On Tap Q3V2 Network

download On Tap Q3V2 Network

of 35

Transcript of On Tap Q3V2 Network

  • 8/8/2019 On Tap Q3V2 Network

    1/35

    Radio waves are limited to lowtransmission capacities from________. 1,1bps to 5bps 2,1bps to 8bps 3,1bps to 10bps

    4,1bps to 6bps1

    The ________ connects nodesover a network using a centralcontrol unit called the hub.

    1,Cellular category 2,Meshodel 3,Star topology 4,Bus topology 3

    Which of the followingstatements is NOT trueregarding networks?

    1,Networks enable sharingof information acrosstheultiple computers.

    2,Networks can bedivided into fournetwork topologies:esh,cellular, star, and

    bus.

    3,Networks enablecentralization of datanagement.

    4,The first network called the ARPANETwas created by DODwith the help of Advanced ResearchProjects Agency

    (ARPA).

    2

    Consider the followingstatements:

    Statement A: The resources andsoftware capabilities that areshared by the nodes in anetwork are commonly knownas services.

    Statement B: The commonservices provided in a network include file, print,essage,application, and database

    1,Statement A is True andStatement B is False.

    2,Statement A isFalse and StatementB is True.

    3,Both, Statement Aand Statement B, areTrue.

    4,Both, Statement Aand Statement B, areFalse. 3

  • 8/8/2019 On Tap Q3V2 Network

    2/35

    services.

    Which of the following is truewith respect to the abovestatements?Consider the followingstatements:

    Statement A: Server is acomputer with high processingpower, which provides servicesto the other computers in anetwork.

    Statement B: In a client-servernetwork setup, the server is notresponsible for processing therequests sent by the clients.

    Which of the following is truewith respect to the abovestatements?

    1,Statement A is True andStatement B is False.

    2,Statement A isFalse and Statement

    B is True.

    3,Both, Statement Aand Statement B, are

    True.

    4,Both, Statement Aand Statement B, are

    False.

    1

    ARPA stands for __________. 1,Advanced RepeaterProjects Agency

    2,AdvancedResearch ProjectsAdministration

    3,Advanced ResearchProjects Agency

    4,Advanced RearProjects Agency 3

    In case of fiber-optic cables,which transmissionode is usedfor transmitting data over longdistances?

    1,Multimode 2,Singleode 3,Infrared 4,Radio 2

  • 8/8/2019 On Tap Q3V2 Network

    3/35

    Infrared transmissions supportup to ________ at shorterdistances.

    1,16bps 2,10bps 3,100bps 4,50bps 1

    Which of the followingstatements is true for coaxialcables?

    1,It uses copper wires,which are good conductorsof electricity.

    2,Coaxial cablesprovide effectiveprotection againstEMI during datatransmissions.

    3,It uses light raysinstead of electricity totransmit data.

    4,It can bedifferentiated into thetwo categories, single-mode andultimode.

    2

    Consider the followingstatements:

    Statement A: The bus topologyconnects all the nodes on anetwork to aain cable called bus.

    Statement B: In the bustopology, each packet that isplaced on the bus contains theaddress of the destination nodeand is transmitted only in onedirection along the bus.

    Which of the following is truewith respect to the abovestatements?

    1,Statement A is True andstatement B is False.

    2,Statement A isFalse and statementB is True.

    3,Both, Statement Aand statement B, areTrue.

    4,Both, Statement Aand statement B, areFalse.

    1

    Which of the following protocolsuites is used forcommunication betweenpersonal computers

    1,TCP/IP 2,IPX/SPX 3,DLC 4,AppleTalk 3

  • 8/8/2019 On Tap Q3V2 Network

    4/35

    andainframes (IBM Hosts)?

    In the __________ transmission,only one node can transmit dataat a time.

    1,Simplex 2,Half-duplex 3,Duplex 4,MAC 1

    Logical Link Control (LLC)andedia Access Control (MAC)are two sublayers of __________.

    1,Data Link layer 2,Network layer 3,Transport layer 4,Session layer 1

    Which of the following is trueabout the Internet Protocol?

    1,It enables reliableconnection-oriented datatransfers between the twonodes.

    2,It guaranteesdelivery of datapackets.

    3,It performs errorreporting anddatagramfragmentation andreassembly.

    4,It enables theexchange of electronicails (e-mails)between two nodes.

    3

    Consider the followingstatements:

    Statement A: Telnet enablesremote login for users.

    Statement B: File TransferProtocol (FTP) allows transferof files between local andremote hosts.

    Which of the following is truewith respect to the abovestatements?

    1,Both, statement A andstatement B, are False.

    2,Both, statement Aand statement B, areTrue.m

    3,Statement A is Trueand statement B isFalse.m

    4,Statement A is Falseand statement B isTrue.m

    2

    Consider the followingstatements:

    1,Both, Statement A andstatement B, are True.

    2,Both, Statement Aand statement B, are

    3,Statement A is Trueand statement B is

    4,Statement A is Falseand statement B is 4

  • 8/8/2019 On Tap Q3V2 Network

    5/35

    Statement A: The Applicationlayer converts the raw data bitsfrom the physical layer intoframes.

