Networkig Question
Networking Essentials Question Bank
- 1. 100BASE-FX runs over which of the following media types?
A. Category 5e cable
B. UTP (Unshielded Twisted Pair)
cable
C. MMF (Multimode Fiber) optic cable
D. RG-58 (Radio Grade) coaxial cable
Answer: C
- 2. Which one of the following topologies does FDDI (Fiber Distributed Data Interface) use?
A. Star
B. Bus
C. Mesh
D. Ring
Answer: D
- 3. Which one of the following is an IEEE (Institute of Electrical and Electronic Engineers) copper cable standard?
A. 100BASE-FX
B. 100BASE-CX
C. 10 GBASE-LR
D. 10BASE-FL
- 4. All of the following are fiber based connectors except:
A. ST (Straight Tip)
B. MT-RJ (Mechanical
Transfer-Registered Jack)
C. IEEE 1394 (Institute of
Electrical and Electronics Engineers)
D. SC (Standard Connector)
Answer: C
- 5. The maximum speed of 802.11g is:
A. 1 Mbps
B. 2 Mbps
C. 11 Mbps
D. 54 Mbps
Answer: D
- 6. What is the minimum cable type required for 100BASE-TX?
A. 50 ohm coaxial cable
B. Category 3 UTP (Unshielded
Twisted Pair)
C. Category 6 UTP (Unshielded
Twisted Pair)
D. Category 5 UTP (Unshielded
Twisted Pair)
Answer: D
- 7. An ABC Computers employee has asked to have remote access to the company network. The employee has access to the PSTN (Public Switched Telephone Network) which supports standard analog signaling. Which device will allow the employee to connect for remote access?
A. Gateway
B. Router
C. ISDN (Integrated Services Digital
Network)
D. Modem
Answer: D
- The 802.11 frequency band is:
A. 1.5 GHz
B. 2.4 GHz
C. 5.0 GHZ
D. 7.0 GHZ
Answer: B
- 9. All of the following are valid WEP (Wired Equivalent Privacy) key lengths EXCEPT:
A. 32 bit
B. 40 bit
C. 64 bit
D. 128 bit
Answer: A
10. Which one of the following is an
IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
A. 1000BASE-TX
B. 10 GBASE-LR
C. 1000BASE-CX
D. 10BASE-T
Answer: B
11. Bridging an 802.3 network to and
802.11 network can be accomplished using a:
A. CSU / DSU (Channel Service Unit /
Data Service Unit)
B. WAP (Wireless Access Point)
C. ISDN (Integrated Services Digital
Network) adapter
D. PVC (Permanent Virtual Circuit)
Answer: B
12. The maximum speed of 802.11b is:
A. 1 Mbps
B. 2 Mbps
C. 11 Mbps
D. 54 Mbps
Answer: C
13. Which one of the following will
affect the range of an 802.11b WAP (Wireless Access Point)?
A. 5 GHz interference
B. High number of wireless users
C. 900 MHz interference
D. A long length of antenna
extension cable
Answer: D
14. Which media access method is
used for an IEEE (Institute and Electronics Engineers) 802.3 network?
A. Polling
B. Token passing
C. CSMA / CD (Carrier Sense Multiple
Access / Collision Detection)
D. CSMA / CA (Carrier Sense Multiple
Access / Collision Avoidance)
Answer: C
15. Which type of connector does a
10BASE-F network use?
A. MT-RJ (Mechanical
Transfer-Registered Jack)
B. RJ-45 (Registered Jack)
C. Series-A
D. ST (Straight Tip)
Answer: D
16. Which of the following access
methods does Ethernet use?
A. Token passing
B. Full duplex
C. CSMA / CA (Carrier Sense Multiple
Access / Collision Avoidance)
D. CSMA / CD (Carrier Sense Multiple
Access / Collision Detection)
Answer: D
17. All of the following represents
fault-tolerant strategies except:
A. Link redundancy
B. UPS (Uninterrupted Power Suplly)
C. Fail over
D. X 25
Answer: D
18. What should be used to
automatically configure host computers for IP (Internet Protocol)?
A. DNS (Domain Name Service)
B. SNMP (Simple Network Management
Protocol)
C. SMTP (Simple Mail Transfer
Protocol)
D. DHCP (Dynamic Host Configuration
Protocol)
Answer: D
19. In a Windows Server 2003 AD
(Active Directory) network, which server stores information about resource
objects?
A. Domain master
B. Domain tree
C. Domain controller
D. Domain configuration
Answer: C
20. A home user has enforced HTTPS
(Hypertext Transfer Protocol Secure) access to a web server. After HTTPS is
enforced, the web server is no longer accessible from the Internet, but can
still be accessed by internal network users. What is causing this problem?
A. The users DNS (Domain Name
Server) server is down.
B. The users web server IP (Internet
Protocol) address has changed.
C. The users Internet router is
blocking port 389.
D. The users Internet router is
blocking port 443.
Answer: D
21. One of the purposes of a VLAN
(Virtual Local Area Network) is to:
A. enforce better security
B. add more users
C. limit the network bandwidth
D. reduce the number of subnets
Answer: A
22. Which type of server stores
information about network entities and resources and is used for
authentication?
A. NDS (NetWare Directory Services)
B. NWLINK
C. Kerberos
D. NLM (NetWare Loadable Module)
Answer: A
23. The ABC Computer Human Resources
department requires an internal web site designed to be accessible to an
external recruiting agency to update job postings. Which of the following terms
describe the web site function?
A. Intranet
B. Internet
C. Extranet
D. Homepage
Answer: C
24. Which one of the following files
must be edited to properly configure a UNIX remote access connection?
A. Devices and dialers
B. Users and servers
C. Hosts and security
D. Syslogs and crontab
Answer: A
25. Which protocol uses domain name
resolution to find addresses?
A. TCP / IP Transmission Control
Protocol / Internet Protocol)
B. IPX / SPX (Internetwork Packet
Exchange / Sequence Packet Exchange)
C. NetBEUI (Network Basic Input /
Output Extended User Interface)
D. AppleTalk
Answer: A
26. You work as a network
administrator at ABC Computer. You need to reduce the bandwidth used between
the ABC Computer and the Internet. Which one of the following could be
implemented to accomplish this?
A. WINS (Windows Internet Name
Service) server
B. Proxy server
C. DHCP (Dynamic Host Configuration
Protocol) server
D. HTTP (Hypertext Transfer
Protocol) server
Answer: B
27. AV (Anti-Virus) software will
help protect a computer from:
A. Trojans
B. Hackers
C. Unsigned drivers
D. ActiveX exploits
Answer: A
28. A technician is assisting their
senior technician with terminating a line that was extending the demarcation
point for a new DSL (Digital Subscriber Line) circuit. Which tool would be
needed?
A. Multimeter
B. Optical tester
C. Punch down tool
D. BERT Bit-Error Rate Test)
Answer: C
29. A packet filtering firewall
operates at which layers if the OSI (Open Systems Interconnect) model?
A. Network and Data Link
B. Network and Transport
C. Transport and Session
D. Physical and Data Link
Answer: B
30. In order for a client to share
resources in a wired network, the client must be physically connected and:
A. Mapped to the resources using the
host name, followed by the resource name.
B. Allowed permission to the
resources.
C. Be a member of AD (Active
Directory)
D. Be listed in DNS (Domain Name
Service)
Answer: B
31. Which of the following options
are the minimal settings for connecting a computer to a TCP / IP (Transmission
Control Protocol / Internet Protocol) LAN (Local Area Network) while accessing
the Internet?
