Test
Test
6. Topology, which connects every single node in the network to every other node,
is
a) Star b) Ring c) Mesh d) Bus
9. Coaxial cable, UTP cable, STP cable and fibre cables are popular network media
today. Order these
in increasing order of data security
a) Coaxial, UTP, STP, Fibre
b) UTP, Coaxial, STP, Fibre
c) UTP, STP, Coaxial, Fibre
d) None of the above
10. Bridges are simple devices that are used to connect LANs of
a) Different Architecture (eg. Ethernet to Token Ring)
b) Same architecture (eg. Ethernet to Ethernet)
c) Architecture does not matter
e) None of the above
11. Which application uses existing CSMA/VD over existing twisted-pair cable with
bandwidths of
100 mbps?
a) 10BaseF b) 100BaseX c) 100VG-AnyLAN d) 10BaseFD
12. What model divides the network communication process into seven layers?
a) Layered Model b) TCP/IP c) OSI d) X.25
13. B-ISDN uses fiber as a transmission medium and _______ as the switching
infrastructure
a) Ethernet b) FDDI c) ATM d) None of the above
14. ______ is the only standards based technology that has been designed from the
beginning to
accommodate the simultaneous transmission of voice, video and data
a) Home cable network b) Satellite TV c) ATM d) All of the above
15. Which of the following common LAN protocols extend to OSI network layer.
a) NetBIOS b) NetBEUI c) TCP/IP d) All of the above
16. Portability standards are discussed widely in four areas, which of the
following is not one of them.
a) Operating Systems
b) Data Management
c) Programming Languages
d) Hardware
17. Which of the following is not an essential feature of Data Link Layer protocols
as defined by ISO/
OSI model
a) Message orientation
b) Error Detection
c) Error correction by re-transmission
d) None of the above
18. Which of the following describes the OSI Class 3 transport (TP3)
a) Do nothing
b) Signaled Error Recovery
c) Multiplexing
d) Signalled error recovery and multiplexing
20. In the OSI model, the responsibility for negotiating the encodings to be used
in any perticular
connection is entrusted upon
a) Application Layer b) Session Layer c) Presentation Layer d) None of the above
29. Remote boot uses _______ protocol to discover IP address of diskless machine.
a) ICMP b) SNMP c) ARP d) RARP
31. The source quench _________ message is used to control the rate at which
datagrams are
transmitted.
a) IP b) ICMP c) SNMP d) TCP
32. TCP establishes an end to end _______________ between the sender and receiver.
a) Connection b) Virtual Circuit c) Path d) None of above
35. ______ is a complex data structure that contains details about a connection
a) Socket b) Port c) TCB d) None of above
39. For block devices all I/O occurs through the _________________
a) Blocks b) Device c) Buffer cache d) None of above
42. IPng provides security through Authentication Headers and the default
encryption method is
________
48. 100BASET4 operates at 100 mbps using base band signaling and the media is
a) Two stands of fiber
b) Two pairs of data grade UTP
c) Four pairs of telephone grade UTP
d) None of the above
59. Applications running on a single host are identified by service access points
at Transport layer and
Session layer interface. These SAPs are known as
a) Ports b) Sockets c) Both A and B d) None of the above
64. Mapping between Internet Protocol address and MAC layer address are resolved
using
a) RARP b) RIP c) ARP d) TCP/IP
95. Which of the following protocols is used for network management and monitoring?
a) X.500 b) SNMP c) SMTP d) X.400
96. Your network segment has a default gateway of 205.222.45.126 and a subnet mask
of
255.255.255.192. Which of the following is true?
a) The valid range for hosts is 205.222.1.126 through 205.222.44.126 and all the
hosts must use the
same subnet mask.
b) The valid range for hosts is 205.222.45.126 through 205.222.45.126 and all the
hosts must increase
the subnet mask by one.
c) The valid range for hosts is 205.222.45.65 through 205.222.45.125 and all the
hosts must use the
same subnet mask.
d) The valid range for hosts is 205.222.1.65 through 205.222.45.126 and all the
hosts must use the
same subnet mask.
97. When developers write TCP/IP software, they have two mechanisms for
transporting data from
applications: TCP and UDP. Why, in many cases, is UDP used as the protocol for
communications?
a) UDP has a smaller packet size, and thus can be sent around the network with more
speed.
b) TCP has no mechanism to support short, choppy bursts of data, which some
applications tend to
produce.
c) UDP is never used for applications. It is simply a routing protocol.
d) UDP provides reliable delivery acknowledgements, which many applications need
for success.
98. In a token-passing network, what can each and every device on the network be
described as
behaving like?
a) A proxy. b) A router. c) A bridge. d) Repeater
99. You have become increasingly concerned with the activity at the Logical Link
Layer of the
IPX/SPX stack on a certain workstation. What data form should you be concentrating
on at this level?
a) Frames b) Packets c) Datagrams d) Bits
100. TCP/IP Protocol Architecture was designed to carry data over the ARPANET. What
type of
network is the ARPANET?
a) Message switching network.
b) Packet switching network.
c) Packet routing network.
d) A hybrid of a packet and message routing network.
101. Your company has been assigned a Class B IP address. You are administrating a
country-wide
network with 45 individual subnets. Over the next year, you will be adding 60
subnets. What subnet
mask should you use that will allow the most hosts per subnet?
a) 255.255.252.0 b) 255.255.254.0 c) 255.0.0.0 d) 255.255.0.0
102. What layer of the OSI model handles such issues as file access and transfer
and virtual terminal
emulation?
a) Application b) Network c) Transport d) Session
103. You have implemented RSA encryption technology on your network. It seems to be
working well.
However, one station always receives encrypted emails as garbled text, meaning the
protocol stack is
corrupted. What OSI layer above can be assumed to be faulty?
a) Data Link Layer b) Presentation Layer c) Session Layer d) Transport Layer
106. You have been given the Class C address of 205.222.5.0. What size subnet mask
will give you the
greatest possible number of hosts?
a) An 8-bit mask of 255.255.255.255 for 254 hosts.
b) An 8-bit mask of 255.255.255.0 for 254 hosts.
c) An 8-bit mask of 255.255.0.0 for 65,534 hosts.
d) An 8-bit mask of 255.255.0.0 for 8190 hosts.
109. Which one of the following statements correctly describes differences between
a bridge and a
layer two switch?
a) A layer two switch is a high speed, multi-port bridge.
b) A layer two switch cannot use the Spanning Tree Protocol to learn a network’s
topology, while
c) A layer two switch can support multiple network media types, such as twisted
pair, fiber, and coax,
while a bridge is limited to supporting a single network media type.
d) A layer two switch is than an Ethernet hub that supports different speeds on
different ports, while a
bridge requires all ports to have the same speed.
110. How are packet forwarding decisions made in an OSI reference model layer three
device?
a) The device compares the destination MAC address to an internal table that
associates MAC
addresses to particular ports.
b) In a layer three device, every packet is sent out of every port.
c) In a layer three device, packets are forwarded based on node name.
d) The device compares the destination network address to an internal table that
associates network
addresses to particular ports.
113. Network cards in computers communicate with each other using unique MAC
addresses, similar
to street addresses. Where do these unique addresses come from?
a) The network administrator makes up addresses to use and then programs them into
the software.
b) The manufacturer publishes a range of addresses in the manual that you choose
from.
c) The network card searches the network and then assigns itself a unique address
from an elaborate
algorithm using the alread-allocated addresses.
d) The IEEE assigns every manufacturer a prefix and a block of address range,
typically expressed in
hexadecimala bridge can.