system network administration

5
SYSTEM NETWORK ADMINISTRATION (Midterm Examination) Name: Permit No: Course: Section: DIRECTIONS: Mark your examinee information in your answer sheet. This test is designed for testing the basic foundations of system network administration for CS/IT students. The students are required to present their examination permit slip before taking the exam. The examinee is given 1 hour to complete the exam. Using gadgets during the exam is strictly prohibited. No cheating please« l. Identification  _________1.  A set of rules for sending and receiving data across a network.  _________2. It simply provides a theoretical model you can use for n etwork problems ranging from design issues to snafus with connection  _________3. Handles the actual connections between systems.  _________4. Provides an addressing scheme.  _________5. Handles of notifying the sender and requesting that another packet be sent.  _________6. Concerned only with the physical aspects of the network.  _________7. Refers to software application that you use on your screen.  _________8. Deals with the way different systems represents data.  _________9. A protocol that carries data traffic over the internet.  _________10. Are draft documents freely available on the internet that explain a standard to the networking community.  _________11. Set of protocols that have standard w ays interacting with each other.  _________12. Is the technology is which the electrical power can be transferred over standard twisted ±pair cables.  _________13. Was developed by digital equipment corporation to prevents broadcast storms that result from looping.  _________14. Allows to be broadcast to all of the device that are is the same broadcast domain.  _________15. Refers to single network link that allows multiple VLAN¶s to communicate with one another.  _________16. Process in which all of the data sent or received on one port or VLAN is copied to another port.  _________17. Is a process in which access to a port is given to a device by having that device authenticate itself with a server.  _________18. This is port that is configured to restrict access and requires authentication before allowing access.  _________19. This is the client that request access to the network.  _________20. This is a server that is configured to restrict access and requires authentication before allowing access. lll. Matching type Set A Set A 1. POP3/IMAP a. Ensures that connections are made and maintained between computers. 2. SMTP b. Handles software computer addresses. 3. PPP c. Finds the quickest route between computers.

Upload: rodrigo-calapan

Post on 09-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

8/7/2019 SYSTEM NETWORK ADMINISTRATION

http://slidepdf.com/reader/full/system-network-administration 1/4

SYSTEM NETWORK ADMINISTRATION

(Midterm Examination)

Name: Permit No:Course: Section:

DIRECTIONS : Mark your examinee information in your answer sheet. This test isdesigned for testing the basic foundations of system network administration for CS/ITstudents. The students are required to present their examination permit slip before takingthe exam. The examinee is given 1 hour to complete the exam. Using gadgets during theexam is strictly prohibited. No cheating please«

l. Identification _________1. A set of rules for sending and receiving data across a network. _________2. It simply provides a theoretical model you can use for network

problems ranging from design issues to snafus with connection

_________3. Handles the actual connections between systems. _________4. Provides an addressing scheme. _________5. Handles of notifying the sender and requesting that another packet be

sent. _________6. Concerned only with the physical aspects of the network. _________7. Refers to software application that you use on your screen. _________8. Deals with the way different systems represents data. _________9. A protocol that carries data traffic over the internet. _________10. Are draft documents freely available on the internet that explain a

standard to the networking community. _________11. Set of protocols that have standard ways interacting with each other. _________12. Is the technology is which the electrical power can be transferred over

standard twisted ±pair cables. _________13. Was developed by digital equipment corporation to prevents

broadcast storms that result from looping. _________14. Allows to be broadcast to all of the device that are is the same

broadcast domain. _________15. Refers to single network link that allows multiple VLAN¶s to

communicate with one another.

_________16. Process in which all of the data sent or received on one port or VLANis copied to another port.

_________17. Is a process in which access to a port is given to a device by havingthat device authenticate itself with a server.

_________18. This is port that is configured to restrict access and requiresauthentication before allowing access.

_________19. This is the client that request access to the network. _________20. This is a server that is configured to restrict access and requires

authentication before allowing access.

lll. Matching type

Set A Set A

1. POP3/IMAP a. Ensures that connections are made and maintainedbetween computers.

2. SMTP b. Handles software computer addresses.3. PPP c. Finds the quickest route between computers.

8/7/2019 SYSTEM NETWORK ADMINISTRATION

http://slidepdf.com/reader/full/system-network-administration 2/4

4. BGP/EGP d. descendent of RUP that increases & reliability.5. SNMP e. Handles errors and sends error messages for

TCP/IP.6. RIP f. Handles how data is passed between network.7. OSPF g. Allows network administrators to connect to and to

manage network device.8. ARP h. Used by ISP to allow costumers to connect to there

services.9. ICMP i. Controls on how email is passed between servers

on a TCP/IP network.10. TCP j. Internet Calendar.11. IP k. Both set up ways for clients to connect to servers

and collect email.12. iCAL

lll. Give the meaning of the following acronyms.

1. UDP2. SSTP3. HTTP4. OSI5. IETF6. RFC7. NETBEUI8. IPX9. IANA10. SMTP11. POE12. STP

lV. Encirle the letter that corresponds the correct answer.

