1. Which of the following media access methods is utilized in 802.11b wireless networks? * . A. CDMA/CD * . B. CDMA/CA * . C. Token passing * . D. Radio waves Answer B is correct. 802.11b-based networks use the Collision Detection Multiple Access/Collision Avoidance (CDMA/CA) media access method. 2. Which of the following statements associated with bus topology networks are correct? Select two answers. * . A. These networks are prone to EMI and RFI. * . B. A break in cable can bring down the network. * . C. It is wired in a dual ring physical layout. * . D. A central device is connected to all computers. * . E. A single cable is used to connect all computers. Answers B and E are correct. Bus networks use a single cable to connect all computers. A break in cable can bring down the entire network segment. 3. You have been asked to install a small network consisting of eight computers. Your manager wants the best possible fault tolerance. Which of the following topologies would you choose? * . A. Bus * . B. Star * . C. Ring * . D. Mesh Answer D is correct. The mesh topology provides the best fault tolerance. Every computer in a mesh network is connected to every other computer, thus providing multiple redundant paths. 4. Which of the following networks can be easily expanded without interrupting the other network devices and users? Select two answers. * . A. Bus * . B. Ring * . C. Star * . D. Mesh Answers C and D are correct. Star and mesh networks can be expanded without affecting the current network devices or the users. 5. Which of the following networks is configured in dual rings to provide fault tolerance? * . A. Star * . B. 802.5 * . C. FDDI * . D. 802.3 Answer C is correct. The Fiber Distributed Data Interface (FDDI) standard-based networks are configured in dual ring topology to provide fault tolerance. If one of the rings fails, the other ring takes over. 6. Which of the following connectors cannot be attached with a fiber optic cable? Select two answers. * . A. RJ-45 * . B. MT-RJ * . C. SC * . D. ST * . E. BNC Answers A and E are correct. The RJ-45 and BNC connectors are used with twisted pair and coaxial cables respectively. They cannot be used with fiber optic cables. 7. What is the maximum length of a UTP cable segment in a 10BaseT star network? * . A. 100 meters * . B. 200 meters * . C. 500 meters * . D. 2,000 meters Answer A is correct. The maximum length of a UTP cable segment in a 10BaseT star network is 100 meters. 8. Which if the following terms correctly describes the loss of signal while it travels down a particular medium? * . A. Crosstalk * . B. EMI * . C. Attenuation * . D. RFI Answer C is correct. Loss of signal as it travels to larger distances is known as attenuation. 9. Which of the following affects the performance of an 802.11b network? * . A. A broken cable * . B. EMI * . C. Addition of two new computers * . D. Crosstalk Answer B is correct. 802.11b is a wireless network standard. Wireless signals travel though radio waves, which can be affected by electromagnetic interference (EMI). 10. Identify the hardware associated with a network wired with coaxial cable. Select two answers. * . A. BNC connector * . B. Terminator * . C. RJ-11 * . D. RJ-45 * . E. SC Answers A and B are correct. Coaxial cables use BNC connectors and 50-Ohm terminators. The BNC T-connectors are used to attach computers, while the terminators are used at the ends of the cable. 11. One of the following network devices forwards the data it receives on a port to all other connected ports. Identify the device from the following: * . A. Router * . B. Bridge * . C. Hub * . D. Switch Answer C is correct. A hub forwards the data it receives on one port to all other connected ports. 12. Which of the following devices is used in Token Ring networks as the central device? * . A. Hub * . B. Switch * . C. Router * . D. MSAU Answer D is correct. An MSAU is the central device in Token Ring networks that connects to all devices. 13. Which of the following statements correctly describes the function of a router? Select two answers. * . A. It forwards data based on the MAC addresses of devices. * . B. It is used to forward data based on the destination IP address. * . C. It is used to join two network segments to make a large network. * . D. It is used to segment a large network. * . E. It is used to forward signals to all other ports. Answers B and D are correct. A router is used to segment a large network into smaller segments. It forwards the data based on the IP address of the destination. 14. Which of the following methods to build and maintain routing tables takes maximum administrative efforts and time in a large network? * . A. Static * . B. Dynamic * . C. Link state * . D. Distance vector Answer A is correct. Static routing tables are created and maintained manually by administrators. In large networks, it is not possible to use this method because it takes significant administrative time and effort and is prone to typing errors. 