Você está na página 1de 10

NEW YORK STATE FBLA NETWORKING CONCEPTS

2009
PLEASE DO NOT OPEN THIS TEST UNTIL DIRECTED TO DO SO
Test Directions 1. Complete the information requested on the answer sheet. PRINT YOUR NAME on the Name line. PRINT the name of the event, NETWORKING CONCEPTS on the Subject line. PRINT the name of your CHAPTER on the DATE line. 2. All answers will be recorded on the answer sheet. Please do not write on the test booklet. Scrap paper will be provided. 3. Read each question completely before answering. With a NO. 2 pencil, blacken in your choices completely on the answer sheet. Do not make any other marks on the answer sheet, or the scoring machine will reject it. 4. You will be given 60 minutes for the test. You will be given a starting signal and a signal after 50 minutes have elapsed. 5. Tie will be broken using the last 10 questions of the test.

NYS FBLA SLC 2009 NETWORKING CONCEPTS

1. Peripheral ____ sharing enables groups of users to take advantage of peripherals and other devices attached directly to a network or to a generally available computer attached to a network. a. domain c. device b. group d. control 2. A(n) ____ is a network of networks or a networked collection of LANs tied together by devices such as routers. a. internetwork c. MAN b. Internet d. WAN 3. ____ use WAN technologies to interconnect LANs in a specific geographic region. a. WPANs c. Internetworks b. MANs d. Peer-to-peer networks 4. In ____ networking environments, certain computers take specialized roles and function mainly as servers, and ordinary users machines tend to function mainly as clients. a. LAN c. peer-to-peer b. internetwork d. client/server 5. Computers that participate on a network run a ____ that determines what services that computer can offer or request. a. NOS c. domain b. WPAN d. controller 6. Networks fall into two major types: peer-to-peer and client/server (also called ____). a. domain controlled c. workgroup model b. server-based d. Web enabled 7. A(n) ____ attached to each end of a cable prevents signals from bouncing on a physical bus. a. server c. access point b. hub d. terminator 8. On a bus network, open ends in a cable segment must be terminated to prevent ____. a. signal propagation c. signal bounce b. cable breaks d. cable termination 9. A physical bus topology is almost always implemented as a logical ____ topology. a. ring c. bus b. switching d. mesh 10. All computers, no matter what their topology, communicate in the same way: They address data to one or more computers and then transmit that data across the cable in the form of ____. a. bits c. bps b. bytes d. electronic signals 11. At the center of a logical ring implemented as a physical star is a device called a(n) ____. a. hub c. concentrator b. switch d. access point 12. In the simplest wireless configuration, two computers can communicate directly with one another in a(n) ____ topology. a. access point c. infrastructure mode b. point-to-point d. ad hoc

13.

14.

15.

16.

17.

18.

19.

20.

21.

22.

23.

24.

25.

26.

27.

NYS FBLA SLC 2009 3 NETWORKING CONCEPTS A ____ network topology is the most fault tolerant one. a. ring c. bus b. mesh d. star The mesh topology formula for determining how many connections are needed for the number of nodes on a network, with n representing the number of nodes on the network is: ____. a. n(n-1)/2 c. n(n+1)/2 b. n*n/2 d. n*n-1 The majority of hubs installed in networks today are ____ hubs. a. active c. repeating b. passive d. switching In a(n) ____ hub, such as a patch panel or punchdown block, the signal passes through the hub without any amplification or regeneration. a. active c. repeating b. passive d. switching A hub-based bus topology should be considered if a small network (____ or fewer computers) is being constructed and keeping costs down is paramount. a. 5 c. 25 b. 10 d. 50 A hub-based ____ topology might be considered if a few computers are being added to an existing network, and the new computers are grouped in a somewhat remote location. a. bus c. ring b. star d. mesh A central device, usually a(n) ____, sits in the middle of the extended star topology. a. hub c. switch b. concentrator d. access point Shielding works like a form of built-in ____, a type of metal or plastic pipe built specifically to contain cabling. a. braiding c. insulation b. sheath d. conduit 10Base5 refers to ____. a. thicknet c. Category 5 UTP b. thinnet d. Category 6 UTP ____ encloses each pair of wires within a foil shield as well as an enclosing insulating sheath. a. TP c. STP b. UTP d. ScTP 10BaseT refers to ____. a. TP c. STP b. UTP d. ScTP Category ____ cable is labeled as voicegrade. a. 1 c. 3 b. 2 d. 4 Category ____ cable is labeled as datagrade. a. 1 c. 3 b. 2 d. 4 Whether STP or UTP, twisted-pair network cabling most commonly uses ____ connectors to plug into computer network interfaces or other networked devices. a. BNC c. RJ-45 b. MT-RJ d. RJ-11 ____ is not a fiber-optic connector.

