You are on page 1of 45

Network+ Sample Questions

Network+ is a certification that measures the technical knowledge of networking


professionals.
Earning the Network+ certification means that the candidate possesses the knowledge
needed to configure and operate a variety of networking products.

The Network+ test is available throughout the world in a variety of languages including
English, German, French and Japanese.

Following are some Network+ sample questions:

1. You install File and Printer Sharing for Microsoft Networks. You share a
folder and leave the password option blank. Who can gain access to the
folder
A. Anyone who can gain access to your network and has a Microsoft redirector
such as the Client for Microsoft Networks installed.
B. Windows 98 will not allow a blank password in this field.
C. Anyone with Internet Explorer installed.
D. Only users that are members of the same workgroup as you.

Answer: A

2. The figure below shows a typical Home Network Setup. Identify the network
components marked in red.

Answer:

A: Cable/DSL Modem
B: CAT 5 Ethernet cable
C: Wireless Signal
E: Wireless Router

3. Some protocols are considered to be technically non-routable. Which of the


following statements best describes the most common reason why a
protocol would be considered non-routable
A. It does not contain the appropriate Data Link layer information required by
routers.
B. It uses advanced Transport layer services to move across the Internet and
avoids the routing overhead required by the more primitive networking
protocols.
C. It defines Physical layer network addresses for internal routing.
D. It does not specify the Network layer addresses required by routers.

Answer: D

4. What is the binary network ID of the loop back IP address


A. 1
B. 10101010
C. 0
D. 1111111

Answer: D

5. You are the LAN administrator for your company. You have couple Windows
2000 Professional clients that dial in via PPP to the company network’s RAS
server. You want the remote clients to be assigned dynamic IP addresses.
You reserve a pool of class B addresses for these clients. Upon connecting,
you find that the Windows 2000 computers are using a subnet mask of all
255s.What should you do
A. Run ipconfig with the /release and /renew switch on the client
B. Run ipconfig with the /renew_all switch on the client
C. Run winipcfg on the client
D. Do nothing. This is normal

Answer: D

6. You are configuring a router. According to the manual, you will need a
transceiver to connect to the LAN ports of the router. What kind of physical
interface does the router have
A. MSAU
B. RJ-11
C. AUI
D. BNC

Answer: C

7. Which of the following are connectionless protocols.(Choose the three best


answers.)
A. IP
B. SPX
C. IPX
D. UDP

Answer: A, C, D
8. How can Jim Herr, a client on an NT TCP/IP network see which remote hosts
are currently connected using NBT
A. Use NBTSTAT
B. Use NETSTAT
C. Use NSLOOKUP
D. Use IPCONFIG

Answer: A

9. You are setting up a new Windows 98 workstation on your network, and your
DHCP server provides all of the normal TCP/IP configuration information.
What must you do to configure the IP address on the workstation after you
add the TCP/IP protocol
A. The DHCP option is enabled automatically, and the server will auto-configure
everything.
B. Find out what the subnet mask on your network is, and add this information
only.
C. Manually enter an IP address that is not in use on the network.
D. Put the address of the router in the default gateway, and put all 0s in the IP
field.

Answer: A

10. Which of the following is considered a Network Attached Storage


device
A. A 60 GB DAT tape drive attached to the Network Server
B. A file server with special software that is at a separate location from the
departmental file server
C. In a Windows NT environment, it would be the Backup Domain Controller
D. A high speed specialized sub-network attached to the enterprise

Answer: B

11. Credit card size, designed for notebooks, self-configuring, and non-OS
dependent describes which PC bus architecture
A. PCI
B. ISA
C. EISA
D. PCMCIA

Answer: D

12. What protocol is used between E-Mail servers


A. HTTP
B. POP3
C. SNMP
D. SMTP

Answer: D
13. When installing a manually configured adapter, what information must
you know to avoid resource conflicts
A. IRQ
B. Number of bits
C. Base I/O port address
D. Base Memory address

Answer: A, C & D

14. Which of the following OSI layers is responsible for identifying


communications partners
A. Application
B. Session
C. Network
D. Presentation

Answer: A

15. A broadcast message is an example of which dialog control method


A. Half duplex
B. Baseband
C. Broadband
D. Simplex

Answer: D

16. Which of the following are used to resolve Windows NetBIOS names to
IP addresses
A. DNS
B. WINS
C. LMhosts file
D. Hosts file

Answer: B, C

17. What is a router


A. A hardware device that connects dissimilar networks, such as Cat 5 cabling
and FDDI
B. A network host that reads the source and destination addresses in the
packet header and makes decisions about where to forward the packet
C. A network host that can forward LAN-based email messages onto the
Internet, after repackaging them into the SMTP format
D. A software system that can translate between dissimilar networks such as
Ethernet and Token Ring

Answer: B

18. Which of the following is Class C IP address?


A. 10.10.14.118
B. 135.23.112.57
C. 191.200.199.199
D. 204.67.118.54

Answer: D

19. A Windows 95 user complains that she cannot connect to any other
computers on her local subnet even when using the IP address to
communicate. However, she can ping 127.0.0.1 and receive a reply. Other
users on her subnet do not report having any trouble. All client computers on
the network are WINS-enabled. What is the most probable cause of the
problem?
A. The TCP/IP stack is not installed properly
B. The subnet mask is not correct, check whether the subnet mask is
configured correctly.
C. The default gateway is not configured properly.
D. The computer is not configured to use LMHOSTS

Answer: B

20. WINS or ___ may be used for NetBIOS name resolution?


A. HOSTS
B. DNS
C. LMHOSTS

Answer: C

21. You have set up a server that connects to an Internet services provider
(ISP) over ISDN line. How should the default gateway address be configured
so that Windows 95 users on the local network can access the Internet
through the RAS server. The RAS server is located on the same subnet as
that of the WIN95 machines.
A. The default Gateway address on WINS95 must specify the IP address of the
remote ISP
B. The default Gateway on WN95 must specify the IP address of the RAS
server on the local network.
C. The HOSTS file in WIN95 machines must be configured with the host name
of the RAS Server.
D. The HOSTS file in WIN 95 machines must be configured with the host name
of the ISP

Answer: B

22. Which of the following is the standard adopted for Ethernet CSMA/CD
by IEEE Committee?
A. 802.2
B. 802.1d
C. 802.3
D. 802.5

Answer: C

23. Disk Striping with Parity corresponds to which RAID level?


A. RAID 0
B. RAID 1
C. RAID 3
D. RAID 5

Answer: D.

