NETWORKING INFRASTRUCTURES
Sign in to Google to save your progress. Learn more
Email *
What is your name? *
What is the password? This password is time sensitive. Your FBLA Adviser will be able to provide it to you. *
51)  What are the two WEP key lengths?
1 point
Clear selection
52)  At the end of each day, your supervisor asks you to lock up the rooms in which the equipment is stored and to make sure that the security cameras are properly working. These measure will ensure the ________ security of devices.
1 point
Clear selection
53)  What is the name of the type of malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs a requested action?
1 point
Clear selection
54)  What type of security threat prevents users from accessing services to which they should be entitled to?
1 point
Clear selection
55)  Which network security feature allows internal IP addresses to be hidden from external users?
1 point
Clear selection
56)  What does the acronym SSID stand for?
1 point
Clear selection
57)  Which of the following would be classified as an access attack?
1 point
Clear selection
58)  What is an attachment to an electronic message that is used to verify that the sender is who they say they are?
1 point
Clear selection
59)  Which of the following is not a way to secure a wireless network?
1 point
Clear selection
60)  Which of the following reconnaissance attack tools are used to search the publicly available IP addresses to identify the addresses that are active?
1 point
Clear selection
61)  What mulitiport device connects network segments and allows full bandwidth on all ports? 
1 point
Clear selection
62)  Which of the following networking devices increase the number of collision domains?
1 point
Clear selection
63)  What do routers use to select the best path for outgoing data packets?
1 point
Clear selection
64)  If a switch needs to connect to a router, which of the router interfaces would it use?
1 point
Clear selection
65)  How can a technician tell the difference between a patch cable and a crossover cable?
1 point
Clear selection
66)  A NIC, which has a connector for an RJ-45, is using which type of network media?
1 point
Clear selection
67)  Which of the following is most commonly used in an FDDI cabling system?
1 point
Clear selection
68)  When choosing the appropriate NIC for a system, all of the following would be considered EXCEPT:
1 point
Clear selection
69)  Which of the following technologies configures two or more hard drives to work together as an array of drives to improve fault tolerance and improve performance by writing data to two or more hard drives so that a single hard drive is not excessively used?
1 point
Clear selection
70)  Which wireless technology allows for the creation of a PAN?
1 point
Clear selection
71)  What is the name of the wireless technology that can support up to 75 Mbps with a range up to several miles and uses 2- to 11 GHz frequency?
1 point
Clear selection
72)  Which of the following does not describe characteristics of baseband technologies?
1 point
Clear selection
73)  You work as a sales associate at a local electronics store. Your customer is looking for an Internet service plan along with a modem that provides them with a high bandwidth, always on, connection to the Internet that utilizes their existing phone line. Which service and modem would you recommend to your customer?
1 point
Clear selection
74)  An inbound modem converts:
1 point
Clear selection
75)  You've been asked by your supervisor to research new possible operating systems for the ABC Company using one of their current PCs. The company is running a Windows OS, but would like to look at Linux and Mac operating systems as possibilities. Which method listed below would be the best option to test out the systems?
1 point
Clear selection
76)  In what year was the OSI reference model developed?
1 point
Clear selection
77)  Data link layer addresses is used for what type of delivery?
1 point
Clear selection
78)  What is the function of Layer 3 of the OSI model?
1 point
Clear selection
79)  What organization is responsible for the development of the OSI reference model used in networking?
1 point
Clear selection
80)  Which OSI layer provides network services to the applications of the user, such as e-mail, file transfer, and terminal emulation?
1 point
Clear selection
81)  Which of the following devices operate at the Physical layer of the OSI model?
1 point
Clear selection
82)  The Internet uses the network protocol called ______________.
1 point
Clear selection
83)  Which OSI layer uses either TCP or UDP for transmission of data?
1 point
Clear selection
84)  Which device operates at the network layer of the OSI model where the logical address would be encapsulated?
1 point
Clear selection
85)  Where is a hub specified in the OSI model?
1 point
Clear selection
86)  Which of the following network topologies connects network devices directly to each other in a linear fashion?
1 point
Clear selection
87)  For an end device to connect to the internet, it must be assigned a unique ______ address.
1 point
Clear selection
88)  HTTP is assigned which default port number?
1 point
Clear selection
89)  In which situation would you use an Ethernet straight through cable?
1 point
Clear selection
90)  Which of the following best describes 802.11n technologies?
1 point
Clear selection
91)  What command can be used on a Windows computer to lease a new IP address from a DHCP server?
1 point
Clear selection
92)  In what type of system are participants able to electronically share data, voice and images seamlessly?
1 point
Clear selection
93)  Which of the following wired network technologies have dedicated lines used by large companies that require a lot of bandwidth and transmit extensive amounts of data up to 45 Mbps?
1 point
Clear selection
94)  Which of the following are not advantages of a wireless network?
1 point
Clear selection
95)  Which of the following situations would not be a concern with Wi-Fi?
1 point
Clear selection
96)  Which of the following networking technologies will provide its end user with the highest speed?
1 point
Clear selection
97)  A local university campus is seeing an increase in the number of students brining their own mobile devices onto campus to access school resources. As a result of the increase which network area would the IT staff most likely need to redesign?
1 point
Clear selection
98)  802.11n networks use what type of topology?
1 point
Clear selection
99)  What is the maximum length on a cable segment on a 10BaseT network?
1 point
Clear selection
100)  Which of the following statements is true about single-mode fiber optic cable?
1 point
Clear selection
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy