Sei sulla pagina 1di 8

1-1 Computer Network is B.

Network, Transport, Session, Presentation


A. Collection of hardware components and computers C. Datalink, Network, Transport, Session
B. Interconnected by communication channels D. Physical, Datalink, Network, Transport
C. Sharing of resources and information 2-5 Which of the following IP address class is Multicast
D. All of the Above A. Class A
1-2 What is a Firewall in Computer Network? B. Class B
A. The physical boundary of Network C. Class C
B. An operating System of Computer Network D. Class D
C. A system designed to prevent unauthorized access 2-6 Which of the following is correct regarding Class B
D. A web browsing Software Address of IP address
1-3 How many layers does OSI Reference Model has? A. Network bit – 14, Host bit – 16
A. 4 B. Network bit – 16, Host bit – 14
B. 5 C. Network bit – 18, Host bit – 16
C. 6 D. Network bit – 12, Host bit – 14
D. 7 2-7 The last address of IP address represents
1-4 DHCP is the abbreviation of A. Unicast address
A. Dynamic Host Control Protocol B. Network address
B. Dynamic Host Configuration Protocol C. Broadcast address
C. Dynamic Hyper Control Protocol D. None of above
D. Dynamic Hyper Configuration Protocol
1-5 IPV4 Address is 2-8 How many bits are there in the Ethernet address?
A. 8 bit A. 64 bits
B. 16 bit B. 48 bits
C. 32 bit C. 32 bits
D. 64 bit D. 16 bits
1-6 DNS is the abbreviation of 2-9 How many layers are in the TCP/IP model?
A. Dynamic Name System A. 4 layers
B. Dynamic Network System B. 5 layers
C. Domain Name System C. 6 layers
D. Domain Network Service D. 7 layers
1-7 What is the meaning of Bandwidth in Network? 2-10 Which of the following layer of OSI model also called
A. Transmission capacity of a communication channels end-to-end layer?
B. Connected Computers in the Network A. Presentation layer
C. Class of IP used in Network B. Network layer
D. None of Above C. Session layer
1-8 ADSL is the abbreviation of D. Transport layer
A. Asymmetric Dual Subscriber Line Click Here for Answers 1 – C / 2 – D / 3 – A / 4 – A / 5 – D / 6 –
B. Asymmetric Digital System Line A / 7 – C / 8 – B / 9 – A / 10 – D
C. Asymmetric Dual System Line 3-1. Why IP Protocol is considered as unreliable?
D. Asymmetric Digital Subscriber Line A. A packet may be lost
1-9 What is the use of Bridge in Network? B. Packets may arrive out of order
A. to connect LANs C. Duplicate packets may be generated
B. to separate LANs D. All of the above
C. to control Network Speed 3-2. What is the minimum header size of an IP packet?
D. All of the above A. 16 bytes
1-10 Router operates in which layer of OSI Reference Model? B. 10 bytes
A. Layer 1 (Physical Layer) C. 20 bytes
B. Layer 3 (Network Layer) D. 32 bytes
C. Layer 4 (Transport Layer) 3-3. Which of following provides reliable communication?
D. Layer 7 (Application Layer) A. TCP
Click Here for Answers 1 – D / 2 – C / 3 – D / 4 – B / 5 – C / 6 B. IP
– C / 7 – A / 8 – D / 9 – A / 10 – B C. UDP
2-1 Each IP packet must contain D. All of the above
A. Only Source address 3-4. What is the address size of IPv6 ?
B. Only Destination address A. 32 bit
C. Source and Destination address B. 64 bit
D. Source or Destination address C. 128 bit
2-2 Bridge works in which layer of the OSI model? D. 256 bit
A. Appliation layer 3-5. What is the size of Network bits & Host bits of Class A of
B. Transport layer IP address?
C. Network layer A. Network bits 7, Host bits 24
D. Datalink layer B. Network bits 8, Host bits 24
2-3 _______ provides a connection-oriented reliable service C. Network bits 7, Host bits 23
for sending messages D. Network bits 8, Host bits 23
A. TCP 3-6. What does Router do in a network?
B. IP A. Forwards a packet to all outgoing links
C. UDP B. Forwards a packet to the next free outgoing link
D. All of the above C. Determines on which outing link a packet is to be
2-4 Which layers of the OSI model are host-to-host layers? forwarded
A. Transport, Session, Persentation, Application D. Forwards a packet to all outgoing links except the
originated link 4-10. The meaning of Straight-through Cable is
A. Four wire pairs connect to the same pin on each end
3-7. The Internet is an example of B. The cable Which Directly connects Computer to Computer
A. Cell switched network C. Four wire pairs not twisted with each other
B. circuit switched network D. The cable which is not twisted
C. Packet switched network Click Here for Answers 1 – D / 2 – B / 3 – C / 4 – B / 5 – A / 6 –
D. All of above B / 7 – D / 8 – C / 9 – D / 10 – A
