Sunteți pe pagina 1din 32

Part 1.

Multiple choices (6)


1. The center connection point of a star network is a _________
a. Repeater
b. Bridge
c. Router
d. Switch / Hub
2. A two - way simultaneous connection is an example of ______________
a. Simplex
b. Haft Duplex
c. Full Duplex
d. Multiplexing
3. Which IPv6 address is valid?
a. 2031:0:130F::9C0:876A:130B
b. 2001:0DB8:0000:130F:0000:0000:08GC:140B
c. 2001:0DB8:0:130H::87C:140B
d. 2031::130F::9C0:876A:130B
4. A typical star topology uses which type of media to connect between nodes and center connection
point (switch /hub) ?
a. FDDI
b. Coaxial Cable
c. Fiber optic
d. UTP – CAT 5 mã hóa
5. Which layer of the OSI model is responsible for data encryption ?
a. Presentation
b. Session
c. Network
d. Datalink
6. Which example below is an invalid IP address?
a. 192.168.0.2
b. 10.10.254.183
c. 10.278.254.183
d. 192.168.0.12
7. Which example below is default subnet mask of Class B ( IP Version 4)?
a. 255.0.255.255
b. 0.255.255.255
c. 255.255.0.0
d. 255.255.0.255
8. Which service listed below is used to resolve IP addresses and domain names ?
a. DNS
b. DHCP
c. ARP
d. TCP
9. Which device is the best choice for routing?
a. Router
b. Gateway
c. Hub
d. Repeater
10. Which service listed below is used for dynamic IP addresses allocation?
a. DNS
b. DHCP
c. ARP


 
d. TCP
11. Which subnet mask would be appropriate for a network address range to be subnetted for up to
eight LANs, with each LAN containing 5 to 26 hosts?
a. 0.0.0.240
b. 255.255.255.252
c. 255.255.255.0
d. 255.255.255.224
e. 255.255.255.240
12. Which topology would be used to produce the best fault tolerance level?
a. Bus
b. Star
c. Ring
d. Mesh
13. Identify the class of IP Address for the following IP address 14.101.101.101
a. Class A
b. Class B
c. Class C
d. Class D
14. What layer of the OSI model would a NIC (Network Interface Card) be assigned?
a. Network
b. Physical
c. Data Link
d. Presentation
15. How many bits are represented by an IP Version 6 address?
a. 128
b. 64
c. 32
d. 16
16. How many bits are contained in each field of an IPv6 address?
a. 24
b. 4
c. 8
d. 16
17. What is the first 24 bits in a MAC address called?
a. NIC
b. BIA
c. OUI
d. VAI
18. When a DHCP server is configured, which two IP addresses should never be assignable to
hosts? (Choose two)
a. network or subnetwork IP address
b. broadcast address on the network
c. IP address leased to the LAN
d. IP address used by the interfaces
e. manually assigned address to the clients
f. designated IP address to the DHCP server
19. Which of the following is used to identify the best path for sending data packets over a
network?
a. Routing.
b. Packet switching.
c. Multicasting.


 
d. Multiplexing.
20. Which of the following devices is use to connect two network’s segment ?
a. Hub
b. Bridge
c. Router
d. Repeater
21. Which is the lowest layer of the TCP/IP architecture?
a. Application layer
b. Transport layer
c. Internet layer
d. Network Access layer
22. In an Ethernet network, under what two scenarios can devices transmit? (Choose two)
a. when they receive a special token
b. when there is a carrier
c. when they detect no other devices are sending
d. when the medium is idle
e. when the server grants access
23. Which example below is an Public IP address?
a. 172.16.0.2
b. 10.10.254.183
c. 100.278.254.183
d. 192.168.0.12
24. A network interface port has collision detection and carrier sensing enabled on a shared twisted
pair network. From this statement, what is known about the network interface port?
a. This is a 10 Mb/s switch port.
b. This is a 100 Mb/s switch port.
c. This is an Ethernet port operating at half duplex.
d. This is an Ethernet port operating at full duplex.
e. This is a port on a network interface card in a PC.
25. The OSI network layer model consists of the following in-order layers:
a. Physical, Network, Data link, TCP, Session, Presentation, Application
b. Physical, Data link, Network, Transport, Presentation, Session, Application
c. Physical, Data link, Network, Transport, Session, Presentation, Application
d. Physical, Network, Transport, TCP/IP, Session, Presentation, Application
26. Which example is a network adapter loopback address ?
a. 255.0.0.1
b. 192.0.0.1
c. 127.0.0.1
d. 10.0.0.1
27. Which of the following is an example of strong password ?
a. Your name
b. 12345678
c. J*123^atf
d. Your birthday
28. How can you prevent instruders from accessing your wireless network ?
a. Setup an firewall
b. Scaning virus
c. Restrict access to trusted MAC address
d. All of the above
29. You are working in a data center environment and are assigned the address range
10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of
subnets with as many as 30 hosts each.Which IP address range meets these requirements?


 
a. 10.188.31.0/27
b. 10.188.31.0/26
c. 10.188.31.0/29
d. 10.188.31.0/28
e. 10.188.31.0/25
30. What method(s) can be used to protected sensitive data ?
a. Passwords
b. File permissions
c. Encyption
d. All of the above
Questions (4)
1. Given network 191.161.0.0/16. We need 4 usable subnets (2)
a. Determine the class of network and default subnet mask
b. Determine how many bits to borrow. Determine the subnet mask and the actual number of
hosts/subnet
c. Determine the ranges of host address for each subnet.

