SlideShare uma empresa Scribd logo
1 de 26
Network



 by Tanat Tonguthaisri
   itpe@nstda.or.th
1. Which of the following is the role of
DNS in a TCP/IP network?
       a) It allocates an unused IP address from the
          addresses registered in a server in response to
          an IP address allocation request from devices
          such as PCs.
       b) It allows server programs to be called by
          specifying only the program name, regardless
          of the server IP address.
       c) It translates an in-house private IP address to a
          global IP address to enable access to the
          Internet.
       d) It maps a domain name or a host name to an IP
          address.
2. Which of the following can be implemented
by using the packet filtering of a firewall?

      a) Tampered packets received from the Internet are
         corrected. If a packet cannot be corrected, a log is
         generated and it is blocked from passing into the internal
         network.
      b) The header and data of the packet received from the
         Internet are checked for tampering. If any tampering is
         detected, the packet is discarded.
      c) A packet with a dynamically allocated TCP port number is
         permitted to pass through to the internal network by
         converting the packet to one with a fixed TCP port number
         on the receiver side.
      d) Only packets with a specific TCP port number are
         permitted to pass through to the internal network from the
         Internet.
3. Which of the following is an appropriate
measure to avoid a shortage of total mailbox
capacity at the mail server?

        a) Setting an upper limit for each
          user’s mailbox capacity
        b) Implementing mirrored disks on the
          mail server
        c) Having back-ups of mail data
        d) Sending large e-mails in bulk during
          hours when they do not adversely
          affect the transmission of other e-mails
4. Which of the following is an appropriate
description concerning protocols and
languages related to the Internet?
         a)FTP is a protocol for transferring e-mail
            messages with files attached to them.
         b)HTML is a language that allows the user to
            define tags for describing the logical
            structure of a document.
         c) HTTP is a protocol for transferring
            information such as HTML documents.
         d)SMTP is a protocol for sending and
            receiving image information.
5. Which of the following is an appropriate
description of DNS?
       a) It is a system used for searching a wide variety
          of information on the Internet.
       b) It is a system used for mapping between host
          names and IP addresses of devices connected
          to the Internet.
       c)      It is a personal authentication system used
          for providing a safe and secure online shopping
          environment.
       d) It is a system used for managing personal e-
          mail addresses for e-mail delivery.
6. Which of the following is the mechanism
installed between the Internet and the
internal network in order to prevent
unauthorized access via the Internet?


            a)   Gateway
            b)   WAN
            c)   Firewall
            d)   Switching hub
7. Which of the following is an
appropriate description concerning a
router used in an IP network?

    a)It maps domain names to IP addresses.
    b)It selects the path for transmitting packets
       based on IP addresses.
    c) It converts analog signals to digital signals
       and vice versa.
    d)It executes processes and provides data
       upon requests from other computers.
8. Which of the following is an appropriate
description concerning the selection of
communication protocols used between a PC
and a mail server when e-mails are sent and
received between PCs?
     a)PCs use POP for sending e-mails and
        SMTP for receiving them.
     b)PCs use SMTP for sending e-mails and
        POP for receiving them.
     c) PCs use POP for both sending and
        receiving e-mails.
     d)PCs use SMTP for both sending and
        receiving e-mails.
9. Which of the following is an appropriate
explanation of MIME used on the Internet?
         a)It is a description language for hypertext on
            the Web.
         b)It is a hypertext transmission protocol
            between client and server on the Internet.
         c) It is a method of address notation for
            uniquely identifying a resource on the
            Internet.
         d)It is a standard that enables e-mail to
            support multimedia information such as
            audio and images.
10. Which of the following is the network area
that is provided by installing a firewall and is
accessible from both the Internet and the
intranet but not accessible to the intranet?