    Statement B: The Data Link layer converts the raw data bitsfrom the Physical layer intoframes.

    Which of the following is truewith respect to the abovestatements?

    False. False. True.

    Which of the following layerscontains a number of protocolsthat provide services, such as e-mails, Web browsing, andremote login by users?

    1,Application layer 2,Internet layer 3,Transport layer 4,Network Accesslayer

    1

    Which of the following is usedto identify the best path forsending data packets over anetwork?

    1,Routing 2,Packet switching 3,Multicasting 4,Multiplexing 1

    Earthen Wares Inc. had anetwork of 200 computers.Recently, the company hasundergone aajor expansion and300 more employees have beenrecruited. The network has now

    1,Implement repeaters tostrengthen the networkingsignal.

    2,Implement a hubandanage thenetwork centrally.

    3,Segment the network and use a bridge toconnect the segments.

    4,Use a CSU/DSU toconnect computers of the network.

    3

  • 8/8/2019 On Tap Q3V2 Network

    6/35

    expanded to 500 computers.Network users are nowcomplaining of aajor slow downin the network speed. Whatshould Timothy Burt, thenetwork administrator, do toincrease the speed of thenetwork?

    The Network layer isresponsible for:

    1,Providing unique network addresses to each nodewithin the network

    2,Transforming databits from thePhysical layer intogroups calledframes

    3,Providing theinterface between theuser and the network

    4,Encoding anddecoding data inautually agreeableformat

    1

    Consider the following

    statements:

    Statement A: The IEEE 802.1LAN standard providesinformation regarding theprerequisites for the interface of LAN standards.

    Statement B: The IEEE 803.2 isa part of the Logical Link Control (LLC) sub-layer of the

    Data Link layer.

    Which of the following is truewith respect to the abovestatements?

    1,Both, statement A andstatement B, are False.

    2,Both, statement Aand statement B, areTrue.

    3,Statement A is Trueand statement B isFalse.

    4,Statement A is Falseand statement B isTrue.m

    3

  • 8/8/2019 On Tap Q3V2 Network

    7/35

    Diane Frye is a network administrator at Supersoft2000.She is giving a presentation onSNA protocol suite to her

    juniors. One of her juniors asksher if there is a protocol in theSNA suite that supports remoteconnections through leased ordialup connections and providespoint-to-point,ultipoint, half-duplex, and full-duplextransactions. Which protocol of the SNA suite has thesefeatures?

    1,DIA 2,SDLC 3,VTAM 4,APPN 2

    New Sky Infotec has a network consisting of 800 computers.Recently, the network traffic hasbecome increasingly slow. Thenetwork administrator, JohnDalton, has decided to segmentthe network into two parts with400 computers in each segment.Each network uses differenttopologies. Which of thefollowing devices should he useto connect these two networks?

    1,Router 2,Gateway 3,Brouter 4,Bridge 1

    Red Sky IT System has itsainoffice in New York that has 200computers. There are twobranch offices located in Detroit

    1,X.25 2,ATM 3,SONET 4,SDH 1

  • 8/8/2019 On Tap Q3V2 Network

    8/35

    and New Jersey consisting of two computers each. Theorganization wants toimplement a fast as well as costeffective way ofaintainingconnectivity between all theoffices using digital lines.Which of the followingtechnologies should theorganization implement toeetthe requirement?

    Which of the followingcomponent displays thestructure of the systemdirectory?m

    1,Windows Explorer 2,My Computer 3,Internet Explorer4,My Network Places

    1

    Which of the followingpermissions enables a user toakechanges to subfolders, displayattributes and permissions, aswell as to run executable filetypes?

    1,Change 2,Execute 3,Write4,Read

    2

    You have purchased aninternalodem and installed it onyour Windows 2000

    Professional computer. Eventhough the vendor has told you,that the device is plug and play,Windows 2000 does not detect

    1,From the Control Panel,

    using the Add NewHardware option.

    2,Using the Display

    properties in theControl Panel.

    3,From the ControlPanel, using theAdd/Removehardware option.

    4,From theDeviceanager, usingthe Add New Hardwareoption.

    3

  • 8/8/2019 On Tap Q3V2 Network

    9/35

    it. How can you install thedriver for theodem provided bythe vendor?m

    Web pages can be loaded ontothe desktop and automaticallyupdated from the Web. Thistype of operation is referred toas _________.

    1,Duplexing2,Active Channel

    m3,Active Desktop

    4,Mirroring

    m2

    __________ stores deleted filesand enables you to retrieve thefiles when they are deletedbyistake.

    1,History folder2,Recent folder

    m3,Recycle Bin

    4,My Computer

    m3

    ___________ are pieces of

    retrievable information storedon the Web browser by the Webserver.m

    1,Cookies2,History

    m3,Favorites

    4,NetHood

    m1

    Files and folders can beencrypted from the commandline using the _____ command.

    1,Mem 2,Cipher 3,Ver 4,Setver 2

    Which of the followingWindows 9x components isused to hold information about

    the system hardware that hasbeen identified by theenumeration or detectionprocesses of the Plug-and-Playsystem?