2. What is OSI reference model ? How many layers are there in this model and the main functions
of three first layers ? ( 2 )


 
Part 2.
Multiple choices (6)
1. Which example below is an invalid IP address?
e. 192.168.0.2
f. 10.10.254.183
g. 10.278.254.183
h. 192.168.0.12
2. Which example below is default subnet mask of Class B ( IP Version 4)?
e. 255.0.255.255
f. 0.255.255.255
g. 255.255.0.0
h. 255.255.0.255
3. Which service listed below is used to resolve IP addresses and domain names ?
e. DNS
f. DHCP
g. ARP
h. TCP
4. Which device is the best choice for routing?
e. Router
f. Gateway
g. Hub
h. Repeater
5. Which service listed below is used for dynamic IP addresses allocation?
a. DNS
b. DHCP
e. ARP
f. TCP
6. The center connection point of a star network is a _________
e. Repeater
f. Bridge
g. Router
h. Switch / Hub
7. A two - way simultaneous connection is an example of ______________
e. Simplex
f. Haft Duplex
g. Full Duplex
h. Multiplexing
8. Which IPv6 address is valid?
e. 2031:0:130F::9C0:876A:130B
f. 2001:0DB8:0000:130F:0000:0000:08GC:140B
g. 2001:0DB8:0:130H::87C:140B
h. 2031::130F::9C0:876A:130B
9. A typical star topology uses which type of media to connect between nodes and center
connection point (switch /hub) ?
e. FDDI
f. Coaxial Cable
g. Fiber optic
h. UTP – CAT 5
10. Which layer of the OSI model is responsible for data encryption ?
e. Presentation
f. Session
g. Network


 
h. Datalink
11. Which subnet mask would be appropriate for a network address range to be subnetted for up
to eight LANs, with each LAN containing 5 to 26 hosts?
a. 0.0.0.240
b. 255.255.255.252
c. 255.255.255.0
d. 255.255.255.224
e. 255.255.255.240
12. Which topology would be used to produce the best fault tolerance level?
e. Bus
f. Star
g. Ring
h. Mesh
13. Identify the class of IP Address for the following IP address 14.101.101.101
e. Class A
f. Class B
g. Class C
h. Class D
14. What layer of the OSI model would a NIC (Network Interface Card) be assigned?
e. Network
f. Physical
g. Data Link
h. Presentation
15. How many bits are represented by an IP Version 6 address?
e. 128
f. 64
g. 32
h. 16
16. How many bits are contained in each field of an IPv6 address?
a. 24
b. 4
c. 8
d. 16
17. What is the first 24 bits in a MAC address called?
a. NIC
b. BIA
c. OUI
d. VAI
18. When a DHCP server is configured, which two IP addresses should never be assignable to
hosts? (Choose two)
a. network or subnetwork IP address
b. broadcast address on the network
c. IP address leased to the LAN
d. IP address used by the interfaces
e. manually assigned address to the clients
f. designated IP address to the DHCP server
19. Which of the following is used to identify the best path for sending data packets over a
network?
a. Routing.
b. Packet switching.
c. Multicasting.

 
d. Multiplexing.
20. Which example is a network adapter loopback address ?
a. 255.0.0.1
b. 192.0.0.1
c. 127.0.0.1
d. 10.0.0.1
21. Which of the following is an example of strong password ?
a. Your name
b. 12345678
c. J*123^atf
d. Your birthday
22. How can you prevent instruders from accessing your wireless network ?
a. Setup an firewall
b. Scaning virus
c. Restrict access to trusted MAC address
d. All of the above
23. You are working in a data center environment and are assigned the address range
10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum
number of subnets with as many as 30 hosts each.Which IP address range meets these
requirements?
a. 10.188.31.0/27
b. 10.188.31.0/26
c. 10.188.31.0/29
d. 10.188.31.0/28
e. 10.188.31.0/25
24. What method(s) can be used to protected sensitive data ?
a. Passwords
b. File permissions
c. Encyption
d. All of the above
25. Which of the following devices is use to connect two network’s segment ?
a. Hub
b. Bridge
c. Router
d. Repeater
26. Which is the lowest layer of the TCP/IP architecture?
a. Application layer
b. Transport layer
c. Internet layer
d. Network Access layer
27. In an Ethernet network, under what two scenarios can devices transmit? (Choose two)
a. when they receive a special token
b. when there is a carrier
c. when they detect no other devices are sending
d. when the medium is idle
e. when the server grants access
28. A characteristic of a connectionless network is:
a. Each packet is sent along the most efficient route
b. Packets are usually sent in order
c. The network cannot guarantee any quality of service
d. The sender can send a packet and forget about it


 
29. A network interface port has collision detection and carrier sensing enabled on a shared
twisted pair network. From this statement, what is known about the network interface port?
a. This is a 10 Mb/s switch port.
b. This is a 100 Mb/s switch port.
c. This is an Ethernet port operating at half duplex.
d. This is an Ethernet port operating at full duplex.
e. This is a port on a network interface card in a PC.
30. The OSI network layer model consists of the following in-order layers:
a. Physical, Network, Data link, TCP, Session, Presentation, Application
b. Physical, Data link, Network, Transport, Presentation, Session, Application
c. Physical, Data link, Network, Transport, Session, Presentation, Application
d. Physical, Network, Transport, TCP/IP, Session, Presentation, Application
Questions (4)
1. Given an IP address of 12.255.255.255 answer the following questions: (2)
What is the binary equivalent of the second octet? _______________________________________
What is the class of the address? _____________________________________________________
What is the network address of this IP address? _________________________________________
Is this a valid IP host address (Y/N)? _________________________________________________
2. What is TCP/IP reference model ? How many layers are there in this model? ( 2 )


