Documente Academic
Documente Profesional
Documente Cultură
1. In Local area network (LAN) topologies, the primary media access methods are: (Choose two.)
a. Contention
b. Kerberos
c. Negotiation
d. Token Passing
7. If an 802.11g Internet connection has connectivity problems, what may be the cause :
a. Electro Magnetic Interface (EMI)
b. A cellular phone
c. A cordless phone
d. Incandescent lights
Page 1 of 13
Networking Fundamentals
9. Two companies want to share data by using the Internet. Which type of network provides the
solution?
a. Ethernet
b. Extranet
c. Intranet
d. Perimeter
11. Which of these factors has the biggest impact on data transmission speed in a wireless network?
a. The transmission standard of the equipment used
b. The transmission wattage rating used on the NIC
c. The use of strong encryption for transmissions
d. The access method used for the network
12. A network that separates an organization’s private network from a public network is a / an :
a. Extranet
b. Firewall
c. Internet
d. Perimeter
16. A cable that meets the 1000BaseT standard has a maximum length of :
a. 100 m
b. 250 m
c. 500 m
d. 1000 m
Page 2 of 13
Networking Fundamentals
17. Which of the following represents a Media Access Control (MAC) address?
a. 05:35:AB: 6E:A1:25
b. 127.0.0.1
c. 255.255.255.0
d. GV:ZC:KK:DK:FZ:CA
19. A Network device that Associates a Media Access Control (MAC) address with a port is a :
a. DSL modem
b. Hub
c. Router
d. Switch
24. Which setting is used to determine the Domain Name System (DNS) settings on a client
computer?
a. NETSTAT
b. NSLOOKUP
c. PATHPING
d. TELNET
Page 3 of 13
Networking Fundamentals
25. A computer that has an IP address 169.254.0.1 cannot access the network. Which of the
following services should you confirm is available :
a. DHCP
b. DNS
c. TFTP
d. WINS
26. The command-line tool used to list a host’s active incoming connections is :
a. PING
b. NETSTAT
c. NSLOOKUP
d. IPCONFIG
Page 4 of 13
Networking Fundamentals
33. Which network does the IP address 220. 100.100. 100 belong to?
a. 220.100.100.0/24
b. 220.100.100.1/24
c. 255.255.255.0/24
d. 255.255.255.1/24
34. You ping a server by using fully qualified domain name (FQDN) and do not receive a response.
You ping the same server by using its IP address and receive a response. Why do you receive a
response on the second attempt but not on the first attempt?
a. NSLOOKUP is stopped
b. The DNS is not resolving
c. The DHCP server is offline
d. PING is improperly configured
35. What is the default subnet mask for a Class C Internet network?
a. 255.255.255.252
b. 255.255.255.240
c. 255.255.255.192
d. 255. 255. 255. 0
36. Which wireless authentication method provides the highest level of security?
a. IEEE 802.11n
b. IEEE 802.11a
c. Wired Equivalency Privacy (WEP)
d. Wi-Fi Protected Access (WPA)
37. What happens when an 802. 11b node starts broadcasting within the range of an 802. 11g
access point?
a. A connection will be established
b. Both the node and the access point will be unable to transmit
c. The node will transmit, but the access point will be unable to receive
d. The access point will transmit, but the node will be unable to receive
38. Which two are published IEEE 802.11 wireless transmission standards? (Choose two )
a. 802.11f
b. 802.11g
c. 802.11k
d. 802.11m
e. 802.11n
39. Which technology can you use to extend an internal network across shared or public networks?
a. Microsoft ASP.NET
b. Microsoft.NET Framework
c. VLAN
d. VPN
Page 5 of 13
Networking Fundamentals
41. A VPN is / an :
a. Personal network for your use only
b. Communication tunnel between VLANS
c. Encrypted connection across the Internet
d. Virtual network within your local area network (LAN)
42. A Node within a local area network (LAN) must have a network interface device and a :
a. Network account
b. Host address
c. Resource to share
d. Table of all network nodes
46. Which of the following determines the media access method that is used in a network?
a. Maximum speed of the media
b. Topology and Protocol
c. Number of domain servers on the segment
d. Number of hosts connected to the network
49. The host name of the fully qualified domain name (FQDN) main.exchange.corp.nwtraders.com is:
Page 6 of 13
Networking Fundamentals
a. com
b. corp
c. exchange
d. main
e. nwtraders
Source: http://technet.microsoft.com/en-us/library/dd197427%28v=ws.10%29.aspx
50. A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the
following services should you confirm is available?
a. DHCP
b. DNS
c. TFTP
d. WINS
54. At what layer in the OSI model are hardware addresses referenced?
a. Application
b. Data link
c. Network
d. Physical
56. The protocol that maps IP addresses to a Media Access Control (MAC) address is :
a. Address Resolution Protocol (ARP)
b. Dynamic Host Configuration Protocol (DHCP)
c. Internet Message Access Protocol (IMAP)
d. Routing Information Protocol (RIP)
e. User Datagram Protocol (UDP)
Page 7 of 13
Networking Fundamentals
58. Which command is used to verify that a server is connected to the network?
a. CHECK
b. IPCONFIG
c. PING
d. ROUTE
59. What is the default subnet mask for a Class C Internet network?
a. 255.255.255.252
b. 255.255.255.240
c. 255.255.255.192
d. 255.255.255.0
60. Which of these represents the Internet Protocol version 6 (IPv6) loopback address?
a. 127.0.0.1
b. 192.168.0.1
c. : : 1
d. FEC0:ABC0::AA01
61. Which setting is used to determine the Domain Name System (DNS) settings on a client
computer?
