MCQ's For Computer/EC/IT -7




1.      Given the following output, which utility was used?
Interface 10.10.10.1 on Interface 0x1000004
Internet Address Physical Address Type
10.10.10.5 00-e0-29-62-0d-de dynamic
10.10.10.11 00-00-08-fd-97-fa static
A. arp
B. traceroute
C. ping
D. ipconfig
Answer: A

2.      A properly configured computer on the network receives the response ping request could not find host when pinging a web site. The computer can ping its gateway. Which of the following explains this situation?
A. The DNS server is down.
B. The DHCP is down.
C. The LAN is down.
D. The router is down.
Answer: A

3.      Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
A. Connect Workstation 6 and Workstation 2 using a barrel connector.
B. Add a 75 ohm terminator to Workstation 6 and Workstation 2.
C. Connect Workstation 6 and 2 using an RJ-45 (Registered Jack) coupler.
D. Add a 50 ohm terminator to Workstation 6 and Workstation 2.
Answer: A

4.      You work as a network administrator at ABC Computer. You have noticed suspicious IP traffic on the local subnet. After successfully pinging the source, which utility does the administrator use to find the associated MAC address?
A. ipconfig
B. nbstat
C. arp
D. tracert
Answer: C

5.      You work as a network administrator at ABC Computer. You are troubleshooting a wireless LAN that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs from different companies within range of the LAN. The two WAPs have different SSIDs than the LAN WAP, but the same channel. Also, the WEP appears to be the same on all WAPs. What should the network administrator do to cut down on the interference of the wireless clients on the LAN?
A. Change the LAN WAP to the same SSID as the other two WAPs.
B. Change the WEP settings on the two WAPs to be different that that of the LAN WAP settings.
C. Change the LAN WAP channel to a different channel than the other two WAPs.
D. Change the LAN WAP settings to be different than that of the other two WAPs.
Answer: C

6.      The network administrator is configuring a computer to run SLIP as a dial-up protocol. Which protocol should be installed?
A. TCP/IP
B. IPX/SPX
C. NetBEUI
D. Appleshare IP
Answer: A

7.      A home user purchases a cable modem and a straight-through Category 5e patch cable at a local electronics store. The modem will be connected to a hub which is connected to their computer. The computer is not able to receive a DHCP address from the cable modem network DHCP server. Why?
A. Because the cable modem must be directly connected to a computer.
B. Because the cable modem requires a crossover cable to connect to the hub.
C. Because the cable modem requires a RG-6 coaxial cable to connect to a hub.
D. Because the cable modem must use a Category 3 UTP cable to connect to a hub.
Answer: B

8.      A user is booting a workstation and suddenly receives a message stating that a duplicate IP address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
A. ping
B. traceroute
C. find
D. arp
Answer: D

9.      Which protocol encrypts data between web browser and web servers?
A. IPSec
B. SSL
C. PPTP
D. L2TP
Answer: B

10.  A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find that cannot modify the file contents. What is the likely cause?
A. The group rights filter has been changed through the GPO to disallow file access.
B. The file registered has been pulled from cache memory and is not writeable.
C. The file has been opened by another user and is open for read only.
D. The file has been pulled from the backup source not the tree directory.
Answer: C

11.  You work as a network administrator at ABC Computer. There are three identical desktop computers on the network. One of the computers cannot connect to the other machines. The network technician checks the network interface card in the non-working machine, and neither the link light not the activity lights us illuminated. The technician switches the network cable with a cable that is known to be operational, but the lights do not illuminate on the NIC or the corresponding port on the switch. What is the next troubleshooting step?
A. Switch to a crossover cable.
B. Reinstall the NIC.
C. Change ports on the switch.
D. Enter the correct TCP/IP settings.
Answer: C

12.  Which 3 bytes of MAC address F2-A1-23-BC-D3-41 designates the unique station identifier?
A. F2-A1-23
B. A1-23-BC
C. 23-BC-D3
D. BC-D3-41
Answer: D

13.  Which one of the following authentication protocols requires the use of an NTP server to synchronize the workstations date and time with the server?
A. Kerberos
B. RADIUS
C. PAP
D. MS-CHAP
Answer: B