A. IP (Internet Protocol) address,
subnet mask, gateway, and DNS (Domain Name Service)
B. IP (Internet Protocol) address
and gateway
C. Subnet mask, IP (Internet Protocol)
address, and DNS (Domain Name Service)
D. IP (Internet Protocol) address,
DNS (Domain Name Service, and gateway
Answer: A
32. You work as a network
administrator at ABC Computer. The IT department is experimenting with a new
DHCP server. Which of the following actions would ensure that the DHCP server
does not impact clients from other departments?
A. Create a new subnet for the IT
department.
B. Add a hub for the IT department.
C. Enable IPX / SPX on the DHCP
server.
D. Ensure NetBEUI is not installed
on the DHCP server.
Answer: A
33. You work as a network
administrator at ABC Computer. You administer the ABC Computer Windows 2000
network, and recently added a DNS server to the network and deployed AD. Users
have been instructed to update their TCP/IP configuration to ensure they will
use the correct DNS server. What command should the users input?
A. nbstat –RR
B. nslookup
C. ipconfig/renew
D. winipcfg
Answer: C
34. You work as a network
administrator at ABC Computer. You change the lease time of the DHCP scope from
one week to one day. What affect will this have on the end users?
A. The users will have to re-logon
every day now.
B. The users will have to manually
release and renew their IP addresses to continue working on the network.
C. The users will not be affected by
the change.
D. The users will have to shut their
computers down for the duration of the lease to obtain a new lease.
Answer: C
35. The DNS server has suffered a
catastrophic failure. What will happen to the DNS clients?
A. They will be unable to renew
their IP addresses.
B. They will be unable to reference
a server by host name.
C. They will be unable to reference
a server by NetBIOS name.
D. They will be unable to renew
their IPX address.
Answer: B
36. A workstation presents an error message
to a user. The message states that duplicate IP has been detected on the
network. Using the standard troubleshooting model, what should be completed
first?
A. Test the result.
B. Document the solution and
process.
C. Implement an action plan.
D. Identify the symptoms and
potential causes.
Answer: D
37. A Windows user wants to access a
share hosted on a Mac OS X server, but the server is not visible on then
network. What must the network administrator enable on the Mac OS X server to
allow Windows users to connect to shares?
A. AFP
B. VPN
C. Windows file and print sharing
D. DHCP
Answer: C
38. An office has recently installed
a number of ceiling fans. Users complain of slow activity on the LAN and WAN.
Nothing on the Category 5 UTP network has changed to cause this. What is
responsible for the slow activity?
A. AMI (Alternate Mark Inversion)
B. EMI (Electromagnetic
Interference)
C. MIB (Management Information Base)
D. FDM (Frequency Division
Multiplexing)
Answer: B
39. A Windows 2000 work station has
a TCP/IP address of 169.254.21.1. Which statement describes the sate of the
computers TCP/IP configuration?
A. The network administrator
assigned an address of 169.254.12.1 for the network.
B. The computer is set for DHCP, but
no DHCP server is available for the network.
C. The computer received the address
from a DHCP server on the network.
D. The computer received the address
from a BootP server on the network.
Answer: B
40. An administrator has been called
to consult on a network. After receiving network traffic statistics, the
administrator notices that there is an abnormally high amount of DHCP traffic.
What recommendation would the administrator give to the customer to reduce the
traffic?
A. Configure the DHCP server to
increase lease expiration time.
B. Configure the DHCP server to
decrease lease expiration time.
C. Configure the DHCP client to
increase lease expiration time
D. Configure the DHCP client to
decrease lease expiration time.
Answer: A
41. A workstation can no longer
connect to the network. Which LED should a user check FIRST on a NIC to
identify the problem?
A. Link
B. Activity
C. Collision
D. Power
Answer: A
42. A user wants to log onto their
server using the SSH terminal from home, but cannot because the connection
times out. Which standard port would have to be redirected from the router to
the IP address?
A. 23
B. 22
C. 21
D. 20
Answer: B
43. A user is complaining that it
takes too long to access an application on a remote server. Which utility will
identify the number of hops from the clients to the server where the
application resides?
A. nbstat
B. nslookup/dig
C. netstat
D. tracert/traceroute
Answer: D
44. If one of the links to a
computer on a physical star topology is served, what will be the result?
A. The entire network will stop working.
B. The affected link and the
adjacent network links will stop working.
C. Only the affected link will stop
working.
D. Only the adjacent links will stop
working.
Answer: C
45. A user cannot reach a specific
web site, but can access other web sites. What command would help diagnose the
problem?
A. arp
B. ipconfig
C. netstat
D. tracert
Answer: D
46. There is a suspected SMTP virus
on the workstation. E-mail programs are not currently running. Which of the
following utilities should be run to see if there are any open SMTP sockets?
A. nbstat
B. netstat
C. arp
D. nslookup
Answer: B
47. Identify the utility being used
given the output:
Interface: 206.212.36.18 on
Interface 1
Internet Address Physical Address
206.212.36.9 00-00-21-64-91-12
Dynamic
206.212.36.12 00-00-21-1b-4a-a7
Dynamic
A. netstat
B. arp
C. nbstat
D. tracert/traceroute
Answer: B
48. You work as a network
administrator at ABC Computer. Ten workstation numbered 1 through 10 are
installed sequentially on a physical bus network. A request was made to
separate workstations 1 through 5 and workstation 6 through 10 into two
separate networks. An engineer cut the cable between workstations 5 and 6. What
else, if anything, must the engineer do to complete the job?
A. Do nothing, the job has been successfully
completed.
B. Install a terminator on the
severed end of the bus trunk cable connecting workstations 1 through 5.
C. Install a terminator on the
severed end of the bus trunk cable connecting workstations 6 through 10.
D. Install terminators on both
severed end of the bus trunk cable.
Answer: D
49. Which of the following is a true
statement regarding TCP and UDP?
A. TCP is connection-oriented UDP is
reliable.
B. TCP is connectionless, UDP is
unreliable.
C. TCP is connection-oriented, UDP
is unreliable.
D. TCP is connectionless, UDP is
reliable.
Answer: C
50. A user is unable to reach a web
site on a host computer. The user can ping the host name and Telnet to the host
name. What is the source of the problem?
A. The host does not have a DNS
entry.
B. The host HTTP is down.
C. The host does not have a WINS
entry.
D. The host is down.
Answer: B
51. Given the following output,
which utility was used?
Interface 10.10.10.1 on Interface
0×1000004
Internet Address Physical Address
Type
10.10.10.5 00-e0-29-62-0d-de dynamic
10.10.10.11 00-00-08-fd-97-fa static
A. arp
B. traceroute
C. ping
D. ipconfig
Answer: A
52. A properly configured computer
on the network receives the response ping request could not find host when
pinging a web site. The computer can ping its gateway. Which of the following
explains this situation?
A. The DNS server is down.
B. The DHCP is down.
C. The LAN is down.
D. The router is down.
Answer: A
53. Six workstations that are
numbered 1-6 are installed sequentially in a physical ring topology.
Workstation 1 fails. How can the network administrator remove Workstation 1 for
service without moving the other workstations?
A. Connect Workstation 6 and
Workstation 2 using a barrel connector.
B. Add a 75 ohm terminator to
Workstation 6 and Workstation 2.
C. Connect Workstation 6 and 2 using
an RJ-45 (Registered Jack) coupler.
D. Add a 50 ohm terminator to
Workstation 6 and Workstation 2.
Answer: A
54. You work as a network
administrator at ABC Computer. You have noticed suspicious IP traffic on the
local subnet. After successfully pinging the source, which utility does the
administrator use to find the associated MAC address?