    1,Registry 2,GDI 3,USER Files 4,Kernel 1

  • 8/8/2019 On Tap Q3V2 Network

    10/35

    m

    Jack, the System Administratorof Global Infosystems, needs toconnect the offices of theorganization located across thecity. All the offices need to beinterconnected so thatinformation can be sharedamong them. One of the officeworks on Linuxachines whilethe other offices run onWindows environment orNovell Netware environment.Which of the followingprotocols is suitable in such asituation?

    1,He should install andconfigure NWLink protocolon all theachines.

    2,He should installand configure AppleTalk protocol on alltheachines.

    3,He should install andconfigure TCP/IPprotocol on alltheachines.

    4,He should install andconfigure NetBEUIprotocol on alltheachines

    3

    David Wong is a networkingintern at Certified Carriers. Heis studying the IPX/SPXprotocol suite as part of hisnetworking project. He islooking for a protocol thatprovides fast and connectionlessservice. In addition, it shouldalso be able to provide routing

    services. Which protocol wouldbest suit his requirements?m

    1,SAP2,IPXm

    3,SPXm 4,RIP 2

    William, the network 1,DB-25 2,RJ-45 3,T-Connectors 4,DB-9 3

  • 8/8/2019 On Tap Q3V2 Network

    11/35

    administrator at EarthenWareSystems, needs to set up a LANof 15 computers based on thebus topology using coaxial

    cables. Determine the type of connector that will be used toconnect the computers.

    FernTech Inc. uses an ISDN lineto connect its offices located inNew York and Boston. George,the network administrator of FernTech connects the router atthe New York office to the linein order to establish theconnection between the twonetworks. However, after thecompany office shifts to the newbuilding, the network faces EMIproblems on the line. Predict thepossible cause for this problem.

    1,The router is defectedbecause of which theelectro-magneticinterferences haveincreased.

    2,The CSU unit isdefected because of which the electro-magnetic

    interferences haveincreased.

    3,The internal LANtransmission isdefected because of which the electro-

    magnetic interferenceshave increased.

    4,The atmosphere isnot clear because of which the electro-magnetic interferenceshave increased.

    2

    The Data Link layer isresponsible for:

    1,Providing unique network addresses to each nodewithin the network

    2,Transforming databits from thePhysical layer intogroups calledframes

    3,Controlling thenetwork traffic

    4,Organizingessagesinto segments orbreaking largesegments into smallersegments

    2

    Consider the followingstatements:

    Statement A: In Duplex

    1,Statement A is True andStatement B is False.

    2,Statement A isFalse and StatementB is True.

    3,Both, Statement Aand Statement B, areTrue.

    4,Both, Statement Aand Statement B, areFalse.

    4

  • 8/8/2019 On Tap Q3V2 Network

    12/35

    transmission, either node cantransmit while the other nodecan receive data.

    Statement B: In half-duplextransmission, both the nodes cantransmit as well as receive dataat the same time.

    Which of the following is truewith respect to the abovestatements?

    Consider the followingstatements:

    Statement A: The IEEE 802.3standard is used for 1-persistentCSMA/CD (Carrier SenseultipleAccess/ Collision Detection)LAN, which is commonlyknown as Ethernet.

    Statement B: Using the CSMAprotocol, a node transmits datapackets whenever it finds thechannel or the transmissionediaidle.

    Which of the following is true,with respect to the above

    1,Both, statement A andstatement B, are False.

    2,Both, statement Aand statement B, areTrue.

    3,Statement A is Trueand statement B isFalse.

    4,Statement A is Falseand statement B isTrue. 2

  • 8/8/2019 On Tap Q3V2 Network

    13/35

    statements?m

    Red Infosystems is setting up anetwork for 100 computers toaccommodate new recruits in itsproduction department.Theanagement wants thenetwork to be efficient and hasinstructed the network administrator, Keith Turner, toensure this, while setting up thenetwork. In order to establish anefficient network, Keith hasdecided to subnet the network.The network address allocatedfor this network is 194.168.10.0.Keith has decided to divide thenetwork into four subnets.Determine the subnetask for thisnetwork.

    1,255.255.255.240 2,255.255.192.0 3,255.255.256.0 4,255.255.224.0 1

    An internetwork is using theTCP/IP protocol suite forcommunication. This network isused for downloadingusicandovie files, which can be

    viewed using onlineusic andoviesoftware. Determine the layeron which this software will run.

    1,Internet layer 2,Network Accesslayer

    3,Application layer 4,Transport layer 3

    Jim needs to create a TCP/IP 1,One for each subnet and 2,One for each 3,One for each subnet 4,One for each network 2

  • 8/8/2019 On Tap Q3V2 Network

    14/35

    addressing scheme for hisorganization. Howany network Ids heust allow while definingthe subnetask for the network?

    host ID subnet and WANconnection

    and each routerinterface

    adapter installed oneach host and eachrouter interface

    David is a network administrator in SuperGraphicsInc. The network in hisorganization uses an address of 172.30.0.0/16. He will initiallyneed 25 subnets with 1000 hostsin each subnet. Thereight be aneed for 55 subnets. Whichsubnetask should Davidconfigure toeet theserequirements?

