Chapter 1
Chapter 1
Section 1-2
6. Define the term protocol.
9. A disadvantage of the Token Ring system is that if an error changes the token
pattern, it can cause the token to stop circulating. This can be eliminated by
adding which of the following?
a. Router
b. Multiport repeater
c. Token passer
d. Token Ring hub
11. What is the difference between a hub and a switch?
Section 1-3
12. What are the seven layers of the OSI model?
13. Which OSI layer is responsible for adding a header that includes routing
information?
Chapter 1
14. Which OSI layer is considered the media access control layer?
17. Which OSI layer is responsible for the mechanical connection to the network?
18. The OSI layer responsible for data compression and encryption is which layer?
21. IP and IPX are examples of protocols that operate in what layer of the OSI
model?
22. The network interface card operates at what layer of the OSI model?
23. Why are the layers of the OSI model important to the network administrator?
Section 1-4
24. Define the acronym CSMA/CD and the protocol that uses CSMA/CD.
26. What is the minimum size of the data payload in an Ethernet frame?
30. In Windows Vista or Windows XP, how would you find the Ethernet (MAC)
address?
31. INTERNET SEARCH: Find the device manufacturer for the following Ethernet
devices:
a. 00-C0-4F-49-68-AB
Chapter 1
b. 00-0A-27-B7-3E-F8
c. 00-04-76-B6-9D-06
d. 00-00-36-69-42-27
32. State the class of address (A, B, or C) for the following IP addresses:
a. 46.39.42.05____
b. 220.244.38.168____
c. 198.1.0.4____
d. 126.87.12.34____
e. 99.150.200.251____
f. 128.64.32.16____
33. Expand the acronym TCP/IP.
Section 1-5
34. Cite the three advantages of a wired network.
36. What does it mean for a wireless networking device to be Wi-Fi compliant?
37. What are the most common types of equipment that are used to establish a
broadband connection to the ISP?
38. Name six issues that should be considered when planning a home network?
39. Why is checking the lights of the networking device that connects to the ISP
important?
42. List five steps that can be used to protect the home network.
43. You have the choice of selecting a networking device with WEP and another
with WPA. Which offers better security and why?
44. What are the potential problems of using the default factory passwords?
Chapter 1
45. What is the purpose of the SSID, and what can the network administrator do to
protect the network from hackers who might have learned the SSID?
47. How does NAT (Network Address Translation) help protect outsider access to
computers in the home network?
49. What is a VPN, and how does it protect the data transferred over a wireless
network?
Section 1-6
53. Which of the following is not a step in building an office LAN?
a. Obtaining proper government permits
b. Configuring the network settings
c. Connecting the devices together
d. Network documentation
54. What does RJ-45 represent?
a. A 45-pin connector for CAT6
Chapter 1
56. What is the maximum speed and length for Category 6 cabling?
Section 1-7
60. What command would you use to ping 10.3.9.42 indefinitely?
61. What command would you use to ping 192.168.5.36 20 times with 1024 bytes
of data?
CERTIFICATION QUESTIONS
63. In terms of computer security, a switch offers better security than a hub. Why
is this?
a. A hub requires a special pin to activate the connection.
b. A hub forwards the data it receives to every device connected to the hub.
It is possible for network devices to pick up data intended for a different
device. A switch eliminates this by only forwarding data packets to the
correct device whenever possible.
c. A switch forwards the data it receives to every device connected to the
switch. It is possible for network devices to pick up data intended for a
different device. A hub eliminates this by only forwarding data packets
to the correct device whenever possible.
d. The use of the switch guarantees that all devices connected to it will share
link integrity pulses. This sharing of the pulses strengthens the security
of the connection.