1. Hypertext mark-up language is used to perform what function? A. surf the web B. build web pages C. protocol of the internet D. access web sites 2. Which of the following permits data to flow in only one direction? A. Simplex B. Half Duplex C. Full Duplex 3. Which device works on the network layer and is capable of selecting multiple paths? A. Repeater B. Gateway C. Hub D. Router 4. Which TCP/IP utility is used to obtain information about network names and their corresponding IP address? A. NetSTAT B. NBTSTAT C. IPCONFIG D. Hostname 5. What utility do you use to find out a host's TCP/IP configuration on a Windows NT4 workstation? A. WINIPCFG B. IPCONFIG C. TRACERT D. NBTSTAT 6. What layer of the OSI model does HDLC reside at? A. Physical B. Data Link C. Network D. Transport 7. You currently have a 10BaseT network operating at 10 Mbps over CAT 5 media. You wish to upgrade to 100BaseT. Which of the following modifications need to be made? A. new NIC B. install fiber cables C. high speed routers D. nothing, 100BaseT runs on CAT 5 8. When can Baud rate and Bit rate (BPS) be used interchangeably? A. never, they are different B. only with data rates less than 1,200 BPS C. always, they are interchangeable D. only with data rates over 1,200 BPS 9. Point-to-Point protocol is used to _____. A. receive email B. assign IP addresses to nodes C. connect a PC to an ISP D. transfer files by copying the file from one system to another 10. What network topology is the most fault tolerant and has the most redundancy? A. Hybrid B. Star C. Mesh D. Ring 11. NT Workstation can function in which of the following environments? A. As a stand-alone workstation B. As a member of a workgroup in a peer-to-peer network C. As a client in a Windows NT domain D. All of the above 12. Which of the following communication systems describes equipment on both ends of the communication link that assume the dual role of transmitter and receiver? A. Half-speed B. Full-duplex C. Simplex D. Half-duplex 13. The wire braid in a coaxial cable serves what purpose? A. Transmits data B. Strengthens the cable C. Grounds out the cable D. Promotes crosstalk 14. _______ refers to any device whose primary purpose is the manipulation or processing of data. A. DCE B. Modem C. DTE D. Token-based system 15. Which of the following is not an application layer protocol? A. Telnet B. STP C. FTP D. TCP 16. Which OSI layer is responsible for forwarding packets to other stations andlogical addressing? A. Addressing B. Networking C. Session D. Physical 17. The functional model of network management defines network components and their relationships. A. True B. False 18. What is the maximum cable segment length of a 10Base2 network? A. 100 meters B. 185 meters C. 500 meters D. 800 meters 19. Which does not have a transceiver on the NIC? A. BNC B. RJ45 C. AUI D. RJ11 20. IP address 132.193.224.1 is in what class of Network? A. A B. B C. C D. D 21. __________ refers to any device directly involved in transmitting and receiving data. A. DTE B. Modem C. Token-based system D. DCE 22. Which type of encoding is the most common in data transmissions? A. ASCII B. EBCDIC C. ASCI D. EBDOC 23. What connector is used in 10Base5 network? A. BNC B. RJ45 C. AUI D. Transceiver 24. UDP is a connectionless and unreliable implementation of TCP. A. True B. False 25. What layer of the OSI model actually places the data onto the cable? A. network B. transport C. physical D. data link 26. Your network has 100 computers connected to the Internet and everyone mustbe able to browsethe Internet. You are concerned with network security and only want to advertiseone IP address onthe Internet. What device can you use? A. Firewall B. Proxy server C. Web server D. Router 27. Which of the following devices will give the entire bandwidth of the network to one part? A. Hub B. Bridge C. Switch D. Router 28. What is the gradual loss of signal strength from one end of a cable to the other called? A. Attention B. Resistance C. Attenuation D. Signal loss 29. Which network layer, or sublayer, is essentially a description of frame formats, the content of frames, and the dialogue that must be exchanged between the sender and the receiver in order to exchange messages? A. Presentation B. Application C. MAC D. LLC 30. Which of the following is a common problem of modem installation? A. There is no port available. B. The COM port and IRQ assigned to the modem are being used by other devices. C. Can not find the COM port and IRQ settings on the modem card. D. Use wrong cable. 31. In a standard operating procedure, what needs to be controlled? A. Revision B. Computers on the network C. Date D. Title 32. The network manager dedicated to managing the network is called the _____. A. File Manager B. Systems Manager C. Network Monitor D. File Server 33. Which layer of the OSI model authenticates user passwords? A. network B. authentication C. login D. application 34. What type of processor is the most commonly used in PC compatibles? A. RISC B. CISC 35. What service on the Internet provides hostname to IP address resolution? A. DNS server B. Host name converter C. IP address server D. Not needed, the Internet does it all 36. Windows NT4 server can use which of the following categories of RAID? A. 1,3 B. 3,5 C. 2,5 D. 1,5 37. The most widely used NOS with the Internet is _____. A. UNIX B. NetWare C. NT D. LANtastic 38. Many users on your network use the Internet to send large files. How do you protect your network from viruses? A. Proxy server with virus protection B. Apply a strong password policy C. Use fiber cable, it is immune to tapping D. NT Server for security 39. Which device works at the network OSI model layer? A. Router B. Repeater C. Bridge D. Gateway 40. When labeling cables in a large network that currently identifies the IP (logical address), what else should be included on the label? A. Computer name B. NIC type C. Physical address D. Room number 41. Which network topology uses multiple network connections? A. Star B. Bus C. Ring D. Mesh 42. Which utility is used to troubleshoot communications with a Web Server? A. NBTSTAT B. Ping C. NETSTAT D. Telnet 43. The maximum number of volumes on a single server using the Novell Storage Service (NSS) is _____. A. 10 B. 24 C. 255 D. 1024 44. Where does a packet that is not destined for the local network go? A. to a Print server B. to a Application server C. to a Default gateway D. to a PDC 45. What 2 backup methods clear the archive attribute of the files being backed up? A. Full, Differential B. Full, Incremental C. Differential, Incremental D. Daily, Full 46. A T1 Frame contains a total of how many bits? A. 48 B. 193 C. 1,500 D. 4,000 47. What is the maximum length for a segment of thinnet cabling? A. 185 meters B. 200 meters C. 150 meters D. 100 meters 48. Which layer of the OSI model determines if the exchange is half-duplex or full-duplex? A. Session B. Application C. Data Link D. Network 49. Data in a SONET Network is transmitted through fiber optic cables and may consist of which of the following? A. Voice B. Data C. Video D. All of the above 50. A ____ frame consists of 24 PCM encoded channels. A. FDM B. SDM C. STDM D. T1 51. Which of the following UNIX tools, or services, is used to identify other users by email address? A. Gopher B. Finger C. HTTP D. Telnet 52. Which of the following is not allowed in a password? A. Upper case letters B. Special characters C. Numbers D. Spaces 53. What class IP address is 155.155.58.23? A. Class A B. Class B C. Class C D. Class D 54. Which topology uses the least amount of cable? A. Bus B. Ring C. Star D. Mesh 55. A Source Routing Bridge would probably be used on which type of network? A. ARCNet B. Token Ring C. 10base5 D. 10base2 56. Each device on a TCP/IP network with a logical IP address is known as a _____. A. Host B. Server C. Station D. Peer 57. What type of device contains transceiver circuitry, along with various digital devices used to format data bits into Ethernet frames. A. a Hub B. a Router C. a MAU D. a Bridge 58. What is the measure of the amount of actual data being transferred called? A. Baud B. Bits C. Current D. Bandwidth 59. What kind of cabling contains a metal shielding fully encircling the twisted pairs, intended for reducing ElectroMagnetic Interference (EMI)? A. Unshielded Twisted Pair B. Shielded Twisted Pair C. Coaxial D. Fiber 60. In an RS-232 environment, what is the maximum distance a DCE can be located A. no limit B. 5 feet C. 50 feet D. 500 feet 61. Which of the following is an older transport protocol used in WANs? A. X.25 B. X.400 C. TCP/IP D. SLIP 62. Which is not an advantage of RAID5? A. Read faster. B. Write faster. C. Mirroring disks are not needed. D. Lost data can be regenerated at the block level. 63. TCP is _____. A. Connectionless B. Connection-oriented 64. A single SCSI card in a PCI slot allows simultaneous operation up to ____ devices. A. 5 B. 15 C. 10 D. 20 65. 23 is the well-known Port number for _____. A. FTP B. Telnet C. SMTP D. HTTP 66. What type of tap doesn't require the cable to be broken and, therefore, doesn't require the network to be brought down each time another user is added? A. Intrusive B. Non-Intrusive 67. Which IEEE Protocol uses Token passing in a Bus topology? A. 802.1 B. 802.2 C. 802.3 D. 802.4 68. An error-detecting scheme that redundantly counts data bits in a never-ending cycle is called _____. A. A Cyclic Redundancy Check (CRC) B. Even Parity C. Odd Parity 69. You did a tape backup yesterday, and today you need to restore the data to the system. When you try to do this, the machine can't read the tape. You try another tape and it also can't be read. What should you do next? A. Reinstall drives B. Replace tape controller C. Clean tape drive D. Change to RAID level 1 70. Many STDMs today incorporate _____ to increase data throughout. A. data concentrators B. programmable SYNs C. guard bands D. HDLC 71. Which of the following is the preferred disk drive interface? A. EIDE B. IDE C. ATA D. SCSI 72. _____________ refers to the ability of a network to recover from problems. A. Fault tolerance B. Backup C. Proper software D. Ethernet 73. What is the easiest way to get an upgrade for your modem? A. Manufacture by mail B. Original Installation disk C. Vendor's web site D. Can't upgrade a modem 74. If you have a failure of a disk AND a controller, which of the following is the best method of preventing data loss? A. RAID 0 B. RAID 1 (disk mirroring) C. RAID 1 (disk duplexing) D. RAID 5 75. You are designing a network for a company that runs mission critical applications, and each computer on the network must have guaranteed access to the network. What access method is most appropriate? A. Ethernet B. Token Ring C. Star D. Bus 76. The maximum file size when using the Novell Storage Service (NSS) is _____. A. 4 gigabytes B. 8 gigabytes C. 4 terabytes D. 8 terabytes 77. You are designing an IEEE 802.3 LAN. What is the maximum number of Bridge hops allowable? A. 2 B. 3 C. 7 D. 11 78. Four _____ are used in the 5-4-3 rule of networking? A. bridges B. routers C. repeaters D. NICs 79. A brouter operates on what OSI layers? A. data link and network B. physical and data link C. network and physical D. transportation and data link 80. What is caused by the reactive components of cables? A. Connection loss B. Intersymbol Interference C. Connection timeout D. Bad Cabling 81. Intersymbol interference is the blurring together of data bits. A. True B. False 82. 80 is the well-known Port number for _____. A. FTP B. Telnet C. SMTP D. HTTP 83. _____ was an older code developed to permit teletypewriters to operate at high speeds? A. Cobol B. Baudot C. Pascal D. Basic 84. You are troubleshooting a token passing network. Each node on the network is connected to the same media with termination points. What physical topology is being used on this network? A. Bus B. Ring C. Star D. Mesh 85. Which of the following is a high-performance interface designed for multi-users? A. EIA/TIA - 449 B. EIA/TIA - 232 C. EIA/TIA - 485 D. X - 25 86. A user is complaining that they cannot connect to a remote dial-up server. Their dial-up network properties are set up to use SLIP protocol. What should you try first to correct the problem? A. Disable software compression in modem properties B. Change the dial-up properties to use PPP protocol C. Change modem D. Reduce baud rate in the modem properties 87. The EIA/TIA-449 specification uses what two connectors in conjunction with each other to operate in balanced mode? 1. 9-pin 2. 37-pin 3. 25-pin 4. 11-pin A. 1,3 B. 1,4 C. 1,2 D. 2,4 88. What is the directory service called in NetWare 4.11? A. NDS B. Domain C. Directory D. Bindary 89. What utility is used for NetBIOS name to IP address resolution? A. DHCP B. DNS C. WINS D. Router 90. Which of the following is NOT a Transport layer Protocol? A. TCP B. UDP C. SPX D. ARP 91. What type of cable can be used for cable lengths up to 2km without a repeater? A. 100BaseTX B. coaxial C. 100BaseFX D. UTP 92. Which of the following was developed to allow a NIC to be bound to more than one network layer protocol? A. ODI B. SMTP C. NDIS D. Both A and C 93. What part of the OSI model describes the conventions a sender and receiver follow to ensure thedata flow is orderly? A. Physical Layer B. Network Layer C. Logical Link Controls D. Media Access Control 94. What is a gateway most used for? A. connecting two networks with different protocols B. connecting two routers C. connecting to LANs with the same protocols D. connecting to servers 95. Which type of transmission has each character separated by start and stop bits? A. atypical B. synchronous C. asynchronous D. ATM 96. Which of the Following is a valid configurations used with SONET? A. PPTP B. VPN C. Gateway D. Ring 97. What OSI level puts electrical current onto the network cable? A. Data Link B. Transport C. Physical D. Applications 98. Developing documentation on a network is not important. A. True B. False 99. Which of the following are top-level domains names? A. COM B. GOV C. EDU D. All of the above 100. Which protocol is used to receive e-mail? A. PPP B. PPTP C. SMTP D. POP3 101. What is the default port for HTTP protocol? A. 25 B. 21 C. 80 D. 110 102. What is required to view a web page? A. web utility B. Internet browser C. web browser D. nothing, just login 103. Which TCP/IP utility provides you with information about network names and their corresponding IP addresses? A. Ping B. Ipconfig C. Nbstat D. RIP 104. What widely used tool is employed to check the status of a connection? A. Netstat B. Nbtstat C. Ping D. Ipconfig 105. Which RAID level does not require a dedicated parity drive? A. 2 B. 3 C. 4 D. 5 106. Which of the following operating systems DO NOT support plug-and-play (PnP)? A. NT server B. NT workstation C. Windows 95 D. Both NT server and NT workstation 107. What network device is required when using incompatible protocols such as IBM SNA, ISO OSI, or DEC DNA? A. Repeater B. Bridge C. Router D. Gateway 108. What kind of routing table