Looks like no one added any tags here yet for you.
What is the name of the executable for Microsoft Backup for DOS? a. MSBKUP.EXE b. MSBACKU.EXE c. BACKUP.EXE d. MWBACKUP.EXE
B
____________ offers the longest possible segment length. a. Coaxial cable b. Unshielded twisted-pair cabling c. Fiber-optic cabling d. Shielded twisted-pair cabling
C
What is another name for IEEE 802.3? a. CSMA/CD LAN b. Logic link control c. Token passing d. Token Ring LAN
A
The Hardware Compatibility List (HCL) lists hardware that has been tested with Windows
If your hardware is not on the HCL, what should you do? a. Reload your Windows 95 or 98 drivers. b. Contact the vendor and get updated Windows 2000 drivers. c. Reinstall the device. The correct driver will load automatically. d. Download an updated HCL from Microsoft, which will then include the drivers for any device on your PC.
B
What is the public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission? a. PGP b. SSL c. SSH d. Kerberos
A
What device on a network acts as an intermediary between a client and server and evaluates the requests according to rules? a. Antivirus b. Router c. Proxy server d. Anti-spyware
C
Which one of the following terms is not used to describe a network's physical layout? a. map b. topology c. diagram d. architecture map
D
Which one of the following authentication protocols supports the use of smart cards? a. EAP b. SPAP c. MS-CHAP d. MS-CHAP2
A
A physical star topology consists of several workstations that branch off a central device called a: a. hub b. repeater c. brouter d. router
A
What is the net bit rate (maximum) as specified by 802.11n? a. 11Mbit/s b. 54Mbit/s c. 600Mbit/s d. 6000Mbit/s
C
The connection-oriented, reliable transport of data takes place at what layer of the OSI model? a. transport b. network c. data-link d. session
A
You are the administrator of a network with 250 nodes. You want to implement video conferencing, but your network is performing poorly. Through network analysis software, you determine that the hub is the bottleneck. Which device should you install in place of the hub to alleviate the bottleneck? a. a transceiver b. a repeater c. a switch d. aMAU
C
Which connector should you use with fiber optic cabling? a. RJ-45 b. ST c. BNC d. AUI
B
Which benefit does starting Samba on a UNIX/LINUX server provide? a. Web access b. Telnet access c. Print server access d. Secured server access
C
Which fiber connector uses a twist-type attachment mechanism? a. SC b. ST c. MT-RJ d. FC
B
Your company is planning to rebuild its network infrastructure. You are asked to provide a topology that will be scalable and easy to troubleshoot. Which topology should you recommend? a. ring b. mesh c. bus d. star
D
You are assisting your senior technician in extending the Denmarc for a new DSL circuit. Which tool should you use? a. punch down tool b. bit error rate tester c. multimeter d. optical tester
A
What is the process of changing the configuration of an A, B, or C network so that it treats the network and node number differently? a. proxying b. reverse lookup c. routing d. subnetting
D
Which network transmission medium is limited to 10 megabits per second and can support cable segments up to a maximum of 100 meters? a. 10Base-F b. 10Base-2 c. 10Base-T d. 10Base-5
C
Which one of the following applications, if running on a server, would most likely require more RAM than the minimum specified by the NOS vendor? a. MS SQL Server b. Netscape Navigator c. Telnet d. MS-DOS
A
You must propose a cabling scheme for your company's new location. Several departments are located on the same floor with a maximum distance of 61 meters (200 feet) between departments. You want a relatively easy, low-cost installation with simple connections. Which type of cabling would you propose? a. unshielded twisted-pair b. fiber-optic c. yhicknet d. yhinnet
A
You are experiencing connection problems with the fiber-optic cables in the 100BaseFX LAN that you administer. What could be the cause of this problem? a. The cable length between workstations and hubs is less than 1,000 meters. b. The cable is experiencing problems with ESD. c. The cable is not properly terminated. d. The cable in the plenum is too close to an energy source.