3-8. What does protocol defines? 5-1 Which of the following is not the External Security
A. Protocol defines what data is communicate Threats?
B. Protocol defines how data is communicate A. Front-door Threats
C. Protocol defines when data is communicate B. Back-door Threats
D. All of above C. Underground Threats
3-9. What is the uses of subnetting? D. Denial of Service (DoS)
A. It divides one large network into several smaller ones 5-2 What is the Demilitarized Zone?
B. It divides network into network classes A. The area between firewall & connection to an external
C. It speeds up the speed of network network
D. None of above B. The area between ISP to Military area
3-10. Repeater operates in which layer of the OSI model? C. The area surrounded by secured servers
A. Physical layer D. The area surrounded by the Military
B. Data link layer 5-3 What is the full form of RAID ?
C. Network layer A. Redundant Array of Independent Disks
D. Transport layer B. Redundant Array of Important Disks
Click Here for Answers 1 – D / 2 – C / 3 – A / 4 – C / 5 – A / 6 C. Random Access of Independent Disks
– C / 7 – C / 8 – D / 9 – A / 10 – A D. Random Access of Important Disks
4-1. What is the benefit of the Networking? 5-4 What is the maximum header size of an IP packet?
A. File Sharing A. 32 bytes
B. Easier access to Resources B. 64 bytes
C. Easier Backups C. 30 bytes
D. All of the Above D. 60 bytes
4-2. Which of the following is not the Networking Devices? 5-5 What is the size of Host bits in Class B of IP address?
A. Gateways A. 04
B. Linux B. 08
C. Routers C. 16
D. Firewalls D. 32
4-3. What is the size of MAC Address? 5-6 What is the usable size of Network bits in Class B of IP
A. 16-bits address?
B. 3 A. 04
2-bits B. 08
C. 48-bits C. 14
D. 64-bits D. 16
4-4. Which of the following can be Software? 5-7 In which type of RAID, data is mirrored between two
A. Routers disks.
B. Firewalls A. RAID 0
C. Gateway B. RAID 1
D. Modems C. RAID 2
4-5. What is the use of Ping command? D. RAID 3
A. To test a device on the network is reachable 5-8 What do you mean by broadcasting in Networking?
B. To test a hard disk fault A. It means addressing a packet to all machine
C. To test a bug in a Application B. It means addressing a packet to some machine
D. To test a Pinter Quality C. It means addressing a packet to a particular machine
4-6. MAC Address is the example of D. It means addressing a packet to except a particular
A. Transport Layer machine
B. Data Link Layer 5-9 Which of the following is/are Protocols of Application?
C. Application Layer A. FTP
D. Physical Layer B. DNS
4-7. Routing tables of a router keeps track of C. Telnet
A. MAC Address Assignments D. All of above
B. Port Assignments to network devices 5-10 Which of the following protocol is/are defined in
C. Distribute IP address to network devices Transport layer?
D. Routes to use for forwarding data to its destination A. FTP
4-8. Layer-2 Switch is also called B. TCP
A. Multiport Hub C. UDP
B. Multiport Switch D. B & C
C. Multiport Bridge Click Here for Answers 1 – C / 2 – A / 3 – A / 4 – D / 5 – C / 6 –
D. Multiport NIC C / 7 – B / 8 – A / 9 – D / 10 – D
4-9. Difference between T568A and T568B is 6-1. What is the IP Address range of APIPA?
A. Difference in wire color A. 169.254.0.1 to 169.254.0.254
B. Difference in number of wires B. 169.254.0.1 to 169.254.0.255
C. Just different length of wires C. 169.254.0.1 to 169.254.255.254
D. Just different manufacturer standards D. 169.254.0.1 to 169.254.255.255
6-2. Which of the following is correct in VLSM? a) prior network
A. Can have subnets of different sizes b) chief network
B. Subnets must be in same size c) prime network
C. No required of subnet d) overlay network
D. All of above
6-3. What does the port number in a TCP connection specify? Answer:d Explanation:None.
A. It specifies the communication process on the two end
systems 4. In computer network nodes are
B. It specifies the quality of the data & connection a) the computer that originates the data
C. It specify the size of data b) the computer that routes the data
D. All of the above c) the computer that terminates the data
d) all of the mentioned
6-4. The class-based addressing is also known as
A. Modern Model 5. Communication channel is shared by all the machines on
B. Classful Model the network in
C. Classless Model a) broadcast network
D. Heterogeneous Model b) unicast network
6-5. Which of the following is correct in CIDR? c) multicast network
A. Class A includes Class B network d) none of the mentioned
B. There are only two networks
