Академический Документы
Профессиональный Документы
Культура Документы
How many digits of the DNIC (Data Network Identification Code) identify the country? A. B. C. D. E. first three first four first five first six None of the above
2.
A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? A. B. C. D. E. hot potato routing flooding static routing delta routing None of the above
3.
The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to A. B. C. D. E. 0.003 0.009 0.991 0.999 None of the above
4.
Frames from one LAN can be transmitted to another LAN via the device A. C. Router Repeater B. D. Bridge Modem
5.
Which of the following condition is used to transmit two packets over a medium at the same time? A. B. C. Contention Collision Synchronous
D. E. 6.
You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign? A. C. E. 255.240.0.0 255.252.0.0 255.255.255.255 B. D. 255.248.0.0 255.254.0.0
7.
What are the most commonly used transmission speeds in BPS used in data communication? A. B. C. D. E. 300 1200 2400 9600 None of the above
8.
What is the default subnet mask for a class C network? A. B. C. D. E. 127.0.0.1 255.0.0.0 255.255.0.0 255.255.255.0 None of the above
9.
Which of the following is used for modulation and demodulation? A. B. C. D. E. modem protocols gateway multiplexer None of the above
10. Which of the following is not a disadvantage of wireless LAN? A. Slower data transmission
B. C. D.
higher error rate interference of transmissions from different computers All of the above
11. The Internet Control Message Protocol (ICMP) A. allows gateways to send error a control messages to other gateways or hosts provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem All of the above None of the above
B.
C.
D. E.
12. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer. A. C. Modem Hub B. D. Cable Router
13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiver A. B. C. D. E. cannot talk at once can receive and send data simultaneously can send or receive data one at a time can do one way data transmission only None of the above
14. How many hosts are attached to each of the local area networks at your site? A. B. C. D. E. 128 254 256 64 None of the above
15. Which of the following technique is used for fragment? A. a technique used in best-effort delivery systems to avoid endlessly looping packets
B.
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size All of the above None of the above
C.
D. E.
16. Contention is A. One or more conductors that serve as a common connection for a related group of devices a continuous frequency capable of being modulated or impressed with a second signal the condition when two or more stations attempt to use the same channel at the same time a collection of interconnected functional units that provides a data communications service among stations attached to the network None of the above
B.
C.
D.
E.
17. Avalanche photodiode receivers can detect hits of transmitted data by receiving A. B. C. D. E. 100 photons 200 photons 300 photons 400 photons None of the above
18. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining which device has access to the transmission medium at any time. a medium access control technique for multiple access transmission media a form of TDMA in which circuit switching is used to dynamically change the channel assignments All of the above None of the above
B.
C.
D. E.
19. When you ping the loopback address, a packet is sent where? A. On the network
B. C. D. E.
Down through the layers of the IP architecture and then up the layers again Across the wire through the loopback dongle None of the above
20. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. B. C. D. E. FTP SNMP SMTP RPC None of the above
21. Which of the following device is used to connect two systems, especially if the systems use different protocols? A. B. C. D. E. hub bridge gateway repeater None of the above
22. The synchronous modems are more costly than the asynchronous modems because A. B. C. D. E. they produce large volume of data they contain clock recovery circuits they transmit the data with stop and start bits. they operate with a larger bandwidth None of the above
23. A distributed network configuration in which all data/information pass through a central computer is A. B. C. bus network star network ring network
D. E.
24. Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? A. B. C. D. E. UDP VMTP X.25 SMTP None of the above
25. A remote batch-processing operation in which data is solely input to a central computer would require a: A. B. C. D. E. telegraph line simplex lines mixedband channel All the above None of the above
26. ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a TCP/IP high level protocol for transferring files from one machine to another a protocol used to monitor computers a protocol that handles error and control messages None of the above
B. C. D. E.
27. If you get both local and remote echoes, every character you type will appear on the screen A. B. C. D. E. once twice three times never None of the above
28. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask? A. B. C. D. E. 192 192.168.10 0.0.0.5 51 None of the above
29. The slowest transmission speeds are those of A. B. C. D. twisted-pair wire coaxial cable fiber-optic cable microwaves
30. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate? A. B. C. D. 3 Kbps 6 Kbps 12 Kbps 24 Kbps.
31. Carrier is A. One or more conductors that serve as a common connection for a related group of devices a continuous frequency capable of being modulated or impressed with a second signal the condition when two or more sections attempt to use the same channel at the same time a collection of interconnected functional units that provides a data communications service among stations attached to the network None of the above
B.
C.
D.
E.
32. What can greatly reduce TCP/IP configuration problems? A. B. C. WINS Server WINS Proxy DHCP Server
D. E.
33. In CRC there is no error if the remainder at the receiver is _____. A. B. C. D. equal to the remainder at the sender zero nonzero the quotient at the sender
34. Which of the following statements is correct for the use of packet switching? the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved. All of the above None of the above
A.
B.
C.
D. E.
35. A front-end processor is A. B. a user computer system a processor in a large-scale computer that executes operating system instructions a minicomputer that relieves main-frame computers at a computer centre of communications control functions preliminary processor of batch jobs. None of the above
C.
D. E.
37. Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? A. B. 7 slots 5 slots
C. D.
10 slots 14 slots
38. Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS? A. B. C. D. E. 10 12 120 1200 None of the above
39. To connect a computer with a device in the same room, you might be likely to use A. B. C. D. E. a coaxial cable a dedicated line a ground station All of the above None of the above
40. Internet-like networks within an enterprise. A. B. C. D. Intranets Switching alternating Inter organizational networks Extranets
41. How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host? A. B. C. D. E. 16 - bits 32 - bits 48 - bits 64 - bits None of the above
42. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?
