MMT
MMT
SELF-ESSAY
Question 1.1: Computer networks are designed and installed from the
perspective of:
A. Multi-layered structure
B. Multi-layered
C. Layered
D. Aggregated
Question 1.2: When using a computer network, we will gain the following
benefits:
A. Shared resources (hard drives, databases, printers, utility software...)
B. Centralized management
C. Take advantage of the processing power of idle computers combined to
perform tasks
large
D. All are correct
Question 1.3: The basic unit for measuring data transmission speed is:
A. Bit
B. Byte
C. Bps (bit per second)
D. Hz
Question 1.4: What stages must the process of data moving from one
computer system to another go through:
A. Data analysis
B. Data compression
C. Packaging
D. Data filtering
Question 1.11: How many pairs of cables does UTP Cat 5 cable have:
A. 2
B. 4
C. 6
D. 8
Question 1.12: Important characteristics of client/server network architecture
(client/server):
A. Client/server is a hierarchical architecture, the client plays the role of
request and the server responds
those requirements.
B. Server is a host that is always active, usually has a fixed IP, and has a
group of servers to share job. Clients have intermittent connections,
changeable IP addresses, communicate with servers, and usually do not
communicate directly with other clients.
C. Statements A and B are both correct
D. Statements A and B are both incorrect
Question 1.13: Which of the following statements is true when talking about
point-to-point networks:
A. Broadcast network
B. Connect each pair of nodes together according to a defined geometry
C. Store - and - Forward network
D. Intermediate nodes: receive, temporarily store and forward information
Question 1.15: Which of the following statements is true when talking about
the characteristics of broadcast networks:
A. All nodes have access to the same physical link
B. Connect each pair of nodes together according to a determined geometry
C. Intermediate nodes: receive, temporarily store and forward information
D. Low possibility of information collision (collision).
Question 1.18: Which of the following statements is true about the packet
fragmentation process:
A. Reduces processing time
B. Increases network flexibility
C. Affects the speed of data exchange in the network
D. Increases the speed of information exchange in the network
Question 1.19: Which of the following statements is true when talking about
link-oriented data transmission:
A. High reliability, guaranteed service quality and confirmation
B. No need for high reliability, low service quality
C. With confirmation, no error control, flow control
D. High reliability, no confirmation
Question 1.20: Which of the following statements is true about the physical
structure of the network:
A. Network protocol (Protocol)
B. Network topology (Topology )
C. Transmission medium
D. Network services
Question 1.24: With a star network connection, when one station in the
network stops working, the remaining stations:
A. Operating normally
B. All operating stopped
C. Operating unstable
D. The above statements are all false
Question 1.25: Which network configuration allows all pairs of devices to have
a direct physical connection:
A. Star (star form)
B. Bus (backbone form)
C. Mesh (mesh form)
D. Hierarchical (hierarchical form)
Question 1.26: In basic principles, which of the following UTP Cat5e cables
should be used to directly connect two PCs together:
A. Straight cable
B. Crossover cable
C. Coiled cable
D. All three types above
Question 1.28: What type of network is restricted at the building or office level:
A. GO
B. ONE
C. MAN
D. LEARN
Question 1.30: In terms of error rate on data transmission lines, which type of
network is highest:
A. MAN
B. WAN
C. Internet
D. LAN
Question 1.31: What is the maximum length allowed when using UTP network
cables?
A. 100
B. 200
C. 350
D. 400
Question 1.32: What stages must the process of data moving from one
computer system to another go through:
A. Data analysis
B. Data filtering
C. Data packaging
D. Data testing
Question 1.38: Which of the following binary numbers has the value 164:
A. 10100100
B. 10010010
C. 11000100
D. 10101010
Question 1.42: Which of the following statements is correct when talking about
the characteristics that distinguish a cell and a packet:
A. Cells smaller than a packet
B. Cells without a physical address
C. Fixed-length cells
D. Fixed-length packets
Question 1.44: Which of the following devices is used at the center of a star
network:
A. Switch, Brigde
B. Netcard
C. Port
D. Repeater
Question 1.46: The value of 11101101 (binary bit value) in base 16 is:
A. CB
B. ED
C. CF
D. EC
Question 1.47: Which of the following describes a star network?