 
Part 3.
Multiple choices ( 6 )
31. Which device is the best choice for routing?
i. Router
j. Gateway
k. Hub
l. Repeater
32. Which service listed below is used for dynamic IP addresses allocation?
a. DNS
b. DHCP
g. ARP
h. TCP
33. The center connection point of a star network is a _________
i. Repeater
j. Bridge
k. Router
l. Switch / Hub
34. Which example below is an invalid IP address?
i. 192.168.0.2
j. 10.10.254.183
k. 10.278.254.183
l. 192.168.0.12
35. Which example below is default subnet mask of Class B ( IP Version 4)?
i. 255.0.255.255
j. 0.255.255.255
k. 255.255.0.0
l. 255.255.0.255
36. Which service listed below is used to resolve IP addresses and domain names ?
i. DNS
j. DHCP
k. ARP
l. TCP
37. A two - way simultaneous connection is an example of ______________
i. Simplex
j. Haft Duplex
k. Full Duplex
l. Multiplexing
38. Which topology would be used to produce the best fault tolerance level?
i. Bus
j. Star
k. Ring
l. Mesh
39. Identify the class of IP Address for the following IP address 14.101.101.101
i. Class A
j. Class B
k. Class C
l. Class D
40. What layer of the OSI model would a NIC (Network Interface Card) be assigned?
i. Network
j. Physical
k. Data Link
l. Presentation


 
41. Which IPv6 address is valid?
i. 2031:0:130F::9C0:876A:130B
j. 2001:0DB8:0000:130F:0000:0000:08GC:140B
k. 2001:0DB8:0:130H::87C:140B
l. 2031::130F::9C0:876A:130B
42. A typical star topology uses which type of media to connect between nodes and center
connection point (switch /hub) ?
i. FDDI
j. Coaxial Cable
k. Fiber optic
l. UTP – CAT 5
43. Which layer of the OSI model is responsible for data encryption ?
i. Presentation
j. Session
k. Network
l. Datalink
44. Which subnet mask would be appropriate for a network address range to be subnetted for up
to eight LANs, with each LAN containing 5 to 26 hosts?
a. 0.0.0.240
b. 255.255.255.252
c. 255.255.255.0
d. 255.255.255.224
e. 255.255.255.240
45. How many bits are represented by an IP Version 6 address?
i. 128
j. 64
k. 32
l. 16
46. How many bits are contained in each field of an IPv6 address?
a. 24
b. 4
c. 8
d. 16
47. What is the first 24 bits in a MAC address called?
a. NIC
b. BIA
c. OUI
d. VAI
48. Which of the following is an example of strong password ?
a. Your name
b. 12345678
c. J*123^atf
d. Your birthday
49. How can you prevent instruders from accessing your wireless network ?
a. Setup an firewall
b. Scaning virus
c. Restrict access to trusted MAC address
d. All of the above
50. You are working in a data center environment and are assigned the address range
10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum

10 
 
number of subnets with as many as 30 hosts each.Which IP address range meets these
requirements?
a. 10.188.31.0/27
b. 10.188.31.0/26
c. 10.188.31.0/29
d. 10.188.31.0/28
e. 10.188.31.0/25
51. What method(s) can be used to protected sensitive data ?
a. Passwords
b. File permissions
c. Encyption
d. All of the above
52. A characteristic of a connectionless network is:
a. Each packet is sent along the most efficient route
b. Packets are usually sent in order
c. The network cannot guarantee any quality of service
d. The sender can send a packet and forget about it
53. A network interface port has collision detection and carrier sensing enabled on a shared
twisted pair network. From this statement, what is known about the network interface port?
a. This is a 10 Mb/s switch port.
b. This is a 100 Mb/s switch port.
c. This is an Ethernet port operating at half duplex.
d. This is an Ethernet port operating at full duplex.
e. This is a port on a network interface card in a PC.
54. The OSI network layer model consists of the following in-order layers:
a. Physical, Network, Data link, TCP, Session, Presentation, Application
b. Physical, Data link, Network, Transport, Presentation, Session, Application
c. Physical, Data link, Network, Transport, Session, Presentation, Application
d. Physical, Network, Transport, TCP/IP, Session, Presentation, Application
55. Which of the following devices is use to connect two network’s segment ?
a. Hub
b. Bridge
c. Router
d. Repeater
56. Which is the lowest layer of the TCP/IP architecture?
a. Application layer
b. Transport layer
c. Internet layer
d. Network Access layer
57. When a DHCP server is configured, which two IP addresses should never be assignable to
hosts? (Choose two)
a. network or subnetwork IP address
b. broadcast address on the network
c. IP address leased to the LAN
d. IP address used by the interfaces
e. manually assigned address to the clients
f. designated IP address to the DHCP server
58. Which of the following is used to identify the best path for sending data packets over a
network?
a. Routing.
b. Packet switching.
11 
 
c. Multicasting.
d. Multiplexing.
59. Which example is a network adapter loopback address ?
a. 255.0.0.1
b. 192.0.0.1
c. 127.0.0.1
d. 10.0.0.1
60. In an Ethernet network, under what two scenarios can devices transmit? (Choose two)
a. when they receive a special token
b. when there is a carrier
c. when they detect no other devices are sending
d. when the medium is idle
e. when the server grants access
Part B. Questions (4)
1. Determine the class, network address, host address, and broadcast address for the following
IPv4 addresses:

Host IP Address Network Host Network


Address Class Address Address Broadcast
Address
216.14.55.137
123.1.1.15
150.127.221.244
194.125.35.199

