Você está na página 1de 10

1. which of the following describes the use of spanning tree protocol (stp)?

a. resolve routing loops


b. eliminate split horizon errors
c. limit collisions
d. resolve switching loops *

2. compa" is trying to locate a new computer named "compb" on the network. which
of the following does "compa" broadcast to find the mac address of "compb"?
a. mac request
b. arp request *
c. ping
d. telnet
e. proxy arp

3. broadcast radiation can cause which of the following? (choose three.)


a. higher segment attenuation *
b. reduced host performance *
c. reduced switching speeds
d. increased network collisions *
e. increased protocol storms
f. increased arp requests

4. which of the following protocols use a three-layer hierarchical network-


addressing scheme?
a. ipx
b. ip
c. netbeui
d. udp

5. which of the following are useable class a ip addresses with a default subnet
mask? (choose three.)
a. 127.0.39.1
b. 111.9.28.30 *
c. 123.1.2.132 *
d. 128.50.38.2
e. 105.1.34.1 *
f. 0.23.92.3

6. what are the total number of bits available for assignment to the subnet field
when subnetting class a, class b, and class c networks? (choose three.)
a. 24 *
b. 22
c. 16 *
d. 14
e. 8 *
f. 6

7. which of the following protocols are used for e-mail transfer between clients
and servers? (choose three.)
a. tftp
b. snmp
c. pop3 *
d. smtp *
e. imap4 *
f. postoffice

8. which of the following is important when considering ip addressing in relation


to bootp?
a. bootp dynamically creates a database of all available ip addresses within a
network.
b. bootp allows multiple workstation profiles sharing the same ip address.
c. bootp is not designed to provide dynamic address assignment. *
d. bootp must statically assign ip addresses through rarp.

9. which of the following does 1000base-t use to accomplish gigabit speeds on cat
5e cable?
a. the use of four conductors in full-duplex mode
b. the use of two multiplexed pairs of wires, simultaneously
c. the use of three pairs of wires for data and the fourth for stabilization and
forward error correction
d. the use of all four pairs of wires in full-duplex mode, simultaneously *

10. which of the following are features of the internet protocol (ip)? (choose
two.)
a. it is the most widely implemented global addressing scheme. *
b. it allows two hosts to share a single address on a local area network.
c. it is a hierarchical addressing scheme allowing addresses to be grouped. *
d. it is only locally significant, used primarily on local area networks.

11. which of the following are small, discrete components found within a personal
computer? (choose three.)
a. transistor
b. microprocessor *
c. power supply *
d. capacitor
e. light emitting diode
f. hard disk *

12. which of the following features are important considerations when designing a
10base-t network? (choose three.)
a. operates in either full-duplex or half-duplex modes *
b. cable is heavy, stiff, and difficult to install
c. supports a longer segment length than 10base5 *
d. usually configured in a star or extended star topology *
e. cabling represents a single point of failure
f. utilizes a shared bus device

13. which of the following is a term associated with replacing hubs with switches
to increase the number of collision domains?
a. encapsulation
b. latency
c. segmentation *
d. layered model
e. broadcast domain
f. extended

14. select the necessary information that is required to compute the estimated
time it would take to transfer data from one location to another. (choose two.)
a. file size *
b. data format
c. network in use
d. type of medium
e. bandwidth of the link *

15. what type of network cable is used to interconnect the isdn bri port to a
service-provider device?
a. cross-over
b. straight-through *
c. roll-over
d. patch cable

16. when an administrator establishes a terminal connection to a server named


corporate.mydomain.com, which protocols are used to remotely issue commands to
that server? (choose two.)
a. smtp
b. snmp *
c. dns
d. telnet
e. ftp
f. nms

17. convert the binary number 10111010 into its hexadecimal equivalent. select the
correct answer from the list below.
a. 85
b. 90
c. ba *
d. a1
e. b3
f. 1c

18. which of the following describe characteristics of the telnet protocol?


(choose three.)
a. the client host requires processing power equal to that of the server to which
it is connected.
b. the processing and storage takes place on the remote server. *
c. telnet is a true client server application. *
d. telnet is a presentation layer applet.
e. the telnet server runs special software called a daemon. *
f. telnet requires the support of dns and ftp to function properly.

19. which of the following are valid frame types for an 802.3 wlan? (choose
three.)
a. control *
b. directional
c. data *
d. byte
e. management *
f. signal

20. a small company has a class c network license and needs to create five usable
subnets, each subnet capable of accommodating at least 20 hosts. which of the
following is the appropriate subnet mask?
a. 255.255.255.0
b. 255.255.255.192
c. 255.255.255.224 *
d. 255.255.255.240

21. which of the following correctly describe ac and dc currents? (choose three.)
a. dc always flows in the same direction, and dc voltages always have the same
polarity. *
b. in dc systems, the flow of electrons is always from a negatively charged source
to a positively charged source.
c. in ac systems, electrons flow from negative to positive and then from positive
to negative. *
d. power lines carry electricity in the form of dc because it can be delivered
efficiently over large distances.
e. ac voltage reverses its polarity, so that the positive terminal becomes
negative, and the negative terminal becomes positive.
f. for ac and dc electrical systems, the flow of electrons is always from a
positively charged source to a negatively charged source.

