Practice Tests - Part 2

61. The physical layout of computers, cables, and other components on a network is known as which of the following?

a. Segment

b. Backbone

c. Topology

d. Protocol

ANS.(d)

62. You wish to extend your intranet to certain business partners. What type of network are you building?

a. Intranet

b. Internet

c. Extranet

d. LAN

ANS.(c)

63. Which type of server is responsible for storing files for users on the network?

a. File and print server

b. Web server

c. Directory server

d. Application server

ANS.(a)

64. A company has offices in Halifax and Toronto. Both networks are connected to allow the two locations to communicate. This is considered what type of network?

a. LAN

b. JAN

c. MAN

d. WAN

ANS.(d)

65. What is the name given to languages that are used for network communication?

a. NIC

b. Segment

c. Protocol

d. Cable

ANS.(c)

66. Which of the following is an example of a layer-2 address?

a. 192.168.2.5

b. COMPUTER100

c. Computer100.glensworld.loc

d. 00-0D-60-48-53-9E

ANS.(d)

67. Which network component is used to extend the distance the signal can travel by regenerating the signal?

a. Passive hub

b. Switch

c. Router

d. Repeater

ANS.(d)

68. Which networking feature allows you to group ports on a switch to create a broadcast domain?

a. WANs

b. VLANs

cd. MANs

d. CANs

ANS.(b)

69. Which layer of the OSI model does a bridge run at?

a. Layer 4

b. Layer 1

c. Layer 3

d. Layer 2

ANS.(d)

70. When data is sent to a system on a switch, the data is sent to what port(s)?

a. The port of the destination system

b. All ports on the immediate hub, but not the any uplinked hubs

c. All ports on the immediate hub and any uplinked hubs

d. All ports on the uplinked hub

ANS.(a)

71. Which type of device is responsible for connecting dissimilar networking environments together?

a. Router

b. Bridge

c. Gateway

d. Switch

ANS.(c)

72. How many bits in an IP address?

a. 8 bits

b. 32 bits

c. 48 bits

d. 96 bits

ANS.(b)

73. A computer with a subnet mask of 255.255.255.0 has how many octets for the network ID?

a. 1

b. 2

c. 3

d. 4

ANS.(c)

74. Which TCP/IP setting is not required if you want to communicate on the LAN by IP address only?

a. IP address

b. Subnet mask

c. Default gateway

d. DNS

ANS.(c)

75. Which address is reserved for internal loopback functions?

a. 0.0.0.0

b. 1.0.0.1

c. 121.0.0.1

d. 127.0.0.1

ANS.(d)

76. What is the well-known port number for the HTTP service?

a. 20

b. 21

c. 80

d. 25

ANS.(c)

77. Which of the following addresses is a private IP address? (Select all that apply.)

a. 10.0.0.34

b. 191.167.34.5

c. 172.16.7.99

d. 12.108.56.7

ANS.(a,c)

78. Which network service is responsible for assigning IP addresses out to systems on the network when they boot up?

a. DNS

b. WINS

c. DHCP

d. Server

ANS.(c)

79. You have the network ID of 131.107.0.0 and you would like to subnet your network into six networks. What will be your new subnet mask?

a. 255.224.0.0

b. 255.255.224.0

c. 255.192.0.0

d. 255.255.192.0

ANS.(b)

80. In binary, how do you calculate the broadcast address of a network range?

a. All host bits set to 0

b. All host bits set to 0, except for the low-order bit

c. All host bits set to 1, except for the low-order bit

d. All host bits set to 1

ANS.(d)

81. In binary, how do you calculate the network ID of a network range?

a. All host bits set to 0

b. All host bits set to 0, except for the low-order bit

c. All host bits set to 1, except for the low-order bit

d. All host bits set to 1

ANS.(a)

82. The last valid address of a subnet is always+

a. One more than the broadcast address

b. One less than the broadcast address

c. One more than the network ID

d. One less than the network ID

ANS.(b)

83. ARP is responsible for converting ....................... addresses to ....................... addresses.

a. layer-3, layer-2

b. layer-4, layer-3

c. layer-2, layer-3

d. layer-3, layer-4

ANS.(a)

84. Which protocol is defined to use TCP port 23?

a. Telnet

b. FTP

c. HTTP

d. SMTP

ANS.(a)

85. Which items are not available for display in IPCONFIG?

a. TCP/IP address

b. MAC address

c. DHCP lease information

d. None of the above

ANS.(d)

86. Which option of IPCONFIG is used to receive a new lease on your IP address?

a. /all

b. /release

c. /obtain

d. /renew

ANS.(d)

87. Which utility is used to facilitate file transfers between two remote hosts?

a. FTP

b. Telnet

c. Ping

d. None of the above

ANS.(a)

88. Which wireless mode involves two laptops connecting directly to one another?

a. Infrastructure mode

b. Ad hoc mode

c. Laptop mode

d. Enterprise mode

ANS.(b)

89. Which of the following is the name you assign to your wireless network?

a. MAC address

b. Service Set Identifier (SSID)

c. WEP key

d. IP address

ANS.(b)

90. A device designed to filter and transfer data packets between dissimilar types of computer networks is called:

a. Hub

b. Load balancer

c. Router

d. Switch

ANS.(c)

91.Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between Local Area Network (LAN) segments?

a. Switch

b. Firewall

c. Router

d. Hub

ANS.(a)

92.What is the maximum payload value for a standard Ethernet frame?

a. 1000 bytes

b. 1250 bytes

c. 1500 bytes

d. 2000 bytes

ANS.(c)

93.Which of the answers listed below refers to the MTU for a standard Ethernet frame?

a. 500 bytes

b. 750 bytes

c. 1000 bytes

d. 1500 bytes

ANS.(d)