A. Data transmission via coaxial cable
B. Each network node connects directly to all other nodes
C. There is a central node and other network nodes connect to it
D. Network nodes use the same line cable
Question 1.50: Which of the following statements is true when talking about
protocols used on fiber optic cables:
A. Frame Relay
B. FDDI
C. SONET
D. Both B and C are correct
Question 1.59: Order of layers from high to low in the TCP/IP model:
A. Application, Internet, Transport, Network Access
B. Application, Network Access, Transport, Internet
C. Application, Transport, Internet, Network Access
D. Transport, Internet, Application, Network Access
Question 1.61: The order of layers of the OSI model from top to bottom is:
A. Application, Presentation, Session, Transport, Link, Network, Physical
B. Application, Presentation, Session, Network, Transport, Link, Physical
C. Application, Presentation, Session, Transport, Network, Link, Physical
D. Application, Presentation, Transport, Session, Link, Network, Physical
Question 1.67: When connecting a computer from home to the ISP via a
phone line, the signal on the phone line will belong to the following layer:
A. Transport
B. Network
C. Data link
D. Physical
Question 1.68: According to the OSI model, the JPG image format is located
at the following layer:
A. Application
B. Session
C. Presentation
D. Network
Question 1.69: The OSI model divides communication activities into several
layers:
A. 7 floors
B. 5 floors.
C. 4 floors
D. 3 floors.
Question 1.70: The layers of the OSI model, in order from bottom to top, are:
A. Physical, TCP, IP, Network, Transport, Session, Presentation and
Applications
B. Physical, Data Link, Transport, Network, Session, Presentation and
Applications.
C. Physical, Data Link, Network, Transport, Session, Presentation and
Application.
D. Physical, Data Link, Network, TCP, IP, Session and Application.
Question 1.71: Which layer determines the interface between the user and the
OSI environment:
A. Application layer
B. Presentation layer
C. Session layer
D. Transport layer
Question 1.75: In the OSI model, which layer performs path selection and
information forwarding:
A. Network
B. Transport
C. Session
D. Data link
Question 1.76: In the OSI model, opening and closing conversations between
computers is the responsibility of:
A. Session layer
B. Transport layer
C. Data link layer
D. Physical layer
Question 1.77: In the OSI model, what is the relationship of a layer (N) to the
layer above it (N+1):
A. Layer N provides services to layer N+1
B. Layer N+1 adds part of the information input received from layer N
C. Layer N applies the services provided by layer N+1
D. Layer N has no impact on layer N+1
Question 1.78: In the Internet network model, the UNICODE standard (for
encoding characters) will be located at the following layer:
A. Application
B. Transport
C. Network
D. Data link
Question 1.79: According to the OSI model, the JPG image format is located
at the following layer:
A. Application
B. Session
C. Presentation
D. Network
Question 1.80: The data unit at the presentation layer is:
A. Byte
B. Data
C. Frame
D. Packet
Question 1.82: Which layer in the OSI model is responsible for data
encryption:
A. Application
B. Presentation
C. Session
D. Transport
Question 1.83: Which layer in the OSI model works with electrical signals:
A. Data Link
B. Network
C. Physical
D. Transport
Question 1.85: Order of layers from low to high in the TCP/IP model:
A. Application, Network, Transport, Network Access
B. Network, Transport, Network Access, Application
C. Network Access, Network, Transport, Application
D. Network Access, Transport, Network, Application
Question 1.86: The data unit at the Data link layer is:
A. Byte
B. Data
C. Frame
D. Packet
Question 1.94: The port number of the SMTP mail transmission protocol is:
A. 23
B. 25
C. 21
D. 110
Question 1.96: Among the following protocol and service port pairs, which pair
is incorrect:
A. SMTP:TCP Port 25
B. FTP:UDP Port 22
C. HTTP:TCP Port 80
D. DNS:UDP Port 53
Question 1.97: Which of the following protocols operates on top of the UDP
protocol:
A. ARP
B. DNS
C. Telnet
D. All of the above statements are correct
Question 1.98: Which of the following statements is true regarding the HTML
hypertext markup language:
A. Is a World Wide Web procedure
B. Method for linking text files
C. Is a tool for editing Web information pages
D. Web interface
Question 1.99: Which of the following statements is true when talking about
the name of the type of server that provides email services:
A. Web Server
B. Mail Server
C. FTP Server
D. Proxy
Question 1.100: Which of the following statements is true when talking about
data units of the Application layer:
A. Message
B. Segment/ Datagram
C. Packet
D. Frame (Data Frame)
Question 1.106: The protocol used for both parties to transfer files is:
A. HTTP
B. FTP
C. SMTP
D. SNMP
Question 1.108: Suppose all computers with FPT Internet subscriptions when
accessing the website google.com are redirected to another website.