    1,255.255.240.0 2,255.255.248.0 3,255.255.252.0 4,255.255.254.0 3

    Simon, the network administrator at ITech Inc, hasreceived complaints regardingthe slow rate of data transferover the network. Afterchecking the speed and flow of data, Simon wants to check theroute being used for datatransfer and theaximum numberof hops in the path to thedestination host. Which utilitywill help him find out thisinformation?

    1,Simon will need to use thePing utility with the /countoption to check the hopcount and the path of datatransfer.

    2,Simon will needto use the IPConfigutility with the

    /renew option tocheck the latestinformation aboutthe path used by therouter.

    3,Simon will need touse the TFTP serviceto check the rate of data transfer and thenapply the IPConfigutility with the /renewoption to check thecount option to check current number of

    hops used in the path.

    4,Simon will need touse the tracert utility tocheck the path of therouter and apply the hoption to check theaximum number of hops in the path to thedestination host.

    4

    Tim Hogan is the network 1,Tim needs to allocate 2,Tim needs to 3,Tim needs to assign 4,Tim needs to assign a 4

  • 8/8/2019 On Tap Q3V2 Network

    15/35

    administrator for RedInternational Inc. He is settingup a private network for theorganization and has set up the

    DHCP server to allocate IPaddresses dynamically to thehosts and theail server.However, after a week of installing the network, Timobserves that the hosts are notable to connect to theail server.What is the possible cause forthis problem?

    addresses statically. configure theTCP/IP defaultgateway.

    a specific port numberto theail server.

    reserved IP address totheail server.

    Tom Grant is the network administrator at Global SystemsInc. He needs to design thenetwork setup for hisorganization.ore than 1650000hosts will be connected in thenetwork. Which IP addressingclass would besteet hisrequirement?

    1,Class C 2,Class D 3,Class A 4,Class B 3

    Shawn is downloading hisfavorite jigsaw puzzle throughthe Internet. The file isdownloaded as an HTML Webpage. Assuming that the TCP/IPprotocol is used for performingthis task, which layer(s) is usedto download the file and save it

    1,The file is downloaded atthe Application layer and issaved on the Transportlayer.

    2,The file isdownloaded andsaved at theApplication layer.

    3,The file isdownloaded at the

    Application layer andis saved on thePresentation layer.

    4,The file is

    downloaded and savedat the Internet Layer.

    2

  • 8/8/2019 On Tap Q3V2 Network

    16/35

    in the correct format onShawns computer?

    Two subnets need to be createdfor a Class C network implemented in EarthenWares.Determine the number of hoststhat can exist within a subnet.

    1,8190 2,64 3,62 4,8868 3

    Red Square Inc. is an upcomingvirtualusic store in NorthAmerica. The company hasincreased its distributionglobally and provides thefacility to orderusic CDs overthe Internet. The Web site iscomprehensive and allowsvisitors to listen tousic online. Inorder to promote theirvirtualusic store, the companyfrequently organizes concerts,which can be seen live over theInternet. In order to view theseconcerts, the customers need tosubscribe to the Web site. Eachsubscriber receives a login nameand password using whichhe/she can log in, view, andlisten to the concert. The Websiteaintains the subscribers asuser groups and uses streamingaudio/video to send data packets

    1,The subscribers will usetheir respective subnet IDsfor teleconferencing.

    2,The subscriberswill need aulticastIP address providedby the Class D IPaddresses.

    3,The subscribers willuse the network addresses of the othernetworks in order toroute data packets toparticular users.

    4,The subscribers willneed to use reserved IPaddresses toteleconference over asecure network setup.

    2

  • 8/8/2019 On Tap Q3V2 Network

    17/35

    toultiple computers. Determinethe IP addressing scheme thatwill be used by these usergroups while viewing and

    listening to the concert.Research Infotech needs to setup a small network forperforming its research anddevelopment on the newwireless technologies using theInternet. The network needs tobe fast and efficient. In addition,the users should be able to usethe Internet only for accessingrelevant Web sites. Permissionsfor accessing chat rooms shouldnot be allowed. Which type of server can be used to implementsuch a network setup?

    1,Newgroup servers 2,Proxy and cacheservers

    3,Catalog servers 4,News servers 2

    Demi Chang is a network administrator in ABCorporation. She is using IIS toprovide Web services in theorganization. She needs toconfigure IIS to send andreceiveails over the Internet.Which IIS component shouldshe use to do this?

    1,WWW 2,FTP 3,SMTP 4,NNTP 3

    Which of the following is true 1,It stores a copy of data 2,It is used toake 3,It is used for user 4,It is used to store the 1

  • 8/8/2019 On Tap Q3V2 Network

    18/35

    about airrored server? contained in anotherservers.

    available the samebusiness transactiontoultiple usersacross the Internet.

    authentication. repository of certificates.

    Robert Russel is a Webadministrator in Red Sky Inc.He needs to install a Web serverin his organization. His primaryrequirement is that the serverustbe platform independent and itshould enable its users to addfunctionality to theirenvironments easily. WhichWeb server besteets therequirements?

