1.
What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?
Correct Answer
A. A code set is established.
Explanation
"The more bits that are added to a digital signal, the greater the number of choices to be made. If the sender and receiver arrange these bits in a preset sequence that is understood, a code set is established." Page 1-1
2.
How many possible symbols can 4 bits represent?
Correct Answer
D. 16.
Explanation
"One bit can indicate only two possible messages. When a second bit is added, the number of possible messages increases to four (22). A further increase to 3 bits increases the possibilities to eight different choices (23). The number of bits (called X) available can have 2 to X possible combinations to represent
information. For example, a code with 8 bits (28) can represent 256 possible messages or symbols. Generally 8 bits of data refers to a unit of data transmission known as a “byte.”" Page 1-2
3.
In networking, a byte is identified as a/an
Correct Answer
C. Octet.
Explanation
"Normally bytes are 8 (binary) data bits in length. However, since some systems use bytes that are longer than 8 bits, generally, the term octet is used when referring to networking." Page 1-2
4.
What organization sets important computer networking wiring standards for residential and commercial network cabling?
Correct Answer
A. Electronic Industries Alliance (EIA).
Explanation
"An important computer networking function of the EIA is the series of standards for residential and commercial network cabling that are collectively known as the Electronic Industries Alliance/ Telecommunications Industry Association (EIA/TIA) wiring standards." Page 1-3
5.
What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?
Correct Answer
A. 568A.
Explanation
"EIA/TIA 568A& B: Commercial Building Telecommunications Cabling Standard." Page 1-4
6.
Which of the following is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system?
Correct Answer
A. E-carrier.
Explanation
"E-carrier is the digital telecommunications services backbone system of Europe–a format standardized by the International Telecommunication Union (ITU)." Page 1-4
7.
There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the
Correct Answer
B. Institute of Electrical and Electronics Engineers (IEEE).
Explanation
"IEEE is a worldwide nonprofit association of technical professionals that promotes the development of standards and acts as a catalyst for new technology in all aspects of the engineering industry, including computer networking, telecommunications, electric power, aerospace, and consumer electronics." Page 1-5
8.
A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the
Correct Answer
B. Institute of Electrical and Electronics Engineers (IEEE).
Explanation
"A major contribution of the IEEE in the field of computer networking is Project 802; a collection of standards for local area network (LAN) architectures, protocols, and technologies. The 802 specifications define the operation of the physical network components—cabling, network adapters, and connectivity devices such as routers and switches." Page 1-5
9.
The “parent” organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the
Correct Answer
B. International Telecommunication Union (ITU).
Explanation
"The ITU is the “parent” organization for all other telecommunications organizations. ITU does not usually specify things itself, but merely coordinates the specification work of others. It may set the goals for some standardization work, but local organizations (ETSI, TIA, etc.) often do the actual work. In many cases, ITU works as a catalyst for future standardization work. ITU is a United Nations organization headquartered in Geneva, Switzerland." Page 1-6
10.
What organization is responsible for the X-series and V-series standards?
Correct Answer
D. International Telecommunication Union Telecommunications Standardization Sector (ITU-T).
Explanation
"The ITU-T is responsible for a number of important international networking and communication standards, including the following X and V series standards." Page 1-6
11.
Which series of standards are recommended for data transmission using the telephone network?
Correct Answer
B. V.
Explanation
"The V-series is a code designation used to list the recommendations for data transmission using the telephone network." Page 1-7
12.
The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the
Correct Answer
C. International Organization for Standardization (ISO).
Explanation
"ISO’s major contribution to networking has been the definition of the OSI Reference Model, which is a layered architecture model for communication between open network systems." Page 1-7
13.
Within how many feet of the data communications equipment (DCE) connection does the Electronics Industries Alliance (EIA) RS–232–C standard prescribes bipolar-voltage serial data transmission?
Correct Answer
B. 50.
Explanation
"Normally cable between the two is no longer than 50 feet or 15 meters, but may be longer if load capacitance requirements are met." Page 1-8
14.
Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balanced or unbalanced electrical circuits?
Correct Answer
D. RS–530.
Explanation
"The RS–530 is also based on a 25-pin connection (fig. 1–2). It works in either balanced or unbalanced electrical circuits." Page 1-11
15.
What transmission rates does Electronic Industries Alliance (EIA) RS–530 accommodate?
Correct Answer
B. 20 Kbps to 2 megabits per second (Mbps).
Explanation
"The RS-530 accommodates data transmission rates from 20 Kbps to 2 Mbps; and its maximum distance depends on which electrical interface is used." Page 1-11
16.
What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?
Correct Answer
B. Logical Link Control (LLC) and Media Access Control (MAC).
Explanation
"The IEEE has subdivided the data link layer into two sublayers: LLC and media access control (MAC)." Page 1-14
17.
At what Open System Interconnect (OSI) layer are common data compression and encryption schemes used?
Correct Answer
C. Presentation.
Explanation
"Some examples of presentation layer coding and conversion schemes include common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes." Page 1-15
18.
What Open System Interconnect (OSI) layer is closest to the end user?
Correct Answer
A. Application.
Explanation
"The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application." Page 1-15
19.
In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?
Correct Answer
C. Lowest layer.
Explanation
"With the exception of the layers on each end, any layer in the OSI model communicates with three other OSI layers: the layer directly above it, the layer directly below it, and its peer layer in other networked devices." Page 1-16
20.
Which information unit, whose source and destination are network-layer entities, uses connectionless network service?
Correct Answer
D. Datagram.
Explanation
"The term datagram usually refers to an information unit whose source and destination are network layer entities that use connectionless network service." Page 1-18
21.
What data communication protocol is used to govern the flow and format of information between systems?
Correct Answer
A. Character-oriented.
Explanation
"Character-oriented protocols (COP) use characters and symbols (character code set) to govern the flow and format of information between systems." Page 1-20
22.
In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?
Correct Answer
B. SYN.
Explanation
"Establishes and maintains character synchronization prior to the message block and during transmission. Also used as time fill in the absence of control characters and data." Table on Page 1-21
23.
What data communication protocol is based on bits and the position of the bits?
Correct Answer
B. Bit-oriented.
Explanation
"Whereas COPs are based on characters, bit-oriented protocols (BOP) are based on bits and the position of the bits." Page 1-24
24.
What data communication protocol ensures that the receiving station can distinguish information from garbage?
Correct Answer
D. High-Level Data Link Control (HDLC).
Explanation
"HDLC’s major difference over SDLC is that it ensures that the receiving station can distinguish information from garbage." Page 1-28
25.
A group of computers and associated devices that share a common communications line within a small geographic area is a
Correct Answer
B. Local area network (LAN).
Explanation
"A LAN is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area (for example, within an office building)." Page 1-29
26.
The interconnection of several networks in a city into a single larger network is a
Correct Answer
D. Metropolitan area network (MAN).
Explanation
"A MAN is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large LAN but smaller than the area covered by a WAN. The term is applied to the interconnection of networks in a city into a single larger network." Page 1-29
27.
What type of network connects networks that are typically separated by geographical distances?
Correct Answer
B. Wide area network (WAN).
Explanation
"A WAN is a network that links LANs and MANs by using long-distance communication links that are leased or purchased from a telecommunications company. Long-distance communication links can be described as telephone lines, microwave, or satellite communications. A WAN connects networks that are typically separated by geographical distances. These distances are between two cities within a state, between two states, across a country, or around the world." Page 1-29
28.
What type of network enables a group of two or more computer systems to communicate over the public Internet?
Correct Answer
C. Virtual private network (VPN).
Explanation
"A virtual private network (VPN) provides a private tunnel through a public cloud (the internet). A VPN enables a group of two or more computer systems to communicate over the public internet." Page 1-29
29.
Which type network enables users to share resources, files, and printers in a decentralized way?
