
the way colors can be represented as D. Video Presentation
numbers or percentages E. GIFs & Animation
B. matching the colors produced on the
computer screen to the colors that can be 397. Mass media delivers information to a
printed on paper using ink to ensure the audience.
printed publicaton looks like the onscreen A. tiny
publication
B. small
C. refers to the number of colors per
pixel that can be displayed in an image and C. large
affects image quality and file size D. non-existent

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 451

398. Which multimedia is used to capture at- C. Nodes


tention of the audience that add an excit- D. Links
ing dimension to a presentation?

PRACTICE BOOK» NOT FOR SALE


A. Audio 404. On which tab are background style
present.
B. Graphic
A. home
C. Video
B. amination
D. Animation
C. design
399. Multimedia can be a combination of which
of the following: D. insert

A. music 405. Updating information in Web-based mul-


B. videos timedia programs is compared to CD-
Based multimedia programs.
C. photos
A. more expensive
D. all of the above
B. cheaper
400. Brett decides to remove a person from
C. expensive
the edge of a photo of himself? What im-
age editing technique should he use? D. none of above
A. Cloning 406. The technology of capturing, recording,
B. Cropping processing, transmitting, and reconstruct-
C. Transparency ing moving pictures

D. Transforming A. video
B. animation
401. What is the main purpose of the media?
C. storyboard
A. To convey information
D. audio
B. To post on social media
C. To post on social media 407. Which of these are types of media?
D. To make people angry A. Books

402. applications are specialized and pow- B. Cell phone


erful tools for creating, enhancing, and re- C. Tablet
touching existing bitmapped images. D. All of the above
A. Animation Tools
408. is a model of a set of problems or
B. Image-editing Tools
events that can be used to teach someone
C. Drawing tools how to do something, or the process of
D. Sound-Editing Tools making such a model.
A. Website
403. The structure of a hypermedia organiza-
tions B. Simulation
A. Hypermedia web C. Game
B. Hypertext D. Print media

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 452

409. What is file format for audio of multime- C. Upgrade RAM and disk storage space
dia element D. Local Ethernet system
A. adu
414. Which of the following transaction is NOT
B. aiff facilitated by the Multimedia Database
C. aip Management System?
D. gulp A. Interfere
B. Query

NARAYAN CHANGDER
410. What is the first full-length motion pic-
ture made entirely with computer anima- C. Control
tion? D. Storage
A. Tom and Jerry 415. interactivity is a two-way communi-
B. Pokemon cation process.( Data sent in both direc-
tions i.e. input and output)
C. Toy Story
A. Linear
D. Donald Duck
B. Hypertext
411. Both local area networks (LANs) and C. Non-linear
wide area networks (WANs) can connect
the members of a workgroup, but D. Multimedia
workstations are located within a short 416. a visual image such as a chart or di-
distance of one another. agram used to represent information or
A. MANs data.
B. WiFi A. Clip art
C. WANs B. Maps
D. LANs C. Infographic
D. none of above
412. This question must be asked when deter-
mining the credibility of an information us- 417. If you were asked by your English teacher
ing the URL domain extension. to write an essay about the things that
you have done last Christmas vacation,
A. Who created the message?
what resource would you likely use?
B. What is the format of the website?
A. text
C. What is the purpose of disseminating B. audio
such information?
C. video
D. What message is being sent?
D. animation
413. If you are working in a multimedia devel-
418. Two scanning technologies used by video
opment environment consisting of a mix-
display are
ture of Macintosh and Windows comput-
ers, how do you want them to communi- A. interlaced and massive scan
cate with each other? B. interlaced and progressive scan
A. ‘Clone’ Macintosh to run in Windows C. progressive and frame scan
B. Convert Windows to Macinstosh D. interlaced and quality scan

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 453

419. Data is inserted in different locations on 424. The presentation of a (usually interac-
a power point slide called tive) computer application, incorporating
media elements such as text graphics,

PRACTICE BOOK» NOT FOR SALE


A. title
video, animation, and sound, on a com-
B. subtitle puter.
C. comments A. Multimedia
D. placeholders B. Perception media
420. Animation is used in multimedia as.. C. Representation media
A. As story telling D. Presentation media
B. As buttons for interaction 425. Taking someone elses work and making
C. As complementary element it your own is called
D. As sound effect A. Fair Use
B. Plagiarism
421. Web servers and web browsers rely on
the SSL protocol to help users protect their C. Copy right
data during transfer by creating a uniquely D. Editing
encrypted channel for private communica-
426. Which of the following is a weakness of
tions over the public internet. What does
Python?
SSL stand for?
A. It has poor documentation
A. saving sharing and limits
B. It’s traditionally slower than other lan-
B. safe secured and locked
guages
C. secure socket limbs
C. It’s difficult to learn & use
D. secure socket layers
D. It has a small number of frameworks,
422. It is a form of application of multime- making it rigid
dia that involves doing interactive tests, 427. Select the multimedia element. *.avi
learning sequences, and engaging mini *.mov *.mpeg *.wmv are the file format
movies. for element.
A. Wikipedia A. Audio
B. Education and training B. Video
C. Websites C. Animation
D. Sales and marketing D. Graphic
423. Which option best defines multimedia? 428. The proper time to develop a revised and
A. Images and audio detailed project plan for the client and fi-
nalize your budget and payment schedule
B. Moving images and text
for the continuation of the project is:
C. Programs that combine text and im-
A. at the end of thepilot phase
ages on a television screen
B. at the end of beta development
D. Integration of still and moving images,
text, and sounds by means of computer C. before developing theprototype
technology D. during pretesting

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 454

429. What kind of file formats are .txt, .pdf, D. Video


& .rtf? E. GIFs & Animation
A. Document
435. Normal view is used to display a list of
B. Video
all slide.
C. Audio
A. True
D. Graphics
B. False

NARAYAN CHANGDER
430. Which of the following is an example of C. May be
an input device?
D. Don’t Know
A. Speaker and headphone
B. Blu-ray discs 436. Multimedia is thus interactive assis-
tance in developing student’s skills by ed-
C. Microphone ucating and informing them. Its compo-
D. LED screen nents are:Data and Information (text, im-
ages and video that combine to produce
431. Placing an uppercase letter in the middle structured activities the user views as in-
of a word is referred to as formation, more emphasis will be on text-
A. lowercase based information), Participants (teachers
B. intercap and students, parents and siblings, they
will also be using the system), IT (high
C. uppercase resolution VDU, audio speakers, CD/DVD
D. middlecase drive, sufficient RAM and reasonably fast
processor, keyboard and mouse for chil-
432. HTML controls the of a web page. dren’s click n drag, headphones) and Re-
A. content lationships (the direct user, the students
who are also the participants, will con-
B. appearance
trol the path taken through applications as
C. speed they select from the interactive menu via
D. cost a mouse or keyboard and use the multime-
dia CD to their own need, speed and pref-
433. Software that you need include: erence).
A. Text Editing and Word Processing A. education
Tools
B. games
B. Objects
C. immersion
C. OCR Software
D. entertainment
D. Painting and Drawing Tools
E. Organizing Features 437. A browser is used to view:
A. program code
434. While watching Marvel’s Avengers, you
found the graphics amazing. B. storyboards
A. Text Material C. fonts
B. Photo & Still Images D. Web-based pages and documents
C. Audio Files E. videodiscs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 455

438. What is the file type that Google Chrome 443. Which of the following computer is able
extensions use? to handle multimedia?

PRACTICE BOOK» NOT FOR SALE


A. .XPI A. multimedia computer
B. .CRX B. media computer
C. .XXLS C. multi computer
D. .PDF D. every computer

439. This multimedia is used as data display 444. are additional indispensable tools for
projectsin which your source material may
A. Animation
originate on Macintoshes, PCs, Unix work-
B. Video stations, or even mainframes
C. Movie A. voice recognition systems
D. Graphic B. digital cameras

440. What is the term for pixel-based images C. output devices


that map bits to a display space? D. format converters
A. Streaming Graphics
445. Which is not an example of a multimedia
B. Vector Graphics database in the entertainment field?
C. Codecs A. Video on Demand
D. Raster Graphics B. Music Database

441. Detailed documents from large corpora- C. Advertising


tions that are “outsourcing” their multime- D. Interactive TV
dia development work is listed in
446. internal connections like; hard disks,
A. request for proposal
CD-ROM drives, and other peripherals
B. proposal mounted inside the PC
C. planning file A. Integrated Drive Electronics (IDE)
D. budget B. File Transfer Protocol (FTP)

442. Select TRUE statements about FireWirei. C. SATA


Can only be attached to one computer at a D. USB
timeii. Introduced by SONY in the 1990siii.
Becomes an industry standard and pro- 447. Drawing or painting programs that are
vides support for high-bandwidth serial specifically designed for touching up or
data transferiv. Has replaced Parallel SCSI modifying images, such as original digital
in many applications because it is cheaper images and digital photos.
A. ii and iii A. Drawing Program
B. iii and iv B. Painting Program
C. ii, iii and iv C. Image Editing Programs
D. All of the above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 456

448. Adobe Flash is an example of editors 453. This is a personal website or social me-
for editing special effects dia account where a person regularly posts
A. video short videos

B. audio A. Blog

C. graphics B. Podcast

D. animation C. Vlog
D. PowerPoint Presentation

NARAYAN CHANGDER
449. Which of these is NOT likely to be the re-
sponsibility of a multimedia designer? 454. Which one below is NOT an analog broad-
A. Select media types for content. cast video standard?
B. Ensure the visual consistency of the A. NTSC
project. B. SECAM
C. Analyze content structurally. C. PAL
D. Integrates all the multimedia ele- D. HDTV
ments into a project.
455. All of the following are ecommerce risks
450. The ability to superimpose one clip over
for customers, except one. Which of the
another is a valuable technique with green
following is NOT an ecommerce risk for
screening is called
customers:
A. chroming key
A. Possible Security Issues
B. chrome key
B. Possible Privacy Issues
C. chroming
C. Purchasing from photos & descrip-
D. chroma key tions
451. The better your or typing skills, D. Convenience
theeasier and more efficient your multime-
dia day-to-day life will be. 456. Which statement is true?

A. editing A. Songs are protected by copyright

B. housekeeping B. Sharing music is always okay

C. moviemaking C. You can copyright ideas


D. keyboarding D. All of the above
E. creating 457. You have a family dinner, and when the
food comes out, their cellphone comes out
452. Which of the following networks contain
to take a snap of the food.
legit source, ? You have multiple answers
here. Choose carefully. A. Text Material
A. .org B. Photo & Still Images
B. .net C. Audio Files
C. .com D. Video Presentation
D. .edu E. GIFs & Animation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 457

458. If you are “media literate”, you can D. This include how media is used during
A. create a post on Facebook Pre-historic age, Industrial age, Informa-
tion age, Electronic age.

PRACTICE BOOK» NOT FOR SALE


B. communicate with your friends
463. Which one of the file format below are
C. get a large amount of likes on Insta-
not for an audio?
gram
A. MP3
D. analyze and evaluate the media mes-
sages you receive B. HTML
C. WMA
459. Which file format is a popular, customiz-
able graphics format commonly used for D. WAV
medical imaging and desktop publishing?
464. Which of the following best suits this de-
A. PNG scription:a visual image such as a chart or
B. JPEG diagram used to represent information or
data?
C. GIF
A. Infographic
D. TIFF
B. Interactive content
460. Graphics which are stored as a series of C. Online games
mathematical shapes and properties that
D. Slide deck presentation
can be independently manipulated at any
time. 465. What’s a good reason to start a blog?
A. Vector graphics A. To share your opinions and informa-
B. Virtual actors tion on a specific area of interest
C. Bitmap graphics B. To post your class papers so other peo-
ple can use them in the future
D. Bit depth
C. To share someone else’s pictures and
461. Solve this simile:Audio is to the ears as comments as if they were your own
Video is to the D. All of the above
A. Nose
466. is an an external bus standard that
B. Mouth supports data transfer rates of 480 mbps
C. Ears (480 million bits per second).
D. Eyes A. FireWire
B. Universal Serial Bus (USB)
462. What is the Evolution of Traditional Me-
dia and New Media? C. Integrated Drive Electronics (IDE)
A. Information Communication Technol- D. Small Computer System Interface
ogy
467. This is a regularly updated website or
B. This include how technology equip- web page, typically one run by an individ-
ment become updated. ual or small group, that is written in an
C. The improvement of technology in our informal or conversational style
new generation. A. Podcast

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 458

B. Vlog 473. What does Connections not include?


C. PowerPoint presentation A. SCSI (Small Computer System Inter-
D. Blog face)
468. Multimedia can be used in a business B. IDE, EIDE, Ultra IDE, ATA, and Ultra
A. on a business card ATA

B. on a letter C. FireWire and i.LINK (IEEE 1394)

NARAYAN CHANGDER
C. on a website / presentation D. USB
D. on a fax
E. Blu-ray Discs
469. or special effects, such as crystal-
lize, dry brush, emboss, facet, fresco, 474. Memory is primarily of types
graphic pen, mosaic, pixelize, poster, rip-
A. Cache Memory
ple, smooth, splatter, stucco, twirl, water-
color, wave, and wind B. Harddisk
A. filters
C. Primary Memory/Main Memory
B. effect
D. Secondary Memory
C. tricks
D. magical 475. This is a location connected to the Inter-
470. A barcode reader can net that maintains one or more pages on
the World Wide Web.
A. scan graphic into a computer
B. read universal product code (upc) pat- A. Tutorial
terns B. Print media
C. recognize spoken words when trained
C. Website
D. provide sharp and detailed image res-
olution D. Game

471. Anna reduced her image file size from 3.5 476. Augmented reality is a
MB to 200 KB. This refers to what format
factor? A. Software product
A. Compression B. Educational product
B. Transparency C. Entertainment product
C. Color Depth
D. Information product
D. Portability
472. What application would be best for ana- 477. The expansion for MIDI is
lyzing data?
A. Musical Instrument Digital Interface
A. Spreadsheet
B. Musical Instrument Data Interface
B. Presentation software
C. Word processing C. Musical Instructions Digital Interface
D. None of the above D. Musical Information Data Interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 459

478. With OCR, or , retailers can efficiently C. Points


process goods in andout of their stores and D. Picas
maintain better inventory control.

PRACTICE BOOK» NOT FOR SALE


484. Multimedia can be used in a business
A. encoding
A. on a business card
B. barcoding
B. on a letter
C. handwriting
C. on a website / presentation
D. retyping
D. on a fax
E. rekeying
485. The following are examples of storage
479. The basic elements of a processor devices EXCEPT for
A. arithmetic logic unit (ALU) A. Hard Disks
B. floating point unit (FPU) B. FireWire
C. operands C. DVD
D. L1 and L2cache memory D. Blu-ray Discs

480. Which of these is the keyboard shortcut 486. Alex wants to email some of his photos
to add a new slide? to his clients. What image file type does
he used?
A. ctrl+ m
A. JPEG
B. ctrl+ n
B. PNG
C. ctrl+ c C. PDF
D. ctrl+ s D. TIFF
481. The building blocks of project manage- 487. This multimedia component can function
ment are as a musical background to images and
A. budgets photographs, and even texts.
B. tasks A. text
C. proposals B. audio
C. animation
D. milestones
D. graphics
482. Media that allows active participation by
the user or viewer. 488. A computer output on a CRT is calibrated
to display an image
A. rich media
A. smaller than the actual monitor’s capa-
B. tutorial bility
C. game B. larger than the actual monitor’s capa-
D. interactive media bility
C. that adjusts automatically to the moni-
483. What unit of measurement is equal to
tor’s capability
1/72 of an inch?
D. which can be it is larger or smaller
A. Inches than the monitor’s capability depending
B. Pixels on the monitor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 460

489. These are characters that are used to cre- 494. All are components of multimedia, EX-
ate words, sentences, and paragraphs. CEPT one.
A. Audio A. Graphics
B. Graphics B. Internet connectivity
C. Text C. Sound
D. Animation D. Text

NARAYAN CHANGDER
490. This is a presentation of a series of still 495. , such as Photoshop, Fireworks, and
images on a projection screen or electronic Painter, isdedicated to producing crafted
display device, typically in a prearranged bitmap images.
sequence. A. Drawing software
A. PowerPoint presentation B. Animation Tools
B. Vlog C. Painting software
C. Podcast D. Animation Tools
D. Blog
496. Also known as printer resolution. The
491. It is a combination of all kinds of media number of dots of color a printer is capable
such as text, speech, sound, graphics or of producing in a certain amount of space.
images, animation and video. A. Digitisation
A. MULTIMEDIA B. Dots per inch
B. COMMUNICATION C. Digital effects
C. LITERACY D. Copyright
D. ANIMATION 497. People use online platforms for make
492. According to one source, in interactive their daily activities easier; therefore, E-
multimedia presentations where you are commerce website is for
really involved, the retention rate is as A. business to business transactions and
high as: business to consumer transactions
A. 20 percent B. getting money from your computer on-
line
B. 40 percent
C. selling your home on the net
C. 60 percent
D. a revolution in business practices
D. 80 percent
E. 100 percent 498. Multimedia enhances the information for

493. Which video file format is the Macintosh


A. poor communication and understand-
native movie platform?
ing
A. .MOV B. misunderstanding
B. .OGG C. better communication and understand-
C. .MP4 ing
D. .AVI D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 461

499. Which of the following is NOT database A. Plug-ins load an entire file at once and
types? deliver the information as a continuous
stream of data.

PRACTICE BOOK» NOT FOR SALE


A. Distributed
B. Plug-ins cannot eliminate transfer de-
B. Object-oriented
lays because all multimedia files consist
C. Hypertext of non-streaming media.
D. Operational C. Plug-ins remove all data from the local
disk cache before attempting to retrieve a
500. These are objects that move or change file.
like video, audio, and animation. D. Plug-ins retrieve a small portion of a
A. Static Elements file at a time and deliver enough informa-
tion to build a continuous stream of data.
B. Elements
C. Dynamic elements 505. Which of the following is NOT an exam-
ple of graphics?
D. none of above
A. Drawings
501. Refers to the number of colors in an im- B. Business letters
age. C. photos
A. Bit rate D. charts
B. Bit depth 506. Multimedia features include
C. Bitmap graphics A. databases
D. Color balance B. spreadsheets
C. leaflets
502. Which of these is NOT a web browser?
D. Videos, animations, sound, words, im-
A. Safari ages
B. Chrome 507. Media refers to
C. Firefox A. information
D. Bing B. data and instructions
C. way through which information can be
503. The air vibration causes the air pressure
shared
nearby to fluctuate. This create
D. way through which data and instruc-
A. a wave that consist of high (compres- tions can be shared
sion) and low (rarefaction) air pressure
which propagate. 508. Technically refers to any application that
contains more than one type of media, but
B. a signal that does not fluctuate
is often used to refer to audio and video
C. a digital data that is continuous content.
D. a discrete data that can be editted A. Graphics
B. Multimedia
504. How do plug-ins eliminate transfer de-
lays when files are played from a C. Vector
browser? D. Bitmap

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 MULTIMEDIA DATA 462

509. It is one of the common multimedia op- 514. General name for operations performed
eration of a sound editor that is used to on an image using graphics software.
delete any blank space from the beginning A. Typography
and end of the recording
B. Resolution
A. Digitizing
C. Flipping
B. Sampling
D. Filters
C. Trimming

NARAYAN CHANGDER
515. Any combination of text, graphics, sound,
D. None of the Above
animation, and video that is delivered in-
510. The shapes feature is used to insert teractively to the user by electronic or dig-
shapes such as rectangles and arrows on itally manipulated means
the slide. A. multimedia
A. True B. video
B. False C. video streaming
C. May be D. animation

D. Don’t Know 516. Which of the following is the examples


of multimedia in entertainment?
511. are non-removable mass-storage de-
vices and have a high data storage capac- A. Instant messaging
ity and data transfer speed. B. Games
A. CD-ROM C. Transport Station
B. Hard disks D. Courseware
C. DVD 517. the two most significant platforms-
D. FireWire for producing and delivering multimedia
projects:
512. is one of the distinct parts of MIDI A. Apple Macintosh OS
that connects and transports data be-
tween devices. B. Android OS
C. Microsoft Windows OS
A. physical connecter
D. Linux OS
B. message format
C. storage format 518. Multimedia on the Web has expanded
rapidly as broadband connections have al-
D. wav lowed users to connect at faster speeds.
Almost all Web sites, including corporate
513. CSS controls the of a web page.
sites, feature multimedia content and in-
A. content teractive objects. To view interactive mul-
timedia online, you need which of the fol-
B. appearance
lowing?
C. speed
A. An operating system that is
D. cost multimedia-compatible

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 463

B. Additional RAM and access to a multi- C. A program installed in the browser to


media server extend its basic functionality

PRACTICE BOOK» NOT FOR SALE


C. A sound card, speakers and a video D. An application used to retrieve a file
card when the program needed to open the file
type is not installed on your computer
D. Browser plug-ins
520. An activity or sport usually involving
519. What is a viewer? skill, knowledge, or chance, in which you
follow fixed rules and try to win against
A. An algorithm used by video & audio an opponent or to solve a puzzle
player plug-ins to compress & decom-
A. Simulation
press files
B. Website
B. A miniature Java program downloaded
into a web browser when a user requests C. Tutorial
a webpage D. Game

8.4 MULTIMEDIA IN THE INTERNET


1. Which statement about presentations is C. Improving the assessments overall ac-
true? curacy.
A. Presentations must be published to a D. Improving the assessments test of
Web site to be shared on the Internet. only hand writing skills.
B. Presentations can only be viewed us-
4. Tabitha’s school is hosting a parent-
ing a projection system.
teacher conference night. She has created
C. Presentations can include a variety of a slide show and would like it to play and
resources. repeat automatically on her projector dur-
D. Presentation templates are copy- ing the conference. Which method should
righted and must be authorized for use. Tabitha use to play and repeat the slide
show automatically?
2. a sequencer for displaying, animating, and- A. Set the presentation to loop the slide
playing Cast members show continuously.
A. Score B. Add a hyperlink to the presentation to
B. Macromedia Director the school’s Web page.
C. Macromedia Flash C. Modify the presentation’s setup to ad-
vance slides ‘on click’.
D. Time-Based Tools
D. Manually restart the slide show from
3. Which of these is NOT an aim of Interac- the beginning each time it ends.
tive Assessment?
5. Which of the following is a character en-
A. Improving the learners understanding
codingsystem?
of the questions.
A. FontTab
B. Improving the learners scope for pos-
sible answers. B. HTML

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 464

C. CSS 10. Using more than speech or music made ar-


tificially for use in a presentation
D. WYSIWYG
A. animations
E. Unicode
B. multimedia
6. Describe your diagram clearly C. content
A. Allow the user to have control of the D. background
sequence and progress of the multimedia

NARAYAN CHANGDER
contents 11. What is the minimum resolution required
for a video to be considered as high defini-
B. User is not a passive receiver of the
tion (HD)?
multimedia content most of the time.
A. 640 x 360
C. User interacts with the multimedia ap-
plication without controlling the progress B. 720 x 480
of the content C. 1024 x 768
D. User interacts with the multimedia ap- D. 1280 x 720
plication by controlling the progress of the
content 12. Layla is creating a presentation to high-
light her company’s latest product. It’s a
7. What occurs when you drag an animation very long presentation, and she wants to
in the Animations pane of your presenta- be sure it’s as perfect as she can make it.
tion software? What step does she need to take before
submitting it to her boss?
A. You add an animation to a slide.
A. Make the font different for every slide,
B. You attach multiple animations to an to add interest.
object.
B. Add music or videos so it doesn’t get
C. You change the order of animations. boring.
D. You control how each slide replaces C. Use the spell-check and automatic cor-
the previous one. rections tools to check for spelling, gram-
mar, and punctuation.
8. is a collection of text, graphics, sound,
animation and video clips. D. Change the formatting using a slide
master.
A. Multimedia
13. Family of graphics that include many type
B. media
sizes and styles.
C. monitor A. Font
D. none of above B. Typeface
9. To give credit for the original C. Multimedia

A. cite D. none of above

B. conduct 14. Mark has information that he needs to


use for in-person conferences, Web confer-
C. coordinate
ences and on his Web site. Jim told him
D. present that he should use PowerPoint, because

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 465

it’s the only presentation software avail- 18. Presentations can be used by business to
able. What should Mark tell Jim? present information, as well as

PRACTICE BOOK» NOT FOR SALE


A. PowerPoint isn’t presentation soft- A. hackers to compromise IT systems
ware.
B. teachers and students in classrooms
B. There are several different types of
presentation software, including Power- C. inmates to plan their escape from jail
Point, Google Slides, and Prezi, and any- D. the government to spy on our enemies
one with an Internet connection can view
them if they’re saved on an accessible 19. are interactive multimedia productions
site. that use technology such as Flash, Java ap-
C. Only people who have purchased Pow- plets, and streaming video.
erPoint can see a PowerPoint video; it A. Presentations
can’t be uploaded to the Internet or to
YouTube and viewed that way. B. Media

D. Nobody uses slide presentations be- C. Graphic


cause they can only be used on a desktop D. Rich media
computer.
20. Which of the following is Not a media ele-
15. During what stage of Interactive Media ment?
Authoring would an author expect to have
created the applications Storyboards? A. Animation
A. Planning B. Graphic
B. Design C. Link
C. Development D. Text
D. Production
21. The following are the multimedia file for-
16. Which of these are the basic physical and mats for photographs/Images/Animation
organizational structures and means nec- except?
essary for the functioning of a society or A. TIFF
enterprise?
B. AIFF
A. software
C. PNG
B. platform
D. JPEG
C. hardware
E. GIF
D. infrastructure

17. To delete a slide, simply hit the button 22. Online courses that simulate the classroom
on the keyboard. online (e.g., E-learning).

A. Tab A. Courseware
B. Space Bar B. Online Games
C. Delete C. Podcast
D. none of above D. Vodcast

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 466

23. What is the most common unit of measure- C. Comments


ment used for computer screen display?
D. URLs
A. Picas
B. Inches 28. Electronic system that allows the user to
control, combine, and manipulate different
C. Pixels
types of media, such as text, sound, video,
D. Points computer graphics, and animation.

NARAYAN CHANGDER
24. Multimedia and the internet have provided A. Interactive Multimedia
new ways of teaching and learning, such B. Podcast
as Distant learning for virtual classrooms
or on-line schools and CBT models that al- C. c.Music
lows people to learn at their own pace. D. d. Games
What does the acronym CBT stand for?
A. Customized Based Training 29. Online Research
B. Computer Based Technology A. requires the use of wireless networks,
C. Computer Based Training hubs, and the Internet
D. Come Back Tomorrow B. involves collecting information from
the Internet
25. A family of graphic characters that usual-
lyincludes many type sizes and styles is C. the study of materials and sources in
called a: order to establish facts and reach new
conclusions
A. typeface
D. one behind the other (socially dis-
B. font
tanced of course) waiting to pay for your
C. point groceries
D. link
30. Pokemon Go is the best example of what
E. node
technology?
26. Meeting of the eyes between two people A. IoT
that expresses meaningful nonverbal com-
munication B. AI
A. visual aid C. AR
B. animation D. FinTech
C. eye roll
31. The use of multimedia in various maga-
D. eye contact zines and newspapers that are published
27. What feature should you add to the multi- periodically.
media in your presentation for people who A. Government
might have trouble seeing multimedia con-
tent? B. Science and Technology

A. Alt Text C. Education


B. Transitions D. Mass Media and Journalism

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 467

32. Any combination of text, art, sound ani- A. O<→O<→O→O→O


mation, and video delivered to you by com- B. O→O→O→O→O
puter or other electronic or digitally manip-

PRACTICE BOOK» NOT FOR SALE


ulated means. C. O<→O<→O<→O
A. Interactive Multimedia D. O-O-O-O-O
B. Multimedia 38. Which of the following is a file extension
C. Tooltips for a graphic?
D. none of above A. .docx

33. Multimedia do not used in B. .pub

A. business C. .bmp

B. Adevertisement D. .wav
C. education 39. Which of the following is a multimedia au-
D. agriculture thoring tool?
A. Adobe Acrobat Reader
34. The people giving or likely to give atten-
tion to something B. Adobe Director
A. audience C. Adobe Photoshop
B. visual aid D. CorelIDRAW
C. presenter 40. In linear interactivity
D. background
A. User can control over the progress of
35. The acronym URL stands for Universal Re- the content and they need to follow the
source Locator and is used by a search en- contents page by page.
gine to find a websites’ B. User have no control over the progress
A. owner of the content and they need to follow the
contents page by page.
B. service provider
C. User can control over the progress of
C. address
the content and they need to follow the
D. country of origin contents page by page.
36. is used to store and deliver multimedia D. User have no control over the progress
programs due to its capability of storing of the content and they dont need to follow
large files. the contents page by page.
A. Web page 41. When searching the web, you can use
B. The Internet that include keywords to find the right
web page.
C. Compact disc
A. search engines
D. Video tape
B. search queries
37. Most Movies design is presented linear in-
teractivity. Draw a diagram of linear in- C. chat rooms
teractivity D. plug-ins

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 468

42. What tab do you click to change the back- 47. are visual images or designs on some
ground of your slide? surface, such as a wall, canvas, screen, pa-
per, or stone, to inform, illustrate, or en-
A. Design
tertain.
B. Home A. Video game
C. Insert B. Graphic
D. Transition C. Media

NARAYAN CHANGDER
D. Multimedia
43. Double-click, icon in the CD to install
it. 48. A computer program designed to simulate
A. Computer conversation with human users over the
internet.
B. Documents
A. Chatbots
C. Setup B. Robots
D. none of above C. Bots

44. Which of the following is NOT an applica- D. Homebots


tion that can be created using multimedia 49. Source
authoring software?
A. the credibility of something
A. Kiosk application B. where seeds are planted in the garden
B. Video production C. using online resources
C. Demo disk and guided tour D. where something originates
D. Flash Player plug-in browser 50. Differentiate 3D animation and 4D anima-
tion
45. Which toolbar option pictured below is
used to decrease the indent of text? A. 3D-Creating movements to two
dimensional digital objects from
A. Option 5 photographs.4D-Form of comp technology
B. Option 6 that allows animators to move an object
around its own
C. Option 4
B. 3D-Form of comp technology that al-
D. Option 2 lows animators to move an object around
its own mirror image. 4D-Creating move-
46. The development of search sites greatly ments to two dimensional digital objects
multiplied the power and usefulness of the from photographs
web by providing the ability to search the
C. 3D-Creating movements to two
content of millions of web pages in sec-
dimensional digital objects from
onds
photographs.4D-Form of comp technology
A. Ease of use that allows animators to move an object
B. Universal access around its own mirror image
D. 3D-Creating basic movement on
C. Search capabilities
screen. 4D-The effect such as mirror ef-
D. None from the choices fect.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 469

51. State one (1) file format suitable for 2D A. A-commerce


animation B. B-commerce

PRACTICE BOOK» NOT FOR SALE


A. blend C. E-Commerce
B. swt D. I-Commerce
C. swa
56. The name of the creator of facebook is
D. swf A. Mark Zuckerberg
52. Studio Max, Lightwave, Maya, Macrome- B. Steve Jobs
dia Director and Adobe Flash CS3 are ex- C. Larry Page
ample of
D. none of above
A. Text Editor
57. The use of multimedia to have the capabil-
B. Graphic Editor
ity of transferring audio, sending message,
C. Audio Editor and formatted multimedia documents.
D. Video Editor A. Medicine
E. Animation Editor B. Mass Media and Journalism
C. Science and Technology
53. Image is divided into categories.
D. none of above
A. one
B. two 58. Sound Forge, Adobe Audition, Sony ACID
and Audacity are example of
C. three
A. Text Editor
D. four
B. Graphic Editor
54. Intercapping, the practice of placing a cap- C. Audio Editor
ital inthe middle of a word, is a trend that
D. Video Editor
emergedfrom the computer programming
communitybecause: E. Animation Editor
A. it looks cool 59. ‘These tools are best used when the bulk
B. they wanted to copy marketing prac- of your content consists of elements that
tices in the electronics industry can be viewed individually’. This state-
ment is best described for
C. they found they could see the words
used for variables and commands better A. Card-or-Page-Based Authoring Tools

D. one of the frst computer programmers B. Icon-or-Object-Based Authoring Tools


had a faulty shift key on his keyboard C. Time-Based Authoring Tools
E. it increases security in case-sensitive D. E-Learning Authoring Tools
passwords
60. hardware that used in audio
55. Multimedia is used in business to share A. monitor
resources, deliver information, train em- B. printer
ployees and advertise goods and ser-
vices.When business’ sell goods over the C. microphone
internet that process is called D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 470

61. Credible images, animations, video and interactive


A. The reliability, truthfulness, and cor- content
rectness of the information A. Windows media player
B. appropriate for human consumption B. presentation program
C. Explaining your choice C. multimedia
D. Gathering a variety of sources about D. application program
the same topic

NARAYAN CHANGDER
66. Flash is used for delivering rich multimedi-
62. The following list is under the element of acontent to the Web
multimedia EXCEPT
A. Score
A. text
B. Time-Based Tools
B. audio
C. Macromedia Director
C. graphic
D. Macromedia Flash
D. movie
67. Which of the following is an advantage of
63. Multimedia becomes interactive multimedi- surround sound?
awhen:
A. Having smaller file size
A. the user has some control over what in-
formation is viewed and when it is viewed B. Boosting the degree of immersion of
the audio experience
B. the information is displayed by a com-
puter with a touchscreen or other input C. Allowing the sound to be played on
device more platforms
C. the information is available on the D. Garbled text will be displayed
Web-either the Internet or a local area
network 68. Which image file format supports trans-
parency, and animation?
D. quizzes and tests with evaluations and
scoring are included A. GIF

E. the user can change such attributes as B. PNG


volume and type size C. JPEG
64. Sampling frequency refers to D. TIFF
A. The number of colours that can be 69. Director is a powerful and complex multi-
used in a graphic file mediaauthoring tool which has broad set
B. The number of bits in each sample of of features tocreate multimedia presen-
an audio file tation, animation, andinteractive applica-
tion.
C. The average number of samples ob-
tained in one second in an audio file A. Flash Director
D. Providing channel selection B. Score
C. Time-Based Tools
65. Content that uses a combination of dif-
ferent content forms such as text, audio, D. Macromedia Director

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 471

70. In non-linear interactivity C. House Phone


A. Disallow user to jump to any pages D. Tablet

PRACTICE BOOK» NOT FOR SALE


without following the sequence of the con-
tent pages. 75. Match the following statements:“Allowing
users to react and interact with the pro-
B. Allow user to jump to next pages fol- gram to enhance understanding of the con-
lowing the sequence of the content pages. tents.”
C. Allow user to jump to next pages fol- A. web based
lowing the sequence of the content pages.
B. CD based
D. Allow user to jump to any pages with-
C. linear interactivity
out following the sequence of the content
pages. D. Non linear interactivity