    1,IIS Web server 2,Apache server 3,Personal Web server 4,FTP server 2

    Which of the following servicesenable users to set up FTP sitesfor uploading and downloadingfiles?

    1,SMTP 2,NNTP 3,FTP 4,CGI 1

    Consider the followingstatements:

    Statement A: WS-FTP is FTPserver software.

    Statement B:icrosoft Exchangeis FTP server software.

    Which of the following is true

    1,Statement A is True andstatement B is False.

    2,Statement A isFalse and statementB is True.

    3,Both, statements Aand B, are True.

    4,Both, statements Aand B, are False. 1

  • 8/8/2019 On Tap Q3V2 Network

    19/35

    with respect to the abovestatements?

    BlueEye Inc. is aultinationalorganization. The frequency andsize of files transferred betweenthe office and its clients is quitehigh, in the order of hundreds.Which of the following servicesshould the organization use totransferore files in lesser amountof time?

    1,Front Page ServerExtensions

    2,File TransferProtocol (FTP) 3,Mailing list services

    4,Network NewsTransfer Protocol(NNTP) service

    2

    Which of the following in acorrect explanation to httpddaemon?

    1,It is a service that controlsthe Web server and the httpservices.

    2,It enables users toadd functionality tothe existing sourcecode.

    3,It is used to invokeInternet super daemon,inetd.

    4,It helps insubscribing theservices of theailinglist.

    2

    Which of the following is thecorrect use of the TELNETservice?

    1,Enables users tocommunicate with otherusers. This service needs tobe run foranagingreceipt/delivery ofails.

    2,Enables filetransferacrossachines, usingthe HTTP protocol.m

    3,Enables users a setof bulletin boards ondifferent subjects.

    4,Enables users to login remotely to a server.This service is used forallowing the clients tolog on to a remoteserver.m

    4

    Marilyn Jones is a Webadministrator in SmartLabs Inc.Her company has an

    internetwork. The companyplans to keep streaming videoand audio content over thisinternetwork. Which of the

    1,Domain Name Servers 2,News servers 3,Media servers 4,Transaction servers 3

  • 8/8/2019 On Tap Q3V2 Network

    20/35

    following internetworkingservers would beost appropriatein the current scenario?

    Which of the following is thecorrect explanation of actionattribute?

    1,This specifies the type of

    control that will bedisplayed on the form toaccept user input.

    2,This stores thevalue entered by theuser in the control.

    3,This indicates that acheck box or a radiobutton is selected.

    4,This attribute is used

    to specify the targetwhere the form data istransmitted.

    4

    Consider the followingstatements:

    Statement A: HTTP defineshowessages are formatted andtransferred betweenultipleclients.Statement B: When a clientaccesses the Web server, theHTTP gateway intercepts therequest and determines how toconnect to and communicatewith the Web server.

    Which of the following is truewith respect to the abovestatements?

    1,Statement A is True andstatement B is False.

    2,Statement A isFalse and statementB is True.

    3,Both, statements Aand B, are True.

    4,Both, statements Aand B, are False. 2

    Consider the following

    statements:

    Statement A: Input is anattribute of FORM tag.

    1,Statement A is True andstatement B is False.

    2,Statement A isFalse and statementB is True.

    3,Both, statements Aand B, are True.

    4,Both, statements Aand B, are False. 2

  • 8/8/2019 On Tap Q3V2 Network

    21/35

    Statement B: Name is anattribute of INPUT element.

    Which of the following is true

    with respect to the abovestatements?

    Which of the following is thetrue forethod attribute?

    1,This attribute specifies theway in which the data canbe transmitted from theform to the Web server.

    2,This attribute isused to specify thetarget where theform data istransmitted.

    3,This specifies thetype of control thatwill be displayed onthe form to accept userinput.

    4,This stores the valueentered by the user inthe control.

    1

    Consider the followingstatements:

    Statement A: Value button is avalid HTML form control.Statement B: Checkbox buttonis a valid HTML form control.

    Which of the following is truewith respect to the abovestatements?

    1,Statement A is True andstatement B is False.

    2,Statement A isFalse and statementB is True.

    3,Both, statements Aand B, are True.

    4,Both, statements Aand B, are False. 2

    What does IDS stand for? 1,Intrusion DetectionStandard2,IntrusionDetection System

    3,Intrusion DataSystem

    4,Intrusion DigitalSignature 2

    Which of the following is NOTaeasure for securing a Webserver?

    1,Remove or disable allunused services from theserver.

    2,Allow remoteadministration.

    3,Limit the number of persons who haveadministrator or root-level access.

    4,Monitor the

    connections to theserver with the help of IDS.m

    2

  • 8/8/2019 On Tap Q3V2 Network

    22/35

    Which of the following is truefor cryptosystem?

    1,Cryptosystems are of three types: symmetric,asymmetric, and RSA.

    2,Asymmetriccryptosystems usethe same key forboth encrypting anddecrypting data.

    3,Symmetriccryptosystems use twoseparate keys for

    encryption.