A. ipconfig
B. nbstat
C. arp
D. tracert
Answer: C
55. You work as a network
administrator at ABC Computer. You are troubleshooting a wireless LAN that is
experiencing trouble with interference. A scan of the wireless network reports
that there are two WAPs from different companies within range of the LAN. The
two WAPs have different SSIDs than the LAN WAP, but the same channel. Also, the
WEP appears to be the same on all WAPs. What should the network administrator
do to cut down on the interference of the wireless clients on the LAN?
A. Change the LAN WAP to the same
SSID as the other two WAPs.
B. Change the WEP settings on the two
WAPs to be different that that of the LAN WAP settings.
C. Change the LAN WAP channel to a
different channel than the other two WAPs.
D. Change the LAN WAP settings to be
different than that of the other two WAPs.
Answer: C
56. The network administrator is
configuring a computer to run SLIP as a dial-up protocol. Which protocol should
be installed?
A. TCP/IP
B. IPX/SPX
C. NetBEUI
D. Appleshare IP
Answer: A
57. A home user purchases a cable
modem and a straight-through Category 5e patch cable at a local electronics
store. The modem will be connected to a hub which is connected to their
computer. The computer is not able to receive a DHCP address from the cable
modem network DHCP server. Why?
A. Because the cable modem must be
directly connected to a computer.
B. Because the cable modem requires
a crossover cable to connect to the hub.
C. Because the cable modem requires
a RG-6 coaxial cable to connect to a hub.
D. Because the cable modem must use
a Category 3 UTP cable to connect to a hub.
Answer: B
58. A user is booting a workstation
and suddenly receives a message stating that a duplicate IP address is in use
on the network. Which of the following commands can be used to troubleshoot the
problem?
A. ping
B. traceroute
C. find
D. arp
Answer: D
59. Which protocol encrypts data
between web browser and web servers?
A. IPSec
B. SSL
C. PPTP
D. L2TP
Answer: B
60. A client accessing a network
share folder has authenticated into the system and has full access rights to a
folder share. But after opening the file they find that cannot modify the file
contents. What is the likely cause?
A. The group rights filter has been
changed through the GPO to disallow file access.
B. The file registered has been
pulled from cache memory and is not writeable.
C. The file has been opened by
another user and is open for read only.
D. The file has been pulled from the
backup source not the tree directory.
Answer: C
61. You work as a network
administrator at ABC Computer. There are three identical desktop computers on
the network. One of the computers cannot connect to the other machines. The
network technician checks the network interface card in the non-working
machine, and neither the link light not the activity lights us illuminated. The
technician switches the network cable with a cable that is known to be
operational, but the lights do not illuminate on the NIC or the corresponding
port on the switch. What is the next troubleshooting step?
A. Switch to a crossover cable.
B. Reinstall the NIC.
C. Change ports on the switch.
D. Enter the correct TCP/IP
settings.
Answer: C
62. Which 3 bytes of MAC address
F2-A1-23-BC-D3-41 designates the unique station identifier?
A. F2-A1-23
B. A1-23-BC
C. 23-BC-D3
D. BC-D3-41
Answer: D
63. Which one of the following
authentication protocols requires the use of an NTP server to synchronize the
workstations date and time with the server?
A. Kerberos
B. RADIUS
C. PAP
D. MS-CHAP
Answer: B
64. A user enters http://www.abc
computers.com into an Internet web browser. What is the default port number for
the URL?
A. 21
B. 23
C. 80
D. 110
Answer: C
65. Which TCP/IP well-known port
number identifies SMTP?
A. 21
B. 23
C. 25
D. 110
Answer: C
66. PAP secures PPP sessions by:
A. Adding a secret key to the
password.
B. Adding a secret key to the
username password.
C. Double encrypting the username
and password.
D. Passing a username and password
in plaintext.
Answer: D
67. All of the following are valid
IP addresses except:
A. 192.168.0.1
B. 172.192.4.256
C. 156.144.226.123
D. 10.24.12.0
Answer: B
68. Which OSI layer converts digital
data into electronic signals to be put on a wire?
A. Physical
B. Transport
C. Data Link
D. Presentation
Answer: A
69. At which layer of the OSI model
does a router function?
A. Physical
B. Data Link
C. Network
D. Application
Answer: C
70. Which protocol is used for error
reporting in concert with IP?
A. SMTP
B. ICMP
C. IGMP
D. SNMP
Answer: B
71. Which one of the following
techniques will segment a network?
A. Subnetting
B. Implementing DHCP
C. Using DNS
D. Installing hubs
Answer: A
72. Which network topology uses the
most cable?
A. Star
B. Ring
C. Bus
D. Mesh
Answer: D
73. Connecting a LAN (Local Area
Network) to mainframe can be accomplished using a:
A. bridge
B. gateway
C. transceiver
D. firewall
Answer: B
74. Which one of the following IEEE
(Institute of Electrical and Electronics Engineers) standards uses a 1300 nm
(nanometer) beam?
A. 1000BASE-LX and 10 GBASE-LR
B. 1000BASE-CX and 1000BASE-T
C. 1000BASE-SX and 10 GBASE-SR
D. 10 GBASE-ER and 10 GBASE-SR
Answer: A
75. Which networking topology has
the most physical connections per node?
A. Bus
B. Ring
C. Star
D. Mesh
Answer: D
76. How can the range of an 802.11b
wireless access point be increased?
A. Lower the output power
B. Install an external antenna
C. Remove any external antennas and
use the internal one
D. Change the transmitting frequency
to the 5 GHz (Gigahertz) range
Answer: B
77. Which networking device works at
the upper three layers of the OSI (Open Systems Interconnect) and connects
networks with different architectures?
A. Router
B. Firewall
C. Modem
D. Gateway
Answer: D
78. Which one of the following
antenna types is omni directional?
A. Vertical
B. Dipole
C. Yagi
D. Parabolic
Answer: A
79. Which of the following
environments is best suited to provide more radio coverage using an
omnidirectional antenna?
A. Closed office areas with walls
B. Open office areas with cubicles
C. Hallways
D. Outdoors
Answer: D
80. Which of the following
connectors are SFF (Small Form Factor) fiber connectors?
A. MT-RJ (Mechanical Transfer-Registered
Jack) and LC (Local Connector)
B. ST (Straight Tip) and SC
(Standard Connector)
C. RJ-45 (Registered Jack) and RJ-11
(Registered Jack)
D. Series-A and Series-B
Answer: A
81. If a destination address is not
in a bridge forwarding table, what will the bridge do?
A. Forwarding the packets to a
designated port and the one that originated the request
B. Forward the packets to all ports
except the one that originated the request
C. Forward the packets to the
default gateway
D. Forward the packet to all ports
Answer: B
82. A client noticed that traffic
increased steadily over the last few months and performance is beginning to
suffer on its TCP/IP (Transmission Control Protocol/Internet Protocol). Which
network can be installed to reduce the impact of network traffic without
dividing the LAN (Local Area Network) into separate subnets?
A. Bridge
B. Repeater
C. Router
D. Gateway
Answer: C
83. Token ring operates at which
speeds?
A. 1 Mbps, 10 Mbps (Megabit per
second)
B. 1 Mbps, 4 Mbps (Megabit per
second)
C. 4 Mbps, 16 Mbps (Megabit per
second)
D. 10 Mbps, 100 Mbps (Megabit per
second)
Answer: C
84. Which media type is the most
prone to electromagnetic interference?
A. Category 5e UTP (Unshielded
Twisted Pair)
B. RG-58 (Radio Grade) coaxial cable
C. SMF (Single Mode Fiber) optic
cable
D. MMF (Multimode Fiber) optic cable
Answer: A
85. The 802.11b frequency band is:
A. 1.5 GHz (Gigahertz)
B. 2.4 GHz (Gigahertz)
C. 5.0 GHz (Gigahertz)
D. 7.0 GHz (Gigahertz)
Answer: B
86. Which type of connector would a
cable have if it were supplied with a splitter and a cable modem for Internet
access?
