NETWORKING

1. Which of the following cable types is most susceptible to cross talk?


A. UTP


B. STP


C. Coaxial


D. Fiber optic


- Explanation
Unshielded twisted pair cables are most susceptible to cross talk.


2. In a scenario where the file server is on an AppleTalk network and the devices needing to access this server are on a token ring network, which of these devices will connect the two networks?


A. Hub


B. Bridge


C. Switch


D. Gateway


- Explanation
A gateway is used to connect dissimilar systems. Here the gateway is used to connect two dissimilar

3. If you were to connect your computer to an analog data service provided by a local telephone company, which of these devices would you use?


A. Fax machine


B. V.90 modem


C. ISDN adapter


D. LAN adapter


- Explanation
A V.90 modem is used to connect local ISP using the telephone line.


4. Which of the given connectors could you use with 1000Base-xx Gigabit Ethernet (Choose two.)


A. ST


B. SC


C. AUI


D. BNC


E. RJ-45


- Explanation
1000BASE-xx defines standards for Gigabit Ethernet on fiber and shielded copper cabling. 1000Base-xx is defined in 802.3z and includes the following three standards: 1000BASE-SX using a dual SC connector 1000BASE-LX using a dual SC connector: 1000Base-CX using shielded twisted pair cabling, and RJ-45 connections.

5. Exhibit Identify the topology displayed in the exhibit.








A. Star


B. Hub


C. Ring


D. Bus


- Explanation
The exhibit displays a star topology where in, if one particular computer fails it does not affect the rest of the network.


6. Exhibit Identify the topology displayed in the exhibit.











A. Bus


B. Ring


C. Star


D. Mesh


- Explanation
The exhibit displays a bus topology. In bus topology, all computers share a common bandwidth.


7. Identify the picture displayed in the exhibit







A. LAN


B. WAN


C. Mesh Network


D. X.25 Network


- Explanation
The exhibit is displaying a WAN, where in two routers are communicating with each other through the public network or the cloud.


8. There are a couple of applications you are accessing on the network from your computer regularly. For a few days now you have not been able to access only one application from your computer. What must you do?


A. Reboot the server


B. Reboot the workstation


C. Check the user's password


D. Check the user's access procedures


E. Ask the user to access the problem application from another workstation


- Explanation
The problem could be either with this computer or with the user account. By trying from another computer you can eliminate one of the causes. Incorrect Answers A: The application is functioning at the server. It can be accessed from other workstations. B: Rebooting is unnecessary as other applications on the server work from the workstation. C: Since the user is able to access the server through the other application, he is logged on to the network D: There is no specific procedure for accessing, since it has stopped function after a while, the method of access cannot be incorrect.



9. Your company is moving into a new building. All 1OBaseT jacks for the workstations have been labeled and relevant patch panel to hub connections have been made too. You plug in a workstation to a jack and, you do not get a link light on the NIC or the hub. You have tried to replace both patch cables with known, good patch cables. It still does not work. What should you do next?


A. Hook a protocol analyzer to the hub.


B. Reinstall the network interface card driver.


C. Test the cable from wall jack to patch panel.


D. Replace the workstation patch cable with a crossover cable.


- Explanation
The cable from the wall jack to patch panel could be faulty. A. The problem appears to be on the physical layer, not a network configuration related one. B. The problem appears to be in the physical layer and not in the data link layer, where the driver resides. D. Crossover cables are used between similar devices and not in between dissimilar devices such as a workstation and wall jack.

10. Which command displays the per protocol statistics. (Note: switches of certain commands maybe case sensitive.)


A. arp -s


B. arp -S


C. nbtstat -s


D. nbtstat -S


E. netstat-s


F. netstat-S


- Explanation
E. netstat -s displays detailed network traffic statistics for the IP, ICMP, TCP, and UDP protocols. F. netstat -S is the same as netstat -s. nbtstat is the case sensitive command, whereas arp and netstat are non-case sensitive. Incorrect Answers A. arp -s adds a new entry to the ARP cache. B. arp -S is the same as arp -s. C. nbtstat -s displays a list of the computer's currently active NetBIOS settings that helps to identify remote computers by name D. nbtstat -S -displays a list of the computer's currently active NetBIOS settings that helps to identify remote computers by IP address.