A. C. E.
B. D.
224 248
43. Which of the following types of channels moves data relatively slowly? A. B. C. D. E. wideband channel voiceband channel narrowband channel broadband channel None of the above
44. Which of the following is required to communicate between two computers? A. B. C. D. E. communications software protocol communications hardware access to transmission medium All of the above
45. Which of the following does not allow multiple users or devices to share one communications line? A. B. C. D. E. doubleplexer multipplexer concentrator controller None of the above
46. The geostationary satellite used for communication systems A. B. C. D. E. rotates with the earth remains stationary relative to the earth is positioned over equator All of the above None of the above
47.
Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer: A. B. C. D. Bandwidth alternatives Switching alternating Inter organizational networks Extranets
48.
The packets switching concept was first proposed A. in the late 1980s for the Defense Ministry of US. in the early 1960s for military communication systems, mainly to handle speech in the late 1950s for Defense Ministry of US All of the above None of the above
B.
C. D. E. 49.
The _____ houses the switches in token ring. A. B. C. D. E. transceiver nine-pin connector MAU NIC None of the above
50.
What device separates a single network into two segments but lets the two segments appear as one to higher protocols? A. C. Switch Gateway B. D. Bridge Router
51.
Which of the following refers to the terms "residual error rate"? A. the number of bit errors per twenty four hours of continuous operation on an asynchronous line The probability that one or more errors will be undetected when an error detection scheme is used the probability that one or more errors will be detected when an error detection mechanism is used signal to noise ratio divided by the ratio of energy per bit to noise per hertz
B.
C.
D.
E.
52.
Which of the following summation operations is performed on the bits to check an errordetecting code? A. C. Codec Checksum B. D. Coder-decoder Attenuation
53.
The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband. A. Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable Baseband refers to local area networks, and broadband refers to wide area networks. Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions
B.
C.
D.
E.
54.
An error-detecting code inserted as a field in a block of data to be transmitted is known as A. B. C. D. E. Frame check sequence Error detecting code Checksum flow control None of the above
55.
The cheapest modems can transmit A. B. C. D. E. 300 bits per second 1,200 bits per second 2,400 bits per second 4,800 bits per second None of the above
56.
Computers cannot communicate with each other directly over telephone lines because they use digital pulses whereas telephone lines use analog sound frequencies. What is the name of the device which permits digital to analog conversion at the start of a long distance transmission?
A. B. C. D. E.
57.
What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers? A. B. C. D. E. 16 9 8 4 None of the above
58.
The receive equalizer reduces delay distortions using a A. B. C. D. E. tapped delay lines gearshift descrambler difference engine None of the above
59.
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies. A. C. 12 48 B. D. 81 729
60.
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic? A. B. C. D. NBTSTAT NETSTAT.EXE Performance Monitor Network Monitor
E.
ARP.EXE
61.
Sending a file from your personal computer's primary memory or disk to another computer is called A. B. C. D. E. uploading downloading logging on hang on None of the above
62.
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations? A. B. C. D. E. Memory resident package Project management package Data communication package Electronic mail package None of the above
63.
The communication mode that supports two-way traffic but only one direction at a time is A. B. C. D. E. simplex duplex half duplex multiplex None of the above
64.
HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a TCP/IP high level protocol for transferring files from one machine to another. a protocol used to monitor computers a protocol that handles error and control messages None of the above
B. C. D. E.
65.
A. B. C. D. E.
Telephone line Telegraph line Coaxial cable Microwave systems None of the above
66.
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring? A. B. C. D. 8000 B frame 80,000 B frame 8 x 105 bit frame 10,000 B frame
67.
Data are sent over pin _____ of the EIA-232 interface. A. B. C. D. 2 3 4 All of the above
68.
To connect a computer with a device in the same room, you might be likely to use A. B. C. D. a coaxial cable a dedicated line a ground station All of the above
69.
Demodulation is a process of A. B. C. D. converting analog to digital signals converting digital to analog signals multiplexing various signals into one high speed line signals performing data description.
70.
Internet-like networks between a company and its business partners. Select the best fit for answer: A. Bandwidth alternatives
B. C. D.
71.
An example of an analog communication method is A. B. C. D. E. laser beam microwave voice grade telephone line All of the above None of the above
72.
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? A. B. C. D. E. Layer 7 protocols Layer 6 protocols Layer 5 protocols Layer 4 protocols None of the above
73.
What frequency range is used for FM radio transmission? A. B. C. D. E. Very Low Frequency : 3 kHz to 30. kHz Low Frequency : 30 kHz to 300 kHz High Frequency : 3 MHz to 30 MHz Very High Frequency : 30 MHz to 300 MHz None of the above
74.
Transmission of computerised data from one location to another is called A. B. C. D. data transfer data flow data communication data management
E.
75.
Compared to analog signals, digital signals A. B. C. D. E. allow faster transmission are more accurate both (a) and (b) All of the above None of the above
76.
FDDI is a A. B. C. D. E. ring network star network mesh network bus based network None of the above
77.
An anticipated result from multiprogramming operations is: A. B. C. D. E. reduced computer idle time the handling of more jobs better scheduling of work All of the above None of the above
78.
A central computer surrounded by one or more satellite computers is called a A. B. C. D. E. bus network ring network star network All of the above None of the above
79.
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm? A. 500 bps
B. C. D.
80.
HOSTS file entries are limited to how many characters? A. B. C. D. E. 8 255 500 Unlimited None of the above
81.
