Vous êtes sur la page 1sur 3

Quiz 2 - Network+ Chapters 6 - 10

1. Bridges are protocol independent.


True

2. The primary difference between the two USB standards is ____.
a. connector pin organization
b. security limitations
c. speed
d. transceiver placement

3. ____ are combinations of networking hardware and software that connect two dissimilar kinds of
networks.
a. Routers
b. Switches
c. Gateways
d. Broadcast domains

4. ____ routing is a technique in which a network administrator programs a router to use specific paths
between nodes.
a. Static
b. Dynamic
c. Best path
d. Link-state

5. Cut-through switches can detect corrupt packets.
False

6. A class ____ network class is reserved for special purposes.
a. A
b. B
c. C
d. D

7. The MIME standard replaces SMTP.
False

8. In classful addressing, Class C IPv4 address host information is located in the ____.
a. last 8 bits
b. last 16 bits
c. first 8 bits
d. first 16 bits

9. In CIDR, conventional network class distinctions do not exist.
True

10. Within a classful addressing, ____ is the default subnet mask for a Class C address.
a. 255.255.255.255
b. 255.255.255.0
c. 255.255.0.0
d. 255.0.0.0

11. ATM is a WAN technology that functions in the Data Link layer.
True

12. Because WAN connections require routers or other Layer 3 devices to connect locations, their links are
not capable of carrying ____ protocols.
a. Open
b. Standard
c. Routable
d. Nonroutable

13. A ____ aggregates multiple DSL subscriber lines and connects them to the carriers CO.
a. terminal adapter
b. DSLAM
c. smart jack
d. erminator

14. The PPTP VPN tunneling protocol is based on technology developed by Cisco.
False

15. The portion of the PSTN that connects any residence or business to the nearest CO is known as the
____.
a. demarcation point
b. NIU (Network Interface Unit)
c. local loop
d. central office

16. In every NOS, groups form the basis for resource and account management.
True

17. A(n) ____ is a list that organizes resources and associates them with their characteristics.
a. file inode
b. container
c. account
d. directory

18. A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables
administrators to manage files, users, groups, security, printers, and so on.
a. Snapshot
b. Shortcut
c. Icon
d. GUI

19. The core of all UNIX and Linux systems is called the kernel.
True

20. A(n) ____ is a self-contained, well-defined task within a process.
a. Task
b. Thread
c. Activity
d. Job

21. In ____, a wireless signal splits into secondary waves when it encounters an obstruction.
a. Reflection
b. Scattering
c. Diffraction
d. bounce back

22. Wireless networks are laid out using the same topologies as wired networks.
False

23. ____ is the least popular WLAN standard.
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n

24. ____ satellites are the type used by the most popular satellite Internet access service providers.
a. Transponder
b. Medium Earth orbiting
c. Low Earth orbiting
d. Geosynchronous orbiting

25. If a station detects the presence of several access points, it will always choose the closest access point.
False

Vous aimerez peut-être aussi