You are on page 1of 7

1.

A node within a local area network (LAN) must have a network interface device and a:
a. Network account
b. Resource to share
c. Table of all network nodes
d. Host address

2. This question requires that you evaluate the undelined text to determine if it is correct
A/an virtual private network (VPN) protects a network’s perimeter by monitoring traffic as it
enters and leaves.
Select the correct answer if the undelined text does not make the statement correct. Select “No
change is needed” if the underlined text makes the statement correct.
a. Firewall
b. Extranet
c. Intranet
d. No change is needed.

3. For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Yes No

A wireless bridge connects Ethernet-based devices to the network y o


A wireless bridge increases the wireless signal stregth of the access point y o
Wireless bridges always work in pairs y o

4. On a wireless router, an SSID is the default Administrator account


Select the correct answer if the underlined text does not make the statement correct. Select “No
change is needed” if the underlined text makes the statement correct.
a. WAN IP address
b. No change is needed
c. Gateway IP address
d. AP brodcast ID

5. What is private network that allow organizations to exchange data?


a. Intranet
b. Ethernet
c. Extranet
d. Internet

6. A university has network links between various locations.


Where would a T3 connection be appropriate?
a. Main campus to a large satelite campus
b. Computer lab PC to lab printer
c. Library laptop PC to Internet
d. Server to network in the main campus server room
7. You work at a coffee shop. Your supervisor asks you to help set up a computer network
The network needs to have the following items.
 A public facing web server
 A Wi-Fi network for customers
 A private network for the point of sale terminals
 An office PC
 A file print server
 A network printer
You need to set up a perimeter network to protect the network.
Which two items should you include in the perimeter network? (Choose two.)
a. Point of sale terminals
b. Network printer
c. Wi-Fi network
d. File server
e. Web server

8. Match the networking topologies to ther corresponding characters. To answer, drag the
appropiate topology from the column on the left to its characteristic on the right. Each topology
may be used once, more than once, or not at all. Each correct match is worth one point.
Topologies Answer Area
Star (1) (1) Each computer is connected by a single cable.
Mesh (3)(5) (2) Each workstation acts as a reapeater.
Ring (2) (3) Each computer is connected to every other computer.
(4) There is a central connectivity device
(5) Each mode is connected so exactly two other nodes.

9. Attenuation in a wireless network signal is a result of


a. Distance from the access point.
b. Interference from cellular phones.
c. Number of wireless nodes connected.
d. Encryption of the signal

10. Two companies want to share data by using the internet


a. Ethernet
b. Parimeter
c. Extranet
d. Intranet

11. Which two of the following are connectivity options for wide area networks (WANs)? (Choose
two.)
a. Leased line
b. Dial-ip
c. Ethernet
d. Token ring
12. In addition to swiching. Multiplayer swithes also:
a. Provide layer 3 routing functions
b. Support 10 MB, 100 MB and 1 GB local area network (LAN) ports.
c. Operate by using only layer 1 and 2 protocols
d. Interface with CAT3, CAT5, CAT5e and fibel optics

13. You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters.
An interfance exists along the path of each drop.
You need to ensure that interference is reduced.

Which cable type should you use?


a. UTP Cat6
b. UTP Cat5e
c. STP Cat5e
d. Cat3

14. Which of the following represents a Media Access Control (MAC) address?
a. 05:35:AB:6E:A1:25
b. GV:ZC:KK:DK:FZ:CA
c. 255.255.255.0
d. 127.0.0.1

15. The function of a router is to:


a. Provide IP subnet masks for hosts
b. Brodcast routing tables to clients
c. Store tables for name resulotion
d. Forward traffic to other networks

16. A network device that associate a Media Acccess Control (MAC) address with a port is a:
a. Router
b. Hub
c. DSL modem
d. Switch

17. This question requires that you evaluate the underlined text to determine if it is correct.
Every router today is TCP/IP enabled, which is an industry-standard protocol that you use on the
Internet and for local addressing.
Select the correct answer if the underlined texdt does not make the statement correct. Select “No
change is needed” if the underlined text makes the statement correct.
a. FTP
b. SNMP
c. HTTP
d. No change is needed
18. What is the maximum cable legth for a single Cat5 UTP cable run?
a. 285 feet/86.87 meters
b. 600 feet/182.88 merers
c. 432 feet/131.67 meters
d. 328 feet/99.97 meters

