Professional Documents
Culture Documents
The Network+ test is available throughout the world in a variety of languages including
English, German, French and Japanese.
1. You install File and Printer Sharing for Microsoft Networks. You share a
folder and leave the password option blank. Who can gain access to the
folder
A. Anyone who can gain access to your network and has a Microsoft redirector
such as the Client for Microsoft Networks installed.
B. Windows 98 will not allow a blank password in this field.
C. Anyone with Internet Explorer installed.
D. Only users that are members of the same workgroup as you.
Answer: A
2. The figure below shows a typical Home Network Setup. Identify the network
components marked in red.
Answer:
A: Cable/DSL Modem
B: CAT 5 Ethernet cable
C: Wireless Signal
E: Wireless Router
Answer: D
Answer: D
5. You are the LAN administrator for your company. You have couple Windows
2000 Professional clients that dial in via PPP to the company network’s RAS
server. You want the remote clients to be assigned dynamic IP addresses.
You reserve a pool of class B addresses for these clients. Upon connecting,
you find that the Windows 2000 computers are using a subnet mask of all
255s.What should you do
A. Run ipconfig with the /release and /renew switch on the client
B. Run ipconfig with the /renew_all switch on the client
C. Run winipcfg on the client
D. Do nothing. This is normal
Answer: D
6. You are configuring a router. According to the manual, you will need a
transceiver to connect to the LAN ports of the router. What kind of physical
interface does the router have
A. MSAU
B. RJ-11
C. AUI
D. BNC
Answer: C
Answer: A, C, D
8. How can Jim Herr, a client on an NT TCP/IP network see which remote hosts
are currently connected using NBT
A. Use NBTSTAT
B. Use NETSTAT
C. Use NSLOOKUP
D. Use IPCONFIG
Answer: A
9. You are setting up a new Windows 98 workstation on your network, and your
DHCP server provides all of the normal TCP/IP configuration information.
What must you do to configure the IP address on the workstation after you
add the TCP/IP protocol
A. The DHCP option is enabled automatically, and the server will auto-configure
everything.
B. Find out what the subnet mask on your network is, and add this information
only.
C. Manually enter an IP address that is not in use on the network.
D. Put the address of the router in the default gateway, and put all 0s in the IP
field.
Answer: A
Answer: B
11. Credit card size, designed for notebooks, self-configuring, and non-OS
dependent describes which PC bus architecture
A. PCI
B. ISA
C. EISA
D. PCMCIA
Answer: D
Answer: D
13. When installing a manually configured adapter, what information must
you know to avoid resource conflicts
A. IRQ
B. Number of bits
C. Base I/O port address
D. Base Memory address
Answer: A, C & D
Answer: A
Answer: D
16. Which of the following are used to resolve Windows NetBIOS names to
IP addresses
A. DNS
B. WINS
C. LMhosts file
D. Hosts file
Answer: B, C
Answer: B
Answer: D
19. A Windows 95 user complains that she cannot connect to any other
computers on her local subnet even when using the IP address to
communicate. However, she can ping 127.0.0.1 and receive a reply. Other
users on her subnet do not report having any trouble. All client computers on
the network are WINS-enabled. What is the most probable cause of the
problem?
A. The TCP/IP stack is not installed properly
B. The subnet mask is not correct, check whether the subnet mask is
configured correctly.
C. The default gateway is not configured properly.
D. The computer is not configured to use LMHOSTS
Answer: B
Answer: C
21. You have set up a server that connects to an Internet services provider
(ISP) over ISDN line. How should the default gateway address be configured
so that Windows 95 users on the local network can access the Internet
through the RAS server. The RAS server is located on the same subnet as
that of the WIN95 machines.
A. The default Gateway address on WINS95 must specify the IP address of the
remote ISP
B. The default Gateway on WN95 must specify the IP address of the RAS
server on the local network.
C. The HOSTS file in WIN95 machines must be configured with the host name
of the RAS Server.