1. You have purchased a basic switch for your network that can look at information within apacket of data and send it to its destination address. It has no additional features. Whatkind of switch is this?a. Layer 2b. Layer 3c. Layer 4d. Layer 5

2 . A broadcast message is sent by a computer onto the network. Which of the following willoccur when the switch receives the broadcast message?a. The message will be sent to all computers on the network.b. The message will be sent to all computers in the same broadcastdomain.c. The message will not be sent because switches will only sendmessages between two nodes.d. The message will not be sent because switches are designed toalways ignore broadcast messages.

3 . You are looking into purchasing a new switch for your network. You want the switch tobe able to route packets of data based on the uniform resource locator included with thepacket. Which switch type should you buy?a. Layer 2b. Layer 3

8/7/2019 SYSTEM NETWORK ADMINISTRATION

http://slidepdf.com/reader/full/system-network-administration 3/4

c. Layer 4d. Layer 5

4 . A switch on your network is designed to look at the MAC address of incoming data, andthen use switching tables and algorithms to properly route data to its intended destination.What type of switch is being used?

a. Layer 2b. Layer 3c. Layer 4d. Layer 5

5 . Your company has just purchased a smaller rival business, and now wants you toconnect the two networks together. Your company¶s existing network is twice the size of the new network. To get these two networks connected together, which of the followingwill you do?a. Install a VLAN to connect the two networks together.b. Install a switch to connect to the two networks together.

c. Install a bridge to break the larger LAN into two smaller ones,and then connect these to the other LAN using a switch.d. Install a switch to break the larger LAN into two smaller ones, and then connect these tothe other LAN using a switch.

6 . A small network consists of three computers named Alpha, Beta, and Omega. Alphasends a message to Omega, and the data is passed through a switch. When it reaches thehub, which of the following will occur?

A. The message is broadcast to all of the computers on the network.B. The message is sent out on all of the ports. Beta will ignore themessage because it isn¶t intended for that computer.C. The message will only be sent out on the port connecting to Beta.D. The message will only be sent out on the port connecting to Omega.

7 . You are the network administrator of a large company that has experienced severalhacking attempts in the past. You decide to install a new IDS on your network. Which of the following will be required so that the IDS can view data going across a switch?

A. Port authenticationB. Port mirroringC. VLAND. Trunking

8 . Your company is looking at replacing all of the standard telephones used in its officeswith IP telephones. The initial analysis shows that there would be a cost savings to theCompany using IP telephones, but there is a concern that there would be a high initial costof having to install new electrical outlets to power these devices. Which of the followingcould be used to power the IP telephones without needing to install additional power outlets?

A. PoEB. STPC. TrunkingD. VLAN

9 . You have decided to implement redundant switches on your network that will enablepackets of data to take the best possible route to their destination. Which of the followingfeatures will you want on the switches that will be used on this network so that loopingdoesn¶t occur?

A. STPB. UDPC. TCPD. IDS

8/7/2019 SYSTEM NETWORK ADMINISTRATION

http://slidepdf.com/reader/full/system-network-administration 4/4

10. You have installed new cabling to accommodate a new section of the building that isbeing networked. Once computers are installed, you find that they are unable to connect tothe network. You believe the problem is that the length of the cabling has exceeded themaximum distance allowed. You want to fix the problem with the least amount of cost andwork. Which of the following will you do?

A. Remove the cabling and install cable that supports a longer distance.B. Install a passive hub to increase the distance that data can travel along the cable.C. Install a NIC to increase the distance that data can travel along the cable.D. Install a switch to increase the distance that data can travel along the cable.

11. A computer wants to send data to another computer on the network. Before it can sendthe data, it must send its credentials to a server that verifies that it has access. Which of the following is being used?

A. Port authenticationB. Port mirroringC. VLAN

D. Trunking1 2 . You want to have computers in different buildings to be part of the same broadcastdomain, so that when a computer sends a broadcast message, all of the computers in thatdomain will receive it. What will you do to achieve this?

A. Use a switch to establish a bridge between the two networks.B. Use port mirroring to have the broadcast sent to computers in the other building.C. Implement a VLAN so that all computers can be part of the same VLAN and receivebroadcasts.D. Use trunking to connect the two networks together.

1 3 . A client is attempting to send data across a port that requires authentication. Inattempting to send data across the network in this situation, what role does the client play?

A. SupplicantB. Authenticator C. Authentication server D. File server

1 4 . You have set up several VLANs on your network. You want to have computers that arepart of the same VLAN that are in different buildings connected by a single network link.Which of the following will you use to implement this?

A. Multiport bridgingB. STPC. Create a new VLAN that will incorporate the different computers you want connectedtogether as part of the same VLAN.D. Use trunking to connect the two virtual networks together.

1 5 . A client is attempting to send data across a port that requires authentication. Inattempting to send data across the network in this situation, what role does the port play?

A. SupplicantB. Authenticator C. Authentication server D. File server

God bless and Good luck!!!

Prepared by: Prof. RODRIGO P. CALAPAN