0% found this document useful (0 votes)
37 views

MMT

Uploaded by

l.shu.280104
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

MMT

Uploaded by

l.shu.280104
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

QUESTION BANK FOR MULTIPLE-CHOICE EXAM AND

SELF-ESSAY

PART 1. BASIC CONCEPTS

Question 1.1: Computer networks are designed and installed from the
perspective of:
A. Multi-layered structure
B. Multi-layered
C. Layered
D. Aggregated

Question 1.2: When using a computer network, we will gain the following
benefits:
A. Shared resources (hard drives, databases, printers, utility software...)
B. Centralized management
C. Take advantage of the processing power of idle computers combined to
perform tasks
large
D. All are correct

Question 1.3: The basic unit for measuring data transmission speed is:
A. Bit
B. Byte
C. Bps (bit per second)
D. Hz

Question 1.4: What stages must the process of data moving from one
computer system to another go through:
A. Data analysis
B. Data compression
C. Packaging
D. Data filtering

Question 1.5: Network connections use different protocols using:


A. Repeater
B. Communication gateway
C. SONET
D. Router
Question 1.6: Disadvantages of star network are:
A. Difficult to install and maintain
B. Difficult to fix when cable errors occur, and affect other network nodes
C. Requires too many cables to connect to the central network node
D. Inability to change once installed

Question 1.7: Characteristics of a Bus network:


A. All network nodes connect to a central network node (eg Hub)
B. All nodes connect on the same physical link
C. All network nodes are directly connected to each other
D. Each network node connects to the other 2 network nodes

Question 1.8: In the circuit switching technique, before exchanging


information, the system will establish a connection between two entities using
a:
A. Physical link
B. Virtual connection
C. Virtual line
D. Logical line

Question 1.9: Interconnecting independent LAN, WAN, MAN networks with


each other using devices with the following functions:
A. Error control, flow control
B. Routing
C. Link control
D. Flow control and synchronization

Question 1.10: UTP Cat5e cable uses connectors:


A. RJ - 58
B. BNC
C. RJ - 45
D. ST

Question 1.11: How many pairs of cables does UTP Cat 5 cable have:
A. 2
B. 4
C. 6
D. 8
Question 1.12: Important characteristics of client/server network architecture
(client/server):
A. Client/server is a hierarchical architecture, the client plays the role of
request and the server responds
those requirements.
B. Server is a host that is always active, usually has a fixed IP, and has a
group of servers to share job. Clients have intermittent connections,
changeable IP addresses, communicate with servers, and usually do not
communicate directly with other clients.
C. Statements A and B are both correct
D. Statements A and B are both incorrect

Question 1.13: Which of the following statements is true when talking about
point-to-point networks:
A. Broadcast network
B. Connect each pair of nodes together according to a defined geometry
C. Store - and - Forward network
D. Intermediate nodes: receive, temporarily store and forward information

Question 1.14: Which of the following statements is true about the


disadvantages of point-to-point networks:
A. Low possibility of information collision
B. Low transmission efficiency, takes up a lot of resources
C. High latency, takes a lot of time to set up transmission lines and process at
nodes
D. Low information exchange speed

Question 1.15: Which of the following statements is true when talking about
the characteristics of broadcast networks:
A. All nodes have access to the same physical link
B. Connect each pair of nodes together according to a determined geometry
C. Intermediate nodes: receive, temporarily store and forward information
D. Low possibility of information collision (collision).

Question 1.16: Which of the following statements is true about circuit-switched


networks:
A. Establishing a physical link, transferring data, and releasing the link
between 2 entities
B. Establishing a logical link, transferring data, and releasing the link between
2 entities
C. Transmitting data between 2 entities
D. Establish a link and release a link between two entities

Question 1.17: Which of the following statements is true about packet


switching networks:
A. Packets flow over logical connections
B. Packets flow over physical connections
C. Packets flow independently towards destination
D. Packets flow over logical connections toward their destination, and on a
path, many packets may circulate at the same time

Question 1.18: Which of the following statements is true about the packet
fragmentation process:
A. Reduces processing time
B. Increases network flexibility
C. Affects the speed of data exchange in the network
D. Increases the speed of information exchange in the network

Question 1.19: Which of the following statements is true when talking about
link-oriented data transmission:
A. High reliability, guaranteed service quality and confirmation
B. No need for high reliability, low service quality
C. With confirmation, no error control, flow control
D. High reliability, no confirmation

Question 1.20: Which of the following statements is true about the physical
structure of the network:
A. Network protocol (Protocol)
B. Network topology (Topology )
C. Transmission medium
D. Network services

Question 1.21: The Internet is:


A. A global network of computers connected together according to the TCP/IP
protocol
B. Wide area network
C. Global computer network
D. Network of interconnected subnets

Question 1.22: In a BUS network, all stations randomly access:


A. Common line
B. Network server
C. Buffer memory
D. Network connection devices

Question 1.23: Star LAN (STAR) when there is a problem:


A. Will stop operating the entire system
B. Does not affect the operation of the entire system
C. Only affects the station having problems
D. Only affects part of the system

Question 1.24: With a star network connection, when one station in the
network stops working, the remaining stations:
A. Operating normally
B. All operating stopped
C. Operating unstable
D. The above statements are all false

Question 1.25: Which network configuration allows all pairs of devices to have
a direct physical connection:
A. Star (star form)
B. Bus (backbone form)
C. Mesh (mesh form)
D. Hierarchical (hierarchical form)

Question 1.26: In basic principles, which of the following UTP Cat5e cables
should be used to directly connect two PCs together:
A. Straight cable
B. Crossover cable
C. Coiled cable
D. All three types above

Question 1.27: Which of the following results is incorrect:


A. 163 converted to binary will have the value: 10100011
B. 111 converted to binary will have the value: 01110011
C. 125 converted to binary will have the value: 01111101
D. 178 converted to binary will The value is: 10110010

Question 1.28: What type of network is restricted at the building or office level:
A. GO
B. ONE
C. MAN
D. LEARN

Question 1.29: Maximum length of a segment in 100Base-TX architecture:


A. 3 km
B. 100 meters
C. 550 meters
D. 25 meters

Question 1.30: In terms of error rate on data transmission lines, which type of
network is highest:
A. MAN
B. WAN
C. Internet
D. LAN

Question 1.31: What is the maximum length allowed when using UTP network
cables?
A. 100
B. 200
C. 350
D. 400

Question 1.32: What stages must the process of data moving from one
computer system to another go through:
A. Data analysis
B. Data filtering
C. Data packaging
D. Data testing

Question 1.33: When connecting a network between two computers, what


type of cable do you usually use to connect directly between them:
A. Fiber optic cable
B. Straight UTP cable
C. STP cable
D. Crossover UTP cable

Question 1.34: The rules governing computer communications are called:


A. Protocols
B. Services
C. Network operating systems
D. Load carrying devices

Question 1.35: Two different types of computers can communicate if:


A. They install the same network operating system
B. They comply with the OSI model
C. They use the same TCP/IP protocol
D. They have the same hardware

Question 1.36: To connect two computers together we can use:


A. Hub
B. Switch
C. Direct cable connection
D. All are correct

Question 1.37: Represent the number 125 from decimal to binary:


