Worksheets 1
Worksheets 1
Worksheets 1
A. BNC C. RJ11
B. RJ45 D. MT-RJ
A. SMTP C. DHCP
B. SNMP D. ARP
7. When selecting an ISP, you should carefully determine your ISP requirements. you should
consider
A. The costs and quality of services
B. The number of users needing an internet connection
C. The bandwidth capacity
D. All the Above
E. None The Above
8. Which protocol deals with resolving domain names
A. X-Window C. DNS
B. SMTP D. FTP
9. is protocol that uses text-based connection to a remote server
A. ARP B. Telnet
C. SMTP D. SNMP
A. Extranet C. Intranet
B. Internet D. None the Above
13. The network design for a college with users at five sites is being developed. Where in the
campus network architecture would servers used by all users be located?
A. access-distribution C. enterprise edge
B. data center D. services
14. Abebe is fetching mail from a server lying at a remote location .Which protocol is he using to
fetch the mails?
A. POP 3 C. SMTP
B. IMAP D. SNMP
15. Which of the following are threats to email security?
A. Spam D. Trojans
B. Phishing E. All of the above
C. Virus
16. Optical Fiber transmits ______ signals.
A. Electrical C. light
B. Radio D. None of above.
17. DHCP uses UDP port _________ for sending data to the server.
A. 66 C. 68
B. 67 D. 69
A. Only IP v4 B. Only IPv6 C. Both IPv6 and IPv4 D. None of the above
A. Modulation C. A and B
B. Demodulation D. None the Above
25. software or hardware that checks information coming from the Internet or a network
A. Firewall C. Modem
B. Internet infrastructure D. Hubs
26. Servers are application sever that provide name resolution to client computers by converting
names easily understood by human into machine readable ip addresses.
27. The physical path between transmitter and receiver in a data communication system.
31. a document that states in writing how a company plans to protect the company’s physical and
information technology assets
A. Password B. User Account. C. Security policy D. All the above.
32. When you tried to login to the server, your trial may failed, this failure event is recorded
in
A. Internet layer of the TCP/IP model C. Network interface layer of the OSI
B. Data link layer of the OSI reference model reference model
D. Transport layer of the OSI reference mode
34. The following medium does not use metallic conductor for transmission
A. Twisted Pair wire C. Coaxial Cable
B. Optical Fiber D. none of the above
35. is a network multiple access method in which carrier sensing is used, but nodes attempt to
avoid collisions by beginning transmission only after the channel is sensed to be "idle"?
A. CSMA C. CSMA/CD
B. CSMA/CA D. ALOHA
36. Which approach in networking allows for network changes, upgrades, or the introduction of
new services in a controlled and staged fashion?
A. Resiliency C. Flexibility
B. Modular D. Hierarch
36. Which device performs the function of determining the path that messages should take
through internetworks?
40. Defense of digital information and IT assets against internal and external, malicious and
accidental threats.
A. Security policy B. Security C. Test D. none the Above
41. Which cable is the most common in networks?
A. UTP C. Coaxial
B. STP D. Fiber optic
42. The term used in the alarm world to mean intentionally deactivating a particular sensor or
zone in security
A. System. Trojan horse B. Virus C. Penetration D. Bypass