D. The HOSTS file in WIN 95 machines must be configured with the host name
of the ISP
Answer: B
22. Which of the following is the standard adopted for Ethernet CSMA/CD
by IEEE Committee?
A. 802.2
B. 802.1d
C. 802.3
D. 802.5
Answer: C
Answer: D.
Answer: D
Answer: B
26. Which of the following is suitable for mission critical and time sensitive
applications?
A. 10BaseT
B. 10Base2
C. Token Ring
D. Mesh
Answer: C
Answer: C
Answer: C
29. Which of the following network topologies is the most fault tolerant?
A. Bus
B. Mesh
C. Star
D. Ring
Answer: B
Answer: A
31. A Ring network topology provides two links from each computer.A link
in and a link out.
A. True
B. False
Answer: A
Answer: D
33. Which of the following media connectors are used in conjunction with
telephones?
A. RJ-45
B. RJ-11
C. RJ-T
D. None of the above are correct
Answer: B
34. 10BaseT Ethernet networks, most commonly use which of the following
types of cable?
A. Fiber
B. Coax
C. STP
D. UTP
Answer: D
36. AUI connectors are commonly associated with which of the following
items?
A. A Vampire Tap
B. Fiber Optic Cable
C. 10Base2
D. Wireless Networks
Answer: A
Answer: B
Answer: C
39. A Hub operates at which of the following layers of the OSI model?
A. Physical
B. Session
C. Transport
D. Application
Answer: A
40. Which of the following devices operate at the Data Link layer of the OSI
model?
A. A Hub
B. A NIC
C. A Switch
D. A Router
Answer: C
42. A Network Interface Card operates at the Network Layer of the OSI
model.
A. True
B. False
Answer: B
43. Which of the following is the correct order of the OSI model from
bottom to top?
A. Application, Presentation, Session, Transport, Network, Data Link, Physical
B. Physical, Network, Data Link, Session, Transport, Application, Presentation
C. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. Application, Session, Presentation, Transport, Network, Data Link, Physical
Answer: C
Answer: D
Answer: A
Answer: B
47. Which of the following layers of the OSI model does a Bridge operate
in?
A. The Data Link Layer
B. The Network Layer
C. The Transport Layer
D. The Session Layer
Answer: A
48. While reviewing the security logs for your server, you notice that a user
on the Internet has attempted to access your internal mail server. Although it
appears that the user's attempts were unsuccessful, you are still very
concerned about the possibility that your systems may be compromised.
Which of the following solutions are you most likely to implement?
A. A firewall system at the connection point to the Internet
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication
Answer: A
49. A server has two NIC cards installed. The first one uses IRQ 10 and I/O
range of B800-B81F.The second uses IRQ 10 and I/O range of D700-
D80A.What action, if any, should be taken?
A. No action is required.
B. Locate any available IRQ to resolve the IRQ conflict.
C. Locate any available I/O range to resolve the I/O conflict.
D. Change the I/O of the second NIC to B800-B81F.
Answer: B
50. Which of the following IEEE 802 standards pertain to token ring?
A. IEEE 802.5
B. IEEE 802.3
C. IEEE 802.2
D. IEEE 802.11
Answer: A
Answer: C
Answer: B
Answer: B
Answer: B
Answer: A
57. You are hired to investigate a slow performing network server for a
client. Using the performance monitor you obtain the following readings:
CPU usage= 25%, Disk time= 25%, Page faults/sec= 25.What one change will
increase the performance of this network server the most?
A. buy another CPU
B. add another hard drive
C. increase RAM
Answer: C
58. Which of the following should you check if you can connect using the
IP address but NOT with the host name?
A. DNS
B. WINS
C. DHCP
Answer: A
Answer: B
60. Although NOT fault tolerant this RAID level is often used when one
wants the highest level of performance?