A. 01111101
B. 01101111
C. 01011111
D. 1111101

Question 1.38: Which of the following binary numbers has the value 164:
A. 10100100
B. 10010010
C. 11000100
D. 10101010

Question 1.39: Which devices operate at the Physical layer:


A. Switch
B. Network card
C. Hub and repeater
D. Router

Question 1.40: The common information transmission environment in a


computer network is:
A. Cable types such as: UTP, STP, telephone cable, fiber optic cable,...
B. Infrared waves
C. All of the above mentioned environments
D. None of these are correct
Question 1.41: The components that make up the network are:
A. Máy tính, hub, switch
B. Network adapter, cable
C. Protocol
D. All are correct

Question 1.42: Which of the following statements is correct when talking about
the characteristics that distinguish a cell and a packet:
A. Cells smaller than a packet
B. Cells without a physical address
C. Fixed-length cells
D. Fixed-length packets

Question 1.43: Protocol is:


A. Rules to allow computers to communicate with each other
B. One of the indispensable components in a network system
C. A and B are incorrect
D. A and B are correct

Question 1.44: Which of the following devices is used at the center of a star
network:
A. Switch, Brigde
B. Netcard
C. Port
D. Repeater

Question 1.45: The architecture of a LAN can be:


A. RING
B. BUS
C. STAR
D. A, B and C can be used separately or in combination

Question 1.46: The value of 11101101 (binary bit value) in base 16 is:
A. CB
B. ED
C. CF
D. EC
Question 1.47: Which of the following describes a star network?
A. Data transmission via coaxial cable
B. Each network node connects directly to all other nodes
C. There is a central node and other network nodes connect to it
D. Network nodes use the same line cable

Question 1.48: Which type of cable is most commonly used today:


A. Coaxial cable
B. STP cable
C. UTP cable (CAT 5)
D. Fiber optic cable

Question 1.49: Which of the following network protocols is used in LAN:


A. TCP/IP
B. NetBIOS
C. IPX
D. All of the above

Question 1.50: Which of the following statements is true when talking about
protocols used on fiber optic cables:
A. Frame Relay
B. FDDI
C. SONET
D. Both B and C are correct

Question 1.51: Internet standards are:


A. TCP and UDP
B. ACK and NAK
C. RFC and IETF
D. FDM and TDM

Question 1.52: Bandwidth is:


A. Data transmission rate on the line
B. A measure of the frequency range that the line can accommodate
C. A measure of the signal weakening on the line
D. Measures the influence of external electromagnetic noise on the
transmission signal
Question 1.53: Throughput is:
A. Data transmission speed on the line
B. A measure of the frequency range that the line can accommodate
C. Measure of the weakening of the signal on the transmission line
D. Measure of the influence of external electromagnetic noise on the
transmission signal

Question 1.54: The attenuation is:


A. Data transmission rate on the line
B. A measure of the frequency range that the line can accommodate
C. A measure of the signal weakening on the line
D. Measures the influence of external electromagnetic noise on the
transmission signal

Question 1.55: Electromagnetic interference is:


A. Data transmission rate on the line
B. A measure of the frequency range that the line can accommodate
C. A measure of the signal weakening on the line
D. Measures the influence of external electromagnetic noise on the
transmission signal

Question 1.56: Baseband transmission:


A. The entire transmission capacity is devoted to a single communication
channel
B. Two communication channels divide the bandwidth of the transmission line
C. Three communication channels divide the bandwidth of the transmission
path
D. Multiple communication channels jointly divide the bandwidth of the
transmission line

Question 1.57: Broadband transmission:


A. The entire transmission capacity is devoted to a single communication
channel
B. Two communication channels divide the bandwidth of the transmission line
C. Three communication channels divide the bandwidth of the transmission
path
D. Multiple communication channels and divide the traffic clearance of the
road
transmission
PART 2. OSI MODEL AND TCP/IP MODEL

Question 1.58: Order of layers in the OSI reference model:


A. Physical, Data Link, Network, Transport, System, Presentation, Application
B. Physical, Data Link, Network, Transport, Session, Presentation, Application
C. Physical, Data Link, Network, Transform, Session, Presentation,
Application
D. Presentation, Data Link, Network, Transport, Session, Physical, Application

Question 1.59: Order of layers from high to low in the TCP/IP model:
A. Application, Internet, Transport, Network Access
B. Application, Network Access, Transport, Internet
C. Application, Transport, Internet, Network Access
D. Transport, Internet, Application, Network Access

Question 1.60: Correct order of data units in the TCP/IP model:


A. Data, Frame, Segment, Packet, Bit
B. Data, Segment, Frame, Packet, Bit
C. Data, Packet, Frame, Segment, Bit
D. Data, Segment, Packet, Frame, Bit

Question 1.61: The order of layers of the OSI model from top to bottom is:
A. Application, Presentation, Session, Transport, Link, Network, Physical
B. Application, Presentation, Session, Network, Transport, Link, Physical
C. Application, Presentation, Session, Transport, Network, Link, Physical
D. Application, Presentation, Transport, Session, Link, Network, Physical

Question 1.62: The function of the presentation layer is to convert:


A. User language in terms of network common language
B. Information structure in terms of frame structure
C. Packet format
D. Communication sessions between entities
Question 1.63: The functions of the transport layer are:
A. Transporting information between servers (End to End)
B. Controlling errors and data flow
C. Packaging and transporting information
D. Fragmentation and packaging of data

Question 1.64: The functions of the network layer are:


A. Perform path selection
B. Perform switching
C. Error control and data flow
D. Data encapsulation

Question 1.65: The functions of the data link layer are:


A. Create an information frame (Frame)
B. Encapsulate data
C. Select route
D. Transport information between servers (End to End)

Question 1.66: The functions of the physical layer are:


A. Ensuring requirements for transmitting/receiving bit sequences over
physical media
B. Error control and data flow
C. Creating information frames
D. Fragmentation and packaging of data

Question 1.67: When connecting a computer from home to the ISP via a
phone line, the signal on the phone line will belong to the following layer:
A. Transport
B. Network
C. Data link
D. Physical

Question 1.68: According to the OSI model, the JPG image format is located
at the following layer:
A. Application
B. Session
C. Presentation
D. Network
Question 1.69: The OSI model divides communication activities into several
layers:
A. 7 floors
B. 5 floors.
C. 4 floors
D. 3 floors.

Question 1.70: The layers of the OSI model, in order from bottom to top, are:
A. Physical, TCP, IP, Network, Transport, Session, Presentation and
Applications
B. Physical, Data Link, Transport, Network, Session, Presentation and
Applications.
C. Physical, Data Link, Network, Transport, Session, Presentation and
Application.
D. Physical, Data Link, Network, TCP, IP, Session and Application.