Demodulation is the process of A. B. C. D. E. converting digital signals to analog signals converting analog signals to digital signals combining many low speed channels into one high speed channel dividing the high-speed signals into frequency bands None of the above
82.
Which of the following statement is incorrect? The Addresses Resolution Protocol, ARP, allows a host to find the physical address of a target host on the same physical network, given only the target IP address. The sender's IP - to- physical address binding is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet. ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP-addresses of our choice to every machine. All of the above None of the above
A.
B.
C.
D. E.
83.
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets? A. C. E. 255.255.255.192 255.255.255.240 255.255.255.252 B. D. 255.255.255.224 255.255.255.248
84.
Which of the following best illustrates the default subnet mask for a class A,B, and C Network? A. B. C. D. E. 0.0.0.0, 0.0.0.1, 0.0.1.1 255.255.255.0, 255.255.0.0, 255.0.0.0 255.0.0.0, 255.255.0.0, 255.255.255.0 255.255.0.0, 255.255.255.0, 255.255.255.255 None of the above
85.
Modulation is the process of A. B. C. D. converting analog signals to digital signals converting digital signals to analog signals Multiplexing various signals into high speed line signals performing data encryption.
86.
Devices interconnected by the LAN should include A. B. C. D. E. Computers and terminals mass storage device, printers and plotters bridges and gateways All of the above None of the above
87.
What are the data transmission channels available for carrying data from one location to another? A. B. C. D. E. Narrowband Voiceband Broadband All of the above None of the above
88.On a class B network, how many hosts are available at each site with a subnet mask of 248?
A. C. E. 16,382 4,094 1,022 B. D. 8,190 2,046
89.
Which of the following technique is used for encapsulation? A. a technique used in best-effort delivery systems to avoid endlessly looping packets. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size All of the above None of the above
B.
C.
D. E.
90.
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one? A. C. 255.255.252.0 255.255.255.240 B. D. 225.255.254.0 255.255.255.252
91. With an IP address set starting with 150, you currently have six offices that you are treating
as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site? A. C. E. 192 240 252 A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as A. B. C. D. E. Gateways mail gateway bridges User Agent None of the above B. D. 224 248
92.
93. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the
modulation rate is A. B. C. 1200 bands 3200 bands 4800 bands
D. E.
95.When the computer provides the manager with a multiple choice of possible answers, the
prompting technique is A. B. C. D. E. question and answer form filling open-ended question menu selection None of the above Which network topology is considered passive? A. C. E. Cross Star Bus B. D. Ring Mesh
96..
97.If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use
a(n) A. B. C. D. E. POS terminal data collection terminal batch processing terminal intelligent terminal None of the above Which address is the loopback address? A. B. 0.0.0.1 127.0.0.0
98.
C. D. E.
99.Error rate is
A. an error-detecting code based on a summation operation performed on the bits to be checked. a check bit appended to an array of binary digits to make the sum of all the binary digits. a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected. the ratio of the number of data units in error to the total number of data units None of the above Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: A. B. C. D. Network Server Virtual Private Network Network operating system OSI
B.
C.
D. E.
100.
101.Modem is used in data transmission. When was it invented and in which country?
A. B. C. D. E. 1963, USA 1965, Germany 1950, USA 1950, Japan None of the above Which of the following technique is used for Time-To-Line (TTL)? A. a technique used in best-effort delivery system to avoid endlessly looping packets. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame One of the pieces that results when an IP gateway divides an IP datagram
102.
B.
C.
into smaller pieces for transmission across a network that cannot handle the original datagram size. D. E. All of the above None of the above
103.Communication network is
A. B. C. one or more conductors that serve as a common connection for a related group of devices a continuous frequency capable of being modulated or impressed with a second signal the condition with two or more stations attempt to use the same channel at the same time a collection of interconnected functional units that provides a data communications service among stations attached to the network None of the above
D.
E.
B.
C.
D. E.
106.
B.
C.
D. E.
108.You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at
least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign? A. C. E. 255.255.224.0 255.255.248.0 255.255.255.255 B. D. 255.255.240.0 255.255.255.0
109.How many digits of the Network User Address are known as the DNIC (Data Network
Identification Code)? A. B. C. D. E. first three first four first five first seven None of the above Which of the following is the address of the router? A. B. C. D. E. The IP address The TCP address The subnet mask The default gateway None of the above
110.
111.
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes? A. Five B. Two
C. E.
Four Three
D.
Six
112.
A devices that links two homogeneous packet-broadcast local networks, is A. B. C. D. E. hub bridge repeater gateway None of the above
114.Which of the following divides the high speed signal into frequency bands?
A. B. C. D. E. t-switch modem frequency-division multiplexer time-division multiplexer None of the above
A. B. C. D. E.
NBTSTAT Netstat PING Hostname None of the above Which of the following conditions is used to transmit two packets over a medium at the same time? A. C. Contention Synchronous B. D. Collision Asynchronous
117.
120.
121. If the ASCII character G is sent and the character D is received, what type of error is this?
A. C.
single-bit burst
B. D.
multiple-bit recoverable
122.Which layer of OSI determines the interface of the system with the user?
A. B. C. D. Network Application Data-link Session
E.
123.
The transfer of data from a CPU to peripheral devices of a computer is achieved through A. B. C. D. E. modems computer ports interfaces buffer memory None of the above What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard? A. B. C. D. E. 4 2 6 3 None of the above
124.
125.Many data communication networks have been established which provide a wealth of on-demand
information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want? A. B. C. D. Teletex system Fax system Videotex system Microwave system
E.
