2006 Networking Concepts
2006 Networking Concepts
1) Which of the following statements is not true about Wide Area Networks (WANs)?
A) WANs typically have greater bandwidth capacities than LANs.
B) WANs usually use a router for connectivity.
C) WANs cover larger geographic areas than LANs.
D) WANs typically use public transports for connectivity.
13) Which of the following can be used to reduce broadcasts on the network by separating broadcast domains?
A) Routers
B) Hubs
C) Repeaters
D) Switches
16) Which OSI layer is responsible for defining the format used to exchange data among networked computers?
A) Session
B) Network
C) Presentation
D) Physical
17) Which of the following devices forwards incoming traffic to all ports except for the incoming port?
A) Bridge
B) Repeater
C) Hub
D) Router
18) Which of the following network types use fiber optic cabling?
A) 100BaseTX
B) 1000BaseTX
C) 1000BaseLX
D) 100BaseT
19) Which of the following media types is not susceptible to electrical interference?
A) Coaxial Cabling
B) STP (Shielded Twisted Pair)
C) Fiber Optic
D) UTP (Unshielded Twisted Pair)
20) Which of the following refers to the specification developed by the IEEE for wireless LAN technology?
A) 802.11b
B) 802.4
C) 802.7b
D) 802.3
21) Which of the following protocols is commonly used to retrieve e-mail messages from a server to a client?
A) POP3
B) ICMP
C) SMTP
D) RIP
22) Which of the following protocols is commonly used to send e-mails from one server to another?
A) ICMP
B) SMTP
C) POP3
D) RIP
23) Bridges forward data from one network segment to another by looking at
A) IP addresses.
B) MAC addresses.
C) NetiBIOS names.
D) the number of physical connections to the bridge.
25) A Mesh network topology has what major advantage over other topologies?
A) Speed
B) Redundancy
C) Cost Savings
D) Ease of administration
27) The redirector, which redirects I/O operations to resources on a server, operates at what OSI layer?
A) Application
B) Presentation
C) Session
D) Network
29) Which of the following access methods is associated with Ethernet Networks?
A) CSMA/CA
B) CSMA/CD
C) Token Passing
D) Demand Polling
34) Which of the following fiber devices can act as a router for routable protocols and also act as a bridge for
nonroutable protocols?
A) Router
B) Bridge
C) Switch
D) Brouter
36) To connect two hubs or switches together using UTP, which type of port is typically used?
A) MDI-X
B) MDI
C) MIDI
D) MODE
41) A ______ is used in firewalls to provide a safe area for public data that is not part of the public or private
networks.
A) firewall
B) DMZ
C) proxy server
D) router
42) A CSU/DSU does what function?
A) Acts as translator between a LAN and a WAN
B) Acts as switching device on a LAN
C) Terminates a data signal
D) Routes data
45) File and Print services are handled by what layer of the OSI model?
A) Application
B) Session
C) Presentation
D) Network
47) Windows 95, Windows 98, and MacOS9 are all examples of what?
A) Peer-to-Peer based operating systems
B) Microsoft operating systems
C) DOS based operating systems
D) Server based operating systems
48) In a Windows 2000 network, a _________ is a collection of computers that share a command database and
security policy .
A) cluster
B) workgroup
C) RAID
D) domain
50) On a Windows 2000 domain controller, which of the following can not be found?
A) Local users
B) Local printers
C) Domain users
D) Domain groups
51) In a Novell Netware environment, console utilities are usually implemented through pieces of software called
A) SLMs.
B) TLMs.
C) NLMs.
D) MNMs.
52) In a Windows 2000 network, the default share permissions is set to what?
A) Administrator – Full Control, Everyone – Read, Write, Modify
B) Everyone – Full Control
C) Administrator – Full Control, Everyone - Read
D) Administrator – Full Control only
53) The service required for a system in a Windows Domain to access a resource in a Netware domain is called
A) Gateway Services for Netware (GSNW).
B) Host Services for Netware (HSNW).
C) File and Print Services for Netware (FPNW).
D) Gateway Services for Netware (GSNW).
54) Native Disk Quota support for Microsoft Network Operating Systems began with the
A) Windows 2003 Server.
B) Windows NT Server.
C) Windows NT 3.51.
D) Windows 2000 Server.
55) To allow many workstations to access the Internet through one registered “live” IP address, which service
should be used?
A) Proxy service
B) NAT
C) DNS
D) DHCP
56) To dynamically assign the necessary TCP/IP information for a server or workstation to connect to a network,
which protocol should be used?
A) OPSF
B) DHCP
C) RIP
D) OPSF
59) If you decided to block access to port 53 on your network, what service would you be blocking?
A) SMTP
B) WINS
C) DNS
D) POP3
61) Which of the following switches can be added to the “ping” command to make it run continuously?
A) –t
B) –o
C) –c
D) -w
62) E-mail and FTP work at which layer of the OSI model?
A) Application
B) Presentation
C) Session
D) User
63) Which protocol can be used to transfer a file between a Unix server and a Windows 2000 server?
A) FTP
B) Telnet
C) PPTP
D) PPP
64) Which utility do you use to check the IP configuration on a Windows 95 or 98 workstation?
A) ping
B) ipconfig
C) winipcfg
D) netstat
65) Which of the following networking standards specifies a maximum segment length of 100 meters?
A) 10BaseX
B) 10Base2
C) 10BaseT X
D) 10Base5
69) Which of the following technologies can be implemented on a switch to create multiple separate networks?
A) VLAN
B) Proxy
C) Subnet masking
D) NAS
73) Which of the following services provides name resolution services for FQDNs?
A) ARP
B) DNS
C) WINS
D) DHCP
74) Which of the following network types is easiest to add new nodes to?
A) Ring
B) Star
C) Bus
D) Mesh
77) Which of the following WAN technologies offers speeds as high as 2.4Gbps?
A) ATM
B) SONET
C) Frame relay
D) X.25
79) Given two devices connected to a 100BaseT switch configured for full duplex, what is the maximum throughput
possible?
A) 200Mbps
B) 16Mbps
C) 100Mbps
D) 10Mbps
80) Which of the following authentication systems uses tickets as part of its authentication process?
A) POP3
B) SSL
C) Kerberos
D) HTTPS
83) Which of the following standards uses a dual ring configuration for fault tolerance?
A) FDDI
B) 802.5
C) 802.3
D) 802.2
85) The protocol OSPF is most closely associated with what device?
A) Bridges
B) Routers
C) Hubs
D) Switches
88) Which of the following best describes the function of the default gateway?
A) Allows a single Internet connection to be used by several users
B) Provides the route for destinations outside of the local subnet
C) Used to communicate in a multiple-platform environment
D) Identifies the local subnet and formulates a routing table