Computers subscribed to other ISPs do not encounter this situation. The
biggest cause of error would be:
A. Computers are infected with viruses
B. Google website is corrupted
C. FPT's DNS server is corrupted
D. ISP FPT's outgoing router is faulty
Question 1.109: What are Web clients usually called:
A. Netscape Navigator
B. Browers
C. Mosaic
D. HTML interpreter (HTML interpreter)
Question 1.112: Which of the following statements is true about the HTTP
protocol:
A. The protocol version is always included in all messages
B. All headers are text
C. All data is transmitted as text
D. A and B
Question 1.117: Code 404 in the response message from the Web server to
the Web client has the following meaning:
A. The server does not understand the client's request
B. The object the client requested does not exist
C. There is no correct answer
D. The client's request is invalid
Question 1.118: Protocol used to transmit mail between mail servers (Mail
server)
To be:
A. HTTP
B. FTP
C. SMTP
D. POP
Question 1.126: In the DNS database, resource records (RR) are stored in the
form:
A. (name, value, type, ttl)
B. (value, name, ttl, type)
C. (value, ttl, name, type)
D. (name, type, ttl, value)
PART 4. TRANSPORTATION LAYER
Question 1.129: The Window field in the TCP packet header refers to:
A. Available memory size
B. Operating system
C. Screen size
D. All are wrong
Question 1.130: TCP connection request packets will have the following flag
values:
A. RST=1, SYN=1
B. ACK=1, SYN=1
C. ACK=0, SYN=1
D. FIN=1, SYN=0
Question 1.131: At what layer of the OSI model do TCP and UDP operate?