94.Which of the following tools would be used to identify running services on a networked host?

a. Packet sniffer

b. Loopback interface

c. Protocol analyzer

d. Port scanner

ANS.(d)

95.The process of planning and designing new WLANs for optimal performance, security, and compliance typically involves:

a. Penetration testing

b. Wireless site survey

c. Vulnerability scanning

d. End user awareness and training

ANS.(b)

96.In half-duplex communication transmission takes place:

a. In two directions simultaneously

b. Only in one direction at a time

c. In one direction only

d. In both directions at half the speed

ANS.(b)

97.A type of transmission that takes place in two directions simultaneously is known as:

a. Full duplex

b. Broadcast

c. Simplex

d. Half duplex

ANS.(a)

98.In the OSI model, data compression takes place at the:

a. Session layer

b. Presentation layer

c. Network layer

d. Physical layer

ANS.(b)

99.The term "Presentation layer" refers to:

a. Layer 7 of the OSI model

b. Layer 5 of the OSI model

c. Layer 6 of the OSI model

d. Layer 4 of the OSI model

ANS.(c)

100.Data encryption and decryption typically takes place at the:

a. Layer 3 of the OSI model

b. Presentation layer of the OSI model

c. Data link layer of the OSI model

d. Layer 1 of the OSI model

ANS.(b)

101.Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply)

a. ARP

b. HTTP

c. FTP

d. SMTP

e. NetBIOS

ANS.(b,c,d)

101.Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard amendment? (Select all that apply)

a. Maximum data signaling rate of 54 Mbps

b. 5.0 GHz frequency band

c. Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

d. 2.4 GHz frequency band

e. Maximum data signaling rate of 11 Mbps

f. Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method

ANS.(a,b,c)

102.Which of the answers listed below refer(s) to UTP cabling? (Select all that apply)

a. Twisted-pair copper cabling

b. Used in Ethernet networks and telephone systems

c. Low cost and ease of installation

d. Takes advantage of additional protective cover reducing signal interference from outside sources

e. Coaxial cabling

f. Not surrounded by any shielding that would provide protection against interference from outside sources

g. Fiber-optic cabling

h. Installed with 8P8C connector type

ANS.(a,b,c,f,h)

103.Which of the following cabling types provide(s) protection against Electromagnetic Interference (EMI)? (Select all that apply)

a. UTP cabling

b. Coaxial cabling

c. STP cabling

d. Fiber-optic cabling

ANS.(b,c,d)

104.Which of the following answers refer to the 100BaseTX Ethernet standard? (Select 3 answers)

a. Maximum cable segment length of 100 meters

b. Twisted-pair copper cabling (Category 5 or higher)

c. BNC connector

d. Maximum cable segment length of 185 meters

e. Coaxial cabling

f. Twisted-pair copper cabling (Category 3 or higher)

ANS.(a,b)

105.Which of the ports listed below are used by client applications designed to retrieve email messages from mail servers? (Select 2 answers)

a. 110

b. 443

c. 3389

d. 25

e. 143

ANS.(a,e)

106.POP3: (Select 2 answers)

a. Is a protocol for sending email messages between servers

b. Uses TCP port 110

c. Uses TCP port 123

d. Is a protocol used to retrieve email messages from a mail server

ANS.(b,d)

107.IMAP4: (Select 2 answers)

a. Uses TCP port 443

b. Is a protocol used to retrieve email messages from a mail server

c. Is a protocol for sending email messages between servers

d. Uses TCP port 143

ANS.(b,d)

108.Simple Mail Transfer Protocol (SMTP) operates with the use of TCP port:

a. 110

b. 25

c. 143

d. 23

ANS.(b)

109.Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol).

a. True

b. False

ANS(b)

110.File Transfer Protocol (FTP) runs by default on TCP ports: (Select 2 answers)

a. 25

b. 22

c. 21

d. 20

e. 23

ANS.(c,d)

111.Which of the following protocols is used in network management systems for monitoring network-attached devices?

a. RTP

b. SNMP

c. IMAP

d. RTCP

ANS.(b)

112.Which of the following answers lists a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?

a. Telnet

b. SSH

c. Bcrypt

d. TFTP

ANS.(b)

113.A hacker has captured network traffic with cleartext commands sent from the client to the server console. Which of the following ports is being used by the network admin for the client-server communication?

a. 49

b. 23

c. 68

d. 22

ANS.(b)

114.DNS runs on port:

a. 139

b. 53

c. 443

d. 22

ANS.(b)

115.What is the basic purpose of a local area network (LAN)?

a. To interconnect networks in several different buildings

b. To connect one or more computers together so they can share resources

c. To interconnect 2 to 10 routers

d. To make routers unnecessary

ANS.(b)

116.HTTP, FTP, and Telnet work at which layer of the OSI model?

a. Application

b. Presentation

c. Session

d. Transport

ANS.(a)

117.Which of the following IP addresses are not allowed on the Internet? (Choose all that apply.)

a. 11.255.255.1

b. 10.1.1.1

c. 172.33.255.0

d. 192.l68.0.1

ANS.(b,d)

118.If you wanted to verify the local IP stack on your computer, what would you do?

a. ping 127.0.0.0

b. ping 127.0.0.1

c. telnet 1.0.0.127

d. ping 127.0.0.255

e. telnet 255.255.255.255

ANS.(b)

119.The OSI model uses an encapsulation method to describe the data as it is encapsulated at each layer of the OSI. What is the encapsulation named at the Data Link layer?

a. Bits

b. Packets

c. Frames

d. Data

e. Segments

ANS(c)

120.Where does a Data Link layer frame have to carry a Network layer packet if the packet is destined for a remote network?

a. Router

b. Physical medium

c. Switch

d. Another host

ANS.(a)

Last updated

Was this helpful?