C. There are high & low class network Answer:a Explanation:None.
D. There is no concept of class A, B, C networks
6-6. What is the size of Source and Destination IP address in 6. Bluetooth is an example of
IP header? a) personal area network
A. 4 bits b) local area network
B. 8 bits c) virtual private network
C. 16 bits d) none of the mentioned
D. 32 bits
6-7. Which of the following is reliable communication? Answer:a Explanation:None.
A. TCP 7. A _____ is a device that forwards packets between
B. IP networks by processing the routing information included in
C. UPD the packet.
D. All of them a) bridge
6-8. What is the typical range of Ephemeral ports? b) firewall
A. 1 to 80 c) router
B. 1 to 1024 d) all of the mentioned
C. 80 to 8080
D. 1024 to 65535 Answer:c Explanation:None.
6-9. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message 8. A list of protocols used by a system, one protocol per layer,
B. Typically used to indicate beginning of message is called
C. Typically used to push the message a) protocol architecture
D. Typically used to indicate stop the message b) protocol stack
6-10. What is the natural mask for a class C Network? c) protocol suit
A. 255.255.255.1 d) none of the mentioned
B. 255.255.255.0
C. 255.255.255.254 Answer:b Explanation:None.
D. 255.255.255.255 9. Network congestion occurs
Click Here for Answers 1 – C / 2 – A / 3 – A / 4 – B / 5 – D / 6 –
D / 7 – A / 8 – D / 9 – A / 10 – B a) in case of traffic overloading
b) when a system terminates
1. When collection of various computers seems a single c) when connection between two nodes terminates
coherent system to its client, then it is called d) none of the mentioned
a) computer network
b) distributed system Answer:a Explanation:None.
c) both (a) and (b)
d) none of the mentioned 10. Which one of the following extends a private network
across public networks?
Answer:b Explanation:None. a) local area network
2. Two devices are in network if b) virtual private network
a) a process in one device is able to exchange information c) enterprise private network
with a process in another device d) storage area network
b) a process is running on both devices
c) PIDs of the processes running of different devices are same Answer:b Explanation:None.
d) none of the mentioned
1) Which of this is not a guided media ?
Answer:a Explanation:None. a) Fiber optical cable
b) Coaxial cable
3. Which one of the following computer network is built on c) Wireless LAN
the top of another network?
d) Copper wire 3) This topology requires multipoint connection
a) Star
Answer: c Explanation: Wireless LAN is unguided media. b) Mesh
2) UTP is commonly used in c) Ring
a) DSL d) Bus
b) FTTP
c) HTTP Answer: d Explanation: None.
d) None of the mentioned
4) Data communication system spanning states, countries, or
Answer: a Explanation: Unshielded twisted pair(UTP) is the whole world is
commonly used in home access. a) LAN
b) WAN
3) Coaxial cable consists of _______ concentric copper c) MAN
conductors. d) None of the mentioned
a) 1
b) 2 Answer: b Explanation:Wide area network(WAN) covers the
c) 3 whole of the world network.
d) 4
Answer: b Explanation: None. 5) Data communication system within a building or campus is
4) Fiber optics posses following properties a) LAN
a) Immune electromagnetic interference b) WAN
b) Very less signal attenuation c) MAN
c) Very hard to tap d) None of the mentioned
d) All of the mentioned
Answer: d Explanation: None. Answer: a Explanation: None.
5) If an Optical Carrier is represented as OC-n, generally the
6) Expand WAN
link speed equals(in Mbps),
a) World area network
a) n*39.8
b) n*51.8 b) Wide area network
c) 2n*51.8 c) Web area network
d) None of the mentioned d) None of the mentioned
Answer: b Explanation: None.
Answer: b Explanation: None.
6) Terrestrial radio channels are broadly classifed into _____
groups.
a) 2
b) 3
c) 4
d) 1
Answer: b Explanation: The three types are those that
operate over very short distance, those that operate in local
areas, those that operate in the wide area.
7) Radio channels are attractive medium because
a) Can penetrate walls
b) Connectivity can be given to mobile user
c) Can carry signals for long distance
d) All of the mentioned
Answer: d Explanation: None.
8) Geostationary satellites
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
Answer: a Explanation: They are placed in orbit at 36,000km
above Earth’s surface.
1) Physical or logical arrangement of network is
a) Topology
b) Routing
c) Networking
d) None of the mentioned