None of the above Which of the following statements is correct? A. B. C. D. E. Terminal section of a synchronous modem contains the scrambler Receiver section of a synchronous modem contains the scrambler Transmission section of a synchronous modem contains the scrambler Control section of a synchronous modem contains the scrambler None of the above
126.
C.
D. E.
128.Because the configuration infor-mation for a DHCP client is received dynamically, you must use
which utility to read the current configuration to verify the settings? A. B. C. D. E. PING TRACERT ARP IPCONFIG None of the above Which of the following is separated by a subnet mask? A. B. C. D. DHCP scopes Network ID and host ID Domains Subnets
129.
130.
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is A. 6200 bps
B. C. D. E.
131.
TCP is: A. B. C. D. Operates at the Data Link layer Connection orientated and unreliable Connection orientated and reliable Connectionless and unreliable
135. You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with
the largest amount of subnets available. Which subnet mask should you assign? A. C. E. 255.255.255.192 255.255.255.240 255.255.255.255 B. D. 255.255.255.224 255.255.255.248
137.Examples are packet switching using frame relay, and cell switching using ATM technologies.
Select the best fit for answer: A. B. C. D. Bandwidth alternatives Switching alternating Inter organizational networks Extranets
B. C. D. E.
E.
B. C.
D.
E.
143.You are working with a network that has the network ID 192.168.10.0 and require nine subsets
for your company and the maximum number of hosts. What subnet mask should you use? A. C. E. 255.255.255.192 255.255.255.240 255.255.255.252 B. D. 255.255.255.224 255.255.255.248
144.Messages from one computer terminal can be sent to another by using data networks. The
message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called? A. Paperless office
B. C. D. E.
146.You are working with a network that has the network ID 192.168.10.0. What subnet should you
use that supports four subnets and a maximum number of hosts? A. C. E. 255.255.255.192 255.255.255.240 255.255.255.252 B. D. 255.255.255.224 255.255.255.248
148.The first step in troubleshooting many problems is to verify which of the following?
A. B. C. D. E. The subnet mask is valid TCP/IP is installed correctly on the client The WINS server is running The BDC is operable None of the above
149.You are working with a network that is 172.16.0.0 and would like
to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use? A. C. E. 255.255.192.0 255.255.240.0 255.255.255.0 Which of the following files is used for NetBIOS name resolution? A. B. C. D. E. HOSTS LMHOSTS ARP FQDN None of the above B. D. 255.255.224.0 255.255.248.0
150.
152.If you configure the TCP/IP address and other TCP/IP parameters
manually, you can always verify the configuration through which of the following? Select the best answer. A. B. C. D. E. Network Properties dialog box Server Services dialog box DHCPINFO command-line utility Advanced Properties tab of TCP/ IP Info. None of the above
preparation and transmission facilities? A. B. C. D. E. Teletex Teletext x400 Fax None of the above
A. B. C. D. E.
161.
B.
private networks C. D. E. to assign address to private network DTEs a and b both None of the above
164.
165.
Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost. A. B. C. D. E. P I (K + 1) KIK (1 + F) 1/ (1 - F) K I (K - P) None of the above
A. B. C. D.
Highly-customizable Routable Little configuration required Fast for small networks to Self-tuning The difference between a multiplexer and a statistical multiplexer is Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) None of the above
167.
A.
B.
C.
D.
E.
168.
You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice? A. TokenRing Ethernet ARCnet B. CSMA/CD
C. E.
D.
CSMA/CA
169.
Which of the following network access standard is used for connecting stations to a packet-switched network? A. X.3
B. C. D. E.
173.
E.
174.
Data communications monitors available on the software market include A. B. C. D. E. ENVIRON/1 TOTAL BPL Telenet None of the above
175.
Which of the following statement is correct? A spin stabilized satellite used solar cells mounted on a cylinder body that continuously rotates so that 40 a time and it also uses gyroscopic action of a spinning satellite to maintain its orientation towards the earth and the sun. A spin stabilized satellite uses solar panels whose cells are continually oriented toward the sun Satellite transponders use lower frequency reception of radiation from earth stations and higher frequency for transmission to earth stations. satellite transponders use a single frequency for reception and transmission from one point on earth to another None of the above
A.
B.
C.
D.
E.
176.
What is the default subnet mask for a class A network? A. B. 127.0.0.1 255.0.0.0
C. D. E.
178.
A.
B.
C.
D.
E.
A. B. C. D. E.
Internetworked enterprise Information super highway Business applications of telecommunications Client/Server networks None of the above
180.
The data communication support should include, but is not restricted to A. B. C. D. file transfer and transaction processing file and database access terminal support, electronic mail and voice grams. All of the above
181.MAC is
A. a method of determining which device has access to the transmission medium at any time a method access control technique or multiple-access transmission media a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network None of the above
B.
C.
D.
E.
subnet mask should you assign? A. C. E. 255.255.192.0 255.255.240.0 255.255.252.0 B. D. 255.255.224.0 255,255.248.0
185.Parity bit is
A. an error-detecting code based on a summation operation performed on the bits to be checked. a check bit appended to an array of binary digits to make the sum of all the binary digits. a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors in detected the ratio of the number of data units in error to the total number of data units None of the above
B.
C.
D.
E.
187.
B. C. D. E.
188.
Microprogramming is A. assembly language programming programming of minicomputers control unit programming macro programming of microcomputers None of the above
B.
C.
D.
E.
B.
C.