14.  A user enters http://www.abc computers.com into an Internet web browser. What is the default port number for the URL?
A. 21
B. 23
C. 80
D. 110
Answer: C

15.  Which TCP/IP well-known port number identifies SMTP?
A. 21
B. 23
C. 25
D. 110
Answer: C

16.  PAP secures PPP sessions by:
A. Adding a secret key to the password.
B. Adding a secret key to the username password.
C. Double encrypting the username and password.
D. Passing a username and password in plaintext.
Answer: D

17.  All of the following are valid IP addresses except:
A. 192.168.0.1
B. 172.192.4.256
C. 156.144.226.123
D. 10.24.12.0
Answer: B

18.  Which OSI layer converts digital data into electronic signals to be put on a wire?
A. Physical
B. Transport
C. Data Link
D. Presentation
Answer: A

19.  At which layer of the OSI model does a router function?
A. Physical
B. Data Link
C. Network
D. Application
Answer: C

20.  Which protocol is used for error reporting in concert with IP?
A. SMTP
B. ICMP
C. IGMP
D. SNMP
Answer: B

21.  Which one of the following techniques will segment a network?
A. Subnetting
B. Implementing DHCP
C. Using DNS
D. Installing hubs
Answer: A

22.  Which network topology uses the most cable?
A. Star
B. Ring
C. Bus
D. Mesh
Answer: D

23.  Connecting a LAN (Local Area Network) to mainframe can be accomplished using a:
A. bridge
B. gateway
C. transceiver
D. firewall
Answer: B

24.  Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses a 1300 nm (nanometer) beam?
A. 1000BASE-LX and 10 GBASE-LR
B. 1000BASE-CX and 1000BASE-T
C. 1000BASE-SX and 10 GBASE-SR
D. 10 GBASE-ER and 10 GBASE-SR
Answer: A

25.  Which networking topology has the most physical connections per node?
A. Bus
B. Ring
C. Star
D. Mesh
Answer: D

26.  How can the range of an 802.11b wireless access point be increased?
A. Lower the output power
B. Install an external antenna
C. Remove any external antennas and use the internal one
D. Change the transmitting frequency to the 5 GHz (Gigahertz) range
Answer: B

27.  Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
A. Router
B. Firewall
C. Modem
D. Gateway
Answer: D

28.  Which one of the following antenna types is omni directional?
A. Vertical
B. Dipole
C. Yagi
D. Parabolic
Answer: A

29.  Which of the following environments is best suited to provide more radio coverage using an omnidirectional antenna?
A. Closed office areas with walls
B. Open office areas with cubicles
C. Hallways
D. Outdoors
Answer: D

30.  Which of the following connectors are SFF (Small Form Factor) fiber connectors?
A. MT-RJ (Mechanical Transfer-Registered Jack) and LC (Local Connector)
B. ST (Straight Tip) and SC (Standard Connector)
C. RJ-45 (Registered Jack) and RJ-11 (Registered Jack)
D. Series-A and Series-B
Answer: A

31.  If a destination address is not in a bridge forwarding table, what will the bridge do?
A. Forwarding the packets to a designated port and the one that originated the request
B. Forward the packets to all ports except the one that originated the request
C. Forward the packets to the default gateway
D. Forward the packet to all ports
Answer: B

32.  A client noticed that traffic increased steadily over the last few months and performance is beginning to suffer on its TCP/IP (Transmission Control Protocol/Internet Protocol). Which network can be installed to reduce the impact of network traffic without dividing the LAN (Local Area Network) into separate subnets?
A. Bridge
B. Repeater
C. Router
D. Gateway
Answer: C

33.  Token ring operates at which speeds?
A. 1 Mbps, 10 Mbps (Megabit per second)
B. 1 Mbps, 4 Mbps (Megabit per second)
C. 4 Mbps, 16 Mbps (Megabit per second)
D. 10 Mbps, 100 Mbps (Megabit per second)
Answer: C

34.  Which media type is the most prone to electromagnetic interference?
A. Category 5e UTP (Unshielded Twisted Pair)
B. RG-58 (Radio Grade) coaxial cable
C. SMF (Single Mode Fiber) optic cable
D. MMF (Multimode Fiber) optic cable
Answer: A

35.  The 802.11b frequency band is:
A. 1.5 GHz (Gigahertz)
B. 2.4 GHz (Gigahertz)
C. 5.0 GHz (Gigahertz)
D. 7.0 GHz (Gigahertz)
Answer: B

36.  Which type of connector would a cable have if it were supplied with a splitter and a cable modem for Internet access?
A. F-Type
B. RJ-45 (Registered Jack)
C. RJ-11 (Registered Jack)
D. IEEE 1394 (Institute of Electrical and Electronics Engineers)
Answer: A

37.  Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards represents Ethernet?
A. 802.0
B. 802.3
C. 802.5
D. 802.11
Answer: B

38.  What is the maximum length of a gigabit Ethernet segment using MMF (Multimode Fiber) optic cable?
A. 100 meters (328.08 feet)
B. 250 meters (820.21.feet)
C. 550 meters (1,804.46 feet)
D. 3000 meters (9,842.52 feet)
Answer: C

39.  All of the following are terminated on a punch down block except:
A. STP (Shielded Twisted Pair) cable
B. MMF (Multimode Fiber) cable
C. UTP (Unshielded Twisted Pair) cable
D. Category 3 cable
Answer: B

40.  What is the desired result when implementing fault tolerance?
A. It maintains standards within the IEEE (Institute of Electrical and Electronics Engineers)
B. It completely eliminates all faults
C. It ensures production is not impacted in the event of a failure
D. It improves throughput
Answer: C

41.  What RAID (Redundant Array of Independent Disks) level uses a disk mirroring technique to provide fault tolerance?
A. RAID 0 (Redundant Array of Independent Disks)
B. RAID 1 (Redundant Array of Independent Disks)
C. RAID 3 (Redundant Array of Independent Disks)
D. RAID 5 (Redundant Array of Independent Disks)
Answer: B

42.  In order to resolve the name www.abccomputer.com, which type of server is required?
A. DHCP (Dynamic Host Configuration Protocol)
B. DNS (Domain Name Service)
C. WINS (Windows Internet Name Service)
D. NAT (Network Address Translation)
Answer: B

43.  Which of the following can be used to cache web pages for future retrieval?
A. Switch
B. Web server
C. Repeater
D. Proxy service
Answer: D

44.  A workstation is configured for dial-in connectivity to a remote access server. Which information does the client need to authenticate?
A. Username and password
B. IP (Internet Protocol) address and password
C. IPX (Internet Packet Exchange) address and username
D. Domain name and password
Answer: A

45.  Which cable would users utilize to connect a client workstation directly to another client workstation when using 100BASE-TX?
A. Category 5 crossover cable
B. Coaxial cable
C. Category 3 straight cable
D. Category 5 straight cable
Answer: A

46.  Upon which devices can NAT (Network Address Translation) be used?
A. Hub
B. Bridge
C. Switch
D. Firewall
Answer: D

47.  An administrator is configuring a company Microsoft Exchange server for e-mail services. The Exchange server needs to send e-mail to a partner company that uses a Novell GroupWise e-mail server. What protocol is needed to send e-mail between the two servers?
A. CSNW (Client Service for NetWare)
B. SMTP (Simple Mail Transfer Protocol)
C. IPX/SPX (Internet Packet Exchange/Sequence Packet Exchange)
D. POP3 (Post Office Protocol version 3)
Answer: B

48.  The AV (Anti-Virus) software provides optimum protection when it is installed on all:
A. workstations connected to the Internet
B. servers
C. workstations and servers
D. workstations with disk drives
Answer: C

49.  While configuring a dial-up network on a computer running Windows, which one of the following protocols establishes the connection?
A. HTTP (Hypertext Transfer Protocol)
B. Telnet
C. PPP (Pont-to-Point Protocol)
D. SSH (Secure Shell)
Answer: C

50.  A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
A. Router
B. No additional device needed


C. Another switch
D. A hub
Answer: A