1. Which of the following is NOT an example of a network node?
a) a modem
b) a printer
c) a computer
d) an NOS
2. A computer network is defined as two or more computers connected with __________ so that they can
communicate with each other.
a) the Internet
d) software and hardware
3. Networks allow users to share?
b) flash drives.
4. A(n) __________ allows sharing of a broadband Internet connection.
a) phone cord
5. Network architectures are classified according to?
a) the way they are controlled and the distance between their nodes.
b) the distance between the hub and the router.
c) the bandwidth supplied by the connection.
d) the speed at which the processor runs.
6. Due to the expansion of media files on home computers, __________ options are now being marketed;
however, they are not as full featured as their business-world counterparts.
a) external hard drive
b) home server
c) mega flash drives
d) online storage
7. Most computers today contain network adapters installed inside as expansion cards. Such adapters are
referred to as:
a) network adapter cards.
b) network expansion cards. c) network interface cards.
d) ethernet cards.
8. Normal telephone wire is:
a) fiber-optic cable.
b) coaxial cable.
c) twisted-pair cable.
d) ethernet cable.
9. The most common type of network is:
a) a token ring LAN.
b) a peer-to-peer (P2P) network.
c) a client/server network.
d) a WAN.
10. In a client/server network, there are usually many more __________ than __________.
a) servers, clients
b) printers, computers
c) clients, servers
d) clients, computers
11. A network that has ten or more nodes is usually configured as a:
a) client/server network.
b) home network.
c) peer-to-peer network.
12. Which of the following is NOT an example of a WAN?
a) LANs connected in a single building
b) a LAN at the main university campus connected with a LAN at the university extension site
c) a computer at a bank's main branch connected with a LAN at the bank's branch office across town
d) the computers in a lab at your school connected to the computers in a lab at another school in your town
13. Which transmission medium is able to transmit data the fastest?
a) twisted-pair cable
b) coaxial cable
c) fiber-optic cable
14. The data transfer rate of a wireless network is usually measured in?
b) Gbps. c) Tbps.
15. Throughput, the actual speed of data transfer that is achieved in a network, is usually?
a) more than the data transfer rate.
b) the same as the data transfer rate.
c) less than the data transfer rate.
d) dependent on the cable's bend radius.
16. Network adapters:
a) enable nodes in a network to communicate with each other.
b) are built into the motherboard on each node.
c) are always Ethernet NICs.
d) are necessary only on servers in a client/server network.
17. Sophisticated networks generally use which of the following hardware devices to ease the flow of data
packets throughout the network?
a) USB ports
c) network interface cards (NICs)
d) routers and switches
18. Client/server networks are controlled by a central server that runs a specialized piece of software called?
a) Windows Vista.
b) a network operating system(NOS).
c) a firewall.
19. The major difference in types of P2P networks is the __________ by which the nodes are connected.
c) network interface card
d) transmission medium
20. Ethernet networks are named for?
a) the type of NIC installed in every node.
b) the protocol used.
c) the type of transmission medium used.
d) the type of operating system installed on every node.
21. An Ethernet adapter is a:
a) specific type of NIC. b) specific type of router.
c) transmission medium.
d) device that uses a simple algorithm to move data.
22. The most popular transmission medium option for wired Ethernet networks is:
a) unshielded twisted-pair cable (UTP).
b) fiber-optic cable.
c) power-line cable.
d) coaxial cable.
23. Maximum cable run (length) for Ethernet networks using UTP cable is approximately:
a) 50 feet.
b) 328 feet.
c) 550 feet.
d) 1,100 feet.
24. Which of the following is necessary to send data between a home network and the Internet?
a) a cable
b) a hub
c) a switch
d) a router
25. A wireless network uses which of the following as its transmission medium?
a) laser waves
b) fiber-optic waves
c) sound waves
d) radio waves
26. Which of the following devices translates electronic data into radio waves?
a) a modem
b) a fiber-optic cable
c) a transceiver
d) a receiver
27. Which of the following network adapters is most likely to be preinstalled in a typical notebook computer
a) a wireless network adapter
b) a power-line adapter
c) a transceiver
d) a modem
28. Which of the following devices is needed to share an Internet connection on a wireless network? a) a wireless hub
b) a fiber-optic cable
c) a wireless router
d) a modem
29. If you frequently transfer large data files between nodes on a network, which of the following networks
would be the best choice?
30. To improve communication effectiveness in a wireless network, you can do all of the following EXCEPT:
a) reposition the computer you are using.
b) move the computers in the network closer together.
c) move your computer next to a cement wall.
d) add a wireless access point (WAP) to the network.
31. Most __________ allow you to connect wireless and wired computers to the same network.
a) wireless routers
32. Most __________ allow you to connect wireless and wired computers to the same network.
a) wireless routers
33. Public places where you can wirelessly connect to the Internet are known as?
c) wired spots.
34. All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT:
a) power-line networks cost less.
b) you don't need to run new wires with a power-line network.
c) you are experiencing interference with a wireless Ethernet network.
d) power-line networks can be easier to install. 35. When setting up a network, you should set up any computers running the Microsoft Vista operating
c) only before any computers running Linux.
d) The order does not matter.