71. Computers can interpret information like 76. Up to what percentage does multimedia re-
humans and intelligently generate and dis- tain audio/video?
tribute useful content tailored to the needs A. 10%
of users.
B. 20%
A. Web 1.0 C. 30%
B. Web 2.0 D. 60%
C. Web 3.0
77. Where can a presenter view and keep
D. Web Gen X track of the amount of time spent on a
slide?
72. graphic file format is
A. The Speaker Notes window
A. .mpeg
B. The Presentation window
B. .jpeg
C. The Status bar
C. .wmv
D. The View menu
D. .pdf
78. the web makes it easy to build web
73. The advantage of interactive multimedia browsers for a wide ranges of devices.
A. Information can be delivered more ef- Web browsers have been deployed on cell-
fectively phones and personal organizers and the
web now the standard interface for pro-
B. Support the development of Internet
viding access to information.
technology and network
A. None from the choices
C. Make the application user friendly and
attractive B. Universal access
D. Presentation and reception of informa- C. Ease of use
tion is easier, effective and interactive D. Search capabilities
74. Not a platform for an interactive multime- 79. The word multimedia comes from two
dia product words
A. Computer A. many media
B. Smart Phone B. Multi and Medium

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 472

C. mass Media 85. Multimedia is a combination of


D. many and Multiple A. Graphic, animation, text, audio, video
B. image, media, video, audio, web
80. The visual movements as one slide changes
to another C. internet, web, image, text
A. transition D. LAN, MAN, WAn
B. animation 86. Of the three inventions that spread the use
of the internet which one was the most re-

NARAYAN CHANGDER
C. content
cent in time?
D. background
A. The personal computer
81. In multimedia authoring systems, multime- B. The World Wide Web
dia elements and events are often treated
as C. The browser
D. All of the above
A. item
B. objects 87. During what stage of Interactive Media
Authoring would an author edit and create
C. attributes
an Interactive Media Application?
D. script
A. Planning
82. The advantage of using a digital camera B. Design
compared to analog cameras are able to C. Development
store directly to the computer
D. Production
A. Image
B. Animation 88. The following are examples of POS kiosks
EXCEPT
C. Audio
A. Path finding kiosk
D. Vector
B. Topup and pay bills kiosk
83. Using a multimedia authoring software, C. Instagram kiosk
one can develop all the applications below
D. Airport self check-in kiosk
EXCEPT
A. Interactive websites 89. Words in multimedia can be sung, spoken
or
B. Kiosk application
A. drawn
C. Simulation
B. texted
D. Audio production
C. written
84. A sequence of slides that usually incorpo- D. signed
rate multimedia elements is called a
90. Where can a presenter insert notes she
A. print publications
or he wants to remember about specific
B. graphics slides?
C. presentation A. The Status bar
D. web page B. The View menu

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 473

C. The Speaker Notes window or Slide 95. this is programming using cues, icons, an-
Notes dobjects. It is done using drag and drop.
To include sound in yourproject, drag and

PRACTICE BOOK» NOT FOR SALE


D. The Timer window
drop it in stage
91. Visual effects, such as graphics, titles or A. Programming with traditional lan-
bullet points, applied to individual items on guage such as Basic or C
the slide
B. Visual programming
A. clips
C. Programming with scripting language
B. import files
D. none of above
C. bitmaps
D. animations 96. What WOULD be an advantage of creating
and using an Interactive Presentation?
92. Adobe Flash, LiveCode, and Director are
A. The Presentation would be quicker to
known as powerful authoring tools. The
produce.
word powerful refers to the statements
below, EXCEPT B. The presentation would require fewer
assets.
A. Offer a very high level language for
navigation control C. The Presentation would be more com-
plicated to understand
B. Enable user inputs or goal-oriented
programming language D. The presentation will more likely en-
gage the viewers
C. Provide more commands and func-
tions provided in the scripting language 97. Population growth of the Philippines over
D. Prepare a spreadsheet with multicolor the last 10 years.
3D bar graph A. pictograph
93. The advantages of CD-based multimedia B. newspaper
programs are I. they can be changed II. C. internet
they can be updated easily III. they can
D. microphone
store high end video IV. they can be per-
manently stored. 98. LiveCode is built with support for scrolling,
A. I and II use of graphics and tablet-centric capabil-
B. II and III ities, multi-touch gestures and motion de-
tection. Users can create applications and
C. III and IV select which user interface elements to
D. II, III and IV be added such as forms, buttons, menus,
text fields and media items. Point out the
94. Which of the following provides a system suitable type of multimedia authoring tool
for dynamically displaying a font? that can be developed using LiveCode soft-
A. Apache ware.
B. PostScript A. Book-based
C. HTTPD B. Card-or page based
D. serif C. Icon-based
E. WYSIWYG D. Time-based

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 474

99. Sound, also called Audio, in multimedia can 104. Photo essay of your community service
be Voice-over, narration, sound effects or A. newspaper
B. pictures
A. a band
C. graph
B. a choir
D. internet
C. music
D. None of the above 105. Adobe Premiere, Ulead Video Studio,

NARAYAN CHANGDER
Movie Maker, Flash Video Encoder are ex-
100. Drawing, chart, diagram, painting, pic- ample for
tures or photographs are all examples of A. Text Editor
B. Graphic Editor
A. images
C. Audio Editor
B. graphics
D. Video Editor
C. medium
E. Animation Editor
D. animation
106. Dynamic HTML uses to defnechoices
101. A multimedia computer is a computer that ranging from line height to marginwidth to
is capable of playing font face.
A. sounds A. Cascading Style Sheets
B. piano B. font mapping
C. guitar C. font substitution
D. none of above D. software robots
102. Multimedia means E. encapsulated PostScript
A. Programmed that contain animation 107. In the URL http://www.timestream.com/info/people/biota
B. The information system that based on which part is casesensitive?
the latest computer A. the record type:“http://”
C. The combination of text, images, audio B. the domain name:“timestream.com”
and video to convey information
C. the subdomain “www”
D. Material that combines all the ele-
ments(text, grahic, audio, video, anima- D. the document path:“info/people/biotay/biotay1.html”
tion) to deliver interactive multimedia in-
formation E. all are case sensitive

103. Website allowing students to create ani- 108. Including interactive features may make
mated presentations. your presentation easier to use for
A. Presentation A. Young children
B. iMovie B. Disabled users
C. Powtoon C. Users who speak a different language
D. PowerPoint D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 475

109. The use of multimedia that is very much 114. “media” in Multimedia refers to
present in many modern movies and ani- A. any hardware or software used for
mations to develop special effects and vir- communication

PRACTICE BOOK» NOT FOR SALE


tual worlds.
B. social media
A. Entertainment
C. journal and mass media
B. Business D. online media
C. Education
115. If we want to return back to our starting
D. Medicine point, we will choose:
110. Web pages are coded using: A. house
A. Unicode B. home

B. American Standard Code for Informa- C. go to start


tion Interchange D. none of above
C. File Transfer Protocol 116. In stage, the multimedia team will
D. Hypertext Markup Language identify criteria for specific target user.
E. encapsulated PostScript A. planning and costing
B. designing and producing
111. Which of the following are examples of
C. testing
time-based authoring tools?
D. delivering
A. Flash and Director
B. Flash and Adobe Photoshop 117. Authoring tools that offer or inter-
preted scripting environment for naviga-
C. Director and Adobe Photoshop tion control and for enabling user inputs
D. Adobe Premiere and Sound Editor are more powerful.
A. a very low language
112. How would Interactive Games and Inter-
active E ntertainment differ? B. an assembler language

A. There is no way to differentiate Games C. a subset of html


from Entertainment. D. a very high level language
B. Games will have struggle and chal- 118. File format for graphic is called
lenge to overcome. A. .exe
C. Games will have fewer options. B. png
D. entertainment is aimed at different de- C. .docx
mographics than Games are.
D. none of above
113. Using the right search engine allows you 119. Computer information represented
to conduct faster and more searches. through audio, video, and animation
A. Effective A. tiktok
B. Efficient B. multimedia
C. Equality C. presentation
D. Equal D. anecdote

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 476

120. Which one is the classification of Multi- 124. Based on multimedia concept, media
media? refers to
A. Audio A. Internet and TV
B. Image B. Whatsapp, Facebook, Twitter and etc
C. Text C. Text, graphic, audio, video and anima-
D. All answers are correct tion
D. none of above

NARAYAN CHANGDER
121. The reference from one document to an-
otherdocument, image, sound, or fle on the 125. ‘Andy is a non-technical multimedia au-
Web isa(n): thor who needs to build a sophisticated
A. sweetspot application without scripting or program-
ming’. Which of the following types of
B. anchor authoring tools is the most suitable for
C. node Andy?
D. tag A. Time-based tools
E. button B. Card or Page-based tools

122. Mirna wants to use an image that she C. Icon-based tools


found online as the logo for her business D. Visual-based tools
in a slide presentation. She has made sure
it’s not copyrighted. Which statement is 126. To conduct means
true about how she should insert the im- A. a small bird that swims in the river
age?
B. to present
A. She should take a picture of herself
C. manage, control, or direct
with a webcam and use that instead.
D. to spell
B. She should use a URL to link to the im-
age. 127. Graphic organizers such as series of illus-
C. She should download it to her com- trations or images displayed in sequence
puter and then insert it to whatever for the purpose of previsualizing a motion
projects she’s creating. picture, animation, motion graphic or inter-
active media sequence, including Website
D. She should choose something else be-
interactivity
cause if it’s not copyrighted, she can’t use
it. A. Story Board
B. Transition
123. Which of the following is a term that ap-
plies tothe spacing between characters of C. Flip Chart
text? D. Content
A. leading
128. Which of these is true about animations
B. kerning in presentation software?
C. tracking A. You can only add one object to a slide.
D. points B. You can only add one animation per ob-
E. dithering ject on a slide.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 477

C. You can add as many animations as C. Mathematics and Science Research


you wish to a slide.
D. Government

PRACTICE BOOK» NOT FOR SALE


D. You can only add one animation to a
slide. 134. In what attribute are all media, includ-
ing audio/video, represented in digital for-
129. Some computers are equipped with mat?
devices to convert analog video to digital
video. A. digitized
A. audio B. distributed
B. camera C. interactive
C. scanner D. all answers are wrong
D. video capture
135. Choose the correct answer in the follow-
130. Multimedia productions include which of ing questions.Is the technology of captur-
the following? Presentations, Web Pages, ing, recording processing, transmitting and
Simulations and reconstructing moving pictures. video can
A. books include text which often appears caption-
ing first spoken words in a text image.
B. games
A. multimedia
C. magazines
B. text
D. DVDs
C. audio
131. Hardware that used in audio is called
D. video
A. monitor
B. printer 136. The use of multimedia that uses all kind
C. microphone of media to be able to convey information
to clients, superior, co-workers, owners,
D. none of above and the general public more effectively and
clearly.
132. Umbrella.mov, School.mp4 are example
of A. Education
A. Text B. Mathematics and Science Research
B. Graphic C. Government
C. Audio D. Business
D. Video
137. During what stage of Interactive Media
E. Animation
Authoring would an author discuss with
133. The use of multimedia used by govern- the users what it is they need?
ments around the world to convey infor- A. Planning
mation, procedures, and regulations for
their citizens and visitors. B. Design
A. Business C. Development
B. Entertainment D. Production

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 478

138. Book.mp3 and Worm.wav are example C. a way of conveying communication


of through internet
A. Text D. none of above
B. Graphic 143. cameras save cost as users do not
C. Audio have to buy film.
D. Video A. Digital
E. Animation B. Ordinary

NARAYAN CHANGDER
C. Economic
139. In Director, still images, sound files, text,
palettes, QuickDraw shapes, program- D. Secondary
ming scripts, QuickTime movies, Flash 144. It is the use of multimedia to create and
movies, and even other Director files are produce computer-based training (CBT)
stored in multimedia database known as materials and courses, including online.
A. Entertainment
A. Score
B. Medicine
B. Cast
C. Education
C. Stage
D. Business
D. Lingo
145. Any kind of communication over the in-
140. Multimedia elements are divided into ternet; primarily meant to refer to direct
two, namely, static and dynamic. Which one-on-one talk or text based group talk
of the following elements are static ele-
A. Chat
ments?
B. Clip
A. Video
C. Body Language
B. Audio
D. Email
C. Graphic
D. Animation 146. Programming in which some authoring
tool provide very high level scripting lan-
141. Which one of the following is not/are guage and interpreted scripting environ-
nottypically part of a multimedia specifi- ment
cation? A. Programming with traditional lan-
A. text guage such as Basic or C
B. odors B. Visual programming
C. sound C. Programming with scripting language
D. video D. none of above
E. pictures 147. Example of Homebot?
142. WHAT IS MULTIMEDIA? A. Alexa
A. social media such as Instagram B. Adarna
B. more than one way of conveying infor- C. Amazon
mation D. Arriana

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 479

148. Which of the following is a problem that A. interactive


mightapply to hypermedia?
B. hyperactive

PRACTICE BOOK» NOT FOR SALE


A. Users’ eye movements affect their abil-
ity to link C. linearall
B. Users will be turned off by excessive D. all answers are wrong
animation
C. Hypermedia software might create in- 153. Which Application of interactive media
appropriate links. would mostly use rapid reactions and vi-
sual cues?
D. Current hyperlinking technology far ex-
ceeds what today’s desktop computers A. Education
can handle
B. Games
E. Search results generally are too gran-
ular to be useful C. Computer-Based Training
D. Documentation
149. When a viewer is allowed to control
what and when the elements of a multi-
media project are delivered. 154. You want each slide in your presentation
to have a text box in the top-right corner
A. Interactive Multimedia that contains a quote. You intend to use a
B. Multimedia different quote on each slide, but you want
C. Bandwidth to use the same font style and box size for
all quotes. Which method is the most effi-
D. none of above cient way for you to do this?
150. What is an advantage of a vector im- A. Add the text box and set the font style
age? using a pre-designed presentation tem-
A. Images can be scaled up or down with plate.
no loss of quality B. Create a text box containing a quote,
B. Individual pixels can be changed, and then copy and paste it into each slide.
which makes very detailed editing pos-
C. Add the text box and set the font style
sible
using the slide master.
C. They have a large file size
D. Create images of each quote and then
D. They look real
insert the desired image into each slide.
151. The first page of any website is known
as 155. How does the computers in our classroom
connect to our modem or router allowing
A. home page
your computer to send and receive signals
B. Anti virus to the Internet Service Provider (ISP)
C. Password A. wireless
D. none of above
B. through telephone wires
152. What type is written here:Interactive me-
C. magic jack
dia providing a structure of related items
that the user can navigate through? D. radio frequency

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 480

156. Which method below will allow you to 160. Which of the following is a typical
rearrange the order of your slides to en- method for word searching in a hyperme-
sure the overall flow of your presentation dia system?
makes sense? A. best ft
A. Right-click the slide in the slide thumb- B. adjacency
nail panel, select Delete Slide, select the
C. popularity
new location and then click New Slide.
D. tracking
B. Drag the slide thumbnail to its new lo-

NARAYAN CHANGDER
cation in the slide thumbnail panel. E. localization

C. Right-click the slide in the slide thumb- 161. Which is the correct flow of testing?
nail panel and then select Change Loca- A. alpha testing→beta testing→delta
tion. testing
D. Select the slide thumbnail in the slide B. beta testing→delta testing→gamma
thumbnail panel and then use the UP or testing
DOWN arrows.
C. alpha testing→beta testing→final re-
157. A multimedia CD must be properly be- lease
fore its usage. D. beta testing→delta testing→final re-
lease
A. installed
B. checked 162. When developing your personal web
page you may use all of the following EX-
C. fitted CEPT
D. none of above A. text
158. How many attributes does multimedia B. videos
has? C. inappropriate pictures
A. 3 D. sounds
B. 2 163. provides the important framework
C. 4 for organizing and editing elements of
your multimedia project, including graph-
D. 5 ics, sounds, animations and video clips.
159. Which of the following best defines the A. Multimedia development process
interactivity feature in a multimedia au- B. Multimedia skills
thoring tool?
C. Multimedia authoring tools
A. Authoring tools that offer a high level D. Multimedia presentations
language (VHLL)
B. A run time version allows multimedia 164. Which of the following are examples of
projects to playback easily multimedia elements?
A. audio
C. The ability to go to another section of
a multimedia production B. animation
D. Ensure that the multimedia authoring C. text
tool can be used for Internet delivery D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 481

165. Users can encourage participation, collab- C. Audio


oration, and information sharing. D. Video

PRACTICE BOOK» NOT FOR SALE


A. Web 1.0
E. Animation
B. Web 3.0
171. There are importants words in a link
C. Web 2.0
D. Web Gen X A. 2
B. 3
166. Software application from Microsoft
used to play, store and organize digital au- C. 4
dio, images and video D. 5
A. windows media player
172. Which is a text file format?
B. word processing program
A. .jpeg
C. multimedia
B. .txt
D. presentation program
C. .avi
167. Contains errors of fact, ideas, logic, con-
D. .mp3
clusions, or opinions. Contains interpreta-
tions and editorials. 173. Programming which someauthoring tools
A. valid provide traditional programming tools like
B. credible programwritten in C

C. a bad movie A. Programming with scripting language


D. not a credible source B. Programming with traditional lan-
guage such as Basic or C
168. All the cartoon films are made through
C. Visual programming
using a multimedia system.
D. none of above
A. Internet
B. animation 174. This is to specify the Idea of the applica-
C. None of these tion and correct planning for it
D. none of above A. Planning step
B. preparation step
169. What hardware or device do we need to
record a narration? C. Collecting step
A. a cellphone D. Execution step
B. a microphone
175. Select the multimedia element:*.avi
C. a speaker *.mov *.mpeg *.wmv are the file exten-
D. a mouse sions for elements
A. Audio
170. Exist in various forms such as illustra-
tions, drawings, charts, pictures, diagram B. Video
A. Text C. Animation
B. Graphic D. Graphic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 482

176. in education, is a method of transfer- 181. Single pages of a presentation


ring knowledge and may be used as a part A. Slides
of a learning process.
B. Graphics
A. Interactive media
C. Animations
B. Print publication
D. GIFs
C. Presentations
D. Tutorials 182. There are basic elements of multime-

NARAYAN CHANGDER
dia
177. A multimedia computer is a computer that A. 2
is capable of showing
B. 3
A. graphics
C. 4
B. colours
D. 5
C. stars
183. Two-dimensional figure or illustration
D. none of above
could be produced manually by drawing,
178. The use of multimedia to train future doc- painting or computer graphics technology.
tors and medical practitioners for example A. video
in virtual surgery.
B. animation
A. Mathematics and Science Research
C. text
B. Government
D. graphics
C. Medicine
184. Comcast, Suddenlink, DirectTV and Dish
D. Entertainment
Network are all examples of
179. ‘If you develop on a Macintosh, look for A. Internet Service Providers (ISP)
tools that provide a compatible authoring
B. Business to Business (B2B)
system for Windows or offer a run-time
player for the other platform’. What kind C. File Transfer Protocol (FTP)
of authoring features are referred to in D. Computer Based Instructions (CBI)
above statement?
185. Which one are audio file format?
A. Performance Tuning Features
A. .txt
B. Delivery Features
B. .mp3
C. Cross-Platform Features
C. .avi
D. Internet Playability
D. .jpeg
180. Simulations are computer based models
of situations 186. Which of these descriptions works as a
definition for Video assets?
A. fantasy-world
A. A sound based asset with text added
B. make-believe to help the user
C. real-life B. An image based asset with sound used
D. three-dimensional to convey information

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 483

C. An animation based asset with sound 191. He is responsible for recording and edit-
used to inform users of simple or complex ing sounds or sound effects and also re-
information sponsible for recording and editing video.

PRACTICE BOOK» NOT FOR SALE


D. A text based asset with images used A. Subject Matter Expert
to demonstrate how the user can achieve
B. project Manager
something
C. Audio/ Video Technician
187. Text, graphics, audio, video and anima-
D. programmer
tion.
A. Symbols 192. Concentrated text in the form of stand-
alone graphics.
B. Button
C. Media A. Symbols

D. none of above B. Media


C. Button
188. Video in multimedia can be
D. none of above
A. live only
B. recorded only 193. The objects such as a block of text, a
blue triangle, or a photograph that makes
C. both live and recorded things happen when clicked.
D. none of the above A. Symbols
189. Includes information presented in slides B. Media
that is meant to inform, persuade, moti- C. Button
vate, and often contains multimedia.
D. none of above
A. multimedia
B. presentation 194. A very short story that is significant to
the topic
C. a youtube video
A. presentation
D. anecdote
B. a graduation speech
190. Google Slides saves your work to Google
C. telecommunications
Drive. PowerPoint has the option to save
to OneDrive. Both of these solutions are D. anecdote
in the cloud. Cloud computing is:
195. Corporations / Businesses use multime-
A. Services or programs located on the
dia and the internet for working away
Internet.
from the office( tele-commuting), Telecon-
B. A remote server that is for the use of ferences, company networks and
the students and staff of your district.
A. employee training
C. A network of computers in the same
B. customer training
company, connected by software.
C. employee referals
D. A network of computers in the same
room, connected with cords to each other. D. vendor relations

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 484

196. For linear interactivity 201. A film that combines sound, graphics and
animation can be considered as interac-
A. The multimedia layers are usually ar-
tivity which not allowing user control and
range in sequence.
change the contents.
B. The multimedia contents are usually
A. Linear
arrange in series
B. Graphic
C. The multimedia contents are usually
arrange in sequence. C. Animation

NARAYAN CHANGDER
D. The multimedia layers are usually ar- D. Non linear
range in series
202. Example of linear interactivity is
197. A is necessary for a multimedia sys- A. Montage
tem. B. Webpage
A. sound card C. Games
B. memory card D. interactive e-book
C. post card
203. A is a collective of web pages.
D. none of above
A. website
198. Removing a part of an image is called? B. Home page
A. Transforming C. Digital Citizen
B. Cropping D. none of above
C. Selection 204. Which of the following is NOT a multime-
D. Fill dia component?
A. Text
199. The web can be immediately used by any-
one already familiar with a computer win- B. Images
dow. C. Video
A. Universal access D. PowerPoint
B. Ease of use 205. It covers any communication device or
C. Search capabilities. application including radio, TV, cellular
phones, computer and network hardware
D. None from the choices and software, as well as various applica-
tions.
200. The integration of interactive elements
such as text, graphics, animation, audio A. Multimedia
and video using computer technology. B. ICT
A. Multimedia C. Digital Media
B. Interactive media D. Social Media
C. Audio
206. What are the 3 different types of pro-
D. Richmedia gramming approach?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 485

A. Graphical programming, Visual pro- 211. Give an example of a multimedia applica-


gramming, Video programming tion

PRACTICE BOOK» NOT FOR SALE


B. Programming with scripting language, A. WAN
Modern programming, Programming with B. Windows media player.
modern language such as Basic or C
C. LAN
C. Visual programming, Programming
with scripting language, Programming D. none of above
with traditional language such as Basic
or C 212. Which of these is NOT a benefit of adding
interactivity to a product catalogue?
D. none of above
A. Customers can find out more about
207. Which of the following make use of Inter- products.
active Multimedia? B. Customers can feel more confident
A. Automated Teller Machine (ATM) with purchasing a product.

B. Self-checkout kiosk C. Customers can compare different


products with more information
C. E-learning portal
D. Customers will still trust non-
D. All of the above interactive sites the same.
208. To transfer (as files or date) from one for- 213. File format extension for animation are
mat to another usually within a new file *.swf, *.swl and
A. import files A. *.gif
B. change B. *.tiff
C. save as C. *.midi
D. body language D. *.wma

209. Connecting to the internet, browser soft- 214. Which device allows us to communicate
ware, might need programs to retrieve with other computer?
some types of media applications.
A. Pen drive
A. plug-in
B. Hard disk
B. plug-out
C. Modem
C. virus
D. Webcam
D. anti-virus
215. Which action is used to remove parts of
210. Which og these can we add to the “Back- an image that you do not want to show in
end” list? your presentation?
A. database A. Resize
B. web browser B. Reset
C. computing device C. Delete
D. mobile application D. Crop

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 486

216. Web-based multimedia is a combination C. leave a blank space where that text is
of multimedia technology and technol- D. crash
ogy
E. try to substitute the font with a similar-
A. Communication looking font
B. WAN
220. Which of these would not be an interac-
C. Interactivity tive feature
D. Internet A. Control buttons

NARAYAN CHANGDER
217. Choose the most correct answer to ex- B. Videos
plain the application of multimedia in ed- C. 3D tour
ucation.
D. Accessibilty tag (ALT Text)
A. Courseware-Any educational material
intended as kits for teachers or trainers E. Text
or as tutorials for students, usually pack- 221. Action Script which is based upon the in-
aged for use with a computer ternational ECMAScript can be found in
B. Computer Based Training-An informa- A. Adobe Flash
tion system that involves the E-learning.
Eg:WebCT B. Adobe Director

C. Virtual Learning Environment- C. Adobe Premier


Learning environments arises for self- D. Adobe Illustrator
learning which enables the teachers to
use computer-based learning environ- 222. For interactive multimedia the most com-
ment without any support by trainers, tu- mon media machines consists of a and
tors or learner.
D. Web based training-Any educational A. simulators, speaker
material intended as kits for teachers or B. Digital sound system, keyboard
trainers or as tutorials for students, usu- C. PC, CD-ROM
ally packaged for use with a computer
D. television, radio
218. Which field of multimedia application the
following belongs:SPECIAL EFFECTS ON 223. Mickey.gif and Frozen.swf are example
MOVIES of

A. Advertisement A. Text

B. Education B. Graphic

C. Entertainment C. Audio

D. Industrial D. Video
E. Animation
219. If a DHTML document includes a font
facethat is not installed on the user’s com- 224. In 1996, users reached 45 million glob-
puter, abrowser will: ally, This has been recognized as “the
A. automatically download the correct most read-only web”
font A. Web 1.0
B. refuse to load the page B. Web 2.0

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 487

C. Web 3.0 C. Media


D. Web Gen X D. Interactive media

PRACTICE BOOK» NOT FOR SALE


225. What is the name of the shared re- 230. Interactive
source model, software and information
to computers and other devices on-demand A. Allow users to interact in two ways
through thr internet? communication
A. wi-fi B. Allow users to decide on what, how
B. cloud computing and when to present the information

C. mobile technologies C. Help users to explore the information


according to their needs and speed
D. internet
D. Present information in more dynamic
226. What are the 2 types of graphics? and interactive manner
A. picture and video
231. You want each slide in your presentation
B. raster and vector
to have a colored shape in the top-left cor-
C. photograph and pictograph ner that contains an image. You intend to
D. none of above use a different image on each slide, but
you want to use the same size and color
227. Which of the following is the importance shape for all images. Which method is the
of Multimedia Technology? most efficient way for you to do this? This
A. Ease of Use task contains the radio buttons and check-
boxes for options. The shortcut keys to
B. Immersive Experience
perform this task are A to H and alt+1 to
C. Basic Inetrface alt+9.
D. More Fun A. Create each shape and image in a
graphics program and then insert the de-
228. The use of multimedia to stimulate and-
sired image into each slide.
model various situations that wouldother-
wise be difficult to grasp in real time, B. Add the shape and set the color using
as in the case of an erupting volcano or the slide master.
atornado wherein after effects can bepre-
C. Create a shape containing an image,
sented to colleagues or to the learningpub-
and then copy and paste it into each slide.
lic.
A. Mathematics and Science Research D. Add the shape and set the color using
a pre-designed presentation template.
B. Business
C. Education 232. What is the term used to describe the
technology that allows you to communi-
D. Government
cate with one person in real time?
229. is the integration and presentation of A. chat room
imagine, text, and/or sound by means of
computer technology. B. private room
A. Multimedia C. instant messaging
B. Medium D. email

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 488

233. The process of communicating nonver- 238. Images in multimedia can be all of
bally though conscious or unconscious ges- the following EXCEPT which of the fol-
tures and movements lowing:Drawings, Paintings, Photographs,
Buttons and
A. eye contact
A. Animations
B. body language
B. Video
C. mind control
C. Diagrams
D. magic

NARAYAN CHANGDER
D. USB cable
234. A series of illustrations or images dis-
played in sequence 239. What is the best method to use when you
want to share a presentation but are not
A. a bedtime story sure of whom to include in the target audi-
B. multimedia presentation ence?

C. telecommunications A. Change the file settings to Public.


B. Share as a link.
D. storyboard
C. Change the file settings to Shared.
235. A multimedia presentation or application
D. Share via e-mail.
that used without the need of internet
technology and it uses elements of high- 240. In ICT, using multimedia means using var-
quality multimedia refer to ious The process involves interaction
A. web based between the technology and the user.

B. CD based A. arts

C. linear interactivity B. news


C. media
D. non linear interactivity
D. design
236. The browser used on Apple Computers
and devices. 241. Multimedia programs are
A. Google Chrome A. interactive

B. Safari B. boring

C. Firefox C. funny
D. none of above
D. Bing
242. Janet is representing her company at a
237. Multimedia has become a valuable re-
job fair. They have a presentation running
source in society. It is used for Leisure,
on a small TV screen, which Janet wants
Recreation, Business and
to repeat on its own throughout the day.
A. Travel Terry told her to just manually restart the
slide show from the beginning each time it
B. Social media
ends. What should Janet tell Terry?
C. Education
A. Modify the presentation’s setup to ad-
D. None of the above vance slides ‘on click’ works better.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 489

B. Adding a hyperlink to the presentation 247. In a presentation, which of the following


to the school’s webpage will restart it au- statements regarding animation use is not
tomatically. true?

PRACTICE BOOK» NOT FOR SALE


C. Janet can set the presentation to loop A. A slide can have more than one anima-
the slide show continuously. tion.
D. Terry’s right; she should manually B. An object can only have one animation.
restart the slide show from the beginning C. Animations can be set to occur when a
each time it ends. specific key is pressed.
243. To convert conventional image to digital D. Animations occur On Click by default.
images, are used.
248. is a live or recorded moving images.
A. cameras
A. Video
B. scanners
B. Graphic
C. computers
C. Video game
D. audio devices
D. Simulation
244. Symbolic representations of objects and
processes common to the graphical user in- 249. Song.txt and Chicken.docx are example
terface of many operating systems. of

A. Tooltips A. Text

B. Icons B. Graphic

C. Font C. Audio

D. none of above D. Video


E. Animation
245. Layla is creating a presentation to high-
light her company’s latest product. She 250. The Logo command to close LOGO Pro-
would like to add the company logo and gram
contact information to each slide. Which A. Close
option should Layla use to automatically
add these elements to all of the slides in a B. BYE
presentation? C. Exit
A. Slide master D. none of above
B. Slide layout master
251. Which cloud provider is Google Apps?
C. Master panel
A. PaaS
D. Slide template master B. SaaS
246. is a letter, words, and numbers. C. IaaS
A. Medium D. There is no right answer
B. Graphic 252. is a software used to play songs and
C. Simulation movies.
D. Text A. Windows Media Player

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 490

B. CD player C. PPT
C. DVD player D. CS
D. none of above
258. Electronic Commerce allows business’ to
253. Definition of interactive multimedia sell products and services to consumers all
over the globe. What does the acronym
A. a technique used to publish various
B2B refer to?
media
A. boy to boy commerce

NARAYAN CHANGDER
B. a technique used to integrate various
media B. black to black commerce
C. a technique used to disseminate vari- C. business to business commerce
ous media D. buy to buy commerce
D. a technique used to apply various me-
dia 259. What tab allows us to insert pictures?
A. insert
254. Sound other than speech or music made
artificially for use in a presentation B. home
A. Sound effect C. design
B. Overlay D. animation
C. Video
260. What can be added in slide presentation
D. Import Files so that it can be interactive?
255. Using live or recorded sound to help en- A. Animation
gage users and provide information, which B. Navigation buttons
includes voice-over or narration, sound ef-
fects, and music. C. Sound

A. Graphics D. Video
B. Tutorials 261. Analog camcorders record a video in ana-
C. Video log form and stores it in
D. Audio A. Magnetic Tape
B. DVD
256. Planned combination of colors for a pre-
sentation C. CD-RW
A. overlay D. Memory Card
B. floor plan
262. Engineers design cars before producing
C. paint pallet them by using a multimedia application
D. color scheme called
A. Computer-Aided Design
257. This command hides the turtle from the
screen B. Computer-Aided Coding
A. HT C. Computer-Aided Development
B. ST D. Computer-Aided Documentation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 491

263. The first Personal Computer (PC) is 268. In MSW Logo Procedure is a set of
A. Multimedia A. Commands

PRACTICE BOOK» NOT FOR SALE


B. Monomedia B. Colours
C. Apple C. Pens
D. none of above D. turtles

269. “Printed Magazine is NOT a multimedia


264. The 3.0 web phase has regarded as “the
product” Do you agree with the statement
wildy write-read web” which accumulated
above? Justify your answer in with a sup-
million sites and 8 billion global user
port from any definition you know.
A. 100
A. Magazine is a multimedia product be-
B. 500 cause magazine use text and graphic to
C. 800 convey information.

D. 200 B. Magazine is not a multimedia product


because you can only use text and image
265. As you design and build a multimedia but not animation, audio and video .
project, your most often used tool may be C. Disagree. You can scan the image
your from the magazine and display it on the
A. Word processor computer.