D. E.
191.
called the "traffic cop" of a micro communication system, then what should the modem be called? A. B. C. D. E. Park Bridge Interface Link None of the above
193.
For connecting modem, a computer must be equipped with a port that conforms to the RS-232 standard of the Electronic Industries Association of America. What do the letters 'RS' stand for? A. B. C. D. E. Recognised standard Random sequence Recommended standard Registered source None of the above
D. E.
197.
On a class C network with a subnet mask of 192, how many subnets are available? A. C. E. 254 30 2 B. D. 62 14
198. Ethernet and Token-Ring are the two most commonly used
network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. A. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it is cabled using fiber-optic cable Token-Ring, because it uses a MAU Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
B. C.
D.
E.
199. A 4 KHz noiseless channel with one sample every 125 per sec, is
used to transmit digital signals. Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is used. A. B. C. 500 Kbps 32 Kbps 8 Kbps
D.
64 Kbps.
200. How can you see the address of the DHCP server from which a
client received its IP address? A. B. C. D. E. By using Advanced Properties of TCP/IP By using IPCONFIG/ALL By using DHCPINFO By pinging DHCP None of the above
203. Now-a-days computers all over the world can talk to each other.
Which is one of the special accessories essential for this purpose? A. B. C. D. E. Keyboard Modem Scanner Fax None of the above
B. C. D. E.
multiprogramming systems virtual storage systems All of the above None of the above
205. Which of the following best describes the scopes on each DHCP
server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment? A. B. C. D. E. Unique to that subnet only For different subnets For no more than two subnets For no subnets None of the above
B.
C.
D.
207. What operates in the Data Link and the Network layer?
A. B. C. D. E. NIC Bridge Brouter Router None of the above
208. What is the name of the computer based EMMS that provides a
common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions? A. B. E-mail Bulletin board system (BBS)
C. D. E.
B.
C.
D.
E.
212.
C. D. E.
213.
configure it for five subnets, each of which will support 25 nodes. What subnet should you use? A. C. E. 255.255.255.0 255.255.255.240 255.255.255.252 A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be A. B. C. D. E. 5 10 20 32 None of the above B. D. 255.255.255.224 255.255.255.248
214.
216.
D. E.
B.
C.
D. E.
All of the above None of the above A batch processing terminal would not include a A. B. C. D. E. CPU card reader card punch line printer None of the above
221.
B.
C.
D. E.
225.
An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as A. B. C. D. E. Cyclic redundancy check Checksum Error detecting code Error rate None of the above
B. C. D. E.
Circular polarization Beam width Identity None of the above Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices? A. B. C. D. E. Hardwiring Microwave Satellite Laser None of the above
230.
232.
B. C. D. E.
B. C. D. E.
235.
D. E.
240.
B.
C.
D. E.
243.
244.
Which of the following communications lines is best suited to interactive processing applications? A. B. C. D. E. narrowband channels simplex lines full-duplex lines mixed band channels None of the above
A. B. C. D. E.
247. Which of the following items is not used in Local Area Networks
(LANs)? A. B. C. D. E. Computer Modem Printer Cable None of the above
249. RS-232-G
A. is an interface between two data circuit terminating equipment as examplified by a local and remote modem is an interface standard between Data terminal Equipment and Data Circuit Terminating Equipment specifies only the mechanical characteristics of an interface by providing a 25-pin connector requires only 7 pin out of 25 in order to transmit digital data over public telephone lines None of the above A subdivision of main storage created by operational software is referred to as a:
B.
C.
D.
E.
250.
A. B. C. D. E.
251. RS-449/442-A/423-A is
A. a set of physical layer standards developed by EIA and intended to replace RS-232-C. a check bit appended to an array of binary digits to make the sum of the all the binary digits a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected the ratio of the number of data units in error to the total number of data units None of the above
B.
C.
D.
E.
252. Which of the following digits are known as the area code of the
Network User Address (NUA)? A. B. C. D. E. 5-7 1-4 8-12 13-14 None of the above
254.
varied in accordance with some characteristic of the modulating signal, is known as A. B. C. D. E. Aloha Angle modulation Amplitude modulation modem None of the above
B.
C.
D.
E.
A. B. C. D. E.
B.
C. D. E.
261.
A.
B.
C.
D.
265.
B. C. D. E.
268.
269. Which of the following TCP/IP protocol is used for file transfer
with minimal capability and minimal overhead? A. B. C. D. E. RARP FTP TFTP TELNET None of the above
A. B. C. D. E.
realtime, batch processing, and timesharing realtime, timesharing, and distributed processing realtime, distributed processing, and manager inquiry realtime, timesharing, and message switching None of the above
272.
273.
What frequency range is used for microwave communications, satellite and radar? A. Low Frequency : 30 kHz to 300 kHz Medium Frequency : 300 kHz to 3 MHz Super High Frequency : 3000 MHz to 30000 MHz Extremely High Frequency :30,000 MHz
B.
C.
D.
E.
B.
C.
D.
E.
275.
276. A 4 KHz noise less channel with one sample ever 125 per sec is
used to transmit digital signals. If Delta modulation is selected, then how many bits per second are actually sent? A. B. C. D. 32 kbps 8 kbps 128 kbps 64 kbps.
278. .
C. D. E.
280.
B.
C.
D.
E.
281.
Which of the following is an example of a client-server model? A. B. C. D. E. TELNET FTP DNS All of the above None of the above
282.
In CRC there is no error if the remainder at the receiver is _____. A. the quotient at the sender
B. C. D. E.
nonzero zero equal to the remainder at the sender None of the above.
B.
C.
D. E.
285.
