0% found this document useful (0 votes)
383 views

(Midterm Examination) Name: Permit No: Course: Section:: System Network Administration

This document provides directions and content for a system network administration midterm examination. It includes identification questions to be filled in, matching questions to pair terms with definitions, and multiple choice questions testing network administration concepts. Students are given 1 hour to complete the exam and are prohibited from using devices to cheat.

Uploaded by

Rodrigo Calapan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
383 views

(Midterm Examination) Name: Permit No: Course: Section:: System Network Administration

This document provides directions and content for a system network administration midterm examination. It includes identification questions to be filled in, matching questions to pair terms with definitions, and multiple choice questions testing network administration concepts. Students are given 1 hour to complete the exam and are prohibited from using devices to cheat.

Uploaded by

Rodrigo Calapan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

SYSTEM NETWORK ADMINISTRATION

(Midterm Examination)

Name: Permit No:


Course: Section:

DIRECTIONS: Mark your examinee information in your answer sheet. This test is
designed for testing the basic foundations of system network administration for CS/IT
students. The students are required to present their examination permit slip before taking
the exam. The examinee is given 1 hour to complete the exam. Using gadgets during the
exam is strictly prohibited. No cheating please…

l. Identification
_________1. A set of rules for sending and receiving data across a network.
_________2. It simply provides a theoretical model you can use for network
problems ranging from design issues to snafus with connection
_________3. Handles the actual connections between systems.
_________4. Provides an addressing scheme.
_________5. Handles of notifying the sender and requesting that another packet be
sent.
_________6. Concerned only with the physical aspects of the network.
_________7. Refers to software application that you use on your screen.
_________8. Deals with the way different systems represents data.
_________9. A protocol that carries data traffic over the internet.
_________10. Are draft documents freely available on the internet that explain a
standard to the networking community.
_________11. Set of protocols that have standard ways interacting with each other.
_________12. Is the technology is which the electrical power can be transferred over
standard twisted –pair cables.
_________13. Was developed by digital equipment corporation to prevents
broadcast storms that result from looping.
_________14. Allows to be broadcast to all of the device that are is the same
broadcast domain.
_________15. Refers to single network link that allows multiple VLAN’s to
communicate with one another.
_________16. Process in which all of the data sent or received on one port or VLAN
is copied to another port.
_________17. Is a process in which access to a port is given to a device by having
that device authenticate itself with a server.
_________18. This is port that is configured to restrict access and requires
authentication before allowing access.
_________19. This is the client that request access to the network.
_________20. This is a server that is configured to restrict access and requires
authentication before allowing access.

lll. Matching type

Set A Set A

1. POP3/IMAP a. Ensures that connections are made and maintained


between computers.
2. SMTP b. Handles software computer addresses.
3. PPP c. Finds the quickest route between computers.
4. BGP/EGP d. descendent of RUP that increases & reliability.
5. SNMP e. Handles errors and sends error messages for
TCP/IP.
6. RIP f. Handles how data is passed between network.
7. OSPF g. Allows network administrators to connect to and to
manage network device.
8. ARP h. Used by ISP to allow costumers to connect to there
services.
9. ICMP i. Controls on how email is passed between servers
on a TCP/IP network.
10. TCP j. Internet Calendar.
11. IP k. Both set up ways for clients to connect to servers
and collect email.
12. iCAL

lll. Give the meaning of the following acronyms.

1. UDP
2. SSTP
3. HTTP
4. OSI
5. IETF
6. RFC
7. NETBEUI
8. IPX
9. IANA
10. SMTP
11. POE
12. STP

lV. Encirle the letter that corresponds the correct answer.

1. You have purchased a basic switch for your network that can look at information within a
packet of data and send it to its destination address. It has no additional features. What
kind of switch is this?
a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5

2. A broadcast message is sent by a computer onto the network. Which of the following will
occur when the switch receives the broadcast message?
a. The message will be sent to all computers on the network.
b. The message will be sent to all computers in the same broadcast
domain.
c. The message will not be sent because switches will only send
messages between two nodes.
d. The message will not be sent because switches are designed to
always ignore broadcast messages.