                        a) DHCP
                        b) DMZ
                        c) DNS
                        d) DoS
11. A Web server in Company A provides SSL
communication using a digital certificate for the Web server
generated by a certification authority. Which of the following
is a procedure in which a PC accesses the Web server of
Company A and after obtaining a digital certificate, uses the
public key of the certification authority?
     a) Generating a common key used for encrypted
        communication and encrypting it by using the public key
        of the certification authority
     b) Using the public key of the certification authority to
        decrypt the common key used for encrypted
        communication
     c) Using the public key of the certification authority to verify
        the validity of the digital certificate
     d) Encrypting confidential data by using the public key of
        the certification authority
12. Which of the following is an appropriate
combination of the protocols that are used for
transmitting and receiving e-mail as shown in the
diagram below?           (3) Transfer e-mail
                     Mail server                        Mail server

   (1) Send e-mail                 (2) Receive e-mail


                     Mail client

                (1)                     (2)              (3)

          a)    POP3                    POP3             SMTP

          b)    POP3                    SMTP             POP3

          c)    SMTP                    POP3             SMTP

          d)    SMTP                    SMTP             SMTP
13. Which of the following is a
mechanism that enables a Web server to
store user information in a browser in
order to identify which PC is accessing
the Web server?

           a)   CGI
           b)   Cookie
           c)   SSL
           d)   URL
14. When ten e-mail messages are sent successively
from Company A to Company B, they may arrive at
Company B in a different order from the order they are
sent. Which of the following is an appropriate opinion
on this matter?
         a)There is a problem with the setup of
            Company A’s mail server.
         b)There is a problem with the setup of
            Company B’s firewall for e-mail.
         c)     There is a high possibility that e-mail
            delivered late is falsified on the way.
         d)The arrival sequence is subject to change
            because of different transfer routes.
15. As shown in the figure below, a LAN system
 comprises two PCs, one server, and one printer. When
 PC A cannot print any output data on the printer, which
 of the following should be applied to blank P in the
 problem determination flowchart? Here, both PCs can
 send output data directly to the printer without using the
 server.

[LAN System]
15.(cont.) [Flowchart]




    a) PC A is not connected to the LAN system.
    b) PC A has something wrong with output settings such as the
       print queue.
    c) The LAN system does not work because of a failure in the hub.
    d) The printer does not work because of a hardware failure.
16. Which of the following is an
 appropriate explanation of a router that
 allows messages to be sent between
 two or more networks?
a) It performs connection at the data link layer, and provides
   the traffic isolation function.
b) It converts protocols including protocols above the
   transport layer, and interconnects networks with different
   types of network architecture.
c) It performs connection at the network layer, and is used for
   connecting LANs via wide-area networks.
d) It performs connection at the physical layer, and is used for
   extending the connection distance.
17. In order to implement communication between applications via a
network, a number of protocols are used in a hierarchical structure.
Which of the following is the appropriate combination of the protocol
names to be inserted into blanks A and B in the description below?

When a Web page is viewed via the Internet, the browser and the
Web server use a protocol called A . Communication over this
       A uses a protocol of a lower layer called B and a
protocol of a further lower layer called IP (Internet Protocol).

     A                                     B

 a) FTP (File Transfer Protocol)          Ethernet

 b) HTTP (Hyper Text Transfer Protocol)   TCP (Transmission Control Protocol)

 c) SMTP (Simple Mail Transfer Protocol) POP3 (Post Office Protocol version 3)

 d) WWW (World Wide Web)                  HTML (Hyper Text Markup
                                          Language)
18. Which of the following is an appropriate
explanation concerning URL?
      a) It is a communications protocol
        between a Web page and a browser.
      b) It is a message about the update
        history of a Web page.
      c)It is grammar for describing the content
        (body) of a Web page.
      d) It is a notation for representing the
        location of a Web page.
19. When an e-mail message titled “Returned
mail: Host unknown” is returned in response
to an e-mail over the Internet, which of the
following is a probable cause of this
message?
   a) The recipient’s mail server remains stopped.
   b) In the recipient’s address, the domain name after
     the @ symbol is incorrect.
   c) The transmitted data is too large, so it exceeds
     the mail server’s storage capacity.
   d) The encoder used for the attached file is
     incompatible with the recipient’s decoder.
20. Which of the following is an appropriate
description of VoIP?
a) It is a method that enables PC users to access data or
   applications available on the Internet.
b) It is a technology that converts voice data into packets and
   transmits them in real-time over an IP network.
c) It is a technology that ensures the security of communication
   by using authentication, encryption, and decryption between
   network nodes.
d) It is a system that defines and manages a correspondence
   between a host name and an IP address for a network-
   connected computer.
21. Which of the following prevents
unauthorized external access by using packet
filtering at the connection point between a
company’s internal network and the Internet?