B. Authoring systems D. Agree. Multimedia is any combina-


tion of text, graphics, sound, animation
C. Image processor and video delivered to you by computer or
D. Drawing program other electronic or digitally manipulated
means.
266. What is Video Editing?
270. Different ethnic groups in the Philippines
A. Rearranging, adding and/or removing
sections of video clips and/or audio clips. A. pictograph
B. pictures
B. All of them
C. newspaper
C. Applying color correction, filters and
other enhancements D. internet
D. Creating transitions between clips 271. Multimedia is the integration of text, still
and moving images, and sound by means
267. Which is a remarkable feature of internet of
A. Internet can be used to create numer- A. computer hardware
ous FB accounts
B. computer technology
B. Internet can be a venue of buying gad-
C. copyrighted software
gets lower in prices
D. pirated software
C. Internet is widely used for communica-
tion 272. Which toolbar option is used to adjust line
D. Internet is remarkable on transferring spacing for text on a slide?
data A. TIFF

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 492

B. PNG 277. Some of CD-ROMs are


C. JPG A. autorun
D. GIF B. installed
C. automatic
273. Interactive multimedia becomes hyperme-
diawhen: D. none of above

A. the information is available on the 278. What is the name of a sequence of im-

NARAYAN CHANGDER
Web-either the Internet or a local area ages, which is defined as the display of
network recorded real events on a television-type
B. quizzes and tests with evaluations and screen?
scoring are included A. sound
C. it includes a structure of linked ele- B. video
ments through which a user can navigate C. image
and interact
D. text
D. the user can change such attributes as
volume and type size 279. Web pages can be used for various rea-
sons to include entertainment, informa-
E. the content formatting complies with
tion, reference, research and use the
the American Standard Code for Informa-
acronym (TIRRE)
tion Interchange
A. Tutorials
274. Computers have become smaller, cheaper
B. Training
and
C. Tele-commuting
A. less powerful
D. Tele-conferencing
B. less expensive
C. more expensive 280. In which university was the use of this
tool allowed?
D. more powerful
A. Yale
275. Facebook Disadvantage B. UCLA
A. Responsibility C. Harvard
B. I respect D. Princeton
C. Gossip 281. Mirna wants to use an image that she
D. Not always focused on education found online as the logo for her business.
Which statement is true about using the
276. Which of the following extensions is a image?
movie file? A. She must obtain permission and then
A. JPEG pay a fee to reuse any image she finds on-
line.
B. PUB
B. She can reuse the image without ob-
C. PSD
taining permission because she found it
D. MP4 online and not in print.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 493

C. She should find out if the image is copy- A. Online games


righted, because many images found on- B. Animation
line are copyrighted and cannot be reused

PRACTICE BOOK» NOT FOR SALE


without permission. C. Online tests
D. Vodcasting
D. She should find out if the same image
is available on a free stock photography 287. Which of the following file formats is un-
site, because all other images found on- compressed?
line are copyrighted and cannot be reused A. AVI
without permission.
B. MOV
282. The internet developed from a research C. MP4
project started in 1958 by the
D. WMV
A. U. S. Corps of Engineers
288. Users passively receive information with-
B. NASA
out being given the opportunity to post re-
C. U.S. Defense Dept views, comments, and feedback.
D. founder of Facebook A. Web 1.0

283. is a global network that connects mil- B. Web 2.0


lions of computers worldwide. C. Web 3.0
A. Internet D. Web Gen X
B. Website 289. What instruction would I give the com-
C. Anti-virus puter if I wanted to copy the same power-
point slide again and again?
D. none of above
A. New Slide
284. Which of these consist of still images dis- B. Delete Slide
played so quickly that it appcars to be in
C. Duplicate Slide
continous motion?
D. Layout Slide
A. text
B. video 290. There are basic design strategies of
multimedia
C. sound
A. 2
D. animation
B. 3
285. Graphic means C. 4
A. animation D. 5
B. shape 291. A document that can be printed and in-
C. Visual presentation shown on a com- cludes flyers, brochures, magazines, cards
puter di, wall and canvas and banners is called
D. object A. presentation
B. text
286. It can include interactive effects which al-
low users to interact with using a mouse C. print publication
or a keyboard. D. graphics

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 MULTIMEDIA IN THE INTERNET 494

292. What is multimedia interactivity? 294. The multimedia project format which gen-
A. The way users interact with a com- erally combines all multimedia elements
puter application or program. for the purpose of entertaining partici-
pants.
B. The way users communicate with a
multimedia television A. Video Games
C. The way users interact with a multime- B. Tutorials
dia application or program.
C. Web Sites

NARAYAN CHANGDER
D. The way users interact with a multime-
dia programmer and staff D. Simulations

293. It is a combination of text, animated 295. Music, speech or other forms of noise are
graphics, video and sound delivered to you examples of elements
via electronic means.
A. Text
A. Online Environment
B. Digital Multimedia B. Video

C. Interactivity C. Audio
D. Multimedia D. Animation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
9. Network Management

9.1 Introduction
1. WHAT IS COMPUTER SECURITY 4. What is phishing?
A. measures to protect data during trans- A. Sitting on a lake shore and trying to
mission across the network. catch trout
B. generic name for the collection of tools B. Someone trying to gather personal in-
designed to protect data and to prevent formation through scams
hackers. C. Emails from your favorite store adver-
C. measures to protect data during their tising their big sale
transmission over a collection of intercon- D. Texts from your friend asking if you’d
nected networks like to meet at the volleyball game
D. none of above
5. What is the system used for realtime and
2. What is Spam? storing Cisco logging to a central source
A. Log Level Storage
A. known as junk mail
B. Syslog
B. spam is used as a method of helping
people C. Central Log Server Management
(CLSM)
C. spam can be used to send usefull links
D. Cisco Logger Package (CLP)
D. nice website
6. is a program that can infect other pro-
3. The process of converting a ciphertext into grams by modifying them to include a copy
plaintext. of itself
A. encryption A. HACKING
B. decryption B. VIRUS
C. plaintext C. DENIAL OF SERVICES
D. cryptography D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 496

7. Why do you need security on a computer? C. Present in the ROM


A. So no personal data can’t be stolen D. Present in the RAM
and hacked also private information
13. Trojan is:
B. To share everything with everyone
A. Malicious software created to damage
C. To make it difficult for hackers or gain illegal access to computer sys-
D. none of above tems.
B. A type of malware that creates false
8. This connection type uses cellular towers

NARAYAN CHANGDER
messages to trick the user into following
A. WIred malicious links.
B. Wireless C. A type of malware which is disguised
C. Mobile as legitimate software
D. none of above D. A type of malware which secretly mon-
itors and records user actions.
9. Find what do domain controllers do?
14. It is a software code that is deliberately
A. Store the database, maintain the poli-
created by an attacker.
cies and provide the authentication of do-
main logons. A. Virus
B. Control granular settings in a domain B. worm
environment. C. Trojan
C. Receive and relay domain commands D. Rootkit
D. none of above 15. A check to make sure that a computer or
10. This Malware interferes with the opera- user is who/what it says it is.
tion of the computer or threatens to do so, A. SSL Certificate
unless a sum of money is paid. B. private key
A. Worms C. authentication
B. Viruses D. public key
C. Root Kits
16. Who has the highest access level to data
D. Ransomware in school?
11. Where does the name malware come A. The teachers
from? B. The principal
A. Maleficent Software C. The IT technicians
B. Magnificent Hardware D. The students
C. Malicious Tools
17. Internet connection speeds are most com-
D. Malicious Software monly measured in
12. Firmware is A. Megabits per second
A. hardware unit B. Packets per second
B. is software that is embedded in a piece C. Gigabytes
of hardware D. Megahertz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 497

18. To guard against malware, you will need servers for packetinspection. Which of the
to have following is not used for this?

PRACTICE BOOK» NOT FOR SALE


A. antivirus software A. User Defined Routes
B. a can of compressed air B. Forced Tunneling
C. a word processor C. System Routes
D. spyware D. none of above

19. Which file name uses best practise 24. Why would you use a custom route in a
virtual network?
A. csnd.mp4
A. To load balance the traffic within your
B. Car$ound.mp4
virtual network.
C. carsoundusedforlevel1.mp4
B. To connect to your Azure virtual ma-
D. CarSound.mp4 chines using RDP or SSH.
20. Find what option can you use to pre- C. To connect to resources in another vir-
vent deleting a group in Windows Server tual network hosted in Azure.
2008? D. To control the flow of traffic within
A. You could prevent this by formatting your Azure virtual network.
the hard drive.
25. Which of the following uses a number of
B. You can prevent deleting a group by computers over a network of infected ma-
restarting the computer. chines to send requests to a website which
C. Protect object from accidental dele- would bring it offline? [1-3]
tion. A. SQL
D. Use /reboot to prevent deleting a B. USB
group.
C. DDOS
21. What is a Trojan Horse? D. WLAN
A. A horse from Troy
26. What type of malware disguises itself as
B. A virus disguised as something else software that you would like to install?
C. An upgrade for your computer A. Ransomware
D. A way of protecting your computer B. Trojan Horse

22. Which of the following is used as a Racks C. Worm


are measured in rack units or D. Whack-a-mole
A. U’s.
27. Which of the following is a type of mal-
B. D’s ware?
C. I’s A. Ransomware
D. M’s B. Spyware

23. Your company wants to redirect Inter- C. Adware


net traffic to your company’s on-premises D. All of the Above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 498

28. What is the default distribution type for C. Stop Software


traffic through a load balancer? D. Stop IP Adresses
A. Source IP affinity
34. SECURITY ATTACK:
B. Five-tuple hash
A. ANY ACTION THAT COMPROMISES
C. Three-tuple hash
THE SECURITY OF INFORMATION THAT
D. none of above OWNED BY ORGANIZATION
29. categories redundancy which is *Network B. A MECHANISM THAT IS DESIGNED TO

NARAYAN CHANGDER
needs to be operating for only one shift DETECT, TO PREVENT OR RECOVER FROM
per day. SECURITY ATTACK
A. MINIMUM REDUNDANCY C. A SERVICES THAT ENHANCES THE SE-
B. MAXIMUM REDUNDANCY CURITY OF DATA PROCESSING SYSTEM
AND INFORMATION TRANSFER
C. MEDIUM REDUNDANCY
D. none of above
D. HIGH REDUNDANCY
35. Function of computer server in networking-
30. What’s the difference between websites oriented services includes
that start with https vs http
A. file sharing,
A. Sites with the S use encryption to keep
data secret B. DNS
B. Sites with the S are more professional C. FTP accounts,
C. Sites WITHOUT the S use encryption D. User Authentication
to keep data secret
36. Replacing devices is
D. Sites WITHOUT the S are more
A. Security management
31. What program allows you to view and in- B. Software management
teract with a user’s sessions while a user
is showing an error? C. Hardware management
A. Remote Desktop D. none of above
B. Remote Assistance 37. How does a worm infect a computer?
C. Control Panel A. E-mail attachments
D. SysInfo B. Through security loopholes, your com-
32. ENTERPRISE SERVER Also known as puter is not up to date

A. centralized servers. C. Suspicious web links


B. SysInfo D. On memory sticks
C. SysConf 38. This connection type is most secure
D. System Properties of the Control Panel A. Wired
33. Anti Virus software is used to B. Wireless
A. Stop Malware C. Mobile
B. Stop Adverts D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 499

39. TG has changed equipment for their flight C. Adware


BKK to MNL tomorrow from B737 to
D. Javaware
B787 to carry more passengers who were

PRACTICE BOOK» NOT FOR SALE


stranded due to bad weather conditions in 44. New Airline XX is on the start-up stage
today’s flight. and the top management is deciding
A. Network strategy whether to be a full-service carrier model
or a low cost carrier. Which phase in
B. Network Planning
the network management process is de-
C. Network design scribed?
D. Alliance A. Network strategy
40. Files your computer saves when you use B. Network Planning
the internet are called C. Network design
A. Biscuits D. Alliance
B. Cookies
45. Making a copy of data and storing else-
C. Muffins
where, in case the original is lost. This is
D. Cakes

41. What application/service would you use A. Virus-checker


to configure File Sharing for a Linux Server B. Encryption
and Window?
C. Backup
A. Apachee
D. none of above
B. Computer FIrewall
C. Samba 46. A method of encryption and decryption in
which each letter in the alphabet is re-
D. Dice
placed by another.
42. Active Directory is a technology created by A. encryption
that provides a variety of network ser-
B. decryption
vices, including:
A. Microsoft C. substitution cypher

B. Internet Explorer D. plaintext

C. Microsoft Office 47. Phishing is


D. Microsoft Windows A. attacker pretends to represent a legit-
imate outside organization,
43. It is distributed without user intervention
or knowledge. After it is installed and run, B. monitors use and reports activities
it monitors activity on the computer. then back to organization that send it
it sends this information to the individual C. Displays unwanted advertising on your
or organization responsible for launching computer, usually comes along with down-
it loaded “free” software
A. Spyware D. may be malicious and is sometimes in-
B. Grayware stalled with the user’s consent

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 500

48. software converts data into a form, 52. What program is usually used to connect
called a ciphertext, that cannot be easily to a computer remotely?
understood by unauthorized people A. Remote Desktop
A. System B. Remote Assistance
B. Encryption C. Control Panel
C. Security D. SysInfo
D. Antivirus 53. It is a self-replicating program that uses

NARAYAN CHANGDER
the network to duplicate its code to the
49. Viruses
hosts on the network
A. program written with malicious intent
A. Virus
and sent by attackers. transferred to an-
other computer through email, file trans- B. worm
fers, and instant messaging. C. Trojan
B. malicious program that gains full ac- D. Rootkit
cess to a computer system. Often, a di-
rect attack on a system using a known 54. What type of malware locks up your com-
vulnerability or password is used to gain puter until you pay a fee?
Administrator-account level access. A. Ransomware
C. installed on a computer without the B. Phishing
knowledge of the user. C. Spyware
D. can also collect information stored on D. A worm
the computer without the user’s consent.
55. This connection type is most flexible
50. Firewall can be used A. Wired
A. Block virus B. Wireless
B. Clean disk C. Mobile
C. Compress files D. none of above
D. can be used to filter between trusted 56. Every device connected to a network has
and untrusted networks and prevent pro- an
grams from communicating through the
A. IP address
use of ports
B. PI address
51. Find what default group has the right to C. Internet Address
log on locally, start and stop services, per-
form backup and restore operations, for- D. Postal address
mat disks, create or delete shares, and 57. Name for a cable connecting devices on a
even power down domain controllers? network
A. Server Operators A. Othernet cable
B. Schema Admins B. Ethernet cable
C. Enterprise Admins C. Circuit cable
D. Backup Operators D. Power cable

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 501

58. What is Server Management? site asking for personal details and/or
A. SysConf credit card details.

PRACTICE BOOK» NOT FOR SALE


B. to have a unreliable resource for inter- D. Involves finding passwords and pins
action by watching people enter them.

C. *is the maintenance and operation of 63. A the group is a group that contains
a server. the same users as an OU.
D. can vary depending on the time of the A. Operation
server and the purpose B. Administration
59. When utilizing SNMP, which system is the C. Primary
Central Server D. Shadow
A. NMS
64. Peter installing a new feature in his new
B. MIB android apps. This is
C. Agent A. Formatting
D. UDP B. Updating
60. How can viruses be transferred between C. Upgrading
computers? D. none of above
A. USB pens
65. malware
B. e-mail
A. is any software created to perform ma-
C. Downloads licious acts. it includes adware, spyware,
D. All of these grayware, viruses, worms, Trojan horses,
and rootkits. Malware is usually installed
61. you received a phone call from a person on a computer without the knowledge of
who claims to represent partner services the user.
and then asks that you for confirmation
B. is a software program that displays ad-
of username and password for auditing
vertising on your computer.
purposes. Which security threat does this
phone call represent? C. is distributed without user interven-
tion or knowledge.
A. DDoS
D. a free software program may require
B. spam
the installation of a toolbar that displays
C. social engineering advertising or tracks a user’s website his-
D. anonymous keylogging tory.

62. What is shouldering? 66. When creating user-defined routes, you


can specify any of these next hop types,
A. Facebook except?
B. A way of gathering sensitive informa- A. Internet
tion or gain illegal access to networks by
tricking/manipulating people. B. Load balancer

C. Sending emails or text messages C. Virtual appliance


claiming to be from a bank/e-commerce D. Virtual network gateway

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 502

67. A Utility software is 72. Ransomware is:


A. provides user interface A. Malicious software created to damage
or gain illegal access to computer sys-
B. used for communicating with peripher- tems.
als
B. A type of malware that creates false
C. * A program that performs a very spe- messages to trick the user into following
cific task, usually related to managing sys- malicious links.
tem resources

NARAYAN CHANGDER
C. A type of malware that uses encryption
D. application software to lock the user out of their files then re-
quests a large sum of money to unlock and
68. DISTRIBUTED SERVER Also known as return the data.
A. *local or workgroup D. A type of malware which secretly mon-
itors and records user actions.
B. client itself
C. SysConf 73. Cathay Pacific management has been de-
ciding whether to purchase additional
D. Subnet B737 Max for their planned new routes
to South America which will start 2 years
69. WAN stands for from now . This type of decision falls un-
A. Wide Area Network der which network process.
B. World Area Network A. Network strategy

C. Wide Angle Network B. Network Planning


C. Network design
D. Western Area Network
D. Alliances
70. Data sent over the internet is broken up
into 74. Which version of SNMP supports encryp-
tion and security?
A. Pieces
A. Version 1
B. Bits B. Version 2
C. Chunks C. Version 3
D. Packets D. none of above

71. Your company needs to extend their pri- 75. How do you create a group by using Active
vate address space in Azure by by provid- Directory Users and Computers snap-in?
ing a direct connection to your Azure re- A. Left click the OU in Find which you want
sources. They implement which of the fol- to create a group, select New, and choose
lowing? Group.
A. User-defined route B. Right-click the OU in Find which you
B. Virtual appliance want to create a group, select New, and
choose Group.
C. Virtual network endpoint
C. This can only be done in the registry
D. none of above editor.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 503

D. You can create a group by typing 80. Which of these is the most secure pass-
MSCONFIG in the Run box. word?

PRACTICE BOOK» NOT FOR SALE


A. pAs3w0rd
76. Servers often have addresses.
B. Password123
A. static
C. gD5k? -3#2
B. dynamic
D. gnsowynwo
C. rotating
81. Airline XX decided to be a Low cost car-
D. multiple rier and is now deciding Point-to-point net-
work connectivity and hubs in its route.
77. Find what is a forest? Which phase in the network management
A. Physical groupings are independent of process is described?
the domain and OU structure. Sites dis- A. Network strategy
tinguish between locations connected by
B. Network planning
low-and high-speed connections and are
defined by one or more IP subnets. C. Network design

B. The collection of every object, its at- D. Alliance


tributes and attribute syntax in the Active 82. Encryption is a way of
Directory.
A. Securing information on a network
C. Containers in Find which domains can
B. Securing Viruses
be grouped. They create a hierarchy for
the domain and create the structure of the C. Deleting applications
Active Directory’s company in geographi- D. Hacking Passwords
cal or organizational terms.
83. MH decides to introduce shuttle services
D. A collection of computers that share from KUL to HKT, and management as-
a common set of policies, a name and a signs B787 for the new routes, to take
database of their members. effect next month as planned in medium
term fleet planning.
78. Which software keep your keep your de-
vice up to date and run regularly? A. Network strategy
B. Network Planning
A. Malware
C. Network design
B. Anti-malware
D. Alliance
C. Virus
84. Which criteria does Application Gateway
D. none of above
use to route requests to a web server?
79. Which protocol(s) are used to gather infor- A. The hostname, port, and path in the
mation from neighboring devices? URL of the request.
A. CDP B. The IP address of the web server that
is the target of the request.
B. LLDP
C. The region in which the servers host-
C. ROPD ing the web application are located.
D. NDP D. The users authentication information.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 504

85. is a software program that displays adver- 91. Who owns and controls the internet?
tising on your computer. A. Google
A. Adware
B. Government
B. Spyware
C. Schools
C. Grayware
D. Nobody
D. Helpware
92. The process of converting plaintext to ci-
86. The more complex password, the more

NARAYAN CHANGDER
phertext.
possible there could be.
A. cryptography
A. Characters
B. cyphertext
B. Numbers
C. decryption
C. Combinations
D. none of above D. encryption

87. Which of the following is used to secure 93. What program would you use to install for
LANs Web server in Ubuntu Server?
A. Fire Blanket A. Dice
B. Firewall B. Firewire
C. Electric fence C. Apache
D. Brick Wall D. IIS

88. involves rearranging the information 94. How can you protect yourself from
on a disk so that files appear in continu- viruses?
ous sequences of clusters
A. By buying padlocks
A. Firewall
B. By keeping your software updated
B. Firmware
C. By hiding your hard drive
C. Disc clearner
D. By playing online games
D. Defragmentation
95. LAN Stands for
89. What does a firewall block?
A. Low Area Network
A. It blocks nothing
B. Local Area Network
B. Blocks all incoming connections
C. Blocks unwanted connections C. Large Area Network

D. Viruses D. Local Average Network

90. In which process data jumbled using a key 96. A string of text that has been converted
so it cannot be understood. to a secure form using encryption.
A. Backup A. encryption
B. Cryption B. decryption
C. Encryption C. ciphertext
D. none of above D. plaintext

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Introduction 505

97. A type of attack that sends enough re- 102. When the attacker pretends to repre-
quests to overload a resource or even stop- sent a legitimate organization and asks
ping its operation. for verification of victims information such

PRACTICE BOOK» NOT FOR SALE


as password or username. we call this
A. Denial of Service (DoS)
threat:
B. SQL injection
A. Malicious software (malware)
C. Brute force attack
B. Adware
D. Data interception
C. Spyware
98. A specific encryption code D. Phishing
A. Code 103. Find which is not one of the four divi-
B. Cipher sions or container structures in Active Di-
rectory?
C. Scramble
A. Forests
D. none of above
B. Domain
99. Which of the following activities poses the C. Webs
greatest personal cybersecurity risk?
D. Organizational units
A. Making a purchase at an online store
that uses public key encryption to trans- E. Sites
mit credit card information.
104. Data encrypted using a
B. Paying a bill using a secure electronic A. Number
payment system.
B. Charecter
C. Reserving a hotel room by emailing
credit card information to the hotel. C. Key

D. Withdrawing money from a bank using D. Value


an automated teller machine. 105. Cathay Pacific airline signed a special
partnership contract with Qantas Air to
100. What is the computer software used to
co-market-operate from city HKG to SYD,
prevent, detect and remove malicious soft-
vice-versa, allowing CX to market from
ware.
city HKG to MEL to SYD. Which phase in
A. Firewall the network management process is de-
B. Antivirus software scribed?

C. Phishing scam A. Network strategy

D. SMTP B. Network Planning


C. Network design
101. Firewall can be a
D. Alliance
A. Hardware
106. What are your tips for protecting your-
B. Software
self against identity theft?
C. Both
A. Choosing the right tools on your com-
D. none of above puter.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 SNMP 506

B. P roperly educate yourself about cyber C. 5


security D. 4
C. Choosing the right antivirus is impor-
tant, not only because you need it, but also 111. A strong password is better with;
because it’s an important part of your pro- A. A simple password based on interests.
tection B. A password no one would relate to you
D. All of the above but you can remember.

NARAYAN CHANGDER
107. Passwords are used in many instances C. A complicated password you may for-
when accessing the internet. Which of the get.
following ensures that? D. A combination of letters, numbers &
A. accessing your email account special characters

B. carrying out online banking 112. Brute Force attack is where


C. accessing social networking sites. A. a hacker may have access to pro-
D. All the three grams that have the ability to try multiple
guesses of a password in quick succes-
108. How many group scopes are there in Ac- sion
tive Directory? B. someone hacks your email
A. One C. someone puts a virus on your com-
B. Two puter.
C. Three D. none of above
D. Zero 113. What type of environment has each com-
109. What are the 3 mid grade severity levels puter keep its own security database?
used on Cisco Devices. A. workgroup
A. 0, 1, 2 B. domain
B. 1, 2, 3 C. conglomerate
C. 2, 3, 4 D. association
D. 3, 4, 5 114. Which is some user-oriented services
E. 4, 5, 6 A. System File Sharing
110. There are types of VPN protocols. B. DNS
A. 3 C. DHCP
B. 6 D. Firewall

9.2 SNMP
1. Network management via SNMP is based B. agent-administrator
on a paradigm
C. application-agent

A. managing agent D. application-manager

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 SNMP 507

2. SNMPv2u is: 8. To name objects globally, SMI uses an ob-


A. O SNMPv2 original ject identifier, which is a hierarchical iden-
tifier based on a structure

PRACTICE BOOK» NOT FOR SALE


B. User-Based SNMPv2
A. linear
C. Community-Based SNMPv2
B. tree
D. SNMPv2 based encryption
C. graph
3. A manager is a host that runs the SNMP
process. D. none of the above
A. Client 9. All objects managed by SNMP are given
B. Sever an object identifier. The object identifier
C. Both a and b always starts with
D. None A. 1.3.6.1.2.1
B. 1.3.6.1.2.2
4. SNMP uses two other protocols: and
C. 1.3.6.1.2.3
A. MIB; SMTP D. none of the above
B. b. SMI; MIB
10. To define the data type, SMI uses funda-
C. c. FTP; SMI mental definitions and adds some new
D. d. none of the above definitions.
5. The data types are atomic data types. A. AMS.1
A. structure B. ASN.1
B. simple C. ASN.2
C. both a and b D. none of the above
D. none of the above
11. We can compare the task of network man-
6. This component of SIEM focuses on what agement to the task of writing a pro-
the users are doing, such as what applica- gram. Both tasks have actions performed
tions they are launching and their network by statements. In network management
activity. this is handled by
A. User Behavior Analysis A. SNMP
B. User Behavior Monitoring B. SMI
C. User Behavior Learning C. MIB
D. User Behavior Contextualizing D. None
7. SNMP basic components and their function-
alities 12. SNMPv2p is:

A. SNMP administrator A. O SNMPv2 original


B. SNMP agent B. User-Based SNMPv2
C. stored devices C. Community-Based SNMPv2
D. Administration information database D. SNMPv2 based encryption

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 SNMP 508

13. When a managed device suffers or de- C. Get Request e Get-next Request
tects some type of anomaly, and it tries to
D. Inform Request e Report
alert the only network management sta-
tion about that condition, the operation 18. Check the correct option regarding the
(PDU-Protocol Data Unit) of the SNMPv2 SNMP management protocol:
protocol called
A. SNMPv2 operates as a TCP connection-
A. Trapv2
oriented application protocol, maintaining
B. Inform the authentication standards, passwords,

NARAYAN CHANGDER
C. Get Next and strong encryption of SNMPv1.
D. Report B. SNMPv1 provides advanced features
of authentication and strong encryption,
14. SNMP runs on which allows high effectiveness and secu-
A. TCP Port 161/162 rity in management, even in complex IP
B. UDP Port 161/162 networks such as the Internet.

C. UDP Port 191/192 C. SNMPv1 operates in request and re-


sponse mode, that is, for each request
D. TCP Port 191/192 SNMP runs on UDP message sent by the manager, a response
Port 161/162. SNMP uses UDP as its is expected before sending another re-
transport protocol because it has no need quest to the agent. For performance rea-
for the overhead of TCP . “Reliability” is sons, SNMPv1 was designed as connec-
not required because each request gener- tionless, using the UDP transport proto-
ates a response. If the SNMP application col.
does not receive a response, it simply re-
issues the request. D. SNMPv1 is a relatively simple protocol:
it has only four previously defined mes-
15. All the Objects in SNMP starts with sage types, two to request object values
A. DoD from agents and two to return object val-
ues to managers.
B. ISO
C. Root 19. SMI has two broad categories of data
D. Mgmt type: and
A. simple; complex
16. Which SNMP operation is used to change
the router’s name? B. simple; structured
A. Set C. structured; unstructured
B. Get D. none of the above
C. Bulk
20. SMI emphasizes three attributes to handle
D. Getnext
an object: , , and
17. Which SNMP protocol commands does the A. name; data type; size
Manager use to get information from a
network device? B. name; size; encoding method
A. Set Request e Trap C. name; data type; encoding method
B. Get Response e Inform Request D. none of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 SNMP 509

21. We can compare the task of network man- B. ACK


agement to the task of writing a program. C. Get next request: Used to sequentially
Both tasks need rules. In network man-

PRACTICE BOOK» NOT FOR SALE


read through a MIB
agement this is handled by
D. Reset
A. SNMP
B. SMI 27. Which SNMP object group has the informa-
tion about managed s/m.
C. MIB
A. Interface Group
D. None
B. System Group
22. Syslog runs on
C. Address translation Group
A. UDP Port 514
D. TCP Group
B. TCP Port 514
28. Regarding the functioning of the Zabbix
C. TCP Port 619
network monitoring tool, we can say.
D. UDP Port 691
A. Its operation is similar to SNMP as it
23. defines the general rules for naming uses the Manager-Agent strategy.
objects, defining object types, and show- B. It only works with the RMON MIB.
ing how to encode objects and values.
C. It only manages the WEB network de-
A. MIB vices.
B. BER D. It only performs the administrative
C. SMI part of network management.
D. None 29. Statement 1:SIEM has its own proto-
24. Which of the below SNMP versions has col.Statement 2:SIEM works with SNMP
highest level of security features and Syslog.
A. SNMPv1 A. Both statements are correct.
B. SNMPv2C B. Both statements are not correct.
C. SNMPv3 C. Statement 1 is false, statement 2 is
true.
D. All of the above.
D. Statement 2 is false, statement 1 is
25. In a network management system, what true.
are the elements that use the SNMP pro-
tocol? 30. SNMPv2c is:
A. Manager and Agent A. O SNMPv2 original
B. Manager and MIB B. User-Based SNMPv2
C. RMON e MIB C. Community-Based SNMPv2
D. MIB and Agent D. SNMPv2 based encryption

26. Which of the following are SNMP mes- 31. UDP port number used by SNMP manager
sages? to communicate with Agents is
A. Trap: Used to report events. A. 162

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 SNMP 510

B. 161 B. It uses the distributed strategy, or de-


C. 80 centralized, a hierarchy divided into 5 lev-
els is formed.
D. 43
C. It started to use cryptography in the
32. Regarding the Zabbix Network monitoring exchange of PDUS, which guarantees
tool, it is correct to state: more security.
A. It is totally incompatible with SNMP. D. It started to use user authentication
between Agent and Manager to guarantee

NARAYAN CHANGDER
B. It has SNMP compatibility only for
monitoring Windows workstations and more security.
servers.
37. We can compare the task of network man-
C. Supports SNMP for manageable net- agement to the task of writing a program.
work devices only. Both tasks need variable declarations. In
D. It is compatible with SNMP and its network management this is handled by
Manager Agent framework.

33. Which syslog message component con- A. SNMP


tains the machine’s process source of the B. SMI
event?
C. MIB
A. Facility
D. None
B. Description
C. Mnemonic 38. In a network device compatible with the
SNMP protocol, what information struc-
D. Timestamp / Sequence Number
ture is used?
34. An agent is a host or computer that runs A. Management Information Base (MIB).
the SNMP process.
B. Remote Monitoring (RMON)
A. Client
C. Management Database
B. Sever
D. Relational Database
C. Both a and b
D. None 39. SMI defines two structured data types:
and
35. The original version of SNMPv2 is also
known as: A. sequence; atomic

A. SNMPv2p B. sequence; sequence of


B. SNMPv2c C. a sequence of; array
C. SNMPv2u D. none of the above
D. SNMPv2s 40. Which of the below is an SNMP agent?
36. Regarding SNMPv2, it is CORRECT to A. Routers
state:
B. Switches
A. It uses the distributed strategy, or de-
centralized, a hierarchy divided into 3 lev- C. Firewalls
els is formed. D. All of the above.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 SNMP 511

41. The management information bases used 46. SNMP represents the management proto-
by SNMP are called: col of the TCP/IP architecture, whose op-
eration is based on a small number of man-

PRACTICE BOOK» NOT FOR SALE


A. MIB
ager stations that control a set of agents.
B. RMON Focusing on the OSI/ISO Reference Model,
C. LDAP SNMP operates at the layer called
D. MSAD A. Network
B. Application
42. Agents in SNMP are
C. Transport
A. Entities that manages network ele-
ments. D. Link

B. Managers 47. What is an SNMP manager?


C. Entities that are managed. A. The network administrator
D. All of the above. B. The monitoring workstation
C. The application running on the net-
43. ALL the objects in MIB2 database has the
work devices/servers
following object identifier in the beginning.
D. the person who visualizes the manage-
A. 1.3.6.1.0.1 ment tools
B. 1.3.6.1.3.1
48. Which layer protocol is SNMP?
C. 1.3.6.1.4.1
A. Application layer
D. 1.3.6.1.2.1
B. Transport Layer
44. What is an OID? C. Network layer
A. are libraries that translate these nu- D. Datalink layer
merical strings into a human-readable for-
mat, allowing the nature of the informa- 49. SNMP defines the to be sent from a
tion to be interpreted manager to an agent and vice versa.
B. Refers to the configuration of access A. format of the packets
to information by work groups or commu- B. b. encoding of the packets
nities C. c. number of packets
C. keys to identify each data element D. d. none of the above
D. object identification code, and corre-
sponds to a certain data of the device 50. A network administrator is operating a
network management process through SN-
45. Which of the following SNMP versions im- MPv2. It needs to use a PDU that takes
proved manager-to-manager communica- care of minimizing the number of proto-
tions? col exchanges required in order to return a
large amount of management information.
A. SNMPv1
For this case, the administrator must use
B. SNMPv2 the PDU:
C. SMNPv3 A. GetBulkRequest
D. SNMPv3 B. Inform

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 SNMP 512

C. Report D. Trap

NARAYAN CHANGDER

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
10. Network Security

10.1 Introduction
1. These define access permissions for a user A. Firewall
(1-3) B. Intrusion Protection System (IPS)
A. Group Permissions C. Authentication, Authorization, Ac-
B. User Access Levels counting (AAA)
C. User Maintenance D. Virtual Private Network (VPN)
D. Group and User Settings 5. What technology can you use temporarily
2. It is a malicious program that gains full ac- to connect networks from two different
cess to a computer system. Often, a direct companies?
attack on a system using a known vulner- A. VPN
ability or password. B. HTTP
A. Virus C. DHCP
B. worm D. passive router
C. Trojan
6. NSGs are used at level & /or level.
D. Rootkit
A. Perimeter, network
3. Pretend to be someone (personnel) or B. NIC, Vnet
something (process).
C. Vnet, subnet
A. Eavesdropping
D. subnet, NIC
B. Hacking
C. Impersonation 7. NAP is
D. Penetration testing A. Network Access Protocols
B. Network Access Policies
4. Which type of security device provides en-
crypted access to a network for remote C. Not to Access Protocols
users? D. Network Address Protocols

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 514

8. Identify security requirements with pass- attachment with an .exe extension.what


words should you do?
A. Use password complexity rules A. delete the email
B. Require two-factor authentication B. click the attachment
C. Limit of the number of password C. run virus scan, then click the attach-
guesses ment
D. All of the above D. call sara to see if she sent you the mail.