A. Session (Layer 5)
B. Transport (Layer 4)
C. Network (Layer 3)
D. Data Link (Layer 2)
Question 1.132: Which of the following statements is true when talking about
effective bandwidth usage techniques:
A. Static windowed flow control
B. Guaranteed rate flow control
C. Dynamic windowed flow control
D. Dynamic speed flow control
Question 1.133: TCP protocol operates at the same layer as which protocols:
A. ARP, RARP
B. UDP
C. TELNET, FTP
D. IP, ARP
Question 1.135: The UDP protocol is used for the following applications:
A. Requires connectivity
B. Requires high reliability
C. Requires low latency
D. Does not require high reliability
Question 1.137: In a UDP data packet (UDP segment), the data area actually
starts from the first byte:
A. 4
B. 5
C. 8
D. 9
Question 1.138: Which of the following equations best describes the UDP
protocol:
A. UDP = IP
B. UDP = TCP - (reliability)
C. UDP = ICMP + (channelization by port address)
D. UDP = TCP – IP
Question 1.139: To detect errors in packets, people use the following
techniques:
A. Sequence number
B. Acknowledgment number
C. Timer
D. Checksum
Question 1.140: When a TCP entity sends a SYNACK segment packet with
Acknowledgement Number = 100, this means:
A. The data packet it sends starts with the 100th byte in the data stream
B. The first data byte in the data stream it sends has sequence number 100
C. It sends it from the 100th byte
D. It expects to receive data starting with byte number 100
Question 1.144: The actual data location in a TCP data packet starts from
byte:
A. 40
B. 32
C. 5
D. Not determined
Question 1.145: Suppose TCP entity A needs to send 1500 bytes to transport
entity B. The first packet contains 1000 bytes of data, the Sequence Number
field of this packet is 100. The Sequence Number field of the second packet
will be:
A. 1101
B. 1100
C. 500
D. 501
Question 1.146: With the TCP protocol, the receiving party will notify the
sending party about the maximum amount of data it can receive. This value is
determined in the field:
A. Sequence Number
B. Acknowledgement Number
C. Rcvr Number
D. Header length
Question 1.147: After a TCP entity sends a SYN segment packet with
Sequence Number = 100, it receives an ACKSYN packet with Sequence
Number = 200. The Acknowledgment Number field of this ACKSYN packet will
be:
A. 100
B. 101
C. 200
D. 201
Question 1.150: In a UDP data packet (UDP segment), the address used to
identify the receiving process is located at:
A. Bytes 1 and 2
B. Bytes 3 and 4
C. Bytes 5 and 6
D. Unknown
Question 1.151: TCP and UDP protocols operate at which of the following
layers:
A. Transport
B. Network
C. Application
D. Presentation
Question 1.152: At what layer of the OSI model does the TCP protocol work?
A. Application layer
B. Transport layer
C. Network layer
D. Data link layer
Question 1.153: Which of the following protocols does not ensure that the data
sent reaches the recipient completely?
or not:
A. TCP
B. ASP
C. UDP
D. ARP
Question 1.155: Suppose the Length field of a UDP data packet has the value
150. The actual data would be:
A. 67 byte
B. 142 byte
C. 150 byte
D. 158 byte
Question 1.156: Observe a person accessing a website and see him type the
following link: http://www.tomang.net:3000. Please tell us how the web server
on which the website uses TCP port:
A. Use default port
B. Do not use default port
C. Use standard port
D. Use a dedicated port for the Web server
Question 1.161: The first byte of an IP address has the form: 11100001. So
which class does it belong to:
A. Class B
B. Class C
C. Class D
D. Class E
Question 1.162: In a computer network using the TCP/IP protocol and all
using the Subnet Mask of 255.255.255.0, which of the following pairs of
computers are connected:
A. 192.168.1.3 and 192.168.100.1
B. 192.168.15.1 and 192.168.15.254
C. 192.168.100.15 and 192.186.100.16
D. 172.25.11.1 and 172.26.11.2
Question 1.167: Which of the following IP addresses has the same network
address (Subnet) as IP address 192.168.1.10/24:
A. 192.168.10.1/24
B. 192.168.1.256/24
C. 192.168.11.12/24
D. 192.168.1.33/24
Question 1.176: Which path finding algorithm does the RIP protocol use:
A. Flooding
B. Distance vector routing
C. Link state
D. Bellman-Ford
Question 1.183: What terms are used to describe data units at the network
layer:
