Question 1
Question
72.257.126.11 is a valid A class host address.
Question 2
Question
In CIDR, conventional network class distinctions do not exist.
Question 3
Question
Some software errors point to a physical connectivity problem.
Question 4
Question
Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems
Question 5
Question
193.255.126.255 is a valid C class host address.
Question 6
Question
In a star topology, a single connection failure will halt all traffic between all sites.
Question 7
Question
In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers.
Question 8
Question
Standards assist in network design.
Question 9
Question
Not all Transport layer protocols are concerned with reliability.
Question 10
Question
Latency occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
Question 11
Question
All protocols are routable.
Question 12
Question
The command used to view IP information on a Windows workstation is ipconfig.
Question 13
Question
Cut-through switches can detect corrupt packets.
Question 14
Question
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
Question 15
Question
A physical topology ____.
Answer
-
a. specifies device types
-
b. depicts a network in broad scope
-
c. specifies connectivity methods
-
d. specifies addressing schemes
Question 16
Question
In which OSI model layer does TCP operate?
Answer
-
Physical
-
b. Transport
-
c. Network
-
d. Data Link
Question 17
Question
Transport layer protocols break large data units into ____.
Answer
-
PDUs
-
b. segments
-
c. frames
-
d. block IDs
Question 18
Question
____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.
Answer
-
ARP
-
b. PING
-
c. Telnet
-
d. FTP
Question 19
Question
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
Answer
-
a. collision domain
-
b. broadcast domain
-
c. interference domain
-
d. duplicate domain
Question 20
Question
1000Base-SX has a maximum throughput of ____.
Answer
-
a. 1 Gbps
-
b. 10 Gbps
-
c. 100 Gbps
-
d. 1000 Gbps
Question 21
Question
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.
Answer
-
a. proxy
-
b. core
-
c. Internet
-
d. default
Question 22
Question
How is reliability achieved in TCP?
Question 23
Question
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
Answer
-
a. 0
-
b. 1
-
c. first eight
-
d. last eight
Question 24
Question
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
Answer
-
a. dash ( - )
-
b. underscore ( _ )
-
c. backward slash ( \ )
-
d. forward slash ( / )
Question 25
Question
A(n) ____ is a graphical representation of a network’s devices and connections.
Question 26
Question
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
Answer
-
a. Performance
-
b. Fault
-
c. Network
-
d. Configuration
Question 27
Question
28. ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
Answer
-
a. Traffic monitoring
-
b. Traffic routing
-
c. Traffic polling
-
d. Traffic shaping
Question 28
Question
The most common type of caching is ____ caching.
Answer
-
a. online
-
b. Web
-
c. Internet
-
d. device
Question 29
Question
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
Answer
-
a. network monitor
-
b. sniffer
-
c. protocol analyzer
-
d. multimeter
Question 30
Question
The ____ utility allows you to view a host’s routing table.
Answer
-
a. nbstat
-
b. pathping
-
c. nslookup
-
d. route
Question 31
Question
Which of the following is a valid IP public address for use by a host on a LAN?
Answer
-
a. 10.2.256.5
-
b. 200.0.0.1
-
c. 192.168.10.5
-
d. 127.0.0.1
Question 32
Question
The result from ANDing 11110101 with 10111100 is ____.
Answer
-
a. 11111101
-
b. 10111101
-
c. 10110100
-
d. 01001010
Question 33
Question
What is the default administrative distance of static routes?
Question 34
Question
What is an Autonomous System in the context of internetworking?
Answer
-
a. A system that functions independently without external intervention
-
b. A group of routers under a common administration
-
c. A group of routers that have routes to every member of the group
-
d. A group of routers that can be configured by simply changing the settings in any one member
Question 35
Question
What does a layer 2 switch do when it receives a broadcast frame from one of the hosts connected to it?
Answer
-
a. Forwards it to all the other hosts connected to the switch
-
b. Examines the TTL field in the header and if the value is not 0, forwards it to all the other hosts on the switch
-
c. Discards it
-
d. A and B
Question 36
Question
When would static NAT be used over dynamic NAT?
