CN MCQ All Units 74

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

1. Which type of connector does a 10BaseT Ethernet cable use?

a. BNC
b. RJ-45
c. RJ-11
d. MSAU

2. What is the default subnet mask for Class C network?(multiple choice)

a. 255.0.0.0
b. 255.255.0.0
c. 255.255.255.0
d. /24

Ans: C and D

Which of the following is the standard adopted for Ethernet CSMA/CD by IEEE
Committee?

a. 802.2
b. 802.1d
c. 802.3
d. 802.5

Ans: C

Disk Striping with distributed Parity corresponds to which RAID level?

a. RAID 0
b. RAID1
c. RAID3
d. RAID5

Ans: D

Which of the following are class C IP address

a. 10.10.14.118
b. 135.23.112.57
c. 191.200.199.199
d. 204.67.118.54

Ans: D

You are concerned about security in your organization and decide to implement a secure
password policy. What can you do to make your password policy more secure?

a) Require users to change passwords randomly


b) Set password expiration to 2 days
c) Require passwords with random numbers of characters
d) Require password changes regularly
Ans: D

Which of the following uses FDM (Frequency Division Multiplexing)?

a) Broadband
b) Baseband
c) Both a & b
d) None of the above
Ans: A
A user complains that he can't log onto a server. What troubleshooting steps should you
take to resolve the problem? (Select 3)

a) Ask a user on a remote segment to try and connect


b) Ping the server
c) Ask a user on the same segment to try and connect
d) Replace the NIC
Ans: A,B and C

Mirroring uses what RAID level?

a) 1
b) 3
c) 4
d) 2
ANS: A

A client needs to send email to the mail server. What protocol is used?

a) POP3
b) SNMP
c) SMTP
d) FTP
Ans: C

You install a new virus suite in your network of 120 computers. In the same afternoon, you
configure RAID on one system. You are experiencing system crashes throughout your
network. What can you do to correct the problem?

a) Uninstall the virus suite


b) Get the newest virus update from the vendor
c) Disable the RAID
d) Check the virus vendor for system patches or service packs
Ans: D

You want to check your local TCP/IP connection. How? (Select 2)

a) Ping 127.0.0.0
b) Ping local host
c) Ping Host
d) Ping 127.0.0.1
Ans: B and D

What layer of the OSI model places the signal on the cable?

a) Transport
b) Data link
c) Physical
d) Network
Ans: C

What layer of the OSI model does the Router operate under?

a) Transport
b) Network
c) Internet
d) Data link
Ans: B

Which protocol performs name resolution on a UNIX network?


a) DNS
b) DHCP
c) LMHOSTS
d) WINS
Ans: A

What cable type has a max. length of 185 m?

a) Fiber optics
b) 10base2
c) 10base 5
d) All of the above
Ans: B

Which 802.x is The Logical Link Control related to?

a) 802.1
b) 802.3
c) 802.2
d) 802.4
Ans: C

Email and FTP work at which layer of the OSI model?

a) Data link
b) Transport
c) Application
d) Network
Ans: C
What cable type has a max. length of 500 m?

a) 10 base 2
b) Fiber optics
c) 10 base 5
d) None of the above
Ans: C

You have a 10baseT Ethernet network and want to add one more client. You only have an
old AUI Ethernet port on the card. What network device can you use to adapt the AUI port to
your 10baseT network?

a) Changer
b) Transceiver
c) Media filter
d) Repeater
Ans: B

802.5 is the IEEE standard for what?

a) Ethernet
b) Voice data transmission
c) Token ring
d) Token Bus
Ans: C

Which Internet port does SMTP use?

a) 110
b) 20
c) 80
d) 25
Ans: D

Which two are good password practices? (choose two)

a) Change passwords every 90 days


b) Maintain minimum password length
c) Use only alpha numeric symbols in passwords
d) Keep passwords indefinitely
Ans: A and B

A NIC that has an ST or SC connector on it is an example of?