A. RAID 0
B. RAID 1
C. RAID 5
Answer: A
61. Four _____ are used in the 5-4-3 rule of 10Base2 networking?
A. repeaters
B. segments
C. routers
Answer: A
62. You have just finished installing an Ethernet PCI NIC (network interface
card) in a client's computer. The computer initializes successfully and has no
apparent hardware problems. The computer however is not able to
communicate with other computers on this NetBEUI network. All other client
computers are able to communicate. What is the most likely cause of this
problem?
A. IRQ conflict
B. incorrect transceiver setting
C. incorrect frame type
Answer: B
63. The two key components of a digital signature include the secure hash
algorithm and a ___ ?
A. blowfish value
B. certificate authority
C. IPSec
Answer: B
Answer: B
Answer: B
Answer: C
67. Ordinary telephone wire has a thickness of AWG 22.Of the following
which is the thickest wire?
A. AWG 14
B. AWG 28
C. AWG 32
Answer: A
68. Backup method which clears the archive bit and is the shortest to
perform but takes the longest to restore?
A. full
B. incremental
C. differential
Answer: B
Answer: C
70. The major limiting factor for how long a cable can be in a segment is
___?
A. collisions
B. EMI
C. attenuation
Answer: C
71. Backing up the system state in Win 2000 Prof will backup the ___?
A. registry
B. boot files
C. all of the above
Answer: C
Answer: C
74. To start a Win 2000 Prof computer in the safe mode press ___ at
startup?
A. F8
B. Ctrl and Esc
C. F1
Answer: A
Answer: B
76. A large network with 500 users notice that at specific times in the
morning and afternoon network congestion ties up their computers.What is
the most likely cause?
A. power fluctuations
B. a terminator is not grounded
C. many users are logging on or off
Answer: C
77. A ___ is created when a unique IP address and port number are used to
connect two computers?
A. SAP
B. media transfer coefficient
C. socket
Answer: C
78. During disaster recovery of a Win 2000 Prof computer if you "Enable
Boot Logging" the file ___ is saved to the C:\winnt folder for analysis?
A. setuplog.txt
B. bootlog.txt ntbtlog.txt
Answer: C
79. Which of these WAN (Wide Area Network) protocols is the fastest?
A. Frame Relay
B. ATM
C. X.25
Answer: B
80. The only files on a Win 2000 Prof Emergency Repair Disk (ERD) are
autoexec.nt, config.nt, and setup.log?
A. True
B. False
Answer: A
Answer: C
82. A protocol that functions at the network layer of the OSI model?
A. TCP
B. IP
C. SPX
Answer: B
Answer: A
Answer: B
Answer: A
86. Using the TCP/IP protocol if the destination of the packet is outside the
subnet then the packet is sent to the ___?
A. switch
B. bridge
C. default gateway
Answer: C
Answer: C
Answer: C
Answer: C
Answer: A
91. After you setup the IP address and subnet mask your FIRST test should
be with ___?
A. tracer to a known good server
B. ping 127.0.0.1
C. ping another computer on your segment
Answer: B
Answer: B
93. Refers to the part of the network that is separated by routers, bridges,
or switches?
A. partition
B. node
C. segment
Answer: C
94. Data is organized into FRAMES for transmission at this OSI level?
A. physical
B. data-link
C. network
Answer: B
Answer: B
Answer: C
97. A Class a IP address uses the last ___ octet s for the host ID. The host
ID is the unique part and identifies the individual user and part of the reason
50% of all IP addresses are Class A?
A. one
B. two
C. three
Answer: C
98. Of the three (3) RAID levels used by a Win 2000 server choose the
one(s) that is/are fault tolerant?
A. 0, 1, and 5
B. 1 and 5
C. 5
Answer: B
99. The best method to restore the latest copy of the registry in a Win 2000
Server is to select the ___?
A. Emergency Repair Disk (ERD)
B. Recovery Console
C. Last Known Good Configuration
Answer: C
100. What routing protocol counts hops to the destination along multiple
paths to determine the most efficient route?
A. ARP
B. DLC
C. RIP
Answer: C
101. The source and destination addresses are stored in the ___ of a
packet?