Answer: a Explanation: None.

2) In this topology there is a central controller or hub


a) Star
b) Mesh
c) Ring
d) Bus

Answer: a Explanation: None.


1. Which of the following standards organizations has 10. Which OSI model layer generates and detects voltage so
established guidelines for installing network cables in as to transmit and receive signals carrying data?
commercial buildings? a. Physical layer
a. TIA/EIA b. Data Link layer
b. ITU c. Network layer
c. ANSI d. Transport layer
d. IEEE
11. What type of address follows a hierarchical format?
2. Which technology does the IEEE 802.3 specification a. Physical addresses
describe? b. MAC addresses
a. Network security c. Network addresses
b. Ethernet LANs d. Data Link layer addresses
c. Logical Link Control
12. If the TCP protocol did not receive an acknowledgment
d. Token ring LANs
for data it transmitted, what would it do?
3. Which of the following IEEE specifications pertains to a. Issue its own acknowledgment, indicating to the recipient
wireless networking? that it did not receive the acknowledgment it expected
a. 802.1 b. Issue a warning frame to tell the recipient it would
b. 802.3 retransmit the data if it did not receive the acknowledgment
c. 802.7 within a certain time frame
d. 802.11 c. Retransmit the data to the recipient
d. Reestablish the connection with the recipient
4. Which layer of the OSI model is responsible for issuing
acknowledgments (ACKs)? 13. You have just installed a new NIC in your computer and
a. Application layer see the following stamped on it: 000A5E1A8DA2. This unique
b. Data Link layer identifier is an example of what kind of address?
c. Network layer a. Virtual address
d. Transport layer b. MAC address
c. Network address
5. Which OSI model layer is responsible for keeping open a
d. IP address
communications path between your computer and the server
when you dial in to a remote access server? 14. Which part of a MAC address is unique to each
a. Physical layer manufacturer?
b. Data Link layer a. The destination ID
c. Presentation layer b. The block ID
d. Session layer c. The physical node ID
d. The segment ID
6. Suppose your network is connected to another network via
a router. Which OSI model layer provides the information 15. What is the purpose of the trailer field added to a frame
necessary to direct data between the two networks? in the Data Link layer?
a. Network layer a. To mark the end of a frame
b. Physical layer b. To indicate the rate at which a node can receive the data
c. Data Link layer c. To encode the sum of the error-checking algorithm
d. Session layer d. To represent the frame’s sequence number