24. Which of the following media types is most susceptible to EMI?


A. Fiber Optic
B. STP
C. Co-axial
D. UTP

Answer: D

25. Which type of connector does a 10BaseT Ethernet cable use?


A. BNC
B. RJ-45
C. RJ-11
D. MSAU

Answer: B

26. Which of the following is suitable for mission critical and time sensitive
applications?
A. 10BaseT
B. 10Base2
C. Token Ring
D. Mesh

Answer: C

27. What is the default subnet mask for Class C network?


A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.0.255.0

Answer: C

28. Which of the following network topologies have each computer


connected to a central point?
A. Bus
B. Ring
C. Star
D. Mesh

Answer: C

29. Which of the following network topologies is the most fault tolerant?
A. Bus
B. Mesh
C. Star
D. Ring

Answer: B

30. A Bus network topology is best described as which of the following?


A. All computers are attached to a single cable in a chain style
B. All computers are connected to a central point
C. All computers are connected to every other computer or resource in the
network
D. Fault Tolerant

Answer: A

31. A Ring network topology provides two links from each computer.A link
in and a link out.
A. True
B. False

Answer: A

32. Which connector is often used with Thinnet cable?


A. RJ-11
B. AUI
C. DIX
D. BNC

Answer: D

33. Which of the following media connectors are used in conjunction with
telephones?
A. RJ-45
B. RJ-11
C. RJ-T
D. None of the above are correct

Answer: B

34. 10BaseT Ethernet networks, most commonly use which of the following
types of cable?
A. Fiber
B. Coax
C. STP
D. UTP

Answer: D

35. A Gateway is able to connect network environments that are dissimilar.


A. True
B. False
Answer: A

36. AUI connectors are commonly associated with which of the following
items?
A. A Vampire Tap
B. Fiber Optic Cable
C. 10Base2
D. Wireless Networks

Answer: A

37. A hub works in conjunction with which of the following network


topologies?
A. Ring
B. Star
C. Bus
D. Mesh

Answer: B

38. Which of the following is a correct MAC address?


A. 190.168.80.1
B. www.certyourself.com
C. 08:34:FE:4C:F2:54
D. G2:G3:23:87:GG

Answer: C

39. A Hub operates at which of the following layers of the OSI model?
A. Physical
B. Session
C. Transport
D. Application

Answer: A

40. Which of the following devices operate at the Data Link layer of the OSI
model?
A. A Hub
B. A NIC
C. A Switch
D. A Router

Answer: C

41. A Router operates in which layer of the OSI model?


A. The Physical Layer
B. The Data Link Layer
C. The Transport Layer
D. The Network Layer
Answer: D

42. A Network Interface Card operates at the Network Layer of the OSI
model.
A. True
B. False

Answer: B

43. Which of the following is the correct order of the OSI model from
bottom to top?
A. Application, Presentation, Session, Transport, Network, Data Link, Physical
B. Physical, Network, Data Link, Session, Transport, Application, Presentation
C. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. Application, Session, Presentation, Transport, Network, Data Link, Physical

Answer: C

44. What is the maximum speed of 10Base5 Ethernet cable?


A. 100 Mbps
B. 500 Mbps
C. 50 Mbps
D. 10 Mbps

Answer: D

45. 100Base-FX uses which of the following types of cable?


A. Fiber Optic
B. Unshielded Twisted Pair
C. Coax
D. Shielded Twisted Pair

Answer: A

46. Which of the following TCP/IP protocols is used to communicate


between a Web Browser and a Web Server?
A. SMTP
B. HTTP
C. UDP
D. POP3

Answer: B

47. Which of the following layers of the OSI model does a Bridge operate
in?
A. The Data Link Layer
B. The Network Layer
C. The Transport Layer
D. The Session Layer

Answer: A
48. While reviewing the security logs for your server, you notice that a user
on the Internet has attempted to access your internal mail server. Although it
appears that the user's attempts were unsuccessful, you are still very
concerned about the possibility that your systems may be compromised.
Which of the following solutions are you most likely to implement?
A. A firewall system at the connection point to the Internet
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication

Answer: A

49. A server has two NIC cards installed. The first one uses IRQ 10 and I/O
range of B800-B81F.The second uses IRQ 10 and I/O range of D700-
D80A.What action, if any, should be taken?
A. No action is required.
B. Locate any available IRQ to resolve the IRQ conflict.
C. Locate any available I/O range to resolve the I/O conflict.
D. Change the I/O of the second NIC to B800-B81F.

