Sie sind auf Seite 1von 11

1 .

Check which one is not a 10 Mbps Ethernet topology:

10BaseFL

10Base2

10Base5

10Base100

2 . The IEEE protocols at the physical Layer are:(Check more than one)

802.3

802.4

802.5

802.2

3 . Check which one is not a valid Network Protocol?

IPX

NWLink

NetBEUI

ATP

4 . Check which one is not a standard Stack?

The ISO/OSI protocol suite.

Digital DECnet.

Apple Apple Talk.

Data Link Stack.

5 . Which of the following describes password-protected shares?

Passwords are assigned to resources on a network.

Passwords are assigned on a user-by-user basis.

Provides the highest level of security on a network.

Easiest way to assign group privileges.

6 . Check which one is not a valid Transport Protocol?

TCP

SPX

NetBEUI

IP

7 . What is X.25?

It is a set of protocols developed by Xerox for their Ethernet LANs.

It is a set of protocols incorporated in a packet switching network made up of switching services.

It is a relatively small and fast protocol on a LAN.

It is the equivalent to IPX/SPX and is developed by Microsoft.

8 . What is 100VG AnyLAN?

It combines elements of both Ethernet and Token Ring.

It combines elements of both Ethernet and Star.

Both of the above.

None of the above.

9 . Network Adapter card drivers reside in:

Network Secuirt Layer

Media Access Control Sub layer

Both of the above

None of the above

10 . Which are termed as Data Link Layer's sublayers?

Logical Link Control

Media Access Control

Security Network Control

None of the above.

11 . Check which peripheral does not require any driver?

Input devices(mouse, etc.)

SCSI and IDE disk controllers

Network Adapter Cards.

None of the above.

12 . What does CRC Stands for?

Cyclical Response Checking

Cyclical Redundant Checking

Cyclical Redundancy Check

None of the above.

13 . What exactly are Protocols?

They are the technical operation performed at user level.

They are rules and procedures for communicating.

Both of the above.

None of the above.

14 . What is Demand Priority?

New Access Method designed for the 100 Mbps Ethernet standard called 100VG-AnyLAN.

New Access Method designed for the 10 Mbps Ethernet standard called 100VG-AnyLAN.

New Access Method designed for the 50 Mbps Ethernet standard called 100VG-AnyLAN.

None of the above.

15 . An Ether net frame can be between:

64 and 1516 bytes long.

64 and 1510 bytes long.

64 and 1518 bytes long.

None of the above.

16 . What is a 5-4-3 rule?

thinnet can combine as many as five cable segments, cpnnected by four repeaters, but only three segments can have stations attached.

thicknet can combine as many as five cable segments, cpnnected by four repeaters, but only three segments can have stations attached.

Both of the above

None of the above.

17 . Which of the following statements describes SNMP?

Agents monitor users activity for efficiency ratings.

Agents monitor network traffic and behaviour in key network components.

Both of the above.

None of the above.

18 . Analog lines, the standard voice lines used in telephone communications, are also known as:

dial-up lines

direct digital lines.

dedicated lines.

None of the above.

19 . An advnatage of the dual ring topology is:

increased bandwidth

redundancy.

Both of the above.

None of the above.

20 . Which of the following access methods listens to the cable for network traffic before sending data?

CSMA/CD.

CSMA/CA.

Token Passing.

Polling.

21 . An important difference between bridges and routers is that:

bridges can choose between multiple paths.

bridges support Ethernet but not Token Ring environments.

Routes support Ethernet but not Token Ring environments.

Routers can choose between multiple lines.

22 . How many categories do an IEEE 802 standard have?

Ten

Eleven

Twelve

Seven

23 . Packets of Data are divided into components, which are: (Check more than one)

Header

Numbers

Data

Trailer

24 . T1 technology offers:

point to point, full duplex transmission at 1.544 Mbps.

an inexpensive way to replace T3 lines.

a permanent link to copper-based ATM and SONET carriers.

transmission speeds of 45 Mbps.

25 . Token Passing prevents data collision by:

Using code to steer tokens around each other.

Having multiple tokens take alternate routes.

Allowing only one computer at a time to use the tokens.

Using zones to control network traffic congestion.

END

Das könnte Ihnen auch gefallen