You are on page 1of 4

1)Please see the Diagram, and identify which LAN technology is being used?

1. Ethernet
2. Token Ring
3. Mesh
4. ATM

2)Can a repeater enable communication between a Ethernet LAN and a


Token Ring LAN?
Yes
No

3)Which of the following media types is most susceptible to EMI?

A. Fiber Optic

B. STP

C. Co-axial

D. UTP

4)What layer of the OSI model does a Router work at?


Physical
Connection
Application
Network
Does not exist

5)Which layer in the OSI model is responsible for error handling?


Session
Network
DataLink
Transport
None of the Above

6)Which layer in the OSI model is responsible for data compression?


Application
Presentation
System
Transport
None of the Above

7)What is multiplexing?
Transmitting information via a modem
Combining signals and transmitting them together
Sending multiple separate network cables
Using a router to send information over multiple networks
A fictitious term.

8)What is the maximum data throughput on Category 4 cable?


5 Mbps
10 Mbps
20 Mbps
2 Mbps
55 Mbps

9)What is the most common network medium?

Fiber
Copper
Gold
Silver
None of the Above

10)Which type of connector assembly is responsible for


twisted-pair?
AUI
BNC
BBC
RJ-55
RJ-45

11)A broadcast message is an example of which dialog control


method?

A. Half duplex
B. Baseband
C. Broadband
D. Simplex
E. Full duplex

1 Which of the following are connectionless protocols? (Choose the


2) three best answers.)

A. IP
B. SPX
C. IPX
D. UDP

13)What is a router?

A A hardware device that connects dissimilar networks, such as Cat 5


. cabling and FDDI
B A network host that reads the source and destination addresses in
. the packet header and makes decisions about where to forward the
packet
C A network host that can forward LAN-based email messages onto
. the Internet, after repackaging them into the SMTP format
D A software system that can translate between dissimilar networks
. such as Ethernet and Token Ring
14)Which of the following network classes is reserved for multicast
addresses only?

A. Class A
B. Class B
C. Class C
D. Class D
E. Class E

15)Which of the following statements describes a


star topology?

A. Less reliable than a ring topology


B. All network computers get equal network access
through the use of CSMA/CD
C. Requires more cabling than a bus topology
D. More difficult to troubleshoot than a ring
topology

16)Given the choices below, which would best be described as a Class


C address range?

A. 111-126
B. 128-191
C. 192-223
D. 224-239

17)What is a crossover cable typically used for?

A. Perform NIC loopback tests


B. Extend the maximum cable length
C. Connect two hubs together
D. Transmit test data to devices
E. Connect a computer to a switch

18)How can you protect your private network from the Internet?
[Choose the two best answers]

A. Firewall
B. Password security
C. MAC port grouping
D. VLAN

19)What device is used to connect a computer with another computer


through the telephone system?

A) Modem

B) Network interface card


C) Telephone adapter

D) Telephone transceiver

You might also like