Answer: B

50. Which of the following IEEE 802 standards pertain to token ring?
A. IEEE 802.5
B. IEEE 802.3
C. IEEE 802.2
D. IEEE 802.11

Answer: A

51. Protocol that is often used to facilitate communications with an IBM


mainframe?
A. NetBEUI
B. RIP
C. DLC

Answer: C

52. Which of these protocols provide fast connectionless communications


that relies on upper layers of the OSI model for error correction?
A. TCP (Transmission Control Protocol)
B. UDP (User Datagram Protocol)
C. SPX

Answer: B

53. Can be used to reduce traffic bottlenecks in a NetBEUI network?


A. bridge
B. router
C. gateway
Answer: A

54. You have just finished the installation of two computers on a 28


computer network using Novell's IPX/SPX. Both computers initialize with no
error messages yet they cannot contact other computers on the network. All
other computers are functioning normally. You probably have an ___?
A. incorrect IRQ
B. incorrect frame type
C. invalid IP setting

Answer: B

55. Uses amplifiers to regenerate analog signals?


A. baseband
B. broadband
C. fiber-optic

Answer: B

56. Uses single frequency digital signals?


A. baseband
B. broadband
C. multiband

Answer: A

57. You are hired to investigate a slow performing network server for a
client. Using the performance monitor you obtain the following readings:
CPU usage= 25%, Disk time= 25%, Page faults/sec= 25.What one change will
increase the performance of this network server the most?
A. buy another CPU
B. add another hard drive
C. increase RAM

Answer: C

58. Which of the following should you check if you can connect using the
IP address but NOT with the host name?
A. DNS
B. WINS
C. DHCP

Answer: A

59. The fastest method of transporting data with a switch?


A. store and forward
B. cut through
C. loop back

Answer: B
60. Although NOT fault tolerant this RAID level is often used when one
wants the highest level of performance?
A. RAID 0
B. RAID 1
C. RAID 5

Answer: A

61. Four _____ are used in the 5-4-3 rule of 10Base2 networking?
A. repeaters
B. segments
C. routers

Answer: A

62. You have just finished installing an Ethernet PCI NIC (network interface
card) in a client's computer. The computer initializes successfully and has no
apparent hardware problems. The computer however is not able to
communicate with other computers on this NetBEUI network. All other client
computers are able to communicate. What is the most likely cause of this
problem?
A. IRQ conflict
B. incorrect transceiver setting
C. incorrect frame type

Answer: B

63. The two key components of a digital signature include the secure hash
algorithm and a ___ ?
A. blowfish value
B. certificate authority
C. IPSec

Answer: B

64. The Microsoft version of Novell's IPX/SPX protocol?


A. ODI
B. NWLink
C. DLC

Answer: B

65. Utility used to run applications on a computer at a remote location?


A. ODI
B. Telnet
C. ARP (Address Resolution Protocol)

Answer: B

66. Topology that offers the highest level of redundancy is easy to


troubleshoot but is expensive to install. It is the topology of the internet?
A. star
B. ring
C. mesh

Answer: C

67. Ordinary telephone wire has a thickness of AWG 22.Of the following
which is the thickest wire?
A. AWG 14
B. AWG 28
C. AWG 32

Answer: A

68. Backup method which clears the archive bit and is the shortest to
perform but takes the longest to restore?
A. full
B. incremental
C. differential

Answer: B

69. Which of the following protocols map a logical address to a MAC


(Media Access Control) address?
A. DNS
B. WINS
C. ARP

Answer: C

70. The major limiting factor for how long a cable can be in a segment is
___?
A. collisions
B. EMI
C. attenuation

Answer: C

71. Backing up the system state in Win 2000 Prof will backup the ___?
A. registry
B. boot files
C. all of the above

Answer: C

72. Equipment that is designed to help identify breaks and shorts in


cables?
A. TDR
B. performance monitor
C. SNMP
Answer: A

73. Which company developed the Unix Operating System?


A. Sun
B. Microsoft
C. ATT

Answer: C

74. To start a Win 2000 Prof computer in the safe mode press ___ at
startup?
A. F8
B. Ctrl and Esc
C. F1

Answer: A

75. A bridge filters traffic using which type of address?


A. IP address
B. MAC address
C. TCP address

Answer: B

76. A large network with 500 users notice that at specific times in the
morning and afternoon network congestion ties up their computers.What is
the most likely cause?
A. power fluctuations
B. a terminator is not grounded
C. many users are logging on or off

Answer: C

77. A ___ is created when a unique IP address and port number are used to
connect two computers?
A. SAP
B. media transfer coefficient
C. socket

Answer: C

78. During disaster recovery of a Win 2000 Prof computer if you "Enable
Boot Logging" the file ___ is saved to the C:\winnt folder for analysis?
A. setuplog.txt
B. bootlog.txt ntbtlog.txt

Answer: C

79. Which of these WAN (Wide Area Network) protocols is the fastest?
A. Frame Relay
B. ATM
C. X.25

Answer: B

80. The only files on a Win 2000 Prof Emergency Repair Disk (ERD) are
autoexec.nt, config.nt, and setup.log?
A. True
B. False

Answer: A

81. OSI layer responsible for mail and file transfers?


A. transport
B. data link
C. application

Answer: C

82. A protocol that functions at the network layer of the OSI model?
A. TCP
B. IP
C. SPX

Answer: B

83. A major advantage of ___ in an NT network is centralized security and


administration?
A. user-level security
B. share-level security
C. RAID 5

Answer: A

84. OC-1 has a transmission rate that is close to ___ ?


A. T-1
B. T-3
C. ISDN

Answer: B

85. The maximum number of populated segments allowed in an Ethernet


network?
A. 3
B. 4
C. 5

Answer: A

86. Using the TCP/IP protocol if the destination of the packet is outside the
subnet then the packet is sent to the ___?
A. switch
B. bridge
C. default gateway

Answer: C

87. Entry in DNS to identify your mail server?


A. IDC
B. TU
C. MX

Answer: C

88. Topology which is the least expensive to install?


A. ring
B. star
C. bus

Answer: C

89. Utility which can be used to identify bottlenecks in the network?


A. PING
B. WINIPCFG
C. TRACERT

Answer: C

90. What is the first octet range for a class A IP address?


A. 1- 126
B. 1- 128
C. 1- 191

Answer: A

91. After you setup the IP address and subnet mask your FIRST test should
be with ___?
A. tracer to a known good server
B. ping 127.0.0.1
C. ping another computer on your segment

Answer: B

92. NetBIOS computer names can have up to ___ characters?


A. 256
B. 15
C. 20

Answer: B

93. Refers to the part of the network that is separated by routers, bridges,
or switches?
A. partition
B. node
C. segment

Answer: C

94. Data is organized into FRAMES for transmission at this OSI level?
A. physical
B. data-link
C. network

Answer: B

95. 10Base2 coaxial has a limit of ___ computers per segment?


A. 2
B. 30
C. 100

Answer: B

96. Cable used for ArcNet networks?


A. RG-58
B. RG-59
C. RG-62

Answer: C

97. A Class a IP address uses the last ___ octet s for the host ID. The host
ID is the unique part and identifies the individual user and part of the reason
50% of all IP addresses are Class A?
A. one
B. two
C. three

Answer: C

98. Of the three (3) RAID levels used by a Win 2000 server choose the
one(s) that is/are fault tolerant?
A. 0, 1, and 5
B. 1 and 5
C. 5

Answer: B

99. The best method to restore the latest copy of the registry in a Win 2000
Server is to select the ___?
A. Emergency Repair Disk (ERD)
B. Recovery Console
C. Last Known Good Configuration

Answer: C
100. What routing protocol counts hops to the destination along multiple
paths to determine the most efficient route?
A. ARP
B. DLC
C. RIP

Answer: C

101. The source and destination addresses are stored in the ___ of a
packet?
A. data
B. trailer
C. header

Answer: C

102. Most commonly used type of modem?


A. synchronous
B. asynchronous
C. external

Answer: B

103. Operates at the network layer of the OSI model?


A. bridge
B. gateway
C. router

Answer: C

104. Disk duplexing (RAID 1) requires a minimum of ___?


A. 2 hard drives and 1 controller
B. 3 hard drives and 2 controllers
C. 2 hard drives and 2 controllers

Answer: C

105. Organization responsible for the OSI model?


A. ANSI
B. IEEE
C. ISO

Answer: C

106. Which topology uses the least amount of cabling?


A. star
B. bus
C. ring

Answer: B
107. According to RFC 1918 this range of Class A IP addresses are reserved
for private intranets and are not supposed to be used on the internet (where x
is any number from 1 to 254)?
A. 10.x.x.x
B. 20.x.x.x
C. 30.x.x.x

Answer: A

108. Cable classification for 10Base5 thicknet coaxial?


A. RG-8
B. RG-10
C. RG-58

Answer: A

109. Dial-up protocol that uses a virtual private network (VPN)?


A. SLIP (Serial Line Internet Protocol)
B. PPTP (Point-to-Point Tunneling Protocol)
C. PPP (Point to Point Protocol)

Answer: B

110. Type 9 ___ rated coaxial cable should be installed in drop ceilings to
conform to fire code regulations?
A. SPF
B. PVC
C. plenum

Answer: C

111. The best device to use when monitoring a broadcast storm?


A. TDR
B. Digital Voltmeter
C. Protocol Analyzer

Answer: C

112. Class A IP addresses can accommodate 16 million hosts while a Class


B can accommodate ___?
A. 254
B. 65,534
C. 4 million

Answer: B

113. SNMP relies on the information found in ___ to chart and graph
components of the network for analysis and troubleshooting?
A. SMPs
B. MIBs
C. SAPs
Answer: B

114. Prescribes the greatest packet octet length that can be transmitted?
A. SAP
B. subnet mask
C. MTU

Answer: C

115. The default protocol on NT4 or Win 2000 servers?


A. IPX/SPX
B. NWLink
C. TCP/IP

Answer: C

116. A standard security algorithm developed in 1975 that uses 56-bit


symmetric key encryption?
A. DES
B. EAP
C. PAP

Answer: A

117. Win 2000 security service that maintains permissions and passwords
used to logon?
A. MMPE
B. CHAP
C. SAM

Answer: C

118. A voice grade demand priority standard developed by HP that is


capable of 100Mbps transmissions?
A. 100VG-AnyLAN
B. 100BaseT
C. 100BaseFX

Answer: A

119. PPP is part of the ___ OSI layer?


A. physical
B. data link
C. network

Answer: B

120. Network connection device that is capable of sending packets along


multiple paths depending on which path is the most efficient?
A. bridge
B. router
C. all of the above

Answer: B

121. Processes data using applications stored on its hard drive and sends
the results back to the client. Saving the client the extra hard drive space he
would need for the application as well as the CPU processing time?
A. file server
B. print server
C. application server

Answer: C

122. The static HOSTS text file used on UNIX systems that requires manual
entries by the administrator was the precursor of ___.Today the HOSTS file
system finds use mainly in maximum security operations which don't want
anything changed automatically?
A. WINS
B. LMHOSTS
C. DNS

Answer: C

123. The minimum category of UTP cable that will meet the 10BaseT
standard?
A. cat2
B. cat3
C. cat5

Answer: B

124. The easiest protocol to setup?


A. NetBEUI
B. NWLink
C. TCP/IP

Answer: A

125. Displays data on hardware components such as memory, CPU, and the
hard drive in a chart or graph which describes how these devices are
operating?
A. protocol analyzer
B. performance monitor
C. network monitor

Answer: B

126. The OSI layer responsible for name recognition, security logins, and
synchronization of the connection?
A. presentation
B. application
C. session

Answer: C

127. Have twenty-four 64 Kbps channels for a total of 1.544 Mbps


throughput?
A. T3
B. T1
C. X.25

Answer: B

128. Microsoft recommends that the %CPU usage should not be above 90%
for a single CPU or above __% for multiple processors for any extended
period?
A. 50
B. 70
C. 90