28.

29.

30.

31.

32.

33.

34.

35.

36.

37.

38.

39.

40.

NYS FBLA SLC 2009 4 NETWORKING CONCEPTS a. BNC c. SC b. ST d. LC ____ is not a fiber-optic connector. a. MIC c. MT-RJ b. SMA d. RJ-45 ISA is a type of ____. a. PCMCIA standard c. computer bus b. adapter slot d. network adapter In a NIC, ____ are the fundamental unit of data for network transmission and reception. a. bits c. packets b. segments d. frames Some NICs can operate in whats called ____ modeessentially, this mode turns off the gatekeeper functions and enables the NIC to forward any frames it sees to the computer. a. promiscuous c. sniffing b. forwarding d. analyzing MAC addresses take the form of ____ two-digit hexadecimal numbers separated by colons. a. four c. six b. five d. seven ____ cards are credit-card-size expansion cards used primarily to add functionality to laptop computers. a. USB c. NIC b. FireWire d. PCMCIA The ISA bus originally appeared in the first PCs in a(n) ____-bit form. a. 8 c. 32 b. 16 d. 64 The PCMCIA bus size is ____ bits. a. 8 c. 32 b. 16 d. 64 With respect to data transfer speeds of wireless NICs, the most common choices today are 11 Mbps or ____ Mbps. a. 22 c. 54 b. 50 d. 100 Wireless NICs can operate at speeds faster than 100 Mbps by using the ____ technology. a. IEEE 802.11a c. IEEE 802.11i b. IEEE 802.11g d. IEEE 802.11n The PDU at the Transport layer is called a ____. a. message c. frame b. segment d. packet The job of the ____ to convert bits into signals for outgoing messages and signals into bits for incoming messages. a. Data Link layer c. MAC sublayer b. LLC sublayer d. Physical layer A frame is usually addressed to only one computer and is called a ____ frame. a. basic c. broadcast b. unicast d. Multicast

41. The IEEE standard ____ covers all forms of Ethernet media and interfaces, from 10 Mbps to 10 Gbps (10 Gigabit Ethernet). a. 802.2 c. 802.5

42.

43.

44.

45.

46.

47.

48.

49.

50.

51.

52.

53.

54.

NYS FBLA SLC 2009 5 NETWORKING CONCEPTS b. 802.3 d. 802.11 The IEEE standard ____ covers error control and flow control over data frames. a. 802.2 c. 802.5 b. 802.3 d. 802.11 The IEEE standard ____ sets standards for wireless networking for many different broadcast frequencies and techniques. a. 802.3 c. 802.15 b. 802.11 d. 802.16 ____ functions at the Application layer of the OSI reference model. a. UDP c. PPP b. ARP d. HTTP ____ functions at the Transport layer of the OSI reference model. a. PPP c. IPX b. IP d. SPX ____ functions at the Network layer of the OSI reference model. a. PPP c. IPX b. UDP d. SPX ____ is the TCP/IP protocol responsible for reliable delivery of data. a. SPX c. TCP b. UDP d. FTP ____ is a nonroutable protocol. a. NetBEUI c. IPX b. IP d. SPX ____ is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to provide connectivity between dissimilar systems. a. FTP c. SNMP b. Telnet d. SMTP An IP address is divided into two distinct parts: one part designates the logical network the computer is a part of, while the remainder of the address represents the ____. a. NICs MAC address c. host ID b. domain name d. subnet mask Class ____ addresses begin with network IDs between 128 and 191. a. A c. C b. B d. D Class ____ networks are limited to 254 hosts per network. a. B c. D b. C d. E Class ____ addresses are reserved for experimental use and cannot be used for address assignment. a. A c. D b. C d. E 10BaseT Ethernet uses Category ____ or higher UTP cable. a. 2 c. 4 b. 3 d. 5

55. ____ defines Gigabit Ethernet over fiber-optic cable. a. 1000BaseX c. 1000BaseC b. 1000BaseF d. 1000BaseO

56.

