1. Which of the following media access methods is utilized in 802.11b wireless networks? . A. CDMA/CD . B. CDMA/CA . C. Token passing . D. Radio waves 2. Which of the following statements associated with bus topology networks are correct? Select two answers. . A. These networks are prone to EMI and RFI. . B. A break in cable can bring down the network. . C. It is wired in a dual ring physical layout. . D. A central device is connected to all computers. . E. A single cable is used to connect all computers. 3. You have been asked to install a small network consisting of eight computers. Your manager wants the best possible fault tolerance. Which of the following topologies would you choose? . A. Bus . B. Star . C. Ring . D. Mesh 4. Which of the following networks can be easily expanded without interrupting the other network devices and users? Select two answers. . A. Bus . B. Ring . C. Star . D. Mesh 5. Which of the following networks is configured in dual rings to provide fault tolerance? . A. Star . B. 802.5 . C. FDDI . D. 802.3 6. Which of the following connectors cannot be attached with a fiber optic cable? Select two answers. . A. RJ-45 . B. MT-RJ . C. SC . D. ST . E. BNC 7. What is the maximum length of a UTP cable segment in a 10BaseT star network? . A. 100 meters . B. 200 meters . C. 500 meters . D. 2,000 meters 8. Which if the following terms correctly describes the loss of signal while it travels down a particular medium? . A. Crosstalk . B. EMI . C. Attenuation . D. RFI 9. Which of the following affects the performance of an 802.11b network? . A. A broken cable . B. EMI . C. Addition of two new computers . D. Crosstalk 10. Identify the hardware associated with a network wired with coaxial cable. Select two answers. . A. BNC connector . B. Terminator . C. RJ-11 . D. RJ-45 . E. SC 11. One of the following network devices forwards the data it receives on a port to all other connected ports. Identify the device from the following: . A. Router . B. Bridge . C. Hub . D. Switch 12. Which of the following devices is used in Token Ring networks as the central device? . A. Hub . B. Switch . C. Router . D. MSAU 13. Which of the following statements correctly describes the function of a router? Select two answers. . A. It forwards data based on the MAC addresses of devices. . B. It is used to forward data based on the destination IP address. . C. It is used to join two network segments to make a large network. . D. It is used to segment a large network. . E. It is used to forward signals to all other ports. 14. Which of the following methods to build and maintain routing tables takes maximum administrative efforts and time in a large network? . A. Static . B. Dynamic . C. Link state . D. Distance vector 15. Which of the following addresses is an invalid MAC address? . A. 5F-00-AD-2E-E4-34 . B. 00-12-ED-AG-K7-9E . C. 00-0C-B8-22-AC-F3 . D. 6A-7D-00-E5-A8-58 16. Which of the following protocols uses a MAC address as part of the host address? . A. TCP/IP . B. IPX/SPX . C. NetBEUI . D. AppleTalk 17. Which of the following protocols does not depend on addresses or numbers to identify computers on a network? . A. NetBEUI . B. TCP/IP . C. IPX/SPX . D. AppleTalk 18. Which of the following are two constituent layers of the Data Link layer in the OSI networking model? Select two answers. . A. Network . B. Media Access Control (MAC) . C. Application . D. Logical Link Control (LLC) . E. Transport 19. Which of the following protocol suites includes the Routing Table Maintenance Protocol (RTMP)? . A. AppleTalk . B. IPX/SPX . C. TP/IP . D. NetBEUI 20. At which of the following layers of the OSI network model does a network adapter work? . A. Layer 1 . B. Layer 2 . C. Layer 3 . D. Layer 4 21. Which of the following is a class C address? . A. 128.10.54.120 . B. 92.200.138.24 . C. 168.28.10.165 . D. 193.10.160.45 22. One of the network administrators in your company has asked you to block port 23 on the router. Which of the following services is he asking you to block? . A. FTP . B. Telnet . C. SMTP . D. HTTP 23. Which of the following is a function of a WINS server? Select two answers. . A. It resolves hostnames to IP addresses. . B. It resolves IP addresses to MAC addresses. . C. It resolves NetBIOS names to IP addresses. . D. It is used to allocate IP addresses dynamically. . E. It is used to reduce broadcast traffic. 24. Which of the following protocols is used to secure HTTP transactions on the Internet? . A. SCP . B. SFTP . C. SSL . D. SSH 25. Which of the following statements correctly describes the function of a subnet mask? . A. It is used to separate the network address from the host address within an IP address. . B. It is used to forward data to remote network segments. . C. It is used to block undesired network traffic. . D. It is used to enable computers to communicate in different operating system environments. 26. Which of the following protocols can be used to secure remote access connections when they are established through the Internet? . A. PPP . B. PPTP . C. TCP/IP . D. IPX/SPX 27. Which of the following is a correct URL of a web site using the SSL protocol? . A. http://www.oreilly.com . B. httpssl://www.oreilly.com . C. http://www.oreilly.com/ssl . D. https://www.oreilly.com 28. What is the total bandwidth of an ISDN BRI connection when both data channels are used? . A. 1.544 Mbps . B. 128 Kbps . C. 64 Kbps . D. 56 Kbps 29. You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall? . A. 22 . B. 53 . C. 80 . D. 443 30. Which of the following advantages are associated with using a firewall? . A. It provides an inexpensive means to share the Internet connection. . B. It is used to block undesired external access to internal network resources. . C. It is used to monitor the use of Internet by internal users. . D. It is used to hide the internal addressing scheme of the network. 31. Which of the following is not a benefit of implementing a proxy server for Internet access? . A. The costs associated with Internet access. . B. Activities of users can be monitored. . C. It provides a centralization of Internet access. . D. The Internet hostnames can be resolved internally. . B. It allows improved performance for web browsing. 32. Which of the following backup methods reset the archive bit? Select two answers. . A. Full backup . B. Copy backup . C. Incremental backup . D. Differential backup 33. You are using five 80 GB hard disks in your file server to configure RAID-5. What will be the maximum capacity of the RAID be after the configuration is complete? . A. 80 GB . B. 160 GB . C. 320 GB . D. 400 GB 34. Which of the following terms is associated with a power outage for a long period of time? . A. Sag . B. Blackout . C. Brownout . D. Spike 35. You have been asked to make a plan to back up all critical servers in the office. Where should you keep the backup tapes after the backup is complete? . A. Inside the server room. . B. In a locked closet outside the server room. . C. At a secure offsite location. . D. In the manager's cabin. 36. One of the users in your office complains that he is not able to connect to the network or the Internet. Which of the following steps should you take first in order to troubleshoot the connectivity problem? . A. Ping the loopback address. . B. Ping a remote host. . C. Ping the default gateway. . D. Ping the IP address of the user's computer. 37. Which of the following utilities would you use when a Windows XP user is not able to connect using computer names? . A. ping . B. nbtstat . C. netstat . D. tracert 38. Which of the following utilities is used on a Linux system to verify TCP/IP configuration? . A. ipconfig . B. dig . C. arp . D. ifconfig 39. A new network administrator has configured some new wireless clients. None of these clients is able to connect to the network. Other clients already on the same access point do not have any connectivity problem. Which of the following is the possible reason for the problem? . A. An incorrect SSID . B. An incorrect IP address . C. A faulty access point . D. A poor signal due to EMI 40. One of the users has reported problems with his desktop. He is somewhat unclear about the problem's symptoms and you need to visit his desk to rectify the problem. What should be your first step to resolve the problem? . A. Check event logs on the desktop. . B. Ask the user to restart the desktop. . C. Try to recreate the problem. . D. Gather more information from the user.