15. Which of the following addresses is an invalid MAC address? * . A. 5F-00-AD-2E-E4-34 * . B. 00-12-ED-AG-K7-9E * . C. 00-0C-B8-22-AC-F3 * . D. 6A-7D-00-E5-A8-58 Answer B is correct. A MAC address can have numbers from 0 through 9, and letters from A to F. 16. Which of the following protocols uses a MAC address as part of the host address? * . A. TCP/IP * . B. IPX/SPX * . C. NetBEUI * . D. AppleTalk Answer B is correct. The IPX/SPX suite of protocols uses a MAC address as part of the host address. 17. Which of the following protocols does not depend on addresses or numbers to identify computers on a network? * . A. NetBEUI * . B. TCP/IP * . C. IPX/SPX * . D. AppleTalk Answer A is correct. In older Windows networks, the NetBEUI protocol uses computer names to identify computers. The NetBEUI protocol does not use any addressing scheme for networks or network hosts. 18. Which of the following are two constituent layers of the Data Link layer in the OSI networking model? Select two answers. * . A. Network * . B. Media Access Control (MAC) * . C. Application * . D. Logical Link Control (LLC) * . E. Transport Answers B and D are correct. The two constituent layers of the Data Link layer are MAC and LLC. 19. Which of the following protocol suites includes the Routing Table Maintenance Protocol (RTMP)? * . A. AppleTalk * . B. IPX/SPX * . C. TP/IP * . D. NetBEUI Answer A is correct. The RTMP is included in the AppleTalk protocol suite. It is used to build and maintain routing tables. 20. At which of the following layers of the OSI network model does a network adapter work? * . A. Layer 1 * . B. Layer 2 * . C. Layer 3 * . D. Layer 4 Answer B is correct. A network adapter (network interface card) works at the layer 2 (the Data Link layer) of the OSI networking model. 21. Which of the following is a class C address? * . A. 128.10.54.120 * . B. 92.200.138.24 * . C. 168.28.10.165 * . D. 193.10.160.45 Answer D is correct. 193.10.160.45 is a class C address. The class C IP address range is from 192 to 223. 22. One of the network administrators in your company has asked you to block port 23 on the router. Which of the following services is he asking you to block? * . A. FTP * . B. Telnet * . C. SMTP * . D. HTTP Answer B is correct. TCP/IP port number 23 is used by the Telnet service. 23. Which of the following is a function of a WINS server? Select two answers. * . A. It resolves hostnames to IP addresses. * . B. It resolves IP addresses to MAC addresses. * . C. It resolves NetBIOS names to IP addresses. * . D. It is used to allocate IP addresses dynamically. * . E. It is used to reduce broadcast traffic. Answers C and E are correct. The function of a WINS server is to resolve NetBIOS names to IP addresses. This helps reduce broadcast traffic because network clients send NetBIOS name resolution queries to the WINS server. 24. Which of the following protocols is used to secure HTTP transactions on the Internet? * . A. SCP * . B. SFTP * . C. SSL * . D. SSH Answer C is correct. The Secure Socket Layer (SSL) protocol is used to secure the HyperText Transfer Protocol (HTTP) transactions on the Internet. The addresses of web sites using the SSL protocol start with https://. 25. Which of the following statements correctly describes the function of a subnet mask? * . A. It is used to separate the network address from the host address within an IP address. * . B. It is used to forward data to remote network segments. * . C. It is used to block undesired network traffic. * . D. It is used to enable computers to communicate in different operating system environments. Answer A is correct. The subnet mask enables network devices to identify the network address and the host address from an IP address. 26. Which of the following protocols can be used to secure remote access connections when they are established through the Internet? * . A. PPP * . B. PPTP * . C. TCP/IP * . D. IPX/SPX Answer B is correct. The Point-to-Point Tunneling Protocol (PPTP) is used to establish a secure remote connection though the Internet. 27. Which of the following is a correct URL of a web site using the SSL protocol? * . A. http://www.oreilly.com * . B. httpssl://www.oreilly.com * . C. http://www.oreilly.com/ssl * . D. https://www.oreilly.com Answer D is correct. The URL of a web site using SSL protocol for security starts with https://. 28. What is the total bandwidth of an ISDN BRI connection when both data channels are used? * . A. 1.544 Mbps * . B. 128 Kbps * . C. 64 Kbps * . D. 56 Kbps Answer B is correct. The total bandwidth of an ISDN BRI connection is 128 Kbps. Each channel of an ISDN BRI connection provides a bandwidth of 64 Kbps. 29. You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall? * . A. 22 * . B. 53 * . C. 80 * . D. 443 Answer D is correct. Secure Internet sites use the Secure Socket Layer protocol. Since SSL uses port number 443, you will need to open port 443 on the firewall. 