A. F-Type
B. RJ-45 (Registered Jack)
C. RJ-11 (Registered Jack)
D. IEEE 1394 (Institute of
Electrical and Electronics Engineers)
Answer: A
87. Which one of the following IEEE
(Institute of Electrical and Electronics Engineers) standards represents
Ethernet?
A. 802.0
B. 802.3
C. 802.5
D. 802.11
Answer: B
88. What is the maximum length of a
gigabit Ethernet segment using MMF (Multimode Fiber) optic cable?
A. 100 meters (328.08 feet)
B. 250 meters (820.21.feet)
C. 550 meters (1,804.46 feet)
D. 3000 meters (9,842.52 feet)
Answer: C
89. All of the following are
terminated on a punch down block except:
A. STP (Shielded Twisted Pair) cable
B. MMF (Multimode Fiber) cable
C. UTP (Unshielded Twisted Pair)
cable
D. Category 3 cable
Answer: B
90. What is the desired result when
implementing fault tolerance?
A. It maintains standards within the
IEEE (Institute of Electrical and Electronics Engineers)
B. It completely eliminates all faults
C. It ensures production is not
impacted in the event of a failure
D. It improves throughput
Answer: C
91. What RAID (Redundant Array of
Independent Disks) level uses a disk mirroring technique to provide fault
tolerance?
A. RAID 0 (Redundant Array of
Independent Disks)
B. RAID 1 (Redundant Array of
Independent Disks)
C. RAID 3 (Redundant Array of
Independent Disks)
D. RAID 5 (Redundant Array of
Independent Disks)
Answer: B
92. In order to resolve the name
www.abccomputer.com, which type of server is required?
A. DHCP (Dynamic Host Configuration
Protocol)
B. DNS (Domain Name Service)
C. WINS (Windows Internet Name
Service)
D. NAT (Network Address Translation)
Answer: B
93. Which of the following can be
used to cache web pages for future retrieval?
A. Switch
B. Web server
C. Repeater
D. Proxy service
Answer: D
94. A workstation is configured for
dial-in connectivity to a remote access server. Which information does the
client need to authenticate?
A. Username and password
B. IP (Internet Protocol) address
and password
C. IPX (Internet Packet Exchange)
address and username
D. Domain name and password
Answer: A
95. Which cable would users utilize
to connect a client workstation directly to another client workstation when
using 100BASE-TX?
A. Category 5 crossover cable
B. Coaxial cable
C. Category 3 straight cable
D. Category 5 straight cable
Answer: A
96. Upon which devices can NAT
(Network Address Translation) be used?
A. Hub
B. Bridge
C. Switch
D. Firewall
Answer: D
97. An administrator is configuring
a company Microsoft Exchange server for e-mail services. The Exchange server
needs to send e-mail to a partner company that uses a Novell GroupWise e-mail
server. What protocol is needed to send e-mail between the two servers?
A. CSNW (Client Service for NetWare)
B. SMTP (Simple Mail Transfer
Protocol)
C. IPX/SPX (Internet Packet
Exchange/Sequence Packet Exchange)
D. POP3 (Post Office Protocol
version 3)
Answer: B
98. The AV (Anti-Virus) software
provides optimum protection when it is installed on all:
A. workstations connected to the
Internet
B. servers
C. workstations and servers
D. workstations with disk drives
Answer: C
99. While configuring a dial-up
network on a computer running Windows, which one of the following protocols
establishes the connection?
A. HTTP (Hypertext Transfer
Protocol)
B. Telnet
C. PPP (Pont-to-Point Protocol)
D. SSH (Secure Shell)
Answer: C
- 100. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
A. Router
B. No additional device needed
C. Another switch
D. A hub
Answer: A
- 101. Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails?
A. A striped set array without
parity
B. A RAID 10 (Redundant Array of
Independent Disks) array
C. A striped set array with parity
D. A duplexed RAID 01 (Redundant
Array of Independent Disks)
Answer: B
- 102. Which of the following tools assess the continuity of a cable?
A. Data analyzer
B. BERT (Bit-Error Rate Test)
C. TDR (Time Domain Reflectometer)
D. Protocol analyzer
Answer: C
- 103. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
A. 10
B. 20
C. 30
D. 50
Answer: A
- 104. A network administrator needs to setup a salesperson laptop to connect to the company network via a secure connection through the Internet. What should be done to the laptop to enable the connection?
A. Install AV (Anti-Virus) software
with the latest definitions
B. Install firewall software’
C. Create a PPTP (Pont-to-Pont
Tunneling Protocol) connection
D. Install a NetBEUI (Network Basic
Input/Output Extended User Interface) protocol
Answer: C
- 105. The system administrator needs to connect a server to a 1000BASE-T switch. Which cable is required?
A. Category 3 cable
B. Category 5 cable
C. MMF (Multimode Fiber) optic cable
D. SMF (Single Mode Fiber) optic
cable
Answer: B
- 106. What happens if the wrong WEP (Wired Equivalent Privacy) key is entered into a wireless device?
A. The network is accessible, but
the data will be garbled.
B. Data can be sent but not
received.
C. The network is not accessible.
D. The network is only accessible
using the SSID (Service Set Identifier).
Answer: C
- 107. A company wishes to outsource the installation of an internal web server with access to employees only. Which term best describes this web server?
A. Extranet server
B. VPN (Virtual Private Network)
server
C. RADIUS (Remote Authentic Dial-In
Service) server
D. Intranet server
Answer: D
- 108. Which command in Windows 98 would display adapter names, IP (Internet Protocol) address, subnet mask, gateway, and DNS (Domain Name Service)?
A. winipcfg/all
B. nbtstat –a
C. nslookup –a
D. ifconfig/all
Answer: A
- 109. What command is used to view the entire TCP/IP (Transmission Control Protocol/Internet Protocol) configuration on a Windows 98 client?
A. ifconfig/all
B. winipcfg/all
C. ipconfig/TCP (Transmission
Control Protocol) release
D. winipcfg/release
Answer: B
- 110. A workstation presents an error message to a user. The message states that duplicate IP (Internet Protocol) has been detected on the network. After developing a hypothesis, what should the NEXT step be according to the standard troubleshooting model?
A. Test and observe an action plan
B. Gather facts surrounding the
error
C. Implement an action plan
D. Document solution and process
Answer: C
- 111. Which command generated the following output?
Active Connections
Proto Local Address Foreign Address
State
TCP CompA: 3006 192.168.0.2:
Microsoft Established
TCP CompA: 3021 192.168.0.246: HTTP
Established
A. nbtstat
B. netstat
C. arp
D. ipconfig
Answer: B
- 112. When one connection to a host fails in a full mesh network, which of the following is true?
A. All hosts can communicate
B. No hosts can communicate
C. Half of the host will lose
communication
D. Only the two hosts between the
failed connection will lose communication
Answer: A
- 113. A user complains that they can not longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
A. The DHCP (Dynamic Host
Configuration Protocol) server has lost connection to the DNS (Domain Name
Service)
B. Someone has enabled an additional
DHCP (Dynamic Host Configuration Protocol) server
C. The WINS (Windows Internet Name
Service) is offline
D. The DNS (Domain Name Service) is
offline
Answer: B
- 114. An administrator has just added a new DNS (Domain Name Service) server to a network and removed the old DNS (Domain Name Service) server. The IP (Internet Protocol) address of the new server is different, and the DHCP (Dynamic Host Configuration Protocol) server was updated to reflect this change. Certain computers can connect to www.abc computers.com while others cannot. Which of the following computers will be able to connect to www.abc computers.com?