Answer
-
a. When there is only a single public IP address available
-
b. When a router does not support NAT
-
c. When a server requires a fixed Global IP address
-
d. To assign an IP address from an IP address pool
Question 37
Question
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
Answer
-
a. open
-
b. standard
-
c. routable
-
d. nonroutable
Question 38
Question
A(n) ____ is the place where a telephone company terminates lines and switches calls between different locations.
Question 39
Question
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
Question 40
Question
Repeaters operate in the ____ layer of the OSI model.
Answer
-
a. Physical
-
b. Network
-
c. Transport
-
d. Session
Question 41
Question
A ____ can interpret physical addressing information.
Answer
-
a. repeater
-
b. tranciever
-
c. hub
-
d. bridge
Question 42
Question
Switches can create ____ by grouping a number of ports into a broadcast domain.
Answer
-
a. trunks
-
b. spanning trees
-
c. gateways
-
d. VLANs
Question 43
Question
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
Answer
-
a. Static
-
b. Dynamic
-
c. Best path
-
d. Link-state
Question 44
Question
A complex combination of topologies is known as a ____ topology.
Answer
-
a. mixed
-
b. hybrid
-
c. compound
-
d. mulitpart
Question 45
Question
The most common logical topologies are ____ and ring.
Answer
-
a. bus
-
b. star
-
c. wired
-
d. hybrid
Question 46
Question
Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.
Answer
-
a. FCS
-
b. header
-
c. preamble
-
d. frame
Question 47
Question
In a ____ attack, a person redirects or captures secure transmissions as they occur.
Answer
-
a. denial-of service
-
b. man-in-the-middle
-
c. war driving
-
d. phishing
Question 48
Question
____ software searches a node for open ports.
Answer
-
a. Phishing
-
b. Sniffing
-
c. Authentication
-
d. Port scanner
Question 49
Question
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
Answer
-
a. switch’s
-
b. gateway’s
-
c. router’s
-
d. proxy server’s
Question 50
Question
____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
Answer
-
a. flashing
-
b. denial-of-service
-
c. dictionary
-
d. brute force
Question 51
Question
The combination of a public key and a private key is known as a ____.
Answer
-
a. key lock
-
b. key frame
-
c. key pair
-
d. key set
Question 52
Question
RADIUS and TACACS belong to a category of protocols known as AAA (____).
Answer
-
a. access, authorization, and accounting
-
b. authentication, authorization, and accounting
-
c. authentication, authorization, and authority
-
d. authentication, authorization, and access
Question 53
Question
Standards define the ____ performance of a product or service.
Answer
-
a. ideal
-
b. most acceptable
-
c. minimum acceptable
-
d. maximum acceptable
Question 54
Question
In which OSI model layer(s) do NICs operate?
Question 55
Question
A(n) ____ number is the address on a host where an application makes itself available to incoming or outgoing data.
Answer
-
a. port
-
b. source
-
c. destination
-
d. sequence
Question 56
Question
The protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network through a router is ____.
Answer
-
a. TCP
-
b. ICMP
-
c. UDP
-
d. IP
Question 57
Question
In IPv6, each address contains a(n) ____, or a variable-length field at the beginning of the address that indicates what type of address it is.
Answer
-
a. Variable Prefix
-
b. Address Prefix
-
c. Format Prefix
-
d. Field Prefix
Question 58
Question
In IPv4 addressing, a node with an IP address of 128.64.88.20 belongs to a Class ____ network.
Question 59
Question
Which of the following best describes the definition of administrative distance?
Answer
-
a. Measure of the trustworthiness of the source of a route update
-
b. The number of hops to a destination node recorded in the routing table
-
c. The maximum number of hops for a routing protocol which is used to set the TTL value in an IP packet
-
d. Distance to the closest network administrator
Question 60
Question
Which of the following statements is true regarding CSMA/CD after a collision has occurred?