C
Twisted pair cabling is commonly terminated with what type of connector: a. RJ-45 b. BNC c. RJ-11 d. RJ-12
A
To use file level security you should have what file system installed? a. FAT b. FAT32 c. CDFS d. NTFS
D
Twisted pair cable installations are covered by what wiring standard? a. TIA/EIA568 b. IEEE 802.3 c. TAI/EAI568 d. IEEE 802.1
A
What is 10Base5 considered? a. category 5 UTP b. thinnet c. thicknet d. category 6 UTP
C
___ is not a fiber-optic connector. a. MT-RJ b. RJ-45 c. SMA d. MIC
B
With respect to structured cabling, a(n) ____ is the location of the cabling and equipment that connects a corporate network to a third-party telecommunications provider. a. work area b. equipment room c. cable plant d. entrance facility
D
The job of the ____ to convert bits into signals for outgoing messages and signals into bits for incoming messages. a. MAC sublayer b. data link layer c. LLC sublayer d. physical layer
D
___ frames are created for any computers on a network that "listen" to a shared network address. a. Group b. Multicast c. Broadcast d. Unicast
B
___ is a name-to-address resolution protocol that functionally operates at the Session layer of the OSI model. a. ICMP b. ARP c. DHCP d. DNS
D
Class ____addresses are reserved for experimental use and cannot be used for address assignment. a. D b. A c. C d. E
D
A form of ____is used in wireless LANs with an access point. a. polling b. CSMA/CA c. demand priority d. switching
B
____ defines Gigabit Ethernet over fiber-optic cable. a. 1000BaseO b. 1000BaseC c. 1000BaseX d. 1000BaseF
C
____ uses specially shielded, balanced, copper jumper cables. a. 1000BaseTX b. 1000BaseSX c. 1000BaseCX d. 1000BaseT
C
A V.90 modem uses a technique called ____that digitizes analog signals. a. MP3 b. PCM c. WAV d. CODEC
B
One of the most widely used high-speed digital lines is the ____, a DDS technology that uses two two-wire pairs to transmit full-duplex data signals at a maximum rate of 1.544 Mbps. a. ADSL b. T1 c. T3 d. ISDN
B
Most NICs in computer workstations today are connected to what type of bus architecture? a. AGP b. firewire c. PCI d. USB-x
C
When a computer boots up and tries to obtain an IP address automatically, but does not find a DHCP server, what addressing is used? a. APIPA b. ICANN c. IP d. DNS
A
The main active directory unit that is the building block of the structure allowing for distribution of resources and administration is: a. domain b. forest c. tree d. organizational unit (OU)
D
A network that has a large capacity, covers a large geographical area and combine multiple communication channels is known as what type of a network? Α) ΜΑΝ B) SAN C) WAN D) LAN
C
What is the most common method for encrypting TCP/IP communications? A) SSL B) PGP C) Kerberos D) HKEY
A
What type of firewall inspects each packet passing through the network and accepts or rejects it based on user-defined rules? A) packet filter B) proxy server C) circuit-level gateway D) application gateway
A
Which of the following terms refers to a permanent IP address assignment from a DHCP server? A) reservation B) relay C) scope D) lease
A
Jeff just moved to a new apartment and is looking for a company to contact for Internet service. He is willing to pay a monthly fee, but in return he needs a modem and also an e-mail address. Who would Jeff contact for this service? A) DNS B) ISDN C) ISP D) IEEE
C
Which of the following is a non-routable protocol? A) NetBEUI B) TCP/IP C) DHCP D) AppleTalk
A
The term for a computer with no network is: A) client/server B) peer to peer C) null D) standalone
D
A Digital Subscriber line is best described as: A) an always on services made up of copper phone lines that are not used by voice. B) using existing cable lines that converts a digital signal to analog when sending data. C) a solution for those who live in remote areas because it connects to satellites. D) a dedicated line that connects directly from the ISP to your home/business without sharing.
A
Which networking tool would be used to attach an RJ-45 connector to a CAT5e networking cable? A) punch down tool B) crimper C) DHCP too! D) reflectometer
B
Which of the following is not a network operating system? A) Windows NT B) Windows for Workgroups C) Windows 2000 D) Linux
B
Which of the following is not a way an operating system allocates disk space for files. A) sporadic allocation B) contiguous allocation C) linked allocation D) indexed allocation
A
What is the purpose of the event viewer tool? A) Schedule programs or other tasks to run automatically. B) Used to check the main log files in Windows Server. C) View advanced system information about the CPU, memory, hard disk, and network performance. D) View and edit group policy security settings.