NARAYAN CHANGDER
9. HTTP protocol uses the following port: 14. What is the definition of a brute force at-
tack?
A. 53
A. Repeatedly trying usernames/passwords
B. 443 to access a system
C. 1723 B. Physically threatening someone to
D. 80 give up personal information
C. Physically breaking into a device to
10. The ‘official title’ of the person who is re-
hack it
sponsible for exploring vulnerabilities of
computer systems and reporting of this in D. Being a very strong hacker
an organisation 15. you receive an email from your bank,
A. Penetration tester telling you that your account has been com-
B. Systems administrator promised and you need to validate your ac-
count details or else your account will be
C. Network manager closed. you are supposed to click a link to
D. Forensic technician validate your information. what is this an
example of?
11. When I am shopping online:
A. a security breach at your bank that
A. I’m not thinking about security needs to be resolved
B. It depends. If I am in a hurry tI don’t B. spam
think of it
C. ransomware
C. Besides of ordinary rules of security I D. Phishing
read store regulations and customers re-
views. I pay attention about my payment 16. Matt, an administrator, notices a flood
D. none of above fragmented packet and retransmits from
an email server. After disabling the TCP
12. What is not the role of a firewall? offload setting on the NIC, Matt sees nor-
mal traffic with packets flowing in se-
A. To create a choke point
quence again. Which of the following utili-
B. To log Internet activity ties was he MOST likely using to view this
C. To monitor internal communications issue?
D. To limit network exposur A. SPAM filter
B. Protocol analyzer
13. You receive an email in your inbox from
your friend Sara. The title of the email is C. Web application firewall
“this is so cool!” and inside the email is an D. Load balancer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 515

17. Which type of attack involves a “threat 22. in computing is a network security sys-
actor” gaining physical access to a de- tem that monitors and controls incoming
vice and using that device to capture data and outgoing network traffic based on pre-

PRACTICE BOOK» NOT FOR SALE


transmitting between devices? determined security rules.
A. Denial-of-service A. spyware
B. Man-in-the-middle attack B. cookies
C. Eavesdropping attack C. spam
D. Reconnaissance attack D. firewall

18. What type of network can you set up that 23. A proxy firewall filters at?
is another company’s internal network? A. Physical layer
A. intranet B. Data link layer
B. extranet C. Network layer
C. internet D. Application layer
D. DMZ 24. Stream ciphers means
19. Which among these is not a common LAN A. Encrypt digits
attack? B. Encrypt letters
A. MAC Address Table Flooding Attack C. Encrypt digits or letters
B. VLAN Attack D. none of above
C. Network Attack
25. What port number is RDP (Remote Desk-
D. Telnet Attack top Protocol)?
20. Which type of attack trys different pass- A. tcp 80
words, hoping that one will work? Some B. tcp 3389
logic can be applied by trying passwords C. tcp 445
related to the person’s name, job title, hob-
bies or similar items. D. tcp 389

A. Logic Bomb 26. A packet filter firewall filters at?


B. War Dialling A. Network Layer
C. Social Engineering B. Transport Layer
D. Brute Force C. Application Layer
D. Link Layer
21. Which of the following techniques do Vir-
tual Private Networks (VPNs) use to se- 27. What type of key can be freely shared
cure the data that they transmit over the with anyone so that they can encrypt a
Internet? (Choose all that apply.) message?
A. Tunneling A. Personal key
B. Socketing B. Private key
C. Message integrity C. Free key
D. Authentication D. Public key

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 516

28. The typical port used by TCP for HTTP is 34. What is the technical term for the name
associated with a wireless network (the
A. 60 name that appears when you are scanning
for networks or the name of the network
B. 90 you are on)?
C. 80
A. MAC Address MAC)
D. 70
B. IP Address (IP)
29. A type of attack that uses a forgotten IP

NARAYAN CHANGDER
or MAC address to impersonate a trusted C. Service Set Identifier (SSID)
computer.
D. Network Address Translation (NAT)
A. Man-in-the-Middle
B. Distributed DoS (DDoS) 35. Setting user access levels means that
C. SYN Flood A. Anyone can update software to the lat-
D. Spoofing est version

30. Which of the following is the type of fire- B. Passwords must be shared with the
wall? network manager
A. Packet Filtering Firewall C. Hackers can never gain access to the
B. Dual Homed Gateway Firewall system
C. Screen Host Firewall D. Central systems are protected even if
D. All of the mentioned some users’ accounts are compromised

31. Rate the password:Harry0304 36. Which of the following actions is a copy-
A. Weak right violation?
B. Moderate A. Sharing a Website address
C. Strong
B. Reading material from a publicly avail-
D. none of above able Web site
32. What port number is SNMP (Simple Net- C. Copying software and distributing it to
work Management Protocol)? your friends
A. tcp 80 D. Quoting a paragraph and mentioning
B. tcp 161 the source
C. udp 161
37. Why do business pay people to do a pene-
D. tcp 3389
tration test?
33. Traffic can be secured over a network by
A. To see what data can be stolen
applying what?
A. Encryption B. To see where weaknesses are
B. Hashing C. To see how to prevent another attack
C. CRC in the future
D. IP addressing D. To see how they broke in

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 517

38. Which of the following is a PPP authenti- 43. It is any software designed to damage or
cation protocol that enables users to au- to disrupt a system.
thenticate using smartcards, badge read-

PRACTICE BOOK» NOT FOR SALE


A. Malicious software (malware)
ers, and fingerprint scanners, as well as
usernames and passwords? B. Adware
A. PPTP C. Spyware

B. PAP D. Phishing

C. CHAP 44. The use of agreed upon methods of trans-


D. EAP porting and accessing computer services
like web or file exchanges is called a ,
39. a computer network based on internet much like the etiquette of good behavior
technology but designed to meet the inter- used in polite society.
nal needs for sharing information within a A. protocol
single organisation or company is
B. multiplexing
A. Internet
C. framing
B. Intranet
D. domain
C. Extranet
45. The network equipment used for the trans-
D. All the three mission of data are simply specialized com-
puters that are designed for the accep-
40. Which of these OS’s is a type of Linux?
tance, storage, and of data signals.
A. MAC
A. understanding
B. Windows 7
B. structuring
C. Lubuntu
C. retransmission
D. Android
D. reforming
41. What is network forensics? 46. It is a wireless security protocol created by
A. A company breaks into a network Cisco to address the weaknesses in WEP
and WPA
B. A company is employed to find out how
an attack happened A. LEAP
C. A company fixes a network B. No Security
D. A company sends a virus C. WPA
D. none of above
42. Your email client asks for your password
every time you send a mail. Which is prin- 47. Which type of firewall allows for inspec-
ciple is disobeyed? tion of all characteristics of a packet?
A. Single Sign On A. Stateful Firewall
B. Separation of Duties B. Stateless Firewall
C. Least Privileges C. WPA2 PSK
D. Easiest penetration D. Dictionary attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 518

48. What percentage of cybersecurity 53. is a form of internet security that con-
breaches are due to human error? ceals internal addressing schemes from the
A. 50% public internet.

B. 30% A. SAT
C. 75% B. NAT
D. 95% C. WAT
49. What is the behavior of a switch as a re- D. MAT

NARAYAN CHANGDER
sult of a successful CAM table attack?
54. The addressable total number of hosts in
A. The switch will forward all received an IPv4 scheme is
frames to all other ports.
A. 4.3 million
B. The switch interfaces will transition to
the error-disabled state. B. 4.7 billion
C. The switch will drop all received C. 4.3 billion
frames.
D. 4.7 million
D. The switch will shut down.
55. Which of the following operating systems
50. Which type was the first generation of
are susceptible to viruses?
firewalls?
A. windows
A. Next-generation firewall (NGFW)
B. Packet filter B. windows, and mac OS X

C. Stateful C. windows, and mac OS X, and linux


D. Application layer D. Windows, and mac OS X, and linux, and
android
51. What type of malware can appear harm-
less but is in fact malicious and can install 56. What type of device is designed to in-
a backdoor into your system? spect traffic, detect malicious activities,
A. Virus and take steps to mitigate the malicious
activity?
B. Trojan
C. Worm A. NIDS

D. Ransomware B. NIPS
E. Spyware (Key Logger) C. Internet content filter

52. In a site-to-site Virtual Private Network D. NAT server


(VPN) connection, which of the following
57. A(n) server is a server that creates a
combinations of endpoint devices would
secure tunnel connection.
most likely be involved?
A. Two workstations A. RADIUS

B. A workstation and a server B. VPN


C. A workstation and a VPN concentrator C. Tunnel
D. Two VPN concentrators D. Authentication

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 519

58. The network security engineer just de- B. Access to files is limited
ployed an IDS on the network, but the C. No access to file system
Chief Technical Officer (CTO) has concerns

PRACTICE BOOK» NOT FOR SALE


that the device is only able to detect D. Either B or C according to network pol-
known anomalies. Which of the following icy
types of IDS has been deployed? 63. Which the following flags are used to es-
A. Signature Based IDS tablish a TCP connection?
B. Heuristics IDS A. PSH
C. Behavior based IDS B. FIN
D. Anomaly based IDS C. SYN

59. What technology can you use to isolate a D. URG


network of servers so that they cannot in- 64. The , known as “Layer 2, “ contains
teract with other servers? the broad start and stop signaling used
A. bridge to alert the switches to the beginning and
ending of a transmission of data.
B. switch
A. physical layer
C. router
B. application layer
D. VLAN
C. transport layer
60. A Caesar cipher uses what in order for de-
D. network layer
cryption?
A. Token Shift 65. Which of the following is not an element
of SNMP system?
B. Graph Token
A. SNMP agents
C. Shift Key Number
B. SNMP workers
D. Coin Number
C. SNMP managers
61. What was a limitation of first-generation
D. Management Information Base (MIB)
firewalls?
A. Produced many false positives, 66. A attack is when a victim is flooded
thereby overwhelming IT security with SYN packets in an attempt to make
many half-open TCP connections.
B. Filtered only at layer 3 of the OSI
model A. SYN flood
C. Granular policy capability made man- B. Ping flood
aging the firewall too complex C. HTTP flood
D. Could not distinguish between mali- D. None of the above
cious and legitimate applications
67. Which authentication method completes
62. An employee wants to access some office the following in order:logon request, en-
files from his home computer. What type crypts value response, server, challenge,
of access is provided for him? compare encrypts results, and authorize or
A. Complete file system is shared with fail referred to?
employee A. Security Tokens

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 520

B. Certificates 72. Which of the following best describes a


C. Kerberos Trojan Horse

D. CHAP A. Malicious software that misleads


users of its intent, which is to allow unau-
68. A shipping company stores information thorised access to your system
in small regional warehouses around the B. Malicious software that replicates it-
country. The company keeps an IPS online self and spreads through your network to
at each warehouse to watch for suspicious steal data

NARAYAN CHANGDER
traffic patterns. Which of the following
C. Malicious software that it usually at-
would BEST describe the security control
tached to an email and sends itself around
used at the warehouse?
a network to allow unauthorised access to
A. Preventive your system
B. Compensating D. Malicious software that sets your com-
C. Physical puter on fire
D. Detective 73. When computer virus starts to impact
data, it is known as
69. A(n) level proxy provides protection
at the session layer of OSI. A. virus infection

A. Application B. virus spreading

B. Circuit C. data losing

C. Proxy D. shutting down

D. Server 74. What is one advantage of setting up a


DMZ with two firewalls?
70. A school network manager wants to en-
A. You can control where traffic goes in
sure that students can view revision doc-
the three networks
uments left on the school network, while
not being able to change or delete them. B. You can do stateful packet filtering
What level of access should be created to C. You can do load balancing
ensure the safety of the network and the
files on it? D. Improved network performance

A. READ-ONLY 75. What does CIA stand for in networking se-


curity?
B. READ-WRITE
A. Confidentiality, Immunity, Access
C. INSTALL-READ-WRITE
B. Confidentiality, Authority, Integrity
D. none of above
C. Computers In Authority
71. Passwords that contain recognizable
D. Confidentiality, Integrity, Availability
words are vulnerable to a:
A. Denial of Service attack 76. Which of the following security devices can
be replicated on a Linux based computer
B. Hashing attack using IP tables to inspect and properly han-
C. Dictionary attack dle network based traffic?
D. James attack A. Sniffer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 521

B. Router B. A hyperlink to a login page


C. Firewall C. Generic welcome message, not per-

PRACTICE BOOK» NOT FOR SALE


D. Switch sonalised
D. All of the above
77. Which of the following filters spam
emails? 82. This means to gain access without permis-
A. Anti-virus software sion, unauthorized access.
B. Email service providers A. hacking
C. Internet service providers B. cybercrime
D. All of the above C. identity theft
D. virus
78. enables you to define, manage, and
monitor the global routing for your web 83. It is a self-replicating program that is
traffic by optimizing for best performance harmful to networks.
and instant global failover for high avail-
ability. A. Worm

A. Azure Application Gateway B. Trojan Horse


B. Azure Front Door C. Virus
C. Azure Web Application Firewall D. none of above
D. none of above 84. A person who illegally breaks in to others
computer system is known as
79. What tells a firewall how to reassemble
a data stream that has been divided into A. Hacker
packets? B. Cracker
A. The source routing feature C. Cyberterrorist
B. The number in the header’s identifica- D. Computer Spy
tion field
C. The destination IP address 85. Encrypt “day” with a = 5 and b = 8 using
Affine Cipher
D. The header checksum field in the
packet header A. xiy
B. jiu
80. What method of network security pre-
vents packets from entering or leaving a C. opj
network unless they meet a set of rules? D. gtr
A. Access Control
86. To provide integrity of data, hashing is of-
B. Firewall ten used. Which of the following is a com-
C. Physical Security monly used 128-bit hash digest?
D. Anti-Malware A. SHA-1

81. What features might give away a phishing B. MD-5


email? C. CRAMMD5
A. Poor spelling D. SHA-256

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 522

87. What option can you configure on your 91. A method used to prevent physical access
workstation to increase security when you to the system
leave your desk? A. Encryption
A. file encryption B. Intruder Alarm
B. multi factor authentication C. Firewall
C. single sign-on D. Anti-Malware
D. screensaver password 92. What kind of threat is described when a

NARAYAN CHANGDER
threat actor impersonates another person
88. means the protection of data from to obtain credit information about that per-
modification by unknown users. son?
A. Confidentiality A. Data loss or manipulation
B. Integrity B. Disruption of service
C. Authentication C. Identity theft
D. Non-repudiation D. Information theft

89. Which of the following statements best de- 93. Ensuring appropriate network means
fines out-of-band management? preventing attackers from altering the ca-
pabilities or operation of the network.
A. Out-of-band management is a method
for accessing network devices from a re- A. confidentiality
mote location. B. integrity
B. Out-of-band management is a method C. availability
for accessing network devices using a di- D. functionality
rect cable connection.
94. are compromised hosts running mal-
C. Out-of-band management is a method ware controlled by the hacker.
for accessing network devices using a
connection to the system other than the A. DDoS
production network to which the device is B. ICMP
connected. C. Bots
D. Out-of-band management is a method D. None of the above
for accessing network devices using any
tool that operates over the production net- 95. It uses available resources, such as pass-
work to which the device is connected. words or scripts.
A. Accidental Threats
90. Organisation can protect themselves from
SQL injection attacks by downloading and B. Malicious Threats
installing [7-9] C. Structured Attacks
A. Patches D. Unstructured Attacks
B. Software 96. TCP is:
C. Upgrades A. Transmission Control Protocol
D. Downgrades B. Transmission Count Protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 523

C. Transport Control Protocol 102. Malware is


D. Transmission Control Policy A. A type of spyware program that moni-

PRACTICE BOOK» NOT FOR SALE


tors keystrokes with the intent of stealing
97. is a company that provides users with
passwords, login IDs or credit card infor-
access to the internet.
mation.
A. Internet Clients Provider
B. Software that’s intended to render a
B. Modem system temporarily or permanently use-
C. Internet Service Provider less.
D. Hub C. The process of hacking a smartphone,
tablet, etc., to run unauthorized software
98. Which of the following devices would be
and to make other tweaks to the operating
MOST useful to ensure availability when
system.
there are a large number of requests to a
certain website? D. none of above
A. Protocol Analyzer
103. If you receive a suspicious email, you
B. Load Balancer should
C. VPN Concentrator A. open it up and click on any links.
D. Web Security Gateway
B. reply to the sender asking them to
99. What are NETWORK FORENSICS? leave you alone.
A. A way of analysing a network for hard- C. delete the email without opening it.
ware faults D. delete your email account.
B. A way of finding out why a network
failed 104. A computer network that uses a public
C. A set of rules for ensuring safe use telecommunication infrastructure such as
the Internet to provide remote offices or
D. A way of analysing a network to find individual users secure access to their or-
possible weaknesses or “back doors” ganization’s network.
100. TWO types of community strings A. Proxy Server
A. Write-only B. Demilitarised zone
B. Read-write
C. Virtual Private Network
C. Read-only
D. Quarantine Network
D. Sleep-only
105. A person who is able to gain access to
101. Most recent security model that was de-
equipment or a network by tricking people
veloped in 2002 and aims to change how
into providing the necessary access infor-
information security is understood and im-
mation.
plemented.
A. McCumber Cube A. A social engineer

B. Parkerian Hexad B. Man-in-the-Middle


C. Torredo Tunnelling C. A Haker
D. CIA Triad D. IT Technician

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 524

106. HTTPS is a type of protocol. What does unauthorized access and that access to the
“S” stands for IT systems should be logged. Which of the
A. Safe following would BEST meet the CISO’s re-
quirements?
B. Secure
A. Sniffers
C. Standup
B. NIDS
D. Safety
C. Firewalls

NARAYAN CHANGDER
107. The typical port used by TCP for Secure
Shell is D. Layer 2 Switches

A. 11 112. how can viruses spread


B. 44 A. through e-mail
C. 33
B. through whatsapp
D. 22
C. through youtube
108. A type of hacker who does so for good D. through messanger
reasons, with permission
A. Black Hat 113. Privacy means that is used in accor-
dance with the legal requirements man-
B. Grey Hat
dated for employees, partners, and cus-
C. Red Hat tomers.
D. White Hat A. Information
109. Which type of firewall blocks packets B. CIA triad
based on rules that are based on IP ad- C. worker’s comp.
dresses or ports?
D. Privacy
A. packet filtering
B. stateful packet inspection 114. Complete this sentence:A firewall that is
C. NAT filtering a hardware is also called a

D. Application-level gateway A. Modem


B. Gateway
110. What is likely to be covered in a network
policy? C. Proxy server
A. Rules for chosing passwords. D. A firewall is always a software,
B. Lists of website you are allowed on.
115. Complete this sentence:A malware that
C. Passwords for the network. allows outsiders to bypass security checks
D. Conditions where the policy won’t ap- is
ply. A. Rootkits
111. The Chief Information Security Officer B. Trojan horses
(CISO) has mandated that all IT systems
C. Back door
with credit card data be segregated from
the main corporate network to prevent D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 525

116. Data travels across networks in 121. If you receive an email claiming to be your
A. Nibbles bank or another organisation and you are
asked for security details. What type of

PRACTICE BOOK» NOT FOR SALE


B. Parts attack is this?
C. Bytes
A. Phishing
D. Packets
B. Denial of Service
117. When trying to protect your network, C. Virus
you should create your secure network
based on D. Trojan Horse
A. multiple content filters 122. which of the following is a malicious soft-
B. a master firewall that all traffic flows ware that on execution runs its owns code
through and modifies other computer programs?
C. a NAT firewall and a proxy server A. virus
D. layers B. spam
118. In the , the network interface card’s C. spyware
MAC address is used to create a one-to-
D. adware
one relation to a logical address called the
Internet Protocol Address, or more simply
123. What is not a good way of securing a
the “IP address.”
wireless network?
A. physical layer
A. Automatically allocate IP addresses.
B. application layer
B. Disable SSID.
C. transport layer
C. Turn on wireless security protocols.
D. network layer
D. Enable MAC filtering.
119. Which of the following is FALSE about
malware? 124. Tools that make web pages powerful but
A. It is a type of program that replicates make computers vulnerable:
itself. A. Java & active control X
B. It causes the computer to malfunction. B. Antivirus
C. It may delete or corrupt files without
C. Ad-block
user’s knowledge.
D. Some types of malware modifies the D. smart screen filter
operating system.
125. What network attack seeks to create a
E. None of the above DoS for clients by preventing them from
being able to obtain a DHCP lease?
120. What port does L2TP use?
A. 501 A. DHCP starvation

B. 1723 B. IP address spoofing


C. 1701 C. DHCP spoofing
D. 443 D. CAM table attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 526

126. Symmetric key is C. to send and retrieve network manage-


A. Sender only used same key ment information

B. Receiver only used same key D. configurations on SNMP agents


C. Sender and receiver use same key 132. What type of firewall works on the Ses-
D. none of above sion layer that creates a connection and
allows packets to flow between the two
127. Account lockout policies are used to pre- hosts without further checking?

NARAYAN CHANGDER
vent which type of security attack?
A. proxy server
A. Brute force attacks
B. application firewall
B. Users sharing passwords
C. NAT filtering
C. Social engineering
D. Passwords being reused immediately D. circuit-level gateway

128. HTML stands for 133. How can a brute-force attack be de-
layed?
A. Hypertext Markup Language
A. Using CAPTCHA
B. Hypertext Markup Language
C. Hypertext Modulator Language B. ISPs rejects access to attackers

D. none of above C. Using anti-malware software


D. none of above
129. What is the purpose of a Denial of Ser-
vice attack?
134. While configuring a new access layer
A. Exploit a weakness in the TCP/IP stack switch, the administrator, Joe, was ad-
B. To execute a Trojan on a system vised that he needed to make sure that
only devices authorized to access the net-
C. To overload a system so it is no longer work would be permitted to login and uti-
operational lize resources. Which of the following
D. To shutdown services by turning them should the administrator implement to en-
off sure this happens?

130. Which of following is harmful for com- A. Log analysis


puter? B. VLAN Management
A. anti virus C. Network Separation
B. virus D. 802.1x
C. freeware
D. shareware 135. In which of the following attacks, does
an attacker use hijacking software?
131. What is the function of the MIB element A. Hacking
as part of a network management sys-
tem? B. Data interception and theft
A. to collect data from SNMP agents C. Phishing
B. to store data about a device D. Brute force attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 527

136. controls traffic by defining zones such C. Users on a network from installing
as DMZs (demilitarized zones), the inter- software.
nal network, and perimeter networks.

PRACTICE BOOK» NOT FOR SALE


D. Unauthorized users from accessing a
A. VPN network.
B. Firewall 141. What is code review?
C. IDS A. The process of checking the source
D. TCP/IP code of a system by experienced program-
mers to make sure that there are no vul-
137. You receive an e-mail message. The nerabilities.
sender of the message claims to be a bank B. Checking the modules individually and
executive and wants your personal infor- their integration to the main program.
mation to open an account for you. Which
one of the following terms describes this C. Using automated test systems
activity? D. none of above
A. Phishing 142. In a school, user access levels are used to
B. Pirating
C. Spyware A. Allow students to open files from
shared drives, but not to edit or delete
D. Hacking them
138. An effect of SQL injection B. Prevent students from installing
games on their computers
A. Full access to the target computer
C. Stop teachers from deleting software
B. Network access to the computer only
D. Prevent students from accessing
C. Ability to edit all files games on the internet
D. Attackers can access the database
only and manipulate data 143. Software that performs a ‘barrier’ be-
tween a potential attacker and the com-
139. What is the purpose of a firewall? puter system.
A. To remove viruses from a system A. Antivirus
B. To provide a secure password access B. Firewall
system C. Windows update
C. To intercept and possibly block pack- D. Disk defragmenter
ets of data
144. is an IP network service that reports
D. To prevent programs being installed on connections between two hosts.
on a network
A. TCP/IP (Transport Control Protocol/IP
140. The primary purpose of Network Access Address)
Protection (NAP) is to prevent: B. SNMP (Simple Network Management
A. Loss of data from client computers on Protocol)
a network. C. Internet Control Message Protocol
B. Non-compliant systems from connect- (ICMP)
ing to a network. D. UDP (User Datagram Protocol)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 528

145. Which of the following describes the pri- C. VLAN


mary function of a Remote Desktop Gate-
D. PLC
way?
A. Provides multiple users with Remote 150. Which of the following is the most accu-
Desktop client access to one workstation rate definition of a worm?
B. Provides a single Remote Desktop A. A stand-alone program that replicates,
client with simultaneous access to multi- doing damage to a system
ple workstations

NARAYAN CHANGDER
B. Malicious code that spreads from de-
C. Enables remote users outside the net-
vice to device but does not need to attach
work to access network workstations
itself to a program in order to do so
D. Enables remote users to access work-
stations without the need for a Remote C. A program that pretends to be safe,
Desktop client. while actually containing malicious code
D. software that installs itself onto de-
146. You are trying to find the IP address of
vices and then steals personal informa-
the web server of the company you want
tion about the user, like passwords,
to attack. This is?
A. Forensics 151. Which of the following network design
B. Diagnosis elements allows for many internal devices
to share one public IP address?
C. Scanning
D. Attack A. DNAT
B. PAT
147. The unauthorized real-time interception
of a private communication. C. DNS
A. Eavesdropping D. DMZ
B. Hacking
C. Impersonation 152. Which firewall examines packets in isola-
tion and does not know the packet’s con-
D. Penetration testing text?
148. Which of the following can be used to pro- A. Packet Filtering
tect a network?
B. Stateful
A. Firewall
C. Stateless
B. Blocker
C. Server D. Proxy

D. Client 153. Software designed to detect, disable,


149. What special area serves as a buffer area and remove viruses, worms, and Trojans
between the Internet and the internal net- A. Firewall
work and can be used to hold web servers
that are accessed from the Internet? B. Antivirus

A. DMZ C. Data encryption


B. NAT D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 529

154. Which type of computer is 100% virus- 159. They are windows that automatically
proof? open and are designed to capture your at-
tention and lead you to advertising sites.

PRACTICE BOOK» NOT FOR SALE


A. Mac
A. Spam
B. Windows-based
B. Popups
C. Chromebook
C. Denial of Service (DoS)
D. None
D. SYN Flood
155. What is a good anti-virus
160. Which of the following remote access
A. one that stores a lot of data protocols provides users with full graph-
B. one that has less data ical control over a Windows computer?
(Choose all that apply.)
C. one thats up to date
A. SSH
D. none of above B. RDP
156. Sara is buying books from an online re- C. VNC
tail site, and she finds that she is able D. Telnet
to change the price of a book from OMR
19.99 to OMR 1.99. Which part of the 161. People who steel documents to find and
CIA triad has been broken? publish sensitive information from within
an organization are called
A. C
A. Cyber-criminals
B. I
B. Insiders
C. A
C. Script kiddies
D. None of the above
D. White hats
157. Routers function at layer by routing 162. Which of the following would help pre-
through IP;Switches function at layer vent unauthorised users from corrupting or
by routing through MAC address. deleting system files or confidential data?
A. 3:2 A. Passwords and user access levels
B. 2:3 B. Firewall and anti malware software
C. 1:3 C. Passwords, user access levels and a
firewall
D. 1:2
D. Passwords, user access levels, fire-
158. Why do businesses pay for network wall and anti malware software
forensics?
163. If you believe an email is genuine what
A. To stop viruses should you do?
B. To stop an attack happening in the first A. Click the link in the email
place
B. Go to the official website in the usual
C. To find out how an attack happened, to way
prevent it happening again
C. Call the company to check whether this
D. To stop any form of attack is a phishing attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 530

D. Reply to the email 169. Which of these attack occurs when a


hacker inserts itself between the commu-
164. what is the name of an application that nications of a client and a server?
appears to look like a helpful application
but instead does harm to your computer? A. Man-in-the-Middle
A. virus B. IP Spoofing
B. worm C. Replay
C. malware D. Social engineering

NARAYAN CHANGDER
D. Trojan horse 170. When logging into an online account,
165. A network-attached system set up as a what should you check for?
decoy to lure cyberattackers and to detect, A. https
deflect or study hacking attempts in order B. The web address
to gain unauthorized access to information
systems. C. The images represent the company
A. intrusion detection system D. The text on the screen
B. Fly trap E. How long you have left to fill the details
in
C. Honeypot
D. Intruder alarm server 171. Which of the following is not an access
control method
166. refers to software that controls net-
work traffic and access to network re- A. Access Control List
sources. B. Capability list
A. Protocol C. Role based
B. Network operating system D. User discretion
C. Network Adapter
172. A security administrator is reviewing a
D. Media report that shows a number of devices on
167. The default behaviour of anti-malware internal networks attempting to connect
software if it detects a virus with servers in the data center network.
Which of the following security controls
A. Quarantine the suspicious file should the administrator add to prevent in-
B. Delete the suspicious file ternal systems from accessing data center
C. Shut down the computer devices?

D. Block all network connections A. VPN


B. IPS
168. It could be exploited because of an en-
cryption key that was vulnerable to decod- C. NAT
ing. D. ACL
A. WEP 64
173. Which of the following security technique
B. WEP 128 provides the highest “confidentiality ser-
C. WPA vice”?
D. none of above A. Hashing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 531

B. Encryption 179. What protocol is used to encapsulate the


C. Key exchange EAP data between the authenticator and
authentication server performing 802.1X

PRACTICE BOOK» NOT FOR SALE


D. Firewall authentication?
174. I include programs such as key loggers,
A. TACACS+
that record and send users keystrokes to
the hacker. What am i? B. SSH
A. Spyware
C. RADIUS
B. Back doors
C. Trojan Horse D. MD5
D. Phishing
180. OSI Model consists of layers.
175. Which account should have your most se-
cure password? A. 6
A. Bank Account
B. 7
B. School Account
C. Primary Email Account C. 8

D. Social Media Account D. 9


176. Which protocol is used to provide server-
based AAA authentication? (CHOOSE 181. Trojan Horses
TWO)
A. Does not need to attach to a program
A. SNMP
B. RADIUS B. Can only occur when a computer is not
connected to a network
C. SSH
D. 802.1x C. A type of social engineering
E. TACACS+ D. Designed to access a computer by mis-
177. Which of the following types of traffic leading users of its’ intent by prompting to
are carried by Telnet? (Choose all that ap- download a program
ply.)
A. Keystrokes 182. When is it legitimate to use packet sniff-
ing software?
B. Mouse movements
C. Display information A. To analyse network trends and to de-
D. Application data tect intruders

178. refers to software that controls net- B. To examine the data packets at a cer-
work communications using a set of rules. tain IP address
A. Media C. To copy the data packets and analyse
B. Device them
C. Protocol D. It is not legitimate to use packet sniff-
D. Network Adapter ing software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 532

183. Why these 4 elements (confidentiality, B. Sending an email that pretends to be


integrity, authenticity & availability) are from a reputable company which usually
considered fundamental? has a link to click that takes you to a web-
A. They help understanding hacking bet- site that looks real but is not.
ter C. A cyber attack that redirects a user
from a real URL to a website that looks
B. They are key elements to a security
real but is not.
breach
D. Looking at someone entering their per-

NARAYAN CHANGDER
C. They help understands security and its
sonal data into a system and copying what
components better
you see.
D. They help to understand the cyber-
crime better 188. A method for determining a solution to a
problem by sequentially testing all possi-
184. What is Network Security Threats? ble solutions.
A. The threat that occurs when thieves A. brute force
steal our device B. relative frequency
B. The threat that occurs when you have C. cipher
network issue in online class D. paired keys
C. A threat that occurs to anything that
189. What is Phishing?
has the potential to cause serious harm
to a computer system A. The attempt to acquire sensitive info
such as usernames, passwords and credit
D. Just a threat card details
185. What can virus affect? B. Going for fishing
A. Keyboard C. It is an attack in which a hacker at-
tempts to redirect a website’s traffic to an-
B. Hard drive
other fake bogus website.
C. RAM D. none of above
D. All of the above
190. These define access permissions for a
186. Ensuring network means that autho- user
rized users have access to information, A. Group permissions
services, and network resources. B. User Access levels
A. confidentiality C. User Maintenance
B. integrity D. Group and user settings
C. availability 191. If someone hacks into your email, which
D. authentication law have they broken?
A. The Data Protection Act
187. Which of these is the best definition of
Blagging? B. Regulation of Investigatory Powers
Act
A. Calling someone to create an invented
situation that increases the chance they C. Computer Misuse Act
will share sensitive information with you. D. Freedom of information Act

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 533

192. The full form of OSI is OSI model is management are true? (Choose all that
A. Open Systems Interconnection apply.)

PRACTICE BOOK» NOT FOR SALE


A. Out-of-band management tools do not
B. Open Software Interconnection
provide access to the remote system’s
C. Open Systems Internet BIOS or UEFI firmware.
D. Open Software Internet B. Out-of-band management tools enable
you to reinstall the operating system on a
193. can make routing decisions based on remote computer.
additional attributes of an HTTP request,
for example, URI path or host headers. C. Telnet, Secure Shell (SSH), and Virtual
Network Computing (VNC) are in-band
A. Application Gateway management tools.
B. Application Firewall D. To perform out-of-band management
C. Both on a device, it must have an IP address.
D. None 198. A third parity software tool that erases
the hard disk.
194. What kind of threat is described when a
threat actor prevents users from accessing A. Degaussing Tool
data services? B. Shatter Tool
A. Data loss or manipulation C. Shredding machine
B. Disruption of service D. Wiping Tool
C. Identity theft
199. What is the purpose of anti-virus soft-
D. Information theft ware?

195. By default, what is the minimum number A. To make chocolate


of characters for a password in a Windows B. To prevent hackers from accessing the
Server 2012 installation? network
A. 8 C. To block unauthorised connections to
B. 5 the network

C. 6 D. To prevent a virus from attacking the


network
D. 7
200. An example of a network forensic tech-
196. When the attack changes the DNS records nique is
to point to imposter servers . This attack
A. Packet sniffing
is called:
B. Running anti-virus
A. Man-in-the-Middle
C. Updating the computer
B. Replay
D. Syncing with the server
C. DNSPoisoning
D. Spoofing 201. The final network division is that of the
and is correlated with the various
197. Which of the following statements about processes and services a server/computer
in-band management and out-of-band provides to other computers.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 534

A. physical layer 206. When the attack intercepts communica-


B. application layer tions between computers to steal infor-
mation transmitting through the network..
C. transport layer This attack is called:
D. network layer A. Man-in-the-Middle
202. A network policy B. Replay
A. Acceptable use policy C. DNS Poisoning

NARAYAN CHANGDER
B. Data theft D. Spoofing
C. Virus 207. Encrypts all files on the device. The at-
D. Phishing tacker demands large sums of money to
decrypt the files.
203. What type of firewall do you use to block A. Scareware
access to certain websites or instant mes-
sengers? B. Ransomware
A. Internet content filter C. Spyware

B. NIDS D. Trojan

C. circuit-level gateway 208. A security layer used in mobile devices


D. NATfiltering that employ the Wireless Applications Pro-
tocol (WAP).
204. Trojan horse A. WPA
A. Does not need to attach to a program B. WTLS
B. Can only occur when a computer is not C. LEAP
connected to a network
D. none of above
C. A type of social engineering
209. A hacker is someone who may violate
D. Designed to access a computer by mis-
ethical standards or principles, but without
leading users of its’ intent by prompting to
the malicious intent
download a program
A. White Hacker
205. What is an SQL Injection?
B. Black Hacker
A. Insert code into a data-driven applica- C. Cracker
tion for malicious reasons (like dumping
all data to an attacker) D. Grey hacker
B. An injection given to hackers when 210. What type of malware can encrypt your
they are caught so they can no longer use files and then require a payment to de-
computers crypt them.
C. Addings SQL statements to an existing A. Virus
system to allow it to run more efficiently B. Trojan
and securely
C. Worm
D. Adding SQL code to a program that usu-
ally wouldn’t use SQL (such as a computer D. Ransomware
game) to steal user details E. Spyware (Key Logger)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 535

211. Which of the following is not a social en- 216. are considered the “traffic cops” for
gineering technique? the flow of information inside and out-
side of the network, and to accomplish

PRACTICE BOOK» NOT FOR SALE


A. Blagging
this have signaling rules called “protocols”
B. Hacking on what to do for network failure for the
C. Phishing rerouting of traffic.