A. Any computer that has not
released and renewed their DHCP (Dynamic Host Configuration Protocol) lease.
B. Any statically assigned
workstation.
C. Any computer that has released
and renewed their DHCP (Dynamic Host Configuration Protocol) lease.
D. Any computer that does not have a
NIC (Network Interface Card)
Answer: C
- 115. Which utility should a technician use to troubleshoot NetBIOS (Network Basic Input/Output System) over TCP/IP (Transmission Control Protocol/Internet Protocol) from Workstation A to Workstation B on a Windows network?
A. ping
B. tracert
C. nbtstat
D. netstat
Answer: C
- 116. Which of the following commands will result in the display of the MAC (Media Access Control) address of a given computer?
A. nslookup
B. ipconfig/all
C. nbtstat
D. nbtstat
Answer: B
- 117. You work as an administrator at ABC Computer. You receive a call from an end user saying they are unable to log in to the network, although they could yesterday. Overnight, the administrator replaced an ISA (Industry Standard Architecture) Token Ring card with a Token Ring PCI (Peripheral Component Interconnect) NIC (Network Interface Card) in the users computer on a 16 Mbps (Megabits per second) LAN (Local Area Network). What is the NEXT step?
A. Verify the MAU (Multistation
Access Unit) is good
B. Verify the processor speed
C. Verify the user password is correct
D. Verify the speed of the NIC
(Network Interface Card) matches the network
Answer: D
- 118. The Following output is from what diagnostic tool?
1 Router1 (192.168.0.1) 2.0 ms 1.0
ms 2.0 ms
2 Server.net.com (4.150.6.3)
18.0ms12.0ms32.0ms
3 time.net.com (2.12.14.1) 240ms
120ms 300ms
A. traceroute
B. ping
C. ifconfig
D. winipcfg
Answer: A
- 119. A business with a DSL (Digital Subscriber Line) modem lost connectivity and the secretary changed one of the network settings to try to fix it. The settings are now:
IP address: 128.210.5.21
Subnet mask: 255.0.0.0
Gateway: 128.210.5.1
DNS server: 128.210.5.11
Given the information above, which
of the following identifies the settings that has changed?
A. IP (Internet Protocol) address
B. Subnet mask
C. Gateway
D. DNS (Domain Name Service) server
Answer: B
- 120. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to 192.168.0.254 using a class subnet of 255.255.255.0. DHCP (Dynamic Host Configuration Protocol) errors are occurring. How can the errors be resolved?
A. Change the default subnet to
255.255.0.0 to increase the number of allowable IP (Internet Protocol)
addresses to prevent collisions.
B. The machines are holding IP
(Internet Protocol) addresses in cache mamory. Reboot to renew IP (Internet
Protocol) address.
C. Configure BootP (Boot Protocol)
on the server when the IP (Internet Protocol) class subnets are split prior to
implementing the scope.
D. Split the scope addresses between
the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary
Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup
Domain controller).
Answer: D
- 121. ABC Computers has two 100BASE-TX hubs, Hub A and Hub B. The hubs are connected by a 3 meter (9.84.feet) straight-through patch cable. The hosts on Hub A are unable to communicate with the hosts on Hub B. What can the network administrator do to correct the problem?
A. Install switches instead of hubs
B. Update all clients with Hub A as
their default gateway
C. Replace the patch cable that
connects Hub A to Hub B with a crossover patch cable
D. Update clients on Hub A as their
default gateway and update clients on Hub B as their default gateway
Answer: C
- 122. A webpage is hosted on a Linux machine. Users complain that when visiting the web site, they receive a forbidden error message. The system administrator logs onto the Linux server and changes to the directory where the webpage is stored. What should the system administrator do next?
A. Rename the webpage file
B. Change the symbolic link
C. Change the web port to 8080 on
the client
D. Change the permissions of the
directory
Answer: D
- 123. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
A. They do not have permission to
capture other packets.
B. They are connected to a switch
when trying to capture packets.
C. The router is blocking the
packets to the workstation.
D. They are using an evaluation copy
of the software utility
Answer: B
- 124. A network administrator supports a LAN (Local Area Network) with ten users wired to a switch. The switch is connected to a router for Internet access. One day, a single user reports being unable to access the Internet. All other users can access the Internet. Which of the following items should the network administrator check to solve the problem?
A. Network card of troubled machine,
port on switch that uplinks to router, and patch cable from the troubled
machine to switch.
B. Patch cable from troubled machine
to switch, port on switch the troubled machine is plugged into, and external
interface to router.
C. Network cable of troubled
machine, port on switch that troubled machine is plugged into, and patch cable
from troubled machine to switch.
D. Port on switch the troubled
machine is plugged into, network card of troubled machine, and uplink port on
the switch.
Answer: C
- 125. The DHCP (Dynamic Host Configuration Protocol) server in Subnet A is removed. The DHCP (Dynamic Host Configuration Protocol) server in Subnet B is set with a DHCP (Dynamic Host Configuration Protocol) addresses. What needs to be done to correct this problem?
A. Install a proxy server on Subnet
A
B. Install a DHCP (Dynamic Host
Configuration Protocol) relay agent on a server in Subnet B
C. Install a DHCP (Dynamic Host
Configuration Protocol) relay agent on the DHCP (Dynamic Host Configuration
Protocol) server in Subnet B
D. Install a DHCP (Dynamic Host
Configuration Protocol) relay agent on a server in Subnet A
Answer: D
- 126. After patching and rebooting a network DHCP (Dynamic Host Configuration Protocol) server, some clients who were able to access resources begin to lose connectivity. What utility can be used to regain connectivity to the network?
A. nbtstat
B. arp
C. tracert/traceroute
D. ipconfig/ifconfig
Answer: D
- 127. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addressed assigned, what problems might exist on the network?
A. There will be no Internet access
B. The computer IP (Internet
Protocol) address will change.
C. There should be no problems.
D. There will be a routing loop
between the residential gateway and the original router.
Answer: A
- 128. Ten workstations numbered 1 through 10 are installed sequentially on a physical bus network. The complete network has failed. Which of the following could have caused the failure?
A. Workstation 3 is powered off.
B. Workstation 4 and 7 use the DLC
(Data Link Protocol).
C. A terminator has been removed
from the end of the bus trunk cable.
D. A terminator has been installed
on the end of the bus trunk cable.
Answer: C
- 129. A client has normally been able to access files shared on a remote server. After a firewall was installed on the server, the client can no longer access the files. What should be done to fix the problem?
A. Change the IP (Internet Protocol)
address on the client computer
B. Reboot the client computer and
try connecting again
C. Ask the system administrator to
reboot the server
D. Ask the system administrator to
unblock the necessary ports
Answer: D
- 130. A user complains that they can no longer attach to a server using its host name; however, they can attach to it using the IP (internet Protocol) address. What is the problem?
A. The server is in the wrong
subnet.
B. The server that they are trying
to connect to is not registered in DHCP (Dynamic Host Configuration Protocol).
C. The server that they are trying
to connect to has lost its registration in DNS (Domain Name Service).
D. The server that they are trying
to connect to has WINS (Windows Internet Name Service) enabled.
Answer: C
- 131. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall, FTP (File Transfer Protocol) still does not work. What is the source of the problem?
A. TFTP (Trivial File Transfer
Protocol) is not installed.
B. NFS (Network File System) is not
installed.
C. Port 20 must also be unblocked.
D. Port 22 must also be unblocked.
Answer: C
- 132. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correctly and the network is up, which of the following will the technician see on the NIC (Network Interface Card)?
