PART 7.
NETWORK SECURITY AND SAFETY
Question 1.263: Protecting information resources on the network is necessary and urgent
because:
A. Computers are connected into a network
B. Many users and physically dispersed
C. Protecting servers
D. Preventing eavesdropping on information
Question 1.264: Network safety means protecting and ensuring the safety of:
A. Software on the network
B. Network resources
C. Network hardware
D. Data storage
Question 1.265: A violation of information security means:
A. Interfering with network activities
B. Interfering with user activities
C. Changing the content and flow of information
D. Denial of service
Question 1.266: Cryptography is the process of converting clear text into:
A. Encrypted form
B. Denial of service form
C. Denial
D. No access rights
Question 1.267: A firewall is a system that controls and prevents:
A. Unauthorized intrusion from outside the system
B. Use of network resources
C. Access to information
D. Espionage
Question 1.268: A packet filter (installed on a firewall) can:
A. Allow only internal computers to initiate TCP connections to computers outside the
network
B. Allow an FTP client inside to access an external FTP server without the internal computer
being hacked
C. Allow an FTP client outside to access an internal FTP server without the internal computer
being hacked
D. All of the above
Question 1.269: Authentication is:
A. The sender encrypts the message, and the receiver decrypts it
B. The sender and the receiver ensure they recognize each other
C. The sender and receiver want to ensure the message is not altered
D. Services must be available and accessible to users
Question 1.270: Message integrity is:
A. The sender encrypts the message, and the receiver decrypts it
B. The sender and the receiver ensure they recognize each other
C. The sender and receiver want to ensure the message is not altered
D. Services must be available and accessible to users
Question 1.271: DES (Data Encryption Standard) is used in:
A. Symmetric key encryption
B. Public key encryption
C. Both symmetric key and public key encryption
D. All of the above are incorrect
Question 1.272: RSA algorithm is used in:
A. Symmetric key encryption
B. Public key encryption
C. Both symmetric key and public key encryption
D. All of the above are incorrect
PART 8. NETWORK TOOLS (RELATED TO PRACTICAL COURSEWORK)
Question 1.273: Use the IPconfig command when you want to:
A. Determine the path of packets from source to destination
B. Check the TCP/IP configuration status of the computer (network card configuration)
C. Analyze packets to solve a specific network issue
D. Check for network errors
Question 1.274: The Tracert command is used to:
A. Determine the path of packets from source to destination (through which network nodes)
B. Check the TCP/IP configuration status of the computer (network card configuration)
C. Analyze packets to solve a specific network issue
D. Check for network errors
Question 1.275: The Netstat command is used to:
A. Check the TCP/IP configuration status of the computer (network card configuration)
B. Analyze packets to solve a specific network issue
C. Determine the path of packets from source to destination
D. List all incoming and outgoing connections of the computer
Question 1.276: The syntax of the telnet ip/host port command includes the parameters:
A. ip is the IP address of the source device, host is the name of the terminal device, port is the
communication port with the terminal device
B. ip is the IP address of the terminal device, host is the name of the terminal device, port is
the port to communicate with the terminal device
C. ip is the IP address of the source device, host is the name of the source device, port is the
source port
D. ip is the IP address of the source device, host is the name of the terminal device, port is the
source port
Question 1.277: Wireshark is a tool to:
A. Check the network configuration status
B. Determine the path of packets from source to destination
C. Analyze packets to solve a specific network issue
D. Access remotely
Question 1.278: Which command will display the following result:
Reply from 74.125.128.102: byte=32 time=50ms TTL=45
Reply from 74.125.128.102: byte=32 time=51ms TTL=45
Reply from 74.125.128.102: byte=32 time=56ms TTL=45
Reply from 74.125.128.102: byte=32 time=52ms TTL=45
Packets: Sent = 4, Received = 4, Lost = 0 <0% lost>
Approximate round trip times in milliseconds:
Minimum = 50ms, Maximum = 56ms, Average = 52ms
A. Ping
B. Tracert
C. Telnet
D. Ipconfig
Question 1.279: Which command will display the following result:
Proto Local Address Foreign Address State
TCP 0.0.0.0:7 nam-PC:0 LISTENING
TCP 0.0.0.0:9 nam-PC:0 LISTENING
TCP 0.0.0.0:13 nam-PC:0 LISTENING
TCP 0.0.0.0:17 nam-PC:0 LISTENING
A. Ping
B. Tracert
C. Netstat
D. Ipconfig
Question 1.280: Which tool will display information like the following:
A. Ping
B. Tracert
C. Netstat
D. Wireshark
Question 1.281: Which command will display the following result:
A. Ping
B. Ping –a
C. Tracert
D. Netstat
Question 1.282: Which of the following commands shows the IP address of the computer:
A. IP
B. IPCONFIG
C. TCP_IP
D. FTP
Question 1.283: The PING command is used to:
A. Check if computers have hard drives
B. Check if computers in the network are interconnected
C. Check if computers are working well
D. Check if computers can access the Internet
Question 1.284: Which command is used to determine the transmission path (in the Windows
operating system):
A. Nslookup
B. ipconfig
C. Route
D. Tracert
Question 1.285: Which TCP/IP utility is used to check network connectivity:
A. Route
B. ARP
C. Ping
D. Netstat
Question 1.286: Which of the following statements are correct about ADSL connection
models:
A. PPPoA model (Point to Point over ATM)
B. PPPoE model (Point to Point over Ethernet) RFC 2516
C. IP over ATM model (RFC 1483R)
D. All are correct
Question 1.287: ADSL technology is a digital subscriber line technology with:
A. Asymmetric
B. Random
C. Sequential
D. Symmetric
Question 1.288: If you forget the password for the ADSL Router, how can you recover the
default password:
A. Check the user manual from the provider
B. Power on the ADSL Router and hold the Reset button for a certain period
C. Use software to scan the Username and Password
D. It is impossible to recover the default password
Question 1.289: To configure an ADSL Router for Internet connection, the basic parameters
that need to be set are:
A. VCI/VPI, LAN IP Address, Account credentials to connect to the service provider (user,
password)
B. DHCP Service
C. Both A and B are correct
D. All of the above are incorrect
Question 1.290: The central network device used to connect computers in a star network
topology is:
A. Switch/Hub
B. Router
C. Repeater
D. NIC
Question 1.291: The Traceroute program uses which protocols:
A. UDP
B. UDP and ICMP
C. TCP and ICMP
D. IGMP
Question 1.292: The Bridge device allows:
A. Routing packets
B. Connecting two LANs together and acting as a filter: only allowing packets with
destination addresses outside the originating LAN to pass
C. Boosting electrical signals to extend the network segment
D. All of the above
Question 1.293: The Modem is used to:
A. Communicate with the network
B. Transmit data over long distances
C. Transmit data within a LAN
D. A and B are correct
Question 1.294: You are using FTP in Command Prompt, and you want to create a directory
named "Test" on your local machine (without exiting FTP). What command would you use:
A. #md test
B. !md test
C. Md Test
D. Mkdir test
Question 1.295: Which of the following mechanisms is used to implement Web cache:
A. Authentication and 401 Authorization Check
B. "Last-Modified" and "If-Modified-Since" header fields
C. POST request method
D. A and B
Question 1.296: For the twisted pair cable connecting the network card to the hub:
A. Both ends of the cable are wired the same
B. Swap the positions of wires 1, 2 with 3, 6
C. One end is wired according to TIA/EIA T-568A, the other end is wired according to
TIA/EIA T-568-B
D. All are incorrect