Professional Documents
Culture Documents
Lat. soalMTA Netwokring DG Jawaban Soal PDF
Lat. soalMTA Netwokring DG Jawaban Soal PDF
1. In Local area network (LAN) topologies, the primary media access methods are : (Choose
two.)
a. Contention
b. Kerberos
c. Negotiation
d. Token Passing
7. If an 802.11g Internet connection has connectivity problems, what may be the cause :
a. Electromagnetic Interfence (EMI)
b. A cellular phone
c. A cordless phone
d. Incandescent lights
11. Which of these factors has the biggest impact on data transmission speed in a wireless
network ?
a. The transmission standard of the equipment used
b. The transmission wattage rating used on the NIC
c. The use of strong encryption for transmissions
d. The access method used for the network
12. A network that separates an organization’s private network from a public network is a / an :
a. Extranet
b. Firewall
c. Internet
d. Perimeter
16. A cable thet meets the 1000BaseT standard has a maximum length of :
a. 100 m
b. 250 m
c. 500 m
d. 1000 m
17. Which of the following represents a Media Access Control (MAC) address ?
a. 05:35:AB: 6E:A1:25
b. 127.0.0.1
c. 255.255.255.0
d. GV:ZC:KK:DK:FZ:CA
19. A Network device that Associates a Media Access Control (MAC) address with a port is a :
a. DSL modem
b. Hub
c. Router
d. Switch
24. Which setting is used to determine the Domain Name System (DNS) settings on a client
computer ?
a. NETSTAT
b. NSLOOKUP
c. PATHPING
d. TELNET
25. A computer that has an IP address 169.254.0.1 cannot access the network.
Which of the following services should you confirm is available :
a. DHCP
b. DNS
c. TFTP
d. WINS
26. The command-line tool used to list a host’s active incoming connections is :
a. PING
b. NETSTAT
c. NSLOOKUP
d. IPCONFIG
34. You ping a server by using fully qualified domain name (FQDN) and do not receive a
response. You ping the same server by using its IP address and receive a response.
Why do you receive a response on the second attempt but not on the first attempt ?
a. NSLOOKUP is stopped
b. The DNS is not resolving
c. The DHCP server is offline
d. PING is improperly configured
35. What is the default subnet mask for a Class C Internet network ?
a. 255.255.255.252
b. 255.255.255.240
c. 255.255.255.192
d. 255. 255. 255. 0
36. Which wireless authentication method provides the highest level of security ?
a. IEEE 802.11n
b. IEEE 802.11a
c. Wired Equivalency Privacy (WEP)
d. Wi-Fi Protected Access (WPA)
37. What happens when an 802. 11b node starts broadcasting within the range of an 802. 11g
access point ?
a. A connection will be established
b. Both the node and the access point will be unable to transmit
c. The node will transmit, but the access point will be unable to receive
d. The access point will transmit, but the node will be unable to receive
38. Which two are published IEEE 802.11 wireless transmission standards ? (Choose two )
a. 802.11f
b. 802.11g
c. 802.11k
d. 802.11m
e. 802.11n
39. Which technology can you use to extend an internal network across shared or public
networks ?
a. Microsoft ASP.NET
b. Microsoft.NET Framework
c. VLAN
d. VPN
41. A VPN is / an :
a. Personal network for your use only
b. Communication tunnel between VLANS
c. Encrypted connection across the Internet
d. Virtual network within your local area network (LAN)
42. A Node within a local area network (LAN) must have a network interface device and a :
a. Network account
b. Host address
c. Resource to share
d. Table of all network nodes
46. Which of the following determines the media access method that is used in a network ?
a. Maximum speed of the media
b. Topology and Protocol
c. Number of domain servers on the segment
d. Number of hosts connected to the network
50. A computer that has an IP address of 169. 254. 0. 1 cannot access the network.
Which of the following services should you confirm is available ?