A. data
B. trailer
C. header
Answer: C
Answer: B
Answer: C
Answer: C
Answer: C
Answer: B
107. According to RFC 1918 this range of Class A IP addresses are reserved
for private intranets and are not supposed to be used on the internet (where x
is any number from 1 to 254)?
A. 10.x.x.x
B. 20.x.x.x
C. 30.x.x.x
Answer: A
Answer: A
Answer: B
110. Type 9 ___ rated coaxial cable should be installed in drop ceilings to
conform to fire code regulations?
A. SPF
B. PVC
C. plenum
Answer: C
Answer: C
Answer: B
113. SNMP relies on the information found in ___ to chart and graph
components of the network for analysis and troubleshooting?
A. SMPs
B. MIBs
C. SAPs
Answer: B
114. Prescribes the greatest packet octet length that can be transmitted?
A. SAP
B. subnet mask
C. MTU
Answer: C
Answer: C
Answer: A
117. Win 2000 security service that maintains permissions and passwords
used to logon?
A. MMPE
B. CHAP
C. SAM
Answer: C
Answer: A
Answer: B
Answer: B
121. Processes data using applications stored on its hard drive and sends
the results back to the client. Saving the client the extra hard drive space he
would need for the application as well as the CPU processing time?
A. file server
B. print server
C. application server
Answer: C
122. The static HOSTS text file used on UNIX systems that requires manual
entries by the administrator was the precursor of ___.Today the HOSTS file
system finds use mainly in maximum security operations which don't want
anything changed automatically?
A. WINS
B. LMHOSTS
C. DNS
Answer: C
123. The minimum category of UTP cable that will meet the 10BaseT
standard?
A. cat2
B. cat3
C. cat5
Answer: B
Answer: A
125. Displays data on hardware components such as memory, CPU, and the
hard drive in a chart or graph which describes how these devices are
operating?
A. protocol analyzer
B. performance monitor
C. network monitor
Answer: B
126. The OSI layer responsible for name recognition, security logins, and
synchronization of the connection?
A. presentation
B. application
C. session
Answer: C
Answer: B
128. Microsoft recommends that the %CPU usage should not be above 90%
for a single CPU or above __% for multiple processors for any extended
period?
A. 50
B. 70
C. 90
Answer: A
Answer: C
Answer: C
Answer: C
133. Ensures that one device is NOT overwhelmed by another with a data
transmission?
A. SMB
B. CRC
C. flow control
Answer: C
134. You are setting up a 10Base2 Ethernet network for a client with three
segments. There are 20 computers in each segment. How many terminators
will you need for this network?
A. 1
B. 2
C. 6
Answer: C
135. Used to connect different media types but cannot filter or segment
traffic?
A. bridge
B. hub
C. router
Answer: B
136. The most efficient way to control security in a client/ server network is
to assign permissions to ___?
A. each shared resource
B. directories
C. groups
Answer: C
137. Which of the following IRQs can you set your NIC to without usually
causing a conflict?
A. 4
B. 7
C. 10
Answer: C
138. ArcNet is one of the oldest protocols used. What year was it invented?
A. 1967
B. 1977
C. 1987
Answer: B
139. OSI layer that determines whether the transmission is a full or half-
duplex transfer?
A. presentation
B. session
C. application
Answer: B
Answer: A
141. In addition to DNS, DHCP, and Active Directory to boot from an RIS
server in Win 2000 requires a ___ compliant NIC?
A. RAS
B. PXE
C. SAP
Answer: B
Answer: C
143. The standard for several hubs connected in a linear fashion (token-
bus)?
A. 802.3
B. 802.4
C. 802.5
Answer: B
Answer: B
145. For increased security Win 2000 enables encryption of files or folders
on ___ volumes?
A. FAT32
B. NTFS
C. either FAT32 or NTFS
Answer: B
Answer: C
Answer: C
Answer: C
Answer: B
150. Protocol used in Win 2000 to print to a URL on the internet. It requires
either Peer Web Services or a IIS server to be installed?
