Você está na página 1de 8

MULTIPLE CHOICE QUESTION

Q. NO. 1Which Which of the followings are responsibilities for Presentation Layer? (Choose Three) 1. Data Translation 2. Data Encryption 3. Data Framing 4. Physical Addressing 5. Data Compression Q. NO. 2Which devices are work in Network Layer? (Choose Two) 1. Switch 2. Router 3. Hub 4. Brouter 5. Repeter Q. NO. 3Which Ping commands will verify that your local TCP/IP interface is working? 1. ping 204.153.163.2 2. ping 127.0.0.1 3. ping localif 4. ping localhost 5. ping iphost Q. NO. 4Which of these protocols use a connectionless transport? 1. HTTP 2. TCP 3. TFTP 4. IP 5. NetBIOS Q. NO. 5Which Protocols are work in a Application Layer? (Choose Three) 1. FTP ( File Transfer Protocol) 2. SMTP (Simple Mail Transfer Protocol) 3. OSPF (Open Shorted Path First) 4. RIP (Routing Information Protocol) 5. HTTP (Hyper Text Transfer Protocol) Q. NO. 6How many types of VPN? ( Choose Two) 1. Remote-Access VPN 2. Domain Based VPN 3. Site-to-Site VPN 4. FQDN Based VPN 5. None Of The Above Q. NO. 7A brouter combines which functions? (Choose Two) 1. Router 2. Bridge 3. Gateway 4. Repeater 5. None Of The Above Q. NO. 8Which of the following are needed to support full-duplex Ethernet? (Choose Two.) 1. Multiple paths between multiple stations on a link 2. Full-duplex NICs 3. Loopback and collision detection disabled 4. Automatic detection of full-duplex operation by all connected stations 5. None Of The Above Q. NO. 9Which Layer 1 devices can be used to extend the area covered by a single LAN segment? (Select two) 1. Switch 2. Router 3. NIC 4. hub 5. Repeater Q. NO. 10Which of the following are characteristic of a true client/server environment? 1. Does not require a hub.

2. A computer can be both a client and a server. 3. Centralized security and administration. 4. Centralized backup. 5. None Of The Above Q. NO. 11Which of the following are characteristic of a peer-to-peer network? 1. Centralized security and administration. 2. A computer can be both a client and a server. 3. A limited number of computers are involved. 4. Does not require a hub. 5. None Of The Above Q. NO. 12How many types of Proxy Server ? ( Choose Three) 1. Transparent Proxy Server. 2. Reverse Proxy Server 3. Anonymous Server 4. Forward Proxy Server 5. None Of The Above Q. NO. 13 How many types of Firewalls: (Choose Two) 1. Packet-Filter Firewall 2. Proxy Firewall 3. Domain Firewall 4. Client Firewall 5. None Of The Above Q. NO. 14 Which of the followings are routing protocols? (Choose Three) 1. RIP 2. OSPF 3. DNS 4. FTP 5. IGRP Q. NO. 15 TCP/IP supports the Internetworking Protocol (IP) at the network Layer. Which supporting Protocols are used by IP? (Choose Three) 1. RARP 2. IGMP 3. FTP 4. ICMP 5. IPX Q. NO. 15 Which of the following are not used by full-duplex Ethernet? (Choose Two) 1. Collision detection 2. MAC addressing 3. 10-megabit transmission 4. Loopback 5. None Of The Above Q. NO. 17 SCSI connections can use which of the following connectors? (Choose all that apply.) 1. BNC 2. DB-25 3. Centronics-50 4. RJ-11 5. IBM Data Connector Q. NO. 18 ISDN provides two types of user services: 1. BRI 2. PRI 3. DTE 4. DCE Q. NO.19 Which of the followings is feature of Proxy Server? ( Choose Three) 1. Can reduce Internet traffic requests 2. Can assist with security 3. Can reduce user wait time for request 4. Can convert a non-routable protocol to a routable protocol 5. None Of The Above

Q. NO. 20Which protocols are used in Mail send and receive? (Choose Two) 1. POP 2. HTTP 3. SMTP 4. SPX 5. None Of The Above Q. NO. 21 Features of IPX include ___________________ (choose Three). 1. Connection-oriented 2. Very efficient 3. No addressing problems 4. Excellent scaling without performance issues 5. None Of The Above