A. The amber light is flashing
occasionally and the green light is lit steadily.
B. The amber light is flashing
continually, the green light is lit steadily, and neither light will be on
until data is transferred.
C. The amber light is lit and steady
and the green light is flashing continually.
D. The amber light is flashing
occasionally, the green light is lit steadily, and neither light will be on
until data is transferred.
Answer: A
- 133. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for Internet access. The network administrator has noticed that particular subnet users have complained of downtime. Upon further troubleshooting, the administrator notices that the each day the downtime lasts approximately an hour around midday. The administrator also realizes that this period of downtime is affecting wireless users only. The administrator travels to the troubled subnet around midday and connects using a wired workstation, but a wireless laptop will not connect. The administrator also notices that the WAP (Wireless Access Point) is 802.11g. Which one of the following would be an appropriate action to address this problem?
A. Upgrade all affected computers to
a uniform platform running in ad-hoc mode
B. Eliminate any sources of RFI
(Radio Frequency Interface) around the WAP (Wireless Access
Point)
C. During the affected time, connect
the WAP (Wireless Access Point) directly into the router
D. Change the WAP (Wireless Access
Point) and all affected computers to operate in ad-hoc mode
Answer: B
- 134. You work as an administrator at ABC Computer. You implement packet filtering on the router between the finance department and the marketing department. The following night, a batch script runs that sends a file from the marketing server to the finance FTP (File Transfer Protocol) server, but it does not work. What should be done?
A. You should make sure port 21 is
open on the router.
B. You should change the batch
script to run during the day.
C. You should make sure ICMP
(Internet Control Message Protocol) is enabled on the router.
D. You should set the batch script
to run with elevated privileges.
Answer: A
- 135. Which of the following are classified as Layer 2 devices?
A. Hubs, switches and routers
B. Hubs, switches and bridges
C. Switches, bridges, and NICs
(network Interface Card)
D. Switches, bridges and routers
Answer: C
- 136. Which of the following options describes a valid reason for subnetting a network?
A. To separate the network into
smaller broadcast domains
B. To minimize TCP/IP (Transmission
Control Protocol/Internet Protocol) conflicts
C. To convert from a DHCP (Dynamic
Host Configuration Protocol) to static addresses
D. To allow reception of multicast
telecom traffic
Answer: A
- 137. All of the following are true statements about private IP (Internet Protocol) addressing except:
A. private IP (Internet Protocol)
addresses may be duplicated across many networks without causing address
conflicts.
B. private IP (Internet Protocol) addresses
must be obtained dynamically from the ISP (Internet Service Provider).
C. private IP (Internet Protocol)
addresses allow organizations to share a single public IP (Internet Protocol)
address.
D. large networks may be broken into
several private IP (Internet Protocol) networks.
Answer: B
- 138. All of the following options transmit data over a modem except:
A. POTS/PSTN (Plain Old Telephone
System/Public Switched Telephone Network).
B. xDSL (Digital Subscriber Line).
C. cable.
D. T1 (T-Carrier Level 1).
Answer: D
- 139. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
A. Verification
B. Encryption
C. Addressing
D. Tunneling
Answer: A
- 140. Which proved NetBIOS (Network Basic Input/Output System) name to IP (Internet Protocol) address resolution?
A. ipconfig
B. LMHOSTS
C. DNS (Domain Name Services)
D. DHCP (Dynamic Host Configuration
Protocol)
Answer: B
- 141. Which address is within an IANA (Internet Assigned Numbers Authority) private range?
A. 19.109.220.103
B. 188.209.75.46
C. 192.168.54.10
D. 216.127.51.121
Answer: C
- 142. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
A. 802.5
B. 802.1x
C. 802.3
D. 802.4
Answer: B
- 143. Which one of the following is a class A IP (Internet Protocol) address?
A. 172.168.12.4
B. 18.12.4.1
C. 169.254.254.254
D. 255.255.255.0
Answer: B
- 144. Which layer of the OSI (Open Systems Interconnect) models handles formatting and code conversations?
A. Transport
B. Data Link
C. Application
D. Presentation
Answer: D
- 145. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
A. 20
B. 21
C. 23
D. 25
Answer: D
- Which type of connector does a 10BaseT Ethernet cable use?
- BNC
- RJ-45
- RJ-11
- MSAU
Ans: B
- What is the default subnet mask for Class C network?(multiple choice)
- 255.0.0.0
- 255.255.0.0
- 255.255.255.0
- /24
Ans: C and D
- Which of the following is the standard adopted for Ethernet CSMA/CD by IEEE Committee?
- 802.2
- 802.1d
- 802.3
- 802.5
Ans: C
- Disk Striping with distributed Parity corresponds to which RAID level?
- RAID 0
- RAID1
- RAID3
- RAID5
Ans: D
- Which of the following are class C IP address
- 10.10.14.118
- 135.23.112.57
- 191.200.199.199
- 204.67.118.54
Ans: D
- You are concerned about security in your organization and decide to implement a secure password policy. What can you do to make your password policy more secure?
a)
Require users to change passwords randomly
b) Set
password expiration to 2 days
c)
Require passwords with random numbers of characters
d) Require
password changes regularly
Ans:D
- Which of the following uses FDM (Frequency Division Multiplexing)?
a)
Broadband
b)
Baseband
c)
Both a & b
d) None of
the above
Ans:A
- A user complains that he can’t log onto a server. What troubleshooting steps should you take to resolve the problem? (Select 3)
a) Ask
a user on a remote segment to try and connect
b)
Ping the server
c) Ask
a user on the same segment to try and connect
d) Replace
the NIC
Ans: A, B and C
- Mirroring uses what RAID level?
a) 1
b) 3
c) 4
d) 2
Ans: A
- A client needs to send email to the mail server. What protocol is used?
a)
POP3
b)
SNMP
c)
SMTP
d) FTP
Ans: C
- You install a new virus suite in your network of 120 computers. In the same afternoon, you configure RAID on one system. You are experiencing system crashes throughout your network. What can you do to correct the problem?
a)
Uninstall the virus suite
b) Get
the newest virus update from the vendor
c)
Disable the RAID
d) Check the
virus vendor for system patches or service packs
Ans: D
- You want to check your local TCP/IP connection. How? (Select 2)
a)
Ping 127.0.0.0
b)
Ping local host
c)
Ping Host
d) Ping
127.0.0.1
Ans: B and D
- What layer of the OSI model places the signal on the cable?
a)
Transport
b)
Data link
c)
Physical
d) Network
Ans: C
- What layer of the OSI model does the Router operate under?
a)
Transport
b)
Network
c)
Internet
d) Data link
Ans: B
- Which protocol performs name resolution on a UNIX network?
a) DNS
b)
DHCP
c)
LMHOSTS
d) WINS
Ans: A
- What cable type has a max. length of 185 m?
a)
Fiber optics
b)
10base2
c)
10base 5
d) All of
the above
Ans: B
- Which 802.x is The Logical Link Control related to?
a)
802.1
b)
802.3
c) 802.2
d) 802.4
Ans: C
- Email and FTP work at which layer of the OSI model?
a)
Data link
b)
Transport
c)
Application
d) Network
Ans: C
- What cable type has a max. length of 500 m?
a) 10
base 2
b)
Fiber optics
c) 10
base 5
d) None of
the above
Ans: C
- You have a 10baseT Ethernet network and want to add one more client. You only have an old AUI Ethernet port on the card. What network device can you use to adapt the AUI port to your 10baseT network?
a)
Changer
b)
Transceiver
c)
Media filter
d) Repeater
Ans: B
- 802.5 is the IEEE standard for what?
