Escolar Documentos
Profissional Documentos
Cultura Documentos
This material contains sample questions for NIIT students (being in Q2 - MMS course) for preparing better in
Q2 exam. The students need to study hardly on the Q2 curriculumn before try to do the questions. Any questions
and doubts, ask the faculty to be explained and to be cleared to you for high score at the quarter test.
The ________ connects nodes over a network using a central control unit called the hub.
1 1,Cellular category
2,Mesh model
3,Star topology
4,Bus topology
Statement A: The resources and software capabilities that are shared by the nodes in a
network are commonly known as services.
Statement B: The common services provided in a network include file, print, message,
2 application, and database services.
6 2,This protocol provides the services of the Session layer of the OSI model.
3,This protocol is subdivided into three applications: AppleShare File Server (AFS),
AppleShare Print Server (APS), and AppleShare PC (APC).
4,This protocol establishes connections between network nodes and various servers.
Which of the following protocol suites is used for communication between personal
computers and mainframes (IBM Hosts)?
7 1,TCP/IP
2,IPX/SPX
3,DLC
4,AppleTalk
Consider the following statements:
Statement A: The NBP protocol maps the names of nodes with their addresses.
8 Statement B: The RTMP protocol is used for the management of routing information.
Which of the following layers contains a number of protocols that provide services, such as
e-mails, Web browsing, and remote login by users?
10 1,Application layer
2,Internet layer
3,Transport layer
4,Network Access layer
Which of the following is used to identify the best path for sending data packets over a
network?
11 1,Routing
2,Packet switching
3,Multicasting
4,Multiplexing
Earthen Wares Inc. had a network of 200 computers. Recently, the company has
undergone a major expansion and 300 more employees have been recruited. The network
has now expanded to 500 computers. Network users are now complaining of a major slow
down in the network speed. What should Timothy Burt, the network administrator, do to
12 increase the speed of the network?
1,Implement repeaters to strengthen the networking signal.
2,Implement a hub and manage the network centrally.
3,Segment the network and use a bridge to connect the segments.
4,Use a CSU/DSU to connect computers of the network.
Consider the following statements:
Statement A: The IEEE 802.1 LAN standard provides information regarding the
prerequisites for the interface of LAN standards.
Statement B: The IEEE 803.2 is a part of the Logical Link Control (LLC) sub-layer of the
13 Data Link layer.
BlueMoon Inc. has recently opened another branch at a distance of 150 metres from the
branch existing in the same city. Its network administrator observed that the signal
traversing through their network transmission media is degrading and distorting as the
length of the network segment has increased. Which of the following devices can best
16 solve the above problem?
1,Network Interface Card
2,Terminal server
3,Repeater
4, Gateway
David Wong is a networking intern at Certified Carriers. He is studying the IPX/SPX protocol
suite as part of his networking project. He is looking for a protocol that provides fast and
connectionless service. In addition, it should also be able to provide routing services.
Which protocol would best suit his requirements?
1,SAP
17
2,IPX
3,SPX
4,RIP
David Bernard is a renowned scientist studying the field of ISDN technology. A summit is
being conducted on the prospects of expansion of wireless and mobile networks and David
Bernard has been invited as the guest of honor. He will also conduct a session about the
latest developments in the field. This lecture is being broadcast at a transmission rate of
21 64 Kbps over the Internet to many universities all over North America. Which type of
system will be used to carry out this session?
1,Synchronous Optical NETwork
2,Synchronous Digital Hierarchy
3,T-carrier systems
4,E-carrier systems
Consider the following statements:
Statement A: In Duplex transmission, either node can transmit while the other node can
receive data.
22 Statement B: In half-duplex transmission, both the nodes can transmit as well as receive
data at the same time.
Statement A: The IEEE 802.3 standard is used for 1-persistent CSMA/CD (Carrier Sense
Multiple Access/ Collision Detection) LAN, which is commonly known as Ethernet.
Statement B: Using the CSMA protocol, a node transmits data packets whenever it finds
the channel or the transmission media idle.
Red Infosystems is setting up a network for 100 computers to accommodate new recruits
in its production department. The management wants the network to be efficient and has
instructed the network administrator, Keith Turner, to ensure this, while setting up the
network. In order to establish an efficient network, Keith has decided to subnet the
network. The network address allocated for this network is 194.168.10.0. Keith has
decided to divide the network into four subnets. Determine the subnet mask for this
network.
1,255.255.255.240
24
2,255.255.192.0
3,255.255.256.0
4,255.255.224.0
Simon, the network administrator at ITech Inc, has received complaints regarding the slow
rate of data transfer over the network. After checking the speed and flow of data, Simon
wants to check the route being used for data transfer and the maximum number of hops in
the path to the destination host. Which utility will help him find out this information?