3. You are looking into purchasing a new switch for your network. You want the switch to
be able to route packets of data based on the uniform resource locator included with the
packet. Which switch type should you buy?
a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5

4. A switch on your network is designed to look at the MAC address of incoming data, and
then use switching tables and algorithms to properly route data to its intended destination.
What type of switch is being used?
a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5

5. Your company has just purchased a smaller rival business, and now wants you to
connect the two networks together. Your company’s existing network is twice the size of
the new network. To get these two networks connected together, which of the following
will you do?
a. Install a VLAN to connect the two networks together.
b. Install a switch to connect to the two networks together.
c. Install a bridge to break the larger LAN into two smaller ones,
and then connect these to the other LAN using a switch.
d. Install a switch to break the larger LAN into two smaller ones, and then connect these to
the other LAN using a switch.

6. A small network consists of three computers named Alpha, Beta, and Omega. Alpha
sends a message to Omega, and the data is passed through a switch. When it reaches the
hub, which of the following will occur?
A. The message is broadcast to all of the computers on the network.
B. The message is sent out on all of the ports. Beta will ignore the
message because it isn’t intended for that computer.
C. The message will only be sent out on the port connecting to Beta.
D. The message will only be sent out on the port connecting to Omega.

7. You are the network administrator of a large company that has experienced several
hacking attempts in the past. You decide to install a new IDS on your network. Which of
the following will be required so that the IDS can view data going across a switch?
A. Port authentication
B. Port mirroring
C. VLAN
D. Trunking

8. Your company is looking at replacing all of the standard telephones used in its offices
with IP telephones. The initial analysis shows that there would be a cost savings to the
Company using IP telephones, but there is a concern that there would be a high initial cost
of having to install new electrical outlets to power these devices. Which of the following
could be used to power the IP telephones without needing to install additional power
outlets?
A. PoE
B. STP
C. Trunking
D. VLAN

9. You have decided to implement redundant switches on your network that will enable
packets of data to take the best possible route to their destination. Which of the following
features will you want on the switches that will be used on this network so that looping
doesn’t occur?
A. STP
B. UDP
C. TCP
D. IDS
10. You have installed new cabling to accommodate a new section of the building that is
being networked. Once computers are installed, you find that they are unable to connect to
the network. You believe the problem is that the length of the cabling has exceeded the
maximum distance allowed. You want to fix the problem with the least amount of cost and
work. Which of the following will you do?
A. Remove the cabling and install cable that supports a longer distance.
B. Install a passive hub to increase the distance that data can travel along the cable.
C. Install a NIC to increase the distance that data can travel along the cable.
D. Install a switch to increase the distance that data can travel along the cable.

11. A computer wants to send data to another computer on the network. Before it can send
the data, it must send its credentials to a server that verifies that it has access. Which of
the following is being used?
A. Port authentication
B. Port mirroring
C. VLAN
D. Trunking

12. You want to have computers in different buildings to be part of the same broadcast
domain, so that when a computer sends a broadcast message, all of the computers in that
domain will receive it. What will you do to achieve this?
A. Use a switch to establish a bridge between the two networks.
B. Use port mirroring to have the broadcast sent to computers in the other building.
C. Implement a VLAN so that all computers can be part of the same VLAN and receive
broadcasts.
D. Use trunking to connect the two networks together.

13. A client is attempting to send data across a port that requires authentication. In
attempting to send data across the network in this situation, what role does the client play?
A. Supplicant
B. Authenticator
C. Authentication server
D. File server

14. You have set up several VLANs on your network. You want to have computers that are
part of the same VLAN that are in different buildings connected by a single network link.
Which of the following will you use to implement this?
A. Multiport bridging
B. STP
C. Create a new VLAN that will incorporate the different computers you want connected
together as part of the same VLAN.
D. Use trunking to connect the two virtual networks together.

15. A client is attempting to send data across a port that requires authentication. In
attempting to send data across the network in this situation, what role does the port play?
A. Supplicant
B. Authenticator
C. Authentication server
D. File server

God bless and Good luck!!!

Prepared by: Prof. RODRIGO P. CALAPAN

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy