1.
Which of these unshielded twisted pair cabling can you use for 10baseT networks with transmission speeds of up to 10 mbps?
Correct Answer
A. Cat 3
Explanation
cat 4 and ibm type 3 cable are primarily used for token ring networks.
cat 5 cable supports speeds up to 100mbps.
2.
A network of 10 or fewer workstations connected by cable for the direct sharing file and hardware resources is which type of network?
Correct Answer
B. Peer based
Explanation
peer based network has a practical limit of 10 computers that are connected by cabling for sharing files and hardware.
3.
A network bridge operates at which layer of the osi model?
Correct Answer
B. Data link
Explanation
bridges and switches operate at the data link layer.
4.
The connectivity device that is used to provide flexibility in cable management and troubleshooting is the?
Correct Answer
C. Patch panel
Explanation
the patch panel is used primarily to organize cabling as well as to provide ease of cable management and troubleshooting.
5.
The connectivity device that passes an amplified signal to each of its ports is a?
Correct Answer
C. Active hub
Explanation
an active hub regenerates the signal before passing it along to its ports.
6.
Which of the following network protocols is not routable?
Correct Answer
D. Betbeui
Explanation
netbeui in non routable.
7.
Each network interface card is uniquely identified by its?
Correct Answer
B. Mac address
Explanation
the device driver for a network interface card works at a sublayer of the data link layer called the media access control (mac)sublayer, which is why the physical address of a nic is called its mac address.
8.
The topology most commonly used with a token ring network is the?
Correct Answer
D. Star-ring
Explanation
pure ring topology is rarely implemented. instead, star-ring is used.
9.
The primary purpose of a network is?
Correct Answer
C. Share resources
Explanation
although the other choices seem like a valid reason. the best and primary answer is to share resources.
10.
Which of the following enables users to access files and to share a printer on a peer-peer network?
Correct Answer
A. Share level security
Explanation
users can designate folders and devices as shared devices on their workstations and make them available to network users.
11.
The recommended upper limit for the number of workstations that can be included in a peer-peer network is?
Correct Answer
B. 10
Explanation
beyond 10 workstations, the administration tasks become too much for most users.
12.
An Ethernet network is a ______network?
Correct Answer
B. Passive
Explanation
because its workstations only "hear" messages and do not regenerate them.
13.
The method used to control the transmission of signals to a ring network is?
Correct Answer
C. Token passing
Explanation
the node in possession of the token is the only one that can send a message. the other workstations must wait until the token is available.
14.
Thin coaxial has a max segment length of how many meters?
Correct Answer
A. 185
Explanation
the max segment length of thin coaxial cable is 185 meters.
15.
What is the minimum standard for a 10baseT network?
Correct Answer
C. Cat 3
Explanation
cat 3 is a 4 wire cable supporting bandwidth up to 10 mbps and is the minimum standard for a 10baseT network.
16.
The base portion of the designation 10baseT refers to?
Correct Answer
B. Baseband
Explanation
baseband transmission is a digital signal;broadband is an analog signal.
17.
Stp cable is most commonly found in which type of network?
Correct Answer
D. Token ring
Explanation
shielded twisted pair cable is commonly used in token ring networks.
18.
This coaxial cable commonly uses which type of connector?
Correct Answer
B. Bnc
Explanation
thin coax uses bnc-t connectors.
19.
A fast Ethernet standard that uses four wire utp cable is?
Correct Answer
D. 100baseT4
Explanation
fast Ethernet is any of the 100baseX standards. 100baseT4 uses four wire cable to implement fast Ethernet.
20.
Which of the following characteristics apply to fddi (choose 3)
Correct Answer(s)
A. 100mbps
B. Fiber optic backbone technology
D. Implements two network rings
Explanation
fddi implements two counter rotating rings, fiber optic backbone technology, and has speeds up to 100mbps.
21.
Which cable media uses modulated pulses of light to transmit data?
Correct Answer
D. Fiber optic
Explanation
fiber optic uses modulated beams of light to transmit data.
22.
Which of the following is NOT a type of windows nt printer configuration?
Correct Answer
C. Domain
Explanation
printers can be attached to the server, directly to the network,or to a workstation (remote printer)
23.
Microsoft's version of net ware' ipx protocol is called?
Correct Answer
C. Nwlink
Explanation
Microsoft reverse engineered ipx/spx to create its own version called nwlink.
24.
What mechanism is used by nfs to provide network file services?