contains the address of the next destination, the next hop on the way to the destination, and some type of metric such as a timer? A. SLIP B. RIP C. PPP D. PPTP 109. What is the function of a patch cable in a Token Ring network? A. To connect the workstation to the ring B. To connect the workstation to the MSAU C. To connect two MSAUs together D. To connect the workstation to the concentrator 110. If you have already visited a site called inter.store.com from your local LAN and try to connect again the next day, how does your computer obtain the correct IP address? A. Local DNS Server B. Root DNS server C. Subdomain DNS server D. Domain DNS server 111. How many partitions does the Novell file system allows to be placed on a single disk? A. 2 B. 4 C. 10 D. 20 112. What does the ARP command do? A. map IP addresses to physical, MAC addresses B. list the addressing information for the system currently connected to C. display the path to an address D. provide the information about network names and their corresponding IP address 113. A SONET frame contains a total of how many bytes? A. 48 B. 193 C. 810 D. 4,000 114. To display your domain name system (DNS) host name, what utility do you use? A. type DNS B. DNS look up C. Hostname D. No such utility 115. What is the term used for loss of signal as data travels along a cable? A. Attenuation B. Fragmentation C. Beaconing D. Broadcast 116. What is the appropriate termination for a 10Base2 network? A. 100 ohms B. 185 ohms C. 500 ohms D. 50 ohms 117. A repeater operates at the physical layer. Which of the following are correct? A. It conditions signals to remove noise and distortion B. It filters network traffic C. It connects separate LANs D. It extends a single LANs physical size 118. STP stands for which of the following? A. Standard twisted pair B. Stanford twisted pair C. Shielded twisted pair D. Simple twisted pair 119. Before T1 service can be utilized, what must be installed at the user's location? A. T1 adapter B. RJ-45 C. Transceiver D. Channel service unit/digital service unit 120. What type of device is used to connect node ports? A. Network Interface Card (NIC) B. Bridge C. Router D. Hub 121. When the EIA/TIA-449 connection is used in unbalanced mode, what connector is used? A. 9-pin B. 25-pin C. 11-pin D. 37-pin 122. A/An _____ tap requires that the coax be cut and a barrel connector inserted, to allow the transceiver and cable to join the coax backbone? A. Intrusive B. Non-Intrusive 123. What device connects separate LANs, or extends a single LAN's physical size? A. Repeater B. Bridge C. Router D. MAU 124. What is the default port of the FTP protocol? A. 25 B. 80 C. 110 D. 21 125. In Time-Division Multiplexing, the number of terminals for data transmission is controlled by a _____ pulse. A. SYN B. PDM C. DPM D. PBX 126. As a good rule of thumb, how many UPS's should be added to each segment of a network? A. 1 B. 2 C. 3 D. 4 127. Which of the following are application layer protocols? A. SMTP B. SNMP C. SQL D. RPC 128. Which TCP/IP utility do you use to check the connection to another device, client, server, or router? A. Ping B. WINMSD C. RIP D. ARP 129. IP address 191.123.124.2 belongs to what class of addresses? A. A B. B C. C D. D 130. You are trying to connect to the Internet with SLIP. It doesn't work. What should you do to correct the problem? A. Use TCP/IP B. Use PPTP C. Use PPP D. Try again 131. Which protocol handles all outgoing mail? A. PPP B. POP3 C. SMTP D. PPTP 132. What can be used to connect two servers that are 1000 meters apart without using a repeater or router? A. 10BaseT B. 100BaseT C. 10Base5 D. 100BaseFX 133. What level of the OSI model describes methods stations use to gain access to a communication channel? A. Physical B. Media Access Control C. Transport D. Network 134. Which protocol is used to securely transport PPP packets over a TCP/IP network, such as the Internet? A. PPP B. PPTP C. SLIP D. IPX/SPX 135. What speed does a T-1 line operate at? A. 64 Kbps B. 128 Kbps C. 256 Kbps D. 1.544 Mbps 136. What is the maximum rate at which IDE hard drives transfer data to and from the drive, currently? A. 50Mbps B. 100Mbps C. 25Mbps D. 33Mbps 137. What is the best hard drive interface to use in a network? A. EIDE B. IDE C. ATA D. SCSI 138. Twisted pair wire is twisted together for the following reason A. Help reduce Electromagnetic Interference B. Make the wire stronger C. Reduce electrical resistance D. It's not really twisted 139. Longitudinal redundancy checks apply odd or even parity to _____ of a block of data words. A. Rows B. Columns C. All of above D. None of above 140. Parity checking can only detect an odd number of errors in the data bits received. A. True B. False 141. Which layer of the OSI model determines the actual route data will take? A. Physical B. Network C. Data Link D. Session 142. A ___________ network is a network - using any topology - in which data is transmitted at rates up to 10 MHz. A. Broadband B. Ethernet C. Bus D. Baseband 143. Which device works on the Data Link layer? A. Repeater B. Bridge C. Router D. Gateway 144. What is the easiest way to determine if a NIC is operating properly? A. connect to a directory on a server B. double click on Explorer C. alternate click on Network Neighborhood and select properties D. type Tracert at DOS prompt 145. Which utility allows you to see the path to an address? A. Ping B. Netstat C. Nbtstat D. Tracert 146. What is the maximum speed for an ultra-SCSI interface? A. 10 Mbps B. 30 Mbps C. 100 Mbps D. 200 Mbps 147. Your company sends a lot of data over the Internet that is sensitive and needs to be transported securely. What can you do to accomplish this? A. Scramble the data B. Scramble header information C. Encrypt data before sending D. Encrypt header information 148. What method of routing is least administratively intensive? A. Static B. Dynamic 149. Which TCP/IP utility is used to see the addressing information of the system that is currently connected to? A. Ping B. Ipconfig C. Nbstat D. RIP 150. What protocol guarantees deliver of data? A. NetBEUI B. TCP C. IP D. IPX 151. What are the two types of media-dependent interface? A. Medium attachment Unit B. Intrusive C. Non-Intrusive D. Thicknet 152. In a particular network, there are some Unix clients, 5 Windows 95 workstations, and a NetWare server. What will allow the 5 Windows clients to connect to the NetWare server? A. Novell Client for Windows B. Microsoft Client for Windows C. Print software for NetWare D. Migration tools for NetWare 153. _____ is an electronic switch capable of selecting one of several input signals, and connecting it to a single output line. A. Hub B. Bridge C. Multiplexer D. Router 154. When designing a network, what is not a consideration for clients on the network? A. Operating system B. Hardware configuration C. NIC Type D. Protocol used 155. Which of the following is the most secure password for a user named Bill? A. bill B. Bill C. biLl D. bi$Ll2 156. NetWare uses which protocol to find the best path to a destination? A. SAP B. RIP C. TCP/IP D. IPX 157. Under the Novell File System, how many volumes does a single disk that has four partitions may have? A. 1 B. 2 C. 4 D. 8 158. A workstation is located more than 100 meters from the hub and is having problems connecting to the network. The network is 10BaseT. How can you get this workstation to connect? A. Replace the NIC on workstation with a 100BaseFX NIC B. Replace the NIC with a 10Base5 NIC C. Replace the NIC with a 100BaseFX