57.

58.

59.

60.

61.

62.

63.

64.

65.

66.

67.

NYS FBLA SLC 2009 6 NETWORKING CONCEPTS ____ uses specially shielded, balanced, copper jumper cables. a. 1000BaseT c. 1000BaseSX b. 1000BaseTX d. 1000BaseCX The ____ frame type is sometimes called Ethernet raw. a. Ethernet 802.2 c. Ethernet SNAP b. Ethernet 802.3 d. Ethernet II The ____ frame type is generally used on the AppleTalk Phase 2 networks. a. Ethernet 802.2 c. Ethernet SNAP b. Ethernet 802.3 d. Ethernet II ____ frames are used in TCP/IP networks. a. Ethernet 802.2 c. Ethernet SNAP b. Ethernet 802.3 d. Ethernet II One unique aspect of the token ring network architecture is its capability to isolate faults automatically by using a process called ____. a. beaconing c. switching b. polling d. contention ____ is the AppleTalk protocol running over a 10 Mbps IEEE 802.3 network. a. LocalTalk c. TokenTalk b. EtherTalk d. BusTalk A ____ is a logical organization of disk space, in which each portion appears as a separate logical drive. a. tree c. share b. partition d. file system ____ systems are good for testing and learning purposes, but they can compromise security in networks that are in actual business use. a. Multiple-boot c. Multiple-partition, single-NOS b. Single-partition, single-NOS d. Fault-tolerant storage ____ systems are useful for separating data from OS files on large drives but increases the level of drive activity and can degrade the life of the drive more quickly. a. Multiple-boot c. Multiple-partition, single-NOS b. Single-partition, single-NOS d. Fault-tolerant storage ____ systems have the most secure NOS host drive configuration. a. Multiple-boot c. Multiple-partition, single-NOS b. Single-partition, single-NOS d. Fault-tolerant storage A ____ is the method by which an OS stores, organizes, and manages access to files on a mass storage device, such as a hard drive. a. directory tree c. share b. partition d. file system After an exported NFS portion, known as an NFS ____, is published on the network, authorized users with NFS client capability can install, or mount, the volume in their local file systems into a local directory on their hard disk. a. mount point c. share b. volume d. Partition

68. Mac OS X negates the need for Windows servers to install special services for Macintosh computers or AppleTalk protocols because it provides support for native Windows file sharing through ____ services. a. SMB c. NIS b. CIFS d. NFS

NYS FBLA SLC 2009 NETWORKING CONCEPTS 69. Mac OS X is built on a(n) ____ core. a. Windows b. UNIX

c. NetWare d. Apple

70. In ____, mainframes perform all processing, and dumb terminals connect directly to the mainframe. a. peer-to-peer systems c. centralized computing b. grid computing d. client/server computing 71. PCs and so-called ____ clients attached to a terminal server of some kind can access a mainframe. a. dumb c. remote b. mobile d. thin 72. Encryption prevents somebody using eavesdropping technology, such as a(n) ____, from capturing packets and using data in the packets for malicious purposes. a. IDS c. rootkit b. VPN d. packet sniffer 73. The most popular method for encrypting data as it travels network media is to use an extension to the IP protocol called ____. a. SSL c. IPSec b. VPN d. SSH 74. IPSec works by establishing a(n) ____ between two communicating devices. a. circuit c. association b. channel d. tunnel 75. ____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers. a. Digital c. PAM b. Kerberos d. VPN 76. On Linux systems, a simple method to encrypt files involves using a command-line program called ____. a. gpg c. ipsec b. efs d. tar 77. A common disk configuration is to use RAID ____ (disk striping with parity) on data drives. a. 1 c. 4 b. 2 d. 5 78. Disk mirroring (with RAID) requires ____ equal-size disk partitions on separate drives. a. two c. four b. three d. five 79. Using ____ is an acceptable solution to connecting a small group of computers, but switches are preferable. a. repeaters c. bridges b. hubs d. routers 80. ____ Ethernet switches are the norm today. a. 10 Mbps c. 1000 Mbps b. 100 Mbps d. 10 Gbps

81. A(n) ____ switch has a number of advanced configuration options and can sometimes gather network data on a per-port basis. a. smart c. managed b. intelligent d. Layer 3 82. Windows Server 2003 with ____ can serve as a dial-up remote access server and offers a number of advanced features for managing and securing dial-up connections.