Correct Answer
C. Peer-to-peer.
Explanation
"Peer-to-peer networking enables users to share resources, files, and printers in a decentralized way." Page 1-30
30.
What Network layer protocol provides information about how and where data should be delivered, including the data’s source and destination addresses?
Correct Answer
A. Internet protocol (IP).
Explanation
"IP provides information about how and where data should be delivered, including the data’s source and destination addresses." Page 2-2
31.
Which Network layer protocol matches a known internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?
Correct Answer
B. Address Resolution Protocol (ARP).
Explanation
"ARP provides the service of matching a known IP address for a destination device to a MAC address." Page 2-4
32.
Which Network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?
Correct Answer
C. Reverse Address Resolution Protocol (RARP).
Explanation
"The RARP provides the reverse of the ARP service. Rather than finding out the MAC address of a device whose IP address is already known, RARP provides the IP address for a device that knows its own MAC address." Page 2-4
33.
Which Transport layer protocol does not guarantee that packets will be received at all?
Correct Answer
B. User Datagram Protocol (UDP).
Explanation
"UDP is a connectionless transport service. In other words, UDP offers no assurance that packets will be received in the correct sequence. In fact, this protocol does not guarantee that the packets will be received at all." Page 2-6
34.
Which Application layer protocol is used to send and receive files by way of transmission control protocol/internet protocol (TCP/IP)?
Correct Answer
A. File Transfer Protocol (FTP).
Explanation
"File transfer protocol (FTP) is used to send and receive files by way of TCP/IP. In FTP exchanges, a host running the FTP server portion accepts commands from another host running the FTP client portion." Page 2-6
35.
Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?
Correct Answer
B. Trivial File Transfer Protocol (TFTP).
Explanation
"Trivial file transfer protocol (TFTP) is a protocol that enables file transfers between computers, but it is simpler (or more trivial) than FTP. A significant difference between FTP and TFTP is that TFTP relies on UDP at the Transport layer." Page 2-7
36.
Which Application layer protocol is a terminal emulation used to log on to remote hosts?
Correct Answer
A. Teletype Network.
Explanation
"Telnet is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite. Using Telnet, a TCP connection is established and keystrokes on the user’s machine act like keystrokes on the remotely connected machine." Page 2-8
37.
Which Application layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?
Correct Answer
A. Dynamic Host Configuration Protocol (DHCP).
Explanation
"Dynamic host configuration protocol (DHCP) is an automated means of assigning a unique IP address to every device on a network." Page 2-8
38.
Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?
Correct Answer
D. Ping.
Explanation
"Ping is a utility that can verify that TCP/IP is installed, bound to the network interface card (NIC), configured correctly, and communicating with the network. It is often employed simply to determine whether a host is responding (or “up”). Ping uses ICMP services to send echo request and echo reply messages that determine the validity of an IP address." Page 2-9
39.
The physical address of any device on the network is a/an
Correct Answer
D. Media Access Control (MAC) address.
Explanation
"Media Access Control (MAC) address. This is the physical address of any device—such as the NIC in a computer—on the network. The MAC address, which is made up of two equal parts, is 6 bytes long." Page 2-11
40.
What are the two parts to an Internet Protocol version 4 (IPv4) address?
Correct Answer
A. Network and host.
Explanation
"The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet." Page 2-11
41.
What is used on a transmission control protocol/internet protocol (TCP/IP) network to determine which network a computer is on?
Correct Answer
C. Subnet mask.
Explanation
"A computer on a TCP/IP network uses a subnet mask to determine what network it is on and whether a computer that it needs to send data to is located on a local network or on a remote network." Page 2-12
42.
How many subnet bits are required to support 90 subnets on a Class B network?
Correct Answer
C. Seven.
Explanation
http://www.subnet-calculator.com/
43.
How many bits are available for host bits on a Class B network using seven bits?
Correct Answer
D. Nine.
Explanation
http://www.subnet-calculator.com/
44.