SINGLE CHOICE ::
Q. NO. 1 When trouble shooting a wiring problem in your office, you find that all of the computers attach to a single wire that snakes from computer to computer.Which of the following wiring topologies does this describe? 1. Bus 2. Star 3. Ring 4. Mesh 5. None of The Above Q. NO. 2 Which of the following best describes a star topology? 1. Centralized management 2. Any cable fault halts all network traffic. 3. Uses less cable than a bus or ring. 4. All the above. 5. None Of The Above Q. NO. 3 A client/server approach uses what type of security model? 1. Centralized 2. Decentralized 3. Server 4. Distributed 5. None Of The Above Q. NO. 4 What is the media access control mechanism in which stations first determine if another device is communicating on the wire and then sends its information in the event of a collision known as? 1. CSMA/CD 2. Token Passing 3. CSMA/CA 4. Arcnet 5. None of The Above Q. NO. 5 Which of the following TPC/IP protocols is responsible for routing data to its destination? 1. TCP 2. IP 3. ICMP 4. SMTP 5. None Of The Above Q. NO. 6 Which of the following OSI layers handles the function of formatting data for exchange? 1. Session 2. Transport

3. Application 4. Presentation 5. None of The Above Q. NO. 7 The process of converting the user-friendly host name into its corresponding IP address is known as: 1. Address conversion 2. NAT 3. Name resolution 4. Address resolution 5. None Of The Above Q. NO. 8 The TCP/IP protocol that resolves IP addresses into MAC addresses is known as what? 1. TCP 2. IP 3. ARP 4. ICMP 5. None of the Above Q. NO. 9 If IP does not have a route to the destination host for a packet, it will forward the packet to the hosts: 1. Primary server 2. Default gateway 3. DNS server 4. WINS server 5. None of The Above Q. NO. 10 Which type of network topology uses terminators? 1. Star 2. Bus 3. Ring 4. Mesh 5. None Of The Above

Q. NO. 11 Which of the following has the highest possible throughput? 1. STP 2. UTP 3. Coax 4. Fiber-optic Q. NO. 12 When trouble shooting a wiring problem in your office, you find that each computer is directly wired into a box located at the back of your office. Which of the following wiring topologies does this describe? 1. Bus 2. Star 3. Ring 4. Mesh 5. None Of The above Q. NO. 13 You are a consultant designing a network for a company with more than 1000 users. Which 802 standard would you implement to ensure that bandwidth would be sufficient and equal without bridging or additional segments? 1. 802.1 2. 802.2 3. 802.3 4. 802.5 5. None of The Above Q. NO. 14 Which type of hub doesnt require power? 1. Active 2. Passive 3. Intelligent 4. Switched 5. None Of The Above Q. NO. 15 Thicknet (10Base5) can be extended to ___________________ meters per segment.

1. 100 2. 200 3. 500 4. 1000 5. None Of The Above Q. NO. 16 Which FTP command line command will initiate the download of a file? 1. ARP 2. GET 3. PUT 4. LCD 5. None Of The Above Q. NO. 17 Which of these protocols use a connectionless transport? 1. HTTP 2. TCP 3. TFTP 4. IP 5. None Of The Above Q. NO. 18 Which OSI model layer has both a MAC sublayer and an LLC sublayer? 1. Physical 2. Transport 3. Network 4. Data Link 5. None Of The Above Q. NO. 19 You are installing a Windows XP -based TCP/IP network. You accidentally set workstation B to the same IP address as workstation A. Which workstation(s) will receive an error message? 1. A 2. B 3. Neither A Nor B 4. Both A And B 5. None of Above Q. NO. 20 The IP address 190.0.40.10 is in which class of addresses? 1. Class A 2. Class B 3. Class C 4. Class D 5. None Of The Above Q. NO. 21 The IP address 192.47.210.6 is in which class of IP address? 1. Class A 2. Class B 3. Class C 4. Class D Q. NO. 22 Which ipconfig switch will display the most complete listing of IP configuration information for that station? 1. /All 2. /Renew 3. /Release 4. /? 5. None of The Above Q. NO. 23 Which OSI layer is responsible for network services such as messaging and file transfer? 1. Transport 2. Network 3. Application 4. Session 5. None of the Above Q. NO. 24 Failure to terminate a bus topology properly will result in _________. 1. Electrical shock hazard 2. Unwanted signal echo 3. Fire hazard 4. All the above

