This action might not be possible to undo. Are you sure you want to continue?
a binary digit used in the binary number system,either 0 or 1 C. the interface on an internetworking device, suchas a router D. the network areas within which data packets that have collided are propagated Question 2: What is the term to describe the maximum number of bits that can be transferred in a given amount of time? A. impedance B. propagation C. attenuation D. bandwidth Question 3: Which factor reduces throughput? A. increased number of users B. decreased number of users C. increased size of hard drive D. decreased size of hard drive Question 4: Which of the following best describes networking protocols? A. a formal description of a set of rules and conventions that govern how devices on a network exchange information B. the use of the same network topology for all networks C. a set of guidelines that can be customized to meet individual needs D. all of the above Question 5: Which correctly describes a source address? A. the address of a host that receives data and information from other computers in a network B. the address of a host that sends data and information to other computers in a network C. data information that moves between computers in a network D. it provides a connection between computers in a network Question 6: What is the function of the session layer? A. concerned with data structures and the negotiation of data transfer syntax B. provides reliable transit of data across the physical layer C. provides connectivity and path selection between two end systems D. manages data exchange between presentation layer entities Question 7: Which best describes the function of the presentation layer? A. responsible for reliable network communication between end nodes B. concerned with data structures and negotiation data transfer syntax C. provides connectivity and path selection between two end systems D. manages data exchange between layer entities Question 8: Which process does the OSI model describe? A. how to protect networks from unwanted intrusions such as hackers and viruses B. how a network uses transmission devices provided by common carriers to create a steady and reproducible signal C. how information or data moves from one computer through a network to another computer D. how to maintain physical and software links between networks Question 9: Which statement best describes bridges and the way they make forwarding decisions? A. they operate at OSI Layer 2 and use IP addresses to make decisions
they operate at OSI Layer 3 and use IP addresses to make decisions C. voltage Question 15: What is the primary cause of crosstalk? A. encoding B. two C. encrypting D. five Question 12: What is another name for a multi-port repeater? A. ohm C. four D. UTP rollover cable D. electrical motors and lighting D. host C. one B. fiber optic cable B. cable wires that are too large in diameter B. sequencer Question 13: At which layer of the OSI model is the NIC located? A. Layer 3 C. resistance C. decrypting Question 17: What is the unit of measure for resistance? A. bridge B. amp D. they operate at OSI Layer 2 and use MAC addresses to make decisions D. joule Question 18: . too much noise in a cable's data signal C. Layer 5 Question 14: What is the opposition to the movement of electrons as they move through materials? A. electrical noise from other wires in a cable Question 16: Which term describes the conversion of binary data into a form that can travel on a physical communications link? A. standard UTP cable C. Layer 2 B. decoding C. current B. ohms D. UTP crossover cable Question 11: If 4 hosts are connected to a hub how many IP addresses are required for these 5 devices? A. they operate at OSI Layer 3 and use MAC addresses to make decisions Question 10: When creating a network from just two PCs. hub D.B. Layer 4 D. what kind of cable would be used to directly connect them? A. volt B.
the 1st 6 hex digits of a MAC address C. allow 6 pairs to fit in the space of 4 pairs Question 19: Which is a characteristic of a collision domain? A. all computers within a WAN Question 20: What is the term used for separating collision domains with bridges. EF D. LAN topology in which transmissions from network stations propagate the length of a single coaxial cable and are received by all other stations C. LAN topology where central points on a network are connected to a common central switch by linear links Question 22: What is one advantage of using fiber optic cabling in networks? A. 1A Question 24: What is the decimal value of the hex number ABE? A.What does the twisting of the wires do in a CAT-5 cable? A. the last 6 hex digits of a MAC address D. A. and routers? A. 7F C. it is available either with or without an outer shield Question 23: Convert the decimal number 127 to Hex. all computers on a single shared access media B. all computers sharing a single IP address C. all computers sharing a single MAC address D. 2750 B. 2570 D. segmentation D. the prefix to all network device model numbers Question 26: Which fiber mode characteristic is recommended for inter-building connectivity? A. extending domains C. fragmentation Question 21: Which best describes an extended star topology? A. switching domains B. single-mode B. multi-mode . 7250 Question 25: What is the Organizational Unique Identifier (OUI)? A. switches. LAN topology in which end points on a network are connected to a common central switch by point-to-point links D. cheap B. all hex digits of a MAC address B. not susceptible to electromagnetic interference D. 2B B. LAN topology in which each of the end nodes of the core topology are acting as the center of its own star topology B. limits signal degradation D. makes it thinner B. 5027 C. easy to install C. makes it less expensive C.