What is not a recommendation for planning networks using variable length subnet masking (VLSM)?
Correct Answer
B. Re-address the entire network.
Explanation
"A number of points are worth emphasizing in relation to VLSM:
Start with the shortest mask. Plan the subnets that support the most hosts. This is typically the mask used on most or all of the LAN segments.
Choose one or more available subnets and subnet further. This is sometimes called “subnetting the subnets.” It is important to remember that this can be done only with one or more subnets that have not already been used up.
Aim to use contiguous subnets where possible. Although it is not essential, it certainly makes very good sense to choose a continuous range of addresses and apply a particular mask to them. The advantage of this type of consistency is that it can be determined from the third octet address that this is a LAN segment and also that the mask is 24-bit." Page 2-17
45.
What mechanism allows for easier Internet protocol version 6 (IPv6) address allocations?
Correct Answer
C. Auto configuration.
Explanation
"A problem with a 32 hexadecimal address is assigning them correctly; it’s easy to mistype a character. IPv6 uses dynamic host configuration protocol (DHCP) similar to IPv4 but there’s another option to acquire an IPv6 address, and it is called autoconfiguration. In autoconfiguration, the host appends the prefix information of its closest router to its own unique hardware or media access control (MAC) address to make up the IPv6 address, making it easier to allocate addresses." Page 2-19
46.
Which one of the following is not an Internet protocol version 6 (IPv6) transition approach?
Correct Answer
D. Auto configuration.
Explanation
Pages 2-19 through 2-23
47.
Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue?
Correct Answer
B. Teredo.
Explanation
"Teredo attempts to solve the lack of functionality issue 6to4 has with Network Address Translation (NAT). Tunneling from the hosts presents an issue for NAT: IPv6 packets that are
encapsulated within IPv4 have the Protocol field in the IPv4 header set to 41." Page 2-21
48.
Teredo has four tunneling components. Which one is not one of them?
Correct Answer
D. Teredo agent.
Explanation
"-Teredo client is an IPv6/IPv4 node that supports a Teredo tunneling interface through which packets are tunneled to either other Teredo clients or nodes on the IPv6 Internet (via a Teredo relay). A Teredo
client communicates with a Teredo server to obtain an address prefix from which a Teredo-based IPv6 address is configured or to help initiate communication with other Teredo clients or hosts on the IPv6 Internet.
-A Teredo server is a IPv6/IPv4 node that is connected to both an IPv4 network and a IPv6 network, and acts as a Teredo tunneling interface over which packets are received. The role of the Teredo server is to assist in the address configuration of the Teredo client and to facilitate the initial communication between Teredo clients and other Teredo clients or between Teredo clients and IPv6-only hosts. The Teredo server listens on UDP port 3544 for Teredo traffic.
-A Teredo relay is an IPv6/IPv4 router that can forward packets between Teredo clients on the IPv4 network, using a Teredo tunneling interface, and IPv6-only hosts. The Teredo relay interacts with a Teredo server to help it facilitate initial communication between Teredo clients and IPv6-only hosts. The Teredo relay listens on UDP port 3544 for Teredo traffic.
-A Teredo host-specific relay is an IPv6/IPv4 node that has an interface and connectivity to both the IPv4 Internet and the IPv6 Internet and can communicate directly with Teredo clients over the IPv4 Internet, without the need for an intermediate Teredo relay."Pages 2-21 through 2-22
49.
The combination transmitter/receiver device, in a single package, is called a
Correct Answer
A. Transceiver.
Explanation
"a transceiver is a combination transmitter/receiver in a single package." Page 3-1
50.
What device provides the physical, electrical, and electronic connections to the network media?
Correct Answer
D. Network interface card (NIC).
Explanation
"The network interface card (NIC), as its name suggests, is an expansion card you install in your computer to connect, or interface, your computer to the network. The NICs can be viewed as the actual interface between workstations, servers, clients, and the shared media of the network. These devices provide the physical, electrical, and electronic connections to the network media." Page 3-1 through 3-2