a. DHCP
b. DNS
c. TFTP
d. WINS
54. At what layer in the OSI model are hardware addresses referenced ?
a. Application
b. Data link
c. Network
d. Physical
58. Which command is used to verify that a server is connected to the network ?
a. CHECK
b. IPCONFIG
c. PING
d. ROUTE
59. What is the default subnet mask for a Class C Internet network ?
a. 255.255.255.252
b. 255.255.255.240
c. 255.255.255.192
d. 255.255.255.0
60. Which of these represents the Internet Protocol version 6 (IPv6) loopback address ?
a. 127.0.0.1
b. 192.168.0.1
c. : : 1
d. FEC0:ABC0::AA01
61. Which setting is used to determine the Domain Name System (DNS) settings on a client
computer ?
a. NETSTAT
b. NSLOOKUP
c. PATHPING
d. TELNET
62. A user reports that she cannot connect to network resources from a computer on the
company network. The user was able tp connect to the network resource yesterday.
You verify that the user’s computer is properly physically connected to the network. You
discover that the computer’s IP address is 169.254.48.97.
Why do you receive a response on the second attempt but not on the first attempt ?
a. NSLOOKUP is stopped
b. The DNS is not resolving
c. The DHCP server is offline
d. PING is improperly configured
65. If a router cannot determine the next hop for a packet, the router will :
a. Broadcast the packet
b. Store the packet in the memory buffer
c. Forward the packet to the default route
d. Send the packet
66. To directly connect the Ethernet network interface cards (NICs) of two computers, you
should use a :
a. Coaxial cables
b. Crossover cable
c. Rollover cable
d. Straight cable
72. How many bits are there in an Internet Protocol Version 6 (IPv6) address?
a. 32
b. 64
c. 128
d. 256
76. Protocol that maps IP Address to a Media Access Control (MAC) address is:
a. Dynamic Host Configuration Protocol (DHCP)
b. Routing Information Protocol (RIP)
c. Internet Message Access Protocol (IMAP)
d. Address Resolution Protocol (ARP)
e. User Datagram Protocol (UDP)
77. Tracert is used to:
a. Report the router taken by packet across an IP Network
b. Manage session-oriented connections between nodes
c. Report the shortest route between difference networks
d. Manage routing tables dynamically
78. If a router installed so that separates a DHCP Server from its clients, the clients will
a. Immediately lose connectivity to all segments
b. Receive an immediate renewal of their lease
c. Be unable to obtain their leases from the server
d. Immediately lose connectivity to the local segment
81. What type of record does DNS use to find a mail service:
a. Mail exchanger (MX) DNS Records
b. Canonical (CNAME) DNS Records
c. Service (SRV) DNS Records
d. HOST (A) DNS Records
87. To protect a network when it is connected to the Internet, you should use a :
a. Router
b. Firewall
c. Bridge
d. Switch
88. Which two of the following are connectivity options for Wide Area Networks (WANs)?
(Choose two)
a. Dial-up
b. Token ring
c. Leased line
d. Ethernet
89. One purpose of a perimeter networks is to:
a. Link local area networks (LANs)
b. Make resources available to the internet
c. Make resource available to the intranet
d. Link campus area networks (CANs)
91. In which physical network topology is each computer connected to a central point?
a. Bus
b. Mesh
c. Ring
d. Star
92. The maximum throughput of an 802.11g network is:
a. 2.4 GHz
b. 54 GHz
c. 2.4 Mbps
d. 54 Mbps
94. Which of these factors has the biggest impact on data transmission speed in a wireless
network?
a. The access method used for network
b. The transmission wattage rating used on the NIC
c. The transmission standard of the equipment used
d. The uses off strong encryption for transmissions
96. A node within a local area network (LAN) must have a network interface device and a:
a. Table of all network nodes
b. Host address
c. Network account
d. Resource to share
97. Which wireless authentication method provides the highest level of security?
a. IEEE 802.11a
b. Wired equivalency privacy (WEP)
c. Wi-Fi protected Access (WPA)
d. IEEE 802.11n
98. Which type of port is used to support VLAN traffic between two switches?
a. Virtual port
b. Trunk port
c. WAN port
d. LAN port
102. A cable that meets the 1000BaseT standard has maximum length of:
a. 100 m
b. 250 m
c. 500 m
d. 1,000 m