22. using the data transfer calculation t=s/bw, how long would it take a 4mb file
to be sent over a 1.5mbps connection?
a. 52.2 seconds
b. 21.3 seconds *
c. 6.4 seconds
d. 2 seconds
e. 0.075 seconds
f. 0.0375 seconds

23. which term describes an arp response by a router on behalf of a requesting


host?
a. arp
b. rarp
c. proxy arp *
d. proxy rarp

24. the highest capacity ethernet technologies should be implemented in which


areas of a network? (choose three.)
a. between workstation and backbone switch
b. between individual workstations
c. between backbone switches *
d. between enterprise server and switch *
e. on aggregate access links *

25. a company with a class b license needs to have a minimum of 1,000 subnets with
each subnet capable of accommodating 50 hosts. which mask below is the appropriate
one?
a. 255.255.0.0
b. 255.255.240.0
c. 255.255.255.0
d. 255.255.255.192 *
e. 255.255.255.224

26. which of the following are considered the best electrical conductors for use
in data network communications? (choose three.)
a. glass fibers
b. copper *
c. gold *
d. plastic
e. silicon
f. silver *

27. when a network admin applies the subnetmask 255.255.255.248 to a class a


address, for a given subnet, how many ip addresses are available to be assigned to
devices?
a. 1022
b. 510
c. 254
d. 126
e. 30
f. 6 *

28. depending on how easily free electrons flow through them, materials are
classified into which three groups? (choose three.)
a. semiconductors *
b. solids
c. insulators *
d. conductors *
e. liquids
f. gases

29. why are internets necessary? (choose three.)


a. to overcome lan scalability limitations *
b. to overcome lan speed limitations
c. to overcome lan distance limitations *
d. to prevent collision and congestion conditions
e. to network networks *

30. which devices separate collision domains? (choose three.)


a. hubs
b. routers *
c. bridges *
d. switches *
e. repeaters
f. transceivers

31. what is unique about the dynamic host configuration protocol (dhcp)? (choose
two.)
a. it uses profiles to identify individual workstation configurations while
assigning ip addresses.
b. dhcp packets also include a leased ip address. *
c. it uses a different message format than does bootp.
d. it allows a host to obtain an ip address dynamically without a network
administrator. *
e. it allows the administrator to design a preset list of addresses for the hosts
to choose from automatically.

32. what device must be used between an aui port of a networking device and the
media to which it is being connected?
a. a transducer
b. a transmitter
c. a transceiver *
d. a transponder
e. a port replicator

33. what are facts about the operation of the bootstrap protocol (bootp)? (choose
two.)
a. operates in a client-server environment *
b. requires only a single packet exchange to obtain an ip address *
c. is designed to work best in a peer-to-peer networking environment
d. requires a multiple packet exchange to complete the ip address request

34. the 802.11b standard has a transmitting rate of 11 mbps. what is the actual
throughput?
a. 2.0 to 3.5 mbps
b. 3.5 to 4.5 mbps
c. 5.0 to 5.5 mbps *
d. 6.0 to 7.5 mbps
35. which of the following are defined by the terms "taking turns" and "first
come, first served"? (choose two.)
a. dual-ring
b. linear bus
c. deterministic *
d. non-deterministic *
e. contention
f. non-contention

36. a positive decibel measurement indicates which of the following about a


networking signal?
a. the signal has become distorted.
b. the signal will have increased error rates.
c. power has been decreased.
d. power has been increased. *
e. power is stable.
f. power is sufficient for data communications.

37. using the ip address 38.159.163.37 with a subnet mask 255.255.255.240,


determine the subnetwork address.
a. 38.159.0.0
b. 38.159.163.0
c. 38.159.163.0
d. 38.159.163.16
e. 38.159.163.32 *
f. 38.159.163.36

38. what are the characteristics of a local collision? (choose two.)


a. the frame is less than minimum length.
b. the frame is longer than the maximum length.
c. the frame has an invalid fcs checksum.
d. the frame has a valid fcs checksum.
e. over-voltage is detected on the coaxial network. *
f. simultaneous rx/tx activity is detected. *

39. which of the following are common lan technologies? (choose three.)
a. frame relay *
b. ethernet *
c. isdn
d. token ring *
e. arcnet
f. hdlc

40. what is established during a connection-oriented file transfer between


computers? (choose two.)
a. a temporary connection to establish authentication of hosts *
b. a connection used for ascii or binary mode data transfer *
c. a connection used to provide the tunnel through which file headers are
transported
d. a command connection which allows the transfer of multiple commands directly to
the remote server system
e. a control connection between the client and server