2. What is TCP/IP reference model ? How many layers are there in this model? ( 2 )

12 
 
Part 4.
Multiple choices ( 6 )
61. Which example below is an invalid IP address?
m. 192.168.0.2
n. 10.10.254.183
o. 10.278.254.183
p. 192.168.0.12
62. Which example below is default subnet mask of Class B ( IP Version 4)?
m. 255.0.255.255
n. 0.255.255.255
o. 255.255.0.0
p. 255.255.0.255
63. Which service listed below is used to resolve IP addresses and domain names ?
m. DNS
n. DHCP
o. ARP
p. TCP
64. Which device is the best choice for routing?
m. Router
n. Gateway
o. Hub
p. Repeater
65. Which service listed below is used for dynamic IP addresses allocation?
a. DNS
b. DHCP
i. ARP
j. TCP
66. The center connection point of a star network is a _________
m. Repeater
n. Bridge
o. Router
p. Switch / Hub
67. A two - way simultaneous connection is an example of ______________
m. Simplex
n. Haft Duplex
o. Full Duplex
p. Multiplexing
68. A typical star topology uses which type of media to connect between nodes and center
connection point (switch /hub) ?
m. FDDI
n. Coaxial Cable
o. Fiber optic
p. UTP – CAT 5
69. Which layer of the OSI model is responsible for data encryption ?
m. Presentation
n. Session
o. Network
p. Datalink
70. Which topology would be used to produce the best fault tolerance level?
m. Bus
n. Star
o. Ring

13 
 
p. Mesh
71. Identify the class of IP Address for the following IP address 14.101.101.101
m. Class A
n. Class B
o. Class C
p. Class D
72. What layer of the OSI model would a NIC (Network Interface Card) be assigned?
m. Network
n. Physical
o. Data Link
p. Presentation
73. Which IPv6 address is valid?
m. 2031:0:130F::9C0:876A:130B
n. 2001:0DB8:0000:130F:0000:0000:08GC:140B
o. 2001:0DB8:0:130H::87C:140B
p. 2031::130F::9C0:876A:130B
74. Which subnet mask would be appropriate for a network address range to be subnetted for up
to eight LANs, with each LAN containing 5 to 26 hosts?
a. 0.0.0.240
b. 255.255.255.252
c. 255.255.255.0
d. 255.255.255.224
e. 255.255.255.240
75. How many bits are represented by an IP Version 6 address?
m. 128
n. 64
o. 32
p. 16
76. How many bits are contained in each field of an IPv6 address?
a. 24
b. 4
c. 8
d. 16
77. What is the first 24 bits in a MAC address called?
a. NIC
b. BIA
c. OUI
d. VAI
78. What method(s) can be used to protected sensitive data ?
a. Passwords
b. File permissions
c. Encyption
d. All of the above
79. A characteristic of a connectionless network is:
a. Each packet is sent along the most efficient route
b. Packets are usually sent in order
c. The network cannot guarantee any quality of service
d. The sender can send a packet and forget about it
80. A network interface port has collision detection and carrier sensing enabled on a shared
twisted pair network. From this statement, what is known about the network interface port?

14 
 
a. This is a 10 Mb/s switch port.
b. This is a 100 Mb/s switch port.
c. This is an Ethernet port operating at half duplex.
d. This is an Ethernet port operating at full duplex.
e. This is a port on a network interface card in a PC.
81. The OSI network layer model consists of the following in-order layers:
a. Physical, Network, Data link, TCP, Session, Presentation, Application
b. Physical, Data link, Network, Transport, Presentation, Session, Application
c. Physical, Data link, Network, Transport, Session, Presentation, Application
d. Physical, Network, Transport, TCP/IP, Session, Presentation, Application
82. Which of the following devices is use to connect two network’s segment ?
a. Hub
b. Bridge
c. Router
d. Repeater
83. Which of the following is an example of strong password ?
a. Your name
b. 12345678
c. J*123^atf
d. Your birthday
84. How can you prevent instruders from accessing your wireless network ?
a. Setup an firewall
b. Scaning virus
c. Restrict access to trusted MAC address
d. All of the above
85. You are working in a data center environment and are assigned the address range
10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum
number of subnets with as many as 30 hosts each.Which IP address range meets these
requirements?
a. 10.188.31.0/27
b. 10.188.31.0/26
c. 10.188.31.0/29
d. 10.188.31.0/28
e. 10.188.31.0/25
86. Which is the lowest layer of the TCP/IP architecture?
a. Application layer
b. Transport layer
c. Internet layer
d. Network Access layer
87. Which example is a network adapter loopback address ?
a. 255.0.0.1
b. 192.0.0.1
c. 127.0.0.1
d. 10.0.0.1
88. In an Ethernet network, under what two scenarios can devices transmit? (Choose two)
a. when they receive a special token
b. when there is a carrier
c. when they detect no other devices are sending
d. when the medium is idle
e. when the server grants access

15 
 
89. When a DHCP server is configured, which two IP addresses should never be assignable to
hosts? (Choose two)
a. network or subnetwork IP address
b. broadcast address on the network
c. IP address leased to the LAN
d. IP address used by the interfaces
e. manually assigned address to the clients
f. designated IP address to the DHCP server
90. Which of the following is used to identify the best path for sending data packets over a
network?
a. Routing.
b. Packet switching.
c. Multicasting.
d. Multiplexing.
Questions (4)
2. (2) Given an IP address of 172.254.255.255 answer the following questions:
What is the binary equivalent of the second octet? _______________________________________
What is the class of the address? _____________________________________________________
What is the network address of this IP address? _________________________________________
Is this a valid IP host address (Y/N)? _________________________________________________
Why or why not? _________________________________________________________________
2. What is OSI reference model ? How many layers are there in this model? ( 2 )

