Practice Tests - Part 1
1.Which layer of the OSI reference model contains the MAC and LLC sublayers?
a. Network layer
b. Transport layer
c. Physical layer
d. Data link layer
ANS. (d)
2. Which approach to bandwidth usage consumes all the available frequencies on a medium to transmit data?
a. Broadband
b. Baseband
c. Time-division multiplexing
d. Simplex
ANS. (b)
3. Windowing is provided at what layer of the OSI reference model?
a. Data link layer
b. Network layer
c. Transport layer
d. Physical layer
ANS.(c)
4. IP addresses reside at which layer of the OSI reference model?
a. Network layer
b. Session layer
c. Data link layer
d. Transport layer
ANS.(a)
5. Which of the following is a connectionless transport layer protocol?
a. IP
b. TCP
c. UDP
d. H.323
ANS.(c)
6. What is the range of well-known TCP and UDP ports?
a. Below 2048
b. Below 1024
c. 16,384–32,768
d. Above 8192
ANS.(b)
7. Which protocol supports a secure connection to a remote host via terminal emulation software?
a. Telnet
b. SSH
c. FTP
d. SFTP
ANS.(b)
8. Identify the well-known UDP port number for NTP.
a. 53
b. 69
c. 123
d. 143
ANS.(c)
9. Which OSI layer is associated with the following: The acknowledgement of transmissions, sequencing, and flow control across a network?
a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5
e. Layer 6
f. Layer 7
ANS.(c)
10. Which OSI layer header contains the address of a destination host that is on another network?
a. Application
b. Presentation
c. Session
d. Transport
e. Network
f. Data link
g. Physical
ANS.(E)
11. Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)
a. The presentation layer translates bits into voltages for transmission across the physical link.
b. The transport layer divides a data stream into segments and adds reliability and flow control information.
c. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
d. The data link layer adds physical source and destination addresses and an FCS to the segment.
e. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
ANS. (b), (c)
12. Which of the following is a device directly used by an end user to access a network?
a. Server
b. LAN
c. Client
d. Router
ANS.(c)
13. Which device makes traffic-forwarding decisions based on MAC addresses?
a. Hub
b. Router
c. Switch
d. Multiplexer
ANS.(c)
14. A company has various locations in a city interconnected using Metro Ethernet connections. This is an example of what type of network?
a. WAN
b. CAN
c. PAN
d. MAN
ANS.(d)
15. A network formed by interconnecting a PC to a digital camera via a USB cable is considered what type of network?
a. WAN
b. CAN
c. PAN
d. MAN
ANS.(c)
16. Which of the following physical LAN topologies requires the most cabling?
a. Bus
b. Ring
c. Star
d. WLAN
ANS.(c)
17. Which protocol below uses TCP port 443 at layer 4?
a. HTML
b. HTTPS
c. TFTP
d. Telnet
e. SMTP
f. None of the above
ANS.(b)
18. Which fields are included in the TCP header? (Choose three).
a. Source Port
b. Acknowledgement Number
c. Request Number
d. Destination Address
e. Window
f. Data
ANS.(a) , (b) , (e)
19. FTP, Telnet, DNS, and SMTP are all protocols being used in the network of a company . Of these, which uses both TCP and UDP ports?
a. Telnet
b. FTP
c. DNS
d. SMTP
e. None of the above
ANS.(c)
20. Which of the following topologies offers the highest level of redundancy?
a. Full mesh
b. Hub and spoke
c. Bus
d. Partial mesh
ANS.(a)
21. How many WAN links are required to create a full mesh of connections between five remote sites?
a. 5
b. 10
c. 15
d. 20
ANS.(b)
22. Identify two advantages of a hub-and-spoke WAN topology as compared to a full-mesh WAN topology.
a. Lower cost
b. Optimal routes
c. More scalable
d. More redundancy
ANS.(a) , (c)
23. Which type of network is based on network clients sharing resources with one another?
a. Client/server
b. Client-peer
c. Peer-to-peer
d. Peer-to-server
ANS. (c)
24. Which of the following is an advantage of a peer-to-peer network, as compared
with a client/server network?
a. More scalable
b. Less expensive
c. Better performance
d. Simplified administration
ANS. (b)
25. A switch has 12 ports. How many collision domains does the switch have?
a. None
b. 1
c. 2
d. 12
ANS.(d)
26. A router has 12 ports. How many broadcast domains does the router have?
a. None
b. 1
c. 2
d. 12
ANS.(d)
27. A router operating at Layer 3 primarily makes its forwarding decisions based on what address?
a. Destination MAC address
b. Source IP address
c. Source MAC address
d. Destination IP address
ANS.(d)
28. Which network infrastructure device primarily makes forwarding decisions based on Layer 2 MAC addresses?
a. Router
b. Switch
c. Hub
d. Multilayer switch
ANS.(b)
29. The ................ Layer helps computers to create a session, maintain a session and tear a session.
a.Application
b.Transport
c.Presentation
d.Session
ANS.(d)
30. Which of the below is not a Physical Layer device?
a.Switch
b.NIC
c.Repeater
d.Hub
ANS.(a)
31. The MAC Address also called the Ethernet address is a ...... bit value.
a.48 bit
b.128 bit
c.96 bit
d.32 bit
ANS.(a)
32.What type of antenna, commonly used in wireless APs and wireless routers in SOHO locations, radiates relatively equal power in all directions?