1,Simon will need to use the Ping utility with the /count option to check the hop count and
25 the path of data transfer.
2,Simon will need to use the IPConfig utility with the /renew option to check the latest
information about the path used by the router.
3,Simon will need to use the TFTP service to check the rate of data transfer and then apply
the IPConfig utility with the /renew option to check the count option to check current
number of hops used in the path.
4,Simon will need to use the tracert utility to check the path of the router and apply the –h
option to check the maximum number of hops in the path to the destination host.
Tom Grant is the network administrator at Global Systems Inc. He needs to design the
network setup for his organization. More than 1 650 000 hosts will be connected in the
27 network. Which IP addressing class would best meet his requirement?
1,Class C
2,Class D
3,Class A
4,Class B
Red Square Inc. is an upcoming virtual music store in North America. The company has
increased its distribution globally and provides the facility to order music CDs over the
Internet. The Web site is comprehensive and allows visitors to listen to music online. In
order to promote their virtual music store, the company frequently organizes concerts,
which can be seen live over the Internet. In order to view these concerts, the customers
need to subscribe to the Web site. Each subscriber receives a login name and password
using which he/she can log in, view, and listen to the concert. The Web site maintains the
28 subscribers as user groups and uses streaming audio/video to send data packets to
multiple computers. Determine the IP addressing scheme that will be used by these user
groups while viewing and listening to the concert.
1,The subscribers will use their respective subnet IDs for teleconferencing.
2,The subscribers will need a multicast IP address provided by the Class D IP addresses.
3,The subscribers will use the network addresses of the other networks in order to route
data packets to particular users.
4,The subscribers will need to use reserved IP addresses to teleconference over a secure
network setup.
Research Infotech needs to set up a small network for performing its research and
development on the new wireless technologies using the Internet. The network needs to be
fast and efficient. In addition, the users should be able to use the Internet only for
29 accessing relevant Web sites. Permissions for accessing chat rooms should not be allowed.
Which type of server can be used to implement such a network setup?
1,Newgroup servers
2,Proxy and cache servers
3,Catalog servers
4,News servers
Which of the following is true about a mirrored server?
1,It stores a copy of data contained in another servers.
30 2,It is used to make available the same business transaction to multiple users across the
Internet.
3,It is used for user authentication.
4,It is used to store the repository of certificates.
Robert Russel is a Web administrator in Red Sky Inc. He needs to install a Web server in his
organization. His primary requirement is that the server must be platform independent and
it should enable its users to add functionality to their environments easily. Which Web
31 server best meets the requirements?
1,IIS Web server
2,Apache server
3,Personal Web server
4,FTP server
Consider the following statements:
34
3,Enables users a set of bulletin boards on different subjects.
4,Enables users to log in remotely to a server. This service is used for allowing the clients
to log on to a remote server.
1. Filters packets at the Network layer and examines packet headers against an access
control list
3. Allows only those connections that are from a trusted source and are considered safe
42
4. Ensures that the users behind the firewall have access to the Internet
Sniffing is:
1,A technique used to deliver an e-mail message to someone who might otherwise not
choose to receive it
43 2,A technique used to passively intercept and copy all network traffic on a system, a
server, a router, or a firewall
3,A technique used redirect data that is being exchanged between two authorized entities
to one or more unauthorized entities
4,A technique used to send abnormally large ping packets to a specific computer
_______ supports minimum key sizes of 128, 192, and 256 bits.
45 1,Triple (DES)
2,DES
3,Ron’s Code
4,AES
1. The first node requests communication by sending a packet with the sequence number
and SYN bit.
2. The second node acknowledges the receipt of the data and responds with an
acknowledgement (ACK) that contains the sequence number plus one, and its own
48
sequence number back to the first node.
3. The first node responds and the communication between the two nodes proceeds.
1,Broadcast storm
2,Three-way handshake
3,Spamming
4,Multi-access handshake
Identify the networking technology:
When an external entity accesses an internal network resource, the external IP address is
mapped to a fixed IP address.
49 When an internal node accesses an external resource, it’s device maps a private IP address
to the first IP address that is available from a pool of globally unique IP addresses.
1,Secure Socket Layer (SSL)
2,Socket Server (SOCKS)
3,Transport Layer Security (TLS)
4,Network Address Translation (NAT)
_______ is the high speed network hat exists separately from the LAN and main corporate
network and allows different kinds of storage devices to be shared.
51 1,SAN
2,NAS
3,DAS
4,MAN
Which of the following communication media is the cost-effective solution for users
seeking an independent communications network and connects a large number of
54 geographically dispersed sites?