7. In which two layers of the OSI model do NICs belong? 16. What are the sublayers of the Data Link layer as defined in
a. Presentation and Application layers the IEEE 802 standards?
b. Transport and Network layers a. Logical Link Control sublayer and Media Access Control
c. Network and Data Link layers sublayer
d. Physical and Data Link layers b. Transport Control sublayer and Media Access Control
sublayer
8. Which standards organization developed the OSI model?
c. Logical Link Control sublayer and Physical Addressing
a. ISO
sublayer
b. ITU
d. Transport Control sublayer and Data Link Control sublayer
c. ISOC
d. OSI 17. Which layer of the OSI model encapsulates Network layer
packets?
9. Under what circumstances would the Transport layer use
a. Physical layer
segmentation?
b. Session layer
a. When too many data frames are flooding into a receiving
c. Data Link layer
node’s NIC
d. Transport layer
b. When more than 10 percent of transmitted frames are
damaged 18. Suppose that, at the receiving node, a frame’s FCS doesn’t
c. When the destination node cannot accept the size of the match the FCS it was issued at the transmitting node. What
data blocks transmitted by the source node happens as a result?
d. When the source node requests that data blocks be a. The receiving node’s Transport layer assesses the error and
segmented for faster processing corrects it.
b. The receiving node’s Data Link layer requests a
retransmission. 6. In addition to some types of data networks, which of the
c. The transmitting node’s Transport layer immediately issues following use half-duplex communication?
a replacement frame. a. Telephones
d. The transmitting node’s Data Link layer assesses the error b. Walkie-talkies
and corrects it. c. Television broadcast towers
d. Satellite Internet connections
19. In which of the following situations would it be most
desirable to use a connectionless Transport layer protocol? 7. In wavelength division multiplexing, two modulated signals
a. When retrieving a spreadsheet from a busy file server are guaranteed to differ in what characteristic?
b. When connecting to a graphics-intensive Web site a. Throughput
c. When viewing a movie clip on the Web b. Phase
d. When sending an e-mail message to a long list of recipients c. Amplitude
d. Color
20. Which of the following would be found in a Data Link
layer header? 8. Which of the following can increase latency on a network?
a. The packet’s fragmentation offset a. An EMI source, such as fluorescent lighting
b. The packet’s sequence number b. The use of full-duplex transmission
c. The source’s logical address c. Adding 50 meters to the length of the network
d. The source’s physical address d. The use of multiple protocols