30. Which of the following advantages are associated with using a firewall? * . A. It provides an inexpensive means to share the Internet connection. * . B. It is used to block undesired external access to internal network resources. * . C. It is used to monitor the use of Internet by internal users. * . D. It is used to hide the internal addressing scheme of the network. Answer B is correct. A firewall is used to block undesired external access to internal network resources. 31. Which of the following is not a benefit of implementing a proxy server for Internet access? * . A. The costs associated with Internet access. * . B. Activities of users can be monitored. * . C. It provides a centralization of Internet access. * . D. The Internet hostnames can be resolved internally. * . B. It allows improved performance for web browsing. Answer D is correct. A proxy server does not help resolve external host names internally. External DNS servers must resolve hostnames that are external to the network. 32. Which of the following backup methods reset the archive bit? Select two answers. * . A. Full backup * . B. Copy backup * . C. Incremental backup * . D. Differential backup Answers A and C are correct. The full and incremental backups reset the archive bit after taking the backup. The copy backup and differential backup do not change the archive bit. 33. You are using five 80 GB hard disks in your file server to configure RAID-5. What will be the maximum capacity of the RAID be after the configuration is complete? * . A. 80 GB * . B. 160 GB * . C. 320 GB * . D. 400 GB Answer C is correct. In a RAID-5 configuration, space equal to one full disk is utilized for writing parity information. This means that space equal to four hard disks (320 GB) will actually be available for data storage. 34. Which of the following terms is associated with a power outage for a long period of time? * . A. Sag * . B. Blackout * . C. Brownout * . D. Spike Answer B is correct. If the power remains out for a long period of time, it is known as power blackout. 35. You have been asked to make a plan to back up all critical servers in the office. Where should you keep the backup tapes after the backup is complete? * . A. Inside the server room. * . B. In a locked closet outside the server room. * . C. At a secure offsite location. * . D. In the manager's cabin. Answer C is correct. Backup tapes should be stored at a secure offsite location to prevent accidental damage. This helps with data recovery in the event of a disaster. 36. One of the users in your office complains that he is not able to connect to the network or the Internet. Which of the following steps should you take first in order to troubleshoot the connectivity problem? * . A. Ping the loopback address. * . B. Ping a remote host. * . C. Ping the default gateway. * . D. Ping the IP address of the user's computer. Answer A is correct. The first step in troubleshooting a connectivity problem in a TCP/IP host is to ping the loopback address 127.0.0.1. 37. Which of the following utilities would you use when a Windows XP user is not able to connect using computer names? * . A. ping * . B. nbtstat * . C. netstat * . D. tracert Answer B is correct. The nbtstat utility is used in a Windows network to resolve connectivity problems. nbtstat displays the current NetBIOS over TCP/IP statistics and the currently active connections. 38. Which of the following utilities is used on a Linux system to verify TCP/IP configuration? * . A. ipconfig * . B. dig * . C. arp * . D. ifconfig Answer D is correct. The ifconfig utility is used on Unix and Linux systems to verify the TCP/IP configuration of the local host. 39. A new network administrator has configured some new wireless clients. None of these clients is able to connect to the network. Other clients already on the same access point do not have any connectivity problem. Which of the following is the possible reason for the problem? * . A. An incorrect SSID * . B. An incorrect IP address * . C. A faulty access point * . D. A poor signal due to EMI Answer A is correct. The connectivity problem is most probably caused by incorrect SSID settings on the new wireless clients. 40. One of the users has reported problems with his desktop. He is somewhat unclear about the problem's symptoms and you need to visit his desk to rectify the problem. What should be your first step to resolve the problem? * . A. Check event logs on the desktop. * . B. Ask the user to restart the desktop. * . C. Try to recreate the problem. * . D. Gather more information from the user. Answer D is correct. The first step to resolve a network problem is to gather as much information as possible from the user.