Beruflich Dokumente
Kultur Dokumente
Answer: C
# Characteristic of an IEEE 802.3 10BaseT Ethernet network?
1. BNC T-connectors
2. RJ-11
3. UTP
Answer: C
# You suspect a faulty NIC is causing a broadcast storm in a network.What troubl
eshooting tool would you use to locate which computer has the defective NIC?
1. VOM
2. protocol analyzer
3. TDR
Answer: B
# A dial-up protocol that does not support automatic IP addressing using DHCP?
1. PPP
2. DLC
3. SLIP
Answer: C
# Of the two types of routers the one that uses the discovery process to create
its routing table?
1. static
2. dynamic
3. multiplexed
Answer: B
# Your client's NT server has been having trouble booting.Where should you look
first for some answers?
1. performance monitor
2. event viewer
3. SNMP
Answer: B
# Another fast non-routable protocol with low overhead developed by DEC?
1. ATM
2. LAT
3. SPX
Answer: B
# You are hired to setup a 100Mbps Ethernet network for a client in an office th
at already has cat 3 UTP installed.Your client wants to keep the costs to a mini
mum but needs the 100Mbps throughput.What should you recommend?
1. keep the existing cable but purchase 100Mbps hubs
2. keep the existing cable but use 100Mbps patch cable from the wall outlet
3. new cat 5 UTP and if not already installed 100 Mbps hubs and 100 Mbps NICs
Answer: C
# Your client's 10BaseT Ethernet network using NetBEUI wants to access data on a
n IBM mainframe.What device will allow this connection?
1. bridge
2. gateway
3. router
Answer: B
# Of the following protocols which is the fastest?
1. TCP/IP
2. IPX/SPX
3. UDP/IP
Answer: C
# Access to files and folders in Win 2000 is accomplished using ___ ?
1. compression
2. tunneling
3. permissions
Answer: C
# What happens when a device is disconnected from the middle of a BUS network?
1. The hub will propagate error messages to the rest of the network
2. All devices on the network will fail
3. The Server will stop responding to that device
4. Data will not be able to get to devices on the other side of this device
5. If a bridge is on the network, only that segment will be effected
Answer: B
# Why is there a limit to the number of MAUs that can be connected together in a
standard Token-ring network?
1. Too many MAUs would exceed the cable limits imposed by the Token Ring spec
ification
2. Too many MAUs would create to large of a collision domain for communicatio
ns to take place
3. Too many MAUs require more electricity than the devices can support
4. Too many devices connected through MAUs requires more time to get control
of the token that communications becomes unacceptable
5. There is no limit to the number of MAUs a token ring network can support
Answer: D
# How many devices can communicate simultaneously within a Token-ring LAN?
1. One for each MAU on the LAN
2. One
3. Two
4. As many devices as the administrator defines within the NOS
5. Between 1 and 5 if the ring speed is 16mbp/s
Answer: B
# What are three common items that must be configured correctly when installing
a Network Interface Card (NIC)?
1. PCI or ISA slot
2. IRQ setting
3. DMA Address
4. Driver
5. I/O Address
Answer: B,C,D,E
# When troubleshooting connection problems you can confirm that physical layer d
evices are communicating by visually inspecting _______________ on the NIC and h
ub.
1. Cross over cable
2. The Link-Lights
3. The electrical connection
4. The Patch cable
5. The power light
Answer: B
# What is the name of a common test performed on a NIC with vendor supplied diag
nostic software?
1. NIC Test
2. Diagnostic Test
3. PING
4. Loopback
5. NICBack
Answer: D
# Name two driver interfaces that allow a NIC to communicate on more than one pr
otocol.
1. NDIS
2. NetBEUI
3. NetBIOS
4. ODI
5. UNIX
Answer: D,A
# Bridges operate at the _____________ OSI level.
1. The Data-Link Layer
2. Top Layer
3. The Transport Layer
4. The Session Layer
5. The Network Layer
Answer: A
# What bridging method is commonly used in Ethernet with only one bridge.
1. Collision
2. Routing
3. Transparent
4. Spanning Tree
5. Open Shortest Path First (OSPF)
Answer: C
# Where are bridging address tables maintained when using source-route bridging?
1. In routing tables on the hard drive
2. In routing tables in RAM
3. In routing tables in ROM
4. At each PC on the network
5. On special routing devices
Answer: A
# Can switching hubs propagate broadcast packets on the network?
1. Yes
2. No
Answer: A
# How many physical addresses can be assigned to a NIC?
1. One
2. Two
3. Three; One by the IEEE, one by the NIC vendor, and one by the Network Admi
nistrator
4. Depends on the NOS
5. Depends on the NIC driver
Answer: A
# What are the two types of routing connections?
1. Token passing
2. Connectionless
3. Reliable
4. Connection Orientated
5. Unreliable
Answer: D,B
# What type of routing connection would typically fragment data packets?
1. Connection Orientated
2. Cut-Through
3. Reliable
4. Connectionless
5. Static
Answer: D
# What name is given to Novell's client software loaded on the workstation, and
what feature does it provide that earlier versions of the Generic Windows client
do not offer?
1. NETX
2. Client for NetWare Networks
3. Client32
4. Support for NetWare Print Queues
5. Support for NetWare Directory Services
Answer: C,E
# If two computers are assigned the same IP address then ___?
1. neither computer will be able to connect
2. the first computer to sign on will be able to connect the other will not
3. both computers will be able to connect to the local network but not to the
internet
Answer: B
# The physical address assigned by the NIC manufacturer?
1. subnet mask
2. IP address
3. MAC address
Answer: C
# Similar to WINS in that it resolves NetBIOS names into IP address but stores t
his information in a text file?
1. LMHOSTS
2. DLC
3. DNS
Answer: A
# A small peer to peer network uses ___ security?
1. user-level
2. share-level
3. permissions for
Answer: B
# The TCP/IP protocol used on the internet allows for approximately ___ billion
unique IP addresses?
1. 1
2. 4
3. 10
Answer: B
# Records the number of hops and latency of the packet on its way to its destina
tion?
1. IPCONFIG
2. TRACERT
3. PING
Answer: B
# NDIS operates at which layer of the OSI model?
1. presentation
2. data-link
3. network
Answer: B
# When checking the TCP/IP protocol you have just finished installing for connec
tivity the proper first step it to ___?
1. PING another computer on that segment
2. PING 127.0.0.1
3. PING the default gateway
Answer: B
# As data travels down the OSI layers it reaches the ___ layer which is responsi
ble for its bit conversion and actual transmission to other computers?
1. network
2. application
3. physical
Answer: C