Answer
-
a. Each device waits for a random backoff period before attempting to retransmit
-
b. Both stations stop transmitting immediately
-
c. The devices involved in the collision have priority to transmit data
-
d. The device with the highest priority will attempt to retransmit first
Question 61
Question
The decimal number 782 converted to binary is
Answer
-
a. 1010001000
-
b. 10000000110
-
c. 11100011100
-
d. 1100001110
Question 62
Question
64. When signals may travel in both directions over a medium but only in one direction at a time, the transmission is considered ____.
Answer
-
a. simplex
-
b. multiplex
-
c. half-duplex
-
d. full-duplex
Question 63
Question
Which network model ensures that no computer on the network has more authority than another?
Answer
-
a. client/server
-
b. stand alone
-
c. peer-to-peer
-
d. distributed
Question 64
Question
____ networks are the most popular type of network for medium- and large-scale organizations.
Answer
-
a. Client/server
-
b. Peer-to-peer
-
c. Stand-alone
-
d. Stationary
Question 65
Question
A ____ network is confined to a relatively small space.
Answer
-
a. NAN
-
b. MAN
-
c. WAN
-
d. LAN
Question 66
Question
Which network topology is the most common?
Answer
-
a. ring
-
b. star
-
c. hybrid
-
d. Ethernet
Question 67
Question
Which OSI model layer initiates the flow of information?
Answer
-
a. Physical
-
b. Session
-
c. Application
-
d. Presentation
Question 68
Question
Which OSI model layer manages data encryption?
Answer
-
a. Physical
-
b. Session
-
c. Application
-
d. Presentation
Question 69
Question
Which type of protocol is useful when data must be transferred quickly?
Answer
-
a. connection-oriented
-
b. connectionless
-
c. TCP
-
d. IP
Question 70
Question
____ is the process of reconstructing segmented data.
Answer
-
a. Reassembly
-
b. Reengineering
-
c. Resegmenting
-
d. Realigning
Question 71
Question
The process of determining the best path from Point A on one network to Point B on another is known as ____.
Answer
-
a. mapping
-
b. enhancing
-
c. reconfiguring
-
d. routing
Question 72
Question
In which OSI model layer does IP operate?
Answer
-
a. Physical
-
b. Transport
-
c. Network
-
d. Data Link
Question 73
Question
Which Data Link sublayer manages flow control?
Answer
-
a. LLC
-
b. MAC
-
c. Management layer
-
d. Addressing layer
Question 74
Question
Which Data Link sublayer manages access to the physical medium?
Answer
-
a. LLC
-
b. MAC
-
c. Management layer
-
d. Addressing layer
Question 75
Question
When signals are free to travel in both directions over a medium simultaneously, the transmission is considered ____.
Answer
-
a. simplex
-
b. multiplex
-
c. half-duplex
-
d. full-duplex
Question 76
Question
When signals may travel in only one direction over a medium, the transmission is considered ____.
Answer
-
a. simplex
-
b. multiplex
-
c. half-duplex
-
d. full-duplex
Question 77
Question
The most significant factor in choosing a transmission method is its ____.
Answer
-
a. noise
-
b. attenuation
-
c. throughput
-
d. latency
Question 78
Question
The more twists per foot in a pair of wires, the more resistant the pair will be to ____.
Answer
-
a. throughput
-
b. attenuation
-
c. cross talk
-
d. latency
Question 79
Question
TCP is a(n) ____ protocol.
Answer
-
a. open-ended
-
b. indiscriminating
-
c. connection-oriented
-
d. connectionless
Question 80
Question
____ is more efficient than TCP for carrying messages that fit within one data packet.
Answer
-
a. IP
-
b. UDP
-
c. ICMP
-
d. IGMP
Question 81
Question
In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.
Answer
-
a. TCP
-
b. UDP
-
c. IP
-
d. ARP
Question 82
Question
In IPv4 addressing, each public IP address is a unique ____ number.
Answer
-
a. 12-bit
-
b. 32-bit
-
c. 64-bit
-
d. 128-bit
Question 83
Question
In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.
Question 84
Question
In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a Class ____ network.