A. Datagram
B. Frame
C. Packet.
D. Both A and C are correct
Question 1.191: Which of the following solutions can solve the scarcity of IP
addresses:
A. IPv6
B. Network Address Translation
C. Subnet mask
D. All of the above options
Question 1.196: If 4 PCs connect to each other through a HUB, how many IP
addresses are needed for these 5 network devices:
A. 1
B. 3
C. 4
D. 2
Question 1.201: Which of the following network devices has the capability to
route a packet (forward the packet to another network on the way to the
destination network) by relying on the destination IP address contained in the
packet and the current network status information represented in the routing
table within the device:
A. Bridge
B. Router
C. Switch
D. Both A, B and C
Question 1.207: Of the following addresses, choose the address that is not on
the same network as the remaining addresses:
A. 203.29.100.100/255.255.255.240
B. 203.29.100.110/255.255.255.240
C. 203.29.103.113/255.255.255.240
D. 203.29.100.98/255.255.255.240
Question 1.212: A network connection has an MTU value of 1500 bytes. The
largest data packet size that can be transmitted over this connection is:
A. 1400 bytes
B. 1480 bytes
C. 1500 bytes
D. 1600 bytes
Question 1.215: How many bytes does an IPv6 packet have in the header:
A. 20 byte
B. 30 byte
C. 40 byte
D. 50 byte
Question 1.219: Error control and data flow control are performed by:
A. Network layer
B. Data link layer
C. Physical layer
D. Session layer
Question 1.220: Which protocol is used to convert from IP address to MAC
physical address:
A. ARP
B. RARP
C. ICMP
D. TCP
Question 1.221: The process allows the host to automatically obtain its IP
address from the server when connecting to the network:
A. Host broadcasts message "DHCP discover" --> DHCP server responds
with "DHCP offer"
--> host sends message "DHCP request" --> DHCP server sends "DHCP ack"
B. Host sends message "DHCP request" --> DHCP server sends "DHCP ack"
--> host broadcasts message "DHCP discover" --> DHCP server responds
with "DHCP offer"
C. Host broadcasts message "DHCP discover" --> DHCP server sends
"DHCP ack" --> host sends message "DHCP request" --> DHCP server
responds with "DHCP offer"
D. Host sends message "DHCP request" --> DHCP server responds with
"DHCP offer" -->host broadcasts message "DHCP discover" --> DHCP server
sends "DHCP ack"
Question 1.222: CSMA/CD is a random access method used for networks with
the following structure:
A. Star (STAR)
B. BUS
C. Ring (RING)
D. Hybrid BUS-STAR
Question 1.224: What information do the first three bytes of the MAC address
indicate:
A. Network card (NIC) manufacturer name
B. Network card geographic region
C. Network card version number
D. All of the above statements are incorrect
C. Router
D. Hub
Question 1.226: Which of the following addresses is a layer 2 address (MAC
address):
A. 192.201.63.251
B. 0000.1234.FEG
C. 19-22-01-63-25
D. 00-00-12-34-FE-AA
Question 1.228: Which of the following access methods listens for network
traffic on the transmission line before transmitting data:
A. CSMA/CD
B. CSMA/CA
C. Token RING
D. Token BUS
Question 1.229: Which of the following standards describes local area network
architecture standards for Ethernet, including physical layer and MAC
sublayer standards:
A. IEEE802.2
B. IEEE802.3
C. Token Bus
D. Token Ring
Question 1.234: In the OSI model, determining the physical address from the
logical address is the responsibility of:
A. Application layer
B. Data link layer
C. Network layer
D. Transport layer
Question 1.235: Which of the following services must the data link layer
provide:
A. Placing network layer packets into Frames
B. Encoding bits into physical signals
C. Creating reliable transmission
D. Sentences A and B are both correct
Question 1.236: Suppose one adds 1 check bit to the end of the sent data
stream so that the total number of 1 bits in the new string is an odd number.
The receiver receives the string 1000101010001 then:
A. The received string is in error
B. The received string is completely correct
C. Errors in this bit string can be detected and corrected
D. No error is known in the received string
Question 1.239: Which of the following statements is most correct for Switch:
A. Using physical addresses and operations at the Physical layer of the OSI
model
B. Using physical addresses and operations at the Network layer of the OSI
model
C. Using physical addresses and operations at the DataLink layer of the OSI
model
D. Using IP addresses and operating at the Network layer of the OSI model
Question 1.240: What will happen to data when there is a collision during data
transmission:
A. The Hub/Switch will resend the data
B. The data will be destroyed
C. The data will be restored at the receiving device
D. Both A and C are correct
Question 1.243: To limit collision of packets on the network, people divide the
network into smaller networks and connect them with devices:
A. Repeater
B. Hub
C. Switch
D. Card mạng (NIC)
Question 1.245: Which address does the Switch use when deciding which port
to send data to:
A. Source MAC address
B. Destination MAC address
C. Network address
D. Subnetwork address
Question 1.246: Which of the following services must the data link layer
provide:
A. Placing network layer packets into Frames
B. Routing
C. Encode bits into physical signals
D. Create reliable transmission lines
Question 1.249: Which of the following technologies has a fixed data frame
frequency:
A. X25
B. Frame Relay
C. ISDN
D. ATM
Question 1.252: IEEE 802 standard divides the Data Link layer of the OSI
model into 2 sub-layers:
A. LLC and MAC
B. TCP and UDP
C. TCP and IP
D. ARP and RARP
Question 1.254: The data transmission speed of the 1000Base-FX topology is:
A. 10 Mbps
B. 100 Mbps
C. 1000 Mbps
D. 10 Gbps
Question 1.255: Fast Ethernet LAN technology has a basic data transmission
speed of:
33
A. 10 Mbps
B. 100 Mbps
C. 1.000 Mbps
D. 10.000 Mbps
Question 1.256: The WLAN 802.11b/g standard has the corresponding data
transmission speed of:
A. 11/100 Mbps
B. 11/54 Mbps
C. 11/108 Mbps
D. 2/54 Mbps
Question 1.257: The operating frequency of the WLAN 802.11g standard is:
A. 5 Ghz
B. 2,3 Ghz
C. 2,4 Ghz
D. 2,5 Ghz
Question 1.261: Which of the following protocols is used in the WAN model:
A. TCP/IP
B. NetBEUI
C. DLC
D. All of the above
Question 1.262: Which of the following protocols is used in the LAN model:
A. TCP/IP
B. IPX/SPX
C. NetBEUI
D. All
Question 1.264: Network safety in the sense of protecting and ensuring safety:
A. Network software
B. Network resources
C. Network hardware
D. Data warehouse
Question 1.273: Use the IPconfig command when you want to:
A. Determine the path of packets from source to destination
B. Know the computer's TCP/IP configuration status (configuration of network
cards)
C. Analyze packets to solve a specific problem of network
D. Check network errors
Question 1.276: In the command syntax telnet ip/host port includes the
following parameters:
A. ip is the source device's IP address, host is the terminal device name, and
port is the communication port for contacting the terminal
B. ip is the IP address of the terminal device, host is the terminal device name,
and port is the port used to communicate with the terminal device
C. ip is the source device's IP address, host is the source device name, port is
the source port
D. ip is the source device's IP address, host is the terminal device name, port
is the source port
A. Ping
B. Tracert
C. Netstat
D. Ipconfig
A. Ping
B. Ping –a
C. Tracert
D. Netstat
Question 1.286: Which of the following statements is true when talking about
ADSL connection models:
A. PPPoA (Point to Point over ATM) model
B. PPPoE (Point to Point over Ethernet) model RFC 2516
C. IP over ATM model (RFC 1483R)
D. All are correct
Question 1.288: When I forget the ADSL Router's password, how do I restore
the default password:
A. Look up the supplier's user manual
B. Supply power to the ADSL Router and hold down the Reset button for a
certain period of time
C. Use software to detect Username and Password
D. Default password cannot be restored
Question 1.289: To configure the ADSL Router to connect to the Internet, the
basic parameters that need to be set are:
A. VCI/VPI, LAN IP Address, Account connected to the service provider (user,
password)
B. DHCP Service
C. Statements a and b are correct
D. All of the above statements are incorrect
Question 1.294: You are using FTP in Command Promt, you want to create a
folder named "Test" on your local machine (you still cannot exit FTP). What
command would you use:
A. #md test
B. !md test
C. Md Test
D. Mkdir test