11. Which of the following procedures need to be implemented, before any network implementation? (Choose two.)


A. Compile documentation


B. Disable network logins


C. Implement network load balancing


D. Determine needs and expectations


- Explanation
A. Solid Documentation is a very essential part of any network implementation. D. Needs and expectations should always be considered before implementing a network. Incorrect Answers: B. Network logins need to be disabled only if the implementation is server related or if it affects the whole network. C. Load balancing is a performance related issue and is not related to implementation or maintenance.


12. Which of the following are good password practices ? (Choose two.)


A. Keep passwords indefinitely


B. Change passwords every 90 days


C. Maintain minimum password length


D. Use only alphanumeric symbols in passwords


- Explanation
B. Passwords should be changed regularly. C. A minimum password length strengthens security. Incorrect Answers A. Passwords should be changed regularly. D. A password should be a mixture of alphanumeric and numbers. It makes it much harder to guess the passwords.


13. Given data: You work for a company whose regular business hours are from 8 a.m. to 5 p.m. Monday to Friday. Your manager has instructed you to run backups only after business hours. The performance capability of your tape drive is 50 GB with a data transfer rate of 3600 KB/min, allowing transfer of 2.1 GB per hour. Data that needs to be backed up is 40 GB. On which day(s) can you do full backup? (Choose all that apply.)


A. Monday


B. Tuesday


C. Wednesday


D. Thursday


E. Friday


- Explanation
given data implies that the duration of the backup process 19.1 hours. The backup should start on Friday night. Incorrect Answers A, B, C; D: There are only 15 non-business hours between 5 p.m. and 8 a.m. The 19.1 hour backup process must not be started Monday to Thursday.

14. Which layer of the OSI model is responsible for establishing, managing, and terminating communications between two computers?


A. session


B. network


C. physical


D. transport


E. data-link


F. application


- Explanation
The Session Layer controls the establishment, the managing and terminating communications sessions between two peers. Incorrect Answers B. The network layer provides logical addressing which device us for path destinations. C. The physical layer is responsible to move bits between devices and specifies voltage, wire speed and pin-out cables. D. The transport layer provides for both reliable and unreliable delivery and error correction before retransmit. E. The data link layer combines bits into bytes and bytes into frames, provides access to media using MAC addresses, and error detection. F. The application Layer is where the user/applications access the network.

15. Which of the following refers to any device that is logically addressed on an IP network?


A. host


B. peer


C. client


D. server


- Explanation
In IP networks, the logical address is nothing but an IP address. Any device that has an IP address, is referred to as a host. Incorrect Answers B. A peer device is a corresponding device. For example all computers in a peer network are considered equal. C. Clients are just an example of IP host. D. Servers are just an example of IP host.

16. Which of the following are valid TCP/IP protocols? (Choose three)


A. SAP


B. TCP


C. HTTP


D. DHCP


E. NetBEUI


- Explanation
B. TCP is a transport layer protocol in the TCP/IP protocol suite. C. HTTP is a TCP/IP protocol for accessing hyper text. D. DHCP is a TCP/IP protocol that manages automatic IP configuration environment. Incorrect Answers A. SAP (Service Advertising Protocol) is a Novell Netware protocol. E. NetBEUI is a legacy broadcast protocol originally from IBM but now popularly associated with Microsoft networks


17. Which of the given TCP/IP protocols can assign a logical address to a host?


A. IP


B. TCP


C. UDP


D. SMTP



- Explanation
IP is the network layer protocol of the TCP/IP suite, whose main function is listing available routes to the destination and assigning logical addresses to end hosts.Incorrect Answers B. TCP is a connection-oriented transport layer protocol. C. UDP is a connection-less transport layer protocol. D. SMTP is used for transferring mails.






18. When installing a 10BaseT NIC on a Windows system, what would you configure after configuring the IRQ and the I/O port addresses? (Choose all that apply)


A. Install network client software.


B. Connect the cable to the MAU.


C. Connect the cable to the network card.


D. Install the terminator at the network card.


- Explanation
A. Install the client software, this helps in configuring protocols and binding drivers. C. The network card will have to be physically connected to the network through a cable. Incorrect Answers B. MAU devices are equivalent to hubs and they are used in token ring networks. D. Terminators are only used on Coaxial cable networks such as 10Base2 (Thinnet) and l0Base5 (Thicknet).