             a) DNS
             b) NAT
             c) Gateway
             d) Firewall
22. Which of the following is an appropriate
explanation concerning the function of a
router?
   a) It optically reads data such as picture and
      text and then converts it into digital data.
   b) It converts analog signals to digital signals
      and vice versa.
   c) It controls the communication path of data
      and relays data across networks.
   d) It archives and provides data of Web pages
      by using networks.
23. Which of the following is an appropriate
description concerning a cookie used in the
Web?
 a) It is a standard that can be used for formatting the
    layout of an HTML document in detail.
 b) It is the HTTP protocol to which an encryption
    function is added for private communications over the
    Internet.
 c) It is a mechanism where a Web server interacts with
    external programs to create Web pages dynamically.
 d) It is a mechanism where information from a Web
    server is temporarily saved in a browser that
    accesses the Web server.
24. Which of the following is a system
configuration that introduces Internet
technology into a company’s information and
telecommunication system and is used for
information sharing and business support?

             a) EDI
             b) VAN
             c) Intranet
             d) Extranet

Mais conteúdo relacionado

Mais procurados

RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 
Collections of CS Multiple Choice Questions
Collections of CS Multiple Choice QuestionsCollections of CS Multiple Choice Questions
Collections of CS Multiple Choice QuestionsShusil Baral
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesIJTET Journal
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of websitehazirma
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6mithilak
 
sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.docVideoguy
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsShusil Baral
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiveriaemedu
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsAnil Neupane
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in javaAmol Gaikwad
 
Chapter 3 v6.01 (1)
Chapter 3 v6.01 (1)Chapter 3 v6.01 (1)
Chapter 3 v6.01 (1)Krunal Pawar
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in JavaTushar B Kute
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocolssbmiller87
 
Ch02 network models-jdb
Ch02 network models-jdbCh02 network models-jdb
Ch02 network models-jdbjhunudb
 

Mais procurados (20)

RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
Collections of CS Multiple Choice Questions
Collections of CS Multiple Choice QuestionsCollections of CS Multiple Choice Questions
Collections of CS Multiple Choice Questions
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website
 
Lecture2 mac learning
Lecture2 mac learningLecture2 mac learning
Lecture2 mac learning
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.doc
 
Email security
Email securityEmail security
Email security
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiver
 
Networking Basic MCQ's TEST
Networking Basic  MCQ's TESTNetworking Basic  MCQ's TEST
Networking Basic MCQ's TEST
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Bcs 052 solved assignment
Bcs 052 solved assignmentBcs 052 solved assignment
Bcs 052 solved assignment
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
 
Chapter 3 v6.01 (1)
Chapter 3 v6.01 (1)Chapter 3 v6.01 (1)
Chapter 3 v6.01 (1)
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in Java
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Ch02 network models-jdb
Ch02 network models-jdbCh02 network models-jdb
Ch02 network models-jdb
 

Destaque (6)

Database (IP)
Database (IP)Database (IP)
Database (IP)
 
Strategy (IP)
Strategy (IP)Strategy (IP)
Strategy (IP)
 
Basic Theory (FE)
Basic Theory (FE)Basic Theory (FE)
Basic Theory (FE)
 
Medium Questions
Medium QuestionsMedium Questions
Medium Questions
 
Management (IP)
Management (IP)Management (IP)
Management (IP)
 