16 
 
Part 5.
Multiple choices (6)
1. Which IPv6 address is valid?
q. 2031:0:130F::9C0:876A:130B
r. 2001:0DB8:0000:130F:0000:0000:08GC:140B
s. 2001:0DB8:0:130H::87C:140B
t. 2031::130F::9C0:876A:130B

2. A typical star topology uses which type of media to connect between nodes and center connection
point (switch /hub) ?
q. FDDI
r. Coaxial Cable
s. Fiber optic
t. UTP – CAT 5
3. The center connection point of a star network is a _________
q. Repeater
r. Bridge
s. Router
t. Switch / Hub
4. A two - way simultaneous connection is an example of ______________
q. Simplex
r. Haft Duplex
s. Full Duplex
t. Multiplexing
5. Which layer of the OSI model is responsible for data encryption ?
q. Presentation
r. Session
s. Network
t. Datalink
6. Which example below is an invalid IP address?
q. 192.168.0.2
r. 10.10.254.183
s. 10.278.254.183
t. 192.168.0.12
7. Which example below is default subnet mask of Class B ( IP Version 4)?
q. 255.0.255.255
r. 0.255.255.255
s. 255.255.0.0
t. 255.255.0.255
8. Which service listed below is used for dynamic IP addresses allocation?
a. DNS
b. DHCP
k. ARP
l. TCP
9. Which subnet mask would be appropriate for a network address range to be subnetted for up to
eight LANs, with each LAN containing 5 to 26 hosts?
a. 0.0.0.240
b. 255.255.255.252
c. 255.255.255.0
d. 255.255.255.224
e. 255.255.255.240

17 
 
10. Which service listed below is used to resolve IP addresses and domain names ?
q. DNS
r. DHCP
s. ARP
t. TCP
11. Which device is the best choice for routing?
q. Router
r. Gateway
s. Hub
t. Repeater
12. Which topology would be used to produce the best fault tolerance level?
q. Bus
r. Star
s. Ring
t. Mesh
13. Identify the class of IP Address for the following IP address 14.101.101.101
q. Class A
r. Class B
s. Class C
t. Class D
14. What layer of the OSI model would a NIC (Network Interface Card) be assigned?
q. Network
r. Physical
s. Data Link
t. Presentation
15. How many bits are represented by an IP Version 6 address?
q. 128
r. 64
s. 32
t. 16
16. Which of the following is used to identify the best path for sending data packets over a
network?
a. Routing.
b. Packet switching.
c. Multicasting.
d. Multiplexing.
17. Which of the following devices is use to connect two network’s segment ?
a. Hub
b. Bridge
c. Router
d. Repeater
18. Which is the lowest layer of the TCP/IP architecture?
a. Application layer
b. Transport layer
c. Internet layer
d. Network Access layer
19. In an Ethernet network, under what two scenarios can devices transmit? (Choose two)
a. when they receive a special token
b. when there is a carrier
c. when they detect no other devices are sending
d. when the medium is idle
e. when the server grants access

18 
 
20. Which example below is an Public IP address?
e. 172.16.0.2
f. 10.10.254.183
g. 100.278.254.183
h. 192.168.0.12
21. A network interface port has collision detection and carrier sensing enabled on a shared twisted
pair network. From this statement, what is known about the network interface port?
a. This is a 10 Mb/s switch port.
b. This is a 100 Mb/s switch port.
c. This is an Ethernet port operating at half duplex.
d. This is an Ethernet port operating at full duplex.
e. This is a port on a network interface card in a PC.
22. The OSI network layer model consists of the following in-order layers:
a. Physical, Network, Data link, TCP, Session, Presentation, Application
b. Physical, Data link, Network, Transport, Presentation, Session, Application
c. Physical, Data link, Network, Transport, Session, Presentation, Application
d. Physical, Network, Transport, TCP/IP, Session, Presentation, Application
23. Which example is a network adapter loopback address ?
a. 255.0.0.1
b. 192.0.0.1
c. 127.0.0.1
d. 10.0.0.1
24. Which of the following is an example of strong password ?
a. Your name
b. 12345678
c. J*123^atf
d. Your birthday
25. How can you prevent instruders from accessing your wireless network ?
a. Setup an firewall
b. Scaning virus
c. Restrict access to trusted MAC address
d. All of the above
26. You are working in a data center environment and are assigned the address range
10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of
subnets with as many as 30 hosts each.Which IP address range meets these requirements?
a. 10.188.31.0/27
b. 10.188.31.0/26
c. 10.188.31.0/29
d. 10.188.31.0/28
e. 10.188.31.0/25
27. What method(s) can be used to protected sensitive data ?
a. Passwords
b. File permissions
c. Encyption
d. All of the above
28. How many bits are contained in each field of an IPv6 address?
a. 24
b. 4
c. 8
d. 16
29. What is the first 24 bits in a MAC address called?
a. NIC

19 
 
b. BIA
c. OUI
d. VAI
30. When a DHCP server is configured, which two IP addresses should never be assignable to
hosts? (Choose two)
a. network or subnetwork IP address
b. broadcast address on the network
c. IP address leased to the LAN
d. IP address used by the interfaces
e. manually assigned address to the clients
f. designated IP address to the DHCP server
Questions (4)

1. Given network 172.16.0.0/16. We need 2 usable subnets (2)


a. Determine the class of network and default subnet mask
b. Determine how many bits to borrow. Determine the subnet mask and the actual number of
hosts/subnet
c. Determine the ranges of host address for each subnet.