A. B. C. D. E.
computer systems; database; and end users. Select the best fit for answer: Internet works The Internet Internet revolution Internet technologies None of the above Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select? A. Star B. Right
286.
C. E.
Token-Ring Bus
D.
Ethernet
287.
A. B. C. D.
The CCITT Recommendation X.25 specifies three layers of communications: application, presentation and session Session, transport and network physical datalink and network datalink, network and transport
288. Which of the following technique is used for allocating capacity on a satellite channel using fixedassignment FDM? A. B. C. D. E. Amplitude modulation Frequency-division multiple access Frequency modulation Frequency-shift keying None of the above
290. Which of the following allows a simple email service and is responsible for moving messages from
one mail server to another? A. C. E. IMAP SMTP POP3 B. D. DHCP FTP
D. E.
293.
294.
Many large organizations with their offices in different countries of the world connect their computers through telecommunication satellites and telephone lines. Such a communication network is called A. B. C. D. E. LAN WAN ECONET EITHERNET None of the above
295. A network which is used for sharing data, software and hardware among several users owning
microcomputers is called A. B. C. D. E. WAN MAN LAN VAN None of the above
297. A proposed network infrastructure of interconnected local, regional, and global networks that
would support universal interactive multimedia communications. Select the best fit for answer: A. B. C. D. Internetworked enterprise Information super highway Business applications of telecommunications Client/Server networks What does 240 translate to in binary? A. B. C. D. E. 11110000 00011110 00001111 11100000 None of the above
298.
299.
You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In
the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use? A. C. E. 255.224.0.0 255.248.0.0 255.254.0.0 B. D. 255.240.0.0 255.252.0.0
300. A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree
node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length. A. B. C. 2 (m - 2) 2 (2m - 1) m-1
D.
(2m - l)/mJ
301. Most networks are connected to other local area or wide area networks. Select the best fit for
answer: A. B. C. D. Internet works The Internet Internet revolution Internet technologies You are working with a network that is 172.16.0.0 and would like to support 600 hosts per
302.
A. C. E.
subnet. What subnet mask should you use? 255.255.192.0 255.255.240.0 255.255.252.0 B. D. 255.255.224.0 255.255.248.0
303. A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the
maximum possible transmission rate? A. B. C. D. E. 1.5 Mbaud/sec 6 Mband/sec 12 Mbaud/sec 24 Mbaud/sec None of the above
304. Which of the following digits are known as the sub-address digits (for use by the user) of the
Network User Address (NUA)? A. B. C. D. E. 5-7 1-4 8-12 13-14 None of the above
B.
C.
a code in which each expression conforms to specify rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the error is detected. the ratio of the data units in error to the total number of data units None of the above
D. E.
308. You have purchased a MAU (Multistation Access Unit) from your computer supplier and now must
decide what type of network card you should install in the workstations. Which of the following would be the most appropriate? A. B. C. D. E. Fast SCSI Wide Token-Ring ArcServe Ethernet None of the above
D. E.
255.255.255.255.0 None of the above An ROP would be attached to a A. B. C. D. E. simplex channel duplex channel half duplex channel full duplex channel None of the above
310.
312. The systematic access of small computers in a distributed data processing system is referred to
as: A. B. C. D. E. dialed service multiplexing polling conversational mode None of the above
313. The process of converting analog signals into digital signals so they can be processed by a
receiving computer is referred to as: A. B. C. D. E. modulation demodulation synchronizing synchronizing None of the above An example of digital, rather than analog, communication is A. DDD
314.
B. C. D. E.
315. How many OSI layers are covered in the X.25 standard?
A. B. C. D. E. two three seven six None of the above A band is always equivalent to A. B. C. D. E. a byte a bit 100 bits 16 bits None of the above
316.
318. The most flexibility in how devices are wired together is provided by
A. B. C. D. E. bus networks ring networks star networks T-switched networks None of the above
B.
The presentation layer transforms information from machine format to the understandable format. The data link layer handles the transfer of data between the ends of a physical link. All of the above None of the above
C. D. E.
320. When you connect to an online information service, you are asked to provide some kind of
identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system? A. B. C. D. E. Security procedure Safeguard procedure Identification procedure Log-on procedure None of the above Bus is A. one or more conductors that some as a common connection for a related group of devices a continuous frequency capable of being modulated or impressed with a second signal the condition when two or more stations attempt to use the same channel at the same time a collection of interconnected functional units that provides a data communications service among stations attached to the network None of the above
321.
B.
C.
D.
E.
322.
Which of the following medium is used for broadband local networks? A. B. C. D. E. Coaxial cable optic fiber CATV UTP None of the above
323.
B. C. D.
324.
A. B. C. D. E.
What is the maximum number of entries in the HOSTS file? 8 255 500 Unlimited None of the above
325. The communication mode that supports data in both directions at the same time is
A. B. C. D. E. simplex half-duplex full-duplex multiplex None of the above Which of the following program is used to copy files to or from another UNIX timesharing system over a single link? A. B. C. D. E. VMTP TFTP UUCP UART None of the above
326.
E.
329. Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels.
Find the line signaling speed (i.e., modulation rate) A. B. C. D. 2400 bands 1200 bands 4800 bands 9600 bands. You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose? A. B. C. D. E. NBTSTAT Performance Monitor NETSTAT Network Monitor DHCP Management Console
330.
331.
A software that allows a personal computer to pretend it as a terminal is A. B. C. D. E. auto-dialing bulletin board modem terminal emulation None of the above
332.
What is the name of the network topology in which there are bi-directional links between each possible node? A. Ring
B. C. D. E.
333.