Basic Theory (IP)
Basic Theory (IP)Basic Theory (IP)
Basic Theory (IP)
 

Semelhante a DNS maps domain names to IP addresses

Connecting Network
Connecting NetworkConnecting Network
Connecting Networkimacomobio
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.igede tirtanata
 
Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networksimacomobio
 
MCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docxMCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docxhariraaghav1909
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptximacomobio
 
Ict networking exercise short questions answer
Ict networking exercise short questions answerIct networking exercise short questions answer
Ict networking exercise short questions answerGary Tsang
 
1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdfisenbergwarne4100
 
Test King Virtual Test--Network+
Test King Virtual Test--Network+ Test King Virtual Test--Network+
Test King Virtual Test--Network+ kappi98a
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptximacomobio
 
1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdfStevenLCvWalkera
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456manishazapclub111
 

Semelhante a DNS maps domain names to IP addresses (20)

Connecting Network
Connecting NetworkConnecting Network
Connecting Network
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
 
Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
 
Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networks
 
MCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docxMCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docx
 
Connecting network
Connecting networkConnecting network
Connecting network
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptx
 
Bcs 061
Bcs 061Bcs 061
Bcs 061
 
Ict networking exercise short questions answer
Ict networking exercise short questions answerIct networking exercise short questions answer
Ict networking exercise short questions answer
 
On tap ccent
On tap ccentOn tap ccent
On tap ccent
 
1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
Test King Virtual Test--Network+
Test King Virtual Test--Network+ Test King Virtual Test--Network+
Test King Virtual Test--Network+
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Internet mcq
Internet mcqInternet mcq
Internet mcq
 
Nt
NtNt
Nt
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptx
 
1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf
 
Internetworking
InternetworkingInternetworking
Internetworking
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456
 

Mais de Tanat Tonguthaisri

Mais de Tanat Tonguthaisri (10)

Siam RegTech for Fintech Challenge
Siam RegTech for Fintech ChallengeSiam RegTech for Fintech Challenge
Siam RegTech for Fintech Challenge
 
Siam RegTech
Siam RegTechSiam RegTech
Siam RegTech
 
Messaging 20170615
Messaging 20170615Messaging 20170615
Messaging 20170615
 
Learn SABAI for YC Startup School
Learn SABAI for YC Startup SchoolLearn SABAI for YC Startup School
Learn SABAI for YC Startup School
 
Narration 20170615
Narration 20170615Narration 20170615
Narration 20170615
 
Configuration management - certificate of achievement
Configuration management - certificate of achievementConfiguration management - certificate of achievement
Configuration management - certificate of achievement
 
Siam RegTech
Siam RegTechSiam RegTech
Siam RegTech
 
IBM Blockchain for developers
IBM Blockchain for developersIBM Blockchain for developers
IBM Blockchain for developers
 
Learn SABAI for Research Gap Fund
Learn SABAI for Research Gap FundLearn SABAI for Research Gap Fund
Learn SABAI for Research Gap Fund
 
RIAN SABAI
RIAN SABAIRIAN SABAI
RIAN SABAI
 

Último

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Último (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