19. Which of the following utilities can be used to see active connections on a server?


A. PING


B. NBTSTAT


C. NETSTAT


D. TRACERT


- Explanation
Netstat is a command-line program that displays information about a TCP/IP computer's current network connections and about the traffic generated by the various TCP/IP protocols. Incorrect Answers A. PING is used to test network connectivity. B. Nbtstat.exe is a Windows utility that displays information about the NetBIOS over TCP/IP connections that Windows uses when communicating with other Windows computers on the TCP/IP LAN. D. TRACERT is used to trace routes throughout the network.


20. Which of the following is the correct default subnet mask for a class C networks?


A. 255.255.255.224


B. 255.255.255.0


C. 255.255.0.0


D. 255.0.0.248


- Explanation
Class C networks have a 24-bit subnet mask of 255.255.255.0. Incorrect Answers A. This is a 27-bit subnetted subnet mask C. Class B networks have a 16-bit subnet mask of 255.255.0.0. D. This is not a correct subnet mask since it is discontigous.


21. Which of the following ISO layers will the IP layer of the TCP/IP suite, compare to?


A. Network


B. Application


C. Functionality


D. Physical


- Explanation
The IP layer of the TCP/IP suite handles networking functionality such as route determination, logical addressing, forming packets etc. The Network layer of the ISO layers also handles the same responsibility as the IP layer.


22. Given a scenario of a heterogeneous network, where the servers are a combination of UNIX, Netware and Windows, whereas the workstations are purely Windows 95, which of the following protocols would you choose to enable network communication?


A. IP


B. DLC


C. NWLink


D. NetBEUI


- Explanation
UNIX servers function on TCP/IP. Windows NT servers have a version of MiIncorrect Answers B. DLC is mainly used by 1BM mainframes and some HP printers. C. NWLink is Microsoft's implementation of IPX/SPX: IPX/SPX is not supported by UNIX computers. D. NetBEUI is not supported by UNIX computers.


23. Which of the following can enable communication between networks that use different communication protocols?


A. Router


B. Gateway


C. Bridge


D. None of the above


- Explanation
A gateway can translate between different protocols. A gateway can either be a physical device or relevant piece of software. A gateway usually is capable of operating on all 7 OSI layers. Incorrect Answers A. A router enables communication between networks that have dissimilar addresses. Although, the gateway can be a piece of software, that can reside on a router to help translation between different protocol suites. But, the router itself cannot be considered as a gateway. C. A bridge enables communication between different segments on a network. A gateway piece of software can reside on the bridge as it is a data link layer device and help to recognize data between dissimilar topology. But, the bridge itself cannot be considered a gateway.


24. Which of the following uses FDM (Frequency Division Multiplexing)?


A. Broadband


B. Baseband


C. Half duplex


D. None of the above.



- Explanation
In case of broadband media, multiple signals can be transmitted on the same cable simultaneously by means of frequency division multiplexing (FDM). Incorrect Answers B. Baseband only use one signal at a time. Baseband can use time division multiplexing (TDM). C. Half duplex is a communication method or the way a media is capable of receiving and sending data. This is a base band type of data transmission.






25. Which of the following is the best way to secure data while transmitting it over the WAN?


A. Share level security


B. Encrypt Data


C. Password protect data


D. Use ISDN


- Explanation
Since A Wan could be a public network as well, it is best to encrypt data, while transmitting it over the WAN. Incorrect Answers A. Share-level security is used for securing resource access on LANs. C. Password-protection is not an ideal way of securing data on a WAN unless the password is itself encrypted digitally. D. ISDN is a type or technology of transmission media and does not relate to security.

25. Which of the following is the best way to secure data while transmitting it over the WAN?


A. Share level security


B. Encrypt Data


C. Password protect data


D. Use ISDN


- Explanation
Since A Wan could be a public network as well, it is best to encrypt data, while transmitting it over the WAN. Incorrect Answers A. Share-level security is used for securing resource access on LANs. C. Password-protection is not an ideal way of securing data on a WAN unless the password is itself encrypted digitally. D. ISDN is a type or technology of transmission media and does not relate to security.