Correct Answer
D. Rpc
Explanation
rpc enables users to access remote system files and resources.
25.
Of the osi model layers what is level 6?
Correct Answer
A. Presentation layer
Explanation
The correct answer is the presentation layer. In the OSI model, the presentation layer is responsible for formatting, encrypting, and compressing data to be sent across the network. It ensures that the data is in a format that can be understood by the receiving application. This layer also handles data encryption and decryption, as well as data compression to optimize the transmission.
26.
On the osi model what is level 4?
Correct Answer
A. Transport layer
Explanation
The correct answer is the transport layer. The OSI model is a conceptual framework that defines the functions of a communication system. It is divided into seven layers, with each layer responsible for a specific set of tasks. The transport layer, which is level 4 of the OSI model, handles the reliable delivery of data between two endpoints. It ensures that data packets are delivered in the correct order and without errors. This layer also provides mechanisms for flow control and error recovery, making it essential for establishing a reliable communication channel.
27.
On the osi model what is level 5?
Correct Answer
A. Session layer
Explanation
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role and interacts with the layers above and below it. Level 5 in the OSI model is the session layer. This layer is responsible for establishing, managing, and terminating sessions between applications. It ensures that data is transferred smoothly and error-free by handling synchronization, checkpointing, and recovery of data exchange. The session layer also manages security and authentication processes during communication sessions.
28.
On the osi model what is level 2?
Correct Answer
A. Data link layer
Explanation
The correct answer is the data link layer. In the OSI model, level 2 is known as the data link layer. This layer is responsible for the reliable transmission of data between two nodes on a network. It handles error detection and correction, as well as the formatting and organization of data into frames for transmission. The data link layer also manages access to the physical network medium and controls how data is sent and received over the network.
29.
On the osi model what is level 1?
Correct Answer
A. pHysical layer
Explanation
The correct answer is physical layer. In the OSI model, the physical layer is the lowest level and is responsible for the actual transmission of data bits over a physical medium. It deals with the electrical, mechanical, and procedural aspects of the physical connection between devices. This layer defines the physical characteristics of the network such as cables, connectors, and signaling. It ensures that data is transmitted reliably and accurately across the network.
30.
What hardware devices does the data link layer deal with? there are two.
Correct Answer(s)
A. Bridge
B. Switch
Explanation
The data link layer of a network deals with the bridge and switch hardware devices. A bridge connects multiple network segments together and forwards data packets between them based on their MAC addresses. A switch, on the other hand, is an advanced version of a bridge that can handle higher data rates and has more ports. It also uses MAC addresses to forward data packets but can do so simultaneously to multiple devices. Both bridge and switch devices play a crucial role in managing and directing network traffic efficiently.
31.
What hardware devices does the network layer deal with? there are two
Correct Answer(s)
A. Router
B. Brouter
Explanation
The network layer deals with the management and routing of data packets across a network. A router is a hardware device that operates at the network layer and is responsible for directing network traffic between different networks. It uses routing tables to determine the best path for forwarding packets. On the other hand, a brouter is a hybrid device that combines the functionalities of a router and a bridge. It can operate at both the network layer and the data link layer, allowing it to handle both IP-based networks and non-IP-based networks.
32.
What hardware devices does the transport layer deal with?
Correct Answer
A. Gateway
Explanation
The transport layer of the network protocol stack is responsible for managing the end-to-end communication between two devices. It ensures reliable and efficient data transfer by breaking the data into smaller segments and reassembling them at the receiving end. A gateway is a hardware device that acts as an interface between different networks. It can connect networks with different protocols or architectures, allowing data to flow between them. Therefore, the transport layer may interact with gateways to facilitate communication between devices on different networks.
33.
The osi model layer that formats data packets and provides for error checking and correction is?
Correct Answer
B. Data link
Explanation
the data link layer prepares network packets for their trip across the data links network. The data link protocols may vary but would include the data being sent, information, an identifier for the sending machine, an identifier for the receiving machine, and error correction mechanism such as cyclic redundancy check.
34.
The network layer device that determines and sends packets over the most efficient route available is a?
Correct Answer
D. Router
Explanation
routers route packets over networks on the network layer.
35.
What is IRQ 3 used for?
Correct Answer
A. Com2 or com4
Explanation
IRQ 3 is used for the communication ports COM2 or COM4. These ports are commonly used for serial communication in computer systems. IRQ (Interrupt Request) is a signal that allows devices to request attention from the CPU. In this case, IRQ 3 is specifically assigned to handle communication for COM2 or COM4 ports, which are used for connecting external devices such as modems, printers, or serial mice to the computer.
