1.
Which of the following refers to IEEE standards for Gigabit Ethernet?
Correct Answer
C. 802.3z
Explanation
802.3z refers to IEEE standards for Gigabit Ethernet. The 802.3z standard specifies the physical layer and media access control protocols for Ethernet networks operating at a data rate of 1 gigabit per second. It defines the requirements for high-speed Ethernet connections, allowing for faster data transmission and improved network performance.
2.
What company developed 100VG-AnyLan based on IEEE 802.12 specifications?
Correct Answer
C. Hewlett-Packard
Explanation
Hewlett-Packard developed 100VG-AnyLan based on IEEE 802.12 specifications.
3.
What type of DNS record translates an IP address to a hostname?
Correct Answer
B. PTR
Explanation
A PTR record, also known as a Pointer record, is a type of DNS record that is used to translate an IP address to a hostname. This record is commonly used for reverse DNS lookups, where the IP address is queried to find the associated hostname. By using a PTR record, network administrators can easily identify the hostname of a specific IP address, which can be useful for various purposes such as troubleshooting network issues or verifying the legitimacy of incoming connections.
4.
What network adapter mode captures and processes all network traffic?
Correct Answer
A. Promiscuous Mode
Explanation
Promiscuous mode is a network adapter mode that captures and processes all network traffic. In this mode, the network adapter listens to all network packets, regardless of their destination, allowing the user to monitor and analyze all network activity. This mode is commonly used for network troubleshooting, packet sniffing, and network security monitoring. It enables the user to capture and analyze network packets that are not intended for their specific device, providing a comprehensive view of the network traffic.
5.
Which standard was designed to provide high-speed serial communications using modems?
Correct Answer
B. V.90
Explanation
V.90 is the correct answer because it is a standard specifically designed to provide high-speed serial communications using modems. It was introduced in 1998 and offered a maximum download speed of 56 kbps, making it one of the fastest modem standards at the time. V.90 allowed for faster internet connections and improved data transfer rates, revolutionizing the way people accessed and shared information online.
6.
What do switches employing the Spanning-Tree Protocol use to communicate?
Correct Answer
B. BPDUs
Explanation
Switches employing the Spanning-Tree Protocol use BPDUs (Bridge Protocol Data Units) to communicate. BPDUs are messages that switches send to each other to exchange information about the network topology and to determine the best path for forwarding network traffic. By exchanging BPDUs, switches can detect and prevent loops in the network, ensuring a loop-free and redundant network infrastructure.
7.
What technology allows 24 DS0 channels to be combined into a single DS1 or T1 channel?
Correct Answer
C. Time-Division Multiplexing
Explanation
Time-Division Multiplexing is the technology that allows 24 DS0 channels to be combined into a single DS1 or T1 channel. This technique divides the available bandwidth into multiple time slots, with each slot being assigned to a different channel. By rapidly switching between these channels, data from multiple sources can be transmitted over a single communication line, maximizing the utilization of the available bandwidth.
8.
What does the acronym "MAN" stand for?
Correct Answer
A. Metropolitan Area Network
Explanation
The acronym "MAN" stands for Metropolitan Area Network. A Metropolitan Area Network is a computer network that spans a larger geographic area than a local area network (LAN) but smaller than a wide area network (WAN). It typically covers a city or a metropolitan area and is used to connect various LANs and other networks within the same region.
9.
Which networking technology uses dual counter-rotating token-passing ring networks?
Correct Answer
C. FDDI
Explanation
FDDI (Fiber Distributed Data Interface) is the correct answer because it is a networking technology that uses dual counter-rotating token-passing ring networks. FDDI is a high-speed LAN technology that uses optical fiber to transmit data. It employs a dual-ring architecture where data is transmitted in one direction on one ring and in the opposite direction on the other ring. This dual counter-rotating ring design provides redundancy and fault tolerance, ensuring reliable data transmission.
10.
What does "OC" stand for in an OC-3?
Correct Answer
D. Optical Carrier
Explanation
"OC" stands for "Optical Carrier" in an OC-3. The term "Optical Carrier" refers to a standardized unit of transmission capacity in fiber optic networks. In this context, OC-3 represents a specific transmission rate of 155.52 Mbps (megabits per second). The use of "Optical Carrier" highlights the use of optical fibers for transmitting data, emphasizing the technology and medium involved in the communication process.