    4,In a cryptosystem,before data can beexchanged betweentwo parties, the keyust

    be shared betweenthem.

    4

    Samuel is network administratorin Bluesoft Inc. Lately, he isgetting complaints from thenetwork users that they arerepeatedly getting e-mailessagesthat with huge files attached.This is causing the users e-mailbox to crash. Which DoS attack are they referring to?

    1,Ping of death 2,SYN flood 3,Spamming 4,Mail bomb 4

    Identify the firewall with thefollowing characteristics:1. Filters packets at the Network layer and examines packetheaders against an accesscontrol list2. Checks for all theconnectionsade to a localnetwork 3. Allows only thoseconnections that are from atrusted source and areconsidered safe4. Ensures that the users behindthe firewall have access to the

    1,Statefulultilayerinspection firewalls

    2,Proxy serverfirewalls

    3,Packet filterfirewalls

    4,Circuit-levelgateways 1

  • 8/8/2019 On Tap Q3V2 Network

    23/35

    Internet5. Ensures that the privacy of the internal network isaintained

    Sniffing is:

    1,A technique used todeliver an e-mailessage tosomeone whoight otherwisenot choose to receive it

    2,A technique used

    to passivelyintercept and copyall network trafficon a system, aserver, a router, or afirewall

    3,A technique used

    redirect data that isbeing exchangedbetween twoauthorized entities toone orore unauthorizedentities

    4,A technique used tosend abnormally largeping packets to aspecific computer

    2

    What does DES stand for? 1,Digital EncryptionStandard2,Data EncryptionSystem

    3,Data EncryptionStandard

    4,Digital EncryptionSystem 3

    _______ supportsinimum keysizes of 128, 192, and 256 bits. 1,Triple (DES) 2,DES 3,Rons Code 4,AES 4

    _________ is the process usedfor breaking ciphers.

    1,Cryptographicechanism 2,Cryptanalysis 3,Cryptology 4,Decryption 2

    Consider the followingstatements:

    Statement A: Unauthorizedaccess to information can beprevented byaking the contentsof theessages unreadable for allexcept by the intended recipient.

    Statement B: The termcryptosystems is used forencryptionechanisms.

    1,Statement A is True andstatement B is False.

    2,Statement A isFalse and statementB is True.

    3,Both, statements Aand B, are True.

    4,Both, statements Aand B, are False.

    3

  • 8/8/2019 On Tap Q3V2 Network

    24/35

    Which of the following is truewith respect to the abovestatements?

    Consider the following

    statements:

    Statement A: Smart cardprovides tamper-proof authentication and non-repudiation.

    Statement B: Authentication isthe process of ensuring thatdata, whether in transit or storedon the network, is not tampered

    with in any way.

    Which of the following is truewith respect to the abovestatements?

    1,Statement A is True andstatement B is False.

    2,Statement A isFalse and statementB is True.

    3,Both, statements Aand B, are True.

    4,Both, statements Aand B, are False. 1

    Which of the followingcomponents does NOT belongto the PKI framework?

    1,Certification Authority(CA)

    2,PKI client 3,Revoke Authority(RA)

    4,Digital certificates 3

    Identify the process for TCPconnection that uses the

    following steps:1. The first node requestscommunication by sending apacket with the sequence

    1,Broadcast storm 2,Three-wayhandshake 3,Spamming 4,Multi-accesshandshake 2

  • 8/8/2019 On Tap Q3V2 Network

    25/35

    number and SYN bit.

    2. The second nodeacknowledges the receipt of the

    data and responds with anacknowledgement (ACK) thatcontains the sequence numberplus one, and its own sequencenumber back to the first node.

    3. The first node responds andthe communication between thetwo nodes proceeds.

    Identify the type of DoS attack that takes place in the

    followinganner:1. An intruder sends anexcessive number of fakedbroadcast packets to all thecomputers in a network.

    2. Each computer forwardsthese packets to the specifiedfake target address, increasingthe amount of network trafficexcessively.

    3. These packets remain on thenetwork,oving from onecomputer to another, until they

    1,Sniffing 2,SYN flood 3,Spoofing 4,Broadcast storm 4

  • 8/8/2019 On Tap Q3V2 Network

    26/35

    completely choke the network.

    4. The high increase in thenetwork traffic prevents theattacked computer fromprocessing packets containingreal data.

    Identify the networkingtechnology:When an external entityaccesses an internal network resource, the external IP addressisapped to a fixed IP address.When an internal node accessesan external resource, its

    deviceaps a private IP address tothe first IP address that isavailable from a pool of globally unique IP addresses.

    1,Secure Socket Layer(SSL)

    2,Socket Server(SOCKS)

    3,Transport LayerSecurity (TLS)

    4,Network AddressTranslation (NAT) 4

    Which of the following is thecorrect expansion of the termCASE?

    1,Computer Aided SoftwareEngineering

    2,Computer AidedSystem Engineering

    3,Computer AidedSoftware Enterprise

    4,Computer AidedSystem Enterprise 1

    _______ is the high speednetwork hat exists separatelyfrom the LAN andain corporatenetwork and allows differentkinds of storage devices to beshared.

