0% found this document useful (0 votes)
6 views5 pages

PART 7 + 8

Uploaded by

nguyenducanh277
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views5 pages

PART 7 + 8

Uploaded by

nguyenducanh277
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

PART 7.

NETWORK SECURITY AND SAFETY


Question 1.263: Protecting information resources on the network is necessary and urgent
because:
A. Computers are connected into a network
B. Many users and physically dispersed
C. Protecting servers
D. Preventing eavesdropping on information

Question 1.264: Network safety means protecting and ensuring the safety of:
A. Software on the network
B. Network resources
C. Network hardware
D. Data storage

Question 1.265: A violation of information security means:


A. Interfering with network activities
B. Interfering with user activities
C. Changing the content and flow of information
D. Denial of service

Question 1.266: Cryptography is the process of converting clear text into:


A. Encrypted form
B. Denial of service form
C. Denial
D. No access rights

Question 1.267: A firewall is a system that controls and prevents:


A. Unauthorized intrusion from outside the system
B. Use of network resources
C. Access to information
D. Espionage

Question 1.268: A packet filter (installed on a firewall) can:


A. Allow only internal computers to initiate TCP connections to computers outside the
network
B. Allow an FTP client inside to access an external FTP server without the internal computer
being hacked
C. Allow an FTP client outside to access an internal FTP server without the internal computer
being hacked
D. All of the above

Question 1.269: Authentication is:


A. The sender encrypts the message, and the receiver decrypts it
B. The sender and the receiver ensure they recognize each other
C. The sender and receiver want to ensure the message is not altered
D. Services must be available and accessible to users

Question 1.270: Message integrity is:


A. The sender encrypts the message, and the receiver decrypts it
B. The sender and the receiver ensure they recognize each other
C. The sender and receiver want to ensure the message is not altered
D. Services must be available and accessible to users
Question 1.271: DES (Data Encryption Standard) is used in:
A. Symmetric key encryption
B. Public key encryption
C. Both symmetric key and public key encryption
D. All of the above are incorrect

Question 1.272: RSA algorithm is used in:


A. Symmetric key encryption
B. Public key encryption
C. Both symmetric key and public key encryption
D. All of the above are incorrect

PART 8. NETWORK TOOLS (RELATED TO PRACTICAL COURSEWORK)


Question 1.273: Use the IPconfig command when you want to:
A. Determine the path of packets from source to destination
B. Check the TCP/IP configuration status of the computer (network card configuration)
C. Analyze packets to solve a specific network issue
D. Check for network errors

Question 1.274: The Tracert command is used to:


A. Determine the path of packets from source to destination (through which network nodes)
B. Check the TCP/IP configuration status of the computer (network card configuration)
C. Analyze packets to solve a specific network issue
D. Check for network errors

Question 1.275: The Netstat command is used to:


A. Check the TCP/IP configuration status of the computer (network card configuration)
B. Analyze packets to solve a specific network issue
C. Determine the path of packets from source to destination
D. List all incoming and outgoing connections of the computer

Question 1.276: The syntax of the telnet ip/host port command includes the parameters:
A. ip is the IP address of the source device, host is the name of the terminal device, port is the
communication port with the terminal device
B. ip is the IP address of the terminal device, host is the name of the terminal device, port is
the port to communicate with the terminal device
C. ip is the IP address of the source device, host is the name of the source device, port is the
source port
D. ip is the IP address of the source device, host is the name of the terminal device, port is the
source port

Question 1.277: Wireshark is a tool to:


A. Check the network configuration status
B. Determine the path of packets from source to destination
C. Analyze packets to solve a specific network issue
D. Access remotely

Question 1.278: Which command will display the following result:


Reply from 74.125.128.102: byte=32 time=50ms TTL=45
Reply from 74.125.128.102: byte=32 time=51ms TTL=45
Reply from 74.125.128.102: byte=32 time=56ms TTL=45
Reply from 74.125.128.102: byte=32 time=52ms TTL=45
Packets: Sent = 4, Received = 4, Lost = 0 <0% lost>
Approximate round trip times in milliseconds:
Minimum = 50ms, Maximum = 56ms, Average = 52ms