a)
Ethernet
b)
Voice data transmission
c)
Token ring
d) Token Bus
Ans: C
- Which Internet port does SMTP use?
a) 110
b) 20
c) 80
d) 25
Ans: D
- Which two are good password practices? (choose two)
a)
Change passwords every 90 days
b)
Maintain minimum password length
c) Use
only alpha numeric symbols in passwords
d) Keep
passwords indefinitely
Ans: A and B
- A NIC that has an ST or SC connector on it is an example of?
a)
Fiber optic
b)
Thin net
c) IR
d) Twisted
pair
Ans: a
- What device must be installed on a computer to provide it with a physical and electrical connection to a network?
a)
Gateway
b) BNC
connector
c) NIC
d) Router
Ans: C
- Which type of cable is most likely in use with RJ-45 connectors attached to a computer?
a) 10
Base T
b) 10
Base 5
c) 10
base XL
d) 10 Base 2
Ans: A
- What is the common language that computers use to talk with one another on a network?
a)
Protocol
b)
Client
c)
Adaptor
d) Operating
system
Ans: A
- With respect to the interface network card, what does the term 10/100 refer to?
a)
Megabits per second
b) Minimum
and maximum server speed
c)
Protocol speed
d) A fiber
network
Ans: A
- The functions of Data link layer are
a)
Physical addressing
b)
Framing
c)
Segmentation
d)
Connection control
Ans: A and B
- The types of cryptographies are
a)
Symmetric
b)
Virtual
c)
Secure
d)
Asymmetric
Ans: A and D
- Different types of switching are used by WAN
a)
Packet switching
b)
Network switching
c)
Circuit switching
d) Message
switching
Ans: A, C, and D
- Followings are the types of wireless standard
a)
802.11
b)
802.11g
c)
802.11n
d) 802.11d
Ans: A, B and C
35. The features of switches are:
a) It has one collusion Domain
b) It uses MAC table for forwarding
data
c) It has one Broadcast Domain
e) It
works on Physical layer
Ans: B, C
36.
APIPA provides the following IP range-
a) 192.168.1.26-192.168.25.162
b) 169.254.0.1-169.254.255.254
c) 10.1.0.1-10.255.255.254
d) None of the above
Ans-B
39. A network device
that forwards the data packet is-
a) Router
b) Adapter
c) Hubs
d) Switches
Ans-A
40.
………………assigns IP address automatically on a network.
a) DNS
b) APIPA
c) DHCP
d) WINS
Ans-C
44. What can a crossover cable in an
Ethernet network be used to do?
- Convert from 10 Megabits per second to 100 Megabits per second
- Connect two network devices without a Hub
- Test a faulty network card.
- Improve bandwidth between the server and the workstations
Ans: B
48. You have just installed a new
internal PCI modem in your desktop. It will not dial out. What are the
problems?
- The phone line out of the wall is plugged into the phone port on the modem card
- The modem has not been set up in control panel properties
- The phone line is plugged in to the line-in port on the modem card.
- The port speed is set too high
Ans: A and B
49. Choose three reasons why the
networking industry uses a layered model (multiple choice question)
- It facilitates systematic troubleshooting
- It allows changes in one layer to occur without changing other layers
- It allows changes to occur in all layers when changing one protocol
- It clarifies how to do it rather than what general function to be done
- It clarifies what general function is to be done rather than how to do it
Ans: A,B, and E
50. LAN stands for which of the
following?
- Local Area Network
- Local Arena Network
- Local Area News
- Logical Area Network
Ans: A
51. Which two of the following
protocols are used at the Transport layer?
- ARP
- UDP
- ICMP
- RARP
- TCP
- BOOTP
Ans: B and E
52. UDP provides connectionless
datagram service.
- True
- False
Ans: True
53. Transmission Control Protocol
provides Flow Control and Error Checking at transport Layer
- True
- False
Ans: A
54. What are the two functions of
Data Link Layer. (multiple choice question)
- Handles access to shared media
- Manages protocol access to the physical network medium
- Provides SAPs for higher level protocols
- Allows multiple devices to uniquely identify one another on the data link layer
Ans: B and D
55. What is required to support
full-duplex Ethernet?(multiple choice question)
- Multiple paths between multiple stations on a link
- Automatic sensing operation by all connected stations
- Loopback and collision detection disabled
- Full-duplex NIC cards
Ans: D
56. ARP stands for:
- Address Resolution Phase
- Address Resolution Protocol
- Address Recall Protocol
- ARP Resolution Protocol
Ans: B
57. What is the difference between
TCP and UDP?
- TCP is connection-oriented; UDP uses acknowledgements only
- TCP is connection-oriented; UDP is connectionless
- Both TCP and UDP are connection-oriented, but only TCP uses windowing
- TCP and UDP both have sequencing, but UDP is connectionless
Ans: B
58. Which three of the following are
true statements about connection-oriented sessions?
- The segments delivered are acknowledged back to the sender upon their reception
- Any segments not acknowledged the are retransmitted by the receiver
- A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data
- Segments are sequenced back into their proper order upon arrival at their destination
Ans: A, C, and D
59. Which of the following is a
characteristic of a switch?
- Switches forward packets based on the IPX or IP address in the frame
- Switches forward packets based on the IP address in the frame
- Switches forward packets based on the MAC address in the frame
- Switches forward packets based only on the IP address in the packet
Ans: C
60. Identify 3 characteristics of a
connection-oriented protocol?(multiple choice)
- Path determination
- Flow control
- Acknowledgements
- Uses hop count as metric
- 3 step handshake
Ans\:B, C and E
61. Identify the 3 Network
layer protocols?
- NetBios
- SAP
- ARP
- IP
- RARP
Ans: C, D and E
62. What is the function of the
Transport layer and which protocols reside there?
- MAC addressing – IP
- Interhost communication – SQL, NFS
- Best effort Packet delivery – TCP, UDP
- End-to-end connections – TCP, UDP
Ans: D
63. Identify 3 characteristics of an
IP address?(multiple choice question)
- Contains a network address and a host address
- 32 bits long
- Unique to each network
- Part of the default Cisco configuration
- Referred to as the hardware address
Ans: A, B and C
64. Which statement is true
regarding half duplex?
- Only works in a point-to-point configuration
- Allows for transmitting and receiving but not a the same time
- Allow for transmitting and receiving of data simultaneously
- Doubles the bandwidth
Ans: B
65. Following are the transport
layer protocols____(multiple choice )
- IP
- TCP
- CDP
- ARP
- UDP
Ans: B and E
66. The network device required to
connect a Token ring network to an Ethernet network?
- Repeater
- NIC
- Router
- Token Ring to Ethernet translation hub
Ans: C
67. Follwing are true for a MAC
address:
- Burned into the NIC
- 48 bits long
- Length is 32 bits
- Used to deliver the frame to the end device
- Contains a network portion and a host portion
Ans: A, B,D
68. Ping command is used to:
- Share routing information with a neighbor router
- Transmit user data when buffers are full
- Test connectivity at layer 3
- Test entire protocol stack
Ans: C
69. Following statements are true
for MAC address: (multiple choice question)
- Contains a network portion and host portion
- Always assigned by System Administrator
- 48 bits long
- Contains a vendor code and serial number
Ans: C and D
70. OSI layer which is responsible
for end-to-end connections is:
- Network
- Transport
- Session
- Data Link
- TCP
Ans: B
71. Which addresses are INCORRECTLY
paired with their class?(multiple choice)
- 128 to 191, Class B
- 192 to 223 Class B
- 128 to 191, Class C
- 192 to 223, Class C
Ans: B and C
73. Which addresses are INCORRECTLY
paired with their class?(multiple choice)
- 240 – 255, Class D
- 240 – 255, Class E
- 224 – 239, Class D
- 224 – 239, Class E
Ans: A and D
74. Which IP Address Class can have
16 million subnets but support 254 hosts?