11.
What standard developed by Novell and Apple is similar to the NDIS specification?
Correct Answer
B. Open Data-link Interface (ODI)
Explanation
Open Data-link Interface (ODI) is the correct answer because it was a standard developed by Novell and Apple. ODI was designed to provide a common interface for network drivers, similar to the NDIS (Network Driver Interface Specification) developed by Microsoft. It allowed different network protocols, such as IPX/SPX and AppleTalk, to be supported by the same network interface card. Therefore, ODI is similar to the NDIS specification in terms of providing a standardized interface for network drivers.
12.
What organization is credited with developing the OSI Reference Model in 1974?
Correct Answer
B. ISO
Explanation
ISO, the International Organization for Standardization, is credited with developing the OSI Reference Model in 1974. The OSI (Open Systems Interconnection) Reference Model is a conceptual framework that standardizes the functions of a communication system into seven layers. ISO, being a global standard-setting organization, played a crucial role in establishing this model, which has since become a widely accepted framework for understanding and implementing network protocols.
13.
What is another term for "physical address" on a TCP/IP network?
Correct Answer
B. MAC Address
Explanation
A physical address on a TCP/IP network is commonly referred to as a MAC address. MAC stands for Media Access Control, and it is a unique identifier assigned to network interfaces, such as network cards or Ethernet ports, by the manufacturer. The MAC address is used to identify and communicate with devices on a local network. Unlike an IP address, which can change, the MAC address is permanent and cannot be easily altered.
14.
Which company installed the first commercial 3G (UMTS) wireless network?
Correct Answer
D. Nortel
Explanation
Nortel installed the first commercial 3G (UMTS) wireless network.
15.
What device essentially acts as a hub in a token ring network?
Correct Answer
B. MSAU
Explanation
MSAU stands for Multistation Access Unit, which is a device that essentially acts as a hub in a token ring network. It is responsible for managing the token passing process in the network, allowing devices to transmit data in a sequential manner. The MSAU also provides a central connection point for multiple devices to connect to the network. Therefore, the MSAU is the correct answer for this question.
16.
In which type of switching is the entire packet received and checked before sending it?
Correct Answer
B. Store-And-Forward
Explanation
Store-And-Forward switching is the type of switching where the entire packet is received and checked for errors before it is forwarded to the destination. In this method, the switch buffers the entire packet and performs a CRC (Cyclic Redundancy Check) to verify the integrity of the packet. If the packet is error-free, it is then forwarded to the destination. This method ensures that only error-free packets are transmitted, reducing the chances of data corruption or loss.
17.
Which of the following is a public version of the Server Message Block protocol?
Correct Answer
D. Common Internet File System (CIFS)
Explanation
CIFS is a public version of the Server Message Block (SMB) protocol. It is a network file-sharing protocol that allows users to access and share files and printers across a network. CIFS is commonly used in Windows operating systems and provides a way for computers to access shared resources on a remote server. It enables file and printer sharing, as well as authentication and authorization of users accessing the shared resources.
18.
Which of the following is supported by the SOCKS Proxy Service?
Correct Answer
B. FTP
Explanation
The SOCKS Proxy Service supports FTP. SOCKS is a protocol that allows clients to connect to servers through a proxy server. It provides a flexible and secure way to route network traffic. FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. Since the SOCKS Proxy Service is designed to handle network traffic, it is capable of supporting FTP connections.
19.
What service was needed for Windows NT to access Novell file and print services?
Correct Answer
B. Client Services For NetWare
Explanation
Client Services for NetWare is the correct answer because it is a service that allows Windows NT to access Novell file and print services. This service provides the necessary protocols and components to establish a connection between Windows NT and Novell servers, enabling file and print sharing functionality. It allows Windows NT to access and utilize the resources available on a Novell network, making it an essential service for integrating these two systems.
20.
What Unix command can be used to retrieve user information over a TCP/IP network?
Correct Answer
B. Finger
Explanation
The Unix command "Finger" can be used to retrieve user information over a TCP/IP network. This command allows users to obtain information such as the login name, full name, home directory, and last login time of a specific user on a remote machine. It provides a simple way to gather basic information about users on a network.