2. What is OSI reference model ? How many layers are there in this model and the main functions
of three first layers ? ( 2 )

20 
 
Part 6.
Multiple choices (6)
91. A characteristic of a connectionless network is:
a. Each packet is sent along the most efficient route
b. Packets are usually sent in order
c. The network cannot guarantee any quality of service
d. The sender can send a packet and forget about it
92. A network interface port has collision detection and carrier sensing enabled on a shared
twisted pair network. From this statement, what is known about the network interface port?
a. This is a 10 Mb/s switch port.
b. This is a 100 Mb/s switch port.
c. This is an Ethernet port operating at half duplex.
d. This is an Ethernet port operating at full duplex.
e. This is a port on a network interface card in a PC.
93. The OSI network layer model consists of the following in-order layers:
a. Physical, Network, Data link, TCP, Session, Presentation, Application
b. Physical, Data link, Network, Transport, Presentation, Session, Application
c. Physical, Data link, Network, Transport, Session, Presentation, Application
d. Physical, Network, Transport, TCP/IP, Session, Presentation, Application
94. Which example below is an invalid IP address?
u. 192.168.0.2
v. 10.10.254.183
w. 10.278.254.183
x. 192.168.0.12
95. Which example below is default subnet mask of Class B ( IP Version 4)?
u. 255.0.255.255
v. 0.255.255.255
w. 255.255.0.0
x. 255.255.0.255
96. Which service listed below is used to resolve IP addresses and domain names ?
u. DNS
v. DHCP
w. ARP
x. TCP
97. Which device is the best choice for routing?
u. Router
v. Gateway
w. Hub
x. Repeater
98. Which service listed below is used for dynamic IP addresses allocation?
a. DNS
b. DHCP
m. ARP
n. TCP
99. The center connection point of a star network is a _________
u. Repeater
v. Bridge
w. Router
x. Switch / Hub
100. A two - way simultaneous connection is an example of ______________
u. Simplex
v. Haft Duplex

21 
 
w. Full Duplex
x. Multiplexing
101. Which IPv6 address is valid?
u. 2031:0:130F::9C0:876A:130B
v. 2001:0DB8:0000:130F:0000:0000:08GC:140B
w. 2001:0DB8:0:130H::87C:140B
x. 2031::130F::9C0:876A:130B
102. A typical star topology uses which type of media to connect between nodes and
center connection point (switch /hub) ?
u. FDDI
v. Coaxial Cable
w. Fiber optic
x. UTP – CAT 5
103. Which layer of the OSI model is responsible for data encryption ?
u. Presentation
v. Session
w. Network
x. Datalink
104. Which subnet mask would be appropriate for a network address range to be
subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?
a. 0.0.0.240
b. 255.255.255.252
c. 255.255.255.0
d. 255.255.255.224
e. 255.255.255.240
105. Which topology would be used to produce the best fault tolerance level?
u. Bus
v. Star
w. Ring
x. Mesh
106. Identify the class of IP Address for the following IP address 14.101.101.101
u. Class A
v. Class B
w. Class C
x. Class D
107. What layer of the OSI model would a NIC (Network Interface Card) be assigned?
u. Network
v. Physical
w. Data Link
x. Presentation
108. How can you prevent instruders from accessing your wireless network ?
a. Setup an firewall
b. Scaning virus
c. Restrict access to trusted MAC address
d. All of the above
109. You are working in a data center environment and are assigned the address range
10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum
number of subnets with as many as 30 hosts each.Which IP address range meets these
requirements?
a. 10.188.31.0/27
b. 10.188.31.0/26
c. 10.188.31.0/29

22 
 
d. 10.188.31.0/28
e. 10.188.31.0/25
110. What method(s) can be used to protected sensitive data ?
a. Passwords
b. File permissions
c. Encyption
d. All of the above
111. How many bits are represented by an IP Version 6 address?
u. 128
v. 64
w. 32
x. 16
112. How many bits are contained in each field of an IPv6 address?
a. 24
b. 4
c. 8
d. 16
113. What is the first 24 bits in a MAC address called?
a. NIC
b. BIA
c. OUI
d. VAI
114. When a DHCP server is configured, which two IP addresses should never be
assignable to hosts? (Choose two)
a. network or subnetwork IP address
b. broadcast address on the network
c. IP address leased to the LAN
d. IP address used by the interfaces
e. manually assigned address to the clients
f. designated IP address to the DHCP server
115. Which of the following is used to identify the best path for sending data packets over
a network?
a. Routing.
b. Packet switching.
c. Multicasting.
d. Multiplexing.
116. Which example is a network adapter loopback address ?
a. 255.0.0.1
b. 192.0.0.1
c. 127.0.0.1
d. 10.0.0.1
117. Which of the following is an example of strong password ?
a. Your name
b. 12345678
c. J*123^atf
d. Your birthday
118. Which of the following devices is use to connect two network’s segment ?
a. Hub
b. Bridge
c. Router

23 
 
d. Repeater
119. Which is the lowest layer of the TCP/IP architecture?
a. Application layer
b. Transport layer
c. Internet layer
d. Network Access layer
120. In an Ethernet network, under what two scenarios can devices transmit? (Choose
two)
a. when they receive a special token
b. when there is a carrier
c. when they detect no other devices are sending
d. when the medium is idle
e. when the server grants access
Questions (4)
3. Given an IP address of 192.168.1.0 answer the following questions: (2)
What is the binary equivalent of the second octet? _______________________________________
What is the class of the address? _____________________________________________________
What is the network address of this IP address? _________________________________________
Is this a valid IP host address (Y/N)? _________________________________________________
2. What is TCP/IP reference model ? How many layers are there in this model? ( 2 )

