MCQ's For Computer/EC/IT -8




1.      Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails?
A. A striped set array without parity
B. A RAID 10 (Redundant Array of Independent Disks) array
C. A striped set array with parity
D. A duplexed RAID 01 (Redundant Array of Independent Disks)
Answer: B

2.Which of the following tools assess the continuity of a cable?
A. Data analyzer
B. BERT (Bit-Error Rate Test)
C. TDR (Time Domain Reflectometer)
D. Protocol analyzer
Answer: C

3.How many concurrent connections can a Windows 2000 Professional computer support on a single share?
A. 10
B. 20
C. 30
D. 50
Answer: A

4.      A network administrator needs to setup a salesperson laptop to connect to the company network via a secure connection through the Internet. What should be done to the laptop to enable the connection?
A. Install AV (Anti-Virus) software with the latest definitions
B. Install firewall software’
C. Create a PPTP (Pont-to-Pont Tunneling Protocol) connection
D. Install a NetBEUI (Network Basic Input/Output Extended User Interface) protocol
Answer: C

5.      The system administrator needs to connect a server to a 1000BASE-T switch. Which cable is required?
A. Category 3 cable
B. Category 5 cable
C. MMF (Multimode Fiber) optic cable
D. SMF (Single Mode Fiber) optic cable
Answer: B

6.      What happens if the wrong WEP (Wired Equivalent Privacy) key is entered into a wireless device?
A. The network is accessible, but the data will be garbled.
B. Data can be sent but not received.
C. The network is not accessible.
D. The network is only accessible using the SSID (Service Set Identifier).
Answer: C

7.      A company wishes to outsource the installation of an internal web server with access to employees only. Which term best describes this web server?
A. Extranet server
B. VPN (Virtual Private Network) server
C. RADIUS (Remote Authentic Dial-In Service) server
D. Intranet server
Answer: D

8.      Which command in Windows 98 would display adapter names, IP (Internet Protocol) address, subnet mask, gateway, and DNS (Domain Name Service)?
A. winipcfg/all
B. nbtstat –a
C. nslookup –a
D. ifconfig/all
Answer: A

9.      What command is used to view the entire TCP/IP (Transmission Control Protocol/Internet Protocol) configuration on a Windows 98 client?
A. ifconfig/all
B. winipcfg/all
C. ipconfig/TCP (Transmission Control Protocol) release
D. winipcfg/release
Answer: B

10.  A workstation presents an error message to a user. The message states that duplicate IP (Internet Protocol) has been detected on the network. After developing a hypothesis, what should the NEXT step be according to the standard troubleshooting model?
A. Test and observe an action plan
B. Gather facts surrounding the error
C. Implement an action plan
D. Document solution and process
Answer: C

11.  Which command generated the following output?
Active Connections
Proto Local Address Foreign Address State
TCP CompA: 3006 192.168.0.2: Microsoft Established
TCP CompA: 3021 192.168.0.246: HTTP Established
A. nbtstat
B. netstat
C. arp
D. ipconfig
Answer: B

12.  When one connection to a host fails in a full mesh network, which of the following is true?
A. All hosts can communicate
B. No hosts can communicate
C. Half of the host will lose communication
D. Only the two hosts between the failed connection will lose communication
Answer: A

13.  A user complains that they can not longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
A. The DHCP (Dynamic Host Configuration Protocol) server has lost connection to the DNS (Domain Name Service)
B. Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server
C. The WINS (Windows Internet Name Service) is offline
D. The DNS (Domain Name Service) is offline
Answer: B

14.  An administrator has just added a new DNS (Domain Name Service) server to a network and removed the old DNS (Domain Name Service) server. The IP (Internet Protocol) address of the new server is different, and the DHCP (Dynamic Host Configuration Protocol) server was updated to reflect this change. Certain computers can connect to www.abc computers.com while others cannot. Which of the following computers will be able to connect to www.abc computers.com?
A. Any computer that has not released and renewed their DHCP (Dynamic Host Configuration Protocol) lease.
B. Any statically assigned workstation.
C. Any computer that has released and renewed their DHCP (Dynamic Host Configuration Protocol) lease.
D. Any computer that does not have a NIC (Network Interface Card)
Answer: C

15.  Which utility should a technician use to troubleshoot NetBIOS (Network Basic Input/Output System) over TCP/IP (Transmission Control Protocol/Internet Protocol) from Workstation A to Workstation B on a Windows network?
A. ping
B. tracert
C. nbtstat
D. netstat
Answer: C

16.  Which of the following commands will result in the display of the MAC (Media Access Control) address of a given computer?
A. nslookup
B. ipconfig/all
C. nbtstat
D. nbtstat
Answer: B

17.  You work as an administrator at ABC Computer. You receive a call from an end user saying they are unable to log in to the network, although they could yesterday. Overnight, the administrator replaced an ISA (Industry Standard Architecture) Token Ring card with a Token Ring PCI (Peripheral Component Interconnect) NIC (Network Interface Card) in the users computer on a 16 Mbps (Megabits per second) LAN (Local Area Network). What is the NEXT step?
A. Verify the MAU (Multistation Access Unit) is good
B. Verify the processor speed
C. Verify the user password is correct
D. Verify the speed of the NIC (Network Interface Card) matches the network
Answer: D