B
A roaming mandatory profile must be renamed with what extension: A).DAT B).TMP C) .MAN D) .TXT
C
Which of the following are the recommended steps that should be taken for worm attack mitigation? A) containment, quarantine, inoculation, treatment B) containment, inoculation, quarantine, treatment C) quarantine, containment, inoculation, treatment D) inoculation, containment, quarantine, treatment
B
HTTPS communication traffic is on what TCP port? A) 443 B) 21 C) 23 D) 80
A
Which of the following would be classified as an access attack? A) Trojan horse B) zero-day attack C) Dos D) password attack
D
Which of the following reconnaissance attack tools are used to search the publicly available IP addresses to identify the addresses that are active? A) ping sweeps B) packet sniffers C) port scans D) Internet queries
A
The main network cable to which branch networks may be connected is called the: A) backbone B) express cable C) trunk D) thick cable
A
What networking device determines the path that a message should take through a network? A) switch B) firewall C) router D) bridge
C
Related to security, DES is: A) Denial of Electronic Service B) Digital Encryption Security C) Data Encryption Standard D) Disk Encryption Standard
C
Which of the following does not describe characteristics of baseband technologies? A) Baseband can send and receive at the same time if the transmission media is split into two channels. B) Baseband transmissions occupy the entire bandwidth of network media C) Baseband typically uses digital signaling over a single wire. D) Baseband transmissions cannot be sent and received at the same time.
A
You've been asked by your supervisor to research new possible operating systems for the ABC Company using one of their current PCs. The company is running a Windows OS, but would like to look at Linux and Mac operating systems as possibilities. Which method listed below would be the best option to test out the systems? A) Create a virtual machine to run and test the software. B) Use a dual boot configuration to choose the test OS at startup. C) Research what you can on the Internet. D) Uninstall Windows and install each of the test systems separately.
A
Which of the following is not a characteristic that applies to UDP? A) Lost or corrupt packets are not resent. B) Packet delivery is guaranteed. C) Packets are treated independently. D) Packet delivery is not guaranteed.
B
What is the generic designator for any of several digitally multiplexed communications carrier systems which has a basic unit called the DSO, which has a transmission rate of 64kbit/s? A) cable modem B) T-Carrier C) DSL D) ISDN
B
The Internet uses the network protocol called A) CSMA/CD B) HTTP C) TCP/IP D) FTP
C
Your Company is requesting that the company network is segregated logically in terms of the departments they deal with. There are three main departments: manufacturing, accounting and sales. The data intended for manufacturing must not reach accounting or sales. Which solution would best fit this request? A) VLANS B) Routing C) RMON probe D) SNMP
A
What specialized United Nations agency provides developing countries with technical expertise and equipment to advance their technological standard of living? Α) ΝΑΤΟ B) ITU C) ISO D) ICANN
B
Which of the following statements is true about single-mode fiber optic cable? A) Single-mode has higher attenuation than multimode. B) Single-mode has a larger core. C) Single-mode is typically used in LANs or small distances. D) Single-mode provides the highest throughput.
D
What type of RJ45 UTP cable is used between switches? A) crossover with a router in between the two switches B) crossover with a CSU/DSU C) straight-through D) crossover cable
D
Which command can be used on a Window computer to test the connectivity of the local machine? A) Ping -192.168.0.1 B) Ping - C) Ping 127.0.0.1 D) Ping -loopback
C
The process of distributing network traffic across numerous servers is called: a. Multiloading b. Fault Tolerance c. Load Balancing d. Distribution
C
Which network is confined to a relatively small space? a. LAN b. WAN c. WiMAX d. GSM
A
The process of determining the path a packet will take on a network is known as: a. segmentation b. routing c. construction d. reassembly
B
How does a proxy server improve web performance for clients on a private LAN? a. It enables users to save frequently used bookmarks in a shared location. b. It expedites incoming data to clients because it replaces client IP addresses. c. It enables incoming requests to bypass the firewall. d. It holds web requests in a cache so that subsequent requests for those pages can be fulfilled locally.
