Professional Documents
Culture Documents
Coc Level 3 Section 3
Coc Level 3 Section 3
1. Error rate is
A. an error-detecting code based on a summation operation performed on the bits to be checked.
B. a check bit appended to an array of binary digits to make the sum of all the binary digits.
C. a code in which each expression conforms to specific rules of construction, so that if certain errors
occur in an expression, the resulting expression will not conform to the rules of construction and
D. the ratio of the number of data units in error to the total number of data units
E. None of the above
Answer: Option D
2. Intranets and extranets can use their network fire walls and other security features to establish
secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI
Answer: Option B
3. Modem is used in data transmission. When was it invented and in which country?
A. 1963, USA
B. 1965, Germany
C. 1950, USA
D. 1950, Japan
E. None of the above
Answer: Option C
5. Communication network is
A. one or more conductors that serve as a common connection for a related group of devices
B. a continuous frequency capable of being modulated or impressed with a second signal
C. the condition with two or more stations attempt to use the same channel at the same time
D. a collection of interconnected functional units that provides a data communications service among
stations attached to the network
E. None of the above
Answer: Option D
10. You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at
least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets
available. Which subnet mask should you assign?
A. 255.255.224.0
B. 255.255.240.0
C. 255.255.248.0
D. 255.255.255.0
E. 255.255.255.255
Answer: Option D
11. How many digits of the Network User Address are known as the DNIC (Data Network Identification
Code)?
A. first three
B. first four
C. first five
D. first seven
E. None of the above
Answer: Option B
13. Thorough planning must take place when setting up an 802.3 network. A maximum number of
segments can separate any two nodes on the network. What is the maximum number of segments
allowed between two nodes?
A. Five
B. Two
C. Four
D. Six
E. Three
16. Which of the following divides the high speed signal into frequency bands?
A. t-switch
B. modem
C. frequency-division multiplexer
D. time-division multiplexer
E. None of the above
Answer: Option C
18. Which utility is useful for finding the local host name?
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
E. None of the above
Answer: Option D
19. Which of the following conditions is used to transmit two packets over a medium at the same
time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
E. None of the above
Answer: Option B
23. If the ASCII character G is sent and the character D is received, what type of error is this?
A. single-bit
B. multiple-bit
C. burst
D. recoverable
E. None of the above
Answer: Option C
24. Which layer of OSI determines the interface of the system with the user?
A. Network
B. Application
C. Data-link
D. Session
E. None of the above
Answer: Option B
25. The transfer of data from a CPU to peripheral devices of a computer is achieved through
A. modems
B. computer ports
C. interfaces
D. buffer memory
E. None of the above
Answer: Option B
26. What is the number of separate protocol layers at the serial interface gateway specified by the
X.25 standard?
A. 4
B. 2
C. 6
D. 3
E. None of the above
Answer: Option D
27. Many data communication networks have been established which provide a wealth of on-demand
information services to people at home. What is the name of the system which provides an
interactive, graphics-rich service that permits user to select what they want?
A. Teletex system
B. Fax system
C. Videotex system
D. Microwave system
E. None of the above
Answer: Option C
29. Which of the following characteristic(s) is/are suited to the PSS applications?
A. bursty traffic and low communications intensity
B. widely dispersed terminals and access to international packets switched services
C. Multiple remote host or applications accessed by a single local access circuit terminal and circuit
D. All of the above
E. None of the above
Answer: Option D
30. Because the configuration infor-mation for a DHCP client is received dynamically, you must use
which utility to read the current configuration to verify the settings?