    1,SAN 2,NAS 3,DAS 4,MAN 1

    ________ is the first activity of 1,Implementation 2,Testing 3,Analysis 4,Design 3

  • 8/8/2019 On Tap Q3V2 Network

    27/35

    the Development phase.

    ________ is the last activity of the Development phase. 1,Design 2,Construction 3,Testing 4,Implementation 4

    ___________ can be used toconnect network segments andto selectively determine theappropriate segment to which itshould pass the signal.

    1,Bridges 2,Repeaters 3,Protocol 4,Hubs 1

    Which of the followingcommunicationedia is the cost-effective solution for usersseeking an independentcommunications network andconnects a large number of geographically dispersed sites?

    1,ISDN Integrated ServicesDigital Network (ISDN)

    2,Very SmallAperture Terminals(VSAT)

    3,Wireless 4,Digital SubscriberLine (DSL) 2

    In which of the followingtechnologies, computers providea powerful and efficient way tostore, retrieve, analyze, orpredict biological data in theform of text, trees,aps, andpathways?

    1,E-learning 2,Bioinformatics 3,Embedded system 4,IP telephony 2

    Consider the followingstatements:

    Statement A: System design,also called top-level design,specifies the internal logic of each of theodules specified in

    1,Statement A is True andstatement B is False.

    2,Statement A isFalse and statementB is True.

    3,Both, statements Aand B, are True. 4,Both, statements Aand B, are False. 4

  • 8/8/2019 On Tap Q3V2 Network

    28/35

    system design.Statement B: Detailed design,also called low-level design,aims to identify theodules thatshould be in the system, thespecification of theseodules, andhow they interact with eachother.

    Which of the following optionsis true with respect to the abovestatements?

    Consider the followingstatements:

    Statement A: Fibre optic cablesareore efficient then coaxial andtwisted pair cables.Statement B: Routers are usedto expand the existing network and amplify the signal as itovesfrom one device to another.

    Which of the following optionsis true with respect to the above

    statements?

    m

    1,Statement A is True andstatement B is False.

    2,Statement A isFalse and statementB is True.

    3,Both, statements Aand B, are True.

    4,Both, statements Aand B, are False. 1

    Radio waves andicrowaves are 1,IP Telephony 2,Voice over IP 3,Wireless 4,Enterprise 3

  • 8/8/2019 On Tap Q3V2 Network

    29/35

    used in which of the followingcommunications?

    Which of the followingtechnologies covers e-mail/Web

    scanning andaliciousobile code(MMC)anagement?

    1,Embedded system 2,Biometrics 3,Content security 4,Firewall 3

    Which of the following is NOTthe feature of eShop?

    1,Products arearketedusingedia 2,Payment is online

    3,Products will bedelivered at home

    4,Products sold athigher prices 4

    The NTFS structure uses 64-bitentries to keep track of thestorage on the disk. The corecomponent of the NTFS systemis the __________ that containsinformation about each filebeing stored on the disk.m

    1,Volume file 2,Log file 3,Master File Table 4,Quota Table 3

    Which file system supportsencryption of files and enablesadministrators to set up alimited amount of hard drivespace to each user?

    1,CDFS 2,FAT32 3,FAT164,NTFS

    m4

    During the Windows 9x startupprocess, which is the file thattracks the components anddrivers of Windows 9x that aresuccessfully loaded andinitialized?

    1,BOOTLOG.TXT 2,EMM386.EXEm 3,SYSTEM.DA04,WIN.COM

    m

    1

    John wants to perform 1,BAT 2,UDF 3,EXE 4,SYS 2

  • 8/8/2019 On Tap Q3V2 Network

    30/35

    unattended installation of Windows 2000 using answerfiles on 50achines over thenetwork. He wants to specifyunique settings for differentcomputers on the network.Which type of file needs to becreated for this purpose?m

    m

    The ______ option of Startenuis used to start programs or openfolders from a command-linedialog box.

    1,Settings 2,Run 3,Find4,Documents

    m2

    The __________ option is usedto display all applications thatare currently open.m

    1,My Computer2,My Network Places 3,Taskbar

    4,Startenu

    m 3

    The network for a department of ABC Corp. needs to be set up.This network should be set upusing a cablingedium that willensure secure data transmission.In addition, the cablingediumshould offer signaling rates inexcess of 200,000bps. Which of the following cablingediumcould be used in the givensituation?

    1,Coaxial Cabling should beused

    2,Fiber OpticCabling should beused

    m

    3,UTP Cabling shouldbe used

    4,STP Cabling shouldbe used

    m

    2

  • 8/8/2019 On Tap Q3V2 Network

    31/35

    Which of the following are thetwo Registry editors included inWindows 2000 and WindowsXP that enable you to performbasic functions such as adding,editing, and removing Registryentries?m

    1,RegEdit and PolEdit

    2,RegEdit andSysEdit

    m

    3,RegEdit and GPE

    4,RegEdit andRegEdt32

    m

    4

    There are four importantWindows utilities that can beused to optimize andaintain theoperation of the hard disk drive.All of these utilities, except one,has been available in the initialversions ofS-DOS. Which of the

    following is the utility that hasnot been available in the initialversions ofS-DOS?m

    1,BACKUP2,DEFRAG

    m3,SCANDISK

    4,CHKDSK

    m3

    ____________ is thecomplimentary searchabledatabase of information andself-help tools used byicrosoftTechnical Support to supporttheir customers?