a) Fiber optic
b) Thin net
c) IR
d) Twisted pair
Ans: a

What device must be installed on a computer to provide it with a physical and electrical
connection to a network?

a) Gateway
b) BNC connector
c) NIC
d) Router
Ans: C

Which type of cable is most likely in use with RJ-45 connectors attached to a computer?
a) 10 Base T
b) 10 Base 5
c) 10 base XL
d) 10 Base 2
Ans: A

What is the common language that computers use to talk with one another on a network?

a) Protocol
b) Client
c) Adaptor
d) Operating system
Ans: A

With respect to the interface network card, what does the term 10/100 refer to?

a) Megabits per second


b) Minimum and maximum server speed
c) Protocol speed
d) A fiber network
Ans: A

The functions of Data link layer are

a) Physical addressing
b) Framing
c) Segmentation
d) Connection control
Ans: A and B
The types of cryptographies are

a) Symmetric
b) Virtual
c) Secure
d) Asymmetric
Ans: A and D

Different types of switching are used by WAN

a) Packet switching
b) Network switching
c) Circuit switching
d) Message switching
Ans: A, C, and D

Followings are the types of wireless standard

a) 802.11
b) 802.11g
c) 802.11n
d) 802.11d
Ans: A, B and C
35. The features of switches are:
a) It has one collusion Domain
b) It uses MAC table for forwarding data
c) It has one Broadcast Domain
e) It works on Physical layer
Ans: B, C
36. APIPA provides the following IP range-
a) 192.168.1.26-192.168.25.162
b) 169.254.0.1-169.254.255.254
c) 10.1.0.1-10.255.255.254
d) None of the above
Ans-B
39. A network device that forwards the data packet is-
a) Router
b) Adapter
c) Hubs
d) Switches
Ans-A
40. ………………assigns IP address automatically on a network.
a) DNS
b) APIPA
c) DHCP
d) WINS
Ans-C

44. What can a crossover cable in an Ethernet network be used to do?


a. Convert from 10 Megabits per second to 100 Megabits per second
b. Connect two network devices without a Hub
c. Test a faulty network card.
d. Improve bandwidth between the server and the workstations

Ans: B
48. You have just installed a new internal PCI modem in your desktop. It will not dial out.
What are the problems?
a. The phone line out of the wall is plugged into the phone port on the modem card
b. The modem has not been set up in control panel properties
c. The phone line is plugged in to the line-in port on the modem card.
d. The port speed is set too high
Ans: A and B
49. Choose three reasons why the networking industry uses a layered model (multiple choice
question)
a. It facilitates systematic troubleshooting
b. It allows changes in one layer to occur without changing other layers
c. It allows changes to occur in all layers when changing one protocol
d. It clarifies how to do it rather than what general function to be done
e. It clarifies what general function is to be done rather than how to do it
Ans: A,B, and E
50. LAN stands for which of the following?
a. Local Area Network
b. Local Arena Network
c. Local Area News
d. Logical Area Network
Ans: A