What is the main purpose of a data link content monitor? A. B. C. D. to detect problems in protocols to determine the type of transmission used in a data link to determine the type of switching used in a data link. to determine the flow of data
335. .
337. Which of the following frequency ranges is used for AM radio transmission?
A. B. C. D. E. Very Low Frequency : 3 kHz to 30 kHz Medium Frequency : 300 kHz to 3 MHz High Frequency : 3 MHz to 30 MHz Very High Frequency : 30 MHz to 300 MHz None of the above
338. Baseband is
A. B. C. D. E. transmission of signals without modulation a signal all of whose energy is contained within a finite frequency range the simultaneous transmission of data to a number of stations All of the above None of the above
339. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals.
Differential PCM with 4 bit relative signal value is used. Then how many bits per second are actually sent? A. B. C. D. 32 Kbps 64 Kbps 8 Kbps 128 Kbps. X.21 is A. a method of determining which device has access to the transmission medium at any time a method access control technique for multiple-access transmission media a very common bit-oriented data link protocol issued by ISO network access standard for connecting stations to a circuit-switched network None of the above
340.
B.
C.
D.
E.
341.
What is the minimum number of wires required for sending data over a serial communications links? A. 2
B. C. D. E.
342.
In cyclic redundancy checking, the divisor is _____ the CRC. A. B. C. D. the same size as one bit less than one bit more than two bits more
343.
Which command-line tool is included with every Microsoft TCP/IP client? A. B. C. D. E. DHCP WINS PING WINIPCFG None of the above
344. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.
A. C. even indeterminate B. D. odd 42
346.
E.
B. C. D. E.
352. A computer that handles resource sharing and network management in a local area network.
Select the best fit for answer: A. B. C. D. Network Server Virtual Private Network Network operating system OSI
353. Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted.
As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? A. C. E. Five Four Three B. D. Two Six
354. How much power (roughly) a light-emitting diode can couple into an optical fiber?
A. B. C. D. E. 100 microwatts 440 microwatts 100 picowatts 10 milliwatts None of the above
355. A modem that is attached to the telephone system by jamming the phone's handset into two
flexible receptacles in the coupler? A. B. C. D. E. gateway bridge acoustic coupler time-division multiplexer None of the above
A. B. C. D. E.
"download" free public domain programs send letters to be printed and delivered by the post office order goods at a substantial discount All of the above None of the above
357.
Which of the following statement is correct? A. B. C. D. E. Teleprinters are used for printing at remote locations, not for input. Teleprinters are same as teletypes Teleprinters are same as x400 Teleprinters have a printer for output and keyboard for input None of the above
359. What can cause a problem with communication with a client by name but not by IP address?
A. B. C. D. E. The IP address Static files such as an LMHOSTS file or a DNS database Subnet mask The default gateway None of the above
C. D. E.
361. What is the term used to describe addresses available on a DHCP server?
A. B. C. D. E. Pools Scopes Ranges Notes None of the above
363.
364. Which of the following files is used for NetBIOS name resolution?
A. B. C. D. E. HOSTS LMHOSTS ARP FQDN None of the above
365.
In CRC the quotient at the sender A. B. C. D. becomes the dividend at the receiver becomes the divisor at the receiver is discarded is the remainder
366. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A. B. C. D. E. 1 2 3 multiple None of the above
368.
369.
The coming together of three technologies i.e. microelectronics, computing and communications has ushered in A. B. C. information explosion information technology business revolution
D. E.
370.
Terminals are used to A. B. C. D. E. collect data from the physical system provide information for the manager communicate management decisions to the physical system All of the above None of the above
371. Sales persons and other employees of the company who spend much of their time away from
their offices but keep in touch with their company's microcomputers or main frame computers over telephone lines are called A. B. C. D. E. field workers telecommuters teleprocessors company directors None of the above
374.
B. C. D. E.
377. You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible
number of host IDs per subnet. Which subnet mask should you assign? A. C. E. 255.255.224.0 255.255.248.0 255.255.255.255 B. D. 255.255.240.0 255.255.252.0
379. Which multiplexing technique shifts each signal to a different carrier frequency?
A. B. C. D.
381. The loss in signal power as light travels down the fiber is called
A. B. C. D. E. Attenuation (su lam mong di) propagation scattering interruption None of the above
383. Which layer of international standard organization's OSI model is responsible for creating and
recognizing frame boundaries? A. B. C. D. E. physical layer data link layer transport layer network layer None of the above
384. Which of the following might be used by a company to satisfy its growing communications
needs? A. front-end processor
B. C. D. E.
multiplexer controller concentrator All of the above Different computers are connected to a LAN by a cable and a/an A. B. C. D. E. modem interface card special wires telephone lines None of the above
385.
386. The Token-Ring architecture was developed for a more efficient way to determine who should be
transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer A. An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient A characteristic of a multiprogramming system is: A. B. C. D. E. simultaneous execution of program instructions from two applications concurrent processing of two or more programs multiple CPUs All the above None of the above
B.
C.
D.
E.
387.
388.
When a host knows its physical address but not its IP address, it can use _____. A. B. RARP ARP
C. D. E.
389. What is the name given to the exchange of control signals which is necessary for establishing a
connection between a modem and a computer at one end of a line and another modem and computer at the other end? A. B. C. D. E. Handshaking Modem options Protocol Duplexing None of the above A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer: A. B. C. D. Fiber optic cables Cellular phone systems Telecommunications processors Telecommunications software
390.