26. What is the main function of a firewall?


A. Allows people on the Internet to see just one IP address


B. Restricts access of resources to designated IP addresses only.


C. Manages password functions


D. Restricts unauthorized users from accessing sensitive data


- Explanation
A firewall is a network border device that is used to secure the network resources from unauthorized access. The best way to achieve this on a firewall is to configure allowable and not allowed IP addresses.Incorrect Answers A. Network address translation (NAT) is also a feature of the firewall in general, but it is not the main function of a firewall. C. Passwords functions is not a function of the firewall at all. D. A firewall can distinguish between authorized and non-authorized IP addresses but not users.

27. Which of the following is a character that signifies the start of a comment line in a HOSTS file?


A. ;


B. %u


C. $


D. #


- Explanation
# is the character that signifies the beginning of a comment line in Hosts files.

28. You are concerned about security in your organization and decide to implement a secure password policy. Which of the following options can make your password policy more secure?


A. Require users to change passwords randomly


B. Set password expiration to 2 days


C. Change password at regular intervals


D. Require passwords with maximum 4 characters


- Explanation
The same password should not be used over a long period of time. By changing the passwords at regular intervals, you can ensure security of passwords. Incorrect Answers A. Password change time is usually a part of network policies and cannot be changed randomly by users. B. Setting very low expiration dates for passwords can be very annoying for users and hence a practical interval needs to be set for these changes. D. A minimum number of characters itself is usually 6 on most networks.

29. User Sally complains that her workstation does not connect to the server or other network resources when the Air condition is on. Whereas, on the days when it is off everything works fine. What could the problem be?


A. There is a voltage drop when the AirConditioner is turned on


B. The NIC needs to be replaced


C. The problem is with the cabling.


D. All of the above


- Explanation
There is a cabling problem. There is interference between the network cabling and the power cabling of the air conditioner. Since interference can garble data on the network, even simple tasks such as login may be impossible. Incorrect Answers A. Assuming that the problem is due to the momentary voltage drop, the problem should get sorted out immediately after the voltage is stabilized, which is not mentioned in the question statement. B. The NIC works fine when the lights are off. D: Since A and B are incorrect, D is also incorrect.

30. In a Peer-To-Peer network, which of the following resources can be considered a client only?


A. Local host


B. Server


C. Workstation


D. None of the above.


- Explanation
In a Peer-To-Peer network there is no concept such as local host, server or a workstation. Each resource in itself can be a server or a workstation depending on the function it is performing at that moment. Incorrect Answers A. Local host is not a service.B. The Server is the main resource of a Client/Server network C. The workstation provides a very limited amount of services to the users, on a Client/Server network.

31. You have a 10BaseT connection. It is 10 meters between the NIC and the wall plug, 90 meters from plug to wiring closet, and 3 meters from wiring closet to hub. Your computer cannot connect. What should you do? Required objectives: Connect to the server. Optional Objectives: Faster connection. Easier access for users. Proposed solution: Replace the NIC with a 100baseFX NIC


A. This meets only the required objective and not the optional objective


B. This meets the optional objective only


C. This meets the required and optional objectives


D. This does not meet the required or optional objectives


- Explanation
Changing the NIC will not overcome the distance issue. (Required objective not met). Changing to a faster NIC alone would not improve speeds as you must also provide the NIC with the required cabling also (optional objectives not met).


32. Which of the following needs to be configured to enable for DNS resolution for a Workstation? (Choose three)


A. Domain name


B. Host name


C. NetBIOS name


D. IP address of the DNS server


- Explanation
DNS works in domain namespaces. A domain name must be specified. The workstation must have a host name. The workstation must have been be configured with the IP address of a DNS server. Incorrect Answers C. DNS does not use NetBIOS names. NetBIOS names are proprietary to Microsoft networks.

33. Which of the following utilities can be used to troubleshoot a HTTP server?


A. PING


B. TDR


C. Telnet


D. NBTSTAT


- Explanation
Telnet is an IP based command used to connect to any remote host and issue configuration related commands. This same command can be used to troubleshoot a HTTP server as well.Incorrect Answers A. PING is a utility used to check connectivity with a host that is not behind a firewall restriction. HTTP Servers are usually placed behind firewalls. B. A time domain reflectometer (TDR) is used to test network cabling. D. Nbtstat.exe is a Windows command-line program that displays information about the NetBIOS over TCP/IP connections; this cannot be used to troubleshoot pure IP based services.

