1.
You've had your computer for a while, and you begin to notice changes. They were small @ first; a different desktop pic, some peach fuzz on the monitor, colored text on your word documents, a deeper voice tells you “you've got mail”. Suddenly your baby fresh pc has changed into a punked out teenager. You suspect outside influence. What utility can you run to see if someone is connected (via tcp/ip) to your pc?
Correct Answer
C. Netstat
Explanation
Netstat is a utility that can be used to see if someone is connected to your computer via TCP/IP. It displays active network connections, listening ports, and other network statistics. By running netstat, you can identify any suspicious connections or unauthorized access to your computer.
2.
You run winipcfg on your XP OS. What happens?
Correct Answer
B. Nothing.
Explanation
Running winipcfg on XP OS does not cause any explosion or any physical damage to the PC. Instead, it opens a graphical user interface that displays the current TCP/IP network configuration values, such as IP address, subnet mask, default gateway, and DNS servers. It does not provide information about packet hops or visit from sasquatch.
3.
Nestat -r command does what?
Correct Answer
A. Displays the routing table, plus the current active connections.
Explanation
The nestat -r command displays the routing table, which contains information about how network traffic is directed between different networks. It also shows the current active connections, providing information about the network connections that are currently established on the system. This command is useful for troubleshooting network connectivity and understanding how network traffic is being routed.
4.
What command Displays a list of the computer's currently active NETBIOS settings(identifying remote computers by name), their current status, and the amount of data transmitted to and received from each system?
Correct Answer
E. Nbtstat -s
Explanation
The correct answer is nbtstat -s. This command displays a list of the computer's currently active NETBIOS settings, including the names of remote computers, their current status, and the amount of data transmitted to and received from each system.
5.
You are a network guy for a medium sized buisness. Your boss has octuplets, and decides to dump them on you one day when the nanny calls in sick; your boss just thinks you play on the internet all day and wants to get their money's worth. The 8 babies r swinging from the hanging lamps, chewing cables, throwing poop @ monitors; it's a mad house. You finally manage to corral them all into a baby safe environment(the closet) and begin cleaning up the mess. Your boss comes back from lunch and demands to know what happened to the internet. What command will tell you where there is a loose connection?
Correct Answer
B. Tracert
6.
What port does RDP(remote desktop protocol) use?
Correct Answer
D. 3389
Explanation
RDP (Remote Desktop Protocol) uses port 3389. This is the standard port that allows users to remotely access and control a computer or server over a network. By using this port, RDP establishes a secure and encrypted connection between the client and the host machine, enabling users to interact with the remote desktop as if they were physically present at the machine.
7.
____# designates the # assigned to the 1st Byte of data in the current message. Used to identify the initial _____# thats gonna be used in the upcoming data transfer.
Correct Answer
A. SEQ#
8.
You need to send an e-valentine to your half sister in Utah. It's been uncomfortable because you hooked up the last time you saw her. You don't want to give your half sister the wrong impression, but you don't wanna let on to your mother that the relationship has gone beyond “i'll show you mine if you show me yours”. You want to use something that might fail, but at least shows that you made the effort. What protocol is NOT guaranteed to get the message there?
Correct Answer
C. UDP
Explanation
UDP (User Datagram Protocol) is not guaranteed to get the message there because it is a connectionless protocol that does not provide reliability or error checking. It does not guarantee that the message will reach its destination or that it will be received in the correct order. In contrast, IP (Internet Protocol), TCP (Transmission Control Protocol), NDS (Novell Directory Services), and DNS (Domain Name System) provide mechanisms for reliable and ordered delivery of data.
9.
What is the IRQ# for the keyboard?
Correct Answer
A. 1
Explanation
The IRQ# for the keyboard is 1. IRQ stands for Interrupt Request and it is a signal sent to the processor by hardware devices to request attention. In the case of the keyboard, IRQ 1 is commonly used. This means that when a key is pressed on the keyboard, an interrupt signal is sent to the processor on IRQ 1 to notify it that input is available.
10.
What is the IRQ# for the math co-processor?
Correct Answer
D. 13
Explanation
The IRQ# for the math co-processor is 13.
11.