Which two of the following protocols are used at the Transport layer?
a. ARP
b. UDP
c. ICMP
d. RARP
e. TCP
f. BOOTP
Ans: B and E
52. UDP provides connectionless datagram service.
a. True
b. False
Ans: True
53. Transmission Control Protocol provides Flow Control and Error Checking at transport
Layer
A. True
B. False
Ans: A
54. What are the two functions of Data Link Layer. (multiple choice question)
a. Handles access to shared media
b. Manages protocol access to the physical network medium
c. Provides SAPs for higher level protocols
d. Allows multiple devices to uniquely identify one another on the data link layer
Ans: B and D
55. What is required to support full-duplex Ethernet?(multiple choice question)
a. Multiple paths between multiple stations on a link
b. Automatic sensing operation by all connected stations
c. Loopback and collision detection disabled
d. Full-duplex NIC cards
Ans: D
56. ARP stands for:
a. Address Resolution Phase
b. Address Resolution Protocol
c. Address Recall Protocol
d. ARP Resolution Protocol
Ans: B
57. What is the difference between TCP and UDP?
a. TCP is connection-oriented; UDP uses acknowledgements only
b. TCP is connection-oriented; UDP is connectionless
c. Both TCP and UDP are connection-oriented, but only TCP uses windowing
d. TCP and UDP both have sequencing, but UDP is connectionless
Ans: B
58. Which three of the following are true statements about connection-oriented sessions?
a. The segments delivered are acknowledged back to the sender upon their reception
b. Any segments not acknowledged the are retransmitted by the receiver
c. A manageable data flow is maintained in order to avoid congestion, overloading and
loss of any data
d. Segments are sequenced back into their proper order upon arrival at their destination
Ans: A, C, and D
59. Which of the following is a characteristic of a switch?
a. Switches forward packets based on the IPX or IP address in the frame
b. Switches forward packets based on the IP address in the frame
c. Switches forward packets based on the MAC address in the frame
d. Switches forward packets based only on the IP address in the packet
Ans: C
60. Identify 3 characteristics of a connection-oriented protocol?(multiple choice)
a. Path determination
b. Flow control
c. Acknowledgements
d. Uses hop count as metric
e. 3 step handshake
Ans\:B, C and E
61. Identify the 3 Network layer protocols?
a. NetBios
b. SAP
c. ARP
d. IP
e. RARP
Ans: C, D and E
62. What is the function of the Transport layer and which protocols reside there?
a. MAC addressing – IP
b. Interhost communication - SQL, NFS
c. Best effort Packet delivery - TCP, UDP
d. End-to-end connections - TCP, UDP
Ans: D
63. Identify 3 characteristics of an IP address?(multiple choice question)
a. Contains a network address and a host address
b. 32 bits long
c. Unique to each network
d. Part of the default Cisco configuration
e. Referred to as the hardware address
Ans: A, B and C
64. Which statement is true regarding half duplex?
a. Only works in a point-to-point configuration
b. Allows for transmitting and receiving but not a the same time
c. Allow for transmitting and receiving of data simultaneously
d. Doubles the bandwidth
Ans: B
65. Following are the transport layer protocols____(multiple choice )
a. IP
b. TCP
c. CDP
d. ARP
e. UDP
Ans: B and E
66. The network device required to connect a Token ring network to an Ethernet network?
a. Repeater
b. NIC
c. Router
d. Token Ring to Ethernet translation hub
Ans: C
67. Follwing are true for a MAC address:
a. Burned into the NIC
b. 48 bits long
c. Length is 32 bits
d. Used to deliver the frame to the end device
e. Contains a network portion and a host portion

Ans: A, B,D
68. Ping command is used to:
a. Share routing information with a neighbor router
b. Transmit user data when buffers are full
c. Test connectivity at layer 3
d. Test entire protocol stack
Ans: C
69. Following statements are true for MAC address: (multiple choice question)
a. Contains a network portion and host portion
b. Always assigned by System Administrator
c. 48 bits long
d. Contains a vendor code and serial number
Ans: C and D
70. OSI layer which is responsible for end-to-end connections is:
a. Network
b. Transport
c. Session
d. Data Link
e. TCP
Ans: B
71. Which addresses are INCORRECTLY paired with their class?(multiple choice)
a. 128 to 191, Class B
b. 192 to 223 Class B
c. 128 to 191, Class C
d. 192 to 223, Class C
Ans: B and C
73. Which addresses are INCORRECTLY paired with their class?(multiple choice)
a. 240 - 255, Class D
b. 240 - 255, Class E
c. 224 - 239, Class D
d. 224 - 239, Class E
Ans: A and D
74. Which IP Address Class can have 16 million subnets but support 254 hosts?
a. Class C
b. Class B
c. Class A
d. Class D
Ans: A

You might also like