34. Which of the following tape backup methods alter the archive attribute? (Choose two.)


A. Differential


B. Sequential


C. Full


D. Incremental


- Explanation
A full backup as well as an incremental backup backs up can affect the archive attribute. Incorrect Answers A, B. Differential backup as well as the sequential backup does not affect the archive attribute.

35. Your entire network is suffering a severe performance pull down. All connections were made as per documentation and hence there is no place for conflicts. Which of the following can help to isolate the problem?


A. NETSTAT


B. NBTSTAT


C. Hardware Loopback


D. Network Monitor


- Explanation
Network monitor is a SNMP based TCP/IP utility that helps to monitor data traveling to and from workstations, protocols being used, time delay, Hardware as well as the IP addresses of the source as well as destination hosts. Using this you can isolate the problem based on protocol, specific end host etc.Incorrect Answers A. NETSTAT cannot provide extensive analysis as network monitor utility would.B. Nbtstat.exe can provide information relating to NetBIOS over TCP/IP only. C. Hardware loopback is used to test the devices physically.

36. Which of the following are features of PSTN (Public Services Telephone Network)? (Choose three)


A. Ease of configuration


B. Inexpensive cost


C. Readily available


D. 64 Kpbs


- Explanation
PSTNs are inexpensive, easy to use and are easily available. Incorrect Answers D. PSTN cannot support 64Kbps; you may have to try a local data service provider for bandwidth more than 56Kbps.

37. You had installed an anti-virus software on the server, earlier in the morning and had instructed the server to push this installation to all workstations. This task was completed as per schedule. Now after the lunch session as you are installing RAID on the same network, systems seem to be failing randomly. What can you do to correct the problem?


A. Disable Antivirus.


B. Disable the RAID system.


C. Check the anti-virus vendor for system patches or service packs.


D. None of the above.


- Explanation
System patches and service packs would definitely help solve the problem here. But these must be obtained from the OS vendor and not the anti-virus vendor. Incorrect Answers A, B, C: The anti-virus suite is not responsible for the crashes as the crashes did not occur until post lunch break when the RAID was being installed.Disabling the RAID system is not a solution if the RAID is needed on the network.Antivirus vendors are not the authorities to provide system patches.

38. Sally complains that her login process as well as resource access on the network Server is very slow. What utility can you use to find the bottleneck?


A. PING


B. TELNET


C. TRACERT


D. NBTSTAT


- Explanation
Tracert can be used to trace a route between two devices. The trace includes information about connectivity and speed. It would be possible to locate the bottleneck. Incorrect Answers A. Ping is used to check connectivity and not speed of connection. B. Telnet is used for remote login. D. Nbtstat is not the correct command here as you need to check IP specifics and not the Net BIOS related information.

39. Sally sends a mail to John. Sally's email address is sally@proprofs.com and John's email address is john@metro.in. Which of the following is the correct order of domain name resolution?


A. com, in, metro.in, proprofs.com,


B. proprofs.com,.com, in, metro.in


C. com, proprofs.com.in, john.in


D. john.in proprofs.com, com, in,


- Explanation
The correct order for domain name resolution is proprofs.com,.com, in, metro.in

40. Which of the following is a Netware Directory Service?


A. SPX


B. IPX


C. DFS


D. NDS


- Explanation
NDS is short form for Netware Directory Service.Incorrect Answers A, B, C: IPX/SPX-is a network protocol of Novell, not a directory service. Distributed File System (DFS) is a file service, not a directory service.

41. Which of the following devices can operate in the Network layer as well as the Data Link layer?


A. Router


B. Brouter


C. NIC


D. Bridge


- Explanation
Brouter is a device that combines the function of a router as well as a bridge. Router operates in the network layer and bridge operates in the data link layer.Incorrect Answers A. A router operates at Network layer. C. A NIC operates at the Data Link Layer. D. A bridge operates at the Data Link Layer.

42. Which of the following protocols/files is used to resolve a host name on a UNIX server?


A. IPX


B. HOSTS


C. LMHOSTS


D. ARP


- Explanation
On a UNIX server, there can be two ways of resolving domain names or host names: " Use a HOSTS file in which the resolution information will have to be typed and maintained manually." Use the DNS service which can perform the resolution automatically once the service is properly configured.Incorrect Answers A. IPX is a Netware proprietary protocol and cannot be used on UNIX servers.C. LMHOSTS file contains NetBIOS to IP address mapping. D. ARP provides IP to MAC address resolution.