Question 1.71: Which layer determines the interface between the user and the
OSI environment:
A. Application layer
B. Presentation layer
C. Session layer
D. Transport layer

Question 1.72: Which of the following layers establishes, maintains, and


aborts "transactions" between terminal entities:
A. Network layer
B. Data link layer
C. Session layer
D. Physical layer

Question 1.73: Which layer performs the transfer of messages between


processes on devices:
A. Network layer
B. Transport layer
C. Data link layer
D. Session layer
Question 1.74: Controlling communications is the function of which layer:
A. Physical
B. Network layer
C. Session layer
D. Presentation layer

Question 1.75: In the OSI model, which layer performs path selection and
information forwarding:
A. Network
B. Transport
C. Session
D. Data link

Question 1.76: In the OSI model, opening and closing conversations between
computers is the responsibility of:
A. Session layer
B. Transport layer
C. Data link layer
D. Physical layer

Question 1.77: In the OSI model, what is the relationship of a layer (N) to the
layer above it (N+1):
A. Layer N provides services to layer N+1
B. Layer N+1 adds part of the information input received from layer N
C. Layer N applies the services provided by layer N+1
D. Layer N has no impact on layer N+1

Question 1.78: In the Internet network model, the UNICODE standard (for
encoding characters) will be located at the following layer:
A. Application
B. Transport
C. Network
D. Data link

Question 1.79: According to the OSI model, the JPG image format is located
at the following layer:
A. Application
B. Session
C. Presentation
D. Network
Question 1.80: The data unit at the presentation layer is:
A. Byte
B. Data
C. Frame
D. Packet

Question 1.81: Select the function of the Presentation layer:


A. Data encryption and data compression
B. Providing user network services
C. Addressing
D. All are incorrect

Question 1.82: Which layer in the OSI model is responsible for data
encryption:
A. Application
B. Presentation
C. Session
D. Transport

Question 1.83: Which layer in the OSI model works with electrical signals:
A. Data Link
B. Network
C. Physical
D. Transport

Question 1.84: The TCP/IP model divides communication activities into


several layers:
A. 7 floors
B. 6 floors.
C. 4 floors
D. 3 floors.

Question 1.85: Order of layers from low to high in the TCP/IP model:
A. Application, Network, Transport, Network Access
B. Network, Transport, Network Access, Application
C. Network Access, Network, Transport, Application
D. Network Access, Transport, Network, Application
Question 1.86: The data unit at the Data link layer is:
A. Byte
B. Data
C. Frame
D. Packet

Question 1.87: The data unit at the Internet layer is:


A. Byte
B. Data
C. Frame
D. Datagram
Question 1.88: The functions of the application layer are:
A. Create an information frame (Frame)
B. Encapsulate data
C. Provide means for users to access the network environment
D. Transport information between servers (End to End)

PART 3. APPLICATION LAYER

Question 1.89: FTP is the acronym for:


A. File Transfer Protocol
B. Folder Transfer Protocol
C. Protocol Transfer Program
D. Protocol Transfer Folder

Question 1.90: HTTP is the acronym for:


A. HyperText Transmision Protocol
B. HyperText Transit Protocol
C. HyperText Transfer Protocol
D. HyperText Treat Protocol

Question 1.91: POP3 protocol uses port number services:


A. 53
B. 23
C. 25
D. 110

Question 1.92: What is the main function of DNS service:


A. Netbios name resolution
B. Domain name resolution (IP to name and vice versa)
C. MAC address resolution
D. All are wrong

Question 1.93: Disadvantages of building a domain name service system


(DNS) according to a centralized model
To be:
A. If the central point fails, the entire system will be paralyzed
B. The number of service requests at a single centralized point will be very
large.
C. The cost of maintaining the system is very large
D. All of the above answers

Question 1.94: The port number of the SMTP mail transmission protocol is:
A. 23
B. 25
C. 21
D. 110

Question 1.95: Communication protocol in DNS uses service port number:


A. 21
B. 25
C. 53
D. 110

Question 1.96: Among the following protocol and service port pairs, which pair
is incorrect:
A. SMTP:TCP Port 25
B. FTP:UDP Port 22
C. HTTP:TCP Port 80
D. DNS:UDP Port 53

Question 1.97: Which of the following protocols operates on top of the UDP
protocol:
A. ARP
B. DNS
C. Telnet
D. All of the above statements are correct
Question 1.98: Which of the following statements is true regarding the HTML
hypertext markup language:
A. Is a World Wide Web procedure
B. Method for linking text files
C. Is a tool for editing Web information pages
D. Web interface

Question 1.99: Which of the following statements is true when talking about
the name of the type of server that provides email services:
A. Web Server
B. Mail Server
C. FTP Server
D. Proxy

Question 1.100: Which of the following statements is true when talking about
data units of the Application layer:
A. Message
B. Segment/ Datagram
C. Packet
D. Frame (Data Frame)

Question 1.101: HTTP (Hypertex Transfer Protocol) is:


A. Application protocol allows computers to communicate with each other over
the Web and is capable of ability to link Web pages together.
B. Transport layer protocol that allows Web pages to be transported.
C. A domain name component.
D. Web Interface.

Question 1.102: Application protocols operate on:


A. Presentation layer
B. Session layer
C. Application layer
D. Data link layer

Question 1.103: What does HTTP do:


A. Provide a mechanism to get data from the server to the client
B. Display remote Web pages on the screen and help users interact with them
C. Provide a user interface such as buttons and bars slip,...
D. Provide data from the server using File Transport Protocol
Question 1.104: On the Internet, email is sent from the source machine by
establishing a TCP connection to a specific port on the destination machine.
That port is:
A. 80
B. 110
C. 25
D. 404

Question 1.105: Suppose there is a DNS service record of (cnn.com,


r1.infor.cnn.com, CNAME)
A. cnn.com is the abbreviation (shortened) name of r1.infor.cnn.com
B. r1.infor.cnn.com is the abbreviated (shortened) name of cnn.com
C. Both A and B are correct
D. Both A and B are wrong

Question 1.106: The protocol used for both parties to transfer files is:
A. HTTP
B. FTP
C. SMTP
D. SNMP

Question 1.107: Suppose there is a DNS service record of (alpha.com,


123.4.5.7, NS). Choose the correct answer:
A. 123.4.5.7 is the IP address of the machine alpha.com
B. alpha.com is a domain name, not a machine
C. 123.4.5.7 is the IP address of the mail server with the domain name is
google.com
D. All are wrong

Question 1.108: Suppose all computers with FPT Internet subscriptions when
accessing the website google.com are redirected to another website.
Computers subscribed to other ISPs do not encounter this situation. The
biggest cause of error would be:
A. Computers are infected with viruses
B. Google website is corrupted
C. FPT's DNS server is corrupted
D. ISP FPT's outgoing router is faulty
Question 1.109: What are Web clients usually called:
A. Netscape Navigator
B. Browers
C. Mosaic
D. HTML interpreter (HTML interpreter)

Question 1.110: Web servers often use software running on:


A. Port 25
B. Port 404
C. Port 125
D. Port 80

Question 1.111: To design a Web page as we see it on the screen (font


formats, colors, graphic effects, links), people have developed a special
formatting style. special. The standard page format used on the Web is:
A. HTTP
B. Mosaic
C. HTML
D. Netscape

Question 1.112: Which of the following statements is true about the HTTP
protocol:
A. The protocol version is always included in all messages
B. All headers are text
C. All data is transmitted as text
D. A and B

Question 1.113: Which of the HTTP messages answered below is correct:


A. 200 "OK"
B. 201 "Moved Permanently"
C. 404 "Not Modified"
D. 20 "Not Implemented"

Question 1.114: Which of the following messages is supported by the POP3


protocol:
A. Authentication
B. Retrieving a message
C. Deleting a message
D. All are correct
Question 1.115: Which protocol belongs to the Application layer:
A. IP
B. HTTP
C. NFS
D. TCP