Answer: A

129. Your customer's computer is loaded with peripherals and is using


COM1, COM2, LPT5, and LPT7.You install the NIC on IRQ3 and have a
conflict. Which of the following is the NIC conflicting with?
A. the printer
B. COM1
C. COM2

Answer: C

130. The most widely used protocol?


A. NetBEUI
B. NWLink
C. TCP/IP

Answer: C

131. Can be thought of as a "hop counter" determining how many hops it


takes along various paths to the destination and then telling the router which
is the one with the least number of hops which most of the time is the
quickest route?
A. DLC
B. SAP
C. RIP

Answer: C

132. Apple's Local Talk protocol has a ___ computer limit?


A. 8
B. 32
C. 128
Answer: B

133. Ensures that one device is NOT overwhelmed by another with a data
transmission?
A. SMB
B. CRC
C. flow control

Answer: C

134. You are setting up a 10Base2 Ethernet network for a client with three
segments. There are 20 computers in each segment. How many terminators
will you need for this network?
A. 1
B. 2
C. 6

Answer: C

135. Used to connect different media types but cannot filter or segment
traffic?
A. bridge
B. hub
C. router

Answer: B

136. The most efficient way to control security in a client/ server network is
to assign permissions to ___?
A. each shared resource
B. directories
C. groups

Answer: C

137. Which of the following IRQs can you set your NIC to without usually
causing a conflict?
A. 4
B. 7
C. 10

Answer: C

138. ArcNet is one of the oldest protocols used. What year was it invented?
A. 1967
B. 1977
C. 1987

Answer: B
139. OSI layer that determines whether the transmission is a full or half-
duplex transfer?
A. presentation
B. session
C. application

Answer: B

140. Compensates for a hard drive failure on an NT server?


A. RAID
B. WINS
C. DHCP

Answer: A

141. In addition to DNS, DHCP, and Active Directory to boot from an RIS
server in Win 2000 requires a ___ compliant NIC?
A. RAS
B. PXE
C. SAP

Answer: B

142. The most popular dial-up protocol?


A. SLIP
B. UDP
C. PPP

Answer: C

143. The standard for several hubs connected in a linear fashion (token-
bus)?
A. 802.3
B. 802.4
C. 802.5

Answer: B

144. The minimum number of disks required implementing a fault tolerant


RAID system?
A. 1
B. 2
C. 3

Answer: B

145. For increased security Win 2000 enables encryption of files or folders
on ___ volumes?
A. FAT32
B. NTFS
C. either FAT32 or NTFS
Answer: B

146. Characteristic of the TCP protocol?


A. fast but unreliable delivery
B. best effort delivery
C. assurance of packet delivery

Answer: C

147. Cable type that offers the least resistance to EMI?


A. coaxial
B. fiber-optic
C. UTP

Answer: C

148. Novell introduced TCP/IP as its default protocol in NetWare ___ ?


A. 3.x
B. 4.x
C. 5.x

Answer: C

149. This OSI layer packages bits into frames?


A. physical
B. data-link
C. network

Answer: B

150. Protocol used in Win 2000 to print to a URL on the internet. It requires
either Peer Web Services or a IIS server to be installed?
A. IPP
B. SAP
C. IPSec

Answer: A

151. Novell added ___ which could bind many protocols to a NIC starting
with NetWare 4.0?
A. NDIS
B. TSM
C. ODI

Answer: C

152. Port ___ is assigned to the SMTP?


A. 21
B. 25
C. 80
Answer: B

153. You are setting up a local peer-to-peer network that will have seven Win
98 computers. Internet access is not needed. Which protocol should you
use?

(NetBEUI is the best one but if its not listed then pick the one with the lowest
overhead)

A. X.25
B. NWLink
C. TCP/IP

Answer: B

154. Used for installing Win NT4?


A. setup.exe
B. winnt.exe
C. win.com

Answer: B

155. OSI layer responsible for error checking frames and adding MAC
addresses to its tables?
A. presentation
B. transport
C. data-link

Answer: C

156. The initial formation of the packet header is started at this OSI level?
A. Application
B. Session
C. Physical

Answer: A

157. For a Class C IP address the first ___ octet(s) are reserved for the
network ID?
A. 1
B. 2
C. 3

Answer: C

158. Utility used to check SMTP connectivity?


A. SNMP
B. LMHOSTS
C. Telnet

Answer: C
159. Prevents bounce-back of signals in a 10Base2 network?
A. T-connector
B. BNC
C. terminator

Answer: C

160. A set of "rules" for network transmissions?


A. topologies
B. protocols
C. gateways

Answer: B

161. What bridging protocol can be used to prevent bridge looping when
more than one physical path exists between two or more network segments?
A. The Spanning Tree Protocol
B. The Inverted Tree Protocol
C. The Transparent Tree Protocol
D. The Domain Name Tree Protocol
E. The Looping Bridge Protocol

Answer: A

162. What are the two methods switching hubs use to transport data
between devices?
A. Routing
B. Forwarding
C. Cut-through
D. Active
E. Store-and-forward

Answer: E, C

163. What happens when a device is disconnected from the middle of a BUS
network?
A. The hub will propagate error messages to the rest of the network
B. All devices on the network will fail
C. The Server will stop responding to that device
D. Data will not be able to get to devices on the other side of this device
E. If a bridge is on the network, only that segment will be effected

Answer: A

164. What are some advantages of a Client/Server network over a Peer-to-


Peer network?
A. Performance is better on a Peer-to-Peer
B. Security is better on a Client/Server
C. Performance is better on a Client/Server
D. Security is better on a Peer-to-Peer
E. Client/Server is easier to administrate
Answer: E, B

165. Name two protocols in the TCP/IP suite that function at the Transport
layer of the OSI model.
A. TCP
B. IP
C. UDP
D. SNMP
E. ARP

Answer: C, A

166. IP is responsible for sorting and _________________ of packets.


A. Addressing
B. Holding
C. Organizing
D. Delivery
E. Verifying

Answer: D

167. What is the first octet range for a class B IP address?


A. 127-191
B. 128-191
C. 192-223
D. 1-127
E. 128-255

Answer: B

168. What is the first octet range for a class C IP address?


A. 1-126
B. 128-191
C. 192-225
D. 192-223
E. 192-255

Answer: D

169. What method of transporting data with a switch is fastest?


A. Store-and-forward
B. Cut-through
C. Routing
D. Spanning Tree
E. Pass-Through

Answer: B

171. The inner core of a coaxial cable that carries the signals is made of
___?
A. aluminum
B. copper
C. zinc

Answer: B

172. Active hubs can ___?


A. route the signal using the most efficient path
B. send an acknowledgement once the packet is received
C. regenerate the signal like repeaters

Answer: C

173. RAID 5 requires a minimum of __ hard drives?


A. 3
B. 4
C. 5

Answer: A

174. What is an advantage of Cat 3 UTP cable instead of RG-58 A/U coaxial?
A. UTP supports longer cable segments
B. UTP is less susceptible to EMI
C. UTP is easier to install and less expensive

Answer: C

175. A packet in a TCP/IP network whose destination is outside the local


network goes to the ___?
A. TCP transceiver
B. default gateway
C. IP subnet

Answer: B

176. One important difference between routers and bridges is that when a
bridge can't locate the destination address in its table it ___?
A. sends the transmission to the default gateway
B. dumps the packet
C. broadcasts the transmission to all ports

Answer: C

177. Novell's NetWare 5.0 was developed in part from the ___ standard?
A. ATM
B. NDIS
C. X.500

Answer: C

178. The freely distributed open source Unix based operating system that
has gained in popularity recently?
A. XP
B. Linux
C. DLC

Answer: B

179. The term used to describe the physical layout of a network?


A. protocol
B. server
C. topology

Answer: C

180. Is the interface between the NIC drivers and MAC sublayer?
A. WINS
B. NDIS
C. DLC

Answer: B

181. Which topology provides for equal access to the network for all
computers?
A. star
B. bus
C. ring

Answer: C

182. Using the TCP/IP protocol when is a subnet mask required?


A. only when connecting outside the LAN
B. only when using TCP/IP
C. for both intranet and internet usage

Answer: C

183. OSI level that ensures error-free delivery of packets?


A. data-link
B. network
C. transport

Answer: C

184. The IEEE specification for a token ring network?


A. 802.3
B. 802.5
C. 802.6

Answer: B

185. RIP counts hops (or routers it encounters) as the packet travels to its
destination. Another name for a hop is a ___?
A. interval
B. sequence
C. metric

Answer: C

186. A protocol that functions at the transport layer of the OSI model?
A. IP
B. IPX
C. SPX

Answer: C

187. How many bits are there in an IP address?


A. 64
B. 32
C. 128

Answer: B

188. An easy to configure, fast, and efficient protocol recommended for


small non-routable networks?
A. NetBEUI
B. TCP/IP
C. X.25

Answer: A

189. What type of troubleshooting device examines the network at the


packet level?
A. TDR
B. VOM
C. protocol analyzer

Answer: C

190. Resolves domain names into IP addresses?


A. DHCP
B. DNS
C. WINIPCFG

Answer: B

191. ___ uses data encryption to secure data being transmitted over the
internet so even if it is intercepted it can't be read without knowing the key?
A. DLC
B. SSL
C. ARP

Answer: B
192. Device drivers can be disabled in Win 2000 Prof in Device Manager or
by using the ___?
A. ERD
B. Recovery Console
C. RDISK

Answer: B

193. Smart Cards in Win 2000 use the ___ RAS authentication protocol for
security?
A. PAP
B. MSCHAP
C. EAP

Answer: C

194. Because of its low overhead this is the fastest of these protocols?
A. TCP/IP
B. NWLink
C. NetBEUI

Answer: C

195. The ERD made in the Win 2000 Server Backup utility contains the files
needed to boot the computer?
A. True
B. False

Answer: B

196. Your client has a 10Base2 Ethernet network which is using 160m of RG-
58A/U cable and two 50 ohm terminators that are both grounded. What is
wrong with his network?
A. the terminators should be 93 ohms
B. he should be using RG-59/U cable
C. only one terminator should be grounded

Answer: C

197. Of the following the one that is NOT an algorithm that determines the
shortest path for routers?
A. SAP
B. RIP
C. OSPF

Answer: A

198. The most common topology in use today among corporate users?
A. bus
B. ring
C. star-bus
Answer: C

199. Uses a 93 ohm resistor?


A. RG62
B. RG58
C. RG59

Answer: A

200. OSI level responsible for compression and encryption of data?


A. session
B. application
C. presentation

Answer: C

201. Analog transmissions with multiple frequencies such as cable


television signals use ___?
A. baseband
B. broadband
C. multiband

Answer: B

202. Network device which cannot be used to filter traffic by segmenting a


network?
A. bridge
B. hub
C. switch

Answer: B

203. RAID can be used in these network operating systems?


A. NT
B. Netware
C. all of the above

Answer: C

204. When multiple protocols are used in a network ___ should always be
placed at the top of the binding order?
A. TCP/IP
B. IPX/SPX
C. the one most frequently used