5. None of The Above Q. NO. 25 Which layer of the OSI model translates the data from upper layer protocols into electrical signals and places them on the network media? 1. Physical 2. Transport 3. Data Link 4. Network 5. None of The Above Q. NO. 26 You are the administrator of a 100-station Ethernet network. Your users are complaining of slow network speeds. What could you replace your hub with to increase your network throughput? 1. Router 2. Bridge 3. Switch 4. NIC 5. None Of The Above Q. NO. 27 Which protocols use a connection-oriented transport? 1. UDP 2. NetBIOS 3. HTTP 4. NLSP 5. None of The Above Q. NO. 28 Which Windows XP/ Vista TCP/IP utility could you use to find out if a server is responding on TCP port 21? 1. TCP 2. PORT 3. Ping 4. netstat 5. Telnet Q. NO. 29 Which OSI layer is responsible for building and tearing down packets? 1. Network 2. Transport 3. Data Link 4. Physical 5. None Of The Above Q. NO. 30 Which layer of the OSI model ensures reliable, end-to-end communications? 1. Network 2. Transport 3. Session 4. Presentation 5. None of The Above Q. NO. 31 Which ARP command can you use to display the currently cached ARP entries? 1. ARP 2. ARP -A 3. ARP a 4. ARP /A 5. ARP /a Q. NO. 32 A transmission technology that divides that transmission medium into discrete channels so that multiple signals can share the same cable is known as ___________________. 1. Duplex 2. Baseband 3. Sideband 4. Broadband 5. None of The Above Q. NO. 33 Which OSI model layer is responsible for establishing, maintaining, and breaking down dialog? 1. Application 2. Gateway 3. Session 4. Network 5. None Of The Above

Q. NO.34 Which name resolution system is implemented with TCP/IP by default? 1. DNS 2. NDS 3. SND 4. WINS 5. None of The Above Q. NO. 35The TCP/IP configuration parameter that defines which bits represent the network portion of an address is known as the: 1. Default Gateway 2. IP address 3. Subnet mask 4. Network Identifier 5. None Of The Above Q. NO. 36 At which layer of the OSI model do most routing protocols function? 1. Session 2. Transport 3. Network 4. Presentation 5. None of The Above Q. NO. 37 Which of the following TCP/IP protocols is responsible for ensuring that communication between hosts is reliable? 1. TCP 2. IP 3. ICMP 4. SMTP 5. None of The Above Q. NO. 38 An RJ-45 connector should be wired with ____________________ pairs when used on a Category 5 UTP cable. 1. 1 2. 2 3. 3 4. 4 5. None of The Above

TRUE/FALSE
Q. NO. 1 BNC stands for British Naval Connector. 1. TRUE 2. FALSE Q. NO. 2 Transmission of a data packet through Router is Called as Hop. 1. TRUE 2. FALSE Q. NO. 3 A disturbance caused by electromagnetic interface along a circuit or a cable pair is called as Crosstalk. 1. TRUE 2. FALSE Q. NO. 4 ICF stands for Internet connection Firewall. 1. TRUE 2. FALSE Q. NO. 5 ATM stands for Asynchronous Transfer Mode. 1. TRUE 2. FALSE Q. NO. 6 ICS stands for Intranet Connection Sharing. 1. TRUE 2. FALSE Q. NO. 7 An unprotected or lightly protected network positioned between your firewall and the internet is called as Demilitarized Zone (DMZ). 1. TRUE 2. FALSE Q. NO. 8 CHAP stands for Challenge Handshake Authentication Protocol 1. TRUE

2. FALSE Q. NO. 9 IMAP is alternative to POP3. 1. TRUE 2. FALSE Q. NO. 10 IPSec protocol is used to encrypt IP packets and Most commonly Used In VPNs. 1. TRUE 2. FALSE Q. NO. 11 Crossover cable is used for connecting to Different Devices like Hub and PC. 1. TRUE 2. FALSE Q. NO. 12 HTTPS stands for Hyper Text Transport Protocol with SSL. 1. TRUE 2. FALSE Q. NO. 13 IFCONFIG is a command line utility for windows that displays current TCP/IP setting of a PC. 1. TRUE 2. FALSE Q. NO. 14 IMAP stands For Internet Message Access Protocol. 1. TRUE 2. FALSE Q. NO. 15 BRI stands for Basic Rate Interface. 1. TRUE 2. FALSE Q. NO. 16 ISP stands for Internet Service Provider. 1. TRUE 2. FALSE Q. NO. 17 ADSL stands for Asynchronous Digital Subscriber Line. 1. TRUE 2. FALSE Q. NO. 18 CRC stand for Cyclical redundancy check. 1. TRUE 2. FALSE Q. NO.1 9 100BaseT is also Known as Gigabit Ethernet. 1. TRUE 2. FALSE Q. NO.20 Default Port No for HTTP is 80. 1. TRUE 2. FALSE Q. NO. 21 FTP stands for file transfer protocol. 1. TRUE 2. FALSE Q. NO. 22 HTTPS stands for Hyper Text Transport Protocol with SSL. 1. TRUE 2. FALSE Q. NO. 23 In IP Version 6 is IP address is 128 bits. 1. TRUE 2. FALSE

Você também pode gostar