A. IPP
B. SAP
C. IPSec
Answer: A
151. Novell added ___ which could bind many protocols to a NIC starting
with NetWare 4.0?
A. NDIS
B. TSM
C. ODI
Answer: C
153. You are setting up a local peer-to-peer network that will have seven Win
98 computers. Internet access is not needed. Which protocol should you
use?
(NetBEUI is the best one but if its not listed then pick the one with the lowest
overhead)
A. X.25
B. NWLink
C. TCP/IP
Answer: B
Answer: B
155. OSI layer responsible for error checking frames and adding MAC
addresses to its tables?
A. presentation
B. transport
C. data-link
Answer: C
156. The initial formation of the packet header is started at this OSI level?
A. Application
B. Session
C. Physical
Answer: A
157. For a Class C IP address the first ___ octet(s) are reserved for the
network ID?
A. 1
B. 2
C. 3
Answer: C
Answer: C
159. Prevents bounce-back of signals in a 10Base2 network?
A. T-connector
B. BNC
C. terminator
Answer: C
Answer: B
161. What bridging protocol can be used to prevent bridge looping when
more than one physical path exists between two or more network segments?
A. The Spanning Tree Protocol
B. The Inverted Tree Protocol
C. The Transparent Tree Protocol
D. The Domain Name Tree Protocol
E. The Looping Bridge Protocol
Answer: A
162. What are the two methods switching hubs use to transport data
between devices?
A. Routing
B. Forwarding
C. Cut-through
D. Active
E. Store-and-forward
Answer: E, C
163. What happens when a device is disconnected from the middle of a BUS
network?
A. The hub will propagate error messages to the rest of the network
B. All devices on the network will fail
C. The Server will stop responding to that device
D. Data will not be able to get to devices on the other side of this device
E. If a bridge is on the network, only that segment will be effected
Answer: A
165. Name two protocols in the TCP/IP suite that function at the Transport
layer of the OSI model.
A. TCP
B. IP
C. UDP
D. SNMP
E. ARP
Answer: C, A
Answer: D
Answer: B
Answer: D
Answer: B
171. The inner core of a coaxial cable that carries the signals is made of
___?
A. aluminum
B. copper
C. zinc
Answer: B
Answer: C
Answer: A
174. What is an advantage of Cat 3 UTP cable instead of RG-58 A/U coaxial?
A. UTP supports longer cable segments
B. UTP is less susceptible to EMI
C. UTP is easier to install and less expensive
Answer: C
Answer: B
176. One important difference between routers and bridges is that when a
bridge can't locate the destination address in its table it ___?
A. sends the transmission to the default gateway
B. dumps the packet
C. broadcasts the transmission to all ports
Answer: C
177. Novell's NetWare 5.0 was developed in part from the ___ standard?
A. ATM
B. NDIS
C. X.500
Answer: C
178. The freely distributed open source Unix based operating system that
has gained in popularity recently?
A. XP
B. Linux
C. DLC
Answer: B
Answer: C
180. Is the interface between the NIC drivers and MAC sublayer?
A. WINS
B. NDIS
C. DLC
Answer: B
181. Which topology provides for equal access to the network for all
computers?
A. star
B. bus
C. ring
Answer: C
Answer: C
Answer: C
Answer: B
185. RIP counts hops (or routers it encounters) as the packet travels to its
destination. Another name for a hop is a ___?
A. interval
B. sequence
C. metric
Answer: C
186. A protocol that functions at the transport layer of the OSI model?
A. IP
B. IPX
C. SPX
Answer: C
Answer: B
Answer: A
Answer: C
Answer: B
191. ___ uses data encryption to secure data being transmitted over the
internet so even if it is intercepted it can't be read without knowing the key?
A. DLC
B. SSL
C. ARP
Answer: B
192. Device drivers can be disabled in Win 2000 Prof in Device Manager or
by using the ___?
