Ntc/360 Exam

Only available on StudyMode
  • Download(s) : 420
  • Published : March 18, 2012
Open Document
Text Preview
NTC 360 Final Exam

True/False
Indicate whether the statement is true or false.

____F1.The frame’s destination address of a broadcast frame is a value of all binary 0s.

____T2.Class A addresses are intended for use by large corporations and governments.

____F3.1000BaseT, released as the 802.3ab standard in June 1999, supports Gigabit Ethernet over 100-meter segments of balanced Category 5 copper cabling and requires two pairs of wires.

____T4.The signaling rates associated with SONET are the same as those for ATM.

____F5.A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.

____T6.An intrusion detection system (IDS) usually works with a firewall or router with access control lists.

____F7.WEP, the successor to WPA, has enhancements that make it much more difficult to crack the encryption code.

Multiple Choice
Identify the choice that best completes the statement or answers the question.

____A8.A(n) ____ is a network of networks or a networked collection of LANs tied together by devices such as routers. a.|internetwork|c.|MAN|
b.|Internet|d.|WAN|

____A9.Computers that participate on a network run a ____ that determines what services that computer can offer or request. a.|NOS|c.|domain|
b.|WPAN|d.|controller|

____B10.In a(n) ____ topology network, computers and other devices attached to the network regenerate signals and are responsible for moving data through the network. a.|passive|c.|physical|
b.|active|d.|logical|

____B11.10BaseT refers to ____.
a.|TP|c.|STP|
b.|UTP|d.|ScTP|

____C12.Whether STP or UTP, twisted-pair network cabling most commonly uses ____ connectors to plug into computer network interfaces or other networked devices. a.|BNC|c.|RJ-45|
b.|MT-RJ|d.|RJ-11|

____A13.____ are special RJ-45-terminated TP cables that permit modular cables to stretch between wall plates and equipment. a.|Jack couplers|c.|Patch panels|
b.|Wall plates|d.|Patch cables|

____A14.Domain Name System (DNS) and NetBIOS name resolution both work in part at the ____ layer. a.|Session|c.|Presentation|
b.|Network|d.|Transport|

____B15.The IEEE standard ____ covers all forms of Ethernet media and interfaces, from 10 Mbps to 10 Gbps (10 Gigabit Ethernet). a.|802.2|c.|802.5|
b.|802.3|d.|802.11|

____B16.The IEEE standard ____ sets standards for wireless networking for many different broadcast frequencies and techniques. a.|802.3|c.|802.15|
b.|802.11|d.|802.16|

____C17.An IP address is divided into two distinct parts: one part designates the logical network the computer is a part of, while the remainder of the address represents the ____. a.|NIC’s MAC address|c.|host ID|

b.|domain name|d.|subnet mask|

____D18.Class ____ addresses are reserved for experimental use and cannot be used for address assignment. a.|A|c.|D|
b.|C|d.|E|

____B19.A subnet mask is a ____-bit number that’s always assigned to a host when the IP address is assigned. a.|16|c.|64|
b.|32|d.|128|

____B20.The ____ frame type is sometimes called Ethernet raw. a.|Ethernet 802.2|c.|Ethernet SNAP|
b.|Ethernet 802.3|d.|Ethernet II|

____A21.____ allows administrators to control what users can do after they are logged on to the network. a.|Authentication|c.|Logging|
b.|Authorization|d.|Penetration testing|

____C22.On Linux systems, the passwords can be stored in an encrypted format in the ____ file located in the /etc directory. a.|password|c.|shadow|
b.|passwd|d.|pwd|

____A23.Windows OSs ____ permissions are applied to folders (and only folders) shared over the network. a.|sharing|c.|folder|
b.|NTFS|d.|access|

____D24.Encryption prevents somebody using eavesdropping technology, such as a(n) ____, from capturing packets and using data in the packets for malicious purposes. a.|IDS|c.|rootkit|
b.|VPN|d.|packet sniffer|

____D25.IPSec...
tracking img