Networking Quiz Answer Key http://www.kevinsworkbench.com/networking_quiz/index.html Basic Computing 1) What are some parts in a typical, modern computer? Motherboard, RAM, CPU, power supply, disk drive 2) What operation(s) does the BIOS perform? Boots the computer by initializing system devices and running the boot loader. 3) To troubleshoot a computer problem, listen for ___ during the boot up process. BIOS error beep codes or lights 4) What are common computer power supply output voltages? 3.3, 5, 12 5) What computer component should be stress tested for several hours to verify proper operation? RAM 6) What does SSD stand for? Solid State Drive 7) Identify 3 operating systems. Windows XP, Linux, OS X 8) Approximately how much RAM should a typical desktop computer have? More than 2 GB 9) A common computer monitor connection is ___? DVI 10) LGA 1155, FM2 and AM3+ refer to ___? CPU socket types Hardware 1) A ___ will usually block broadcast traffic. router 2) A ___ can join together two networks that use different protocols. gateway 3) A ___ will pass broadcast traffic to all ports. hub 4) A ___ can be hardware or software that controls incoming and outgoing network traffic. firewall 5) A network interface controller (also known as a network interface card or network adapter) typically ___. connects a computer to a network 6) A ___ is a specialized computer that only provides file-based data storage to other devices connected to the network. network attached storage 7) Using an adapter, it's possible to connect computers in a network using the electrical wiring in a house or building. True IP Addressing 1) IPv4 IP addresses are ___ bit binary numbers. 32 2) IPv6 IP addresses are ___ bit hexadecimal numbers. 128 3) An IP address is divided into what two parts? Network and host (or node) 4) The loopback IP address is ___? 127.0.0.1 5) What class is the IP address? C 6) What is the network portion of the IP address? 192.168.1 7) What is the host portion of the IP address? 2 8) How many hosts could the network support? 254 9) The IP address written with CIDR format is ___? 192.168.1.1/24 10) What is the broadcast IP of the subnet? 192.168.1.255 11) The default subnet mask for the IP address is ___? 255.255.255.0 12) The network ID is ___? 192.168.1.0 13) The range of first octets in a class A IP address is ___. 1 - 126 14) The range of first octets in a class B IP address is ___. 128 - 191 15) The range of first octets in a class C IP address is ___. 192 - 223 16) Convert 0100 to decimal. 4 17) Convert 1000 0001 to decimal. 129 18) Convert 255 to binary. 1111 1111 19) Convert 192 to binary. 1100 0000 20) A client using APIPA will assign itself an IP address starting with ___. 169.254 21) What protocol is used to automatically assign IP addresses to hosts? DHCP OSI Model 1) What is layer 1 in the OSI model? Physical 2) What is layer 2 in the OSI model? Data link 3) What is layer 3 in the OSI model? Network 4) What is layer 4 in the OSI model? Transport 5) What is layer 5 in the OSI model? Session 6) What is layer 6 in the OSI model? Presentation 7) What is layer 7 in the OSI model? Application 8) Layers interact with ___? adjoining layers 9) A computer user mostly interacts with ___? the application layer 10) What occurs in the presentation layer? Data compression and encryption 11) What occurs in the session layer? Sessions are created 12) The session layer responds to service requests from the ___ layer and issues service requests to the ___ layer. presentation, transport 13) The TCP and UDP protocols are used on what layer? Transport 14) The network layer uses ___ to route packets. IP addresses 15) The data link layer uses ___ to route frames. MAC addresses 16) The physical layer handles data as ___. binary 17) Routers work in the ___ layer. network 18) An (unmanaged) switch works in the ___ layer. data link 19) Data is grouped into frames in the ___ layer. data link 20) What are some benefits of a layered model? All of the above 21) What are the upper layers of the OSI model? Application, presentation, and session 22) Data is grouped into packets in the ___ layer. network 23) Data is grouped into segments in the ___ layer. transport Physical Connections 1) Which 3 methods are commonly used to connect a WAN? Fiber-optic, satellite, leased lines 2) What is the speed of Gigabit Ethernet? 1000 Mb/s 3) What is the speed of Fast Ethernet? 100 Mb/s 4) Referring to networking cables, what does UTP stand for? Unshielded Twisted Pair 5) UTP cables have what type of connector? RJ45 6) What is the maximum length of cat5/cat5e/cat6 UTP cable? 100 meters 7) What type of cable should be used to connect a computer to a switch? Straight-through 8) How fast is a T1 line? 1.544 Mbps 9) How fast is a T3 line? 44.736 Mbps 10) 802.11G operates at what frequency? 2.4 GHz 11) 802.11N operates at what frequency? 2.4 GHz or 5 GHz 12) How fast is 802.11b? 11 Mbps 13) How fast is 802.11g? 54 Mbps 14) How fast is 802.11n? 300 Mbps 15) Which of the following is the least susceptible to lightning? Fiber-optic Protocols 1) What is the primary networking protocol for transmitting data across the network? TCP/IP 2) UDP is a ___ protocol. connectionless 3) TCP is a ___ protocol. connection oriented 4) TCP establishes a session with a ___ process. three way handshake 5) TCP uses an error checking process known as ___. CRC 6) What type of data is generally sent using UDP? VoIP and streaming music 7) What protocol is used to resolve IP addresses to MAC addresses? ARP 8) What protocol is used to transmit web pages across the internet? HTTP 9) What protocol is used to upload and download files across the network? FTP 10) What protocol sends error messages and is used by ping and tracert commands? ICMP 11) What protocol is used to send e-mails between servers? SMTP 12) What protocol is used to retrieve e-mail from a mail server? POP3 13) What protocol is used to secure HTTPS data? SSL 14) FTP protocol uses which ports? 20 and 21 15) The SMTP protocol uses which port? 25 16) The DNS protocol uses which port? 53 17) The HTTP protocol uses which port? 80 Security 1) One method to manage network security is to divide the network into ___. zones 2) A ___ is a software or hardware security system that controls incoming and outgoing network traffic based on a set of rules. firewall 3) What is the riskiest part of a network? The internet 4) A group of computers that's been compromised and controlled for malicious intent is called a ___? botnet 5) A ___ is a network zone that's located between an intranet and the internet. perimeter network 6) A firewall will usually seperate which two network zones? Intranet and internet 7) Which option provides the most secure wireless security protocol? 802.1x 8) The ___ protocol can increase network security by hiding intranet IP addresses. NAT