83.

84.

85.

86.

87.

88.

89.

90.

91.

92.

NYS FBLA SLC 2009 8 NETWORKING CONCEPTS a. MMC c. RRAS b. DHCP d. GroupWise In addition to the groups to which you can assign them, users are added to certain groups automatically when they log on, and you cant change these memberships. Microsoft refers to these groups as ____. a. default groups c. special groups b. default identities d. special identities In Linux, a variety of log files are maintained that report on system and user activity, many of which can be found in the ____ directory. a. /etc/log c. /log b. /var/log d. /dev/log You can draw conclusions about server activity by observing details of ____, such as connections between network devices and the server, the rate at which connections to the server are made, and how those connections are broken, whether by a normal logoff, an error, or a server timeout. a. spoofed packets c. server sessions b. data reads and writes d. server events A(n) ____ is any system component or resource thats accessible to a user program in Windows, such as the CPU on a system or the IP protocol. a. event c. counter b. object d. class In Windows, a(n) ____ is a certain part of an object that tracks an aspect of its behavior. a. event c. counter b. object d. class One of the most widely used high-speed digital lines is the ____, a DDS technology that uses two two-wire pairs to transmit full-duplex data signals at a maximum rate of 1.544 Mbps. a. ISDN c. T1 b. ADSL d. T3 ____ is a digital communications technology developed in 1984 to replace the analog telephone system. a. Switched 56K c. T1 b. ISDN d. T3 ____ leased lines are an older, digital, point-to-point communication link offered by local and long-distance telcos. a. Switched 56K c. T1 b. ISDN d. T3 ____ virtual circuits are similar to leased lines, in that the pathway between two communication points is established as a permanent logical connection; therefore, the pathway exists even when its not in use. a. Automatic c. Permanent b. Switched d. Manual ____ virtual circuits are established when needed and then terminated when the transmission is completed. a. Automatic c. Permanent b. Switched d. Manual

93. A(n) ____ measures a cables resistance and determines whether a cable break occurred. a. DVM c. cable tester b. TDR d. Oscilloscope

94. Unlike a DVM, a(n) ____ can pinpoint how far from the device the break is located by sending an electrical pulse down the cable that reflects back when it encounters a break or short.

95.

96.

97.

98.

99.

100.

NYS FBLA SLC 2009 9 NETWORKING CONCEPTS a. protocol analyzer c. cable tester b. TDR d. oscilloscope ____ are excellent tools for checking patch cables and testing for correct termination of a cable at the patch panel and jack. a. TDRs c. DVMs b. Oscilloscopes d. Cable testers ____ function at both the Physical and Data Link layers of the OSI model. a. TDRs c. DVMs b. Oscilloscopes d. Advanced cable testers When used with a TDR, a(n) ____ can help identify shorts, sharp bends or crimps in a cable, cable breaks, and attenuation problems. a. DVM c. oscilloscope b. protocol analyzer d. cable tester ____ are software packages that can track all or part of the network traffic. a. DVMs c. TDRs b. Network monitors d. Oscilloscopes Perhaps the most advanced network troubleshooting device available, a(n) ____ evaluates the networks overall health by monitoring all traffic. a. protocol analyzer c. oscilloscope b. network monitor d. TDR ____ is a popular free protocol analyzer is available for both Windows and Linux/UNIX environments. a. Ethereal c. WildPacket EtherPeek b. Network General Sniffer d. Fluke Network Protocol Inspector

NYS FBLA SLC 2009 NETWORKING CONCEPTS ANSWER KEY


1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. C A B D A B D C C D C D B A A B B A C D A C B A D 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. C A D C D A C D A C C D B D B B A B D D C C A B C 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. B B D B A D B C D A B B A C B D B A B C D D C C B 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. A D A B B C C D B C B C C B A C C A B D D C B A A

10

Você também pode gostar