NIC D. Move workstation closer to the hub 159. What connector is used at the ends of a CAT 5 UTP cable? A. RJ54 B. RG58 C. RJ45 D. RJ11 160. Coaxial media topologies use the 5-4-3 rule for Ethernet networks. What does this mean? A. 5 segments, 4 repeaters, 3 populated segments B. 5 repeaters, 4 segments, 3 populated segments C. 5 populated segments, 4 repeaters, 3 cable connections D. 5 segments, 4 bridges, 3 populated segments 161. You are connecting two LANs over a WAN, using public switched telephone facilities. Which protocol should you use? A. NetBEUI B. TCP/IP C. AppleTalk D. IPX/SPX 162. Which of the following employs a medium attachment unit? A. Thicknet B. Thinnet C. 10Base2 D. 10BaseT 163. Novell's proprietary network protocol is _____. A. AppleTalk B. TCP/IP C. IPX/SPX D. NetBEUI 164. Which of the following will permit data to flow in both directions but only one way at a time? A. Simplex B. Half Duplex C. Full Duplex 165. You have an Ethernet 10Base2 network that is 200 meters long and is terminated properly with 10 workstations connected. Some users cannot send data. What is the problem? A. Termination not required B. Not enough workstations C. The cable is too long D. Hub is down 166. UTP and STP cables consist of copper wire twisted into a spiral shape. A. True B. False 167. What does a receiver detect that lets it know that the data stream is completed? A. Start Bit B. Control Bit C. Space D. Stop Bit 168. Which RAID level Provides striping with parity? A. 1 B. 2 C. 5 D. B and C 169. You have a network that uses the NWLink IPX protocol. Some of your users cannot access network resources and you have learned that it is not a hardware problem. What is wrong? A. There are too many collisions on the network B. The frame type is incorrect C. IP address are wrong D. Subnet Mask is wrong 170. Which of the following hubs can act as a repeater? A. Active hub B. Passive hub C. Amplified D. Powered 171. At which OSI model layer does a Bridge operate? A. Network B. Physical C. Data Link D. Transport 172. What is another name commonly used for a Non-Intrusive tap? A. Clamp B. Sucker C. Vampire Tap D. Bat Tap 173. What device is used to convert from one type of data-communication system to another? A. Hub B. Router C. Gateway D. Bridge 174. What Internet protocol is used on the Internet? A. IPX/SPX B. NetBEUI C. TCP/IP D. AppleTalk 175. What is the center of a fiber optic cable referred to as? A. Cladding B. Sheath C. Center D. Core 176. After receiving a request, a software object that operates at the presentation layer sends it to the client computer that made the request is a _____. A. requester B. redirector C. wizard D. driver 177. What can be used to purge and reload the NetBIOS name cache? A. NBTSTAT -R B. ARP -d C. IPCONFIG /renew D. NETSTAT -n 178. What kind of networking involves using a file server to manage the network? A. Distributed B. Centralized C. Shared D. Manager 179. What is the media used in a 100BaseT Fast Ethernet network? A. Coaxial cable B. Fiber Optic C. UTP D. ARCNet 180. How often should data on a server be backed-up? A. Once a week B. Once a day C. Depends on your organizational plan D. Once a month 181. The telephone is a good example of what type of data flow? A. half-duplex B. full-duplex C. simplex D. simple-duplex 182. What type of interface improves on the noise, cable-length, and data-rate limitations of the EIA/TIA-232? A. RJ-45 B. EIA-TIA-449 C. RJ-11 D. ECP Port 183. UDP is _____. A. Connectionless B. Connection-oriented 184. What kind of access method is used when a token is passed from station to station? A. Contention-based network B. Modem C. Token-based system D. PPP 185. What kind of cabling is primarily used as a backbone for interconnecting network devices? A. Thinnet B. UTP C. STP D. Thicknet 186. What network device filters network traffic? A. Repeater B. Bridge C. Router D. MAU 187. You just installed a NIC using IRQ3 and it is conflicting with another device. Which port is the device likely to be connected to? A. COM1 B. COM2 C. LPT1 D. LPT2 188. A thicknet backbone can support a total of how many connected computers on each segment? A. 10 B. 30 C. 100 D. 1024 189. Which of the following backup methods resets the backup attribute? A. Selective B. Incremental C. Daily D. Differential 190. What kind of protocols usually have high over-head, low efficiency, and are typically found in PC environments? A. Synchronous B. Network C. Routable D. Asynchronous 191. Another name for sector-sparing is _____. A. Dynamic-swapping B. Hot-fixing C. Transaction-tracking D. Striping 192. The main difference between T1 and DDS is _____. A. T1 is digital, DDS is analog. B. T1 operates at 64Kbps, while DDS operates at 56Kbps. C. T1 uses coaxial cable, and DDS uses fiber optic cable. D. T1 can only transmit data and graphics, but DDS can carry voice also. 193. You are trying to insert an ISA NIC in a system. Which slot type can you use? A. MCA B. EISA C. PCI D. AGP 194. Which cable type has the best attenuation qualities? A. Fiber Optic B. STP C. UTP D. Coaxial 195. What device can connect LANs that may be using dissimilar access methods? A. Hub B. Bridge C. Router D. MAU 196. State the maximum number of stations that can be connected to each Ethernet LAN. A. 100 B. 1000 C. 256 D. 1024 197. There are 500 computers on your network and you want to connect to the Internet. Lately, there have been unauthorized visitors deleting files. Someone recommends a firewall. What will the firewall do? A. It will restrict unauthorized access to your network B. It will add fault tolerance to your network C. It will require passwords to access secret files D. It will authenticate users after they accessed your network 198. In a token ring using a physical star topology, what are the Hubs that nodes attached to called? A. hubs, of course B. multi-station access units C. routers D. multi-plexers 199. Loading the voice channel with an inductance will control the _____ across the channel. A. Attenuation B. Delay C. Crosstalk D. Loopback 200. What is the default subnet mask for a class C network? A. 255.255.255.254 B. 255.255.255.0 C. 255.255.0.0 D. 255.0.0.0 201. At which layer of the OSI model does routing to the correct network node occur? A. Session B. Transport C. Network D. Data Link 202. What utility shows the addressing information for the system currently connected to? A. Nbtstat B. Netstat C. Ipconfig D. Hostname 203. TCP, being a connection-oriented protocol, provides which of the following services? A. Reliability B. Flow control C. Logical connections D. All of the above 204. _____ is an one-way communication. A. Duplex B. Half Duplex C. Simplex D. Full Duplex 205. What layer of the OSI model is the only layer at which actual data bits are encountered? A. Physical B. Network C. Transport D. Data Link 206. You need to establish a secure and encrypted communication between Paris and New York using a Virtual Private Network. What connection protocol should you use? A. TCP B. SLIP C. PPP D. PPTP 207. Microsoft's proprietary network protocol is _____. A. AppleTalk B. TCP/IP C. IPX/SPX D. NetBEUI 208. Someone complains that they can't logon to the network. What step below should you not take to fix the problem? A. Replace the NIC B. Ping the Server C. Check NIC configuration D. Ask another user on the remote segment if they have the same problem 209. What piece of network hardware regenerates electrical signals? A. Hub B. Repeater C. Bridge D. Gateway 210. Which of the following