D. Pharming A. Routers
B. Hubs
212. When is a penetration test done?
C. Gateways
A. Before an attack D. Switches
B. After an attack
217. What port number is HTTPS (Hyptertext
C. During an attack Transfer Protocol Secure)?
D. Never A. tcp 161
B. tcp 80
213. What four components are required for
a computer to establish a remote Trans- C. tcp 22
mission Control Protocol/Internet Proto- D. tcp 443
col (TCP/IP) connection?
218. refers to any piece of hardware such
A. Common protocols
as a computer, server, printer, or smart-
B. Remote Access Service (RAS) phone.
C. A physical layer connection A. Protocol
D. TCP/IP configuration B. Media
E. Host and remote software C. Network Adapter
D. Device
214. What does the data get broken down in
to allowing it to travel across a network 219. It is a software program that displays
such as the internet? advertising on your computer, often dis-
played in a pop-up window.
A. Packets
A. Malicious software (malware)
B. Pieces
B. Adware
C. Parts
C. Spyware
D. Points
D. Phishing
215. Remote Desktop Protocol (RDP) was cre- 220. Which one of these is a characteristic of
ated for use with which of the following a good security policy-2 answers
terminal emulation programs?
A. The policy must be enforceable
A. Windows Terminal Services
B. The policy must be strict
B. Virtual Network Computing (VNC)
C. The policy must be written in several
C. Citrix WinFrame languages
D. Telnet D. The policy must be voluntary

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 536

E. The policy must be capable of being im- B. I


plemented
C. A
221. whats malware? D. None of the above
A. A very bad warehouse
B. A virus that spreads to your url 227. Which of the following are the two most
common types of Transport Layer Secu-
C. what disrupts the computer rity/Secure Sockets Layer (TLS/SSL) Vir-

NARAYAN CHANGDER
D. A malicious software tual Private Network (VPN) connections?
(Choose all that apply.)
222. Which of the following prevents Denial of
Service attacks? A. TLS/SSL client
A. Providing user access levels B. TLS/SSL portal
B. Encryption C. TLS/SSL tunnel
C. Authentication D. TLS/SSL gateway
D. Firewall
228. are an additional layer of compro-
223. is the process of obscuring an attack- mised hosts that are used to manage large
ers source IP address. groups of bots.
A. Backscatter
A. Botnets
B. Spoofing
B. Handlers
C. IP Flood
C. Phatbots
D. None of the above
D. None of the above
224. Which one of the following is a key func-
tion of a firewall? 229. The flow of traffic is from a user’s client
A. Monitoring computer, to a , to a , and then out
B. Deleting to the Internet or to a local data center to
access the services needed.
C. Copying
A. switch, router
D. Moving
B. router, gateway
225. Cipher based on substitution, using multi-
ple substitution alphabets is called: C. router, switch
A. Polyalphabetic cipher D. switch, hub
B. Monoalphabetic cipher
230. To destroy software media (floppy disks
C. Polycipher and CDs) we use:
D. Monocipher
A. Antivirus
226. Khalid opens his fitness tracking app to B. A shredding machine
start logging a workout. The app crashes,
and he is unable to log his workout. C. Hard Drive Recycling
A. C D. Security policy

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 537

231. What do business get after a penetration 235. Which of the following protocols can be
test? exploited to DoS

PRACTICE BOOK» NOT FOR SALE


A. A report telling them about weak- A. TCP
nesses B. IP
B. A report telling them that data has C. HTTP
been stolen
D. All of the above
C. A report telling them that their net-
work is weak 236. Some firewalls can examine the con-
tents of packets and the headers for signs
D. none of above
that they are legitimate.
232. Control is: A. Boundary
A. A subject’s ability to use, manipulate, B. Stateful
modify, or affect another subject or object C. Stateless
B. Weaknesses or faults in a system or D. Personal
protection mechanism that opens it to the
possibility of attack or damage 237. Which is not a form of security?
C. Security mechanisms, policies, or pro- A. Network Security
cedures that can successfully counterat- B. Personal Security
tack, reduce risk, resolve vulnerabilities,
and otherwise improve the security within C. Confidential security
an organization D. Communications Security
D. none of above 238. What do companies get after a network
forensic?
233. Mikayla receives several email messages
on Monday. Which of the following mes- A. A report telling them what happened
sage is likely a spam message? and how to put it right
A. An account statement from her bank B. A report telling what happened
B. A message from an unknown sender C. A report telling them they had a virus
in Nigeria wanting help with a financial D. A report telling them that their data
transaction has been stolen
C. Commercial information from a sub- 239. Which of the following statements about
scribed mailing list running a site-to-site Virtual Private Net-
D. A message from a friend with photo at- work (VPN) connection to join two dis-
tachments tant Local Area Networks (LANs) together,
rather than using a Wide Area Network
234. When the user damages data or equip- (WAN) connection, are generally true?
ment unintentionally (Choose all that apply.)
A. Malicious Threats A. The VPN is cheaper.
B. Accidental Threats B. The VPN is slower.
C. Physical Security Threats C. The VPN is less secure.
D. Data Security Threats D. The VPN is harder to maintain.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 538

240. What port number is Telnet (Telecommu- 245. The is the largest WAN in the world.
nications Network)? A. Intranet
A. tcp 21
B. Internet
B. tcp 22
C. PPTP
C. tcp 23
D. NAT
D. tcp 445
246. A tool that eliminates the magnetic field

NARAYAN CHANGDER
241. An IDS which uses machine learning mod- on a hard drive that allow for the storage
els to learn from past experience is of data.
A. Heuristic A. Degaussing Tool
B. Anomaly B. Shatter Tool
C. Signature C. Shredding machine
D. Rule Based D. Wiping Tool
242. is a feature in Internet Explorer that
247. A stateful firewall maintains a , which
helps detect phishing websites. It can also
is a list of active connections.
helps protect you from downloading or in-
stalling malware (malicious software). A. Routing table
A. Java & active control X B. Bridging table
B. Antivirus C. State table
C. Ad-block D. Connection table
D. smart screen filter 248. A system that monitors traffic into and
243. When someone sent e-mail, link or at- out of a network and automatically alerts
tachment, I’m opening him: personnel when suspicious traffic patterns
occur, indicating a possible unauthorized
A. always and from everyone intrusion attempt is called a(n)
B. sometimes, but not always I think it’s A. IDS
safe
B. Firewall
C. only when he sends it familiar and
looks reliably (e.g. topicindicates that it C. Router
is really to me) D. Anit-virus software
D. none of above
249. A malware program that, when executed,
244. Which of the following was the first replicates by inserting copies of itself (pos-
Transmission Control Protocol/Internet sibly modified) into other computer pro-
Protocol (TCP/IP) terminal emulation pro- grams, data files, or firmware is known
gram? as?
A. Telnet A. Malware
B. SSH B. Virus
C. Windows Terminal Services C. Spoofing
D. Virtual Network Computing D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 539

250. Under which law can law enforcement C. Help.I am stuck aboard and urgently
agencies intercept personal communica- need money transferred to me to get
tions? home.

PRACTICE BOOK» NOT FOR SALE


A. Freedom of Information Act D. All of the above. Be careful.
B. Data Protection Act 255. It was the first-generation security stan-
C. Regulation of Investigatory Powers dard for wireless network.
Act (RIPA) A. LEAP
D. Computer Misuse Act B. WEP
251. What acts as a middleman that translates C. WPA
between internal and external addresses D. none of above
and that caches previously accessed web
pages so that it can provide those more 256. An SQL injection attack would cause unau-
quickly in the future? thorised access to [1-3]
A. NAT server A. Files
B. stateful packet inspector B. The entire computer

C. proxy server C. Databases

D. NIDS D. Some files only.

257. Which of these is a domain-specific lan-


252. Block ciphers means
guage used in programming and designed
A. It take number of bits for managing data held in a relational
B. Encrypt single unit database management system, or for
stream processing in a relational data
C. Both A and B
stream management system?
D. none of above A. SDL
253. Which of these would NOT be an effec- B. RDBMS
tive way of preventing SOCIAL ENGINEER- C. RDSMS
ING?
D. SQL
A. Shredding documents
258. By combining the words ‘malicious’ and
B. Providing staff training
‘software’ we get the word ‘malware’.
C. Installing up-to-date anti-virus soft- What does malicious mean?
ware
A. Malicious means delicious.
D. Producing an-up-to date “safe usage”
B. Malicious means Mali Juice.
policy
C. Malicious means harmful.
254. Which of the following is a phishing D. None of these
email? ?
A. You have won a lottery!! Follow this 259. Which of these were not the most com-
link to claim it!! mon passwords of 2015

B. Your bank account has been compro- A. hello


mised. Login here to protect yourself. B. 1234

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 540

C. Password B. Bathing
D. qwerty C. Malware

260. The process of reconverting the en- D. Phishing


crypted data into a readable and usable 265. It is a software program that distributed
form. without user intervention or knowledge,
A. copyright monitors activity on the computer.
B. firewall A. Malicious software (malware)

NARAYAN CHANGDER
C. decryption B. Adware
D. computer security C. Spyware
D. Phishing
261. How many bits is the effective length of
the key used in the Message Digest five 266. When I log in to public place on one of my
(MD5) algorithm? accounts I pay attention to safeconnection
A. 168 (e.g. https, whether the certificate is safe)
and If nobody is not looking for keyboard:
B. 128
A. Sometimes
C. 56
B. Never
D. 64
C. Always
262. What most defines a computer virus?
D. none of above
A. It crashes computers
267. Someone monitors the data travelling on
B. It can copy itself and spread to other
a network and intercepts sensitive info.
computers
They use packet sniffing software to do
C. It can spy on what you do this. Encryption can prevent this.
D. It cannot be fixed A. PASSIVE
263. What are worms? B. ACTIVE
A. Self replicating viruses C. INSIDER
B. Earthworms in the soil D. BRUTE FORCE
C. World Register of Marine Species 268. SMTP protocol uses the following port:
D. none of above A. 25

264. An online fraud technique used by crimi- B. 22


nals to entice you to disclose personal in- C. 110
formation such as usernames, passwords D. 143
and credit card details by disguising as a
trustworthy entity in an electronic com- 269. How many viruses are made each day?
munication. It is the fastest rising online A. 10
crime method used for stealing personal fi-
nancial information and perpetrating iden- B. 30
tity theft. C. 54, 000
A. Crawling D. 82, 000

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 541

270. According to the CIA Triad, which of the D. Allow everything except what I block
below-mentioned element is not consid-
ered in the triad? 275. Number of times the Kerberos Key Distri-

PRACTICE BOOK» NOT FOR SALE


bution Centre is contacted how many times
A. Confidentiality when a user is authenticated?
B. Integrity
A. 1
C. Authenticity
B. 2
D. Availability
C. 3
271. When you change passwords often. Set D. 4
a reminder to change the passwords you
have for email, banking, and credit card 276. I give mine real data:
websites on the average of every three to A. only when it is necessary (e.g. shop-
four months. This is called: ping)
A. Variation B. whenever a page is about it asks (e.g.
B. Complexity taking participation in competitions, re-
C. Length search or quizzes)
D. Variety C. sometimes, but not always I think it’s
safe
272. Pete, an employee, attempts to visit
D. none of above
a popular social networking site but is
blocked. Instead, a page is displayed no- 277. Asymmetric encryption uses only 1 key.
tifying him that this site cannot be vis-
A. True
ited. Which of the following is MOST likely
blocking Pete’s access to this site? B. False
A. Internet content filter C. Maybe
B. Firewall D. God Knows
C. Proxy server 278. Social Engineering takes advantage of
D. Protocol analyzer which security flaw in a computer sys-
tem?
273. Zone Alarm is an example of a fire-
wall. A. The User
A. Personal B. The Network
B. Corporate C. The Password
C. IDS D. none of above
D. None of the above 279. The OSI and TCP/IP models structure the
used for signaling and the separation
274. What BEST describes implicy deny?
of function in a network.
A. Block everything except what I allow
A. addressing
B. Block everything and queue packets
for manual inspection B. media

C. Allow everything but block traffic if it C. domain


trips an IPS D. protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 542

280. Which VPN technology is the most com- B. TelNet


mon and the easiest to set up? C. iNet
A. PPTP
D. DNet
B. L2TP with IPSec
285. is a technology that separates com-
C. SSTP
puting software from the hardware it runs
D. CHAP on via an additional software layer.
281. Organisations can protect themselves

NARAYAN CHANGDER
A. composition
from SQL injection attacks by B. utilization
A. Using a firewall
C. organization
B. Only using wired connections
D. virtualization
C. Sanitising inputs
D. Hiring security guards 286. At which layer do network cables func-
tion at?
282. Which one of these is false? A. Physical
A. Availability enables authorized users-
B. Data-Link
persons or computer systems-to access
information without interferences or ob- C. Network
stuction D. Application
B. Accuracy means that information is
free from mistakes or errors that the end 287. What is the term for hacking a phone sys-
user expects it to have tem?

C. Authenticity is the quality or state of A. Cracking


coming from the original owner B. hacking
D. Integrity means the information re- C. phreaking
mains whole, complete, and uncorrupted
D. scamming
E. Confidentiality means that only those
with the rights and privileges to access in- 288. Layer 7 devices used to prevent specific
formation are able to do so. types of html tags are called:
283. Which of the following devices is MOST A. Firewalls
likely being used when processing the fol- B. Content Filters
lowing? 1 PERMIT IP ANY ANY EQ 80 2
C. Routers
DENY IP ANY ANY
A. Firewall D. NIDS

B. NIPS 289. Which of the following is a form of DoS


C. Load Balancer attack?
D. URL Filter A. Vulnerability attack
B. Bandwidth flooding
284. The attacker controlling a network of
compromised devices known as C. Connection flooding
A. Botnet D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 543

290. is a system that isolates internal net- 295. When you use the word it means you
works from the internet by downloading are protecting your data from getting dis-
and storing internet files on behalf of in- closed.

PRACTICE BOOK» NOT FOR SALE


ternal clients.
A. Confidentiality
A. Firewall
B. Integrity
B. Load Balancer
C. Authentication
C. All-in-one security appliance
D. Availability
D. Proxy server
296. What port does DNS use for connection
291. This attack shuts down a website. This is attempts?
done to stop anyone else accessing it, with
the aim of losing that website custom. A. 68

A. Phishing B. 21

B. Denial of Service C. 53

C. Root kit D. 56
D. Worms 297. Which of the following is an example of
a symmetrical algorithm?
292. of information means, only autho-
rised users are capable of accessing the in- A. RSA
formation. B. DSA
A. Confidentiality C. ECC
B. Integrity D. 3DES
C. Non-repudiation
298. Which of the following is NOT a malicious
D. Availability
SQL statement?
293. What type of self-replicating program A. SELECT * FROM table users
copies to other computers on a network WHERE user id= 1
without any user intervention and con-
B. SELECT * FROM table users
sumes bandwith and computer resources?
WHERE user id= 16 OR 1=1
A. Virus
C. SELECT * FROM table users
B. Trojan Horse WHERE user id= 15 AND user
C. Worm id=10

D. backdoor D. none of above

294. Cryptography means 299. What is an antivirus


A. Encrypt algorithm A. a medicine
B. Decrypt algorithm B. what helps prevent viruses
C. Plaintext into ciphers text C. what helps prevent worms
D. none of above D. a computer pal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 544

300. The company that you work for wants 305. A secure way to transfer file to a remote
to set up a secure network, but they do server is by using
not have any servers. Which three secu- A. FTP over SSH
rity methods require the use of a server?
(Choose three.) B. FTP

A. 802.1x C. FTPS

B. WPA2 Personal D. SFTP

NARAYAN CHANGDER
C. WPA2 Enterprise 306. What is the core of an OS called?
D. RADIUS A. Shell
E. 802.11ac B. User
C. Kernel
301. Which of the following firewall types in-
spects Ethernet traffic at the MOST levels D. Commands
of the OSI model?
307. Which of the following is the most accu-
A. Packet Filter Firewall rate definition of a Trojan?
B. Stateful Firewall A. A stand-alone program that replicates,
C. Proxy Firewall doing damage to a system
D. Application Firewall B. Malicious code that spreads from de-
vice to device but does not need to attach
302. What port number is DNS (Domain Name itself to a program in order to do so
System)? C. A program that pretends to be safe,
A. udp/tcp 53 while actually containing malicious code
B. tcp 21 D. software that installs itself onto de-
C. udp 21 vices and then steals personal informa-
tion about the user, like passwords,
D. udp/tcp 427
308. What is chipper text
303. Events or attacks that remove, corrupt,
A. Encryption data
deny access to, allow access to, or steal
information. B. Encrypted data
A. Malicious Threats C. Data Decrypt
B. Accidental Threats D. none of above
C. Data Security Attacks 309. You are unable to log on to your e-
D. Physical Security Attacks mail account. You realize that someone
has changed the password without your
304. The shift cipher is sometimes referred to knowledge. Which one of the following
as the terms describes this activity?
A. Caesar cipher A. Online predating
B. Shift cipher B. Theft
C. cipher C. Internet scam
D. cipher text D. Spyware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 545

310. A way of protecting a computer from in- 315. Which of the following types of traffic
trusion through the ports are carried by the Remote Desktop Proto-
col (RDP)? (Choose all that apply.)

PRACTICE BOOK» NOT FOR SALE


A. Firewall
B. Antivirus A. Keystrokes
C. Data Encryption B. Mouse movements
D. none of above C. Display information

311. Raya is working on her university appli- D. Application data


cations online, when the admissions web-
316. You just read an article about an inter-
site crashes. She is unable to turn in her
net worm recently causing problems.what
application on time.
type of software should you install to pro-
A. C tect yourself from this worm?
B. I A. software firewall
C. A B. antispyware
D. None of the above C. antivirus
312. Data integrity gets compromised when D. antispam
and are taken control off.
317. What is the most secure method of au-
A. Access control, file deletion
thentication and authorization in its de-
B. Network, file permission fault form?
C. Access control, file permission A. TACACS
D. Network, system B. Kerberos
313. Which of the following cannot be used in C. RADIUS
authentication
D. LDAP
A. Something you know
B. Something you have 318. An asymmetric-key (or public-key) cipher
uses
C. Something you had
A. 1 Key
D. Something you are
B. 2 Key
314. Which one of these four groups are NOT
C. 3 Key
part of the McCumber Cube
D. 4 Key
A. Desired Goals:Confidentiality, In-
tegrity, Availability 319. An intranet is behind a network device,
B. States of Information:Storage, Trans- which gives some protection against hack-
mission, Procession ers. Which is the network device?
C. Data Workers:Data Owners, Data Cus- A. Proxy server
todians, Data Users
B. VPN
D. Counter-measures:Technology, Policy
C. Firewall
& Practice, and Awareness, Training & Ed-
ucation D. None of the three

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 546

320. Which one is an example of ‘physical se- 325. What type of attack tries to guess pass-
curity’? words by every combination of charac-
A. firewall ters?

B. spam filter A. dictionary attack


B. brute-force attack
C. locked door
C. man-in-the-middle attack
D. Anti-virus software
D. smurf attack

NARAYAN CHANGDER
321. How can a network administrator make
an SSID harder to find? 326. All firewalls contain this feature
A. Encrypt the SSID A. Packet filtering

B. Hide the SSID from public broadcast B. Intrusion prevention

C. Utilize a wifi encryption protocol that C. Stateful inspection


does not use SSIDs D. Deep packet inspection
D. none of above 327. What is the software called that stops
malicious code from entering the net-
322. Which system can take action by prevent-
work?
ing an intrusion once it is discovered?
A. Anti virus scanner
A. IDS
B. Code blaster
B. IPS
C. Firewall
C. Firewall
D. Waterwell
D. none of above
328. Computer virus is a
323. Which of the following people should
A. disease
you share your password with when they
ask? B. set of computer instructions or code
A. Network managers C. type of bacteria
B. Call centre workers D. hardware component
C. Security experts 329. Network forensics primarily involves
D. Company managers A. Examination of computers
E. Nobody B. The examination of data sent across a
network
324. A small file on a computer that is created
C. Examination of phones
when a user visits a Web site. A Web site
uses cookies to identify users who visit D. The examination of computer data
the site, and also track the preferences of
330. What is the best password policy?
the users.
A. Always write the same passwords in
A. cache memory
every link
B. active content B. Your name, personal details
C. firewall C. Have random password which you
D. cookie can’t remember

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 547

D. Never use remember password and 335. Secretly monitors users actions (e.g. but-
keep complex passwords you can remem- tons pressed)-info is sent on to a hacker.
ber

PRACTICE BOOK» NOT FOR SALE


A. Scareware
331. IT security recently found a program on B. Ransomware
your co-worker’s computer that appar-
C. Spyware
ently tracked all of the words that they
typed into the computer. what kind of mal- D. Trojan
ware is this?
336. Which type of firewall works in layer 5
A. Keylogger of the OSI model?
B. keyblogger A. Stateless Firewall
C. trojan horse B. Port Security
D. keystroke virus C. Stateful Firewall
332. You were browsing the web on a ques- D. None of the above
tionable website, and now you get a pop-
up window stating that if you do not pay 337. This was introduced by the U.S Commit-
$100 within one hour, all files on your tee on National Security Systems in 1991
computer will be destroyed.what is this an because it thought the CIA triad was too
example of? weak

A. heistware A. CIA cube

B. theftware B. McCumber Cube


C. extortionware C. CIA quadrilateral
D. Ransomware D. McCumber Elite Four

333. Which of the following are examples of 338. Which of these is an indicator that the
out-of-band device management? (Choose website is secure.
all that apply.) A. Bruce Lee photo
A. Logging on remotely from a network B. The http://
workstation
C. The https://
B. Plugging a laptop into a console port
D. The https:
C. Establishing a point-to-point modem
connection
D. Connecting dedicated ports on each 339. Which network security device grants ac-
device to a separate switch cess to a network, determines what ac-
tions they can perform, and logs activi-
334. The is a number or a set of numbers ties?
on which the cipher operates. A. Firewall
A. secret B. Virtual Private Network (VPN)
B. cipher C. Intrusion Prevention System (IPS)
C. key D. Authorization, Authentication, Ac-
D. none of the mentioned counting (AAA)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 548

340. Many managed switches and routers in- 344. helps to manage the security of Vir-
clude a console port for administrative ac- tual Machines by grouping them according
cess, to which you can connect a laptop and the applications that runs on them.
run a terminal program to access the de- A. Network Security Groups
vice’s interface. Which of the following is
the best term for this type of access to the B. Service end points
device? C. Private end points
A. Out-of-band D. Application Security Groups

NARAYAN CHANGDER
B. In-band 345. What is the function of a firewall?
C. Client-to-site A. Filters email that is sent by attacker
D. BYOD B. Prevents malware and hackers from
accessing a system
341. When the data transmissions are inter-
cepted and recorded by an attacker, then C. Blocks unauthorised access in to and
replayed to gain access. This attack is out of a network
called: D. All of the above
A. Man-in-the-Middle 346. Malware
B. Replay A. Are different types of threats to com-
C. SYN Flood puter systems.
D. Spoofing B. Is a manufacturer of computer parts
C. Hard to find on the internet
342. The network security executive has been
given the additional duty of testing the D. Distribution is completely legal.
servers. Which principle does this dis- 347. A computer monitoring packets entering
obey? and leaving a local area network
A. Separation of Duties A. firewall
B. Least Privileges B. virus
C. Single Sign On C. worms
D. Economy D. none of above

343. How many of the following methods 348. The FOUR organizational goals of an in-
could be used to distribute a virus? formation security program
(choose as many as you think are appro- A. Protect the functionality of the organi-
priate) zation
A. Via an attachment sent in an on- B. Enable the safe operation of applica-
line/instant message tions
B. Through files on a memory stick / CD C. Protecting the data collected and used
C. Through a link in an email D. Authenticating the users accessing
D. Through a program downloaded from data
the internet E. Safeguarding technology assets

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 549

349. An enhanced encryption protocol combin- 353. A subject’s ability to use, manipulate, or
ing a 104-bit key and a 24-bit initializa- modify and affect another subject or obect
tion vector

PRACTICE BOOK» NOT FOR SALE


A. Asset
A. WEP 128 B. Control
B. WEP 64
C. Access
C. WPA
D. none of above
D. none of above
354. Which protocol or service can be config-
350. Ralph has come upon the term virtual ured to send unsolicited messages to alert
desktop, and he is not exactly sure what the network administrator about a net-
it means. After performing some Inter- work event such as an extremely high CPU
net searches, he finds multiple definitions. utilization on a router?
Which of the following is not one of the
A. Syslog
technologies that uses the term virtual
desktop? B. SNMP
A. A three-dimensional realization of a C. NTP
computer display created using a virtual D. Netflow
reality hardware device
B. A computer display with a virtual oper- 355. Sending requests to a single server using
ating system desktop that is larger than hijacked machines is called
can be displayed on a monitor A. Phishing
C. A cloud-based Windows 10 deploy- B. DDOS
ment that enables users to access their
C. Worm
desktops using any remote device
D. Virus
D. A hardware device that projects a com-
puter desktop on a screen, rather than dis- 356. An improved version of WEP
playing it on a monitor
A. LEAP
351. Used to describe how a company ad- B. No Security
dresses security issues.
C. WPA
A. Security Policy
D. none of above
B. Security Threats
C. Security Attacks 357. Which are examples of social engineering
D. Antivirus Software A. Phishing
B. Disguising yourself as an employee to
352. Which of the following is FALSE about gain access to computer systems
worms?
C. Sending an email with a virus you cre-
A. It is a malware. ated attached to it
B. It replicates itself. D. Using brute force to access a system
C. It spreads through networks. E. Calling someone pretending to be IT
D. It gets attached to other programs. support to steal confidential data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 550

358. A attack is when a webserver is B. Need to attach to a program


flooded with application layer web re- C. A type of social engineering
quests.
D. Designed to access a computer by mis-
A. SYN flood leading users of its’ intent by prompting to
B. Ping flood download a program
C. HTTP flood 364. Complete this sentence:A testing method
D. None of the above to analyse a computer system or network

NARAYAN CHANGDER
for possible vulnerabilities is called
359. AES stands for
A. Penetration testing
A. Advanced Encryption Standard
B. Network forensics
B. Additional Entry Services
C. Network policies
C. Adopted Enhanced Server
D. Encryption
D. none of above
365. Sending requests to a single server using
360. The DHCP snooping configuration does hijacked machines is called
not include building the DHCP Snooping
Binding Database. A. Phishin

A. True B. DDOS

B. False C. Worm

C. Kadalasan True D. Virus

D. Minsan False 366. Rate the password:03041996

361. HTTPS can be based on which types of A. Weak


Encryption Protocol? B. Moderate
A. Secure Sockets Layer (SSL) C. Strong
B. Transport Layer Security (TLS) D. none of above
C. Network Address Translation (NAT) 367. What method of network security uses
D. System Transport Security (STS) CCTV cameras, Door locks and Staff Pass
Cards?
362. What technique can be used for mitigat-
ing VLAN attacks? (CHOOSE 3) A. Access Control

A. Set the native VLAN to an unused VLAN B. Firewall

B. Use private VLANs C. Physical Security

C. Enable trunking manually D. Anti-Malware

D. Enable Source Guard 368. It disguises as useful software.


E. Disable DTP A. Worm

363. What would I use to set a breakpoint? B. Virus


(1-3) C. Trojan Horse
A. Do not need to attach to a program D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 551

369. The term ‘intranet’ comes from the C. a lock that can be used to lock a mes-
phrase sage in a lock box

PRACTICE BOOK» NOT FOR SALE


A. International Restricted Network D. any puzzle, such as a crossword or Su-
B. Internally Restricted New Network doku puzzle

C. Internal Restricted Access Network 375. The security policies in a manufacturing


D. None of the above company prohibit the transmission of cus-
tomer information. However, a security
370. It is unsolicited email that can be used to administrator has received an alert that
send harmful links or deceptive content. credit card numbers were transmitted as
A. Spam an email attachment. Which of the follow-
ing MOST accurately describes the source
B. Popups of this alert message?
C. Denial of Service (DoS)
A. IPS
D. SYN Flood
B. DLP
371. This helps in identifying the origin of in- C. SMTP
formation and authentic user. This re-
ferred to here as D. IPsec

A. Confidentiality 376. Which of the following is false about IDS


B. Integrity A. It is passive
C. Authenticity B. It can be host based
D. Availability C. It can be prevent attack
372. What should you do with a phishing D. It adds processing overhead
email?
377. Zainab has taken her IELTS exam and is
A. Delete it
waiting to get her results by email. By ac-
B. Contact your bank immediately cident, Zainab’s results are sent to Alaya
C. Click the links just to be sure A. C
D. Reply and ask them to stop spamming B. I
you
C. A
373. When does network forensic happen? D. None of the above
A. During a attack
378. A script kiddie is a person who uses
B. Before an attack
existing computer scripts or codes to hack
C. After an attack into computers, lacking the expertise to
D. Well before an attack write their own code.
A. Black hat hackers
374. A cipher is
B. White hat hackers
A. a person who makes up secret codes
C. script kiddie
B. an algorithm that is used to scramble
text so that it can be passed in secret D. Grey hat hackers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 552

379. Which of the following security threats data packet for protection. Split tunnel-
includes suspicious activity, such as re- ing is a variation of this method that pro-
viewing someone’s screen display without vides which of the following advantages?
permission? (Choose all that apply.)
A. Malware A. Conservation of VPN bandwidth
B. Shoulder surfing B. Access to local network devices while
C. Phishing connected to the VPN

NARAYAN CHANGDER
D. Password cracking C. Additional data integrity protection
D. Faster data transmission through mul-
380. Physical security: tiplexing
A. The protection of the physical items
or areas of an organization from unautho- 384. Which of the following is the most accu-
rized access and misuse rate definition of a virus?

B. The protection of the details of partic- A. A stand-alone program that replicates,


ular operation or series of activities doing damage to a system
C. The protection of an organization’s B. Malicious code that spreads from de-
communication’s media, technology, and vice to device but does not need to attach
content itself to a program in order to do so
D. none of above C. A program that pretends to be safe,
while actually containing malicious code
381. The protection of networking compo-
D. software that installs itself onto de-
nents, connections, and contents is:
vices and then steals personal informa-
A. Network Security tion about the user, like passwords,
B. Access
385. There was a concern from the senior man-
C. Asset agement that company employees were
D. Operational Security wasting too much time on entertainment
websites instead of focusing on their work.
382. ensures the integrity and security of The senior management requested IT to en-
data that are passing over a network able web content filtering. What should
the IT team consider before enabling DPI?
A. Firewall (select all that apply)
B. Antivirus A. Potential of high hardware utilization,
C. IDS test to see if it will impact network perfor-
mance
D. Network Security Protocol
B. If the NGFW supports SSL inspection
383. Virtual Private Networks (VPNs) use to filter HTTPS requests
tunneling, which is the process of encapsu-
C. If their ISP supports the routing of
lating a data packet within another packet
packets that have been previously altered
for transmission over a network connec-
by the NGFW
tion, typically using the Internet. The
system encrypts the entire encapsulated D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 553

386. Which types of firewalls can block a con- 391. In intrusion detection system vernacular,
nection based on application type? which account is responsible for setting the
security policy for an organization?

PRACTICE BOOK» NOT FOR SALE


A. Packet filter
B. Next-generation firewall (NGFW) A. Supervisor

C. Transport layer B. Administrator


D. Second generation stateful C. Root

387. Which one of the following can be consid- D. Director


ered to be a hardware firewall?
392. is one method of thwarting DoS at-
A. Router tacks by dropping all IP packets from an
B. Hub attacker.
C. Bridge A. Black holing
D. Switch B. ICMP echo

388. SSH was created to be an improvement C. P2P redirect


on the Telnet terminal emulation program. D. None of the above
In which of the following ways is it an im-
provement? 393. Which of these is a network policy?
A. SSH is faster than Telnet. A. Phishing
B. SSH provides graphical terminal emu-
B. Virus
lation.
C. SSH encrypts passwords and data. C. Data Theft

D. SSH is less expensive than Telnet. D. Acceptable Use Policy

389. What protocol is used with L2TP to pro- 394. An attacker controlling bots in a coordi-
vide encryption? nated attack against a victim is known as
a
A. IPSec
B. MPPE A. DoS attack

C. HTTPS B. DDoS attack


D. MSC-CHAP C. ICMP

390. Pete, a security administrator, has ob- D. None of the above


served repeated attempts to break into
395. If you were to use a caeser cipher with a
the network. Which of the following is
key of 3 shifts to the left, how would you
designed to stop an intrusion on the net-
encrypt the word:Cipher?
work?
A. NIPS A. ZAMEBO

B. HIDS B. ZOMEBO
C. HIPS C. ZFMEBO
D. NIDS D. ZFMEBA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 554

396. In regards to network security, 401. An attack has happened. What should
means preventing unauthorized users you do?
from gaining information about the net-
A. Pay for network forensics
work structure, data flowing across the
network, network protocols used, or B. Prevent it from happening by doing a
packet header values. penetration test
A. confidentiality C. Panic and tell you mam and dad
B. integrity D. Ring parents to let them know that

NARAYAN CHANGDER
C. availability data has been stolen
D. authentication 402. Asymmetric key is
397. What are cons of using a signature-based A. Sender use one key
malware detection versus heuristic? (se-
B. Receiver use same key
lect all that apply)
C. Both use different key
A. Many attacks do not conform to spe-
cific signatures D. none of above
B. Signatures require more system re-
403. What does an EULA do
sources than heuristic learning
C. There are more false positives A. Specifies the terms on how we can use
software
D. Signatures must be updated often
B. Forces us to buy software from partic-
398. which of the following are consider phys- ular vendors
ical security risks?
C. Explains what bugs might be in the pro-
A. Hardware theft gram
B. password cracking D. Explains who we need to contact if we
C. phishing have a problem
D. cooking 404. Which of these is the best definition of
399. Name all the computer viruses Pharming?
A. Trojan horse A. Calling someone to create an invented
situation that increases the chance they
B. logic bomb
will share sensitive information with you.
C. McAfee
B. Sending an email that pretends to be
D. redlof from a reputable company which usually
has a link to click that takes you to a web-
400. Worms
site that looks real but is not.
A. Do not need to attach to a program
C. A cyber attack that redirects a user
B. Need to attach to a program from a real URL to a website that looks
C. A type of social engineering real but is not.
D. Designed to access a computer by mis- D. Looking at someone entering their per-
leading users of its’ intent by prompting to sonal data into a system and copying what
download a program you see.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 555

405. An example of is not revealing the type C. To find out card details
of computer, operating system, software, D. All of the above
and network connection a computer uses.