Question 1.116: Indicate which application belongs to the Client/Server type:


A. WinWord
B. WWW (World Wide Web)
C. Excel
D. Photoshop

Question 1.117: Code 404 in the response message from the Web server to
the Web client has the following meaning:
A. The server does not understand the client's request
B. The object the client requested does not exist
C. There is no correct answer
D. The client's request is invalid

Question 1.118: Protocol used to transmit mail between mail servers (Mail
server)
To be:
A. HTTP
B. FTP
C. SMTP
D. POP

Question 1.119: Which application uses the client/server model:


A. Bit Torrent
B. Email, Web
C. Skype
D. KaZaA

Question 1.120: Which application uses the P2P model:


A. Telnet
B. Email
C. Web
D. Skype
Question 1.121: Applications using TCP protocol:
A. Web, file transfer, Email
B. Web, DNS, Internet phone
C. Teleconferencing, Internet phone, streaming media
D. Telnet, DNS, Email

Question 1.122: Applications using the UDP protocol:


A. Web, file transfer, Email
B. Web, DNS, Internet phone
C. Teleconferencing, Internet phone, streaming media
D. Telnet, DNS, Email

Question 1.123: Process identifiers include:


A. Host IP address
B. IP address and port number associated with the process on the host
C. Source IP address and destination IP address
D. Source IP address, source port number, destination IP address, destination
port number

Question 1.124: What is a URL:


A. www.someschool.edu
B. 192.168.1.1
C. .../someDept/pic.gif
D. www.someschool.edu/someDept/pic.gif

Question 1.125: RTT (Round Trip Time) is:


A. Time to initiate TCP connection
B. Time to send a small packet from client to server
C. Time to send a small packet from client to server and back
D. File transfer time

Question 1.126: In the DNS database, resource records (RR) are stored in the
form:
A. (name, value, type, ttl)
B. (value, name, ttl, type)
C. (value, ttl, name, type)
D. (name, type, ttl, value)
PART 4. TRANSPORTATION LAYER

Question 1.127: Which of the following protocols belongs to the Transport


Layer in the TCP/IP model:
A. UDP
B. IP
C. TCP
D. Both A and C are correct

Question 1.128: Which protocol provides highly reliable packet transport:


A. UDP
B. TCP
C. ARP
D. IP

Question 1.129: The Window field in the TCP packet header refers to:
A. Available memory size
B. Operating system
C. Screen size
D. All are wrong
Question 1.130: TCP connection request packets will have the following flag
values:
A. RST=1, SYN=1
B. ACK=1, SYN=1
C. ACK=0, SYN=1
D. FIN=1, SYN=0

Question 1.131: At what layer of the OSI model do TCP and UDP operate?
A. Session (Layer 5)
B. Transport (Layer 4)
C. Network (Layer 3)
D. Data Link (Layer 2)

Question 1.132: Which of the following statements is true when talking about
effective bandwidth usage techniques:
A. Static windowed flow control
B. Guaranteed rate flow control
C. Dynamic windowed flow control
D. Dynamic speed flow control
Question 1.133: TCP protocol operates at the same layer as which protocols:
A. ARP, RARP
B. UDP
C. TELNET, FTP
D. IP, ARP

Question 1.134: At what layer do TCP and UDP protocols operate?


A. Application
B. Network
C. Transport
D. Presentation

Question 1.135: The UDP protocol is used for the following applications:
A. Requires connectivity
B. Requires high reliability
C. Requires low latency
D. Does not require high reliability

Question 1.136: The Host to Host transport layer operates by protocol:


A. TCP
B. IP
C. ICMP
D. ARP

Question 1.137: In a UDP data packet (UDP segment), the data area actually
starts from the first byte:
A. 4
B. 5
C. 8
D. 9

Question 1.138: Which of the following equations best describes the UDP
protocol:
A. UDP = IP
B. UDP = TCP - (reliability)
C. UDP = ICMP + (channelization by port address)
D. UDP = TCP – IP
Question 1.139: To detect errors in packets, people use the following
techniques:
A. Sequence number
B. Acknowledgment number
C. Timer
D. Checksum

Question 1.140: When a TCP entity sends a SYNACK segment packet with
Acknowledgement Number = 100, this means:
A. The data packet it sends starts with the 100th byte in the data stream
B. The first data byte in the data stream it sends has sequence number 100
C. It sends it from the 100th byte
D. It expects to receive data starting with byte number 100

Question 1.141: A transport protocol that runs on top of IP without establishing


a connection before transmitting is:
A. UDP
B. TCP
C. HTTP
D. FTP
Question 1.142: The TCP protocol can handle:
A. Lost packets
B. Duplicate packets
C. Out of order packets
D. All of the above

Question 1.143: Checksum in UDP data packet has length:


A. 4 bit
B. 8 bit
C. 16 bit
D. 32 bit

Question 1.144: The actual data location in a TCP data packet starts from
byte:
A. 40
B. 32
C. 5
D. Not determined
Question 1.145: Suppose TCP entity A needs to send 1500 bytes to transport
entity B. The first packet contains 1000 bytes of data, the Sequence Number
field of this packet is 100. The Sequence Number field of the second packet
will be:
A. 1101
B. 1100
C. 500
D. 501

Question 1.146: With the TCP protocol, the receiving party will notify the
sending party about the maximum amount of data it can receive. This value is
determined in the field:
A. Sequence Number
B. Acknowledgement Number
C. Rcvr Number
D. Header length

Question 1.147: After a TCP entity sends a SYN segment packet with
Sequence Number = 100, it receives an ACKSYN packet with Sequence
Number = 200. The Acknowledgment Number field of this ACKSYN packet will
be:
A. 100
B. 101
C. 200
D. 201

Question 1.148: Suppose an application generates a 60-byte message. This


message is placed in the TCP segment and then the IP datagram. Assume
that both TCP packets and IP packets do not have special data fields
(Optional = 0). Each IP datagram will contain what percentage of actual data:
A. 20%
B. 40%
C. 60%
D. 80%
Question 1.149: What is the default TCP port value used for FTP server:
A. 20 and 21
B. 80 and 8080
C. 110 and 80
D. 8080 and 1080

Question 1.150: In a UDP data packet (UDP segment), the address used to
identify the receiving process is located at:
A. Bytes 1 and 2
B. Bytes 3 and 4
C. Bytes 5 and 6
D. Unknown

Question 1.151: TCP and UDP protocols operate at which of the following
layers:
A. Transport
B. Network
C. Application
D. Presentation

Question 1.152: At what layer of the OSI model does the TCP protocol work?
A. Application layer
B. Transport layer
C. Network layer
D. Data link layer

Question 1.153: Which of the following protocols does not ensure that the data
sent reaches the recipient completely?
or not:
A. TCP
B. ASP
C. UDP
D. ARP

Question 1.154: Transport layer protocols:


A. Controlling information transmission between two processes on a computer
network
B. Controlling the content of messages exchanged between two processes
and the behavior of each
party when receiving a message
C. Controlling information transmission between two computers on a computer
network
D. Controlling data transmission between two computers on the same
transmission medium

Question 1.155: Suppose the Length field of a UDP data packet has the value
150. The actual data would be:
A. 67 byte
B. 142 byte
C. 150 byte
D. 158 byte

Question 1.156: Observe a person accessing a website and see him type the
following link: http://www.tomang.net:3000. Please tell us how the web server
on which the website uses TCP port:
A. Use default port
B. Do not use default port
C. Use standard port
D. Use a dedicated port for the Web server

Question 1.157: UDP socket is determined by:


A. Source IP address, destination IP address
B. Source IP address, source port number
C. Destination IP address, destination port number
D. Source IP address, destination IP address, source port number, destination
port number

Question 1.158: TCP socket is determined by:


A. Source IP address, destination IP address
B. Source IP address, source port number, destination IP address
C. Source IP address, destination IP address, destination port number
D. Source IP address, port number source, destination IP address, destination
port number
Question 1.159: Reliable data transfer protocol (rdt-reliable data transfer
protocol) needs to be used on:
A. Highly reliable channels
B. Unreliable channels
C. Both of the above are correct
D. Both of the above are wrong

Question 1.160: The complexity of a reliable data transfer protocol (rdt-reliable


data transfer protocol) depends on:
A. Network architecture
B. Network devices (router, switch, hub, ...)
C. Channel characteristics
D.Distance between hosts

PART 5. NETWORK LAYER

Question 1.161: The first byte of an IP address has the form: 11100001. So
which class does it belong to:
A. Class B
B. Class C
C. Class D
D. Class E

Question 1.162: In a computer network using the TCP/IP protocol and all
using the Subnet Mask of 255.255.255.0, which of the following pairs of
computers are connected:
A. 192.168.1.3 and 192.168.100.1
B. 192.168.15.1 and 192.168.15.254
C. 192.168.100.15 and 192.186.100.16
D. 172.25.11.1 and 172.26.11.2

Question 1.163: Given address 192.64.10.0/28. Please indicate the number of


subnets and the number of hosts per subnet:
A. 6 subnets, each subnet has 30 hosts
B. 14 subnets, each subnet has 14 hosts
C. 16 subnets, each subnet has 16 hosts
D. 8 subnets, each subnet has 32 hosts
Question 1.164: A class B network needs to be divided into 3 subnets using
which of the following Subnet masks:
A. 255.255.224.0
B. 255.0.0.255
C. 255.255.192.0
D. 255.255.255.224

Question 1.165: Output the route print command on machine X as follows:

Machine X has IP address:


A. 0.0.0.0
B. 172.16.9.12
C. 127.0.0.1
D. 172.16.9.0

Question 1.166: IP addresses in the same subnet as address


131.107.2.56/28:
A. From 131.107.2.48 to 131.107.2.63
B. From 131.107.2.49 to 131.107.2.63
C. From 131.107.2.48 to 131.107.2.62
D. From 131.107.2.55 to 131.107.2.126

Question 1.167: Which of the following IP addresses has the same network
address (Subnet) as IP address 192.168.1.10/24:
A. 192.168.10.1/24
B. 192.168.1.256/24
C. 192.168.11.12/24
D. 192.168.1.33/24

Question 1.168: To know which address class an IP address belongs to,


based on:
A. Value of the first octet (byte)
B. ARP protocol
C. Number of dots in the address
D. DHCP address
Question 1.169: A class C network address is divided into 5 subnets. Subnet
mask to use:
A. 255.255.255.224
B. 255.255.255.252
C. 255.255.255.240
D. 255.255.255.248

Question 1.170: In IPv4 addresses, there are 5 classes: A, B, C, D, E. Class C


is the class with the address range:
A. 224.0.0.0 to 239.255.255.255
B. 192.0.0.0 to 223.255.255.255
C. 128.0.0.0 to 191.255.255.255
D. 240.0.0.0 to 255.255.255.255

Question 1.171: Which of the following IP addresses is valid:


A. 230.20.30.40
B. 192.168.1.2
C. 255.255.255.255
D. All of the above

Question 1.172: Given IP address: 192.168.5.39/28. Indicates the network


address of this IP address:
A. 192.168.5.39
B. 192.168.5.32
C. 192.168.5.0
D. All are wrong

Question 1.173: How many IP addresses does IPv4 have:


A. 212
B. 222
C. 232
D. 242

Question 1.174: IPv4, class B has the corresponding number of


NetIDs/HostIDs used:
A. 211 / 221 - 2
B. 214 / 216 - 2
C. 213 / 219 - 2
D. 210 / 222 – 2
Question 1.175: Which path finding algorithm does the OSPF protocol use:
A. Flooding
B. Distance vector routing
C. Link state
D. Bellman-Ford

Question 1.176: Which path finding algorithm does the RIP protocol use:
A. Flooding
B. Distance vector routing
C. Link state
D. Bellman-Ford

Question 1.177: ICMP messages are placed in data packets:


A. UDP
B. TCP
C. IP
D. Unknown

Question 1.178: Which of the following IP addresses is valid:


A. 192.168.1.2
B. 255.255.255.254
C. 10.20.30.40
D. A and C are both correct

Question 1.179: Which class address allows borrowing 15 bits to divide


subnets:
A. Class A
B. Class B
C. Class C
D. None of these statements are correct
Question 1.180: Which of the following protocols belongs to the network layer
(Internet Layer) in the TCP/IP model:
A. FTP
B. IP
C. ARP
D. Both B and C are correct
Question 1.181: What class of IP addresses is assigned to Vietnam by the
Asia Pacific Information Center APNIC:
A. Class A
B. Class B
C. Class C
D. Class D

Question 1.182: IP address 203.162.0.11 belongs to which class address:


A. Class A
B. Class B
C. Class C
D. Class D

Question 1.183: What terms are used to describe data units at the network
layer:
A. Datagram
B. Frame
C. Packet.
D. Both A and C are correct

Question 1.184: IP protocol is the protocol:


A. Link-oriented
B. Linkless
C. Requires high reliability in information exchange
D. Requires flow control and error control

Question 1.185: The format structure of a class A IP address is:


A. Bit 1: 0, bit 2- 8: NetID, 9-32: HostID
B. Bit 1: 0, bit 2- 16: NetID, 17-32: HostID
C. Bit 1-2: 10, bit 3- 8: NetID, 9 - 32: HostID
D. Bit 1-2: 10, bit 3- 16: NetID, 17 - 32: HostID

Question 1.186: The format structure of a class B IP address is:


A. Bit 1: 0, bit 2- 8: NetID, 9-32: HostID
B. Bit 1: 0, bit 2- 16: NetID, 17-32: HostID
C. Bit 1-2: 10, bit 3- 8: NetID, 9 - 32: HostID
D. Bit 1-2: 10, bit 3- 16: NetID, 17 - 32: HostID
Question 1.187: NetID network address: 192.168.0.32/27 has the
corresponding HostIDs machine address range:
A. 192.168.0.33 => 192.168.0.63
B. 192.168.0.32 => 192.168.0.64
C. 192.168.0.32 => 192.168.0.62
D. 192.168.0.33 => 192.168.0.62

Question 1.188: The IP Packet Header contains:


A. Source address
B. Destination address
C. Contains no address at all
D. Both source address and destination address

Question 1.189: Which protocol is used by routers or computers to notify other


computers about error conditions:
A. TCP
B. UDP
C. IP
D. ICMP

Question 1.190: Which of the following network services must be based on


ICMP:
A. DNS
B. Ping
C. SMTP
D. X Windows

Question 1.191: Which of the following solutions can solve the scarcity of IP
addresses:
A. IPv6
B. Network Address Translation
C. Subnet mask
D. All of the above options