A. Ping
B. Tracert
C. Telnet
D. Ipconfig

Question 1.279: Which command will display the following result:


Proto Local Address Foreign Address State
TCP 0.0.0.0:7 nam-PC:0 LISTENING
TCP 0.0.0.0:9 nam-PC:0 LISTENING
TCP 0.0.0.0:13 nam-PC:0 LISTENING
TCP 0.0.0.0:17 nam-PC:0 LISTENING

A. Ping
B. Tracert
C. Netstat
D. Ipconfig

Question 1.280: Which tool will display information like the following:

A. Ping
B. Tracert
C. Netstat
D. Wireshark

Question 1.281: Which command will display the following result:

A. Ping
B. Ping –a
C. Tracert
D. Netstat

Question 1.282: Which of the following commands shows the IP address of the computer:
A. IP
B. IPCONFIG
C. TCP_IP
D. FTP

Question 1.283: The PING command is used to:


A. Check if computers have hard drives
B. Check if computers in the network are interconnected
C. Check if computers are working well
D. Check if computers can access the Internet

Question 1.284: Which command is used to determine the transmission path (in the Windows
operating system):
A. Nslookup
B. ipconfig
C. Route
D. Tracert

Question 1.285: Which TCP/IP utility is used to check network connectivity:


A. Route
B. ARP
C. Ping
D. Netstat

Question 1.286: Which of the following statements are correct about ADSL connection
models:
A. PPPoA model (Point to Point over ATM)
B. PPPoE model (Point to Point over Ethernet) RFC 2516
C. IP over ATM model (RFC 1483R)
D. All are correct

Question 1.287: ADSL technology is a digital subscriber line technology with:


A. Asymmetric
B. Random
C. Sequential
D. Symmetric

Question 1.288: If you forget the password for the ADSL Router, how can you recover the
default password:
A. Check the user manual from the provider
B. Power on the ADSL Router and hold the Reset button for a certain period
C. Use software to scan the Username and Password
D. It is impossible to recover the default password

Question 1.289: To configure an ADSL Router for Internet connection, the basic parameters
that need to be set are:
A. VCI/VPI, LAN IP Address, Account credentials to connect to the service provider (user,
password)
B. DHCP Service
C. Both A and B are correct
D. All of the above are incorrect

Question 1.290: The central network device used to connect computers in a star network
topology is:
A. Switch/Hub
B. Router
C. Repeater
D. NIC

Question 1.291: The Traceroute program uses which protocols:


A. UDP
B. UDP and ICMP
C. TCP and ICMP
D. IGMP

Question 1.292: The Bridge device allows:


A. Routing packets
B. Connecting two LANs together and acting as a filter: only allowing packets with
destination addresses outside the originating LAN to pass
C. Boosting electrical signals to extend the network segment
D. All of the above

Question 1.293: The Modem is used to:


A. Communicate with the network
B. Transmit data over long distances
C. Transmit data within a LAN
D. A and B are correct

Question 1.294: You are using FTP in Command Prompt, and you want to create a directory
named "Test" on your local machine (without exiting FTP). What command would you use:
A. #md test
B. !md test
C. Md Test
D. Mkdir test

Question 1.295: Which of the following mechanisms is used to implement Web cache:
A. Authentication and 401 Authorization Check
B. "Last-Modified" and "If-Modified-Since" header fields
C. POST request method
D. A and B

Question 1.296: For the twisted pair cable connecting the network card to the hub:
A. Both ends of the cable are wired the same
B. Swap the positions of wires 1, 2 with 3, 6
C. One end is wired according to TIA/EIA T-568A, the other end is wired according to
TIA/EIA T-568-B
D. All are incorrect

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy