Вы находитесь на странице: 1из 2

1. Which of the following services allows you to assign IP addresses and other addressing info to hosts automatically?

a. DNS
b. NAT
c. ARP
d. DHCP
2. Which of the following types of cabling is least susceptible to EMI?
a. Thicknet
b. UTP
c. STP
d. Fiber-optic
e. Thinnet
3. What is the maximum partition size in Windows NT Server?
a. 4 GB
b. 24 GB
c.1 Terabyte
d.16 Terabytes
e.16 Exabytes
4. T/F: Attenuation is the amplification of the network signal
a. True
b. False
5. Which of the following Operating Systems use an Emergency Repair Disk (ERD) (Choose all that apply)
A. Windows 95
B. Windows 98
C. Windows NT 4
D. Windows 2000
6. NICs are used to connect workstations to servers or workstations to workstations.
A. True
B. False
7. The dial up networking function of windows NT is referred to as which of the following?
a.Free PPP
b.Remote Access Service
c.Radius
d.SLIP Service
8. Which of the following media types is most susceptible to EMI?
a. Fiber Optic
b. STP
c. Co-axial
d. UTP
9. What is the most common network medium?
a.Fiber
b.Copper
c.Gold
d.Silver
e.None of the Above
10 Which type of connector assembly is responsible for twisted-pair?
a. AUI
b.BNC
c. BBC
d. RJ-55
e. RJ-45

11. What is a router?


a. A hardware device that connects dissimilar networks, such as Cat 5 cabling and FDDI
b. A network host that reads the source and destination addresses in the packet header and makes decisions about where to
forward the packet
c. A network host that can forward LAN-based email messages onto the Internet, after repackaging them into the SMTP
format
d. A software system that can translate between dissimilar networks such as Ethernet and Token Ring

12. What is a crossover cable typically used for?


A. Perform NIC loopback tests
B. Extend the maximum cable length
C. Connect two hubs together
D. Transmit test data to devices
E. Connect a computer to a switch

13. How can you protect your private network from the Internet? [Choose the two best answers]
A. Firewall
B. Password security
C. MAC port grouping
D. VLAN

14. This protocol is used in web server/web client communications.


a.HTM
b.SMTP
c.FTP
d.HTTP
e.HTML

15. Which of the following is not one of the four basic network topology types.
a.Ring
b.Star
c.Bus
d.Grid
e.Mesh

16. Which of the following devices protects your network from power failures?
a.MAU
b.UPS
c.CAT
d.Bridge
e.Switch

17. What is the maximum character length of a password in Windows NT?


a.24
b.10
c.8
d.14

18. What is the minimum number of physical hard drives required in order to implement RAID 5?
a.3
b.1
c.4
d.2
e.5

19. Which of the following file systems are used on windows networks/hosts? (Select 2)
a.EXT2
b.NFS
c.NTFS
d.FAT

20 Which of the following commands would be used to determine the TCP/IP configuration of a Windows NT host?
a.IPCONFIG
b.WINIPCHK
c.TRACERT
d.WINIPCFG
e.IFCONFIG

Вам также может понравиться