Question 1.192: The RIP protocol is implemented at:


A. Computer terminal
B. Router
C. Hub
D. Switch
Question 1.193: Which of the following protocols belongs to the network layer:
A. TCP
B. Telnet
C. FTP
D. IP

Question 1.194: In a computer network using TCP/IP protocol and Subnet


Mask is 255.255.255.224, determine the broadcast address of the network if
you know that a computer in the network has an address of 192.168.1.1:
A. 192.168.1.31
B. 192.168.1.255
C. 192.168.1.15
D. 192.168.1.96

Question 1.195: Routers operate at which layer in the OSI model:


A. Network Layer
B. Data Link Layer
C. Transport Layer
D. Application Layer

Question 1.196: If 4 PCs connect to each other through a HUB, how many IP
addresses are needed for these 5 network devices:
A. 1
B. 3
C. 4
D. 2

Question 1.197: Which of the following network devices is capable of


maintaining and exchanging information with each other about the connection
status of the entire network in an enterprise or campus:
A. Bridge
B. Router
C. Repeater
D. Connector
Question 1.198: Router is a device used to:
A. Routing between networks
B. Filtering redundant packets
C. Extending a network
D. All three are correct
Question 1.199: Router devices allow:
A. Extend a LAN branch by amplifying the signal transmitted to it
B. Connect multiple computers together
C. Link multiple LANs together, while preventing packets from belonging
broadcast types pass through it and help with routing of packets
D. Routing of packets, subdividing Collision Domains but not subdividing
Broadcast Domain

Question 1,200: The Network layer is responsible for:


A. Based on the destination IP address in the packet, decide to choose the
appropriate route
packet
B. Decide the packet's destination
C. Detect the lost packet and resend the lost packet
D. Split the packet into frames

Question 1.201: Which of the following network devices has the capability to
route a packet (forward the packet to another network on the way to the
destination network) by relying on the destination IP address contained in the
packet and the current network status information represented in the routing
table within the device:
A. Bridge
B. Router
C. Switch
D. Both A, B and C

Question 1.202: Which address belongs to class A:


A. 10001100 11001100 11111111 01011010
B. 11001111 11110000 10101010 01010101
C. 01111010 10100101 11000011 11100011
D. 11011010 10101010 01010101 11110011

Question 1.203: If we take a class B address to divide the subnet with a


netmask of 255.255.240.0, how many subnets can be used:
A. 2
B. 6
C. 30
D. 16
Question 1.204: Which of the following addresses belongs to class A:
A. 172.29.14.10
B. 10.1.1.1
C. 140.8.8.8
D. 203.5.6.7

Question 1.205: How many IP addresses does the computer acting as a


Router have:
A. 1
B. 2
C. 3
D. 4

Question 1.206: The main function of a router is:


A. Connecting network to network
B. Splitting broadcast domains
C. A and B are both correct
D. A and B are both incorrect

Question 1.207: Of the following addresses, choose the address that is not on
the same network as the remaining addresses:
A. 203.29.100.100/255.255.255.240
B. 203.29.100.110/255.255.255.240
C. 203.29.103.113/255.255.255.240
D. 203.29.100.98/255.255.255.240

Question 1.208: Which of the following is the broadcast address of a class B


network:
A. 149.255.255.255
B. 149.6.255.255
C. 149.6.7.255
D. All are correct

Question 1.209: IP address 172.200.25.55/255.255.0.0


A. Belongs to class A
B. Belongs to class C
C. Is a private address
D. Is a broadcast address
Question 1.210: The algorithm running on the gateway router is:
A. Inter-routing
B. Intra-routing
C. Both are wrong
D. Both are correct

Question 1.211: Main functions of Router:


A. Push packets from incoming connection to outgoing connection
B. Implement routing protocols/algorithms
C. Both functions A and B
D. Does not perform any of the above functions

Question 1.212: A network connection has an MTU value of 1500 bytes. The
largest data packet size that can be transmitted over this connection is:
A. 1400 bytes
B. 1480 bytes
C. 1500 bytes
D. 1600 bytes

Question 1.213: There is address 200.23.16.0/23, value 23 is:


A. Number of bits in the subnet part of the address
B. Number of bits in the hostID part of the address
C. Number of bits identifying classes A, B, C, D, E
D. None of the above values

Question 1.214: IPv6 has an address space of:


A. 32 bit
B. 64 bit
C. 128 bit
D. 256 bit

Question 1.215: How many bytes does an IPv6 packet have in the header:
A. 20 byte
B. 30 byte
C. 40 byte
D. 50 byte

Question 1.216: What is the representation of an IPv6 address:


A. 1080:0000:0000:0000:0008:0800:200C:417A
B. 1080:0000:0000:0008:0800:200C:417A
C. 1080:0000:0000:0000:0000:0008:0800:200C:417A
D. 1080::0008:0800:200C::417A

Question 1.217: What is the shortened representation of the IPv6 address:


2001:0F68:0000:0000:0000:0000:1986:69AF
A. 2001:F68:0:0:0:0:1986:69AF
B. 2001:F68::1986:69AF
C. Both of the above representations are correct
D. Both of the above representations are incorrect

SECTION 6. DATA LINK LAYER AND PHYSICAL LAYER

Question 1.218: Frame is data at the:


A. Physical
B. Network
C. Data Link
D. Transport

Question 1.219: Error control and data flow control are performed by:
A. Network layer
B. Data link layer
C. Physical layer
D. Session layer
Question 1.220: Which protocol is used to convert from IP address to MAC
physical address:
A. ARP
B. RARP
C. ICMP
D. TCP

Question 1.221: The process allows the host to automatically obtain its IP
address from the server when connecting to the network:
A. Host broadcasts message "DHCP discover" --> DHCP server responds
with "DHCP offer"
--> host sends message "DHCP request" --> DHCP server sends "DHCP ack"
B. Host sends message "DHCP request" --> DHCP server sends "DHCP ack"
--> host broadcasts message "DHCP discover" --> DHCP server responds
with "DHCP offer"
C. Host broadcasts message "DHCP discover" --> DHCP server sends
"DHCP ack" --> host sends message "DHCP request" --> DHCP server
responds with "DHCP offer"
D. Host sends message "DHCP request" --> DHCP server responds with
"DHCP offer" -->host broadcasts message "DHCP discover" --> DHCP server
sends "DHCP ack"

Question 1.222: CSMA/CD is a random access method used for networks with
the following structure:
A. Star (STAR)
B. BUS
C. Ring (RING)
D. Hybrid BUS-STAR

Question 1.223: CSMA/CD stands for:


A. Collision Sense Multiple Access/ Collision Detection
B. Carrier Sense Multiple Access/ Collision Deterence
C. Carrier Sense Multiple Access/ Collision Detection
D. Collision Sense Multiple Access/ Carrier Detection

Question 1.224: What information do the first three bytes of the MAC address
indicate:
A. Network card (NIC) manufacturer name
B. Network card geographic region
C. Network card version number
D. All of the above statements are incorrect