PRACTICE BOOK» NOT FOR SALE


A. Obscurity 410. CIA Triad is composed of?
B. Limiting A. Confidentiality

C. Diversity B. Control

D. Layering C. Availability
D. Non-reputation
406. Events or attacks that steal, damage, or
destroy equipments. E. Integrity

A. Malicious Threats 411. Another name of computer anti virus is


B. Accidental Threats A. vaccine
C. Data Security Threats B. worm
D. Physical Security Threats C. worm

407. What is the function of a proxy server? D. DES

A. Ensures that only safe websites are 412. What type of device is used to detect ma-
visited. licious network activities and reports only
B. Access to certain websites are those issues to the administrator?
blocked. A. NIDS
C. Hides the IP address of user B. NIPS
D. All of the above C. Internet content filter

408. Which word doesn’t fit its defintion D. NAT server

A. Asset:The organizational resource 413. Which of the following components of an


that is being protected. all-in-one security appliance would MOST
likely be configured in order to restrict
B. Exploit:A technique used to compro-
access to peer-to-peer file sharing web-
mise a system
sites?
C. Loss:A single instance of an informa-
A. Spam filter
tion asset suffering damage, unintended
or unauthorized modification, or disclo- B. URL filter
sure C. Content inspection
D. Exposure:Leaving hardware or soft- D. Malware inspection
ware out to be accessed by authenticated
and integral users 414. What type of firewall is also known as a
proxy server?
409. How do hackers use viruses? (pick the
BEST answer) A. application-level

A. To make a computer unusable B. circuit-filtering

B. To get someone’s personal informa- C. packet-filtering


tion D. stateful

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 556

415. Packet filters, circuit-level gateways, 420. Which of these rules is NOT a good guide-
and application-level gateways are all line for managing passwords?
types of A. Do not use a previous password
A. Proxy servers B. Do not use a password with identifi-
B. Firewalls able items (such as phone number)
C. Tokens C. Make the password as long as possi-
ble
D. Application layers

NARAYAN CHANGDER
D. Ensure that it includes a mix of charac-
416. Which of the following is a best practice ter types
when securing a switch from physical ac-
421. What method of network security uses
cess?
passwords, user names and authentica-
A. Disable unnecessary accounts tion?
B. Print baseline configurations A. Access Control
C. Enable access lists B. Firewall
D. Disable unused ports C. Physical Security
D. Anti-Malware
417. A set of instructions secretly incorpo-
rated into a program so that if a particular 422. A virus has been detected on a device con-
condition is satisfied they will be carried nected to a network. What SHOULD be
out, usually with harmful effects. done first?
A. Trojan Horse A. Run a virus scan on all shared areas
B. Logic Bomb B. Disconnect the device from the net-
C. Birthday Attack work
C. Contact the user to let them know what
D. Worm
has happened
418. What device is used to protect one net- D. Update the anti-virus software
work from another by using filtering pack-
ets? 423. The weakest point in a security system,
is usually:
A. DMZ
A. Poorly coded software
B. firewall
B. People
C. proxy server
C. Unreliable hardware
D. layers
D. Poor network connections
419. Type of malware that hides within or 424. Which of the following devices would de-
looks like a legitimate program and does tect but not react to suspicious behavior on
not replicate itself. the network?
A. virus A. NIPS
B. trojan horse B. Firewall
C. rootkit C. NIDS
D. worm D. HIDS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 557

425. What technology used in firewalls keeps A. Implement a virtual firewall


tracks of conversations so that it knows B. Install HIPS on each VM
what to allow back into a network?

PRACTICE BOOK» NOT FOR SALE


C. Virtual switches with VLANs
A. stateless packet inspection
D. Develop a patch management guide
B. stateful packet inspection
430. The process of converting data into an un-
C. NAT filtering readable and unusable form. Encryption
D. application-level gateway is done to prevent unauthorized access of
data, especially during data transmission
426. An SQL injection attack would cause unau- over the Internet.
thorised access to
A. encryption
A. Files
B. decryption
B. Entire Computer
C. cookie
C. Databases D. backup
D. Some Files
431. Computer virus program is usually hidden
427. You want to make your network as se- in a
cure as possible. What should you do? A. operating system
A. Get a company to perform a network B. application program
forensics. Find out how the attack hap- C. disk driver
pened
D. virus infection
B. Let nobody use the system
432. Which of the following types of traffic
C. Get a company to perform a penetra-
are transmitted by Virtual Network Com-
tion test
puting (VNC)? (Choose all that apply.)
D. Pay a fortune for all types of firewall
A. Keystrokes
and virus scanner
B. Mouse movements
428. Complete the sentence. A packet filter C. Display information
firewall controls network traffic based on
D. Application data
A. application behaviour or characteris-
tics. 433. unsolicited electronic message sent for
marketing purposes are called
B. filtering layers 2-7 of the OSI model.
A. virus
C. the behaviour of the network connec-
tions B. URL
C. spam
D. network addresses, protocols, and
ports. D. unzip

429. A technician is deploying virtual machines 434. An active directory setting restricts
for multiple customers on a single physi- querying to only secure connections.
cal host to reduce power consumption in a Which of the following ports should be
data center. Which of the following should selected to establish a successful connec-
be recommended to isolate the VMs from tion?
one another? A. 389

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 558

B. 440 440. Which of these apply to the student


C. 636 shared drive

D. 3286 A. an example of a policy that restricts


our ability to save, but allows us to read
435. Defines how a system can be secured B. an example of a policy that allows us
through specific rules or requirements to to save but not to see files
A. Network forensics C. an example of a policy that restricts

NARAYAN CHANGDER
B. Anti malware software our ability to read and save
C. Packet sniffing D. none of above
D. Network Policies 441. Whats the strongest password
436. It helps keep data and equipment safe by A. bunnies123
giving only the appropriate people access. B. dave23
A. network security C. SGFY12? ? !
B. firewall D. starcube
C. antivirus 442. Which of the following statements is
D. security threats FALSE?

437. What can we use to protect our computer A. TLS is a successor of SSL.
from hackers B. TLS uses two layers of protocols.
A. fire wall C. SSL requires additional computer time
B. a picture which says “stay away” when compared to TLS.

C. Using a non approved VPN D. TLS implements authentication, en-


cryption and data integrity.
D. all of the above
443. A network of computers infected with
438. In which of the following attacks, an e- malicious software and controlled as part
mail recipient is mislead to a bogus web- of a group without the owners’ knowl-
site? edge
A. Phishing A. Virus
B. Hacking B. Stuxnet
C. Brute force attack C. Ring
D. SQL injection D. Botnet
439. This attack stops legitimate users from 444. Which type of firewall looks at the con-
accessing a system, by overloading it with nection between machines rather than the
traffic actual packets?
A. Website closure A. Stateful Firewall
B. Server soaking B. Application Firewll
C. Traffic swamping C. Circuit-Level Firewall
D. Denial of service D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 559

445. Which of these is the best definition of 449. Uses a number of computers over a net-
Shoulder Surfing? work of infected machines which send req
uests to a website which would bring it

PRACTICE BOOK» NOT FOR SALE


A. Calling someone to create an invented
situation that increases the chance they offline
will share sensitive information with you. A. SQL
B. Sending an email that pretends to be B. DoS
from a reputable company which usually C. WLAN
has a link to click that takes you to a web-
site that looks real but is not. D. USB

C. A cyber attack that redirects a user 450. S/MIME is abbreviated as


from a real URL to a website that looks A. Secure/Multimedia Internet Mailing
real but is not. Extensions
D. Looking at someone entering their per- B. Secure/Multipurpose Internet Mail Ex-
sonal data into a system and copying what tensions
you see.
C. Secure/Multimedia Internet Mail Ex-
446. Which network security device will filter tensions
traffic coming into or out of a network by D. Secure/Multipurpose Internet Mail Ex-
protocol or IP address? tensions
A. Virtual Private Network (VPN)
451. What is a firewall?
B. Firewall A. A wall that is on fire
C. Intrusion Prevention System (IPS) B. What protects apps when a virus
D. Authentication Authorization, Account- comes
ing (AAA) C. Helps prevent unauthorised access
447. An attacker tries as many possible combi- D. A protective app
nations of username and password to gain
452. Passwords for my accounts (e.g. com-
access to a web server. What is this called
puter, e-mail service social, online, user
as?
pages) are usually:
A. Denial of service attack
A. long, consist of lowercase and up-
B. Data interception and theft percase letters a also numbers and
C. Phishing charactersnon-alphanumeric or long-
phrases I’m using a different password
D. Brute force attack for every account
448. For a project, Bill uses content from a B. medium length and medium complex, I
Web site but forgets to state the source. use several passwords for many accounts
Which of the following has he done C. short and simple (same as login, date
A. Plagiarism of birth, middle name, animal name, sim-
ple combination of numbers) I use the
B. Libel
same password for many accounts, I let
C. Gambling them remember
D. Defamation D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 560

453. DoS attacks can cause harm by to dial through a local ISP to connect to
the company server using L2TP and IPsec.
A. stopping a critical service
B. slowly degrading services over a pe- 455. Which of these is the best definition of
riod of time Phishing?
C. Both A and B A. Calling someone to create an invented
situation that increases the chance they
D. Neither A nor B will share sensitive information with you.

NARAYAN CHANGDER
454. Your company has two users who want B. Sending an email that pretends to be
to telecommute from home. They do not from a reputable company which usually
have any hardware or software config- has a link to click that takes you to a web-
ured or installed. They need to transfer site that looks real but is not.
files to the corporate network over a se- C. A cyber attack that redirects a user
cure link. Your company has a Virtual from a real URL to a website that looks
Private Network (VPN) concentrator that real but is not.
uses Layer 2 Tunneling Protocol (L2TP) and
Internet Protocol Security (IPSec). The D. Looking at someone entering their per-
users want to implement the fastest avail- sonal data into a system and copying what
able service. Both of the users’ homes you see.
are within 10, 000 feet of a central office.
456. Which firewall generation can you config-
Which of the following solutions address
ure to allow a user to connect to Facebook,
this scenario? (Choose all that apply.)
but not watch videos from that site?
A. Each user should install a modem and A. Next-generation firewall (NGFW)
VPN client software, and configure it
to dial through a local Internet Service B. Stateful firewall
Provider (ISP) to connect to the company C. Dynamic packet firewall
server using L2TP and IPSec.
D. Packet filter firewall
B. Each user should establish a Digital
Subscriber Line (DSL) connection by either 457. How can a network administrator restrict
ordering a new line or using the existing which devices are allowed onto a wifi net-
line. Each user then needs to install VPN work to only a specified list of devices?
client software and configure it to con- A. IP spoofing
nect to the company server using L2TP
and IPsec. B. MAC address filtering

C. Each user should establish a cable C. DNS spoofing


television (CATV) connection with a local D. none of above
broadband ISP. Each user then needs to
install VPN client software and configure 458. A brute force attack:
it to connect to the company server using A. Uses response filtering
L2TP and IPSec.
B. Tries all possible password variations
D. Each user should install an Integrated
Services Digital Network (ISDN) line in his C. Uses the strongest possible algo-
or her house. Each user then needs to in- rithms
stall VPN client software and configure it D. Targets all the ports

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 561

459. Communications Security: 463. An encryption algorithm transforms plain


text into:
A. The protection of the details of a par-

PRACTICE BOOK» NOT FOR SALE


ticular operation or series of activities A. Cipher text
B. The protection of an organization’s B. Simple Text
communication media, technology, and C. Empty Text
content D. Plain Text
C. The protection of the physical items
464. When I see banners advertising or links,
or areas of an organization from unautho-
which encourage to use of promotions, spe-
rized access and misuse
cial offers, competitionwhether receiving
D. none of above the prize:
A. I click on the most interesting ones,
460. What is blagging?
without thinking if that safe
A. A type of attack in which a malicious B. sometimes I click, but I don’t always
code is installed on the user’s computer think if that safe
or the web server that he accesses with-
out his knowledge. C. I’m avoiding them, unless that I see
that advertisement is associated with
B. An attack wherein the passwords or trusted institution
pin numbers of a user is obtained by the
D. none of above
attacker just by observing him.
C. A type of attack in which attacker cre- 465. Another name of free computer software
ates a situation in which the user shares is
confidential information of performs ac- A. encrypted software
tions that turns out favourable for the at- B. copy protected software
tacker.
C. public domain software
D. none of above
D. shareware
461. Disguised as legitimate software. Users 466. Which type of system detects unautho-
install them without realising they have a rized intruders and then takes action to
hidden purpose. stop them from proceeding?
A. Virus A. IDS
B. Worm B. IPS
C. Trojan C. VLAN
D. none of above D. NAT
467. What method of network security is used
462. Which of these is not intellectual prop-
to detect and remove viruses, trojans and
erty?
spyware?
A. Symbols A. Access Control
B. Art B. Firewall
C. Logos C. Physical Security
D. models D. Anti-Malware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 562

468. Data travels across networks in B. Worm


A. Nibbles C. Trojan
B. Parts D. none of above
C. Bytes
474. The art and science of breaking the cipher
D. Packets text is known as
469. What is commonly found in a UTM fire- A. Cryptanalysis

NARAYAN CHANGDER
wall?
B. Cryptography
A. Intrusion detection or prevention
C. Staganography
B. Packet filtering
D. Watermarking
C. Access control
D. All of the above 475. Which DMZ configuration uses one fire-
wall with three interfaces?
470. Identifies and exploits vulnerabilities in a
A. back-to-back configuration
system.
A. Vulnerability testing B. three-leg perimeter configuration

B. Intrusion prevention system C. basic configuration


C. Host intrusion detection system D. perimeter configuration
(HIDS)
476. In regards to network security, is the
D. Penetration testing policy-driven control of access to systems,
471. Pete, the system administrator, wants to data, and dialogues.
restrict access to advertisements, games, A. confidentiality
and gambling web sites. Which of the fol-
B. integrity
lowing devices would BEST achieve this
goal? C. availability
A. Firewall D. access control
B. Switch
477. It is the skillful handling, controlling or
C. URL Content Filter using of something or someone.
D. Spam Filter A. manipulation
472. What port does PPTP use? B. Hacking
A. 42 C. Impersonation
B. 80 D. Penetration testing
C. 666
478. What does SQL stand for?
D. 1723
A. Switch Queue List
473. Attach themselves to certain files. Users
B. Standard Queue List
spread these files by copying them and ac-
tivate viruses by opening infected files C. Standard Query Language
A. Virus D. Structured Query Language

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 563

479. What does DDOS stand for? C. reused


A. Digital Denial of Service D. transformed

PRACTICE BOOK» NOT FOR SALE


B. Distributed Denial of Service
485. It is the practice of testing a computer
C. Drone Denial of Service system, network or Web application to
D. Damage Denial of Service find vulnerabilities that an attacker could
exploit.
480. Rate the password:MGl2s & h@LT
A. Eavesdropping
A. Weak
B. Hacking
B. Moderate
C. Impersonation
C. Strong
D. Penetration testing
D. none of above
486. A physical or logical subnet that sepa-
481. a program that can detect and remove
rates an internal local area network (LAN)
viruses from computer is called
from other untrusted networks, usually
A. a virus the internet.
B. a worm A. MTPOD
C. an anti-virus B. VLAN
D. groupware C. VPN
482. Which of these is not a type of Windows D. DMZ
file system?
487. When an employee intends to cause dam-
A. FAT32
age
B. BtrFS
A. Malicious Threats
C. NTFS
B. Accidental Threats
D. FAT16
C. Data Security Attacks
483. Encrypt “cryptosystem” with key 7 us- D. Physical Security Attacks
ing Shift Cipher
A. jygwhvjfkalt 488. Which of the following statements ex-
plains why web browsing over a client-to-
B. jyfuarzfzopt
site Virtual Private Network (VPN) con-
C. jyfwavzfzalt nection is usually so much slower than
D. jyfwaerfzret browsing locally?
A. The browser application is running on
484. Many of the network correction scheme
the VPN server.
sections used in IPv4 were in the
new version IPv6, since newer telecommu- B. The browser is using the remote net-
nication technologies removed these con- work’s Internet connection.
straints. C. The VPN tunnel restricts the amount of
A. structured bandwidth available.
B. eliminated D. VPN encryption is processor intensive.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 564

489. Pete, the system administrator, wishes D. Will often create a botnet to increase
to monitor and limit users’ access to ex- the amount of traffic being created
ternal websites. Which of the following E. Will allow you to steal someone’s web-
would BEST address this? site and use it for yourself
A. Block all traffic in port 80
494. Self replicate without any user help
B. Implement IDS meaning they can spread very quickly.
C. User server load balancers A. Virus

NARAYAN CHANGDER
D. Install a proxy server
B. Worm
490. What server can be used to install Win- C. Trojan
dows updates for your organization?
D. none of above
A. SCOM
495. Complete this sentence:A malware that
B. WSUS
deactivates an anti-virus software is
C. IIS
A. Spyware
D. WDS
B. Rootkits
491. What type of malware can record the C. Trojan horses
keys that you type at the keyboard and
sends them to a 3rd party? D. Back door

A. Virus 496. A type of attack that randomly opens TCP


B. Trojan ports at the source of the attack and ties
up the computer with a large amount of
C. Worm false SYN requests.
D. Ransomware A. Denial of Service (DoS)
E. Spyware (Key Logger) B. Distributed DoS (DDoS)
492. What is it called when someone is trying C. SYN Flood
every combination of letters, numbers and
D. Spoofing
symbols in order to crack a password
A. Malware 497. What must a user need to decrypt a file?
B. Social Engineering A. Coin
C. Phishing B. Key
D. Brute Force Attack C. Token

493. Which apply to a DDOS attack? D. Graph

A. an attempt to make an online service 498. A security administrator is tasked with


unavailable by overwhelming it with traf- ensuring that all devices have updated
fic from multiple sources virus definition files before they are al-
B. a way to hack into a network so you lowed to access network resources. Which
can run SQL code of the following technologies would be
used to accomplish this goal?
C. A method used by hackers to track
what users enter on their keyboard to A. NIDS
steal personal information and passwords B. NAC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 565

C. DLP C. from a distance I control whether no-


D. Port Security body approaches computer

PRACTICE BOOK» NOT FOR SALE


D. none of above
499. The original creators of the IP and TCP
protocols did not include in the makeup 504. is a diagnostic software that can ex-
of the version four (IPv4) IP address de- amine and display data packets that are
sign scheme. being transmitted over a network
A. framing A. Operating system
B. multiplexing B. Protocol analyzer
C. security constructions C. Sniffer
D. profiling D. Task manager

500. Which type of attack involves an ad- 505. What stage is the World Wide Web in?
versary attempting to gather information
A. 1.0
about a network to identify vulnerabili-
ties? B. 1.1
A. Reconnaissance attack C. 2.0
B. Man-In-the-middle attack D. 3.0
C. Eavesdropping attack 506. Tick all examples of Monoaplhabetic Ci-
D. Routing attack phers:
A. Caesar Cipher
501. If the same key is used to encrypt and
decrypt a message, this is known as? B. Vigenere Cipher
A. Symmetric encryption C. Keypad Cipher
B. Encryption doesn’t exist! D. Morse Code Cipher
C. Asymmetric encryption 507. Question 22:A user gaining access to a
D. Same-key encryption system or intercepting user data with-
out permission would be breaching which
502. Encrypt “attack” with “fall” using Play- law?
fair Cipher
A. Data Protection Act
A. BRRBER
B. Regulation of Investigatory Powers
B. BERBFP Act (RIPA)
C. BRFFFP C. Investigatory Powers Act
D. BRRBFP D. Computer Misuse Act
503. When I log in one of the mine accounts by 508. What is the full for of DoS?
public computer:
A. Distribution of Services
A. before leaving I log out my computer
from all accounts, that nobody would see B. Dangers of Safety
my data, and steal my website identity C. Disk Operating System
B. I’m just leaving D. Denial of Service

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 566

509. What port number is HTTP (Hypertext A. Secutiry tokens


Transfer Protocol)? B. CHAP
A. tcp 443 C. Kerberos
B. tcp 80
D. Certificates
C. tcp 3389
515. A network firewall that tracks the oper-
D. tcp 161
ating state and characteristics of network
connections traversing it.

NARAYAN CHANGDER
510. architecture uses a limited set of
internet holding servers known as the A. Stateful
“root” domain servers, which now house
B. Stateless
“.com”, “.org”, “.gov”, and so on.
C. Honeypot
A. Hosting
B. IPv6 address D. Fly trap

C. Domain name service 516. What type of server would you install
D. MAC address that would be used to trap a hacker?
A. honeypot
511. These are are created with malicious in-
tent and sent by attackers B. NAT
A. Trojan Horse C. IPS
B. Worm D. IDS
C. Virus 517. When an IP addresses is combined with
D. none of above TCP/UDP ports, the union is called a
A. packet
512. What type of configuration creates a
DMZ between two firewalls? B. protocol
A. three-leg perimeter C. socket
B. basic D. message
C. back to back 518. Who was the first know user of the Cae-
D. perimeter sar Cipher?

513. Of the following, which is a collection of A. Caesar Romanus


servers that was set up to attract hack- B. Julius Caesar
ers?
C. Alan Turing
A. DMZ
D. There isn’t one
B. Honeypot
519. DES stands for
C. Honeynet
A. Drop Encryption Server
D. VLAN
B. Data Encryption Standard
514. Which of the following authentication
systems makes use of a KeyDistribution C. Digital Encrypt Server
Center? D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 567

520. Which of the following is not an advan- 525. What type of malware can record the
tage of the Virtual Network Computing keys you press?
(VNC) terminal emulation product over its

PRACTICE BOOK» NOT FOR SALE


A. Adware
competitors?
B. Spyware
A. VNC is free.
C. Ransomware
B. VNC runs on many operating systems.
D. Catphishing
C. VNC runs faster than the competition.
526. It uses code to access operating systems
D. VNC can run through a web browser. and software.
521. Choose the best definition of a firewall A. Structured Attacks
A. A firewall is software the protects a B. Unstructured Attacks
network C. Malicious Threats
B. A firewall is a hardware device that D. Accidental Threats
protects a network
527. Sara, the security administrator, must
C. A firewall intercepts and checks pack-
configure the corporate firewall to allow
ets of data
all public IP addresses on the internal in-
D. A firewall checks outgoing packets of terface of the firewall to be translated to
data one public IP address on the external in-
terface of the same firewall. Which of the
522. When DHCP snooping is configured, the following should Sara configure?
interface that connects to the DHCP server
is configured as a trusted port. A. PAT
A. True B. NAP

B. False C. DNAT
D. NAC
C. Minsan True
D. Kadalasan False 528. What is the standard or basic collection
of NTFS permissions?
523. What is a D.O.S A. Read and execute, read, write, full con-
A. Denial of service trol, modify, list folder contents
B. Delay of service B. Change permissions, read permis-
C. Downing of service sions, write permissions

D. Destruction of service C. Read attributes, list folder/read data,


traverse folder/execute file
524. Is a feature in Internet Explorer that pre- D. Create files/write data, create fold-
vents the web browser from storing in- ers/append data, take ownership
formation like:passwords, cookies, Tempo-
rary Internet files and Form data. 529. Which of these might be a policy about
memory sticks
A. InPrivate Browsing
A. Forbids transporting on memory sticks
B. Antivirus unless encrypted
C. Ad-block B. Allows transporting on memory sticks
D. smart screen filter if one is careful

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 568

C. Only allows transporting on a memory C. HTTP flood


stick if it is owned by the school
D. None of the above
D. none of above
535. Which of the following process is used
530. At which layer can encryption/decryption
in IPSEC to negotiate symmetric keys se-
function at (Select all that apply)
curely between endpoints over an unse-
A. Physical cure intermediate media?
B. Network

NARAYAN CHANGDER
A. Diffie-Hellman Key Exchange
C. Application
B. Advanced Encryption Standard (AES)
D. Presentation
C. Secure Hashing Algorithm (SHA)
531. Who is responsible for providing differ-
D. RSA
ent user access levels to an organisation’s
network?
536. Which network security device monitors
A. Network manager network traffic looking fro malware and
B. Firewall network attacks.
C. General users A. Virtual Private Network (VPN)
D. none of above B. Firewall
532. Social engineering, phishing and worms C. Intrusion Prevention System (IPS)
are examples of
D. Authentication, Authorization, Ac-
A. Viruses counting
B. Scams
C. Data Interception 537. Which trait is not characteristics of a next
generation firewall (NGFW)?
D. Malware
A. Can segment a network based on user,
533. Hashing functions like MD5 and SHA are device, and application type
used in IPSEC to provide which of the fol-
lowing services: B. Delivers high-performance inspection

A. Data confidentiality (privacy from C. Inspects only unencrypted packets


eavesdropping) D. Controls applications based on type or
B. Data Integrity (data protected from be- who the user is
ing changed during transit)
C. Securely negotiating a key over a un- 538. What is the most effective security ap-
secure media proach for a stateless packet filter?

D. Anti replay protection A. Deny all except specified hosts

534. A attack is when a victim is flooded B. Allow all except specified hosts
with ICMP packets that appear to be nor- C. Allow access to only specified destina-
mal supervisory traffic tion servers
A. SYN flood D. Deny access to all destinations except
B. Ping flood specified servers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 569

539. Which of these firewalls is used to for- B. It can spread without a user doing any-
ward each session that an internal user thing
makes to a network resource on the public

PRACTICE BOOK» NOT FOR SALE


C. It can’t spread without a user doing
network based on the application. something
A. Application layer
D. It doesn’t do any harm
B. Intrusion detection
544. :Viruses which executes when computer
C. Stateful inspection
starts is
D. Stateless inspection
A. macro
540. What penetration testing? B. file infector
A. Writing a virus C. boot sector
B. Paying a person to steal data D. salami shaving
C. Paying a person to send a virus
545. Which of the following would not be
D. Paying a person to break into a net-
achieved by penetration testing?
work
A. Potential threats to the system are
541. Which of the following is the most accu- identified
rate definition of Spyware?
B. Possible entry points to the system are
A. A stand-alone program that replicates, identified
doing damage to a system
C. There would be an attempt to break
B. Malicious code that spreads from de- into the system
vice to device but does not need to attach
itself to a program in order to do so D. Viruses and malware are removed
from the system
C. A program that pretends to be safe,
while actually containing malicious code 546. What type of malware can copy itself and
D. software that installs itself onto de- typically corrupts or deletes files. It is usu-
vices and then steals personal informa- ally triggered by running an infected pro-
tion about the user, like passwords, gram.
A. Virus
542. Which of the following is a useful tip to
help prevent malware attacks: B. Trojan
A. Take care when opening emails from C. Worm
unknown senders. D. Ransomware
B. Click on any link that you receive from E. Spyware (Key Logger)
a big company
C. Always give usernames and pass- 547. How do hackers use viruses?
words out if your bank asks for them. A. To make a computer unusable
D. none of above B. To get someone’s personal informa-
tion
543. How is a Worm different from other
viruses C. To find out card details
A. It does more harm D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 570

548. Whats a worm B. Protocol


A. an insect roming around the floor C. Media
B. an insect in your computer D. Domain
C. another type of malware 554. IT is any technical effort to manipulate
D. another type of virus the normal behaviour of network connec-
tions and connected systems.
549. An effect of an SQL injection might be..
A. Eavesdropping

NARAYAN CHANGDER
[7-9]
B. Hacking
A. Full access to the target computer.
C. Impersonation
B. Network access to the computer only.
D. Penetration testing
C. Ability to edit all files.
D. Attackers can access the database 555. Allows a system administrator to set up
only and manipulate data. a hierarchy of users
A. Firewall
550. Before you deploy Network Access Pro-
tection (NAP), you must install: B. Network forensics
A. Internet Information Server (IIS) C. User access levels
B. Network Policy Server (NPS) D. Passwords

C. Active Directory Federation Services 556. What should you do with a found pen
D. Windows Update Service drive
A. Look at the contents to see if you can
551. Your password is 1Vu*cI!8sT.Which at- find out who the owner is
tack method is your password vulnerable
B. Look at the contents so that you can
to?
perform a cyber attack
A. Rainbow table
C. Nothing
B. Brute force
D. Hand it to the police
C. Spidering
E. Use it on a computer that isn’t your
D. Dictionary own
552. Which of the following options should 557. What information will be seen in mine
you use to verify that a Web site is secure profiles by my social media friends and
for online transactions? what will see strangers?
A. Locked padlock icon A. I set up various accesses for different
B. Encryption tool groups offriends, they will see each other
differently, strangers see only name and
C. Automatic updates icon photo
D. Internet Service provider (ISP) logo B. everybody sees everything (e.g. email,
553. refers to the network command for telephone, address, all my photos)
how to format the conversation between C. some data (like email, phone, address,
two devices. pictures) is visiblefor strangers
A. Addressing D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 571

558. This Malware tricks the user into in- 563. The security professional’s interest in
stalling it by pretending to be useful. lies in defining the points that allow access
for investigation, interruption, and attacks

PRACTICE BOOK» NOT FOR SALE


A. Viruses
B. Worms A. network structures
C. Trojan Horses B. network devices
D. Ransomware C. network traffics
559. An intranet is behind a network device, D. network segmentation
which gives some protection against hack-
ers, viruses, and so on. Which is the net- 564. Can a firewall be a hardware device, soft-
work device? ware device, over the web appliance, or
any of the above
A. Proxy server
B. VPN A. hardware only
C. Firewall B. software only
D. None of the three C. network appliance only
560. An is the internal network for an or- D. Any of the above
ganization.
565. What are two examples of common sin-
A. Intranet gle sign-on authentication configurations?
B. Internet (Select the two best answers.)
C. PPTP A. Biometrics-based, Smart card-based
D. NAT B. Multifactor authentication, Biometrics-
561. An administrator needs to secure a wire- based
less network and restrict access based C. Kerberos-based, Multifactor authenti-
on the hardware address of the device. cation
Which of the following solutions should be
implemented? D. Smart card-based, Kerberos-based
A. Use a stateful firewall 566. Which of the following is a type of wire-
B. Enable MAC filtering less encryption?
C. Upgrade to WPA2 encryption A. WPS
D. Force the WAP to use channel 1 B. WWW
562. Mike, a network administrator, has been C. WWF
asked to passively monitor network traffic
D. WSS
to the company’s sales websites. Which
of the following would be BEST suited for
567. An example of social engineering.
this task?
A. Viruses
A. HIDS
B. Firewall B. Trojan Horses
C. NIPS C. Telephone IVR phising
D. SPAM filter D. Worms

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 572

568. Which of the following would help pre- C. differently, sometimes I accept-
vent unauthorised users from accessing strangers, but then I verify them
the network, files or software? D. none of above
A. Passwords and user access levels
573. What port number is Internet Message
B. Firewall and anti malware software
Access Protocol ver. 4 (IMAP4)?
C. Firewall
A. tcp 143
D. Encryption

NARAYAN CHANGDER
B. tcp 21
569. What is the function of network policies C. tcp 443
in an organisation?
D. tcp 389
A. Authenticates users.
B. Forms an agreement between organ- 574. Which of these is the most secure wifi
isation and user regarding network’s us- username?
age. A. HiWiFi
C. Defines the configuration of browsers. B. HelloWiFi
D. Establishes a plan to recover from se- C. WiFi
curity failure.
D. Doesn’t matter
E. All of the above
575. Which device is NOT involved in the
570. You deployed a web proxy that enables 802.1X authentication process?
client computers on the LAN to connect to
websites and secure websites on the Inter- A. The Supplicant
net.What type of proxy is this? B. The Authenicator
A. Reverse C. The Authentication Server
B. Non-transparent D. The Supplicant Server
C. Forward
576. What type of malware can copy itself and
D. Routing spread itself without human interaction.
571. A program that is designed to detect, dis- A. Virus
able, and remove viruses, worms, and Tro- B. Trojan
jan horses before they infect a computer.
C. Worm
A. A Rootkit
D. Ransomware
B. Anti-virus software
E. Spyware (Key Logger)
C. ActiveX
D. Adobe Flash 577. Malware
A. Are different types of threats to com-
572. To the friends in social networks I invite:
puter systems
A. anyone who asks even if I know noth-
B. Is a manufacturer of computer parts
ing about him
B. only friends, or recently met people- C. Are hard to find on the internet
who are friends of my friends D. Distribution is completely legal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Introduction 573

578. Typically, what level of access would a 583. I’m using the antivirus program with cur-
student in a school have on the network? rent database, and anti-advertising pro-
gram to browser:

PRACTICE BOOK» NOT FOR SALE


A. Access to all folders on the network.
A. I don’t use any of the above
B. Full access
B. I’m using parts from them
C. Access to own documents and the in-
ternet C. I use all of them
D. Access to all printers D. none of above

579. Stenographer is 584. What is PHISHING?

A. Cover images A. Where a device is used to intercept


packets of data as they are transferred
B. Original images across a network. This data is then anal-
C. Original image is converted into dupli- ysed to look for passwords and other per-
cate image sonal data.

D. none of above B. Where an executable file is secretly in-


stalled to record each key pressed and
580. Which protocol defines port-based au- send
thentication to restrict unauthorized hosts C. Writing a snippet of code to try and re-
from connecting to the LAN through pub- trieve data from a machine
licly accessible switch ports?
D. Sending emails pretending to be from
A. TACACS+ reputable companies to try and get people
B. RADIUS to reveal personal information

C. SSH 585. Signed digital certificates used to se-


cure communication with a web server are
D. 802.1x
MOST commonly associated with which of
the following ports?
581. Encrypt “goodday” with “say” using Vi-
genere cipher A. 25
A. yomtyyq B. 53
B. yomvdyq C. 143
C. yotvyyth D. 443
D. yrmvhyh 586. Abdullah gets his phone bill in the mail.
The bill was supposed to be for OMR 80,
582. Which type of firewall reads the packet but the mail person spilled water on the
information and makes decisions based on bill, smearing the ink. The bill now asks
the contents of each individual packet? for OMR 8.
A. Packet Filters A. C
B. Application-Level Firewall B. I
C. Stateful Firewall C. A
D. none of above D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.2 CONFIDENTIALITY 574

587. Sending requests to a single server using 589. When do you need to use anti-virus soft-
hijacked machines ware.
A. Phishing A. When you are sick.
B. DoS B. When you are a doctor and give ap-
C. Worms pointments

D. Virus C. When you buy your first computer


D. All the time, in all devices and wireless

NARAYAN CHANGDER
588. is a connection of LANs via telecom- connections to protect your devices.
munication company-owned data links,
which may consist of lease lines such as 590. Scares the user into thinking they have
copper phone lines, fiber, or leased metro- lots of viruses. Provides a malicious link
Ethernet networks. to ‘fix the problem’
A. MAN A. Scareware
B. Intranet B. Ransomware
C. Internet C. Spyware
D. WAN D. Trojan

10.2 CONFIDENTIALITY
1. A(n) is a keyless substitution cipher 4. In the DES algorithm the Round Input is 32
with N inputs and M outputs that uses a bits, which is expanded to 48 bits via
formula to define the relationship between A. Scaling of the existing bits
the input stream and the output stream
B. Duplication of the existing bits
A. S-box
C. Addition of zeros
B. P-box
D. Addition of ones
C. T-box
5. AES uses a bit block size and a key size
D. none of the mentioned
of bits.
2. DES was designed to increase the size A. 128; 128 or 256
of DES Key
B. 64; 128 or 192
A. Double
C. 256; 128, 192, or 256
B. Triple
D. 128; 128, 192, or 256
C. Quadruple
6. Which is the largest disadvantage of the
D. None of the mentioned
symmetric Encryption?
3. The number of unique substitution boxes A. 1.More complex and therefore more
in DES after the 48 bit XOR operation are time-consuming calculations.
A. 8 B. 2.Problem of the secure transmission
B. 4 of the Secret Key.
C. 6 C. 3.Less secure encryption function.
D. 12 D. 4.Isn’t used any more.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.2 CONFIDENTIALITY 575

7. The acronym AES stands for? 13. The method provides a one-time ses-
A. American Encryption Standard sion key for two parties

PRACTICE BOOK» NOT FOR SALE


B. Advanced Encryption System A. Diffie-Hellman
C. Advanced Encryption Standard B. RSA
D. Advanced Encryption Standard C. DES
8. DES follows D. AES
A. Hash Algorithm
14. Cryptanalysis is used
B. Caesars Cipher
C. Feistel Cipher Structure A. to find some insecurity in a crypto-
graphic scheme
D. SP Networks
B. to increase the speed
9. The DES algorithm has a key length of
C. to encrypt the data
A. 128 Bits
D. to make new ciphers
B. 32 Bits
C. 64 Bits 15. One commonly used public-key cryptogra-
D. 16 Bits phy method is the algorithm

10. Which of the following modes of opera- A. RSS


tions can be followed for both stream ci- B. RAS
phers as well as block ciphers?
C. RSA
A. CBC (Cipher Block Chaining)
D. RAA
B. ECB (Electronic Code Book)
C. CFB (Cipher text Feed Back) 16. Which of the following is a mode of op-
D. All of the above eration for the Block ciphers in cryptogra-
phy?
11. A(n) is a keyless substitution cipher
with N inputs and M outputs that uses a A. Electronic Code Book (ECB)
table to define the relationship between B. Cipher Block Chaining (CBC)
the input
C. Counter (CTR) mode
A. S-box
D. All of the above
B. P-box
C. T-box 17. DES is a(n) method adopted by the US
D. None of the ementioned government.