- Class C
- Class B
- Class A
- Class D
Ans: A
75. ARP is used to know the MAC
address if ip is known?
(A)
TRUE
(B) FALSE
ANSWER: TRUE
76. Hybrid topology is the
combination of different topologies?
(A)
TRUE
(B) FALSE
ANSWER: TRUE
77. The maximum cable length of
thicknet cable is 200 meters?
(A)
TRUE
(B) FALSE
ANSWER: FALSE
78. 802.4 standard is used for token
ring topology?
(A)
TRUE
(B) FALSE
ANSWER: FALSE
- 5. Ethernet uses CDMA/CD technology?
(A)
TRUE
(B) FALSE
ANSWER: TRUE
- 6. ARCNET was the first LAN system?
(A)
TRUE
(B) FALSE
ANSWER: TRUE
- 7. SMDS stands for switched megabit digital service?
(A)
TRUE
(B) FALSE
ANSWER: FALSE
- 8. The range of C class network is 191 to 225?
(A) TRUE
(B) FALSE
ANSWER: FALSE
- 9. A multispeed switch provides different speed on different ports?
(A)
TRUE
(B) FALSE
ANSWER: TRUE
- 10. SMTP protocol is used to send the data?
(A)
TRUE
(B) FALSE
ANSWER: TRUE
- 11. NNTP protocol is used for file transfer?
(A)
TRUE
(B) FALSE
ANSWER: FALSE
- 12. FRAME-RELAY operates on network layer?
(A)
TRUE
(B)
FALSE
ANSWER: FALSE
- 13. ISDN stands for internet service digital network?
(A)
TRUE
(B) FALSE
ANSWER: FALSE
- 14. ICS is the internet connection sharing?
(A)
TRUE
(B) FALSE
ANSWER: TRUE
- 15. Gateway works on seven layer of OSI modal?
(A) TRUE
(B) FALSE
ANSWER: TRUE
MULTIPLE
CHOICE ANSWER
- 1. The functions of Data link layer are:
(A) physical addressing (B)
framing (C) segmentation (D) connection control
ANSWER: A, B
- 2. The types of cryptographies are:
(B) Symmetric (B) virtual (C) secure
(D) asymmetric
ANSWER: A, D
- 3. WAN uses types of switching:
(A) Packet
switching (B) Network switching
(C) Circuit
switching (D) Message
switching
ANSWER: A, C, D
- 4. The different types of standard for wireless are:
(C) 802.11 (B) 802.11g (C) 802.11n
(D) 802.11d
ANSWER: A, B, C
- 5. The different types of switching methods are
(D)
Cut-through (B) store and forward (C) quick forward (D) fragment-free
ANSWER: A, B, D
- 6. The features of switches are:
(A) It has one collusion Domain
(B) It uses MAC table for forwarding
data
(C) It has one Broadcast Domain
(D) It works on Physical layer
ANSWER: B, C
- 7. The different types of hubs are:
(E) Passive (B) Active (C)
Manageable (D) Repeating
ANSWER: A, B, C
- 8. The features of IP addresses are:
(A) It works on transport
layer (B) It’s a logical address
(C) It’s stands for internet
protocol (D) It’s a physical address
ANSWER: B, C
- 9. Topology can be:
(F) Virtual (B) Logical (C) Physical
(D) Spiritual
ANSWER: B, C
- 10. What are the types of LAN
(G) Ethernet
(B) Token ring (C) Hybrid (D) FDDI
ANSWER: A, B, D
- 11. The OSI Data Link Layer is divided into the:
(A) Logical addressing (B)
Media access control
(C) Logical link control (D)
Presentation of data
ANSWER: B, C
- 12. What all the methods are used for securing wireless network?
(A) Security set
identifier (B) MAC address
filtering
(C) Port based access
control (D) Data encryption
ANSWER: A, B, C, D
- 13. Types of Ethernet are:
(H)
10BASE-2 (B) 10BASE-5 (C) 10BASE-6 (D) 10BASE-T
ANSWER: A, B, D
- 14. What all the protocols use distance vector routing?
(I) RIP (B) IGRP (C) BGP (D) IS-IS
ANSWER: A, B, C
- 15. What all methods are used for internet sharing?
(J) ICS (B) PROXY (C)
VPN (D) DHCP
ANSWER: A, B
SINGLE CHOICE ANSWER
- 1. URL stands for:
(A) Universal resource
locator (B) Uniform resource locator
(C) Uniform reliable
locator (D) Universal resource
location
ANSWER: B
- 2. Which device doesn’t work on data link layer?
(A) Switch (B) Bridge (C) MAC (D)
Hub
ANSWER: D
- 3. Which is not the type of coaxial cable?
(A)RG6 (B) RG58 (C) RG50 (D) RG59
ANSWER: C
- 4. Which is true statement about the Bridge:
(A) it works on Physical layer
(B) it uses MAC table to forward
data
(C) it is used to connect two network
(D) it is
used to compress data
ANSWER: B
- 5. MAU is used for…………topology?
(A) Ring (B) Star (C) Mesh (D)
Hybrid
ANSWER: A
- 6. Fragment-free switching checks first……byte of data
(A) 62 (B) 64 (C) 56 (D) 28
ANSWER: 64
- 7. Which command is used for Releasing IP?
(A) Ipconfig
/relieve (B) Ipconfig /release
(C) Ipconfig
/renew (D) leave IP
ANSWER: B
- 8. CLNP stands for:
(A) Connection link network protocol
(B) Connection less network protocol
(C) Connection line network protocol
(D) Client link network protocol
ANSWER: B
- 9. Which connector type is used in RG8 cable?
(E) RJ-45 (B) BNC (C) Vampire (D)
Straight tip
ANSWER: C
- 10. FDDI uses ………………….. Topology?
(A) Token
bus
(B) Star
(C) Dual token passing ring (D) Tree
ANSWER: C
- 11. IPX/SPX is communication protocol of ………………. Operating system?
(F) Microsoft (B) Novell
Netware (C) Sun (D) Linux
ANSWER: B
- 12. POP3 protocol is used to ………………from remote server?
(A) Make
connection
(B) Applying policies
(C) Send
email
(D) Retrieve email
ANSWER: D
- 13. ……………. Is a terminal emulation program that is used to access remote system
(G) Remote
connection (B) Data sharing (C) Telnet (D) Capturing data
ANSWER: C
- 14. Which is not an Interior routing protocol?
(H) OSPF (B)
BGP (C) IS-IS (D) IGRP
ANSWER: B
Which is not true regarding ARPANET?
(I) it was the first network of
world
(J) it used FTP to download files
(K) it was introduced in 1958
(L) it used TELNET program to
connect remote server
ANSWER: C
- 16. TCP Modal has ……….layers?
(A) Five (B) Seven (C) Three (D)
None of these
ANSWER: A
- 17. Fiber-optic cables that use LEDs is known as:
(M) Single
mode (B) Multimode (C) Both (D) None of these
ANSWER: B
- 18. Thinnet is also called as a:
(A) 10BASE2 (B) 10BASE5 (C) 10BASE3
(D) None of these
ANSWER: A
19. ATM stands for:
(A) Asynchronous transfer
mode (B) Auto
transfer mode
(C) Asynchronous transmission
mode (D) None of these
ANSWER:A
20. POP3 works on …………… layer?
(A) Transport (B)
Application (C) Network (D) Data link layer
ANSWER:B
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.