A. ERD
B. Recovery Console
C. RDISK
Answer: B
193. Smart Cards in Win 2000 use the ___ RAS authentication protocol for
security?
A. PAP
B. MSCHAP
C. EAP
Answer: C
194. Because of its low overhead this is the fastest of these protocols?
A. TCP/IP
B. NWLink
C. NetBEUI
Answer: C
195. The ERD made in the Win 2000 Server Backup utility contains the files
needed to boot the computer?
A. True
B. False
Answer: B
196. Your client has a 10Base2 Ethernet network which is using 160m of RG-
58A/U cable and two 50 ohm terminators that are both grounded. What is
wrong with his network?
A. the terminators should be 93 ohms
B. he should be using RG-59/U cable
C. only one terminator should be grounded
Answer: C
197. Of the following the one that is NOT an algorithm that determines the
shortest path for routers?
A. SAP
B. RIP
C. OSPF
Answer: A
198. The most common topology in use today among corporate users?
A. bus
B. ring
C. star-bus
Answer: C
Answer: A
Answer: C
Answer: B
Answer: B
Answer: C
204. When multiple protocols are used in a network ___ should always be
placed at the top of the binding order?
A. TCP/IP
B. IPX/SPX
C. the one most frequently used
Answer: C
205. The standard cabling type used in AppleTalk and Token Ring?
A. UTP
B. STP
C. RG-58A/U
Answer: B
Answer: A
Answer: C
208. The RJ-45 connector used in UTP networks has ___ wires?
A. 2 pairs or 4
B. 4 pairs or 8
C. 6 pairs or 12
Answer: B
Answer: A
Answer: B
211. The IEEE 802 standards operate at these layers of the OSI model?
A. network and transport
B. session and presentation
C. physical and data link
Answer: C
212. Can be used to show only one IP address for multiple users on the
subnet?
A. proxy server
B. DHCP server
C. DNS server
Answer: A
213. What must be configured in TCP/IP for two computers on the same
segment to communicate with each other?
A. IP address and subnet mask
B. default gateway
C. all of the above
Answer: A
Answer: B
Answer: B
Answer: A
Answer: B
218. You are installing cables for an Ethernet network in an office. The office
manager doesn't want the media hanging in the crawl spaces and drop
ceiling and wants you to share an existing conduit that already has telephone
cables to hide the network cables you are installing. The cable segments will
not be over 100 m. Which type of media should you choose?
A. coaxial
B. UTP
C. fiber optic
Answer: C
219. ArcNet was originally setup to operate at ___ Mbps?
A. 10 Mbps
B. 2.5 Mbps
C. 100 Mbps
Answer: B
Answer: C
221. Running performance monitor your CPU usage averages 45% except
when you load an application and it surges to 100%.Is there a problem?
A. yes, your CPU needs an upgrade or multiple CPUs may have to be installed
B. yes, but it is not the CPU, you need more RAM
C. no, its normal for the %usage to surge when loading an application
Answer: C
Answer: C
Answer: C
Answer: B
Answer: B
226. Dial-up protocol used when a secure connection is desired?
A. PPP
B. SLIP
C. PPTP
Answer: C
Answer: B
Answer: A
Answer: A
Answer: B
231. A ___ is used to connect two pieces of 10Base2 coaxial cable together?
A. T-connector
B. barrel connector
C. patch cable
Answer: B
232. One reason the ATM WAN protocol is faster than Frame Relay is
because its packets are a ___ size which allows them to be switched and
routed more easily?
A. variable
B. fixed
C. compressed
Answer: B
Answer: A
Answer: B
Answer: B
236. For Cat 5 UTP, patch cables from the wall outlet to the computer can be
a maximum of ___ m?
A. 1
B. 3
C. 10
Answer: B
237. The static text file ___ and DNS contain similar names and IP
addresses?
A. LMHOSTS
B. HOSTS
C. WINS
Answer: B
Answer: B
Answer: C
Answer: C
Answer: B
243. A dial-up protocol that does not support automatic IP addressing using
DHCP?