will permit data to flow in both directions simultaneously? A. Simplex B. Half Duplex C. Full Duplex D. Asynchronous 211. How many repeaters can be connected to a ring topology? A. 5 Repeaters B. 4 Repeaters C. 1 Repeater D. no repeaters, it is on the NIC 212. After a collision on a CSMA/CD network, what do the workstations do? A. transmit immediately B. wait for instructions C. back off from transmitting, then randomly start again D. probe the server for instructions 213. You are having security problems in your network and you need to implement a secure password policy. What can you do to make your password policy more secure? A. Require changes to passwords randomly B. Require changes to passwords regularly C. Change passwords when needed D. Require passwords with random number of characters 214. Which protocol resolves IP addresses to physical addresses? A. ARP B. TCP C. IP D. IPX 215. You are installing cable for an IEEE 802.3u network. Which type of cable is used? A. UPT CAT 3 B. UPT CAT 4 C. UPT CAT 5 D. STP TYPE 1 216. You have installed a very large UTP cabling system in a building. The network is experiencing numerous corrupted files from attempts to transmit across the network. What is the most likely cause of this problem? A. Crosstalk B. Impedance C. Incorrect terminator installed D. The UTP was terminated with RJ-11s 217. You are installing a new network, what category of cable will give you the highest transmission rate? A. CAT 1 B. CAT 3 C. CAT 5 D. CAT F100 218. Which transport service provides host name to address conversion? A. Address resolution B. Postal Service C. SMTP D. Name resolution 219. A __________ is a small group of bits into which data is organized at the time of modulation. A. bit B. symbol C. byte D. chunk 220. What command provides the name of the system on which it is executed? A. Clientname B. Hostname C. Nbtstat D. Netstat 221. With modern modems the bit rate can exceed the baud rate. A. True B. False 222. Which communication protocol is used to send data across serial communication links? A. Point-to-Point Protocol (PPP) B. TCP/IP C. SLIP D. IPX/SPX 223. Under the Novell File System, a volume may span multiple disks. A. True B. False 224. Which protocol is used to allow AppleTalk to be sent over an IEEE 802.5, 16Mbps LAN? A. FTP B. EtherTalk C. TokenTalk D. SMTP 225. Which layer of the OSI model determines the quality of data transfer? A. Session B. Transport C. Data Link D. Network 226. You have a workstation with a modem on COM1 and a mouse on COM2 and two printers (LPT1/LPT2). You install a NIC using IRQ5. Which device is there likely to be a conflict with? A. Modem B. Mouse C. Printer on LPT1 D. Printer on LPT2 227. Which of the following protocols are examples of data link protocols? A. PPP B. SLIP C. MAC D. LLC 228. What is used to dynamically assign IP addresses to domain names? A. Ipconfig B. TCP/IP C. DHCP D. DNS 229. Each STDM frame can carry up to _____ bytes of data. A. 1 B. 7 C. 127 D. 1016 230. Which layer of the OSI model determines the path that data should take, based on network conditions and priority? A. Application B. Presentation C. Session D. Network 231. A router operates at which OSI model layer? A. Session B. Data Link C. Physical D. Network 232. Which of the following client operating systems are supported by both NT and NetWare? A. NT Workstation B. Windows 95/98 C. OS/2 Clients D. All of the above 233. Your computer keeps rebooting. You are working in an old building where many people have portable heaters at their desks. What is causing the problem? A. fuse box keeps resetting because of power overload B. computer is broken C. cables are installed wrong D. nothing is wrong 234. Which is not a valid type of network? A. MAN B. LAN C. WAN D. NAN 235. What is a characteristic of the IEEE 802.3 10Base2 standard? A. BNC connectors B. RJ-45 connectors C. RG 58 D. RG-11 236. What is the default port of a SMTP server? A. 21 B. 25 C. 70 D. 80 237. Which AppleTalk protocol performs a similar function to IP and IPX? A. AFP B. DDP C. ATP D. AppleShare 238. If you logon to a network and are dynamically assigned an IP address, what happened? A. that's normal B. dynamic host configuration protocol is active on your network C. domain name service gave it to you D. you don't receive them that way 239. In a ring topology that utilizes token passing, what happens to the data after it is transmitted from the sender? A. data packet continues around the ring indefinitely B. data packet is copied by the receiver and then deleted C. data packet is deleted by the sending host D. don't worry about it 240. A _________ provides an interconnection between networks using the same network layer protocols. A. Bridge B. Router C. Hub D. MAU 241. You are installing a LocalTalk Network. Which type of access method does LocalTalk Use? A. CSMA/CA B. CSMA/CD C. Token Passing D. Token Ring 242. UNIX uses this for name resolution? A. LMHosts B. WINS C. DNS D. ARP 243. Which of the following is the most reliable? A. Connection-oriented protocols B. Connection-less protocols 244. What IEEE specification is used to define the standards for Ethernet? A. 802.3 B. 802.4 C. 802.5 D. 802.12 245. What type of communication mode is primarily is used to supply a peripheral with information, or to collect information from a peripheral? A. Duplex B. Full Duplex C. Half Duplex D. Simplex 246. What router protocol maps the physical address of a node to a logical address? A. Address Resolution Protocol B. IPX/SPX C. TCP/IP D. AppleTalk 247. In the handshaking sequence, a modem sends a request-to-send (RTS) signal. What must the other modem return to complete the sequence? A. Clear-To-Receive (CTR) B. Ready C. Send the message D. Clear-to-send (CTS) 248. What separates signal frequencies through filtering and incorporates phase shifts to counter the effects of the channel? A. Hub B. Equalization C. Modulation D. Router 249. Which of the following protocols is considered connectionless? A. TCP B. IP C. UDP D. IXP 250. There are 5 Windows 95 computers running on a workgroup (peer-to-peer). What protocol should be used for the fastest connections? A. NetBEUI B. TCP/IP C. IPX/SPX D. UDP 251. A token ring, operating under IEEE 802.5, runs at what speed? A. 10 MBPS B. 100 MBPS C. 4 or 16 MBPS D. Unlimited MBPS 252. Which of the following makes files and applications available on the network? A. Client computer B. Windows Domain C. Novell NetWare D. A Server 253. What describes the number of discrete binary bits transmitted per second? A. Baud rate B. MBS C. Bit rate D. NBS 254. You need to learn the MAC address of your NIC card. What can you use to find this information on a Windows NT workstation? A. WINIPCFG B. ARP C. IPCONFIG D. NETSTAT 255. Your network consists of more than 500 computers that connect to the Internet. You are concerned that users will download viruses from the Internet. What should you do to protect the network? A. Install antivirus software on every workstation B. Install antivirus network suite C. Install a Firewall D. Install a Proxy server 256. What tool tests the proper operation of a local modem, the telephone channel, and the remote modem? A. loopback test B. modem analyzer C. telephone modulator D. remote modem tester 257. In a star network, the stations take their direction from the ___________. A. Bridge B. Hub C. Router D. Gateway 258. Which protocols are routable? A. NetBEUI B. IPX C. IP D. UDP 259. Which of the following is not a valid IP address? A. 127.2.10.1 