36. The weakest link in any computer security system is:
a) the operating system.
b) the network.
c) USB ports.
d) the users.
37. What is the best thing a company can do to prevent its electronic data from being stolen?
a) establish detailed security policies
b) disconnect employees' computers from the Internet
c) shut off access on computers to flash drives
d) install hidden cameras
38. Which of the following is formally defined as any criminal action perpetrated primarily through the use of
a) social networking
39. A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
a) use your debit card information to purchase items illegally.
b) assume your identity.
c) steal your logon and passwords for various accounts.
d) launch a denial of service (DoS) attack on your computer.
40. Which of the following is a program that appears to be something useful or desirable but at the same time
does something malicious in the background?
a) a virus
b) a Trojan horse
c) a worm
d) a zombie
41. Distributed denial of service (DDoS) attacks have been associated with:
a) attacks on famous blogs, eBay, and Amazon.com.
b) identity theft. c) misuse of credit card information.
d) theft of financial data at the IRS.
42. The most likely method a hacker would use to access a computer is:
a) sitting down at a computer and installing hacking software.
b) overhearing your password XXXXX log-on information.
c) entering through a company intranet.
d) entering through the Internet.
43. Rules for creating passwords include all of the following EXCEPT:
a) keep your password XXXXX secret.
b) keep your password XXXXX down, and put it in your wallet.
c) change your password XXXXX
d) create a hard-to-guess password, with a combination of letters and numbers.
44. One can thwart most hacking problems by installing a:
d) security policy.
45. __________ makes broadband users more vulnerable to attacks.
a) Dynamic addressing
b) IP addressing
c) Static addressing
d) Greater bandwidth
46. The purpose of Network Address Translation is to?
a) translate IP addresses from the Internet.
b) hide user IP addresses from the Internet.
c) convert logical ports to physical port configurations.
d) dynamically assign IP addresses via an ISP.
47. Manufacturers such as Linksys, D-Link, and Netgear make which of the following devices that can double
48. To secure a wireless network, you should take all the following precautions EXCEPT:
a) changing your network name. b) changing the default password XXXXX your router.
c) turning your computer off at night.
d) disabling SSID broadcast.
49. How many viruses and virus variants exist today?
50. Which type of virus was the famous Michelangelo virus?
a) a time bomb
b) a worm
c) a script virus
d) an e-mail virus
51. Which of the following classifications of viruses changes its own code?
52. Quarantining with regard to computer protection is defined as:
a) placing a found virus in a secure area on the hard drive.
b) updating your antivirus software.
c) repairing the infected file.
d) deleting the infected file.
True/False: Determine if the statement is true or false.
53. It is not possible to configure a client/server network for home use.
54. A client computer is the computer on which users accomplish specific tasks.
55. A single computer can function as both a client and a server, but performance will be degraded.
56. Most desktop and notebook systems sold today are network ready.
57. MAN stands for mobile area network. 58. When a network is sponsored by a government entity to provide Internet access to a specific geographic
area, that network will generally be designated as a MAN.
59. The cost of a P2P network is slightly greater than the cost of a client/server network.
60. P2P networks are more commonly used in small businesses than in homes.
61. Wireless networks are more vulnerable to attack than wired networks.
62. A network-ready device is a device that may be attached to a network but still has to connect to a
networked computer first.
63. A wireless NIC from one manufacturer may not work with a DSL router from another manufacturer, even
when both devices claim to be developed using the same standards.
64. The 802.11g standard supports transfer rates of up to 30 Mbps.
65. 802.11 devices are less susceptible to interference than 802.11g devices are.
66. Wireless networks are no more vulnerable to packet sniffers than any other type of network.
67. SMTP uses port 21.
68. SMTP stands for Simple Mail Transfer Protocol.
69. The practice of piggybacking is illegal.
70. The majority of investigations related to cybercrime involve debit card fraud.
71. The Master Boot Record executes every time a computer boots up.
72. Extreme G and Enhanced G standards were both based on 802.11g standards but used proprietary
hardware and software tweaks to increase performance.
73. 802.11g devices have a faster throughput than 802.11n devices.
74. The Internet is an example of a client/server network.
75. Cybercriminals are usually security individuals who work in large corporations with a vast knowledge
base of computing and networking.
76. In a peer-to-peer network, one computer acts as the server. 77. One can have both wired and wireless nodes on a single P2P network.
78. Data transfer rate does NOT affect the speed at which a user can download a file from a WAN.
79. Switches receive data packets and send them to the node for which they are intended on the same
80. A P2P network needs network operating system software installed on every node.
81. Ethernet networks are always connected using twisted-pair cable technology.
82. The Mac OS does NOT support P2P networking.
83. Most computers today come with Ethernet adapters already installed.
84. Repeaters can extend a network's range by amplifying the signal.
85. When configured correctly, network firewalls can help protect your network.
86. White-hat hackers perform a needed legal service for society.
Here's the first set:
21 A 22 A
32 A (this is a repost of number 31 question)