A. PPP
B. DLC
C. SLIP
Answer: C
244. Of the two types of routers the one that uses the discovery process to
create its routing table?
A. static
B. dynamic
C. multiplexed
Answer: B
245. Your client's NT server has been having trouble booting. Where should
you look first for some answers?
A. performance monitor
B. event viewer
C. SNMP
Answer: B
Answer: B
247. You are hired to setup a 100Mbps Ethernet network for a client in an
office that already has cat 3 UTP installed. Your client wants to keep the
costs to a minimum but needs the 100Mbps throughput. What should you
recommend?
A. keep the existing cable but purchase 100Mbps hubs
B. keep the existing cable but use 100Mbps patch cable from the wall outlet
C. new cat 5 UTP and if not already installed 100 Mbps hubs and 100 Mbps
NICs
Answer: C
248. Your client's 10BaseT Ethernet network using NetBEUI wants to access
data on an IBM mainframe. What device will allow this connection?
A. bridge
B. gateway
C. router
Answer: B
Answer: C
250. Access to files and folders in Win 2000 is accomplished using ___ ?
A. compression
B. tunneling
C. permissions
Answer: C
251. What happens when a device is disconnected from the middle of a BUS
network?
A. The hub will propagate error messages to the rest of the network
B. All devices on the network will fail
C. The Server will stop responding to that device
D. Data will not be able to get to devices on the other side of this device
E. If a bridge is on the network, only that segment will be effected
Answer: B
252. Why is there a limit to the number of MAUs that can be connected
together in a standard Token-ring network?
A. Too many MAUs would exceed the cable limits imposed by the Token Ring
specification
B. Too many MAUs would create to large of a collision domain for
communications to take place
C. Too many MAUs require more electricity than the devices can support
D. Too many devices connected through MAUs requires more time to get
control of the token that communications becomes unacceptable
E. There is no limit to the number of MAUs a token ring network can support
Answer: D
Answer: B
254. What are three common items that must be configured correctly when
installing a Network Interface Card (NIC)?
A. PCI or ISA slot
B. IRQ setting
C. DMA Address
D. Driver
E. I/O Address
Answer: B, C, D, E
Answer: B
256. What is the name of a common test performed on a NIC with vendor
supplied diagnostic software?
A. NIC Test
B. Diagnostic Test
C. PING
D. Loopback
E. NICBack
Answer: D
257. Name two driver interfaces that allow a NIC to communicate on more
than one protocol.
A. NDIS
B. NetBEUI
C. NetBIOS
D. ODI
E. UNIX
Answer: D, A
Answer: A
259. What bridging method is commonly used in Ethernet with only one
bridge?
A. Collision
B. Routing
C. Transparent
D. Spanning Tree
E. Open Shortest Path First (OSPF)
Answer: C
Answer: A
Answer: A
Answer: A
Answer: D, B
Answer: D
Answer: C, E
266. If two computers are assigned the same IP address then ___?
A. neither computer will be able to connect
B. the first computer to sign on will be able to connect the other will not
C. both computers will be able to connect to the local network but not to the
internet
Answer: B
268. Similar to WINS in that it resolves NetBIOS names into IP address but
stores this information in a text file?
A. LMHOSTS
B. DLC
C. DNS
Answer: A
Answer: B
270. The TCP/IP protocol used on the internet allows for approximately ___
billion unique IP addresses?
A. 1
B. 4
C. 10
Answer: B
271. Records the number of hops and latency of the packet on its way to its
destination?
A. IPCONFIG
B. TRACERT
C. PING
Answer: B
Answer: B
273. When checking the TCP/IP protocol you have just finished installing for
connectivity the proper first step it to ___?
A. PING another computer on that segment
B. PING 127.0.0.1
C. PING the default gateway
Answer: B
274. As data travels down the OSI layers it reaches the ___ layer which is
responsible for its bit conversion and actual transmission to other
computers?
A. network
B. application
C. physical
Answer: C