43. Which of the following is the exact connection type used by the UDP?


A. Connection-oriented


B. Connectionless


C. Acknowledgement based


D. None of the above


- Explanation
UDP is a connectionless protocol. Incorrect Answers A, C: TCP is connection-oriented and acknowledgement based.

44. You are configuring a workstation to use dial-up networking by installing an ISA internal modem operating on COM2 using standard settings. You are unable to initialize the modem. What is the most likely cause of this problem?


A. Conflict with IRQ3.


B. Conflict with IRQ4.


C. Incorrect IP addressing.


D. Incorrect IPX addressing.


- Explanation
This is a likely hardware conflict problem. Two devices are using the same IRQ. COM2 uses IRQ3. Incorrect Answers B. COM2 does not use IRQ4. C, D: Initializing modems does not relate to IP or IPX, they are network layer protocols.

45. John is unable to connect his computer to the network. He notices that the link light on the NIC is not glowing. He replaces the computer patch cable and is still unable to log on to the network. He moves the network patch cable to a different port at the wiring closet hub and the link light starts glowing. What should he do now?


A. Replace the NIC.


B. Replace the NIC driver.


C. Attempt to connect and transfer a file.


D. Document the problem and solution.


- Explanation
After moving the computer to a different port, since the physical and logical connection is established, he must try to login to the network and try a simple file transfer. Incorrect Answers A. since the NIC's light is glowing after port change, this option is not required. B. Since the physical and logical connection is complete after moving the computer, this is not required. D. Documentation is the final step in a solution process; here the problem is not solved unless the file transfer is successful.

46. Which of the following utilities sends Echo messages to establish the connectivity with the end host?


A. ARP


B. PING


C. Telnet


D. Ipconfig


- Explanation
The PING utility is used to test connectivity. PING uses ICMP echo requests. Incorrect Answers A. ARP is used to resolve IP addresses to MAC addresses. C. Telnet is used to login on remote computers. D. IPConfig is used to configure IP settings on Windows NT/2000/XP/.NET computers.

47. Which of the following options relate to digital signatures ? (Choose two.)


A. EncryptAPI


B. certificate authority


C. asymmetric algorithm


D. complete data encryption


- Explanation
A certificate authority is responsible for issuing digital certificates and digital signatures use an asymmetric algorithm.Incorrect Answers A. EncryptAPI relates to data encryption in different applications. D. Digital signatures only confirm the authenticity of the communicating users, it does not provide complete security

48. What should you use to inhibit the spread of viruses on your peer-to-peer network?


A. firewall


B. scandisk utility


C. Antivirus suite


D. Antivirus software on each computer.


- Explanation
It is mandatory to use a antivirus software on each workstation. Incorrect Answers A. A firewall stops traffic at port and protocol level. B. The scandisk utility is used to diagnose and fix hard disk problems. C. An antivirus suite is more relevant to huge client/server networks.

49. Which of the following are routed protocols? (Choose two.)


A. IP


B. IPX


C. TCP


D. NetBEUI


E. NetBIOS


- Explanation
Since IP and IPX both operate on the network layer, they both can be routed. Incorrect Answers C. TCP is a transport layer protocol.. D. NetBEUI uses broadcast and cannot be routed. E. NetBIOS is more of a service than a protocol.

50. To which of the following layers does the UDP correspond to?


A. session


B. network


C. physical


D. transport




51. Which of the following can be termed as application layer proxies? (Choose two.)


A. FTP


B. HTTP


C. PPTP


D. SMTP


E. POP3


F. Telnet


- Explanation
Application proxies help users on either sides of the firewall to communicate. There are HTTP application proxies as well as FTP application proxies. SMTP though correct is not as common

52. After testing the patch cable you install a workstation running Windows 95 and configure it completely with a PCI 100BaseT NIC. Although the configuration was done properly, the computer is unable to communicate with any other computer on the network. Which of the following would help you troubleshoot this problem?