Your mother calls you every morning for a month to tell u that it's a bad idea to start your own business; what with the econonmy the way it is. But you decide to anyway, cuz you just can't live in her basement anymore. And since you've begun a daily coffee clatch, a Java Hut sounds right up your alley. Of course all your buddies can't hang out without the internet, what would they do all day, talk to each other? No no no, you need the internet; but you're concerned that all your equipment will be on the same frequency as your WLAN. What IEEE standard will this not be a problem for?
Correct Answer
A. 802.11a
Explanation
The correct answer is 802.11a. This standard operates on a different frequency band than WLAN, specifically the 5 GHz band, which reduces the likelihood of interference between the equipment and the WLAN.
12.
You live on a hundred acres of property. You want to build a shed 400 meters away from the house, so you can watch porno in peace; and you don't want your wife to know. What kind of cable can you use that will have a max of 100Mbps?
Correct Answer
C. 100BASE-FX
Explanation
The correct answer is 100BASE-FX. This type of cable is a fiber optic cable that can support a maximum speed of 100Mbps. It is suitable for long-distance communication, making it ideal for connecting the shed that is 400 meters away from the house. Fiber optic cables are also known for their high bandwidth and resistance to interference, which would help ensure a stable and reliable connection for watching content in peace.
13.
The first 6 hexadecimal digits from a mac address come from ________
Correct Answer
A. The manufacturer
Explanation
The first 6 hexadecimal digits from a MAC address are known as the OUI (Organizationally Unique Identifier) and they are assigned to the manufacturer of the network interface card (NIC). This identifier helps in identifying the manufacturer or vendor of the device based on its MAC address. It allows for the differentiation of devices from different manufacturers in a network.
14.
You've been receiving weird emails; something about somone sniffing your old shoes. You track down the IP address, but the shoe sniffer has been using an internet cafe to masquerade his identity. What protocol is capable of this?
Correct Answer
C. NAT
Explanation
NAT (Network Address Translation) is the protocol capable of masquerading the identity of the shoe sniffer by hiding their actual IP address behind the IP address of the internet cafe. NAT allows multiple devices on a local network to share a single public IP address, thereby providing a layer of anonymity and security for the individual devices.
15.
______Encrypts data btwn web browsers and web servers, also uses public key infrastructure(PKI)
Correct Answer
C. SSL
Explanation
SSL (Secure Sockets Layer) is a cryptographic protocol that encrypts data between web browsers and web servers. It ensures secure communication by using public key infrastructure (PKI) to authenticate the identity of the server and establish an encrypted connection. SSL is widely used to secure online transactions, sensitive information, and communications over the internet.
16.
SLIP offers link configuration, testing, error detection, and compression.
Correct Answer
B. False
Explanation
The statement is false because SLIP (Serial Line Internet Protocol) does not offer link configuration, testing, error detection, or compression. SLIP is a simple protocol used for transmitting IP packets over serial connections, but it does not provide any of the mentioned features.
17.
Everyday around lunch (at work) your wireless goes out on your laptop. you know it's because Suzy from accounting insists on using her old microwave for an hour everyday! You've tried explaining it to her nicely, that it's knocking everyone (who uses wireless) off the internet, but she doesn't believe you, and you don't have the power to make her stop. what tool could you use to prove to her boss that her microwave is causing problems for the office?
Correct Answer
D. Spectrum analyzer
Explanation
A spectrum analyzer is a tool that can be used to analyze and measure the frequency spectrum of signals. In this scenario, the spectrum analyzer can be used to detect and analyze the interference caused by Suzy's microwave on the wireless network. By using the spectrum analyzer, you can provide visual evidence to Suzy's boss, showing the spikes or disturbances in the frequency spectrum that coincide with the time when Suzy uses her microwave. This evidence can help convince her boss that the microwave is indeed causing problems for the office's wireless network.
18.
_____is a link state routing protocol and NOT usually used in large enterprise networks
Correct Answer
E. None of the above
Explanation
RIP is a dynamic routing protocol used in local area networks; it can be used for WANs but it doesn't work well.
OSPF is a link state routing protocol generally used for large enterprise networks.
SSH is A suite of protocols used to log into another computer on the network, xecute commands, and secure transfer of files.
SSL encrypts data btwn web rowsers and webs servers.
19.