B. 224.3.5.2 C. 192.256.10.10 D. 255.4.8.6 260. How can a class B address of 129.10.4.1 using a mask of 255.255.0.0 be broken down? A. 129.10 (network Id) 4.1 (host address) B. 129.10.4 (network id) .1 (host address) C. 129 (network id) 10.4.1 (host address) D. 129.10.4.1 (network id) no host address 261. What network device works independently of the LAN protocol? A. Repeater B. Bridge C. Router D. MAU 262. Connectionless frames may also be referred to as _____. A. Datagrams B. CRCs C. Control frames D. Cut-through frames 263. Which media is immune from electrical interference? A. Twisted pair B. Coaxial C. Fiber D. Microwave 264. Which of the following only checks the local modem to see if it will transmit and receive an analog signal? A. Remote Digital Loopback Test B. Digital Loopback Test C. Cyclic Redundancy Check (CRC) D. Analog Loopback Test 265. Which IEEE standard broke the Data Link layer into the LLC and MAC sublayers? A. 802.2 B. 802.4 C. 802.12 D. 802.14 266. What does the acronym URL stand for? A. Universal resource location B. Unlimited relocater library C. User resource location D. No such thing 267. Which of the following is not part of a complete model for network management? A. Organizational model B. Constructional model C. Informational model D. Functional model 268. It is a good choice to use ______ for data transmission within short distance. A. FDM B. SDM C. TDM D. PDM 269. Which of the following is used only to determine if the DCE side of the modem is working properly? A. Remote Digital Loopback Test B. Digital Loopback Test C. Cyclic Redundancy Check (CRC) D. Analog Loopback Test 270. A software object that operates at the presentation layer and is sent from a client computer to the server telling it to send a particular item is a _____. A. requester B. redirector C. wizard D. driver 271. TCP uses sockets for what purpose? A. To establish a connection B. To terminate a connection C. After a connection is made D. Before you send an E-mail 272. Which of the following is almost impossible to wire tap? A. UTP B. Coaxial C. STP D. Fiber 273. What media is used for 10BaseT? A. STP B. UTP C. Coaxial D. Fiber Optic 274. What protocol is used for dynamic routing on a large TCP/IP network with several subnets? A. TCP B. WINS C. DNS D. RIP 275. When employees try to use the network at night it does not operate properly. The office is well lit. What is the most likely problem? A. The voltage drops when the lights are on, which causes the NIC to malfunction B. They don't have appropriate rights to work at night C. Bad NIC card D. Improperly installed cable 276. If a network using NetBEUI is running slow because of broadcasts, what device can be used to increase performance? A. Router B. Repeater C. Gateway D. Bridge 277. If you are trying to verify a connection on the network by using PING, but it takes too long. What can you use to find the bottleneck? A. BOOTP B. NETSTAT C. TRACERT D. NETWORK MONITOR 278. What file on a Windows NT4 server can be edited for domain name resolutionto an IP address? A. HOST B. HOSTS C. LMHOSTS D. DNS LOOK-UP 279. Which cable supports 100Mbps on a 100BaseTX network? A. Coaxial B. Category 3 C. Category 5 D. Fiber Optic 280. What tool provides information about network names and their corresponding IP address? A. Hostname B. Ipconfig C. Route D. Nbtstat 281. Which of the following is NOT a internetwork layer protocol in the internetworking system? A. IP B. IPX C. NETBEUI D. SLIP 282. What is a basic blueprint that describes the function of protocols for data communications called? A. OSI Model B. DHCP C. OPI Model D. DCP Model 283. The NetWare directory service, called Novell Directory Service (NDS), specifies network resources as _____. A. Tasks B. Peripherals C. Elements D. Objects 284. The UDP protocol is also known as _____. A. Connection oriented B. Routed C. Routing D. Connectionless 285. When checking the TCP/IP configuration using the ping command, what is the first thing to do? A. Ping the default gateway B. Ping the server C. Ping someone on your Subnet D. Ping IP address 127.0.0.1 286. Which of the following is a Data Link device? A. Repeater B. Hub C. Bridge D. Router 287. What service is used to run applications on a computer at a remote location? A. Remote service B. Telnet C. FTP D. TFTP 288. A __________ network carries data at rates between 10 MHz and 100 MHz. A. Broadband B. Baseband C. Bus D. FDDI 289. What kind of code did IBM develop in 1962 to overcome the deficiencies of Baudot code? A. ASCII B. Basic C. EBCDIC D. Pascal 290. Modern modem standards are categorized under which series? A. T-series B. V-series C. M-series D. They are all the same 291. To review all of the addressing information for a system, what must be entered at the command prompt? A. IP address B. Ping C. IPconfig/all D. DNS look up 292. What type of interface is commonly used with personal computers and communication peripherals? A. EIA/TIA-232 B. RJ-45 C. RJ-11 D. Centronics Port 293. Your computer was working and now cannot connect to the NetWare server. All other computers on the network can. What is the most likely problem? A. IRQ conflict B. wrong NIC installed C. loose network cable D. incorrect frame type 294. Which of the following is not an application layer protocol? A. NFS B. SPX C. BootP D. SNMP 295. If your network does not have a WINS, what can you use for NetBIOS name and IP resolution? A. Host B. Hosts C. Lmhost D. Lmhosts 296. A network management __________ groups similar subsystems. A. Hub B. Router C. Domain D. Network 297. Which of the following is a transmission method that has one character immediately following another, without start/stop bits? A. Frames relay B. Digital data transfer C. Asynchronous D. Synchronous 298. At a minimum, what operation should be performed daily to the data on a server? A. Defragmentation B. Backup C. Deletion D. Copy 299. 21 is the well-known Port number for _____. A. FTP B. Telnet C. SMTP D. HTTP 300. Who has overall responsibility for issuing blocks of IP addresses? A. Your systems administrator B. Your Internet service provider C. Network information center D. Internet IP address administrator 301. Which OSI layer provides for data rate flow control? A. Application B. Physical C. Transport D. Network 302. Ethernet uses which of the following addressing schemes? A. TCP addresses B. IP addresses C. Logical addresses D. Physical addresses 303. What is used on a LAN to convert from one protocol to another type of protocol? A. router B. bridge C. gateway D. repeater 304. The default protocol for NetWare 4.x is ____. A. IPX B. IP C. NWLink D. TCP 305. Which topology guarantees access for each computer on the network? A. Ethernet B. AppleTalk C. Token Ring D. ARCNet 306. Media access control is contained in what layer and sub-layer of the OSI model? A. Logical link control and data link B. Logical link control and network C. MAC and data link D. MAC and physical 307. An FDDI fiber optic network, transmits data at 100MBPS at what maximum distance? A. 2,500 KM B. 100 M C. 100 KM D. 2.5 KM 308. Which of the following utilities would be used to determine the current configuration of TCP/IP on a Windows 95 client? A. Netstat B. Nbstat C. Ipconfig D. Winipcfg 309. A ________ is used to modulate a carrier with data, for transmission over a long distance. A. Network Card B. UTP C. Token-based system D. Modem 310. What utility can be used to check the current network layer connections to your system? A. Tracert B. NBSTAT