Question 1.225: What network equipment is used to connect networks and


control broadcasts:
A. Ethernet switch
B. Bridge

C. Router
D. Hub
Question 1.226: Which of the following addresses is a layer 2 address (MAC
address):
A. 192.201.63.251
B. 0000.1234.FEG
C. 19-22-01-63-25
D. 00-00-12-34-FE-AA

Question 1.227: CSMA/CD is which of the following access types:


A. Channel partitioning
B. Random access
C. Taking turn
D. All are wrong

Question 1.228: Which of the following access methods listens for network
traffic on the transmission line before transmitting data:
A. CSMA/CD
B. CSMA/CA
C. Token RING
D. Token BUS

Question 1.229: Which of the following standards describes local area network
architecture standards for Ethernet, including physical layer and MAC
sublayer standards:
A. IEEE802.2
B. IEEE802.3
C. Token Bus
D. Token Ring

Question 1.230: Which of the following physical addresses (MAC Address) is


incorrect:
A. 00-2A-43-16-23-A8
B. 00-2A-43-3E-33-A0
C. 00-4G-43-26-36-0D
D. 00-C0-9F-C3-27 -F6

Question 1.231: The Hub device allows:


A. Extend a LAN branch by amplifying the signal transmitted to it
B. Prevent Broadcast packets from passing through it
C. Helps route packets
D. Connects multiple computers together to form a LAN branch (segment)

Question 1.232: Computers A and Z have addresses on 2 different SUBNETs.


What happens when the computer A sends broadcasts (ARP requests) to find
the MAC address of computer Z:
A. No response
B. Router will respond with Z's MAC address
C. Router will respond with its MAC address
D. Router will send another request (ARP request) to Z's subnet and then Z
can answer A

Question 1.233: What happens when computer A sends broadcasts (ARP


requests) to find the MAC address of computer B on the same network:
A. The DNS server will reply A with B's MAC address
B. All computers on the network receive the request (ARP request) and all will
reply A with B's MAC address
C. All computers on the network receive the request (ARP request) but only
Only B will reply to A with his MAC address.
D. The closest Routers that receive the request (ARP request) will reply to A
with B's MAC address or will forward the request to other routers.

Question 1.234: In the OSI model, determining the physical address from the
logical address is the responsibility of:
A. Application layer
B. Data link layer
C. Network layer
D. Transport layer

Question 1.235: Which of the following services must the data link layer
provide:
A. Placing network layer packets into Frames
B. Encoding bits into physical signals
C. Creating reliable transmission
D. Sentences A and B are both correct
Question 1.236: Suppose one adds 1 check bit to the end of the sent data
stream so that the total number of 1 bits in the new string is an odd number.
The receiver receives the string 1000101010001 then:
A. The received string is in error
B. The received string is completely correct
C. Errors in this bit string can be detected and corrected
D. No error is known in the received string

Question 1.237: Switch is a device that operates at the:


A. Physical
B. Data link
C. Network
D. Transportation

Question 1.238: Ethernet technology uses which of the following transmission


access methods:
A. CSMA
B. ALOHA
C. CSMA/CD
D. TDMA

Question 1.239: Which of the following statements is most correct for Switch:
A. Using physical addresses and operations at the Physical layer of the OSI
model
B. Using physical addresses and operations at the Network layer of the OSI
model
C. Using physical addresses and operations at the DataLink layer of the OSI
model
D. Using IP addresses and operating at the Network layer of the OSI model

Question 1.240: What will happen to data when there is a collision during data
transmission:
A. The Hub/Switch will resend the data
B. The data will be destroyed
C. The data will be restored at the receiving device
D. Both A and C are correct

Question 1.241: Which LAN technology uses CSMA/CD technology:


A. Token Ring
B. Ethernet
C. FDDI
D. All of the above

Question 1.242: Which of the following network devices reduces conflicts?


A. Hub
B. NIC
C. Switch
D. Transceiver

Question 1.243: To limit collision of packets on the network, people divide the
network into smaller networks and connect them with devices:
A. Repeater
B. Hub
C. Switch
D. Card mạng (NIC)

Question 1.244: The number string "00-08-ac-41-5d-9f" can be:


A. IP address
B. Port address
C. MAC address
D. All are wrong

Question 1.245: Which address does the Switch use when deciding which port
to send data to:
A. Source MAC address
B. Destination MAC address
C. Network address
D. Subnetwork address

Question 1.246: Which of the following services must the data link layer
provide:
A. Placing network layer packets into Frames
B. Routing
C. Encode bits into physical signals
D. Create reliable transmission lines

Question 1.247: Suppose there is a system with 2 LAN segments connected


together through a router, a computer. The computer acting as a Router has
how many network cards:
A. 1
B. 2
C. 3
D. 4

Question 1.248: Choose the correct definition of MAC address:


A. Pre-recorded on the network card (NIC)
B. Declared by the network administrator
C. Answers A and B are correct
D. All are correct

Question 1.249: Which of the following technologies has a fixed data frame
frequency:
A. X25
B. Frame Relay
C. ISDN
D. ATM

Question 1,250: The length of the ATM data frame is:


A. 53 byte
B. 128 byte
C. 512 byte
D. 1500 byte

Question 1.251: ATM has information exchange speed from:


A. 2 Mbps to 8 Mbps
B. 155 Mbps to 1 Gbps
C. 100 Mbps to 155 Mbps
D. 155 Mbps to 622 Mbps

Question 1.252: IEEE 802 standard divides the Data Link layer of the OSI
model into 2 sub-layers:
A. LLC and MAC
B. TCP and UDP
C. TCP and IP
D. ARP and RARP

Question 1.253: Fast Ethernet is also known as:


A. 10BaseT
B. 100BaseFX
C. 10BaseFX
D. 100BaseT

Question 1.254: The data transmission speed of the 1000Base-FX topology is:
A. 10 Mbps
B. 100 Mbps
C. 1000 Mbps
D. 10 Gbps

Question 1.255: Fast Ethernet LAN technology has a basic data transmission
speed of:
33
A. 10 Mbps
B. 100 Mbps
C. 1.000 Mbps
D. 10.000 Mbps

Question 1.256: The WLAN 802.11b/g standard has the corresponding data
transmission speed of:
A. 11/100 Mbps
B. 11/54 Mbps
C. 11/108 Mbps
D. 2/54 Mbps

Question 1.257: The operating frequency of the WLAN 802.11g standard is:
A. 5 Ghz
B. 2,3 Ghz
C. 2,4 Ghz
D. 2,5 Ghz

Question 1.258: Analog signal transmission lines, standard voice transmission


lines used in telephone communications are called transmission lines:
A. Dial-up
B. Direct digital signal
C. Any-to-any
D. Dedicated (subscription)

Question 1.259: What is the function of Proxy:


A. A machine that represents a group of machines to perform a client service
(client service)
B. Is a network traffic statistics device
C. All are correct
D. All are wrong
Question 1.260: Drivers are:
A. Hardware
B. Software
C. Peripherals
D. Card

Question 1.261: Which of the following protocols is used in the WAN model:
A. TCP/IP
B. NetBEUI
C. DLC
D. All of the above

Question 1.262: Which of the following protocols is used in the LAN model:
A. TCP/IP
B. IPX/SPX
C. NetBEUI
D. All

SECTION 7. CYBER SAFETY AND SECURITY

Question 1.263: Protecting information resources online is necessary and


urgent because:
A. Networked computers
B. Multiple and physically distributed users
C. Securing servers
D. Prevent information eavesdropping.