a. Unidirectional
b. Yagi
c. Parabolic
d. Omnidirectional
ANS.(d)
33. When using the 2.4-GHz band for multiple access points in a WLAN located in the United States, which nonoverlapping channels should you select? (Choose three.)
a. 0
b. 1
c. 5
d. 6
e. 10
f. 11
g. 14
ANS.(b,d,f)
34. What IEEE 802.11 variant supports a maximum speed of 54 Mbps and uses the 2.4-GHz band?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
ANS.(c)
35. Which of the following is used by IEEE 802.11n to achieve high throughput through the use of multiple antennas for transmission and reception?
a. MIMO
b. DSSS
c. FHSS
d. LACP
ANS.(a)
36. A WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?
a. Enterprise mode
b. IBSS
c. Personal mode
d. BSS
ANS(b)
37. When extending the range for a 2.4-GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap is recommended for these adjacent cells?
a. 5 percent to 10 percent
b. 10 percent to 15 percent
c. 15 percent to 20 percent
d. 20 percent to 25 percent
ANS.(b)
38. If a WLAN does not require a user to provide credentials to associate with a wireless AP and access the WLAN, what type of authentication is said to be in use?
a. WEP
b. SSID
c. Open
d. IV
ANS.(c)
39. What standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i?
a. TKIP
b. MIC
c. WEP
d. WPA2
ANS.(d)
40. What protocol is used by the ping command?
a. IGMP
b. PIM
c. ICMP
d. RTP
ANS.(c)
41. Which of the following commands would you issue on a UNIX host to send five ICMP echo messages to a device with an IP address of 10.1.1.1?
a. ping 10.1.1.1 (No options are required, because five is the default number of pings.)
b. ping -c 5 10.1.1.1
c. ping -t 5 10.1.1.1
d. ping 10.1.1.1 -t 5
ANS.(b)
42. ISDN is considered to be what type of WAN connection?
a. Dedicated leased line
b. Circuit-switched connection
c. Packet-switched connection
d. Cell-switched connection
ANS.(b)
43. What is the binary representation of the decimal number 117?
a. 10110101
b. 01110101
c. 10110110
d. 01101001
ANS.(b)
44. What is the class of IP address 10.1.2.3/24?
a. Class A
b. Class B
c. Class C
d. Class D
ANS.(a)
45. Which of the following statements are true regarding VLANs? (Choose two.)
a. A VLAN is a single Layer 2 broadcast domain.
b. For traffic to pass between two VLANs, that traffic must be routed by a Layer 3 device.
c. Because of a switch’s MAC address table, traffic does not need to be routed in order to pass between two VLANs.
d. A VLAN is a single collision domain.
ANS.(a,b)
46. How many assignable IP addresses exist in the 172.16.1.10/27 network?
a. 30
b. 32
c. 14
d. 64
ANS.(a)
47. What is the prefix notation for a subnet mask of 255.255.255.240?
a. /20
b. /24
c. /28
d. /29
ANS.(c)
48. Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate seven subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use?
a. /24
b. /26
c. /27
d. /28
ANS(c)
49. A client with an IP address of 172.16.18.5/18 belongs to what network?
a. 172.16.0.0/18
b. 172.16.64.0/18
c. 172.16.96.0/18
d. 172.16.128.0/18
ANS.(a)
50. Identify the distance limitation of a 10BASE5 Ethernet network.
a. 100 m
b. 185 m
c. 500 m
d. 2 km
ANS.(c)
51. Which of the following statements are true regarding VLANs? (Choose two.)
a. A VLAN has a single broadcast domain.
b. For traffic to pass between two VLANs, that traffic must be routed.
c. Because of a switch’s MAC address table, traffic does not need to be routed to pass between two VLANs.
d. A VLAN has a single collision domain.
ANS.(a,b)
52. Which of the following is an example of a network?
a. A computer attached to a printer and a scanner to input and output information
b. Computer systems sharing a common communication medium for the purpose of sharing information or devices
c. Several printers connected to a switch box going to a single terminal
d. Several diskettes holding information for one workstation
ANS.(b)
53. Which type of connector is used on 10Base2 networks?
a. SC
b. BNC
c. RJ-45
d. RJ-11
ANS.(b)
54. What is the maximum distance of single-mode fiber (SMF)?
A. 300 meters
B. 500 meters
C. 2 km
D. 850 meters
ANS.(c)
55. Which cable type is immune to outside interference and crosstalk?
a. Thinnet
b. Thicknet
c. Twisted-pair
d. Fiber optic
ANS.(d)
56. What is the distance limitation of 10Base2, or thinnet?
a. 100 meters
b. 185 meters
c. 250 meters
d. 500 meters
ANS.(b)
57. Which cable type sends the signal as pulses of light through a glass core?
a. Thinnet
b. Thicknet
c. Fiber optic
d. CAT 5e
ANS.(c)
58. What is the distance limitation of 10Base2, or thinnet?
a. 100 meters
b. 185 meters
c. 250 meters
d. 500 meters
ANS.(b)
59. What is the maximum distance of CAT 3 UTP cabling?
a. 100 meters
b. 185 meters
c. 250 meters
d. 500 meters
ANS.(a)
60. Which network topology requires the use of terminators?
a. Bus
b. Star
c. Mesh
d. Ring
e . Wireless
ANS.(a)
Last updated
Was this helpful?