C. Netstat D. Users command 311. Which of the following UNIX tools or services is used to organize data in large databases? A. Gopher B. Finger C. HTTP D. Telnet 312. What is used in the hosts file for adding comments? A. # B. rem C. % D. @ 313. What tool is used to list the routing table at the server? A. Route B. Ipconfig C. Tracert D. Ping 314. Networking coaxial cable has a maximum data rate of ______ Mbps. A. 10 B. 50 C. 100 D. 1000 315. Which of the following protocols map a logical address to a physical address? A. ARP B. RARP C. IP D. IPX 316. What type of connector performs the switch between Tx and Rx? A. Bridge B. Crossover C. Hub D. Router 317. What are the characteristics of TCP? A. Reliable, connection-oriented delivery services B. Reliable, connectionless delivery services C. Unreliable, connection-oriented delivery services D. Unreliable, connectionless delivery services 318. What can you use against broadcast storms? A. use DHCP B. use a Router C. use a Bridge D. use WINS 319. What fault tolerance system does a token ring use to determine a downed computer? A. carrier-sender multiple access B. beaconing C. next neighbor notification D. nothing, the system needs to be operational 320. Using Ultra-SCSI with 15 devices on each of the four, wide ports, how many devices can be supported by a single SCSI card in a PCI slot? A. 15 B. 5 C. 60 D. 13 321. Routing Information Protocol (RIP) is ____________? A. Static B. Dynamic C. Manual D. Automatic 322. If there is a computer that is connected to a hub at a distance of 100m using UTP cable, and you want to move the computer another 50m away, how can you make it work? A. Use a bridge B. Use a repeater C. Use router D. Can't move it because of cable length restrictions 323. What diagnostic tool helps identify a broken cable? A. Protocol Analyzer B. Performance Monitor C. Time Domain Reflector D. Advanced Cable Tester 324. At what layer of the OSI model is TCP/IP used to connect networks or to send data across networks? A. Physical and data link B. Network and transport C. Network and data link D. Transport and data link 325. You are a network technician that has been assigned the task of upgrading the existing network from 10 Mbps to 100 Mbps. Which transmission media would you use? A. RG-8 B. RG-11 C. RG-58 D. CAT 5 UTP 326. Connection-oriented protocols are also called _____. A. Probabilistic B. Reliable C. Unreliable D. Cut-through 327. What is the total amount of data a T1 can transmit? A. 15.44 Mbps B. 154.4 Mbps C. .15 Mbps D. 1.544 Mbps 328. What is a company called that maintains a database? A. Information Service Provider B. Data Base Provider C. Information Server D. Access Server 329. In a network system, _____ is the actual number of messages sent in a given time A. network utilization B. availability C. throughput D. system service time 330. To properly install a modem, what three items must be unique? A. an IRQ setting B. a DMA setting C. a Port number setting D. a Base I/O Port address 331. A UNIX server hosts a web site and an FTP site. How does the server know which site the packet is intended for? A. TCP address B. FTP ID C. Port number D. IP address 332. Which type of communication mode would be considered high-speed? A. Half Duplex B. Full Duplex C. Simplex D. Duplex 333. _____ contains a look-up table used to reconcile computer names to IP addresses? A. DNS B. DHCP C. DCP/IP D. WINS 334. You are installing a Thinnet network. What must be installed on the ends of the cable to prevent signal reflections? A. An RJ45 connector B. A BNC connector C. A terminator D. A BNC T connector 335. John, who is a new network engineer, had to remove 100 yards of UTP cable from the air conditioning duct. What is the most likely reason? A. The cable was not CAT 5 B. The cable was not plenum rated C. The cable had a Breach in it D. The A/C duct would freeze the cable 336. What protocol can be used to manage and retrieve information on bridges, router, amd gateways? A. DHCP B. RIP C. SMTP D. SNMP 337. Which of the following supports speeds of about 1.5 Mbps? A. T1 B. T2 C. T3 D. ISDN 338. Which layer of the OSI model is responsible for data encryption? A. Application B. Session C. Presentation D. Network 339. Which of the following UARTS can transmit at 115,200 bps? A. 16XXX versions B. 85XX versions C. 65XX versions D. 165 versions 340. What utility do you use to determine if your TCP/IP configuration works? A. Ping B. NETSTAT C. NBTSTAT D. Route 341. The _____ tells the receiver the exact time a bit occurs in synchronous transmission? A. Time stamp B. Synch pulse C. Date stamp D. Computer clock 342. OS/2 supports which of the following? A. TCP/IP B. IPX/SPX C. NetBEUI D. All of the above 343. If you want to download and upload files to or from the Internet, what do you use? A. Telnet B. Internet Download Service (IDS) C. FTP D. DNS Service 344. A UPS is a battery-operated power supply that kicks in if you lose power to the network. A. True B. False 345. What kind of signal does a peripheral send when it is ready to receive text? A. Acknowledge (ACK) B. Start of Text (STX) C. End of Transmission (EOT) D. Stop Bit 346. ___________ is the process of superimposing data on a carrier. A. Modulation B. Bandwidth C. Bit transfer D. Baud transfer 347. What allows a site to divide the host portion of an IP address into two parts, which define more A. Networks B. Hubs C. Network Operating Systems D. Subnetworks 348. In a particular network, there are 6 Unix clients, 10 Windows 95 clients, and a Novell NetWare Server. What protocol will connect the Windows workstations to the server? A. TFTP B. IP C. IPX D. UDP 349. What device is capable of connecting several terminals to the local phone company? A. a modem B. a router C. a HUB D. a multiplexer 350. What contributes to signal degradation in fiber cable connection? A. Connection loss B. Bandwidth C. Bad Cabling D. Connection timeout 351. What IEEE specification is used to define the 100VG-ANYLAN? A. 802.3 B. 802.4 C. 802.5 D. 802.12 352. Which of the following transmission techniques uses FM? A. Baseband B. Broadband C. Local Area Networks D. Domains 353. When the bottleneck threshold of the network system service time approaches, an alarm is set that initiates _____ to issue interrupts. A. Configuration management B. Performance management C. Fault management D. Security management 354. What device converts digital signals to analog and back to digital? A. demodulator B. modem C. digital modulator D. analog modulator 355. T1 can be a bit-interleaved analog TDM. A. True B. False 356. Disk duplexing is implemented at which RAID level? A. 0 B. 1 C. 2 D. 3 357. What type of server is responsible for reconciling domain names to IP addresses? A. DHCP B. DNS C. Exchange D. NetWare 358. Which of the following is a signal overflow from another wire? A. Crosstalk B. Attenuation C. Broadcast D. Beaconing 359. What protocol is used for a PC-to-Internet connection? A. TCP/IP B. PPP C. IPX/SPX D. X-400 360. A web proxy server can manage which of the following? A. Web server B. Web ports C. User accounts D. Proxy accounts 361. When users on a NetWare network write to the server, there's a chance that database information may be corrupted. NetWare prevents this by using what? A. transaction tracking system B. ARP C. RARP D. DETECT 362. www.microsoft.com is an example of what? A. URL B. Computer name C. Network name D. Server name 363. If you have users that repeatedly access the same sites on the internet, what can you do to improve performance? A. HTTP server B. Web server C. NT server D. Network server 364. What IEEE specification describes the token ring? A. 802.2 B. 802.3 C. 802.4 D. 802.5 365. What standard connector is used in telephone systems? A. RJ-45 B. RJ-11 C. RG-58 D. RS-232 366. You have a 100-user network and you suspect that a NIC is continuously generating transmissions. What device can be used to identify the defective NIC? A. Protocol analyzer B. Multi-meter C. SMTP D. Device Manager 367. You are the network administrator for a network with three servers and 50 clients and you have just installed a new anti-virus package. You have been experiencing several disk crashes. What do you do to correct this? A. Reload the operating system B. Install updates and patches C. Get all new servers D. Change out the cabling 368. _____ is the physical and logical map of a network. A. Configuration management B. Performance management C. Fault management D. Security management 369. 