12. In the DES algorithm the round key is A. symmetric-key


bit and the Round Input is bits. B. asymmetric-key
A. 48, 32
C. Nither symmetric-key nor asymmetric-
B. 64, 32 key
C. 56, 24 D. Both symmetric-key and asymmetric-
D. 32, 32 key

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Digital Signature 576

18. What is data encryption standard (DES)? D. 4.The key prevents the user of having
to reinstall the software at each change in
A. block cipher
technology or in the functions for encryp-
B. stream cipher tion.
C. bit cipher 20. In asymmetric key cryptography, the pri-
D. byte cipher vate key is kept by
A. Sender
19. Which is the principle of the encryption us-

NARAYAN CHANGDER
ing a key? B. Receiver
C. Sender & Receiver
A. 1.The key indicates which funcion is
used for encryption. Thereby it is more D. All connected devices to the network
difficult to decrypt a intercepted message
21. The DES Algorithm Cipher System consists
as the function is unknown.
of rounds (iterations) each with a
B. 2.The key contains the secret function round key
for encryption including parameters. Only
A. 12
a password can activate the key.
B. 18
C. 3.All functions are public, only the key
is secret. It contains the parameters used C. 9
for the encryption resp. decryption. D. 16

10.3 Digital Signature


1. is not a requirement of cryptographic B. 3
hash algorithm C. 4
A. Disclosure D. 5
B. Masquerade
4. A Digital Signature is
C. Traffic Analysis A. a bit string giving identity of a corre-
D. Content Modification spondent
E. Timestamp B. a unique identification of the sender
C. an authentication of an electronic
2. When a hash function is used to provide
record by tying it uniquely to a key only
message authentication, the hash function
a sender knows
value is referred to as
D. an encrypted signature of the sender
A. Message Digest
B. Authentication Score 5. The responsibility of a Certification Author-
ity for Digital Signature is to Authenticate
C. Authentication Digest the
D. Hash Score A. hash function used
3. How many algorithms digital signature B. private keys of subscribers
consists of? C. public keys of subscribers
A. 2 D. key used in DES

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Digital Signature 577

6. PKI stands for 12. Who really checks the validity of a Digital
A. Public Key Interchange certificate?

PRACTICE BOOK» NOT FOR SALE


B. Personal Key Infrastructure A. The user
C. Public Key Infrastructure B. The Browser
D. Primary key interchange C. The server
D. The web application
7. The original message digest algorithm out
of the following is 13. A website has a digital certificate issued
A. MAC by a Certificate Authority (CA). The ses-
B. SHA sion key generated for the SSL session be-
tween a browser and the server hosting
C. MD5 the website is encrypted using
D. DSA A. The CA’s public key.
8. A digital certificate that turns the address B. The CA’s private key.
bar green is a(n)
C. The public key that comes with the dig-
A. Personal Web-Client Certificate ital certificate.
B. X.509 Certificate D. The CA’s public key.
C. Extended Validation SSL Certificate
14. In digital signature, the hash value of a
D. Advanced Web Server Certificate message is encrypted by
(AWSC)
A. Shared secret key
9. What is a Hash Function? B. User’s private key
A. It creates a small flexible block of data C. Session key
B. It creates a small, fixed block of data
D. Transient key
C. It creates a encrypted block of data
15. A is a specially formatted encrypted
D. none of the mentioned
message that validates the information
10. What makes MAC different from a hash the CA requires to issue a digital certifi-
function? cate.
A. Hash Function A. digital certificate
B. Message B. digital digest
C. Secret Key C. Certificate Signing Request (CSR)
D. Encryption algorithm D. FQDN form
11. Pick the odd one out 16. Which of the following is not a type of dig-
A. Bitcoin ital signature?
B. Zcash A. Approval Signatures
C. Ethereum B. Non-Certified Signatures
D. Rupay C. Visible Digital Signature
E. None of the above D. Invisible Digital Signature

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Digital Signature 578

17. is a protocol for securely accessing a B. Message Encryption


remote computer. C. Message Authentication Code
A. Secure Shell (SSH) D. All of the above
B. Secure Sockets Layer (SSL)
23. Jack wants to send an encrypted mes-
C. Secure Hypertext Transport Protocol sage to Jill using asymmetric cryptogra-
(SHTTP) phy.Which of the following is TRUE on the
D. Transport Layer Security (TLS) problem Jack may face?

NARAYAN CHANGDER
A. Jill’s private key may not belong to Jill.
18. What cryptographic algorithm is used by
the NSA and includes the use of elliptical B. Jill’s public key may not belong to Jill.
curves for digital signature generation and C. Jack’s public key may not belong to
key exchange? Jack.
A. ECC D. Jack’s private key may not belong to
B. AES Jack.
C. IDEA 24. is not a processing stage in SHA com-
D. RSA putation
A. Append Padding bits
19. To verify a digital signature we need the
B. Append Length
A. Sender’s Private key
C. Initialize Hash Buffer
B. Sender’s Public key
D. Append MAC
C. Receiver’s Private key
D. Receiver’s Public key 25. Padding in MD5 is done so that the length
L of the message satisfies which formula?
20. SHA and MD5 are examples of: A. L = 446 mod 512
A. symmetric block ciphers B. L = 896 mod 1024
B. Asymmetric block ciphers C. L = 324 mod 512
C. Stream ciphers D. L = 128 mod 512
D. Message signing algorithms E. L = 448 mod 512
21. If Bob receives Alice’s public key from a 26. A digital certificate associates
public directory, how does he know the
A. the user’s identity with his public key
key really came from Alice?
B. a user’s private key with the public key
A. From acknowledgement from Alice
C. a private key with a digital signature
B. From a trusted certificate authority
D. a user’s public key with his private key
C. From your browser database
D. From Alice server 27. The element of digital signature:
A. Public Key & Private Key.
22. Which of the following are the different
classes of message authentication func- B. Biometric.
tion? C. Advanced biometric.
A. hash function D. Public key

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Digital Signature 579

28. A centralized directory of digital certifi- 33. Which of the following is not contained in
cates is called a(n) a digital certificate?

PRACTICE BOOK» NOT FOR SALE


A. Certificate Repository (CR) A. Public key.
B. Digital Signature Approval List (DSAP) B. Session key.
C. Authorized Digital Signature (ADS) C. Validity period.
D. Digital Signature Permitted Authoriza- D. Hash algorithm.
tion (DSPA)
34. Which three protocols use asymmetric key
29. Certification of the Digital Signature by algorithms? (Choose three.)
certifying authorities is needed because A. Secure Sockets Layer (SSL)
A. it is safe B. Secure File Transfer Protocol (SFTP)
B. it gives confidence to a business
C. Pretty Good Privacy (PGP)
C. the authority checks and assures the
D. Advanced Encryption Standard (AES)
customer that the public key indeed be-
longs to the business which claims it’s E. Secure Shell (SSH)
ownership
35. Schnorr digital signature is based on
D. private key claimed by the sender may
A. Prime numbers
not be actually his
B. Discrete logarithms
30. In order to ensure a secure cryptographic
C. Primitive roots
connection between a web browser and a
web server, a(n) would be used. D. Secret key
A. web digital certificate E. hash functions
B. email web certificate 36. Browsers that cannot be used to access
C. server digital certificate Web Shield
D. personal digital certificate A. Safari
B. Chrome
31. What is the size of each register used in
SHA 512 algorithm? C. Mozilla Firefox
A. 32 bits D. Microsoft Edge
B. 48 bits 37. The total length of the message after
C. 16 bits padding and adding length representation
D. 64 bits in SHA 512 is

E. 128 bits A. L x 512 bits


B. L x 1024 bits
32. A produces a signature for the docu-
ment. C. L x 1028 bits

A. Key generation algorithm D. L x 128 bits

B. Signature verifying algorithm 38. MD5 uses bits for Digest Length
C. Signing algorithm A. 128
D. Authentication B. 160

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Digital Signature 580

C. 256 C. The first block after each block halving


D. 512 D. The 2nd transaction of a Blockchain
39. Which of the following ensures Nonrepudi- 44. Where are the public keys of communicat-
ation in a digital signature? ing parties kept?
A. Symmetric encryption A. Privately
B. Encrypting hash with the private key of B. Exchanged prior to data exchanged
the sender

NARAYAN CHANGDER
C. Certificate authority
C. Hash
D. In a written note that is send via email
D. Encrypting Symmetric key with the
public key of receiver 45. The public key is for the sender and it is:
40. ElGamal encryption system is A. Used to decrypt the message.
A. symmetric key encryption algorithm B. Just the owner know the key.
B. asymmetric key encryption algorithm C. Used to make a digital signature.
C. not an encryption algorithm D. Cannot be shared
D. none of the mentioned 46. Which algorithm algorithm provides the
41. The hash value it will change when: private key and its corresponding public
key?
A. The data doesn’t have a changed.
A. Key generation algorithm
B. The data have changed.
B. Signature verifying algorithm
C. Every time when opening the data.
C. Signing algorithm
D. The value will not changed for ever.
D. None of the above
42. What is symmetric encryption?
47. Cryptographic hash function takes an arbi-
A. Encryption that uses a pair of keys to
trary block of data and returns
encrypt and decrypt messages when com-
municating A. fixed size bit string
B. Encryption that is made up of exactly B. variable size bit string
similar parts facing each other or around C. both fixed size bit string and variable
an axis size bit string
C. Encryption that uses one key that must D. variable sized byte string
be shared among the people receiving a
message 48. Which of the following factors ensures
D. Encryption that has parts which fail to that the message is real, accurate, and
correspond to one another in shape, size, safeguards from unauthorized user modi-
or arrangement fication during the transmission
A. Confidentiality
43. What is a genesis block?
B. Integrity
A. The first block of a Blockchain
B. A famous block that hardcoded a hash C. Availability
of the Book of Genesis onto the blockchain D. Authentication

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Digital Signature 581

49. Release of message contents to any per- 54. In mutual authentication, the problem
son or process not possessing the appro- faced by authentication key exchange is
priate cryptographic key is called

PRACTICE BOOK» NOT FOR SALE


A. Traffic Analysis A. Timeliness
B. Disclosure B. Integrity
C. Masquerade C. non-repudiation
D. Non-repudiation
D. Access Control
50. In verifying that a digital certificate is
from a Certificate Authority (CA), which 55. The following is mandatory information
of the following information is being com- that needs to be inputted during the Ad-
pared? ministration registration process, except

A. CA’s public key. A. Full name


B. CA’s private key. B. Employment identification number
C. Message digest of the digital certifi- C. Mobile phone number
cate.
D. Biological mother’s name
D. Public key on the digital certificate.
56. Bitcoin is based on blockchain?
51. The strongest technology that would as-
sure Alice that Bob is the sender of a mes- A. Private
sage is a(n) B. Public
A. digital signature C. Public Permissioned
B. encrypted signature
D. Permissioned
C. digital certificate
D. digest 57. Which signatures include details such as an
image of our physical signature, location,
52. The following are not part of Smart Trace date, and official seal?
& Track
A. Approval Signatures
A. Document signature history
B. Certified Signatures
B. Document tracking
C. Visible Digital Signature
C. E-mail notification
D. Invisible Digital Signature
D. Document look up
58. refers to a situation in which keys
53. Digital signature is:
are managed by a third party, such as a
A. Small digit with letters and numbers. trusted CA.
B. Small digit with letters, a hash result, A. Key escrow
and numbers.
B. Remote key administration
C. Small digit with letters, numbers and
electronic code. C. Trusted key authority
D. Non. D. Key authorization

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Digital Signature 582

59. Which 128-bit block cipher encryption al- 64. SHA1 uses bits for Digest Length
gorithm does the US government use to A. 128
protect classified information?
B. 160
A. Skipjack
C. 256
B. Vignere
D. 512
C. Caesar
65. Which of the following brought the
D. AES
blockchain implementation to the lime-

NARAYAN CHANGDER
E. 3DES light?
60. An entity that issues digital certificates is A. Bitcoin
a B. Ethereum
A. Certificate Authority (CA) C. Zcash
B. Signature Authority (SA) D. None of the above
C. Certificate Signatory (CS)
66. Blockchain can be stored as which of the
D. Digital Signer (DS) following?
61. Which signature allows a user to sign a A. A flat file
single document digitally? B. A database
A. Approval Signatures C. Both of the above
B. Certified Signatures D. None of the above
C. Visible Digital Signature 67. In HMAC, the block obtained as a result
D. Invisible Digital Signature of XOR operation between K+ and opad is
?
62. A hashing function for digital signature(i)
must give a hashed message which is A. So
shorter than the original message(ii) must B. Si
be hardware implementable(iii) two dif- C. Ki
ferent message should not give the same
D. Ko
hashed message(iv) is not essential for im-
plementing digital signature 68. Communication between end systems is
A. i and ii encrypted using a key, often known as
B. ii and iii A. Temporary key
C. i and iii B. section key
D. iii and iv C. line key
D. session key
63. What term is used to describe concealing
data in another file such as a graphic, au- 69. Side channel attacks could be done using
dio, or other text file?
A. masking A. Cache
B. obfuscation B. Acoustics
C. steganography C. Electromagnetic radiation
D. hiding D. all of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Digital Signature 583

70. The Digital Signature Standard (DSS) cre- 75. Which of the following ensures Integrity in
ates a signature of size a digital signature?

PRACTICE BOOK» NOT FOR SALE


A. 128 bits A. Symmetric encryption
B. 512 bits B. Encrypting hash with the private key of
C. 320 bits the sender
D. 348 bits C. Hash

71. Which of the following in Digital Signa- D. Encrypting Symmetric key with the
tures may be relied upon to prove that an public key of receiver
online form was authorized by a specific
76. If Bob wants to send a encrypted message
person?
to Alice, which key does he use?
A. Nonrepudiation
A. Bob private key
B. Encryption
B. Bob public key
C. Confidentiality
C. Alice public key
D. Integrity
D. Alice private key
72. What powers the Ethereum Virtual Ma-
chine? 77. performs a real-time lookup of a digi-
A. Gas tal certificate’s status.

B. Ether A. Online Certificate Status Protocol


(OCSP)
C. Ether
B. Certificate Revocation List (CRL)
D. Block Reward
C. CA Registry Database (CARD)
73. A Digital Signature is requiredi) to tie an
electronic message to the sender’s identi- D. Real-Time CA Verification (RTCAV)
tyii) for non-repudiation of communication
78. Which signature contains the name of the
by senderiii) to prove that a message was
document signer and the certificate is-
sent by the sender in a court of lawiv) in
suer?
all e-mail transactions
A. i and ii A. Approval Signatures

B. i, ii, iii B. Certified Signatures

C. i, ii, iii, iv C. Visible Digital Signature


D. ii, iii, iv D. Invisible Digital Signature

74. Examples of a nonce are 79. Man-in-the middle attack can be overcome
A. Message Number with the use of

B. Timestamp A. Random Oracle


C. Counter B. Digital Signature
D. all of these C. Bruteforce
E. none of these D. Cryptanalysis

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Digital Signature 584

80. Which authentication protocol uses a 85. What are the types of certificates?
timestamp to assure the session key has A. Signature & Encryption.
just been generated?
B. Public key & Private key.
A. Needham-Schroeder protocol
C. Electronic & Biometric.
B. Symmetric encryption protocol
D. All.
C. Mutual authentication protocol
86. Where do you store your cryptocurrency?
D. Denning protocol

NARAYAN CHANGDER
A. Bank account
81. One of the features in the Pertamina B. Floppy Disk
Shield, namely
C. Wallet
A. OTP & Token and Biometric Verifica-
tion D. In your pocket

B. OTP & Token and Worker Number 87. A digital signature needs a
C. Resident number and Biometric Verifi- A. Private-key system
cation B. Shared-key system
D. Worker Number and Worker e-mail C. Public-key system
82. The responsibility of a certification author- D. All of them
ity for digital signature is to authenticate
88. Hashed message is signed by the sender
the
using
A. hash function used
A. his public key
B. private keys of subscribers B. his private key
C. public keys of subscribers C. receiver’s public key
D. key used in DES D. receiver’s private key
83. The use of digital signatures 89. Message authentication code is also
A. Requires the use of a one-time pass- known as
word generator. A. key code
B. Provides encryption to a message. B. hash code
C. Validates the source of a message. C. keyed hash function
D. Ensures message confidentiality. D. message key hash function

84. In asymmetric encryption process. Each 90. What are the global public key components
communicating party starts with how used in DSS?
many keys? A. p, q, g, h
A. 5 B. p
B. 4 C. h
C. 3 D. g
D. 2 E. p, q, g

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 INTERNET SECURITY 585

91. is a process which verifies the identity B. Non-repudiation


of a user who wants to access the system. C. Integrity

PRACTICE BOOK» NOT FOR SALE


A. Authentication D. None of the above

10.4 INTERNET SECURITY


1. This technique tries to take information C. Spyware
from the user, but the user actively gave
D. Propaganda
the information. Common things taken are
credit cards, usernames, passwords, and 5. Where would you check to see if a website
home addresses. is using a secure connection?
A. Phishing A. www
B. Scam B. lock icon and https
C. Spyware C. book icon
D. Fishing
D. none of the above
2. During a recent flood the your school lost
6. Which of the following would be consid-
all its data stored on its computers. What
ered a strong password?
could they have done to prevent the loss
of their data? A. 123abc456def
A. Backup the data on the computeroff- B. p3MberLY%Av
site regularly. C. p@sswOrd1
B. Backup the data on a flash driveand
D. w3st!
store it in a desk in the office.
C. Backup the data on the computerse- 7. Which of the following are examples of
very evening. common threats you may encounter on-
line? Check all that apply.
D. Install an antivirus software on their-
computers A. Spam

3. Which of the following is a method of en- B. Malware


crypting data transmitted over the inter- C. Phishing
net to ensure its privacy and security?
D. All of the Above
A. HTTP
8. DDoS solution?
B. FTP
C. SSL/TLS A. Build redundancy into your infrastruc-
ture
D. DNS
B. Phishing of public services or compa-
4. Information / ideas that are deliberately nies
spread to help or harm a person or group C. Configure your network hardware
A. Gossip against DDoS attacks
B. Malware D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 INTERNET SECURITY 586

9. Danielle’s teacher told him that he had C. Adware


been the victim of identity theft. What D. Spam
does this mean?
A. He discovered someone else has the 14. Which of the following is a technique used
same name as his. by cybercriminals to take control of a com-
puter or network by exploiting software
B. He had his personal information
vulnerabilities?
stolen.
A. Social engineering

NARAYAN CHANGDER
C. He saw someone who looks like him on
the internet. B. Denial-of-service attack
D. He was able to access someone else’s C. Brute force attack
information. D. Exploit
10. A malicious program that attaches itself to 15. The prevention efforts to avoid malware,
an executable piece of software, and then except
reproduces itself when the file is run.
A. Avoid installing using pirated software
A. Worm
B. Perform operating system and an-
B. Trojan horse
tivirus updates
C. Malware
C. Watch YouTube
D. Virus
D. Turn on the firewall on your computer
11. What does a firewall do?
16. example of DDos?
A. Blocks unwanted data from the Inter-
net A. sell something
B. Installs Viruses B. have data stolen
C. Give you SD cards C. to pretend to be someone who is not
D. Blocks all content D. none of above

12. What type of chair should you use whilst 17. The programs which is designed to spread
using IT equipment? themselves to programs or infect other
files is
A. Comfortable
B. One with wheels A. Spoofing

C. Adjustable B. Worm

D. Straight backed C. Virus


D. Hack
13. Michael’s computer has a program that
deletes his data without his knowledge or 18. Measures that are put in place to ensure
approval. He wants software that can data is safe
protect his computer from future attacks.
A. Data integrity
Which of the following types of software
would you recommend? B. Data protection
A. Malware C. Data security
B. Anti-virus D. Data authorisation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 INTERNET SECURITY 587

19. A digital certificate is issued by.. C. DDoS


A. a digital authoriser D. Brute force attack

PRACTICE BOOK» NOT FOR SALE


B. a certificate authority 24. A software utility that detects, prevents,
C. a certificate handler and removes viruses, worms, and other
malware from a computer
D. a digital certificate handler
A. Anti-virus software
20. The teacher’s personal laptop crashes and
B. Firewall
he needs to reinstall the operating sys-
tem(OS) but he does not have a copy of C. Counterfeiting
the OS on a CD and does not have a valid D. Trojan horse
license (key). What should he do?
25. An antivirus program protects a computer
A. Ask a friend for his CD and key
against viruses by
B. Buy a copy of the OS from the internet
A. communicating and passing the infor-
C. Search on the internet for a cracked mation to the outsider.
copy
B. identifying and removing any computer
D. Use the school’s copy of the OS and key viruses found on storage media, in the
for his personal laptop computer memory or incoming email files.
21. Which of these email messages is most C. installing a new virus through the data
likely to be spam? received.

A. Merced Flores-Re:consultant for a D. reading the operating system and mod-


book ifies it.

B. Henri Rousseau-Niagra falls picture 26. what is the internet security?


C. Olenna Mason-Lakestone student art A. Network security helps protect your
exhibition workstations from harmful spyware. It
D. SweepsADay-Thanks! IPad coming to also ensures that shared data is kept se-
You cure.
B. Internet security is a branch of com-
22. is a legal means of protecting an au- puter security specifically related to not
thor’s work. only tecnology
A. Copyright C. network security as it applies to other
B. Computer Forensics applications or operating systems as a
whole.
C. Cat-fishing
D. none of above
D. Creative Commons
27. A virus can enter a PC via an or via the
23. Which of the following is a type of cy- Internet
ber attack that involves tricking individu-
als into giving away sensitive information A. Viruses
such as passwords or credit card details? B. Firewall
A. Phishing C. Password
B. Malware D. Infected disc

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 INTERNET SECURITY 588

28. Encryption is used to ensure 34. Which of these is an example of a phishing


A. everyone can read the message. email?
B. only the sender can read themessage. A. You have won the lottery! Follow this
link to claim.
C. only computers can read themessage.
B. Your bank account has been hacked.
D. only the intended people can readthe
Login in here to protect yourself.
message.
C. Help! I am stuck in Europe and I need
29. Who are foundeds the Microsoft

NARAYAN CHANGDER
money to travel home.
A. Bill Bourne and Ray Tomlinson D. All of the above!
B. Bills Gates and Paul Allen
35. Rose just installed a new search engine
C. Xiaochao and Sophie Wilson on her laptop.now whenever she searches
D. Paul Allen and Ben Amstrong the internet, she gets several pop-up win-
dows directing her to buy products.what
30. are messages that try to trick you into
does rose have?
providing sensitive information.
A. ransomware
A. Phishing scams
B. spyware
B. HTTPS
C. Cookie scams C. Adware

D. Plug-ins D. trojan horse

31. The illegal use, copying or distributing 36. Which is the correct term? Software that
of software without ownership or legal monitors all data arriving and leaving your
rights. computer.
A. Counterfeiting A. Encryption
B. Software piracy B. Virus
C. Internet piracy C. Backup
D. Impersonation D. Firewall
32. What is SSL 37. solution for a virus
A. Secure Socket Layer A. Delete any temporary files
B. Standard Secure Layer B. Restart the computer in safe mode
C. Security Standard Layer C. install an antivirus
D. Security Stabilization Layer D. none of above
33. In order to safeguard your important data
38. What should a strong password include?
you should backup your files. What does
this mean? A. At least one upper case letter
A. Take a copy of the original files B. Short, easy to guess words
B. Put your files in a safe place C. Date of birth
C. Print out your files D. At least one number
D. Store all your files in the cloud E. At least 8 characters

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 INTERNET SECURITY 589

39. The process of having copies of data in 44. The illegal use of someone else’s personal
another environment is called “BACKUP”. information (as a Social Security number)
Also, backup is to take precautions to re- in order to obtain money or for some other

PRACTICE BOOK» NOT FOR SALE


duce information loss. personal gain
A. It doesn’t matter who made the A. Internet fraud
backup. B. Identity theft
B. it doesn’t matter when we back up. C. Credit card fraud
C. it doesn’t matter what information to D. Telemarketing schemes
back up
D. it does not matter what name the back- 45. What is included in the malware?
ups are stored in A. Worm

40. A malicious software which can monitor B. Email


your use of the computer quietly in the C. Internet
background. D. Hacker
A. Spyware
46. The best definition of hacking is:
B. Trojan
A. Glass frog slippers
C. Worm
B. Gaining an unfair advantage
D. Anti-virus
C. Gaining unauthorized access
41. Which is NOT a type of malware? D. Gaining a black, grey or red hat
A. Virus
47. How would you be able to protect yourself
B. Worm from phishing
C. Trojan horse A. Call your local fish store
D. Sandwich B. Get an Anti-Virus Program
42. What is meant by a ‘black hat hacker’? C. Change Passwords Every 4-6 months
A. Doesn’t necessarily steal but may ac- D. B & C
cess ITsystems without permission which
is still illegal. 48. Https stands for

B. Illegalhacker-intent on doing harm, A. Hyper text transmitor protocol Secure


stealing for personal gain e.g. taking cred- B. Hyper text transfer Protocol Secure
itcard details. C. Hyper Text Transfer Protocol Stability
C. Ethicalhacker-paid by companies to D. Hyper Text Transfer Parameter Secure
test their systems fro vulnerabilities.
D. none of above 49. Someone who explores methods for
breaching defenses and exploiting weak-
43. Acronyms SSL? nesses in a computer system or network.
A. Secure Search Layer A. Hacker
B. Security Sockets Layer B. Identity theft
C. Socials Sockets Lock C. Fair Use
D. Secure Sockets Layer D. Firewall

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 INTERNET SECURITY 590

50. What is a DDoS attack? 55. phishing examples?


A. A type of malware that infects com- A. that sells clothes
puter networks B. steal data from you
B. A type of social engineering attack that C. someone older impersonate a child
attempts to trick users into revealing sen-
sitive information D. none of above

C. A type of network attack that involves 56. Files that turn into shortcuts can be af-

NARAYAN CHANGDER
flooding a target with traffic to disrupt its fected by ?
normal operation A. Worm
D. A type of cyber attack that involves B. Virus
stealing personal data from a computer
network C. Spoofing
D. Spam
51. Information that is readable without per-
forming any cryptographic operations. 57. You can download from the Net; this
A. cryptography type of software is available free of
charge but protected by copyright
B. plaintext
A. Firewall
C. encryption
B. Crucial
D. decryption
C. Encryption
52. Which one is NOT a function of a proxy D. Freeware
server?
A. Enables anonymous surfing 58. In your opinion, internet security is

B. Used to filter online content A. necessary of dog life.

C. Provides a cache of previously visited B. essential for you privacy life.


sites C. little necessary.
D. Uses asymmetric encryption D. none of above

53. Most is designed to obtain personal in- 59. Install non-original software is included in
formation without the user’s permission
A. Obtains A. Virus
B. Spyware B. Hole
C. Hacker C. Hack
D. A freeware D. Spoofing

54. To prevent unwanted access from or to the 60. What is malware?


network or server is A. Malicious software
A. Antivirus B. Software made by a company called
B. Worm Mal
C. Spoofing C. Malicious hardware
D. Firewall D. Clothes that hackers wear

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 INTERNET SECURITY 591

61. What is a cookie in relation to the Inter- 65. In relation to computers, what is a virus?
net? A. A program that secretly watches your

PRACTICE BOOK» NOT FOR SALE


A. A small text file that a website stores computer activity and sends the informa-
on a user’s computer tion over the Internet

B. A type of virus that spreads through B. A program that damages files and your
email attachments hard drive and affects the computer’s op-
eration
C. A program that allows remote access
C. A URL that may lead the user to down-
to a computer
load a video file
D. A form of encryption used to secure on- D. A program that is useful to download
line transactions from the Internet

62. Which of the following payment methods 66. Rajesh receives emails asking him to send
are safe for online transactions? Check all his bank account numbers in order to re-
that apply. ceive the money from a lottery he has won.
What is the sender of the email doing?
A. Cash
A. Hacking
B. PayPal and similar online payment ser-
vices B. Phishing
C. Counterfeiting
C. Bank account transfer
D. Spamming
D. Check
67. What is Data Protection.
63. Which of the following is NOT recom- A. The protection of all
mended when creating a strong pass-
B. The protection of a businesses sales
word?
data.
A. longer than six characters C. How the government keeps our infor-
B. generator to create more random mation safe.
passwords D. The protection of people’s personal in-
C. same password for multiple accounts formation.

D. numbers, symbols, and special charac- 68. Which of the following is an example of
ters natural loss?
A. Flooding
64. what is DDoS?
B. Not saving your file by accident
A. Distributed denial-of-service attacks C. Spilling water on your file
target websites and online services
D. A virus that deletes all your files
B. The gaming industry has also been a
target of DDoS attacks 69. What is the Internet?
A. A network of networks
C. The aim is to overwhelm them with
more traffic than the server or network B. A single network
can accommodate. C. A computer program
D. none of above D. A type of software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 INTERNET SECURITY 592

70. a solution for the phishing? 74. When u receive a question about your per-
A. you can change the password and not sonal information by a stranger you
tell anyone A. You will tell them all your personal in-
B. say your password to all the people formation

C. say the password a your best friend B. You will tell a trusted adult

D. none of above C. You will NOT tell a trusted adult and


keep it a secret

NARAYAN CHANGDER
71. What should be protected while on the in- D. you will tell your baby sibling
ternet, except?
A. Personal data 75. What is a browser cookie?

B. Resource A. It’s a plug-in that allows you to view


special types of web content.
C. Reputation
B. It’s a type of phishing scam.
D. Account Social Media
C. It’s a small piece of data that tracks
72. viruses and worms what is? your preferences on different websites.
A. Computer viruses and network worms D. It’s a tool that can test a website’s se-
have evolved through a continuous series curity.
B. You can avoid it by not getting into 76. Which protocol is used to transmit data
strange pages and not allowing nothing over the Internet?
C. You can avoid it by not getting into A. HTTP
strange pages and not allowing every-
thing B. FTP

D. none of above C. TCP/IP


D. SMTP
73. Plagiarism
A. the practice of taking someone else’s 77. What clue is certain that you may have
work or ideas and passing them off as spyware on your computer which can
one’s own. cause your performance of the computer
to be slower do to many:
B. Online etiquette is ingrained into cul-
ture, although etiquette in technology is a A. Malware
fairly recent concept. B. Trojans
C. a global computer network providing a C. Popups
variety of information and communication D. I don’t know.
facilities, consisting of interconnected net-
works using standardized communication 78. David always opens all attachments here-
protocols. ceives with his email. This is notrecom-
D. is a branch of computer security specif- mended because some attachmentsmay
ically related to not only Internet, often A. contain malware
involving browser security and the World B. contain advertising material
Wide Web, but also network security as it
applies to other applications or operating C. require special programs to open
systems as a whole. D. require to be printed to be read.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 593

79. Mozilla Firefox displays a lock when the D. Viruses


website is secure and allows you to dis-
able or delete small files placed on 80. What type of program can you install to

PRACTICE BOOK» NOT FOR SALE


your hard drive by web servers so that prevent malware?
they can recognize your PC when you re-
A. Antivirus software
turn to their site
A. Hackers B. Office software

B. Crucial C. A new operating system


C. Cookies D. A disk defragmenter

10.5 FIREWALLS
1. Which type of firewall prevents access 5. Service can have two meanings in com-
based on site ratings and classifications? puter terminology:a) A service can be a
A. HIDS specific application or function such as
email, chat, etc. b) A service can refer to
B. Content filter a specific part of an application, such as
C. DMZ transmitting the data of a web page
D. Packet-filtering firewall A. network topology
2. Malicious software that bypasses the nor- B. LAN
mal, secure, or restricted access. C. services
A. worm D. short message service (SMS)
B. backdoor
6. An extension of network address transla-
C. trojan horse tion that associates a port number with a
D. spyware request from a private host

3. NAT maps an internal IP address to a A. PAN


static port assignment or even to a specific B. PAT
public IP address
C. PAS
A. Dynamic
D. PAC
B. Many-to-one
C. IP Masquerade 7. A web content filter that prevents users
from visiting restricted websites
D. Static
A. web filter
4. Software that runs on your computer, B. web threat filter
looking for many different types of mal-
ware from many different sources. C. spam filter
A. router D. anti-phishing software
B. port 8. What is the policy called, when everything
C. log files is allowed unless specifically denied?
D. antivirus A. Default Allow

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 594

B. Default Deny C. Packet-filtering firewall


C. Default Borrow D. Content filter
D. Default Buy 13. You have a router that is configured as
9. You have recently installed a new Win- a firewall. The router is a Layer 3 de-
dows Server 2016 system. To ensure the vice only. Which of the following does the
accuracy of the system time, you have router use for identifying allowed or de-
loaded an application that synchronizes nied packets?

NARAYAN CHANGDER
the hardware clock on the server with A. IP address
an external time source on the internet.
B. MAC address
Now, you must configure the firewall on
your network to allow time synchroniza- C. Session ID
tion traffic through.Which of the following D. Username and password
ports are you most likely to open on the
firewall? 14. An agreed-upon method for communica-
tion.
A. 80
B. 119 A. firewall

C. 110 B. router

D. 123 C. server
D. protocol
10. Of the following security zones, which one
can serve as a buffer network between a 15. A computer shared by multiple users
private secured network and the untrusted across a network. It usually contains re-
internet? sources such as files, computer applica-
A. Intranet tions, or large databases.