Question 1.264: Network safety in the sense of protecting and ensuring safety:
A. Network software
B. Network resources
C. Network hardware
D. Data warehouse

Question 1.265: Information security violation means:


A. Interference with network activities
B. Interference with user activities
C. Information content and information flow changes
D. Denial of service
Question 1.266: Cryptography is the process of converting information from
plaintext to:
A. Encryption form
B. Denial of service form
C. Denial
D. No access rights

Question 1.267: Firewall is a system that controls and prevents:


A. Illegal intrusion from the outside into the system
B. Using network resources
C. Right to retrieve information
D. Espionage

Question 1.268: A packet filter (installed on a firewall) can:


A. Only internal computers are capable of initiating TCP connections to other
computers outside the network
B. Allow internal FTP clients to access external FTP servers while ensuring
that internal computers cannot be hacked
C. Allows external FTP clients to access the internal FTP server that the
computer internal properties are not hacked
D. All are correct

Question 1.269: Authentication is:


A. The sender encodes the message, the receiver decodes the message
B. The sender and receiver confirm that they recognize each other
C. Sender and receiver want to ensure messages remain unchanged
D. Services must be accessible and available to users

Question 1.270: Message integrity is:


A. The sender encodes the message, the receiver decodes the message
B. The sender and receiver confirm that they recognize each other
C. The sender and receiver want to ensure the message has not been altered
D. Services must be accessible and available to users

Question 1.271: DES (Data Encryption Standard) is used in:


A. Symmetric key encryption
B. Public key encryption
C. Both symmetric key encryption and public key encryption
D. All of the above options are incorrect
Question 1.272: The RSA algorithm is used in:
A. Symmetric key encryption
B. Public key encryption
C. Both symmetric key encryption and public key encryption
D. All of the above options are incorrect

PART 8. NETWORK TOOLS (RELATED TO COURSE PRACTICE


SECTION)

Question 1.273: Use the IPconfig command when you want to:
A. Determine the path of packets from source to destination
B. Know the computer's TCP/IP configuration status (configuration of network
cards)
C. Analyze packets to solve a specific problem of network
D. Check network errors

Question 1.274: The Tracert command is used to:


A. Determine the path of packets from source to destination (through which
network nodes)
B. Know the computer's TCP/IP configuration status (configuration of network
cards)
C. Analyze packets to solve Solve a specific network problem
D. Check network errors

Question 1.275: The Netstat command is used to:


A. Know the computer's TCP/IP configuration status (configuration of network
cards)
B. Analyze packets to solve a specific network problem
C. Determine the path of packets from source to destination
D. List all connections in and out of the computer

Question 1.276: In the command syntax telnet ip/host port includes the
following parameters:
A. ip is the source device's IP address, host is the terminal device name, and
port is the communication port for contacting the terminal
B. ip is the IP address of the terminal device, host is the terminal device name,
and port is the port used to communicate with the terminal device
C. ip is the source device's IP address, host is the source device name, port is
the source port
D. ip is the source device's IP address, host is the terminal device name, port
is the source port

Question 1.277: Wireshark is a tool to:


A. Indicates the configuration status of the network
B. Determines the path of packets from source to destination
C. Analyzes packets to solve a specific network problem
D. Remote access

Question 1.278: Which command will display the following results:


Reply from 74.125.128.102: byte=32 time=50ms TTL=45
Reply from 74.125.128.102: byte=32 time=51ms TTL=45
Reply from 74.125.128.102: byte=32 time=56ms TTL=45
Reply from 74.125.128.102: byte=32 time=52ms TTL=45
Packets: Sent = 4, Received = 4, Lost = 0 <0% lost>
Approximate round trip times in milli-seconds:
Minimum = 50ms, Maximum = 56ms, Average = 52ms
A. Ping
B. Tracert
C. Telnet
D. Ipconfig

Question 1.279: Which command will display the following results:

A. Ping
B. Tracert
C. Netstat
D. Ipconfig

Question 1.280: Which tool will display the following information:


A. Ping
B. Tracert
C. Netstat
D. Wireshark

Question 1.281: Which command will display the following results:

A. Ping
B. Ping –a
C. Tracert
D. Netstat

Question 1.282: Which of the following commands shows the computer's IP


address:
A. IP
B. IPCONFIG
C. TCP_IP
D. FTP

Question 1.283: The PING command is used to:


A. Check if the computers have hard disks or not
B. Check if the computers on the network are connected
C. Check if the computers are working well or not
D. Check if the computers have access to the Internet Are not

Question 1.284: Which of the following commands is used to determine the


transmission line (in Windows operating system):
A. Nslookup
B. ipconfig
C. Route
D. Tracert

Question 1.285: Which TCP/IP utility is used to check network connectivity:


A. Route
B. ARP
C. Ping
D. Netstat

Question 1.286: Which of the following statements is true when talking about
ADSL connection models:
A. PPPoA (Point to Point over ATM) model
B. PPPoE (Point to Point over Ethernet) model RFC 2516
C. IP over ATM model (RFC 1483R)
D. All are correct

Question 1.287: ADSL technology is a digital access subscriber line


technology:
A. Asymmetric
B. Random
C. Sequential
D. Symmetric

Question 1.288: When I forget the ADSL Router's password, how do I restore
the default password:
A. Look up the supplier's user manual
B. Supply power to the ADSL Router and hold down the Reset button for a
certain period of time
C. Use software to detect Username and Password
D. Default password cannot be restored

Question 1.289: To configure the ADSL Router to connect to the Internet, the
basic parameters that need to be set are:
A. VCI/VPI, LAN IP Address, Account connected to the service provider (user,
password)
B. DHCP Service
C. Statements a and b are correct
D. All of the above statements are incorrect

Question 1.290: Central network equipment used to connect computers in a


star network (STAR):
A. Switch/Hub
B. Router
C. Repeater
D. NIC

Question 1.291: What protocols does the Traceroute program use:


A. UDP
B. UDP and ICMP
C. TCP and ICMP
D. IGMP

Question 1.292: Bridge devices allow:


A. Help routing packets
B. Connect two LANs together and act as a filter: allowing only packets whose
destination address is outside the LAN branch from which the packet
originates to pass through
C. Strengthen the electrical signal to expand the network segment
D. Both A, B, and C are correct

Question 1.293: Modem is used to:


A. Communicating with the network
B. Transmitting data over long distances
C. Transmitting data within a LAN
D. A and B are both correct

Question 1.294: You are using FTP in Command Promt, you want to create a
folder named "Test" on your local machine (you still cannot exit FTP). What
command would you use:
A. #md test
B. !md test
C. Md Test
D. Mkdir test

Question 1.295: Which of the following mechanisms is used to install Web


cache:
A. 401 Authorization require and validation code
B. "Last-Modified" and "If-Modified-Since" header fields
C. POST request method
D. A and B
Question 1.296: If the twisted cable connects the network card to the hub:
A. Press the 2 cable ends in the same order
B. Change the position of fibers 1, 2 with fibers 3, 6
C. One end presses according to TIA/EIA T-568A standard, the other end
according to TIA/EIA T568-B standard
D All are wrong

You might also like