1.what must pc on the network have in common in order to directly communicate each other?
A. use the same operating system
B. use the same hardware
C. use the same protocol
D. built by same company
C
2.what is the decimal number 151 in binary?
A. 10100111 B.10010111 C.10101011 D.10010011
B
3.bandwidth is described in ?
A. Bytes per second B. Bits per second
C. megabits per millisecond D. centimeters
B
4. what is a NIC?
A. A LAN adapter
B. A printed circuit board that provides network communication
C. A card used only for Ethernet network
D. Both A and B
D
5. which of the following is the PDU for transport layer?
A. Frame B. Segment C. Packet D. data
B
6.which layer of OSI reference model is responsible for reliable the network communication between end nodes and providers mechanisms for the establishment, maintenance and termination of the virtual circuits, transport fault detection and recovery , and information flow control?
A. Physcial layer B. Network layer
C. Data link layer D. Transport layer
D
7. which the following protocols does not use TCP/IP as its underlying protocols?
A. SMTP B. FTP C. DNS D. TFTP
D
8. Packets are encapulationed in frames are which layer
of the OSI model?
A. Physcial layer B. Network layer
C. Data link layer(LLC) D. Transport layer
C
9. What is called when two bits form two different communicating computers are on a share-medium at the same time?
A. Latency B. Dispersion C. Collison D. Obstruction
C
10. what happens to packets that are involved in a collision?
A. The packets return to the originator
B. The packets are "destroyed "bit by bit
C. The packets continue on to the target device with corrupt data
D. None of the above
B
11. Using repeaters the collision domain.
A. Reduce B. have no effect on
C. Extends D. None of the above
C
12. How many collision domain exists in a network containing two bridges?
A. One B.Two C.Three D. Four
C
N+1
13. Separating collision domains with bridge,switches and routers is called ?
A. Switching domains B. Extending domains
C. Segmentation D. Fragmentation
C
14. which the best describes a collision in a Ethernet network?
A. The effect of having too many repeaters in a network.
B. The result of two nodes transmitting at the same time.
C. The effect when two nodes have the same MAC address.
D. The result of having non OSI compliant protocols on the network.
B
15. which LAN standard specifies an implementation of the physcial layer and the MAC sublayer of the data link layer in the Ethernet networks?
A. IEEE 802.3 B. IEEE 802.5
C. EIA/TIA 568B D. EIA/TIA 569
A
16. Convert the hex number ABE into decimal
A. 2750 B. 5027 C. 2570 D. 7250
A
17. A Frame is a .
A. Layer 2 PDU B. Layer 3 PDU
C. An encapsulation packet D. Both A and C
D
18. How does a computer on a LAN detect an error in a frame?
A. Send a copy of the frame back to the sender for verification
B. Check the destination addresst to verify that the frame was really intended for them
C. Compare a FCS in the frame to one that the computer calculates from the contents of the frame.
D. Calculate a checksum from the data in the frame ,and send it back to the source for verification.
C
19. which of the following describe Token-ring?
A. Data transfer rates of 4 mbps or 16 mbps
B. Can physcially use a star topology
C. Can only be implemented with fiber
D. Both a and b
D
20. The data/command frame and token frame have which of the following fields in common?
A. start delimiter ,frame check sequence (FCS), and access control
B. start delimiter ,token control,and end delimiter
C. start delimiter ,access control ,and end delimiter
D. none of the above
C
21. How does a token-ring topolopy differ from an Ethernet topology?
A. Token-ring is deterministic
B. Token-ring networks do not face problems with collisions
C. Neither A nor B
D. Both A and B
D
22. One of the primary reasons FDDI is extremely reliable is because .
A. of it's dual ring design
B. it is a CSMA/CD network
C. stations are guaranteed their turn to transmit
D. both A and C
D
23. "If you have to connect a FDDI between buildings ,which mode of fiber would you use?"
A. single-mode B. multi-mode
C. intra-mode D. inter-mode
A
24. The Ethernet version 2 header is the header of an 802.3 frame .
A. much longer than B. much shorter than
C. the same length ad D. completely different than
C
25. "A diminishes the traffic experienced by devices on all connected segments ,because only a certain percentage of traffic is forwarded."
A. Hub B. bridge C. switch D. Both B and C
D
26. Which address is an example of a broadcast address for a class A network?
A. 123.255.255.255 B. 123.14.255.255
C. 123.14.13.255 D. 123.14.13.0
A
27. What is the minimum number of bits that can be borrowed to form a subnet?
A. 1 B. 2 C. 4 D. None of the above
B
28. what is the maximum number of hosts on class C network when subnetting is occuring?
A. 124 B. 196 C. 254 D. 180
B
29. If 3 bits are borrowed from the host field of a class C address,what will range of usable hosts be in the first
usable subnet?
A. .32 through .63 B. .1 through .63
C. .33 through .62 D. .0 through .32
C
30. which Internet protocol maps a MAC address to a known IP address ?
A. TCP/IP B. RARP C. ARP D. PAR
C
31. An ARP request is sent out on the network as what type of data packet?
A. Trailer B. Header C. FCS D. Broadcast
D
32. when does a device seek out the services of a router?
A. The IP address of a destination is on a different network.
B. The device is a diskless workstation.
C. The source needs the MAC address of a destination on a different network.
D. The device needs to send a broadcast message.
A
33. what kind of protocols is IPX?
A. Routing B. Traffic C. Routed D. Gateway
C
34. what do routing protocols do?
A. Allow hubs and ports to communicate quickly.
B. Enable routers to communicate with bridges and hubs.
C. Permit ports to calculate time and distance between and two points on the network.
D. Enable routers on the network to exchange routing tables and quickly adapt to changing network conditions.
D
35. The following characteristics describe what TCP/IP protocol ? connection-oriented; re-sends anything not received ;divides outgoing messages into segments.
A. IPX B. TCP C. UDP D. SPS
B
36. What do TCP and UDP use to keep track of different conversations crossing a network at the same time?
A. Port numbers B. IP address
C. MAC addresses D. Route numbers
A
37. which range of port numbers are unregulated?
A. below 255 B. between 256 and 1023
C. above 1023 D. all of the above
C
38. what OSI layer establishes ,manages ,and terminates sessions between applications?
A. Presentation B. Session
C. Application D. Transport
B
39. which of the following is a layer 5 protocol?
A. TCP B. PPP C.UDP D. SQL
D
40. Which of the following are used to format text?
A. ASCII B. JPEG C. AVI D. Both A and C
A
41. Which function of layer 6 protects data during transmission?
A. Data formatting B. Data compression
C. Data encryption D. Data protection
C
42. what is used to specify placement of text ,files,and objects that are to ve transferred from the web server to the web?
A. HTTP B. HTML C. HDLC D. URL
B
43. What is the broadcast address of the subnet address 10.254.255.19 255.255.255.248?
A. 10.254.255.23 B. 10.254.255.24
C. 10.254.255.255 D. 10.255.255.255
A
44. Which of the following is the valid host range for the IP address 192.168.168.188 255.255.255.192?
A. 192.168.168.129-190 B. 192.168.168.129-191
C. 192.168.168.128-190 D. 192.168.168.128-192
A
45. If you wanted to have 12 subnets with a class C network ID ,which subnet mask would you use?
A. 255.255.255.252 B. 255.255.255.248
C. 255.255.255.240 D. 255.255.255.255
C
|