24 
 
Part 7.
Multiple choices (6)
121. A network interface port has collision detection and carrier sensing enabled on a
shared twisted pair network. From this statement, what is known about the network interface
port?
a. This is a 10 Mb/s switch port.
b. This is a 100 Mb/s switch port.
c. This is an Ethernet port operating at half duplex.
d. This is an Ethernet port operating at full duplex.
e. This is a port on a network interface card in a PC.
122. The OSI network layer model consists of the following in-order layers:
a. Physical, Network, Data link, TCP, Session, Presentation, Application
b. Physical, Data link, Network, Transport, Presentation, Session, Application
c. Physical, Data link, Network, Transport, Session, Presentation, Application
d. Physical, Network, Transport, TCP/IP, Session, Presentation, Application
123. Which of the following devices is use to connect two network’s segment ?
a. Hub
b. Bridge
c. Router
d. Repeater
124. Which is the lowest layer of the TCP/IP architecture?
a. Application layer
b. Transport layer
c. Internet layer
d. Network Access layer
125. When a DHCP server is configured, which two IP addresses should never be
assignable to hosts? (Choose two)
a. network or subnetwork IP address
b. broadcast address on the network
c. IP address leased to the LAN
d. IP address used by the interfaces
e. manually assigned address to the clients
f. designated IP address to the DHCP server
126. Which device is the best choice for routing?
y. Router
z. Gateway
aa. Hub
bb. Repeater
127. Which service listed below is used for dynamic IP addresses allocation?
a. DNS
b. DHCP
o. ARP
p. TCP
128. The center connection point of a star network is a _________
y. Repeater
z. Bridge
aa. Router
bb. Switch / Hub
129. Which example below is an invalid IP address?
y. 192.168.0.2
z. 10.10.254.183

25 
 
aa. 10.278.254.183
bb. 192.168.0.12
130. Which example below is default subnet mask of Class B ( IP Version 4)?
y. 255.0.255.255
z. 0.255.255.255
aa. 255.255.0.0
bb. 255.255.0.255
131. Which service listed below is used to resolve IP addresses and domain names ?
y. DNS
z. DHCP
aa. ARP
bb. TCP
132. A two - way simultaneous connection is an example of ______________
y. Simplex
z. Haft Duplex
aa. Full Duplex
bb. Multiplexing
133. How many bits are represented by an IP Version 6 address?
y. 128
z. 64
aa. 32
bb. 16
134. How many bits are contained in each field of an IPv6 address?
a. 24
b. 4
c. 8
d. 16
135. What is the first 24 bits in a MAC address called?
a. NIC
b. BIA
c. OUI
d. VAI
136. Which of the following is an example of strong password ?
a. Your name
b. 12345678
c. J*123^atf
d. Your birthday
137. How can you prevent instruders from accessing your wireless network ?
a. Setup an firewall
b. Scaning virus
c. Restrict access to trusted MAC address
d. All of the above
138. Which topology would be used to produce the best fault tolerance level?
y. Bus
z. Star
aa. Ring
bb. Mesh
139. Identify the class of IP Address for the following IP address 14.101.101.101
y. Class A
z. Class B
aa. Class C

26 
 
bb. Class D
140. What layer of the OSI model would a NIC (Network Interface Card) be assigned?
y. Network
z. Physical
aa. Data Link
bb. Presentation
141. Which IPv6 address is valid?
y. 2031:0:130F::9C0:876A:130B
z. 2001:0DB8:0000:130F:0000:0000:08GC:140B
aa. 2001:0DB8:0:130H::87C:140B
bb. 2031::130F::9C0:876A:130B
142. A typical star topology uses which type of media to connect between nodes and
center connection point (switch /hub) ?
y. FDDI
z. Coaxial Cable
aa. Fiber optic
bb. UTP – CAT 5
143. Which layer of the OSI model is responsible for data encryption ?
y. Presentation
z. Session
aa. Network
bb. Datalink
144. Which subnet mask would be appropriate for a network address range to be
subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?
a. 0.0.0.240
b. 255.255.255.252
c. 255.255.255.0
d. 255.255.255.224
e. 255.255.255.240
145. You are working in a data center environment and are assigned the address range
10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum
number of subnets with as many as 30 hosts each.Which IP address range meets these
requirements?
a. 10.188.31.0/27
b. 10.188.31.0/26
c. 10.188.31.0/29
d. 10.188.31.0/28
e. 10.188.31.0/25
146. What method(s) can be used to protected sensitive data ?
a. Passwords
b. File permissions
c. Encyption
d. All of the above
147. A characteristic of a connectionless network is:
a. Each packet is sent along the most efficient route
b. Packets are usually sent in order
c. The network cannot guarantee any quality of service
d. The sender can send a packet and forget about it
148. Which of the following is used to identify the best path for sending data packets over
a network?
a. Routing.
b. Packet switching.

27 
 
c. Multicasting.
d. Multiplexing.
149. Which example is a network adapter loopback address ?
a. 255.0.0.1
b. 192.0.0.1
c. 127.0.0.1
d. 10.0.0.1
150. In an Ethernet network, under what two scenarios can devices transmit? (Choose
two)
a. when they receive a special token
b. when there is a carrier
c. when they detect no other devices are sending
d. when the medium is idle
e. when the server grants access
Questions (4)
4. Determine the class, network address, host address, and broadcast address for the following
IPv4 addresses:

Host IP Address Network Host Network


Address Class Address Address Broadcast
Address
216.14.55.155
123.123.23.13
150.127.33.255
194.125.35.254
2. What is TCP/IP reference model ? How many layers are there in this model? ( 2 )