    1,Online Support Requests

    2,MicrosoftKnowledge Base

    m

    3,Facts by Product4,Download Center

    m2

    Which of the followingtopologies offers theost basicnetwork connection scheme,where each node has a direct

    1,Ring Topology2,Star Topology

    3,Bus Topology4,Mesh Design

    4

  • 8/8/2019 On Tap Q3V2 Network

    32/35

    physical connection with all theother nodes of the network?

    ________ is a plastic or glasscable designed to carry voice or

    digital data in the form of lightpulses. In this type of cable, thesignals are introduced into thecable by a laser diode andbounced along its interior untilthey reach the end of the cable.m

    1,Fiber-optic cable2,Copper cable

    3,Infrared light

    4,Wireless radiofrequency signals 1

    IP addresses exist in thenumeric format of XXX.YYY.ZZZ.AAA. Thisformat of specifying addresses

    is referred to as the dotteddecimal notation. Each addressconsists of four ______separated by dots (.).m

    1,4-bit fields

    2,2-bit fields

    3,8-bit fields

    4,6-bit fields

    3

    In Windows 2000, you can havecomputer names that are 63characters long. These namescan include letters A through Z,numbers 0 through 9, andhyphens. Which of thefollowing protocols supportsthis type of naming convention? m

    1,Dynamic HostConfiguration Protocol

    2,NetBIOSEnhanced UserInterface Protocol

    m

    3,TCP/IP Protocol4,IPX/SPX Protocol

    m3

  • 8/8/2019 On Tap Q3V2 Network

    33/35

    Which of the following devicereceives, amplifies, andretransmitsessages to keep themfrom deteriorating as they aretransmitted?m

    1,Hub 2,Bridge 3,Router 4,Gateway 3

    Which of the following devicesis used to link networkstogether, so that nodes withinthem can communicate witheach other?

    1, Hub2,Bridge

    m3,Router

    4,Gateway

    m1

    Which of the followingtechnologies provides high-speed communication links byusing the existing telephone

    lines to generate bandwidthsranging up to 9Mb/s orore?m

    1,ISDN Connection 2,Digital SubscriberLines 3,Dialup Networking4,Satellite InternetAccess 2

    Consider the followingstatements:

    Statement A: In a peer-to-peernetwork, each computer isattached to the network in a ringor bus fashion and is equal tothe other units on the network.

    Statement B: In a client/servernetwork, dependent

    1,Both, Statement A andStatement B, are False.

    2,Both, Statement Aand Statement B,are True.

    3,Statement A is Trueand Statement B isFalse.

    4,Statement A is Falseand Statement B isTrue.

    m

    2

  • 8/8/2019 On Tap Q3V2 Network

    34/35

    workstations, referred to asclients, operate in conjunctionwith a dedicatedaster computer.

    Which of the following option istrue with respect to the abovestatements?

    You want to enable severalcomputers to connect to theInternet through a single dial-upconnection. You set up acomputer running Windows2000 to connect to the Internetusing the dial-up connection.Other computers will connect to

    this computer to access theInternet. Which of the followingsettings will you apply toaccomplish the task?m

    1,Use Network and Dial-UpConnections option underSettings.

    2,Use Network andDial-UpConnections optionunder ControlPanel.m

    3,Use Network optionunder Settings.m

    4,Use Network optionunder Control Panel.

    m

    1

    SoftPro Pvt. Ltd. has set up anew office. As a part of theprocess for implementingsecurity, they want to restrictaccess to the internal network sothat specific types of items or

    addresses are not allowed topass between the networks.Which of the followingsecurityeasures should be taken

    1,They should use theKerberos to protect theircompany network

    2,They should usethe Digitalcertificates toprotect theircompany network

    m

    3,They should set upthe firewall program toprotect their company

    network.

    4,They should combinevarious certificateswith security standardssuch as the IP SecurityProtocol

    m

    3

  • 8/8/2019 On Tap Q3V2 Network

    35/35

    to control the traffic between thenetworks?m

    You have recently connected

    computers in your organizationto form a network. You need toinstall a protocol that willensure security of data in yournetwork. Also, you need toensure that data is delivered tothe receiver correctly. Which of the following protocols will youuse?m

    1,NetBEUI2,NWLink

    m3,Apple talk

    4,TCP/IP

    m4

    A newly set up office of Softpro

    need to be interconnected withthe existing one so thatinformation could be sharedamong them. The newly set upoffice works on Linuxachineswhile the existing one runs onWindows environment. Whichof the following protocols issuitable for theachines in such asituation?

    1,NWLink protocol shouldbe installed and configured

    2,Apple Talk protocol should beinstalled andconfigured

    3,TCP/IP protocolshould be installed andconfigured

    4,NetBEUI protocolshould be installed andconfigured

    3