Answer: C

205. The standard cabling type used in AppleTalk and Token Ring?
A. UTP
B. STP
C. RG-58A/U
Answer: B

206. Arrange these WAN technologies in chronological order beginning with


the oldest?
A. X.25, ISDN, ATM
B. ISDN, X.25, ATM
C. ATM, ISDN, X,25

Answer: A

207. A crossover cable can be used to connect?


A. a hub to a hub
B. a computer to a computer
C. all of the above

Answer: C

208. The RJ-45 connector used in UTP networks has ___ wires?
A. 2 pairs or 4
B. 4 pairs or 8
C. 6 pairs or 12

Answer: B

209. Displays the IP configuration information on a Win NT computer?


A. IPCONFIG
B. WINIPCFG
C. ARP

Answer: A

210. Displays the IP configuration information on a Win 98 computer?


A. IPCONFIG
B. WINIPCFG
C. WINS

Answer: B

211. The IEEE 802 standards operate at these layers of the OSI model?
A. network and transport
B. session and presentation
C. physical and data link

Answer: C

212. Can be used to show only one IP address for multiple users on the
subnet?
A. proxy server
B. DHCP server
C. DNS server
Answer: A

213. What must be configured in TCP/IP for two computers on the same
segment to communicate with each other?
A. IP address and subnet mask
B. default gateway
C. all of the above

Answer: A

214. The Windows NetBIOS name resolution protocol?


A. DNS
B. WINS
C. NDIS

Answer: B

215. The IEEE standard for wireless networks?


A. 802.2
B. 802.11
C. 802.8

Answer: B

216. SLIP supports ___?


A. TCP/IP
B. NetBEUI
C. all of the above

Answer: A

217. The proposed IPv6 standard is designed to dramatically extend the


present limit of 4 billion IP addresses by using ___ bits instead of the present
32 bit IP addresses in use today?
A. 64 bit
B. 128 bit
C. 256 bit

Answer: B

218. You are installing cables for an Ethernet network in an office. The office
manager doesn't want the media hanging in the crawl spaces and drop
ceiling and wants you to share an existing conduit that already has telephone
cables to hide the network cables you are installing. The cable segments will
not be over 100 m. Which type of media should you choose?
A. coaxial
B. UTP
C. fiber optic

Answer: C
219. ArcNet was originally setup to operate at ___ Mbps?
A. 10 Mbps
B. 2.5 Mbps
C. 100 Mbps

Answer: B

220. Besides Token Ring ___ also uses tokens?


A. ArcNet
B. FDDI
C. all of the above

Answer: C

221. Running performance monitor your CPU usage averages 45% except
when you load an application and it surges to 100%.Is there a problem?
A. yes, your CPU needs an upgrade or multiple CPUs may have to be installed
B. yes, but it is not the CPU, you need more RAM
C. no, its normal for the %usage to surge when loading an application

Answer: C

222. Interface between the computer and POTS?


A. ATAPI
B. SONET
C. TAPI

Answer: C

223. The following protocols are supported by RAS?


A. TCP/IP
B. NetBEUI
C. all of the above

Answer: C

224. Which architecture is recommended under high network utilization of


up to 70% or 80%?
A. Ethernet bus
B. Token Ring
C. DLC

Answer: B

225. A token-ring network has a maximum limit of ___ computers?


A. 1024
B. 260
C. 512

Answer: B
226. Dial-up protocol used when a secure connection is desired?
A. PPP
B. SLIP
C. PPTP

Answer: C

227. Your IP address is 135.72.14.43.What portion of this IP address


identifies your network ID?
A. 135
B. 135.72
C. 135.72.14

Answer: B

228. Allows users to connect to a remote network with a PPP dial-up


connection?
A. RAS
B. SAP
C. SONET

Answer: A

229. Which of the following protocols need to be installed on your client's


NT system before DHCP and DNS can be enabled?
A. TCP/IP
B. IPX/SPX
C. NetBEUI

Answer: A

230. A router uses ___ addressing to choose its path?


A. physical
B. logical
C. system

Answer: B

231. A ___ is used to connect two pieces of 10Base2 coaxial cable together?
A. T-connector
B. barrel connector
C. patch cable

Answer: B

232. One reason the ATM WAN protocol is faster than Frame Relay is
because its packets are a ___ size which allows them to be switched and
routed more easily?
A. variable
B. fixed
C. compressed
Answer: B

233. SQL is used to ___?


A. access databases
B. setup the default gateway
C. identify a defective NIC

Answer: A

234. Which of the following is a routable protocol?


A. LAT
B. NWLink
C. DLC

Answer: B

235. Uses token passing?


A. Frame Relay
B. ArcNet
C. ATM

Answer: B

236. For Cat 5 UTP, patch cables from the wall outlet to the computer can be
a maximum of ___ m?
A. 1
B. 3
C. 10

Answer: B

237. The static text file ___ and DNS contain similar names and IP
addresses?
A. LMHOSTS
B. HOSTS
C. WINS

Answer: B

238. Increases the data rate of modems?


A. encryption
B. compression
C. synchronization

Answer: B

239. Wireless technology commonly used to connect workstations that are


all located in a single room?
A. IrDA
B. microwave
C. SONET
Answer: A

240. Your customer has a client/ server Ethernet network consisting of a


server and 225 computers running Win NT4.What kind of security would you
recommend to him for centralized control of access to files and directories
on the network?
A. use a password for each file and groups for each directory
B. use a password for each file and directory shared
C. setup groups of shared resources and users who have access to these
groups

Answer: C

241. Characteristic of an IEEE 802.3 10BaseT Ethernet network?


A. BNC T-connectors
B. RJ-11
C. UTP

Answer: C

242. You suspect a faulty NIC is causing a broadcast storm in a network.


What troubleshooting tool would you use to locate which computer has the
defective NIC?
A. VOM
B. protocol analyzer
C. TDR

Answer: B

243. A dial-up protocol that does not support automatic IP addressing using
DHCP?
A. PPP
B. DLC
C. SLIP

Answer: C

244. Of the two types of routers the one that uses the discovery process to
create its routing table?
A. static
B. dynamic
C. multiplexed

Answer: B

245. Your client's NT server has been having trouble booting. Where should
you look first for some answers?
A. performance monitor
B. event viewer
C. SNMP
Answer: B