________is a transparent public key encryption technology that works in conjunction with NTFS permissions to grant and deny users access to files and folders in Windows NT (excluding NT4), 2000 and XP (excluding XP Home Edition) operating systems.
Correct Answer
B. EFS
Explanation
EFS (Encrypting File System) is a transparent public key encryption technology that works in conjunction with NTFS permissions to grant and deny users access to files and folders in Windows NT, 2000, and XP operating systems. It provides an additional layer of security by encrypting files and folders, ensuring that only authorized users with the correct encryption key can access the data. This helps protect sensitive information from unauthorized access or theft.
20.
What kind of connector is this?
Correct Answer
C. Mt-rj fiber connector
Explanation
The correct answer is mt-rj fiber connector. MT-RJ stands for Mechanical Transfer Registered Jack, which is a type of fiber optic connector that is used for both single-mode and multi-mode fiber optic cables. It is smaller in size compared to other fiber optic connectors and has a duplex configuration, meaning it can transmit and receive signals simultaneously. The MT-RJ connector is commonly used in telecommunications and data communication applications.
21.
Which protocol works w/ping and tracert; and is used for error reporting, error control, and info packets for IP protocol/IP maintenance traffic.
Correct Answer
A. ICMP
Explanation
ICMP (Internet Control Message Protocol) is the correct answer. ICMP is a protocol that works with ping and tracert commands. It is primarily used for error reporting, error control, and sending informational packets for IP protocol and IP maintenance traffic. ICMP allows network devices to send error messages and control messages to indicate issues or provide additional information about the network. It is an integral part of the Internet Protocol Suite and is used by network administrators for troubleshooting network connectivity issues.
22.
In an inebriated haze of misjudgment, you allowed some very naughty pictures to be taken of you; with a donkey...and cheetos...at the washington monument. anyway, u need to retrieve them from a unix computer( you have a windows pc) before they are uploaded to the internet for your whole family to see; yes even granma can use the internet. will SAMBA, using SMB, allow you to delete these files from the UNIX directory, or will you forever hold your head in shame?
Correct Answer
A. Yes
Explanation
The given answer "yes" suggests that SAMBA, using SMB, will allow you to delete the files from the UNIX directory. SAMBA is a software suite that allows Windows systems to access UNIX directories and files using the SMB (Server Message Block) protocol. Therefore, with SAMBA and SMB, you should be able to access the UNIX computer from your Windows PC and delete the files before they are uploaded to the internet.
23.
What Is an open standard for authenticating users who r dialing up to a network and provides verification.
Correct Answer
B. RADIUS
Explanation
RADIUS (Remote Authentication Dial-In User Service) is an open standard used for authenticating users who are dialing up to a network and provides verification. It is a client/server protocol that allows remote access servers to communicate with a central authentication server to verify user credentials. RADIUS is commonly used in network access control systems to manage user authentication, authorization, and accounting. It provides a secure and reliable method for users to connect to a network and ensures that only authorized users are granted access.
24.
What allows an organization to present itself to the Internet with far fewer IP addresses than there are nodes on its internal network. (choose all that apply)
Correct Answer(s)
A. NAT
B. Proxy server
C. Firewall
Explanation
NAT (Network Address Translation) allows an organization to present itself to the Internet with fewer IP addresses by translating internal private IP addresses to a single public IP address. This allows multiple devices on the internal network to share the same public IP address. A proxy server acts as an intermediary between clients and the Internet, allowing the organization to present itself with a single IP address while handling requests on behalf of the clients. A firewall filters network traffic and can also be used to hide internal IP addresses from the Internet. RAS (Remote Access Service) and RDP (Remote Desktop Protocol) are not directly related to presenting an organization to the Internet with fewer IP addresses.
25.
What exposes properties from both circuit switched and small packet switched networking?
Correct Answer
C. ATM
Explanation
ATM (Asynchronous Transfer Mode) is the correct answer because it combines properties from both circuit switched and small packet switched networking. ATM is a cell-based switching technology that provides both connection-oriented (circuit switched) and connectionless (packet switched) services. It uses fixed-size cells to transmit data, allowing for efficient use of network resources and providing both guaranteed bandwidth (circuit switched) and flexibility in data transmission (packet switched). ATM is commonly used in telecommunications networks and is known for its ability to support a wide range of applications with different quality of service requirements.