DNS maps domain names to IP addresses

  • 1. Network by Tanat Tonguthaisri itpe@nstda.or.th
  • 2. 1. Which of the following is the role of DNS in a TCP/IP network? a) It allocates an unused IP address from the addresses registered in a server in response to an IP address allocation request from devices such as PCs. b) It allows server programs to be called by specifying only the program name, regardless of the server IP address. c) It translates an in-house private IP address to a global IP address to enable access to the Internet. d) It maps a domain name or a host name to an IP address.
  • 3. 2. Which of the following can be implemented by using the packet filtering of a firewall? a) Tampered packets received from the Internet are corrected. If a packet cannot be corrected, a log is generated and it is blocked from passing into the internal network. b) The header and data of the packet received from the Internet are checked for tampering. If any tampering is detected, the packet is discarded. c) A packet with a dynamically allocated TCP port number is permitted to pass through to the internal network by converting the packet to one with a fixed TCP port number on the receiver side. d) Only packets with a specific TCP port number are permitted to pass through to the internal network from the Internet.
  • 4. 3. Which of the following is an appropriate measure to avoid a shortage of total mailbox capacity at the mail server? a) Setting an upper limit for each user’s mailbox capacity b) Implementing mirrored disks on the mail server c) Having back-ups of mail data d) Sending large e-mails in bulk during hours when they do not adversely affect the transmission of other e-mails
  • 5. 4. Which of the following is an appropriate description concerning protocols and languages related to the Internet? a)FTP is a protocol for transferring e-mail messages with files attached to them. b)HTML is a language that allows the user to define tags for describing the logical structure of a document. c) HTTP is a protocol for transferring information such as HTML documents. d)SMTP is a protocol for sending and receiving image information.
  • 6. 5. Which of the following is an appropriate description of DNS? a) It is a system used for searching a wide variety of information on the Internet. b) It is a system used for mapping between host names and IP addresses of devices connected to the Internet. c) It is a personal authentication system used for providing a safe and secure online shopping environment. d) It is a system used for managing personal e- mail addresses for e-mail delivery.
  • 7. 6. Which of the following is the mechanism installed between the Internet and the internal network in order to prevent unauthorized access via the Internet? a) Gateway b) WAN c) Firewall d) Switching hub
  • 8. 7. Which of the following is an appropriate description concerning a router used in an IP network? a)It maps domain names to IP addresses. b)It selects the path for transmitting packets based on IP addresses. c) It converts analog signals to digital signals and vice versa. d)It executes processes and provides data upon requests from other computers.
  • 9. 8. Which of the following is an appropriate description concerning the selection of communication protocols used between a PC and a mail server when e-mails are sent and received between PCs? a)PCs use POP for sending e-mails and SMTP for receiving them. b)PCs use SMTP for sending e-mails and POP for receiving them. c) PCs use POP for both sending and receiving e-mails. d)PCs use SMTP for both sending and receiving e-mails.
  • 10. 9. Which of the following is an appropriate explanation of MIME used on the Internet? a)It is a description language for hypertext on the Web. b)It is a hypertext transmission protocol between client and server on the Internet. c) It is a method of address notation for uniquely identifying a resource on the Internet. d)It is a standard that enables e-mail to support multimedia information such as audio and images.
  • 11. 10. Which of the following is the network area that is provided by installing a firewall and is accessible from both the Internet and the intranet but not accessible to the intranet? a) DHCP b) DMZ c) DNS d) DoS
  • 12. 11. A Web server in Company A provides SSL communication using a digital certificate for the Web server generated by a certification authority. Which of the following is a procedure in which a PC accesses the Web server of Company A and after obtaining a digital certificate, uses the public key of the certification authority? a) Generating a common key used for encrypted communication and encrypting it by using the public key of the certification authority b) Using the public key of the certification authority to decrypt the common key used for encrypted communication c) Using the public key of the certification authority to verify the validity of the digital certificate d) Encrypting confidential data by using the public key of the certification authority
  • 13. 12. Which of the following is an appropriate combination of the protocols that are used for transmitting and receiving e-mail as shown in the diagram below? (3) Transfer e-mail Mail server Mail server (1) Send e-mail (2) Receive e-mail Mail client (1) (2) (3) a) POP3 POP3 SMTP b) POP3 SMTP POP3 c) SMTP POP3 SMTP d) SMTP SMTP SMTP