41. which type of noise affects all transmission frequencies equally?


a. baseband interference
b. narrowband interference
c. broadband interference
d. black noise
e. white noise *
f. gray noise

42. which combinations of charges will be repelled by electric force? (choose


two.)
a. neutral and neutral
b. neutral and positive
c. neutral and negative
d. positive and positive *
e. positive and negative
f. negative and negative *

43. which osi layer defines the functions of a router?


a. physical
b. data link
c. network *
d. transport
e. session

44. which of the following items are common to all 100base technologies? (choose
three.)
a. frame format *
b. media *
c. connectors *
d. timing
e. multi-part encoding

45. an isdn basic rate interface (bri) is composed of how many signaling channels?

a. 1
b. 2
c. 3
d. 4 *

46. which of these workstation installation and setup tasks are concerned with
network access layer functions? (choose two.)
a. configuring the e-mail client
b. installing nic drivers *
c. configuring ip network settings
d. connecting the network cable *
e. using ftp to download application software updates

47. for which of the following is ethernet considered the standard? (choose
three.)
a. inter-building connection *
b. mid-length voice
c. video conferencing
d. vertical wiring *
e. horizontal wiring *
f. diagonal wiring

48. how will data loss be handled after a late collision? (choose two.)
a. the stations involved in the collision automatically retransmit the frames
after the collision and jam signals clear.
b. the upper layer protocols will determine the frame was lost and request
retransmission. *
c. the nic will believe the frame went out fine, unaware of the data loss. *
d. the upper layer protocols will reconstruct the data from the damaged frame
since most of the frame was transmitted before the collision and only the padding
was damaged.
e. retransmitted data will have a segment identifier that is a higher priority
than the original so the data receives special handling.

49. which type of encoding does 100base-tx use?


a. manchester
b. 4b/5b *
c. 4b/8b
d. 4e/5e
e. hdlc

50. john has been hired as the network administrator of a local company and has
decided to add more hubs to the company's existing network. which of the following
has been caused by john's inexperience?
a. collision domain extended
b. an increased number of collision domains
c. increased network performance
d. increased bandwidth
e. extended bandwidth *

51. which of the following describe interframe spacing? (choose two.)


a. the minimum interval, measured in bit-times, that any station must wait before
sending another frame
b. the maximum interval, measured in bit-times, that any station must wait before
sending another frame
c. the 96-bit payload padding inserted into a frame to achieve a legal frame size
d. the 96-bit frame padding transmitted between frames to achieve proper
synchronization
e. the time allowed for slow stations to process a frame and prepare for the next
frame
f. the maximum interval within which a station must send another frame to avoid
being considered unreachable

52. what is important to remember about the data link layer of the osi model when
considering peer to peer communication? (choose three.)
a. it links data to the transport layer.
b. it encapsulates frames into packets.
c. it provides a service to the network layer.
d. it encapsulates the network layer information into a frame.
e. its header contains a physical address which is required to complete the data
link functions.
f. it encodes the data link frame into a pattern of 1s and 0s (bits) for
transmission on the medium.

53. which of the following is the ieee standard for 10 gigabit (gbe) ethernet?
a. 802.3gb
b. 803.2gb
c. 802.311gb
d. 802.5ae
e. 802.3ae *
f. 802.5gb
54. which of the following are cisco proprietary routing protocols? (choose two.)
a. ripv2
b. igrp *
c. ospf
d. bgp
e. ripv1
f. eigrp *

55. what are features of the tcp/ip transport layer? (choose two.)
a. path determination *
b. handles representation, encoding and dialog control
c. uses tcp and udp protocols
d. packet switching
e. reliability, flow control and error correction *

56. select the option that describes the relationship between analog and digital
transmissions.
a. analog transmissions occur over wire; digital transmissions do not.
b. analog transmission is bandwidth dependent; digital transmission is not.
c. digital transmission carries a variety of information; analog transmission is
restricted. *
d. digital signals use a wide range of frequencies; analog signals use a small
range of frequencies.

57. convert the hexadecimal number a2 into its base 10 equivalent. select the
correct answer from the list below.
a. 156
b. 158
c. 160
d. 162 *
e. 164
f. 166
58. if a network administrator needed to download files from a remote server,
which protocols could the administrator use to remotely access those files?
(choose two.)
a. nfs
b. ascii
c. tftp *
d. imap
e. ftp *
f. udp

59. during cable testing, which of the following are used to calculate the
information carrying capacity of a data cable? (choose two.)
a. bit speed *
b. attenuation
c. wire map
d. saturation limit
e. analog bandwidth *

60. what are the three types of collisions? (choose three.)


a. premature
b. late *
c. local *
d. early
e. remote *
f. delayed[/list]

Você também pode gostar