1,ISDN Integrated Services Digital Network (ISDN)
2,Very Small Aperture Terminals (VSAT)
3,Wireless
4,Digital Subscriber Line (DSL)
In which of the following, a mobile client can be alerted and informed about the presence
of various services within the specified area?
56 1,L-commerce
2,M-commerce
3,T-commerce
4,E-commerce
1,A network firewall is a mechanism used to protect a trusted network from an untrusted
network.
59 2,A network firewall is a standard followed to protect a trusted network from an untrusted
network.
3,A network firewall is a network access policy followed to protect a trusted network from
an untrusted network.
4,A network firewall is a mechanism used to protect an untrusted network from a trusted
network.
Which of the following statements is NOT true for smart cards?
1,Smart Cards can be used to pay for parking at parking meters or to get on subways,
trains, or buses.
2,Smart Cards can be used to dial a connection on a telephone and be charged on a per-
60 call basis.
3,Smart Cards can be used to give hospitals or doctors personal data without filling out a
form.
4,Smart Cards can be used to establish your identity when logging on to an Internet access
provider or to an online bank.
__________ is the process that verifies the identity of a user.
61 1,Authorization
2,Authentication
3,Encryption
4,Access control
A ________ is a special area of memory reserved to hold data and instructions recently
accessed from another location.
62 1,Stack
2,Cookie
3,Cache
4,Cluster
If the BIOS did not locate the boot record in the floppy or hard drive, what kind of error is
shown on the screen?
63
1,Windows Protection Error
2,Non-System Disk or Disk Error
3,Error in Loading System Files
4,Bluescreen Error
Which of the following is a hidden file, located under the C:\Windows directory, which
contains all information about the system’s hardware configuration, and is checked by the
system for the first part of Registry file?
64
1,SYSTEM.DAT
2,USER.DAT
3,AUTOEXEC.BAT
4,WIN.INI
You have installed a new Windows 2000 Professional client in your network and manually
assigned it a valid IP address. However, when you try to browse the network, nothing is
displayed. Which network utility should you use to display the current IP settings in
Windows 2000 systems and serve as a starting point for troubleshooting?
65
1,WINIPCFG
2,TRACERT
3,IPCONFIG /ALL
4,ARP
Douglas shared a folder on his machine. Which of the following permission is assigned to
the share by default?
66 1,Read Only for Everyone
2,Full Control for Everyone
3,Full Control for CREATER OWNER
4,Read Only for CREATER OWNER
The ____________ section contains the secondary bootstrap loader.
67 1,MBR
2,DMA
3,DRAM
4,ROM
The NTFS structure uses 64-bit entries to keep track of the storage on the disk. The core
component of the NTFS system is the __________ that contains information about each file
being stored on the disk.
68
1,Volume file
2,Log file
3,Master File Table
4,Quota Table
Which file system supports encryption of files and enables administrators to set up a
limited amount of hard drive space to each user?
1,CDFS
2,FAT32
3,FAT16
69 4,NTFS
Which of the following administrative tools is stored under the Documents and Settings
directory, and contains system information and settings that are specific to the user?
1,User profiles
2,Group Policies
3,Network Share Permissions
70 4,NTFS Rights
Consider the following statements:
71 Statement B: PIF files contain information about how much memory and other system
resources an application requires.
Which of the following statement is true with respect to the above statements?
1,Both, Statement A and Statement B, are False.
2,Both, Statement A and Statement B, are True.
3,Statement A is True and Statement B is False.
4,Statement A is False and Statement B is True.
Cruzan, the project manager of Systems Solutions, is working on an E-learning project with
a team of five members. He has prepared a Weekly Schedule sheet, detailing the tasks and
the targets for each of his team members. He wants to share this file with all his team
members, so that they can update the sheet on daily basis. What permissions should
Cruzan assign to the file so that his team members are able to update the sheet?
1,He should assign Change Permission to the file
72 2,He should assign Write Permission to the file
3,He should assign Execute Permission to the file
4,He should assign Ownership Permission to the file
73 1,System profile
2,User profile
3,Group policy
4,Network share
You want to run an application on your Windows 98 operating system, the code for which is
written in an older version of Microsoft operating systems. When you try to run the
application, it does not execute properly. What will you do to execute this application?
1,Use SYSEDIT.EXE to establish compatibility between the application and the operating
system.
2,Use mkcompat.exe to establish compatibility between the application and the operating
74 system.
3,Use Scanreg.exe utility to establish compatibility between the application and the
operating system.
4,Use CVT1.EXE utility to establish compatibility between the application and the operating
system.
Web pages can be loaded onto the desktop and automatically updated from the Web. This
type of operation is referred to as _________.
1,Duplexing
2,Active Channel
75
3,Active Desktop
4,Mirroring
___________ are pieces of retrievable information stored on the Web browser by the Web
server.
