Practice Tests - Part 1

1.Which layer of the OSI reference model contains the MAC and LLC sublayers?

a. Network layer

b. Transport layer

c. Physical layer

d. Data link layer

ANS. (d)

2. Which approach to bandwidth usage consumes all the available frequencies on a medium to transmit data?

a. Broadband

b. Baseband

c. Time-division multiplexing

d. Simplex

ANS. (b)

3. Windowing is provided at what layer of the OSI reference model?

a. Data link layer

b. Network layer

c. Transport layer

d. Physical layer

ANS.(c)

4. IP addresses reside at which layer of the OSI reference model?

a. Network layer

b. Session layer

c. Data link layer

d. Transport layer

ANS.(a)

5. Which of the following is a connectionless transport layer protocol?

a. IP

b. TCP

c. UDP

d. H.323

ANS.(c)

6. What is the range of well-known TCP and UDP ports?

a. Below 2048

b. Below 1024

c. 16,384–32,768

d. Above 8192

ANS.(b)

7. Which protocol supports a secure connection to a remote host via terminal emulation software?

a. Telnet

b. SSH

c. FTP

d. SFTP

ANS.(b)

8. Identify the well-known UDP port number for NTP.

a. 53

b. 69

c. 123

d. 143

ANS.(c)

9. Which OSI layer is associated with the following: The acknowledgement of transmissions, sequencing, and flow control across a network?

a. Layer 2

b. Layer 3

c. Layer 4

d. Layer 5

e. Layer 6

f. Layer 7

ANS.(c)

10. Which OSI layer header contains the address of a destination host that is on another network?

a. Application

b. Presentation

c. Session

d. Transport

e. Network

f. Data link

g. Physical

ANS.(E)

11. Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)

a. The presentation layer translates bits into voltages for transmission across the physical link.

b. The transport layer divides a data stream into segments and adds reliability and flow control information.

c. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

d. The data link layer adds physical source and destination addresses and an FCS to the segment.

e. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

ANS. (b), (c)

12. Which of the following is a device directly used by an end user to access a network?

a. Server

b. LAN

c. Client

d. Router

ANS.(c)

13. Which device makes traffic-forwarding decisions based on MAC addresses?

a. Hub

b. Router

c. Switch

d. Multiplexer

ANS.(c)

14. A company has various locations in a city interconnected using Metro Ethernet connections. This is an example of what type of network?

a. WAN

b. CAN

c. PAN

d. MAN

ANS.(d)

15. A network formed by interconnecting a PC to a digital camera via a USB cable is considered what type of network?

a. WAN

b. CAN

c. PAN

d. MAN

ANS.(c)

16. Which of the following physical LAN topologies requires the most cabling?

a. Bus

b. Ring

c. Star

d. WLAN

ANS.(c)

17. Which protocol below uses TCP port 443 at layer 4?

a. HTML

b. HTTPS

c. TFTP

d. Telnet

e. SMTP

f. None of the above

ANS.(b)

18. Which fields are included in the TCP header? (Choose three).

a. Source Port

b. Acknowledgement Number

c. Request Number

d. Destination Address

e. Window

f. Data

ANS.(a) , (b) , (e)

19. FTP, Telnet, DNS, and SMTP are all protocols being used in the network of a company . Of these, which uses both TCP and UDP ports?

a. Telnet

b. FTP

c. DNS

d. SMTP

e. None of the above

ANS.(c)

20. Which of the following topologies offers the highest level of redundancy?

a. Full mesh

b. Hub and spoke

c. Bus

d. Partial mesh

ANS.(a)

a. 5

b. 10

c. 15

d. 20

ANS.(b)

22. Identify two advantages of a hub-and-spoke WAN topology as compared to a full-mesh WAN topology.

a. Lower cost

b. Optimal routes

c. More scalable

d. More redundancy

ANS.(a) , (c)

23. Which type of network is based on network clients sharing resources with one another?

a. Client/server

b. Client-peer

c. Peer-to-peer

d. Peer-to-server

ANS. (c)

24. Which of the following is an advantage of a peer-to-peer network, as compared

with a client/server network?

a. More scalable

b. Less expensive

c. Better performance

d. Simplified administration

ANS. (b)

25. A switch has 12 ports. How many collision domains does the switch have?

a. None

b. 1

c. 2

d. 12

ANS.(d)

26. A router has 12 ports. How many broadcast domains does the router have?

a. None

b. 1

c. 2

d. 12

ANS.(d)

27. A router operating at Layer 3 primarily makes its forwarding decisions based on what address?

a. Destination MAC address

b. Source IP address

c. Source MAC address

d. Destination IP address

ANS.(d)

28. Which network infrastructure device primarily makes forwarding decisions based on Layer 2 MAC addresses?

a. Router

b. Switch

c. Hub

d. Multilayer switch

ANS.(b)

29. The ................ Layer helps computers to create a session, maintain a session and tear a session.

a.Application

b.Transport

c.Presentation

d.Session

ANS.(d)

30. Which of the below is not a Physical Layer device?

a.Switch

b.NIC

c.Repeater

d.Hub

ANS.(a)

31. The MAC Address also called the Ethernet address is a ...... bit value.

a.48 bit

b.128 bit

c.96 bit

d.32 bit

ANS.(a)

32.What type of antenna, commonly used in wireless APs and wireless routers in SOHO locations, radiates relatively equal power in all directions?