1. What is different about the method used to boost a digital 9. You are helping to install a cable broadband system in your
signal’s strength, compared with the method of boosting an friend’s home. She wants to bring the signal from where the
analog signal’s strength? service provider’s cable enters the house to a room on
a. A digital signal requires an amplifier, which introduces another floor, which means you have to attach a new cable to
noise into the signal, and an analog signal requires a repeater, the existing one. What type of cable should this be?
which retransmits the signal in its original form. a. RG-6
b. A digital signal requires a repeater, which increases the b. RG-8
strength of both the signal and the noise it has accumulated, c. RG-58
and an analog signal requires an amplifier, which retransmits d. RG-59
the signal in its original form.
10. What part of a cable protects it against environmental
c. A digital signal requires an amplifier, which increases the
damage?
strength of both the noise and the signal, and an analog
a. Sheath
signal requires a repeater, which retransmits the signal in its
b. Braiding
original form.
c. Plenum
d. A digital signal requires a repeater, which retransmits the
d. Cladding
signal in its original form, and an analog signal requires an
amplifier, which increases the strength of both the signal and 11. With everything else being equal, a network using which
the noise it has accumulate of the following UTP types will suffer the most cross talk?
d. a. Cat 3
b. Cat 5
2. Which of the following decimal numbers corresponds to
c. Cat 5e
the binary number 00000111?
d. Cat 7
a. 3
b. 5 12. What are two advantages of using twisted pair cabling
c. 7 over coaxial cabling on a network?
d. 9 a. Twisted pair cable is more reliable.
b. Twisted pair cable is less expensive.
3. A wave with which of the following frequencies would have
c. Twisted pair cable is more resistant to noise.
the shortest wavelength?
d. Twisted pair cable is more resistant to physical damage. e.
a. 10 MHz
Twisted pair cable is required for modern transmission
b. 100 MHz
standards.
c. 1 GHz
d. 100 GHz 13. Which of the following problems could be solved by using
a crossover cable?
4. What is the origin of the word modem?
a. You’re missing a patch cable, but need to connect a
a. Modifier/demodifier
workstation to a switch.
b. Modulator/demodulator
b. You’re missing a connectivity device, but need to exchange
c. Modulator/decoder
data between two laptops.
d. Multiplexer/demultiplexer
c. You’re missing a serial cable, but need to configure a new
5. With everything else being equal, which of the following router using your laptop.
transmission techniques is capable of the greatest d. You’re missing a repeater, but need to extend a network
throughput? segment.
a. Simplex
14. Which of the following network transmission media offers
b. Half-duplex
the highest potential throughput over the longest distances?
c. Full-duplex
a. UTP
d. All techniques transmit data at equally high throughputs.
b. STP
c. MMF a. UTP designed for telephone signaling
d. SMF b. UTP designed for 100 Mbps Ethernet
c. UTP designed for 1 Gbps Ethernet
15. In which of the following network links might you use SC
d. Fiber-optic cable
connectors?
a. A coaxial connection between a cable modem and a server 24. Your campuswide WAN is experiencing slow Internet
b. A UTP connection between a workstation and a hub response times. When you call your Internet service provider
c. A wireless connection between a handheld computer and a to ask if they can troubleshoot the problem from their end,
desktop computer they warn you that their responsibilities end at the demarc.
d. A fiber-optic connection between a server and router. What do they mean?
a. They will not diagnose problems beyond your
16. What type of fiber-optic cable is used most frequently on
organization’s MDF.
LANs?
b. They will not diagnose problems beyond your
a. Multithreaded fiber
organization’s entrance facilities.
b. Twisted fiber
c. They will not diagnose problems beyond your
c. Single-mode fiber
organization’s IDF.
d. Multimode fiber
d. They will not diagnose problems beyond your
17. What is the purpose of cladding in a fiber-optic cable? organization’s telco rooms.
a. It protects the inner core from damage.
25. What is the maximum amount you should untwist twisted
b. It reflects the signal back to the core.
pair wires before inserting them into connectors?
c. It shields the signal from EMI.
a. ¼ inch
d. It concentrates the signal and helps keep it from fading.
b. ½ inch
18. Which of the following is a potential drawback to using c. 1 inch
fiber-optic cable for LANs? d. 2 inches
a. It is expensive.
1. Which of the following distinguishes peer-to-peer networks
b. It cannot handle high-bandwidth transmissions. from client/server networks?
c. It can carry transmissions using only TCP/IP. a. In peer-to-peer networks, only one computer can send and
d. It is not yet an accepted standard for high-speed receive transmissions on the network.
networking. b. In peer-to-peer networks, only one type of protocol suite
can be used to send and receive data.
19. In what part of a structured cabling system would you find c. In peer-to-peer networks, a central computer manages all
users’ desktop computers? file and print sharing.
a. Telco room d. In peer-to-peer networks, no single computer has more
b. MDF authority than another, by default.
c. IDF
d. Work area 2. Which of the following is an advantage of using a peer-to-
peer network over using a client/server network?
20. You’ve just received a new Cisco router for your data a. A peer-to-peer network allows for more nodes.
center, and it came with a rollover cable. What can you do b. A peer-to-peer network provides greater security.
with this cable? c. A peer-to-peer network is easier to set up.
a. Make a connection from the router’s console port to your d. A peer-to-peer network allows for easier expansion.
laptop’s serial port and configure the router from your 3. Which of the following is an advantage of using a
laptop. client/server network over using a peer-to-peer network?
b. Make a connection from the router’s Ethernet port to a a. A client/server network is simpler to set up.
port on the patch panel in the telecommunications closet to b. A client/server network allows for easier expansion.
establish connectivity for workstations in a work area. c. A client/server network does not require a network
c. Make a connection from the router’s Ethernet port to the operating system.
Ethernet port on your laptop to configure the router. d. A client/server network is less expensive to set up.
d. Make a connection from the router’s console port to 4. The first services widely used by networks were:
another router’s console port to daisy-chain the routers. a. Mail services
b. Communications services
21. What is the maximum distance specified in the structured
c. Network management services
cabling standard for a horizontal wiring subsystem?
d. File and print services
a. 10 m
b. 90 m 5. Suppose you wanted to share documents among several
c. 100 m computers in your household in a peer-to-peer fashion. You
d. 200 m could do that by properly configuring which of the following
types of software?
22. Which of the following can occur as a result of improper a. Word-processing software
cable termination? b. Desktop operating system software
a. Cross talk c. Mail client software
b. Noise d. Remote authentication software
c. Data errors 6. What is the primary function of a file server on a network?
d. All of the above a. It routes traffic between two or more LANs.
b. It monitors how many users are logged on to a WAN.
23. If your MDF contains a 66 block, the type of cable
c. It prevents unauthorized remote users from connecting to
terminating at that punch-down block is probably what?
a LAN. c. Formation
d. It manages access and use of shared applications and data. d. Grid