28 
 
Part 8.
Multiple choices (6)
151. A typical star topology uses which type of media to connect between nodes and
center connection point (switch /hub) ?
cc. FDDI
dd. Coaxial Cable
ee. Fiber optic
ff. UTP – CAT 5
152. Which layer of the OSI model is responsible for data encryption ?
cc. Presentation
dd. Session
ee. Network
ff. Datalink
153. Which topology would be used to produce the best fault tolerance level?
cc. Bus
dd. Star
ee. Ring
ff. Mesh
154. Identify the class of IP Address for the following IP address 14.101.101.101
cc. Class A
dd. Class B
ee. Class C
ff. Class D
155. Which example below is an invalid IP address?
cc. 192.168.0.2
dd. 10.10.254.183
ee. 10.278.254.183
ff. 192.168.0.12
156. Which example below is default subnet mask of Class B ( IP Version 4)?
cc. 255.0.255.255
dd. 0.255.255.255
ee. 255.255.0.0
ff. 255.255.0.255
157. Which service listed below is used to resolve IP addresses and domain names ?
cc. DNS
dd. DHCP
ee. ARP
ff. TCP
158. Which device is the best choice for routing?
cc. Router
dd. Gateway
ee. Hub
ff. Repeater
159. Which service listed below is used for dynamic IP addresses allocation?
a. DNS
b. DHCP
q. ARP
r. TCP
160. The center connection point of a star network is a _________
cc. Repeater
dd. Bridge
ee. Router

29 
 
ff. Switch / Hub
161. A two - way simultaneous connection is an example of ______________
cc. Simplex
dd. Haft Duplex
ee. Full Duplex
ff. Multiplexing
162. What layer of the OSI model would a NIC (Network Interface Card) be assigned?
cc. Network
dd. Physical
ee. Data Link
ff. Presentation
163. Which IPv6 address is valid?
cc. 2031:0:130F::9C0:876A:130B
dd. 2001:0DB8:0000:130F:0000:0000:08GC:140B
ee. 2001:0DB8:0:130H::87C:140B
ff. 2031::130F::9C0:876A:130B
164. Which subnet mask would be appropriate for a network address range to be
subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?
a. 0.0.0.240
b. 255.255.255.252
c. 255.255.255.0
d. 255.255.255.224
e. 255.255.255.240
165. How many bits are represented by an IP Version 6 address?
cc. 128
dd. 64
ee. 32
ff. 16
166. How many bits are contained in each field of an IPv6 address?
a. 24
b. 4
c. 8
d. 16
167. What is the first 24 bits in a MAC address called?
a. NIC
b. BIA
c. OUI
d. VAI
168. What method(s) can be used to protected sensitive data ?
a. Passwords
b. File permissions
c. Encyption
d. All of the above
169. A characteristic of a connectionless network is:
a. Each packet is sent along the most efficient route
b. Packets are usually sent in order
c. The network cannot guarantee any quality of service
d. The sender can send a packet and forget about it
170. A network interface port has collision detection and carrier sensing enabled on a
shared twisted pair network. From this statement, what is known about the network interface
port?

30 
 
a. This is a 10 Mb/s switch port.
b. This is a 100 Mb/s switch port.
c. This is an Ethernet port operating at half duplex.
d. This is an Ethernet port operating at full duplex.
e. This is a port on a network interface card in a PC.
171. When a DHCP server is configured, which two IP addresses should never be
assignable to hosts? (Choose two)
a. network or subnetwork IP address
b. broadcast address on the network
c. IP address leased to the LAN
d. IP address used by the interfaces
e. manually assigned address to the clients
f. designated IP address to the DHCP server
172. The OSI network layer model consists of the following in-order layers:
a. Physical, Network, Data link, TCP, Session, Presentation, Application
b. Physical, Data link, Network, Transport, Presentation, Session, Application
c. Physical, Data link, Network, Transport, Session, Presentation, Application
d. Physical, Network, Transport, TCP/IP, Session, Presentation, Application
173. Which of the following devices is use to connect two network’s segment ?
a. Hub
b. Bridge
c. Router
d. Repeater
174. Which of the following is an example of strong password ?
a. Your name
b. 12345678
c. J*123^atf
d. Your birthday
175. How can you prevent instruders from accessing your wireless network ?
a. Setup an firewall
b. Scaning virus
c. Restrict access to trusted MAC address
d. All of the above
176. You are working in a data center environment and are assigned the address range
10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum
number of subnets with as many as 30 hosts each.Which IP address range meets these
requirements?
a. 10.188.31.0/27
b. 10.188.31.0/26
c. 10.188.31.0/29
d. 10.188.31.0/28
e. 10.188.31.0/25
177. Which is the lowest layer of the TCP/IP architecture?
a. Application layer
b. Transport layer
c. Internet layer
d. Network Access layer
178. Which example is a network adapter loopback address ?
a. 255.0.0.1
b. 192.0.0.1
c. 127.0.0.1

31 
 
d. 10.0.0.1
179. In an Ethernet network, under what two scenarios can devices transmit? (Choose
two)
a. when they receive a special token
b. when there is a carrier
c. when they detect no other devices are sending
d. when the medium is idle
e. when the server grants access
180. Which of the following is used to identify the best path for sending data packets over
a network?
a. Routing.
b. Packet switching.
c. Multicasting.
d. Multiplexing.
Questions (4)
5. (2) Given an IP address of 224.224.1.1 answer the following questions:
What is the binary equivalent of the second octet? _______________________________________
What is the class of the address? _____________________________________________________
What is the network address of this IP address? _________________________________________
Is this a valid IP host address (Y/N)? _________________________________________________
Why or why not? _________________________________________________________________
2. What is OSI reference model ? How many layers are there in this model? ( 2 )

32 
 

S-ar putea să vă placă și