391. After you have verified that TCP/IP is installed correctly, what is the next step in verifying the
TCP/IP configuration? A. B. C. D. E. Ping the broadcast address Ping the Microsoft Web site Ping a distant router. Ping the address of the local host None of the above
392. Which utility is useful for troubleshooting NetBIOS name resolution problems?
A. B. C. D. NBTSTAT Netstat PING Hostname
E.
394. In OSI model, which of the following layer transforms information from machine format into that
understandable by user A. B. C. D. E. application presentation session physical None of the above
396. .
E.
None of the above A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell how long will it take? A. B. C. D. E. 2 seconds 20 seconds 120 seconds 12 seconds None of the above
398.
399. Telecommunications networks come in a wide range of speed and capacity capabilities. Select the
best fit for answer: A. B. C. D. Bandwidth alternatives Switching alternating Inter organizational networks Extranets
402. What frequency range is used for TV transmission and low power microwave applications?
A. B. Very Low Frequency : 3 kHz to 30 kHz Medium Frequency : 300 kHz to 3 MHz
C. D. E.
Ultra High Frequency : 300 MHz to 3000 MHz Super High Frequency : 3000 MHz to 30000 MHz None of the above
B.
C.
D.
E.
404. We can receive data either through our television aerial or down our telephone lines and display
this data on our television screen. What is the general name given to this process? A. B. C. D. E. Viewdata Teletext Telesoftware Videotex None of the above
405. ASK, PSK, FSK, and QAM are examples of _____ encoding.
A. C. digital-to-digital analog-to-analog B. D. digital-to-analog analog-to-digital
B. C. D. E.
A. B. C. D. E.
Converts serial data into audio signals Converts analog signals into digital signals Converts parallel data into a stream of bits Decodes incoming signals into computer data None of the above
408. You need to determine whether IP information has been assigned to your Windows NT. Which
utility should you use? A. C. E. NBTSTAT IPCONFIG PING B. D. NETSTAT WINIPCFG
409. Eight stations are competing for the use of the shared channel using the modified Adaptive free
walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? A. B. C. D. 1 slots 5 slots 10 slots 14 slots
410.
When two computers communicate with each other, they send information back and forth. If they are separated by a reasonable distance, they can send and receive the information through a direct cable connection which is called a null-modem connection. Presently what is the maximum distance in metres permitted in this null-modem connection? A. B. C. D. E. 80 100 30 150 None of the above Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as A. B. Amplitude-shift keying Amplitude
411.
C. D. E.
412.
You have been contracted to install a windows NT network in an office that is located in a strip mall. The office is located next to the power plant of the building, so a UPS (uninterruptible power supply) has already been installed. What type of cable should you use for the network cabling? Choose the best answer. A. C. E. TI Fiber-optic STP B. D. UTP PSTN
413. Communication circuits that transmit data in both directions but not at the same time are
operating in A. B. C. D. E. a simplex mode a half-duplex mode a full-duplex mode an asynchronous mode None of the above
415.
416. An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is
A. B. C. D. E. X.75 X.25 X.400 X.21 None of the above
417. Which of the following TCP/IP protocol is used for transferring files from one machine to another?
A. B. C. D. E. RARP ARP TCP FTP None of the above
C.
D.
419. Which transmission mode is used for data communication along telephone lines?
A. B. C. D. E. Parallel Serial Synchronous Asynchronous None of the above Who invented the modem? A. B. C. Wang Laboratories Ltd. AT & T Information Systems, USA Apple Computers Inc.
420.
D. E.
421.
With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you use to maximize the number of available hosts? A. C. E. 192 240 252 B. D. 224 248
422. Which of the following communications modes support two-way traffic but in only one direction
of a time? A. B. C. D. E. simplex half-duplex three-quarters duplex full-of the above None of the above
423. Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address
from a server? A. B. C. D. E. RDP RARP RIP X.25 None of the above In OSI network architecture, the dialogue control and token management are responsibilities of A. B. C. D. E. session layer network layer transport layer data link layer None of the above
424.
425. Which of the following transmission systems provides the highest data rate to an individual
device
A. B. C. D. E.
Computer bus Telephone lines Voice band modem leased lines None of the above
426. Which of the following connectivity devices is used to extend a network on a purely mechanical
basis? A. B. C. D. Gateway Switch Router Active hub
427. The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI
model. A number of standards were agreed upon during that time. Which of the following is the standard for Ethernet? A. C. E. 802.2 802.4 802.6 B. D. 802.3 802.5
428. Which of the following digits are known as the terminal number of the Network User Address
(NUA)? A. B. C. D. E. 5-7 1-4 8-12 13-14 None of the above
429. Which of the following device is used with an X.25 network to provide service to asynchronous
terminals A. B. C. D. repeater bridges gateway Packet assembler/disassemble
E.
430. A medium access control technique for multiple access transmission media is
A. B. C. D. E. Aloha Amplitude Angle modulation Attenuation None of the above
432. Which of the following TCP/IP protocol is used for remote terminal connection service?
A. B. C. D. E. TELNET FTP RARP UDP None of the above
433. Networks where end user workstations are tied to LAN servers to share resources and application
processing. A. B. C. D. Internetworked enterprise Information super highway Business applications of telecommunications Client/Server networks
C. D. E.
436. IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____
sublayer. A. B. C. D. E. HDLC, PDU PDU, HDLC MAC, LLC LLC, MAC None of the above
437. Two computers that communicate with each other use a simple parity check to detect errors for
ASCII transmissions. Which of the following events will always lead to an undeleted error? A. B. C. D. E. one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a byte during transmission None of the above
E.