25 is the well-known Port number for _____. A. FTP B. Telnet C. SMTP D. HTTP 370. Half-duplex is best described by which of the following? A. data flows from transmitter to receiver and from receiver to transmitter, but only in one direction B. data flows from transmitter to receiver but not receiver to transmitter C. half the data is transmitted and received at the same time D. data flows in both directions simultaneously 371. Which multiplexing system uses a microprocessor controlled device to control data flow? A. FDM B. PDM C. TDM D. STDM 372. A computer is having communications problems, but the NIC is configured properly.What can beused to determine whether the NIC is operating properly internally? A. replace NIC B. use the manufactures diagnostic tool C. reconfigure the NIC D. reboot the computer 373. Which of the following UNIX tools or services allows you to logon to a remote computer as if your computer was physically attached to it? A. Gopher B. Finger C. HTTP D. Telnet 374. Which of the following UNIX tools, or services, is used in all Internet applications? A. Gopher B. Finger C. HTTP D. Telnet 375. Before two modems can communicate, which of the following must be present? A. Carrier Detect Signal B. Cable Ready Signal C. Cable Detect Signal D. Modem Ready Signal 376. To prevent data loss during power outage, what is the best course of action? A. Install an uninterruptable power supply B. install a high voltage power strip C. install a backup computer D. install a power spike protector 377. Disk mirroring requires a minimum of how many hard drives and hard disk controllers? A. 2 hard drives, 1 hard disk controller B. 2 hard drives, 2 hard disk controllers C. 3 hard drives, 2 hard disk controllers D. 3 hard drives, 1 hard disk controller 378. Baud rate is the speed at which data is transmitted. A. True B. False 379. Which of the following must be used if you don't have a DNS Server? A. Lmhosts B. Cache.dns C. Domain.dns D. Hosts 380. TCP/IP is a widely-used, internetworking protocol that is non-proprietary. A. True B. False 381. What are the disadvantages of a bus topology? A. The cabling is expensive B. The cabling is difficult to terminate C. The cabling is difficult to troubleshoot D. Frequent brakes in the cabling occur 382. What utility is used in Windows 95 to release the IP address assigned by a DCHP server? A. IPCONFIG B. WINIPCFG C. NETSTAT D. NBTSTAT 383. Which of the following technologies provides transmission speeds more than 100MBPS? A. ATM B. T3 C. FDDI D. ISDN 384. Which of the following protocols are not routable? A. IPX/SPX B. TCP/IP C. NWLINK D. NetBEUI 385. For DNS resolution, what 3 items below must be specified on a Windows workstation? A. Host name, Domain name, NetBIOS name B. Domain name, NetBIOS name, IP address of DNS server C. Host name, Domain name, IP address of DNS server D. Host name, NetBIOS name, IP address of DNS server 386. What is the biggest difference between a distributed and centralized network systems? A. Centralized network system is administered by a file server. B. Distributed network system is less efficient. C. Distributed network system has better security. D. Centralized network system is highly utilized. 387. What OSI layer does a bridge work at? A. Data Link Layer B. Application Layer C. Network Layer D. Presentation Layer 388. What kind of networking involves using multiple computers to manage a network? A. Distributed B. Shared C. Centralized D. Multiple 389. What type of communication mode is used when speed is not a priority, but costs are? A. Duplex B. Full Duplex C. Half Duplex D. Simplex 390. Which level of RAID does not provide any fault tolerance? A. 0 B. 1 C. 2 D. 3 391. What protocol is used on the Internet to provide e-mail to the mail server? A. SNTP B. POP C. SMTP D. FTP 392. What Category wire was used previous to Category 5 wire? A. Category 3 B. Category 1 C. Category 2 D. Category 4 393. Which TCP/IP utility would you use to view the path to an address and listthe number of hops tothe destination? A. Ping B. Tracert C. Ipconfig D. Nbtstat 394. Windows 95 can function in which of the following environments? A. As a stand-alone workstation B. As a member of a workgroup in a peer-to-peer network C. As a client in a Windows NT domain D. All of the above 395. What is the system cache referred to as? A. storage area B. RAM C. Buffer D. ROM 396. Which of the following is used to check both modems, along with the telephone system between the modems? A. Remote Digital Loopback Test B. Digital Loopback Test C. Cyclic Redundancy Check (CRC) D. Analog Loopback Test 397. Which network layer or sublayer is involved with the techniques that network stations employ in gaining access to the network? A. Presentation B. Application C. MAC D. LLC 398. UNIX uses which protocol for mail transfer services? A. SMTP B. UXTP C. STTP D. SNMP 399. Synchronization occurs at what OSI layer? A. session B. modulation C. network D. data link 400. A Bridge uses which type of address? A. Well-Known Port address B. IP C. MAC D. Service 401. Time-Division Multiplexing can multiplex up to how many channels? A. 23 B. 2 C. 4,032 D. 100 402. If data on a bus topology keeps bouncing around the network, what is the most likely cause? A. Wrong protocol B. A terminator fell off C. Wrong cable D. Cable past maximum length 403. Devices attached to an FDDI ring are described by a single- or dual-ring Attachment. A. True B. False 404. What is the maximum cable segment length of a 10BaseT network? A. 100 meters B. 185 meters C. 500 meters D. 800 meters 405. What is the primary function of a 802.3z gigabit Ethernet network? A. Links between all computers on the network B. Links between hubs and routers C. Links between LANs D. Links between modems 406. Which of the following devices works at the Application layer of the OSI model? A. Repeater B. Bridge C. Gateway D. Brouter 407. What happens if there is a cable break on the active ring of an FDDI ring network? A. the break will be bypassed and re-routed to the secondary ring B. the network goes down C. bypassed the break on the active ring D. can't happen to a fiber cable 408. A user is having sporadic interference caused by crosstalk. What is the best way to eliminate the problem? A. Take apart the LTP and twist the wires in the other direction B. Rewire the wires away from the florescent lights C. There is another cable nearby creating EMI, remove it D. Nothing, it's normal 409. On which topology is CSMA/CD used? A. AppleTalk B. Ring C. Ethernet D. ARCNet