a. NETSTAT
b. NSLOOKUP
c. PATHPING
d. TELNET
62. A user reports that she cannot connect to network resources from a computer on the company
network. The user was able to connect to the network resource yesterday. You verify that the
user’s computer is properly physically connected to the network. You discover that the
computer’s IP address is 169.254.48.97. You need to restore access to network resources. What
should you do next?
a. Flush the cache on the DNS server
b. Verify that the DHCP service is available
c. Reset the user’s password on the server
d. Check your router’s current routing tables
63. You ping a server by using fully qualified domain name (FQDN) and do not receive a response.
You then ping the same server by using its IP address and receive a response. Why do you
receive a response on the second attempt but not on the first attempt?
a. NSLOOKUP is stopped
b. The DNS is not resolving
c. The DHCP server is offline
d. PING is improperly configured
Page 8 of 13
Networking Fundamentals
65. If a router cannot determine the next hop for a packet, the router will :
a. Broadcast the packet
b. Store the packet in the memory buffer
c. Forward the packet to the default route
d. Send the packet
66. To directly connect the Ethernet network interface cards (NICs) of two computers, you should
use a :
a. Coaxial cables
b. Crossover cable
c. Rollover cable
d. Straight cable
71. The query protocol use to locate resource s on the network is:
a. Tracert
b. Telnet
c. Lightweight Directory Access Protocol (LDAP)
d. User Data Gram Protocol (UDP)
Page 9 of 13
Networking Fundamentals
72. How many bits are there in an Internet Protocol Version 6 (IPv6) address?
a. 32
b. 64
c. 128
d. 256
74. Which the following service s makes internal IP Address from outside the network?
a. WINS
b. DNS
c. DHCP
d. NAT
APPLICATION 7
PRESENTATION 6
SESSION 5
TRANSPORT 4
NETWORK 3
DATA LINK 2
PHYSICAL 1
76. Protocol that maps IP Address to a Media Access Control (MAC) address is:
a. Dynamic Host Configuration Protocol (DHCP)
b. Routing Information Protocol (RIP)
c. Internet Message Access Protocol (IMAP)
d. Address Resolution Protocol (ARP)
e. User Datagram Protocol (UDP)
78. If a router installed so that separates a DHCP Server from its clients, the clients will
a. Immediately lose connectivity to all segments
b. Receive an immediate renewal of their lease
c. Be unable to obtain their leases from the server
d. Immediately lose connectivity to the local segment
Page 10 of 13
Networking Fundamentals
80. The service services that resolves Fully Qualified Domain Name (FQDN) to IP Addess is :
a. Internet Service Provider (ISP)
b. Domain Name Service (DNS)
c. Address Resolution Protocol (ARP)
d. Windows Internet name service (WINS)
81. What type of record does DNS use to find a mail service :
a. Mail exchanger (MX) DNS Records
b. Canonical (CNAME) DNS Records
c. Service (SRV) DNS Records
d. HOST (A) DNS Records
86. A Private network that allow members of an organization to exchange data is an:
a. Internet
b. Extranet
c. Ethernet
d. Intranet
87. To protect a network when it is connected to the Internet, you should use a :
a. Router
b. Firewall
Page 11 of 13
Networking Fundamentals
c. Bridge
d. Switch
88. Which two of the following are connectivity options for Wide Area Networks (WANs)? (Choose
two)
a. Dial-up
b. Token ring
c. Leased line
d. Ethernet
91. In which physical network topology is each computer connected to a central point?
a. Bus
b. Mesh
c. Ring
d. Star
94. Which of these factors has the biggest impact on data transmission speed in a wireless network?
a. The access method used for network
b. The transmission wattage rating used on the NIC
c. The transmission standard of the equipment used
d. The uses off strong encryption for transmissions
Page 12 of 13
Networking Fundamentals
96. A node within a local are network (LAN) must have a network interface device and a:
a. Table of all network nodes
b. Host address
c. Network account
d. Resource to share
97. Which wireless authentication method provides the highest level of security?
a. IEEE 802.11a
b. Wired equivalency privacy (WEP)
c. Wi-Fi protected Access (WPA)
d. IEEE 802.11n
98. Which type of port is used to support VLAN traffic between two switches?
a. Virtual port
b. Trunk port
c. WAN port
d. LAN port
101. You need to divide a network into three subnets, which device should you use?
a. Router
b. Hub
c. Bridge
d. Segmenter
102. A cable that meets the 1000BaseT standard has maximum length of:
a. 100 m
b. 250 m
c. 500 m
d. 1,000 m
Page 13 of 13