7. On most LANs, a computer acting as a server differs from a 15. Which of the following is an example of a mail service?
computer acting as a client in which of the following ways? a. Exchanging messages between mail servers on different
(Choose two answers.) networks
a. The server would have a faster connection to the network b. Ensuring that users are not running more copies of an e-
than the client. mail client than have been purchased
b. The server would run different network protocols than the c. Preventing unauthorized users from gaining access to the
client. network and, in particular, to its mail server
c. The server would support connections to more media types d. Enabling users to print messages from their e-mail client
than the client. software
d. The server would run a different operating system than the
client. e. The server would possess greater processing power 16. Which of the following network topologies is most
than the client. common on today’s networks?
a. Fan
8. In which of the following environments would a MAN be b. Star
most appropriate? c. Ring
a. A corporate headquarters connecting its five buildings d. Bus
across a small campus
b. A global hotel chain connecting its reservation desks to a 17. Which of the following is an example of a network
central call center management service?
c. A home office connecting its personal computers between a. Establishing permissions for users and groups of users to
the den, living room, and bedroom access certain applications on the server
d. A local newspaper connecting to a global news agency’s b. Alerting the network administrator when a critical
Web site connectivity device fails
c. Managing the queue of print jobs during periods of heavy
9. Which of the following describes the combination of voice network traffic
(such as telephone), video, and data signals sent over the d. Supplying users with file transfer capabilities over the
same network? Internet
a. Switching
b. Remote access 18. Security is a concern when using remote access servers on
c. Convergence a network because:
d. Network management a. Access servers enable computers to dial in to a network
and obtain access to its resources, thereby exposing the
10. What is the term used to describe a discrete unit of data network to the outside world.
that is sent from one node to another over the network? b. Access servers have poor password enforcement
a. Capsule capabilities and rely on users to choose good passwords.
b. Node c. Access servers cannot accept encoded data transfers,
c. Packet requiring users to transmit plain text to and from the
d. Parcel network.
d. Access servers are difficult to understand and support, and
11. How can a server tell the difference between many clients so many networks are using them incorrectly and perhaps
on a network? insecurely.
a. Each has a different electromagnetic characteristic to its
signal, similar to differences in human voices. 19. Distributing data transfer activity equally over several
b. Each regularly transmits a signal that indicates its network devices or components belongs to which category of network
location and unique client characteristics. management services?
c. Each is identified by a unique network address. a. Load balancing
d. Each uses uniquely modified versions of the same network b. Asset management
protocol. c. Traffic monitoring
d. File and print services
12. What device connects a client computer to a network’s
medium, such as a wire? 20. What organization sponsors the CCNA and CCIE
a. Network interface card certifications?
b. Network terminator a. IEEE
c. Network junction clip b. CompTIA
d. Network line extender c. Cisco
d. WITI
13. Which of the following is one function of a network
protocol?
a. To ensure that connectivity devices are configured properly
b. To establish rules for routing mail messages in an
organization
c. To ensure that data arrives at its destination in the proper
sequence
d. To prevent unauthorized users from logging on to a file
server

14. The physical layout of nodes on a network is known as the


network’s:
a. Schematic
b. Topology

Potrebbero piacerti anche