246. Another fast non-routable protocol with low overhead developed by


DEC?
A. ATM
B. LAT
C. SPX

Answer: B

247. You are hired to setup a 100Mbps Ethernet network for a client in an
office that already has cat 3 UTP installed. Your client wants to keep the
costs to a minimum but needs the 100Mbps throughput. What should you
recommend?
A. keep the existing cable but purchase 100Mbps hubs
B. keep the existing cable but use 100Mbps patch cable from the wall outlet
C. new cat 5 UTP and if not already installed 100 Mbps hubs and 100 Mbps
NICs

Answer: C

248. Your client's 10BaseT Ethernet network using NetBEUI wants to access
data on an IBM mainframe. What device will allow this connection?
A. bridge
B. gateway
C. router

Answer: B

249. Of the following protocols which is the fastest?


A. TCP/IP
B. IPX/SPX
C. UDP/IP

Answer: C

250. Access to files and folders in Win 2000 is accomplished using ___ ?
A. compression
B. tunneling
C. permissions

Answer: C

251. What happens when a device is disconnected from the middle of a BUS
network?
A. The hub will propagate error messages to the rest of the network
B. All devices on the network will fail
C. The Server will stop responding to that device
D. Data will not be able to get to devices on the other side of this device
E. If a bridge is on the network, only that segment will be effected
Answer: B

252. Why is there a limit to the number of MAUs that can be connected
together in a standard Token-ring network?
A. Too many MAUs would exceed the cable limits imposed by the Token Ring
specification
B. Too many MAUs would create to large of a collision domain for
communications to take place
C. Too many MAUs require more electricity than the devices can support
D. Too many devices connected through MAUs requires more time to get
control of the token that communications becomes unacceptable
E. There is no limit to the number of MAUs a token ring network can support

Answer: D

253. How many devices can communicate simultaneously within a Token-


ring LAN?
A. One for each MAU on the LAN
B. One
C. Two
D. As many devices as the administrator defines within the NOS
E. Between 1 and 5 if the ring speed is 16mbp/s

Answer: B

254. What are three common items that must be configured correctly when
installing a Network Interface Card (NIC)?
A. PCI or ISA slot
B. IRQ setting
C. DMA Address
D. Driver
E. I/O Address

Answer: B, C, D, E

255. When troubleshooting connection problems you can confirm that


physical layer devices are communicating by visually inspecting
_______________ on the NIC and hub.
A. Cross over cable
B. The Link-Lights
C. The electrical connection
D. The Patch cable
E. The power light

Answer: B

256. What is the name of a common test performed on a NIC with vendor
supplied diagnostic software?
A. NIC Test
B. Diagnostic Test
C. PING
D. Loopback
E. NICBack

Answer: D

257. Name two driver interfaces that allow a NIC to communicate on more
than one protocol.
A. NDIS
B. NetBEUI
C. NetBIOS
D. ODI
E. UNIX

Answer: D, A

258. Bridges operate at the _____________ OSI level.


A. The Data-Link Layer
B. Top Layer
C. The Transport Layer
D. The Session Layer
E. The Network Layer

Answer: A

259. What bridging method is commonly used in Ethernet with only one
bridge?
A. Collision
B. Routing
C. Transparent
D. Spanning Tree
E. Open Shortest Path First (OSPF)

Answer: C

260. Where is bridging address tables maintained when using source-route


bridging?
A. In routing tables on the hard drive
B. In routing tables in RAM
C. In routing tables in ROM
D. At each PC on the network
E. On special routing devices

Answer: A

261. Can switching hubs propagate broadcast packets on the network?


A. Yes
B. No

Answer: A

262. How many physical addresses can be assigned to a NIC?


A. One
B. Two
C. Three; One by the IEEE, one by the NIC vendor, and one by the Network
Administrator
D. Depends on the NOS
E. Depends on the NIC driver

Answer: A

263. What are the two types of routing connections?


A. Token passing
B. Connectionless
C. Reliable
D. Connection Orientated
E. Unreliable

Answer: D, B

264. What type of routing connection would typically fragment data


packets?
A. Connection Orientated
B. Cut-Through
C. Reliable
D. Connectionless
E. Static

Answer: D

265. What name is given to Novell's client software loaded on the


workstation, and what feature does it provide that earlier versions of the
Generic Windows client do not offer?
A. NETX
B. Client for NetWare Networks
C. Client32
D. Support for NetWare Print Queues
E. Support for NetWare Directory Services

Answer: C, E

266. If two computers are assigned the same IP address then ___?
A. neither computer will be able to connect
B. the first computer to sign on will be able to connect the other will not
C. both computers will be able to connect to the local network but not to the
internet

Answer: B

267. The physical address assigned by the NIC manufacturer?


A. subnet mask
B. IP address
C. MAC address
Answer: C

268. Similar to WINS in that it resolves NetBIOS names into IP address but
stores this information in a text file?
A. LMHOSTS
B. DLC
C. DNS

Answer: A

269. A small peer to peer network uses ___ security?


A. user-level
B. share-level
C. permissions for

Answer: B

270. The TCP/IP protocol used on the internet allows for approximately ___
billion unique IP addresses?
A. 1
B. 4
C. 10

Answer: B

271. Records the number of hops and latency of the packet on its way to its
destination?
A. IPCONFIG
B. TRACERT
C. PING

Answer: B

272. NDIS operates at which layer of the OSI model?


A. presentation
B. data-link
C. network

Answer: B

273. When checking the TCP/IP protocol you have just finished installing for
connectivity the proper first step it to ___?
A. PING another computer on that segment
B. PING 127.0.0.1
C. PING the default gateway

Answer: B

274. As data travels down the OSI layers it reaches the ___ layer which is
responsible for its bit conversion and actual transmission to other
computers?
A. network
B. application
C. physical

Answer: C

You might also like