B. C. They are passive. a repeater could be installed to extend the network B. They base forwarding decisions on Layer 3 protocol addresses. surge suppressors C. coaxial cabling Question 35: How many pins are on each of the ports of a patch panel? A. whereas AC ions run in one direction. connects the neutral wire to the chassis D. special NICs can be purchased to extend the network D. 4 pins .C. uninterruptible power supplies Question 31: What best describes the difference between alternating and direct current? A. Question 29: What is the purpose of the safety ground in a computer? A. where is the cable itself labeled? A. at each end C. connects the hot wire to the chassis B. fiber-optic cabling C. C. prevents metal parts from discharging hazardous voltage through the chassis C. bridges D. line voltage meter D. whereas AC rises and falls. how many wiring closets should be installed according to EIA/TIA 569? A. They base forwarding decisions on Layer 2 addresses. DC helps computers to work more efficiently. at the panel end Question 34: Which of the following is a source that can produce interference on UTP cable? A. AC flows at a constant value. grounding cables B. at each tie B. They operate only at the data link layer. fluorescent lights B. inter-mode Question 27: What can be done if the area of the LAN is more than 200 meters in diameter? A. nine Question 33: When running cable from the wiring closet to wall jacks. B. D. D. DC shifts ions from pole to pole. occupies the first three floors of a building and each floor is 1500 square meters. another server could be used to extend the network C. six D. all of the above Question 28: Which of the following statements are true of routers? A. Question 32: If Acme Inc. prevents metal parts from becoming energized with a hazardous voltage Question 30: How can the problem of electrical spikes be addressed? A. whereas DC rises and falls. at the jack end D. one B.whereas AC can cause noise. intra-mode D. DC flows at a constant value. three C.
11111111.109 Question 41: What is the maximum number of bits that can be borrowed from the host portion of a Class C network to create subnets? A. UTP 55 D. staples D.205 D. 11 pins D.170.200. electrical tape C. 2024 C. the host address B. BNC C. distance vector B. the network address Question 40: Which of the following would be the decimal value of the binary IP address 11001101.10101010. 8 Question 42: In a connection-oriented system.255.255.205 B. what happens before any user data is transferred? A. the destination is not contacted before any actual data is sent Question 43: Which type of routing protocol is RIP? A. the router address C. 16 million Question 39: Which part of a network layer address does the router use during path determination? A. 254 B. a connection is established with the recipient's local router B. hybrid D. EIA 45 Question 38: Which of the following is the approximate number of hosts supported in a Class B unsubnetted network? A. link state C.127.11001101? A. 109.170. paperclips Question 37: What kind of jack must be used for making a connection to a Category 5 unshielded twisted pair cable in a horizontal cabling scheme? A. 109. 205.127. 4 C. tie wraps B. 65 thousand D. spanning tree . the server address D.109 C. 6 D. 205.200. RJ-45 B. 8 pins C. a connection is established with the sender's local router D. 45 pins Question 36: What should be used to mount cable to a wall? A. 2 B. a connection is established between the sender and receiver C.B.