36.
What is IRQ 13 used for?
Correct Answer
A. Math co processor
Explanation
IRQ 13 is used for the math co-processor. The math co-processor is a specialized chip that assists the main processor in performing complex mathematical calculations. By using IRQ 13, the computer can efficiently handle mathematical operations and improve overall performance.
37.
What is IRQ 6 used for?
Correct Answer
A. Floppy disk controller
Explanation
IRQ 6 is used for the floppy disk controller. This means that when a device connected to the floppy disk controller requires attention or wants to communicate with the computer's CPU, it will send an interrupt signal on IRQ 6. This allows the CPU to prioritize and handle the request from the floppy disk controller in a timely manner.
38.
What is port address 270h commonly used for?
Correct Answer
A. Lpt3
Explanation
Port address 270h is commonly used for the parallel port LPT3. The LPT3 port is typically used for connecting printers or other parallel devices to a computer. The port address 270h refers to the hexadecimal address where the parallel port is located in the computer's memory. This address allows the computer to communicate with the connected device and send or receive data.
39.
What is port address 280 commonly used for?
Correct Answer(s)
A. Network interface card
B. Nic
Explanation
Port address 280 is commonly used for network interface card (NIC). A NIC is a hardware component that allows a computer to connect to a network. It serves as the interface between the computer and the network, enabling the transmission and reception of data. Port addresses are numerical values assigned to specific services or processes running on a computer, and port 280 is specifically associated with NIC functionality.
40.
What is port address 3f8h commonly used for?
Correct Answer
A. Com1
Explanation
Port address 3f8h is commonly used for COM1. COM1 is the first serial communication port on a computer and is typically used for connecting devices such as modems, mice, and serial printers. The port address 3f8h is a hexadecimal representation of the base input/output address for COM1.
41.
What is port address 2f8h commonly used for?
Correct Answer
A. Com2
Explanation
Port address 2f8h is commonly used for com2. This means that com2, also known as the second communication port, is assigned to the port address 2f8h. The port address is a hexadecimal value that represents the specific location in the computer's memory where data can be sent or received through the com2 port.
42.
The maximum segment distance of a cable medium is associated with?
Correct Answer
B. Attenuation
Explanation
attenuation is the distance point in the cable where the signal starts becoming unrecognizable.
43.
What standard does 802.3u define?
Correct Answer
A. Fast Ethernet
Explanation
802.3u defines the standard for fast Ethernet. Fast Ethernet is a network technology that provides data transmission speeds of up to 100 megabits per second (Mbps). It is an extension of the original Ethernet standard (802.3) and is commonly used in local area networks (LANs) to support faster and more efficient data transfer. The 802.3u standard specifies the physical and data link layer protocols for fast Ethernet, ensuring compatibility and interoperability between different network devices.
44.
What standard does 802.5 define and its network?
Correct Answer
A. Data link layer for token ring networks
Explanation
The correct answer is the data link layer for token ring networks. The 802.5 standard defines the protocol and specifications for the data link layer in a token ring network. This layer is responsible for managing the transmission of data over the network, including addressing, error detection, and flow control. Token ring networks use a token passing mechanism to control access to the network, ensuring that only one device can transmit data at a time. The 802.5 standard provides guidelines for implementing this token passing mechanism and ensuring reliable and efficient communication within a token ring network.
45.
What standard does 802.11 define?
Correct Answer
A. Wireless networking
Explanation
The standard 802.11 defines wireless networking.
46.
Packets on the network layer are addressed using?
Correct Answer
A. Network address
Explanation
network (ip) addresses are used to reference locations beyond the local network.
47.
Which 2 mechanisms make internetwork possible? (choose 2)
Correct Answer(s)
C. Routers
D. Ip addressing
Explanation
routers and ip addressing create and designate internetworks.
48.
The number of routers or routable network devices a packet must pass through to reach its destination is called the?
Correct Answer
C. Hop count
Explanation
one hop is one packet passing through one router.
49.
What is the common distance-vector routing algorithm that uses route attributes to determine route efficiencies?
Correct Answer
B. Rip
Explanation
rip(routing information protocol) uses route attributes to determine which route is the best at a given instance for a packet.
50.
The standard naming convention used to specify a path to a network resource is?
Correct Answer
D. Unc
Explanation
unc (universal naming convention) is used as a standard for creating path names for network devices.