  • 14. 13. Which of the following is a mechanism that enables a Web server to store user information in a browser in order to identify which PC is accessing the Web server? a) CGI b) Cookie c) SSL d) URL
  • 15. 14. When ten e-mail messages are sent successively from Company A to Company B, they may arrive at Company B in a different order from the order they are sent. Which of the following is an appropriate opinion on this matter? a)There is a problem with the setup of Company A’s mail server. b)There is a problem with the setup of Company B’s firewall for e-mail. c) There is a high possibility that e-mail delivered late is falsified on the way. d)The arrival sequence is subject to change because of different transfer routes.
  • 16. 15. As shown in the figure below, a LAN system comprises two PCs, one server, and one printer. When PC A cannot print any output data on the printer, which of the following should be applied to blank P in the problem determination flowchart? Here, both PCs can send output data directly to the printer without using the server. [LAN System]
  • 17. 15.(cont.) [Flowchart] a) PC A is not connected to the LAN system. b) PC A has something wrong with output settings such as the print queue. c) The LAN system does not work because of a failure in the hub. d) The printer does not work because of a hardware failure.
  • 18. 16. Which of the following is an appropriate explanation of a router that allows messages to be sent between two or more networks? a) It performs connection at the data link layer, and provides the traffic isolation function. b) It converts protocols including protocols above the transport layer, and interconnects networks with different types of network architecture. c) It performs connection at the network layer, and is used for connecting LANs via wide-area networks. d) It performs connection at the physical layer, and is used for extending the connection distance.
  • 19. 17. In order to implement communication between applications via a network, a number of protocols are used in a hierarchical structure. Which of the following is the appropriate combination of the protocol names to be inserted into blanks A and B in the description below? When a Web page is viewed via the Internet, the browser and the Web server use a protocol called A . Communication over this A uses a protocol of a lower layer called B and a protocol of a further lower layer called IP (Internet Protocol). A B a) FTP (File Transfer Protocol) Ethernet b) HTTP (Hyper Text Transfer Protocol) TCP (Transmission Control Protocol) c) SMTP (Simple Mail Transfer Protocol) POP3 (Post Office Protocol version 3) d) WWW (World Wide Web) HTML (Hyper Text Markup Language)
  • 20. 18. Which of the following is an appropriate explanation concerning URL? a) It is a communications protocol between a Web page and a browser. b) It is a message about the update history of a Web page. c)It is grammar for describing the content (body) of a Web page. d) It is a notation for representing the location of a Web page.
  • 21. 19. When an e-mail message titled “Returned mail: Host unknown” is returned in response to an e-mail over the Internet, which of the following is a probable cause of this message? a) The recipient’s mail server remains stopped. b) In the recipient’s address, the domain name after the @ symbol is incorrect. c) The transmitted data is too large, so it exceeds the mail server’s storage capacity. d) The encoder used for the attached file is incompatible with the recipient’s decoder.
  • 22. 20. Which of the following is an appropriate description of VoIP? a) It is a method that enables PC users to access data or applications available on the Internet. b) It is a technology that converts voice data into packets and transmits them in real-time over an IP network. c) It is a technology that ensures the security of communication by using authentication, encryption, and decryption between network nodes. d) It is a system that defines and manages a correspondence between a host name and an IP address for a network- connected computer.
  • 23. 21. Which of the following prevents unauthorized external access by using packet filtering at the connection point between a company’s internal network and the Internet? a) DNS b) NAT c) Gateway d) Firewall
  • 24. 22. Which of the following is an appropriate explanation concerning the function of a router? a) It optically reads data such as picture and text and then converts it into digital data. b) It converts analog signals to digital signals and vice versa. c) It controls the communication path of data and relays data across networks. d) It archives and provides data of Web pages by using networks.
  • 25. 23. Which of the following is an appropriate description concerning a cookie used in the Web? a) It is a standard that can be used for formatting the layout of an HTML document in detail. b) It is the HTTP protocol to which an encryption function is added for private communications over the Internet. c) It is a mechanism where a Web server interacts with external programs to create Web pages dynamically. d) It is a mechanism where information from a Web server is temporarily saved in a browser that accesses the Web server.
  • 26. 24. Which of the following is a system configuration that introduces Internet technology into a company’s information and telecommunication system and is used for information sharing and business support? a) EDI b) VAN c) Intranet d) Extranet