19. What are two characterstics of fiber optic cable? (Choose two)
a. Support splicing
b. Requires a polish for end connectors
c. Requires metal conduit
d. Conducts electricity

20. What are two differences between switches and hubs? (Choose two.)
a. Switches sent data to all of the computers that are connected to them do efficiency
b. Switches are slower than hubs because of the extra addressing functions that switches
perform
c. Switches are capable of sending and receiving data at the same time
d. Switches identifiy the intended destination of the data that they receive

21. One reason to incorporate VLANs in a network is to:


a. Reduce the number of brodcast domains.
b. Reduce the number of nodes in a brodcast domain
c. Increase the number of available Media Access Control (MAC) address
d. Inscrese the number of available IP adressess

22. Which protocol can be used to encrypt packets on the internet


a. SNMP
b. TFTP
c. HTTP
d. HTTPS

23. Match each protocol to its description. To answer, drag the appropiate protocol from the column
on the left to its description on the right. Each protocol may be used once, more than once, or not
at all. Each correct match is worth one point
Protocols Answer Area
TCP (2) (1) Connectionless, message-based protocol with best-effort
service
ICMP (2) Conncetion-oriented protocol with guarandeed service
ARP (3) (3) Resolved IP address to MAC address
UDP (1)
IGMP

24. For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
Yes No
IPv6 addresses are 64-bit in length o n
IPv6 addresses are divided into 8-bit blocks y o
IPv6 addresses are represented by dotted-decimal notation o n

25. For each of the following statements, select Yes if the statement is true. Otherwise, select No,
each correct selection is worth one point.
Yes No
HTTP, TELNET, FTP, and SMTP protocols operate on Layer 7 of the OSI model Y o
Layer 4 of the OSI model controls dialogue between computers y o
Layer 3 of the OSI model controls routing between network devices y o

26. You receive a call from a family member who is unable to connect to a game server. You learn
that the server’s IP is 172.16.2.11
To help, you ping the server and receive the information shown in the following image

Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point

The server [answer choice] your ping requests


- Did not return
- Did return
- May or may not have returned

The server [answer choice]

- Up
- Down
- Unknown
27. Match each IP address to its coresponding IPv4 address class. To answer, drag the appropiate IP
address from the column on the left to its IPv4 address class on the right. Each IP address may be
used once, more than once, or not at all. Each correct match is worth one point.
IP Addresses Answer Area
133.234.23.2 (2) (1) Class A
224.100.20.3 (4) (2) Class B
201.111.22.3 (3) (3) Class C
64.123.12.1 (1) (4) Class D

28. A user reports that she cannot connect to network resources from a computer on the company
network. The user was able to connect to the network resources yesterday.
You verify that the user’s computer is properly physically connected to the network. You discover
that the computer’s IP address is 169.254.48.97
You need to restore access to network resources.
What should you do next?
a. Finish the cache on the DNS server
b. Check your router’s current routing tables
c. Verify that the DHCP service is available
d. Reset the user’s password on the server

29. A computer that has an IP address of 169.254.0.1 cannot access the network
Which of the following services should you confim is available?
a. TFTP
b. WINS
c. DHCP
d. DNS

30. The top-level domain of www.adventeruworks.com is:


a. www
b. adventureworks.com
c. adventureworks
d. com

31. This question is requires that you evaluate the underlined text to determine if it is correct
According to the OSI model, encryption takes place on the transport layer.
Select the correct answer if the underlined text does not mek the statement correct. Select “No
change is needed” if the underlined text makes the statement correct.
a. Presentation
b. Application
c. No change is needed
d. Network

32. This question is requires that you evaluate the underlined text to determine if it is correct
The process of replicating a zone file to multiple DNS servers is called zone replection
Select the correct answer if the underlined text does not make the statement correct. Select “No
change is needed” if the underlined text makes the statement correct.
a. Zone transfer
b. Zone synchronization
c. No change is needed
d. Start of autority

33. You are setting up a network computer game. You need to open up ports in the firewall so your
friends can join the network.
Which command displays the ports that your computer is listening for?
a. Netstat
b. Nbstat
c. Nslookup
d. Ping

34. What type of DNS record maps host names to addresses?


a. Cannonical (CNAME) DNS record
b. Service (SRV) DNS record
c. Host (A) DNS record
d. Mail Exchanger (MX) DMS record

You might also like