B. TRACERT
C. ARP
D. IPCONFIG
E. None of the above
Answer: Option D
31. Which of the following is separated by a subnet mask?
A. DHCP scopes
B. Network ID and host ID
C. Domains
D. Subnets
E. None of the above
Answer: Option B
32. The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The
maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
A. 6200 bps
B. 9600 bps
C. 34000 bps
D. 31000 bps
E. None of the above
Answer: Option D
37. You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the
largest amount of subnets available. Which subnet mask should you assign?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.255
Answer: Option B
39. Examples are packet switching using frame relay, and cell switching using ATM technologies.
Select the best fit for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
E. None of the above
Answer: Option B
45. You are working with a network that has the network ID 192.168.10.0 and require nine subsets for
your company and the maximum number of hosts. What subnet mask should you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
Answer: Option C
46. Messages from one computer terminal can be sent to another by using data networks. The
message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or
satellite and then converted back again at the receiving end. What is this system of sending messages
called?
A. Paperless office
B. Electronic mail
C. Global network
D. Electronic newspaper
E. None of the above
Answer: Option B
48. You are working with a network that has the network ID 192.168.10.0. What subnet should you use
that supports four subnets and a maximum number of hosts?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
Answer: Option B
50. The first step in troubleshooting many problems is to verify which of the following?
A. The subnet mask is valid
B. TCP/IP is installed correctly on the client
C. The WINS server is running
D. The BDC is operable
E. None of the above
Answer: Option B
51. You are working with a network that is 172.16.0.0 and would like to have the maximum number of
hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
A. 255.255.192.0
B. 255.255.224.0
C. 255.255.240.0
D. 255.255.248.0
E. 255.255.255.0
Answer: Option C
52. Which of the following files is used for NetBIOS name resolution?
A. HOSTS
B. LMHOSTS
C. ARP
D. FQDN
E. None of the above
Answer: Option B
54. If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify
the configuration through which of the following? Select the best answer.
A. Network Properties dialog box
B. Server Services dialog box
C. DHCPINFO command-line utility
D. Advanced Properties tab of TCP/ IP Info.
E. None of the above
Answer: Option A
55. In a PC to telephone hookup for long distance communication, modem is connected between the
telephone line and
A. PC
B. synchronous port
C. crossover cable
D. asynchronous port
E. None of the above
Answer: Option D
56. Which of the following communications service provides message preparation and transmission
facilities?
A. Teletex
B. Teletext
C. x400
D. Fax
E. None of the above
Answer: Option A
57. Four bits are used for packet sequence numbering in a sliding window protocol used in a computer
network. What is the maximum window size?
A. 4
B. 8
C. 15
D. 16
E. None of the above
Answer: Option C
59. Which of the following device copies electrical signals from one Ethernet to another?
A. bridge
B. repeater
C. hub
D. passive hub
E. None of the above
Answer: Option B
60. Stephanie is in charge of a small network and wants to make it simple but secure. The users want
to have full control over their data and still be able to share data with the rest of the office. The
networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie
to set up?
A. Peer-to-peer
B. Master domain
C. Server-based
D. WAN
E. Share-level
Answer: Option C
62. Error control is needed at the transport layer because of potential errors occurring _____.
A. from transmission line noise
B. in routers
C. from out-of-sequence delivery
D. from packet losses.
Answer: Option B
63. The transport layer protocol is connectionless.
A. NVT
B. FTP
C. TCP
D. UDP
E. None of the above
Answer: Option D
64. The fundamental requirements of private-to-public network interconnection methods which need
to be provided in gateways is/are
A. universal accessibility for private network Data Terminal Equipment (DTE)
B. adequate cost control mechanisms for administration of the private networks
C. to assign address to private network DTEs
D. A and B both
E. None of the above
Answer: Option D
67. Data link layer retransmits the damaged frames in most networks. If the probability of a frame's
being damaged is p, what is the mean number of transmissions required to send a frame if
acknowledgements are never lost.
A. P I (K + 1)
B. KIK (1 + F)
C. 1/ (1 - F)
D. K I (K - P)
E. None of the above
Answer: Option C
70. You are trying to decide which type of network you will use at your office, and you want the type
that will provide communication and avoid collisions on the cable. Which of the following is the best
choice?
A. Token-Ring
B. CSMA/CD
C. Ethernet
D. CSMA/CA
E. ARCnet
Answer: Option A