D
Where in Netscape Communicator could you enter the IP address of a proxy server? a. Edit, Preferences, Advanced, and Proxies b. Edit, Preferences, Advanced, and Cache c. Tools, Internet Options, Connections, and Settings d. Tools, Internet Options, and Proxy Server
C
A model for computing where some computers request services and other computers respond to requests for services is called: a. request/response b. host/response c. thin client d. client/server
D
All IIS information on a Windows server is stored in the: a. hive b. .Conf file c. index d. metabase
D
The process of configuring numerous servers to functions as one is called: a. Domaining b. Multiloading c. Clustering d. Balancing
C
Why would it be necessary to include details about an organization's service agreements with telecommunications carriers in disaster recovery plans? a. The carriers also may be affected by the disaster and may owe the organization compensation for downtime. b. The carriers may decide to void their agreement after the disaster. c. The agreements may change as a result of the disaster. d. They will have to supply the organization with new equipment.
A
A client tries to log in to her ISP and is repeatedly prompted to enter her user name and password. Which one of the following are the most likely causes? a. IPX/SPX is not installed. b. She is using an incorrect user name and password combination. c. The modem is not functioning. d. NetBEUI is not installed.
B
Which one of the following is a potential disadvantage to using Telnet to remotely log in to a router? a. It requires a high-bandwidth connection. b. It is not very efficient. c. It is not compatible with all types of router operating systems. d. It is not secure.
D
What specialized United Nations agency provides developing countries with technical expertise and equipment to advance their technological standard of living? a. ICANN b. ITU c. ANSI d. ISO
B
Each network node has a network address and a __________address. a. IP b. IPX c. MAC d. PCD
C
The ability to use names to connect to network resources is controlled by: a. NAME b. DHCP c. NetBIOS d. NETSTAT
C
The type of group that has a GUID attached to it so that you can use it to assign rights and permissions is called: a. security b. permissions c. object d. distribution
A
A set of rules that determines how communications will take place on a network is called: a. ICANN b. Internetwork c. protocol d. IEEE
C
You can start programs if they don't have a shortcut on the desktop or in the programs submenu by: a. typing cmd in the Start Run box b. using the Run dialog box and typing in the name of the program c. using the Shut Down command d. typing cmd in the Start box and then the program
B
What form of Internet access allows the user's computer or router to use an attached modem connected to a telephone line to dial into an ISP's node to establish a modem-to- modem link? a. Cable Modem b. DSL c. Dial-up d. Satellite Internet
C
What is a server service that allows RRAS servers to delegate responsibility for inbound authentication to a central server and can be used to authenticate users at switch ports or wireless access points? a. DNS b. RIM c. DHCP d. RADIUS
D
When using a firewall to guard a private LAN from Internet-based intrusion, how can you still allow authorized users to access the network from home? a. Open access to all the router's ports b. Allow some users to bypass the firewall c. Allow access to select ports based on incoming IP address d. Apply time of day restrictions to some of the firewall's ports
C
At the telephone exchange, what terminates the DSL where another frequency splitter separates the voice band signal from the data signal? a. DSLTA b. FiOS c. DSMOD d. DSLAM
D
Which describes wiring that connects workstations to the hub room? a. patch b. backbone c. horizontal wiring d. harness
C
Typically routers on a LAN are used to separate networks into: a. subnets b. VPNs c. e-mail addresses d. DNS zones
A
Which one of the following layers does the UDP correspond to? a. transport b. physical c. network d. session
A
What type of firewall inspects each packet passing through the network and accepts or rejects it based on user-defined rules? a. application gateway b. circuit-level gateway c. proxy server d. packet filter
D
Which topology is the easiest to modify? a. bus b. star c. ring d. mesh
B
Which one of the following is an example for distance vector protocol? a. RIP b. AppleTalk c. IPX/SPX d. OSPF
A
What is the 802.11 standard? a. Wireless LAN b. Wi-Max c. Token Ring d. Ethernet
A
Which type of cabling has the largest installation base? a. coaxial b. twisted-pair c. wireless d. fiber-optic
B
What is generally the rated speed for T1 and PRI ISDN service? a. 512Kbit/sec b. 256Kbit/sec c. 1.544Mbit/sec d. 3 Mbit/sec
C