1,Cookies
2,History
76
3,Favorites
4,NetHood
Files and folders can be encrypted from the command line using the _____ command.
77 1,Mem
2,Cipher
3,Ver
4,Setver
In XYZ Solutions, the employees in different shifts are working on Windows 98 operating
system. In order to maintain and govern the rights and privileges of different users, certain
guidelines are framed in order to restrict the user access, so that when a user logs on to
the system, Windows 98 checks the user’s configuration information. What are these
guidelines known as?
78
1,System Policies
2,Registry Editor
3,Policy editor
4,Policies security
IP addresses exist in the numeric format of XXX.YYY.ZZZ.AAA. This format of specifying
addresses is referred to as the dotted decimal notation. Each address consists of four
______ separated by dots (.).
1,4-bit fields
2,2-bit fields
79
3,8-bit fields
4,6-bit fields
Which of the following device receives, amplifies, and retransmits messages to keep them
from deteriorating as they are transmitted?
80
1,Hub
2,Bridge
3,Router
4,Gateway
Which of the following technologies provides high-speed communication links by using the
existing telephone lines to generate bandwidths ranging up to 9Mb/s or more?
81
1,ISDN Connection
2,Digital Subscriber Lines
3,Dialup Networking
4,Satellite Internet Access
SoftPro Pvt. Ltd. has set up a new office. As a part of the process for implementing
security, they want to restrict access to the internal network so that specific types of items
or addresses are not allowed to pass between the networks. Which of the following
security measures should be taken to control the traffic between the networks?
82
3,They should set up the firewall program to protect their company network.
4,They should combine various certificates with security standards such as the IP Security
Protocol
You are using IEEE 802.11b standard for transmitting data over wireless LAN. You want to
ensure secure transmission of data by the workstations. Which of the following methods is
the best way to ensure secure transmission of data?
83
1,Enable Authentication feature of the IEEE 802.11b standard.
2,Enable Encrypt data transmission feature of the IEEE 802.11b standard.
3,Enable Authorization feature of the IEEE 802.11b standard.
4,Enable the WEP function of the IEEE 802.11b standard.
As the System Administrator of a Software development firm, Jack wants to protect his
network from outside attacks by preventing unwanted connections from Internet devices.
How can he ensure the security of his network?
85 3,FDISK
4,MEM
The command line utility used to find out the domain name is ______________.
86
1,PING
2,TRACERT
3,NSLOOKUP
4,FTP
Which of the following are the two Registry editors included in Windows 2000 and Windows
XP that enable you to perform basic functions such as adding, editing, and removing
Registry entries?
87
The system administrator of BlueCorp Inc. wants to change the attribute of files, such as
hidden, read-only, and system files so that they can be seen and manipulated for
troubleshooting purposes. Which of the following files will he use to achieve this task?
89
1, SYS.COM
2,CONFIG.SYS
3,ATTRIB.EXE
4,AUTOEXEC.BAT
Kelly has forgotten her logon password and is not able to log on to her system. Therefore,
she wants to logon to her system using a local logon password. Which of the following
methods will help Kelly obtain a local logon password?
1,Use the Emergency Start disk to gain access to the system and the hard drive
90 2,Start the system in step-by-step confirmation mode (pressing F8 during the boot up).
3,Access the local machine and delete the username.PWL file in the C:\Windows directory
4,Run the Setup utility and select the Verify option when presented by the Setup procedure
Processor – Pentium II
Ram – 64 MB
HDD – 2 GB
CD-ROM – 12X
91
1,The computer has some applications, which are conflicting with Windows XP.
2,The computer does not have sufficient hard disk space to install Windows XP.
3,The computer does not have the required partition size to install Windows XP.
4,The computer’s CD drive is not compatible with Windows XP.
Mary Wilson has Windows NT installed on her computer. She takes a daily backup of her
files on a separate computer. The computer crashes one day after completing the boot
procedure successfully. Mary suspects that the problem is due to corruption of certain
system files. Which of the following methods will help her to correct the problem?
92 1,She should try to repair the files by using the Emergency Repair Disk of the computer.
2,She should try to repair the files by using the Setup disks of the computer.
3,She should try to restore the operating system from the backup files maintained on
another computer..
4,She should try to repair the files by copying the files from another operating system.
You are the administrator of a company named Firmware Corporation. One of the users
shuts down his computer and when he starts it, the computer does not boot up. You
93 suspect that the file system boot sector is corrupted. How can you resolve this problem?
1,Use recovery console to fix the MBR
2,Reboot the system again, it will automatically correct the problem
3,Use the F8 option at start up and select Last Known Good Configuration.
4,Use the Emergency Repair Disk to repair the problem.