Question 85
Question
The default subnet mask for a Class B network is ____.
Answer
-
a. 255.0.0.0
-
b. 255.255.0.0
-
c. 255.255.255.0
-
d. 255.255.255.255
Question 86
Question
A(n) ____ address represents any one interface from a group of interfaces, any one of which can accept a transmission.
Answer
-
a. anycast
-
b. unicast
-
c. multicast
-
d. singlecast
Question 87
Question
All Ethernet networks, independent of their speed or frame type, use an access method called ____.
Answer
-
a. CSMA
-
b. CSMA/DC
-
c. CSAM/CD
-
d. CSMA/CD
Question 88
Question
A ____ occurs when two transmissions interfere with each other.
Answer
-
a. jam
-
b. collision
-
c. carrier sense
-
d. multiple access event
Question 89
Question
Together, the FCS and the header make up the ____-byte “frame” for the data.
Question 90
Question
In addition to viewing its LEDs and using a loopback plug to test a NIC’s functionality, you can also check a NIC’s connectivity with ____.
Answer
-
a. simple commands
-
b. special clients
-
c. special switches
-
d. special software
Question 91
Question
Traditional switches operate at the ____ layer of the OSI model.
Answer
-
a. Physical
-
b. Data link
-
c. Network
-
d. Session
Question 92
Question
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
Answer
-
a. Routers
-
b. Switches
-
c. Gateways
-
d. Broadcast domains
Question 93
Question
The ____ encompasses the entire telephone system, from the wires that enter homes and businesses to the network centers that connect different regions of a country.
Answer
-
a. SLIP
-
b. POTS
-
c. PPP
-
d. PSTN
Question 94
Question
____ means that a telephone company connects residential users to its network with fiber-optic cable.
Answer
-
a. OLT
-
b. FITL
-
c. PON
-
d. FITH
Question 95
Question
A class ____ network class is reserved for special purposes.
Question 96
Question
In classful addressing, the Class B IPv4 address network ID is located in the ____.
Answer
-
a. last 8 bits
-
b. last 16 bits
-
c. first 8 bits
-
d. first 16 bits
Question 97
Question
In classful addressing, Class C IPv4 address host information is located in the ____.
Answer
-
a. last 8 bits
-
b. last 16 bits
-
c. first 8 bits
-
d. first 16 bits
Question 98
Question
Within a classful addressing, ____ is the default subnet mask for a Class C address.
Answer
-
a. 255.255.255.255
-
b. 255.255.255.0
-
c. 255.255.0.0
-
d. 255.0.0.0
Question 99
Question
The result from ANDing 11001111 with 10010001 is ____.
Answer
-
a. 11001111
-
b. 10010001
-
c. 10000001
-
d. 00000001
Question 100
Question
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Answer
-
a. Cracking
-
b. Hacking
-
c. War driving
-
d. Phishing
Question 101
Question
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
Answer
-
a. flashing
-
b. denial-of-service
-
c. war driving
-
d. phishing
Question 102
Question
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
Answer
-
a. packet-filtering
-
b. gateway
-
c. proxy
-
d. selective
Question 103
Question
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.
Answer
-
a. intensity
-
b. background
-
c. scope
-
d. focus
Question 104
Question
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
Answer
-
a. open
-
b. static
-
c. promiscuous
-
d. continuous
Question 105
Question
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
Answer
-
a. Jabbers
-
b. Ghosts
-
c. Giants
-
d. Runts
Question 106
Question
A ____ usually results from a bad NIC.
Answer
-
a. jabber
-
b. ghost
-
c. giant
-
d. runt
Question 107
Question
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously
Question 108
Question
110. Which of the following is a valid IP address for use by a host on a LAN?
Answer
-
a. 10.2.257.5
-
b. 127.0.0.1
-
c. 192.168.10.5
-
d. 227.125.5.25
Question 109
Question
Which of the following is a valid IP address for use by a host on a LAN?
Answer
-
a. 10.256.255.5
-
b. 127.0.0.1
-
c. 227.125.5.25
-
d. None of the above