TCP/IP D. digitized music D. numbers above 1023 D. UDP Question 47: Which ports are reserved by TCP and UDP for public applications? A. transport Question 45: When sending data to a host on a different network.Question 44: IP relies upon which OSI layer protocol to determine whether packets have been lost and request retransmission? A. session D. numbers from 0 to 1023 Question 48: Which term refers to the amount of data that can be transmitted before receiving an acknowledgement? A. HTTP Question 51: What type of server is used to translate a domain name into the associated IP address? A. window size B. two way handshake D. FTP B. numbers from 255 to 1023 B. IP address of the router B. expectational acknowledgement Question 49: What is ASCII and EBCDIC used to format? A. DHCP Question 52: What is an example of an application that requires both a client and server component in order to function? . without acknowledgements or guaranteed delivery? A. MAC address of the destination device D. the source host encapsulates data so that it contains what destination address in the IP header? A. video Question 50: Which protocol is designed to download or upload files on the Internet? A. ASP C. closed connection C. graphics B. IP address of the destination host Question 46: Which simple protocol exchanges datagrams. text C. Telnet C. FTP D. MAC address of the router C. TCP B. presentation C. DNS C. application B. SNMP B. TFTP D. numbers below 255 C.
enables switches to find the best path to a host B. determines how a packet is forwarded on the same subnetwork D. file storage applications B. client-server applications D. Layer 1 B. NetBEUI D. Microsoft Word C.0? A. the routes are learned automatically Question 60: Which layer is responsible for organizing bits using framing? A. A network that connects devices in a workgroup setting C. RARP B. static routing requires more overhead on the network C. PICT Question 53: What are most applications that work in a networked environment classified as? A. A network that connects business departments in a building D. this allows routers to adjust to changes in the network D. 18 B. ARP Question 58: How many bits are in the network and subnet portion of a class B network with a subnet mask of 255. Layer 4 Question 61: . ISP C. static routing requires less overhead B.255.A. dialogue control applications Question 54: What is a WAN? A. Layer 3 D. A network that connects physically adjacent devices Question 55: Which describes Layer 3 path determination in the OSI model? A. enables a router to choose the next hop Question 56: Which protocol can find the MAC address of a computer given its IP address? A. 21 Question 59: Why is a static route the preferred method for reaching stub networks? A. web browser B. A network that connects users across a large geographic area B.240. DHCP C. 20 D. enables a switch to choose the next hop C. Proxy RARP Question 57: Which is a network layer protocol that can be routed? A. ASCII D. Layer 2 C. 19 C. network redirector applications C. ARP D. IP B.
application D. data link. Both Like and unlike charges attract each other Question 64: Which of the following cable types combines the techniques of shielding. Physical. Router D. Segments 2. and twisting of wires? A. transport. Media Access Control B. network. network. Both Like and unlike charges repel each other D. Session D. session. and networking media C. 2-1-3-4 C. Two like charges repel each other while two unlike charges attract each other B. RJ-45 D. Bridge B. Data link. Physical Layer Protocol D. and T1 Question 69: Which of the following is the correct order for the layers of the OSI reference model? A. Two unlike charges repel each other while two like charges attract each other C. network. BNC B. session.presentation. Physical. computers. Networking media. Unshielded Twisted Pair Question 65: Which of the following is a Layer 1 device? A. Transport Question 68: What are some components that are specific to a LAN? A.presentation.From the following list. application . transport. Packets 4.presentation. cancellation. transport. computers. Physical. and computers D. physical. UTP D. Physical Layer Medium C. STP C. frame relay. 1-3-4-2 B. transport. ISDN. Fiber Optics B. data link. Bits 3. Hub C. Switch Question 66: What type of connector is used with Cat 5 UTP cable? A. what is the correct order of data encapsulation? 1. Presentation C. session. 2-3-4-1 D. RS-232 Question 67: Which layer establishes.Frames A. application B. RG-62 C. data link. network interface cards. Station Management Question 63: Which of the following statements is correct based on Coulomb's Electric Force Law? A. application C. Networking media. manages and terminates sessions between applications? A. Application B.presentation. network. session. and network interface cards B. 3-1-2-4 Question 62: The FDDI specification that defines data encoding/decoding procedures is: A. Network interface cards.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.