a. Unidirectional

b. Yagi

c. Parabolic

d. Omnidirectional

ANS.(d)

33. When using the 2.4-GHz band for multiple access points in a WLAN located in the United States, which nonoverlapping channels should you select? (Choose three.)

a. 0

b. 1

c. 5

d. 6

e. 10

f. 11

g. 14

ANS.(b,d,f)

34. What IEEE 802.11 variant supports a maximum speed of 54 Mbps and uses the 2.4-GHz band?

a. 802.11a

b. 802.11b

c. 802.11g

d. 802.11n

ANS.(c)

35. Which of the following is used by IEEE 802.11n to achieve high throughput through the use of multiple antennas for transmission and reception?

a. MIMO

b. DSSS

c. FHSS

d. LACP

ANS.(a)

36. A WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?

a. Enterprise mode

b. IBSS

c. Personal mode

d. BSS

ANS(b)

37. When extending the range for a 2.4-GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap is recommended for these adjacent cells?

a. 5 percent to 10 percent

b. 10 percent to 15 percent

c. 15 percent to 20 percent

d. 20 percent to 25 percent

ANS.(b)

38. If a WLAN does not require a user to provide credentials to associate with a wireless AP and access the WLAN, what type of authentication is said to be in use?

a. WEP

b. SSID

c. Open

d. IV

ANS.(c)

39. What standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i?

a. TKIP

b. MIC

c. WEP

d. WPA2

ANS.(d)

40. What protocol is used by the ping command?

a. IGMP

b. PIM

c. ICMP

d. RTP

ANS.(c)

41. Which of the following commands would you issue on a UNIX host to send five ICMP echo messages to a device with an IP address of 10.1.1.1?

a. ping 10.1.1.1 (No options are required, because five is the default number of pings.)

b. ping -c 5 10.1.1.1

c. ping -t 5 10.1.1.1

d. ping 10.1.1.1 -t 5

ANS.(b)

42. ISDN is considered to be what type of WAN connection?

a. Dedicated leased line

b. Circuit-switched connection

c. Packet-switched connection

d. Cell-switched connection

ANS.(b)

43. What is the binary representation of the decimal number 117?

a. 10110101

b. 01110101

c. 10110110

d. 01101001

ANS.(b)

44. What is the class of IP address 10.1.2.3/24?

a. Class A

b. Class B

c. Class C

d. Class D

ANS.(a)

45. Which of the following statements are true regarding VLANs? (Choose two.)

a. A VLAN is a single Layer 2 broadcast domain.

b. For traffic to pass between two VLANs, that traffic must be routed by a Layer 3 device.

c. Because of a switch’s MAC address table, traffic does not need to be routed in order to pass between two VLANs.

d. A VLAN is a single collision domain.

ANS.(a,b)

46. How many assignable IP addresses exist in the 172.16.1.10/27 network?

a. 30

b. 32

c. 14

d. 64

ANS.(a)

47. What is the prefix notation for a subnet mask of 255.255.255.240?

a. /20

b. /24

c. /28

d. /29

ANS.(c)

48. Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate seven subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use?

a. /24

b. /26

c. /27

d. /28

ANS(c)

49. A client with an IP address of 172.16.18.5/18 belongs to what network?

a. 172.16.0.0/18

b. 172.16.64.0/18

c. 172.16.96.0/18

d. 172.16.128.0/18

ANS.(a)

50. Identify the distance limitation of a 10BASE5 Ethernet network.

a. 100 m

b. 185 m

c. 500 m

d. 2 km

ANS.(c)

51. Which of the following statements are true regarding VLANs? (Choose two.)

a. A VLAN has a single broadcast domain.

b. For traffic to pass between two VLANs, that traffic must be routed.

c. Because of a switch’s MAC address table, traffic does not need to be routed to pass between two VLANs.

d. A VLAN has a single collision domain.

ANS.(a,b)

52. Which of the following is an example of a network?

a. A computer attached to a printer and a scanner to input and output information

b. Computer systems sharing a common communication medium for the purpose of sharing information or devices

c. Several printers connected to a switch box going to a single terminal

d. Several diskettes holding information for one workstation

ANS.(b)

53. Which type of connector is used on 10Base2 networks?

a. SC

b. BNC

c. RJ-45

d. RJ-11

ANS.(b)

54. What is the maximum distance of single-mode fiber (SMF)?

A. 300 meters

B. 500 meters

C. 2 km

D. 850 meters

ANS.(c)

55. Which cable type is immune to outside interference and crosstalk?

a. Thinnet

b. Thicknet

c. Twisted-pair

d. Fiber optic

ANS.(d)

56. What is the distance limitation of 10Base2, or thinnet?

a. 100 meters

b. 185 meters

c. 250 meters

d. 500 meters

ANS.(b)

57. Which cable type sends the signal as pulses of light through a glass core?

a. Thinnet

b. Thicknet

c. Fiber optic

d. CAT 5e

ANS.(c)

58. What is the distance limitation of 10Base2, or thinnet?

a. 100 meters

b. 185 meters

c. 250 meters

d. 500 meters

ANS.(b)

59. What is the maximum distance of CAT 3 UTP cabling?

a. 100 meters

b. 185 meters

c. 250 meters

d. 500 meters

ANS.(a)

60. Which network topology requires the use of terminators?

a. Bus

b. Star

c. Mesh

d. Ring

e . Wireless

ANS.(a)

Last updated

Was this helpful?