B. Padded cell A. router

C. Extranet B. server

D. DMZ C. LAN
D. firewall
11. Where is the optimal place to have a proxy
server? 16. Which port does Telnet use?
A. In between two private networks A. 23
B. In between a private network and a B. 25
public network
C. 80
C. In between two public networks
D. 34
D. On all of the servers
17. What types of firewalls are there:
12. Which of the following prevents access
based on website ratings and classifica- A. Hardware and Software.
tions? B. Physical and logical.
A. NIDS C. No correct answer.
B. DMZ D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 595

18. What does NGFW stand for? C. Institute that provides security ser-
A. Next-Generation Firewall vices

PRACTICE BOOK» NOT FOR SALE


B. Next-Generation Fireman D. None of the above

C. New Genetic Faults 24. POP3 is on


D. New-Generation Football A. 25

19. Which of the following is a firewall func- B. 110


tion? C. 220
A. Packet filtering D. 143
B. FTP hosting
25. Telnet is
C. Encrypting
A. 23 TCP
D. Frame filtering
B. 23 UDP
E. Protocol conversion
C. 53 TCP
20. On which OSI layer does a routed firewall D. 53 UDP
operate?
26. Software that protects sensitive data
A. Layer 3
from being exposed or exfiltrated
B. Layer 5
A. DLP
C. Layer 7
B. DAC
D. Layer 2
C. DAL
21. A inspection firewall makes decision D. DAP
about which traffic to allow based on vir-
tual circuits or sessions. 27. You provide internet access for a local
A. packet school. You want to control internet ac-
cess by user and prevent access to specific
B. stateful URLs. Which type of firewall should you
C. application install?
D. virtual A. Packet filtering
B. Circuit-level
22. On which OSI layer does a packet-filtering
firewall operate? C. Application-level
A. Layer 3 D. IPS
B. Layer 5 28. You are configuring a firewall to allow ac-
C. Layer 7 cess to a server hosted on the demilita-
rized zone of your network. You open
D. Layer 2
TCP/IP ports 80, 25, 110, and 143. As-
23. What does the acronym IPS stand for? suming that no other ports on the firewall
need to be configured to provide access,
A. private security instructions which applications are most likely to be
B. Intrusion Prevention System hosted on the server?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 596

A. Web server, DNS server, and DHCP 32. What is an essential component of IT secu-
server rity, the first line of defense from the net-
work outside the protected perimeter?
B. Web server, DNS server, and email
server A. Firewall
C. Web server and email server B. VPN
D. Email server, Newsgroup server, and C. DNS
DNS server D. Router

NARAYAN CHANGDER
29. When designing a firewall, what is the rec- 33. What is Stateful Firewalls?
ommended approach for opening and clos-
A. They use a simple policy table lookup
ing ports?
that filters traffic based on specific crite-
A. Close all ports; open ports 20, 21, 53, ria.
80, and 443. B. all of the above
B. Close all ports C. They provide stateful packet filtering,
C. Close all ports; open only ports re- using connection information held in a
quired by applications inside the DMZ. state table.
D. Open all ports; close ports that expose D. None of the above
common network attacks.
34. How does a proxy server differ from a
E. Open all ports; close ports that show packet filtering firewall?
improper traffic or attacks in progress.
A. A proxy server operates at the Applica-
30. Which of the following does a router acting tion layer, while a packet filtering firewall
as a firewall use to control which packets operates at the Network layer.
are forwarded or dropped? B. A proxy server includes filters for the
A. ACL session ID as well as the IP address and
port number.
B. IPsec
C. A proxy server can prevent unknown
C. RDP network attacks, while a packet filtering
D. VNC firewall can only prevent known attacks.
D. A proxy server is used to create a DMZ,
E. PPP
while a packet filtering firewall can only be
31. After blocking a number of ports to secure used for screened subnets.
your server, you are unable to send email.
35. You are monitoring network traffic on your
To allow email service, which of the follow-
network, and you see traffic between two
ing needs to be done?
network hosts on port 1720. What is the
A. Open port 80 to allow SNMP service. source of this network traffic?
B. Open port 80 to allow SMTP service. A. A workstation is using the DNS proto-
col to send a name resolution request to
C. Open port 25 to allow SMTP service.
a DNS server.
D. Open port 110 to allow POP3 service.
B. Someone is downloading files from a
E. Open port 25 to allow SNMP service. server using the FTP protocol.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 597

C. Someone is using voice over IP (VoIP) C. Sometimes


to make a telephone call. D. With specialist software

PRACTICE BOOK» NOT FOR SALE


D. A man-in-the-middle attack is in
progress. 41. You are investigating the use of website
and URL content filtering to prevent users
36. You have been given a laptop to use for from visiting certain websites. Which ben-
work. You connect the laptop to your com- efits are the result of implementing this
pany network, use it from home, and use technology in your organization? (Choose
it while traveling. You want to protect the two.)
laptop from internet-based attacks.Which
A. Enforcing the organization’s internet
solution should you use?
usage policy
A. Host-based firewall
B. An increase in bandwidth availability
B. Network-based firewall
C. Preventing emails containing threats
C. VPN concentrator
D. Identifying and disposing of infected
D. Proxy server content
37. An email filter that prevents irrelevant or E. Preventing phishing attempts
inappropriate email sent to a large number
of recipients 42. A Proxy Server
A. web filter A. filters web content requests like URL,
domain, media, etc.
B. web threat filter
B. is placed in front of web servers to
C. spam filter
hide, protect, offload and distribute ac-
D. anti-phishing software cess to web servers
38. Software that supports a computer’s basic C. probes a computer for open ports
functioning. D. none of above
A. operating system
43. Where is the best place to put a database
B. backdoor server?
C. network topology A. In the DMZ
D. update B. On the private network
39. A way for a computer to identify specific C. Isolated from the network
programs and manage their activity.
D. none of above
A. port
44. A computer that delivers files forming
B. router
web pages across a network to requesting
C. server clients.
D. network topology A. router
40. Can spyware be seen on your computer? B. server
A. Yes C. web server
B. No D. encrypted

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 598

45. Which of the following are characteris- D. The workstation is synchronizing its lo-
tics of a packet filtering firewall? (Select cal time with the time on the server.
two.)
A. Stateful 50. Software that scans content to identify
and dispose of phishing attempts
B. Stateless
A. web filter
C. Filters by session
D. Filters by URL B. web threat filter

NARAYAN CHANGDER
E. Filters IP addresses, but not ports C. spam filter

46. Software or a hardware device that filters D. anti-phishing software


information coming in to your computer.
51. What does a layer 3 firewall use for iden-
A. Antivirus
tifying allowed or denied packets?
B. Firewall
A. Session ID
C. Phishing
B. Username and password
D. Spyware
C. MAC address
47. DNS is on port
D. IP address
A. 23
B. 110 52. What can cookie theft be used for?
C. 53 A. Gain access to accounts
D. 3389
B. Steal your money
48. What do the initials IDS stand for? C. See what you are typing
A. integrated service institution
D. Insert Malware onto your computer
B. solution inspector
C. intrusion detection system 53. LDAP is on port
D. Intrusion Prevention System A. 389

49. You are monitoring network traffic on your B. 3389


network. You see a large amount of traf- C. 1433
fic between a Windows workstation and a
Windows server on the following ports:* D. 220
137* 138* 139 What is the source of this
network traffic? 54. Haley configures a website using Win-
A. The workstation is using NetBIOS to dows Server 2016 default values. What
access shared resources on the server. are the HTTP port and SSL port settings?

B. A denial of service (DoS) attack on the A. 80 for HTTP; 443 for SSL
server is in progress. B. 443 for HTTP; 80 for SSL
C. The workstation is accessing mes-
C. 160 for HTTP; 440 for SSL
sages from the email service on the
server. D. 440 for HTTP; 160 for SSL

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 599

55. Check the alternative that presents the 59. What is Socket Programming?
main focus of packet filters (iptables)
A. A way to filter network traffic

PRACTICE BOOK» NOT FOR SALE


A. Make filtering (allow/deny) decisions
B. A way to compress network traffic
based on packet header information.
C. A way to encrypt network traffic
B. Log all network traffic
D. A way to create network applications
C. Perform email filtering.
that communicate with each other
D. Filter log files.
60. You are monitoring network traffic on your
E. Detect various attacks and intrusions,
network, and you see traffic between two
helping to protect the environment.
network hosts on port 2427. Which kind
56. The arrangement of the various elements of network traffic uses this port?
(computers, routers, switches, etc) of a A. A workstation is using the DHCP proto-
network. col to request an IP address from a DHCP
A. services server.

B. LAN B. A ping of death attack on a network


host is in progress.
C. WAN
C. Someone is remotely accessing an-
D. network topology other system using the SSH protocol.
57. You would like to control internet access D. The MGCP protocol is generating traf-
based on users, time of day, and websites fic, which VoIP uses to send voice data
visited. How can you do this? over a network.
A. Configure the Local Security Policy of 61. The secure version of HTTP runs on port
each system to add internet restrictions.
A. 80
B. Configure a packet filtering firewall.
Add rules to allow or deny internet access. B. 443
C. Install a proxy server. Allow internet C. 143
access only through the proxy server. D. 3389
D. Enable Windows Firewall on each sys-
tem. Add or remove exceptions to control 62. You want to maintain tight security on
access. your internal network, so you restrict ac-
cess to the network through certain port
E. Configure internet zones using Inter- numbers. If you want to allow users to
net Options. continue to use DNS, which port should
you enable?
58. Firewall filtering rules are sometimes
called A. 53
A. ACLs B. 80
B. ARPs C. 42
C. APIs D. 443
D. ARLs E. 21

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 600

63. You are an administrator for a large com- D. Use a single firewall. Put the web
pany. You are setting up a computer at server and the private network behind the
a worker’s home so he can telecommute firewall.
while he recovers from surgery. You want
to connect to the UNIX server at the office 67. In cybersecurity terms, a vulnerability is a
to update his account information.Which weakness in a system that allows an at-
utility should you use to accomplish this tacker to gain unauthorized access.
task? A. WAN

NARAYAN CHANGDER
A. Telnet B. vulnerabilities
B. Traceroute C. worm
C. FTP D. backdoor
D. Ping
68. What firewall entries can be examined to
64. On which OSI layer does a transparent fire- help troubleshoot communication problems
wall operate? or identify potential attacks?
A. Layer 3 A. log entries
B. Layer 5 B. access control lists
C. Layer 7 C. filtering rules
D. Layer 2 D. encrypted packets
65. SMTP is on port 69. What do the following rules do? a)
A. 23 iptables-A INPUT-s 221.194.47.0/24-
j REJECTb) iptables-D INPUT-s
B. 24
221.194.47.0/24-j REJECT
C. 25
A. a )adds the rule in the input chain; b)
D. 110 deletes the rule from the chain
66. You have a company network that is con- B. a ) adds the rule in the input chain; b)
nected to the internet. You want all users added the rule in the destination chain
to have internet access, but you need to C. a ) adds the rule in the input chain; b)
protect your private network and users. added the rule in the destination chain
You also need to make a web server pub-
licly available to internet users.Which so- D. none of above
lution should you use?
70. A network device that controls and filters
A. Use firewalls to create a DMZ. Place data between networks, either wired or
the web server inside the DMZ and the pri- wireless. It is a specific type of “gate-
vate network behind the DMZ. way”, a device that acts as a gate be-
B. Use firewalls to create a DMZ. Place tween two networks.
the web server and the private network A. backdoor
inside the DMZ.
B. server
C. Use a single firewall. Put the web
server in front of the firewall and the pri- C. router
vate network behind the firewall. D. protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 601

71. On which layer of the OSI does a circuit B. Router


proxy filter firewall operate? C. Hub

PRACTICE BOOK» NOT FOR SALE


A. Session D. Gateway
B. Network
77. What does a router acting as a firewall use
C. Data Link to control which packets are forwarded or
D. Transport dropped?
A. ACL
72. FTP is ports
B. IPsec
A. 20
C. PPTP
B. 21
D. RDP
C. 22
D. 23 78. iptables-t filter-A INPUT-s 59.45.175.62-
j REJECTWhat is the function of this rule?
73. You have just installed a packet filtering
A. Any packet coming from 59.45.175.62
firewall on your network.Which options
will be blocked and a “connection re-
will you be able to set on your firewall?
set” or a “destination host unreachable”
(Select all that apply.)
packet will be sent.
A. Sequence number
B. Any packet coming from 59.45.175.62
B. Destination address of a packet will be blocked without any reply
C. Port number C. Any packet send to 59.45.175.62 will
D. Acknowledgement number be blocked

E. Source address of a packet D. Any packet send to 59.45.175.62 will


be blocked with reply
74. What does Firewall Do?
79. What type of firewall can reject packets
A. Prevents Hackers that are not part of an active session?
B. Install Viruses A. Circuit-level
C. Give you SD cards B. Application-level
D. Blocks all content C. VPN concentrator
75. Which of the following network services D. Packet-filtering
or protocols uses TCP/IP port 22?
80. To increase security on your company’s in-
A. SSH ternal network, the administrator has dis-
B. TFTP abled as many ports as possible. Now,
though you can browse the internet, you
C. NNTP
are unable to perform secure credit card
D. IMAP4 transactions.Which port needs to be en-
abled to allow secure transactions?
76. Which of the following is the best device
to deploy to protect your private network A. 69
from a public untrusted network? B. 21
A. Firewall C. 23

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 602

D. 80 E. PREROUTING, OUTPUT e POSTROUT-


E. 443 ING

81. A category of software firewall consists of 85. A type of software firewall installed on
applications that are installed on servers a host and used to protect the host from
used to protect network segments from network-based attacks.
other network segments. A. host firewall
A. network firewall B. statefull firewall

NARAYAN CHANGDER
B. stateful firewall C. Application Firewall
C. personal firewall D. VPN
D. Chinese great wall
86. A small startup company has hired you to
82. Your company has a connection to the in- harden their new network.Because funds
ternet that allows users to access the in- are limited, you have decided to imple-
ternet. You also have a web server and ment a unified threat management (UTM)
an email server that you want to make device that provides multiple security fea-
available to internet users. You want to tures in a single network appliance:* Fire-
create a DMZ for these two servers.Which wall* VPN* Anti-spam* AntivirusYou join
type of device should you use to create the the UTM device to the company’s Active Di-
DMZ? rectory domain. The company’s traveling
sales force will use the VPN functionality
A. IPS
provided by the UTM device to connect to
B. IDS the internal company network from hotel
C. Host-based firewall and airport public Wi-Fi networks.Which
weaknesses exist in this implementation?
D. Network-based firewall
A. The UTM device should not be joined to
E. VPN concentrator
the Active Directory domain.
83. Which of the following does a circuit proxy B. The UTM represents a single point of
filter firewall do? failure.
A. Verifies the sequencing of session C. Remote users should not establish
packets VPN connections to the internal network
B. Examines the entire message contents using public Wi-Fi networks.
C. Operates at the application layer D. Anti-spam and antivirus functions
must be placed on separate servers.
D. none of above
87. Which of the following features are com-
84. Which of the string sets below is preconfig-
mon functions of an all-in-one security ap-
ured in the NAT table of the Linux iptables
pliance? (Select two
command?
A. INPUT, FORWARD e OUTPUT A. Password complexity

B. INPUT, NAT e OUTPUT B. Content caching

C. INPUT, ROUTING e OUTPUT C. Bandwidth shaping

D. PREROUTING, FORWARD e POSTROUT- D. Quality of Service


ING E. Spam filtering

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 603

88. What is a Firewall? C. A way to encrypt network traffic


A. A device that converts data from one D. A way to compress network traffic

PRACTICE BOOK» NOT FOR SALE


format to another
93. You are configuring a network firewall to
B. A program that monitors computer us- allow SMTP outbound email traffic and
age POP3 inbound email traffic. Which of the
C. A network security system that moni- following TCP/IP ports should you open
tors and controls incoming and outgoing on the firewall? (Select two.)
network traffic A. 21
D. A method for encrypting data in transit B. 25
89. Causes data, such as the content of an C. 110
email, to be intelligible except to those D. 143
who have the proper key to decrypt it
E. 443
A. encryption
B. proxies 94. Similar to a virus except that a worm does
not need a human to spread, rather it can
C. website/URL content filtering
replicate on its own to infect other comput-
D. web threat filtering ers.

90. What is the policy called, when everything A. virus


is blocked except the traffic that has been B. worm
explicitly defined in the rulesets?
C. backdoor
A. Default Allow
D. spyware
B. Default Deny
95. In addition to examining the header infor-
C. Default Borrow
mation of the packets traversing the fire-
D. Default Buy wall, this type of firewall considers other
factors when determining whether traffic
91. The data traversing the firewall are exam- should be permitted across the firewall. It
ined for information like:the IP address of also determines whether a packet is part
the sending device, the IP address of the of an existing session, and that informa-
receiving device the type of packet (TCP, tion can be used to decide whether to per-
UDP, and so on) the port number. mit or deny a packet.
A. stateless inspection A. stateful inspection
B. statefull inspection B. stateless inspection
C. spoofing C. packet filter firewall
D. social engineering D. Chinese Great Wall
92. What is a DNS record type? 96. Choose ALL the answers for “what is the
A. An identifier for a specific domain best description of what tracking cookies
name do? ”
B. A piece of data associated with a do- A. can slow down your computer’s func-
main name tion

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 604

B. they are a virus and can be destructive keeping services that have external access
C. keep track of your searches and web- separate from the local network, is called
sites visited a

D. help target ads for your interests A. proxy


B. firewall
97. An all-in-one security appliance is best
suited for which type of implementation? C. DMZ
A. A remote office with no on-site techni- D. Intranet

NARAYAN CHANGDER
cian. E. VPN
B. An office with a dedicated network
closet. 102. Which of the following is likely to be lo-
cated in a DMZ?
C. A company that transmits large
amounts of time-sensitive data. A. Domain controller
D. A credit card company that stores cus- B. User workstations
tomer data.
C. Backup server
98. Software that is installed on a computing D. FTP server
device to prevent viruses from infecting
the device. 103. Software that secretly collects informa-
A. Antivirus tion about you. It usually resides on a
website or in a service such as your email
B. Firewall program.
C. Phishing
A. spyware
D. Spyware
B. trojan horse
99. Windows Firewall is a built-in. host- C. worm
based, firewall.
D. virus
A. Stateful
B. Network Layer 104. Stateless firewalls operate in in the
OSI model
C. Packet Filter
A. Layer 3
D. stateless
B. Layer 2
100. A web filter that prevents users from vis-
iting websites with known malicious con- C. Layer 7
tent D. Layer 5
A. web filter
105. Which port number is used by SNMP?
B. web threat filter
A. 25
C. spam filter
B. 110
D. anti-phishing software
C. 119
101. The subnet, also known as the perimeter
D. 143
network, used to transmit information be-
tween a trusted and an untrusted network, E. 161

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 605

106. iptables is used to configure, maintain 110. Which protocol and port number is used
and inspect IPv4 packet filtering rule ta- by TFTP?
bles in the Linux kernel. Several differ-

PRACTICE BOOK» NOT FOR SALE


A. UDP 69
ent tables can be defined. Each table con-
tains a number of internal chains and can B. TCP 69
also contain user-defined chains. If the C. UDP 20 and 21
network technician wanted to deny access D. UDP 67
to port 443 of a certain Linux server, the
command used in this case is represented 111. You want to install a firewall that can re-
in the alternative: ject packets that are not part of an active
A. iptables-R INPUT-h tcp dport 443-d session. Which type of firewall should you
REJECT use?

B. iptables-A INPUT-p tcp dport 443-j A. Circuit-level


DROP B. Application-level
C. iptables-L INPUT-d tcp dport 443-j C. Packet filtering
ACCEPT D. VPN concentrator
D. iptables-I INPUT-s tcp dport 443-d
112. A(n) layer firewall makes security
REJECT
decisions based on information contained
107. What can’t a firewall do? within the data portion of a packet.
A. Can’t protect against viruses. A. network

B. Stop hackers from accessing your com- B. transport


puter. C. application
C. Determines which programs can ac- D. session
cess the Internet.
113. What is DNS used for?
D. none of above
A. To convert IP addresses into domain
108. What can a virus do to your computer? names
A. Delete files B. To convert domain names into IP ad-
dresses
B. Cause inappropriate adverts to appear
C. To encrypt network traffic
C. Spy on what you are doing
D. To compress network traffic
D. Steal your infotrmation
114. Software that is spread by people, specif-
109. A process that converts human-readable ically user actions, usually through emails,
text or data into a coded from. It is usu- websites, and chats. A virus infects your
ally used to protect data from being easily computer, causing a wide variety of prob-
seen or accessed. lems.
A. HTTP A. backdoor
B. server B. services
C. encrypted C. worm
D. port D. virus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 606

115. Firewalls D. A network interface card


A. are software on the computer 121. You are looking at the output of a port
B. protect the network scan of a system. the following ports are
C. help you lock your modem/router open, 80, 443, 1433. What is type of sys-
tem is this?
D. none of above
A. Web Server
116. Which firewall implementation creates a B. File Server
buffer network that can be used to host

NARAYAN CHANGDER
C. Domain Controller
email or web servers?
D. Router
A. ACL
B. Perimeter firewall 122. Advertising software that can automati-
cally download files or link to websites. It
C. DMZ
is often unasked-for and can contain mal-
D. Host-based firewall ware.
117. On which OSI layer does a circuit-level A. network topology
proxy operate? B. trojan horse
A. Layer 3 C. adware
B. Layer 5 D. WAN
C. Layer 7 123. Your Cisco router has three network in-
D. Layer 2 terfaces configured:* S0/1/0 is a WAN
interface that is connected to an ISP.*
118. What is a virus? F0/0 is connected to an Ethernet LAN
A. Malware hidden in another file segment with a network address of
B. Any type of malware 192.168.1.0/24.* F0/1 is connected to
an Ethernet LAN segment with a network
C. A cookie address of 192.168.2.0/24.You have con-
D. A breed of gecko figured an access control list on this
router using the following rules:* deny
119. Hyper-text transfer protocol; the rules of ip 192.168.1.0 0.0.0.255 any* deny ip
communication that web sites use to ex- 192.168.2.0 0.0.0.255 anyThese rules
change data. will be applied to the WAN interface on the
A. HTTP router. Your goal is to block any IP traffic
B. TCP/IP coming in on the WAN interface that has a
spoofed source address that makes it ap-
C. protocol pear to be coming from the two internal
D. web server networks.However, when you enable the
ACL, you find that no traffic is being al-
120. What is DNS? lowed through the WAN interface. What
A. A programming language should you do?
B. A network security protocol A. Add a permit statement to the bottom
C. A decentralised naming system that of the access list.
associates domain names with IP ad- B. Apply the access list to the Fa0/0 inter-
dresses face instead of the S0/1/0 interface.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 607

C. Apply the access list to the Fa0/1 in- browse the Internet. You are able to con-
terface instead of the S0/1/0 interface. nect to this FTP server from home. What
could be blocking the connection to the

PRACTICE BOOK» NOT FOR SALE


D. Use the out parameter instead of the
in parameter within each ACL rule. server?
A. A layer-2 switch
124. What Can’t a Firewall Do?
B. A wireless access point
A. Can’t protect against viruses.
C. A firewall
B. Stop hackers from accessing your com-
puter. D. A layer-2 hub
C. Determines which programs can ac-
129. Which of the following are true about
cess the Internet.
routed firewalls? (Select two.)
D. none of above
A. Operates at Layer 2.
125. A file that contains an official record of B. Easily introduced to an existing net-
activities that occur on a computer. work.
A. log files
C. Supports multiple interfaces.
B. My Documents files
D. Internal and external interfaces con-
C. Google files nect to the same network segment.
D. Network files E. Counts as a router hop.
126. Which of the following allows you to 130. You want to transfer a file from a UNIX
track which websites your users are ac- server to Windows Server 2016. Which
cessing? of the following utilities could you use to
A. Packet-filtering firewall do this? (Select all that apply.)
B. Proxy A. FTP
C. NIDS B. Netstat
D. NIPS C. Telnet
127. A VPN solution that includes AH for au- D. TFTP
thentication and ESP for encryption; works
E. Tracert
at layer 3
A. PPTP 131. Typically considered second-generation
B. L2F firewall technology. Works in a similar
fashion to packet-filtering firewalls, but
C. L2TP operates at the transport and session lay-
D. IPsec ers of the OSI model.
A. circuit-level firewall
128. You are trying to connect to an FTP server
on the Internet from a computer in a school B. denial-of-service (DoS) attack
lab.You cannot get a connection. You try
C. demilitarized zone (DMZ)
on another computer with the same re-
sults. The computers in the lab are able to D. strong password

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 608

132. You want to allow users to download Its main role is to be a “buffer” net-
files from a server running the TCP/IP pro- work between the external and internal
tocol. You want to require user authentica- networks.IV. The configuration is carried
tion to gain access to specific directories on out through the use of Firewall equipment,
the server.Which TCP/IP protocol should which will carry out the access control be-
you implement to provide this capability? tween it, the local network and the Inter-
A. TCP net.

B. FTP A. I and III.

NARAYAN CHANGDER
C. IP B. II.

D. TFTP C. I, III and IV.

E. HTTP D. II, III and IV.


E. I and II.
133. Software that can stop malware from en-
tering a network, computer, or device. 136. You are trying to establish communica-
tions between a client computer and a
A. network topology
server. The server is not responding. You
B. virus confirm that both the client and the server
C. malware have network connectivity. Which should
you check next?
D. firewall
A. Microsoft Update
134. Which of the following are true about re-
B. Data Execution Prevention
verse proxy? (Select two.)
C. Windows Firewall
A. Handles requests from the internet to
a server in a private network. D. Active Directory Domains and Trusts
B. Clients always know they are using re- 137. What are the types of Firewalls?
verse proxy.
A. Packet-filtering Firewall, Intrusion De-
C. Handles requests from inside a private tection System, and Encryption Firewall
network out to the internet.
B. Application Firewall, Next-Generation
D. Sits between a client computer and the Firewall, and Hardware Firewall
internet. C. Web Application Firewall, Anti-virus
E. Can perform load balancing, authenti- Firewall, and Stateful Firewall
cation, and caching. D. Virtual Firewall, Software Firewall,
135. With respect to the DMZ, from the En- and Proactive Firewall
glish term “DeMilitarized Zone”, that is, 138. Which of the following describes how ac-
“Zona Demilitarizada” consider: I. Its func- cess lists can be used to improve network
tion is to keep the services that have ex- security?
ternal access separate from the local net-
work, restricting to the maximum a poten- A. An access list looks for patterns of traf-
tial damage caused by an intruder, both fic between multiple packets and takes ac-
internal and external.II. Allows external tion to stop detected attacks.
users access to specific servers located in B. An access list filters traffic based on
the perimeter network as well as their ac- the frame header such as source or desti-
cess to the internal corporate network.III. nation MAC address.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 609

C. An access list filters traffic based on B. Integrated Network Architecture.


the IP header information such as source
C. Default Gateway
or destination IP address, protocol, or

PRACTICE BOOK» NOT FOR SALE


socket numbers. D. All of the above
D. An access list identifies traffic that
143. a SQL server will have which port open
must use authentication or encryption.
A. 1433
139. You have used firewalls to create a de-
militarized zone. You have a web server B. 3389
that needs to be accessible to internet C. 143
users. The web server must communicate
D. 389
with a database server for retrieving prod-
uct, customer, and order information.How
144. Of the items below, which one(s) is (are)
should you place devices on the network
not considered a preventive safety mea-
to best protect the servers? (Select two.)
sure(s)?
A. Put the database server on the private
A. Installation of a firewall
network.
B. Put the database server inside the B. user training
DMZ. C. Information Security Policy
C. Put the web server on the private net- D. Internal audit
work
D. Put the web server inside the DMZ. 145. A filtering firewall makes decisions
about which network traffic to allow by
140. What type of servers are typically put in examining information in the IP packet
the DMZ? (choose 2) header, such as source and destination ad-
A. email servers dresses, ports, and service protocols.
B. database servers A. packet
C. web servers B. stateful
D. file servers C. application

141. One of the resources for secure access to D. proxy


your organization’s network through pub-
lic networks is to use connections of the 146. What is the difference between “DROP”
type: and REJECT” in IPtables?

A. direct A. DROP:iptables drops the packet. ; RE-


JECT:iptables “rejects” the packet with
B. virtual private network (VPN). response
C. local network.
B. DROP:and REJECT:both do the same
D. dial-up task
142. What is a Firewall? C. DROP:iptables drops the packet with a
response. REJECT:iptables “rejects” the
A. A system or group of systems that en-
packet without a response.
forces an access control policy between
networks. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 610

147. Which of the following network services C. Packet filtering firewall


or protocols uses port 69?
D. Proxy
A. POP3
B. TFTP 152. A new dialog box that appears on your
screen, sometimes without you requesting
C. NNTP
it.
D. IMAP4
A. virus
148. A method used by routers to translate

NARAYAN CHANGDER
B. adware
multiple private IP addresses into a single
registered IP address C. popup
A. NAT D. operating system
B. NAC
153. What can spyware monitor?
C. NAP
A. Websites and Keystrokes
D. NAV
B. How many dogs/cats you have
149. Enhancements, improvements, and prob-
lem fixes for software. C. Network Devices

A. operating software D. Your window


B. updated
154. The Windows Firewall protects comput-
C. worm ers from
D. services A. Email viruses
150. You manage a server that runs your B. Phishing scams
company website. The web server has
C. Unencrypted network access
reached its capacity, and the number of
client requests is greater than the server D. unauthorized network connections.
can handle.You would like to find a so-
lution so that static web content can be 155. An open standard for secure multi-
offloaded to a different server while the protocol routing; uses TCP port 1701 and
web server continues to process dynamic UDP port 500
content. Which solution should you imple- A. PPTP
ment?
B. L2F
A. Traffic shaper
B. Proxy server C. L2TP
C. QoS D. IPsec
D. Ethernet bonding
156. IMAP4 is on port
151. Which of the following solutions would A. 25
you implement to track which websites
network users are accessing? B. 220
A. Tarpit C. 143
B. NIDS D. 389

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 611

157. Which of the following functions are per- C. HTTP


formed by proxies? (Select two.)
D. FTP

PRACTICE BOOK» NOT FOR SALE


A. Filter unwanted email
E. TFTP
B. Store client files
C. Block unwanted packets from entering 162. A small local area network of computers
your private network and devices.
D. Cache web pages A. LAN
E. Block employees from accessing cer- B. WAN
tain websites C. network topology
158. One of the first VPN protocols; devel- D. short message service (SMS)
oped by Microsoft; uses TCP port 1723
A. PPTP 163. IMAP3 is on port

B. L2F A. 25
C. L2TP B. 110
D. IPsec C. 220

159. Which protocols and port numbers are D. 143


used by DHCP?
164. You manage a small network at work.
A. TCP/UDP 67 Users use workstations connected to your
B. TCP/UDP 69 network. No portable computers are al-
lowed.As part of your security plan, you
C. TCP/UDP 123
would like to scan all users’ emails. You
D. none of above want to scan the emails and prevent any e-
mails with malicious attachments from be-
160. You connect your computer to a wire- ing received by users.Your solution should
less network available at the local library. minimize administration, allowing you to
You find that you can access all the web- centrally manage the scan settings. Which
sites you want on the internet except for solution should you use?
two.What might be causing the problem?
A. Host-based firewall
A. A proxy server is blocking access to
the websites. B. Network-based firewall
B. A firewall is blocking ports 80 and 443. C. DMZ
C. The router has not been configured to D. SMTP
perform port forwarding.
D. Port triggering is redirecting traffic to 165. Filtering based on application, program or
the wrong IP address. service
A. Context Aware Application Firewall
161. Which of the following is a file transfer
protocol that uses UDP? B. Application Layer Firewall
A. POP3 C. Host-based Firewall
B. SMTP D. Network Layer Firewall

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 612

166. What is a Firewall? 171. Also known as a proxy server. Works


A. A file protection system by performing a deep inspection of appli-
cation data as it traverses the firewall.
B. An OS protection software Rules are set by analyzing client requests
C. A message encoding system and application responses, then enforcing
correct application behavior.
D. A Binary Calculation Software
A. application-level firewall
167. Which of the following are true of a cir- B. buffer overflow attack

NARAYAN CHANGDER
cuit proxy filter firewall? (Select two.)
C. Host Firewall
A. Operates at the Session layer.
D. honey net
B. Operates at the Network and Trans-
port layers. 172. Service running on Port 80 TCP is most
C. Operates at the Application layer. likely

D. Verifies sequencing of session pack- A. http


ets. B. https
E. Examines the entire message con- C. ntp
tents. D. smtp
168. Network address and port translation is 173. You allow only a small set of approved
also referred to as NAT IP addresses through the firewall. How
A. Dynamic would you call this approach?
B. One-to-one A. Default Deny
C. Port Forwarding B. Default Allow
D. Static C. Default Borrow
D. Default Buy
169. A malicious program disguised as legiti-
mate software. Users intentionally install 174. Choose ALL the answers for “good ways
a Trojan horse, thinking they are installing to avoid malware are”
valid software.
A. Use a different web browser
A. LAN
B. Don’t visit questionable sites
B. backdoor
C. Check that sites are secure (https)
C. worm
D. Delete tracking cookies and your
D. trojan horse search histories

170. On which OSI layer does an application- 175. Remote Desktop Protocol(RDP) runs on
level proxy operate? port
A. Layer 3 A. 3389
B. Layer 5 B. 389
C. Layer 7 C. 143
D. Layer 2 D. 53

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 613

176. What is the purpose of Sockets? B. Application Layer Firewall


A. o monitor network traffic C. Host-based Firewall

PRACTICE BOOK» NOT FOR SALE


B. To provide a way to transfer files over D. none of above
the internet
181. What type of firewall is designed to
C. To enable network communication be- specifically filter HTTP traffic to a web-
tween different computers or processes site?
D. To secure a network against threats A. Web Application Firewall
177. A DMZ-Demilitarized Zone-is a partially B. Software-defined Networking
protected network segment that, in order C. OS Integrated Firewall
to provide greater Internet security, must
be associated with the following protec- D. none of above
tion mechanism: 182. You recently installed a new all-in-one se-
A. proxy curity appliance in a remote office. You
B. cryptography are in the process of configuring the device.
You need to:* Increase the security of the
C. firewall device.* Enable remote management from
D. Contingency plan the main office.* Allow users to be man-
E. intrusion detection system aged through Active Directory.You want
to configure the device so you can access
178. VPN technology developed by Cisco; op- it from the main office. You also want to
erates at layer 2; does not encrypt data make sure the device is as secure as pos-
A. PPTP sible. Which of the following tasks should
you carry out? (Select two.)
B. L2F
A. Deny login from the device’s WAN in-
C. L2TP terface.
D. IPsec B. Change the default username and
179. In which of the following situations password.
would you most likely implement a demili- C. Configure the device’s authentication
tarized zone (DMZ)? type to use Active Directory.
A. You want internet users to see a single D. Deny login from all external IP ad-
IP address when accessing your company dresses.
network. E. Create an Active Directory user group
B. You want to protect a public web and add all users to the group.
server from attack.
183. You administer a web server on your
C. You want to detect and respond to at- network. The computer has multiple
tacks in real time. IP addresses. They are 192.168.23.8
D. You want to encrypt data sent between to 192.168.23.17. The name of the
two hosts using the internet. computer is www.westsim.com.You con-
figured the website as follows:* IP ad-
180. Filtering of ports and system service calls dress:192.168.23.8* HTTP Port:1030*
on a single computer operating system SSL Port:443Users complain that they
A. Network address Translation Firewall can’t connect to the website when they

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 FIREWALLS 614

type www.westsim.com.What is the most made a connection to your Windows


likely source of the problem? Server 2016 system using TCP/IP port 21.
A. The HTTP port should be changed to Which of the following actions is the re-
80. mote system most likely performing?
B. FTP is not configured on the server. A. Downloading a file
C. Clients are configured to look for the B. Downloading email
wrong IP address.
C. Downloading a web page

NARAYAN CHANGDER
D. SSL is blocking internet traffic.
D. Performing a name resolution request
184. What is a worm?
A. Malware that copies to other PCs 186. Which of the following are characteristics
across a network of a circuit-level gateway? (Select two.)
B. A creature stuck inside your pc case A. Stateful
C. A virus B. Stateless
D. A virus that enters into your system via
C. Filters by session
another file
D. Filters by URL
185. In the output of the netstat command,
you notice that a remote system has E. Filters IP addresses, but not ports

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS

You might also like