A. Internal Software loopback


B. External Software loopback


C. Internal hardware loopback


D. External hardware loopback


- Explanation
By External hardware loopback test the NIC for transmission and reception capabilities. Incorrect Answers A, B: Software loopbacks are inbuilt to the NIC configuration software and would have been checked by the software during the configuration itself. C. There is no such thing as an internal hardware loopback.

53. Which of the following are connectionless services/protocols? (Choose two)


A. TFTP


B. UDP


C. FTP


D. HTTP


- Explanation
A: TFTP, Trivial FTP and UDP are connectionless. Incorrect Answers C. FTP is a connection-oriented application layer TCP/IP tool. D. HTTP runs as a part of TCP and TCP is connection-oriented. So HTTP is not connectionless.


54. Metro Biz is a company that has 350 users on a 10BaseT network connected with Cat3 cabling in a star configuration using 10BaseT cabling. Required Results: Add 40 more users to the existing network Increase the speed of the network from 1OMbps to 100Mbps Optional Results: Increase the speed of operations on the application server. Allow the clients to connect to the server quicker. Proposed Solution: Put 100Mbps cards in the 40 new machines and add them to the network. Replace the existing NICs in the clients and the server with 100Mbps cards. Add more RAM to the server. Change the protocol binding order on the clients to put the most used protocol at the top.


A. The solution meets the required results and both optional results.


B. The solution meets the required results and one optional result.


C. The solution meets the required results and no optional results.


D. The solution does not meet the required results.


- Explanation
For increasing speed performance if you upgrade from 10Mbps to 100Mbps you will also have to upgrade the cabling from Cat3 to Cat5. Hence the solution does not meet with the stated required results.

55. Which of the following devices can connect network segments and allow them full network bandwidth for communication?


A. Repeater


B. Hub


C. Switch


D. MSAU


- Explanation
A switch allows full bandwidth on all ports.

56. You are unable to FTP files on the internet, using a SLIP dial-up connection. Which of the following could pose an alternative?


A. Install a proxy with TCP/IP


B. Use a leased line


C. Use a ISDN connection


D. Change to PPP


- Explanation
SLIP is a protocol that may not be used on many servers in the WAN these days. The present accepted standard for Internet connection is PPP. Incorrect Answers A. A proxy would not be necessary in this scenario. B, C: Changing the connection media does not help this situation.


57. Which of the following protocols is required by an email Server?


A. SNMP


B. FTP


C. SMTP


D. POP



- Explanation
Mail servers need SMTP and mail clients need POP. FTP and SNMP are not related email services





58. Which of the following would make an ideal user password?


A. Uone


B. UserO


C. Password


D. User$0ne


- Explanation
User passwords are most secure when they are a combination of numeric, alpha numeric and special characters. Incorrect Answers A, B, C: None of these passwords have the proper required combination, if they do, they are not long enough
59. Which of the following protocols can enable communication between servers and workstations that are a part of a heterogeneous network that have Windows as well as Netware? (Choose two)


A. IP


B. IPX


C. NetBEUI


D. DLC


- Explanation
Both Microsoft and Netware support IP, whereas Microsoft has its own version of IPX that helps communication with Netware systems.Incorrect Answers C. NetBEUI is proprietary to Microsoft. D. DLC is used only with legacy devices.

60. Which of the following is the protocol used by UNIX for mail services?


A. POP3


B. SNMP


C. SMTP


D. FTP


- Explanation
Simple Mail Transport Protocol (SMTP) is the protocol that e-mail servers use to transmit messages to each other across the Internet. Incorrect Answers A. Post Office Protocol (POP3) is used by mail clients B. Simple Network Management Protocol (SNMP) is used for network management. D. FTP is used for file transfers.
\

ANSWER :- 1: A
2: D
3: B
4: B
5: A
6: A
7: B
8: E
9: C
10: E & F
11: A & D
12: B & C
13: E
14: A
15: A
16: B,C & D
17: A
18: A & C
19: C
20: B
21: A
22: A
23: B
24: A
25:
26: B
27: D
28: C
29: C
30: D
31:D
32:A,B & D
33:C
34:C & D
35: D
36:A,B & C
37:D
38:C
39:B
40:D
41:B
42:B
43:B
44:A
45:C
46:B
47:B & C
48:D
49:A & B
50:D
51:A & B
52: D
53: A & B
54:D
55:C
56:D
57:C
58:D
59:A & B
60:C
BY MICKYNETWORK