18.  The Following output is from what diagnostic tool?
1 Router1 (192.168.0.1) 2.0 ms 1.0 ms 2.0 ms
2 Server.net.com (4.150.6.3) 18.0ms12.0ms32.0ms
3 time.net.com (2.12.14.1) 240ms 120ms 300ms
A. traceroute
B. ping
C. ifconfig
D. winipcfg
Answer: A

19.  A business with a DSL (Digital Subscriber Line) modem lost connectivity and the secretary changed one of the network settings to try to fix it. The settings are now:
IP address: 128.210.5.21
Subnet mask: 255.0.0.0
Gateway: 128.210.5.1
DNS server: 128.210.5.11
Given the information above, which of the following identifies the settings that has changed?
A. IP (Internet Protocol) address
B. Subnet mask
C. Gateway
D. DNS (Domain Name Service) server
Answer: B

20.  A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to 192.168.0.254 using a class subnet of 255.255.255.0. DHCP (Dynamic Host Configuration Protocol) errors are occurring. How can the errors be resolved?
A. Change the default subnet to 255.255.0.0 to increase the number of allowable IP (Internet Protocol) addresses to prevent collisions.
B. The machines are holding IP (Internet Protocol) addresses in cache mamory. Reboot to renew IP (Internet Protocol) address.
C. Configure BootP (Boot Protocol) on the server when the IP (Internet Protocol) class subnets are split prior to implementing the scope.
D. Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain controller).
Answer: D

21.  ABC Computers has two 100BASE-TX hubs, Hub A and Hub B. The hubs are connected by a 3 meter (9.84.feet) straight-through patch cable. The hosts on Hub A are unable to communicate with the hosts on Hub B. What can the network administrator do to correct the problem?
A. Install switches instead of hubs
B. Update all clients with Hub A as their default gateway
C. Replace the patch cable that connects Hub A to Hub B with a crossover patch cable
D. Update clients on Hub A as their default gateway and update clients on Hub B as their default gateway
Answer: C

22.  A webpage is hosted on a Linux machine. Users complain that when visiting the web site, they receive a forbidden error message. The system administrator logs onto the Linux server and changes to the directory where the webpage is stored. What should the system administrator do next?
A. Rename the webpage file
B. Change the symbolic link
C. Change the web port to 8080 on the client
D. Change the permissions of the directory
Answer: D

23.  A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
A. They do not have permission to capture other packets.
B. They are connected to a switch when trying to capture packets.
C. The router is blocking the packets to the workstation.
D. They are using an evaluation copy of the software utility
Answer: B

24.  A network administrator supports a LAN (Local Area Network) with ten users wired to a switch. The switch is connected to a router for Internet access. One day, a single user reports being unable to access the Internet. All other users can access the Internet. Which of the following items should the network administrator check to solve the problem?
A. Network card of troubled machine, port on switch that uplinks to router, and patch cable from the troubled machine to switch.
B. Patch cable from troubled machine to switch, port on switch the troubled machine is plugged into, and external interface to router.
C. Network cable of troubled machine, port on switch that troubled machine is plugged into, and patch cable from troubled machine to switch.
D. Port on switch the troubled machine is plugged into, network card of troubled machine, and uplink port on the switch.
Answer: C

25.  The DHCP (Dynamic Host Configuration Protocol) server in Subnet A is removed. The DHCP (Dynamic Host Configuration Protocol) server in Subnet B is set with a DHCP (Dynamic Host Configuration Protocol) addresses. What needs to be done to correct this problem?
A. Install a proxy server on Subnet A
B. Install a DHCP (Dynamic Host Configuration Protocol) relay agent on a server in Subnet B
C. Install a DHCP (Dynamic Host Configuration Protocol) relay agent on the DHCP (Dynamic Host Configuration Protocol) server in Subnet B
D. Install a DHCP (Dynamic Host Configuration Protocol) relay agent on a server in Subnet A
Answer: D

26.  After patching and rebooting a network DHCP (Dynamic Host Configuration Protocol) server, some clients who were able to access resources begin to lose connectivity. What utility can be used to regain connectivity to the network?
A. nbtstat
B. arp
C. tracert/traceroute
D. ipconfig/ifconfig
Answer: D

27.  A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addressed assigned, what problems might exist on the network?
A. There will be no Internet access
B. The computer IP (Internet Protocol) address will change.
C. There should be no problems.
D. There will be a routing loop between the residential gateway and the original router.
Answer: A

28.  Ten workstations numbered 1 through 10 are installed sequentially on a physical bus network. The complete network has failed. Which of the following could have caused the failure?
A. Workstation 3 is powered off.
B. Workstation 4 and 7 use the DLC (Data Link Protocol).
C. A terminator has been removed from the end of the bus trunk cable.
D. A terminator has been installed on the end of the bus trunk cable.
Answer: C

29.  A client has normally been able to access files shared on a remote server. After a firewall was installed on the server, the client can no longer access the files. What should be done to fix the problem?
A. Change the IP (Internet Protocol) address on the client computer
B. Reboot the client computer and try connecting again
C. Ask the system administrator to reboot the server
D. Ask the system administrator to unblock the necessary ports
Answer: D

30.  A user complains that they can no longer attach to a server using its host name; however, they can attach to it using the IP (internet Protocol) address. What is the problem?
A. The server is in the wrong subnet.
B. The server that they are trying to connect to is not registered in DHCP (Dynamic Host Configuration Protocol).
C. The server that they are trying to connect to has lost its registration in DNS (Domain Name Service).
D. The server that they are trying to connect to has WINS (Windows Internet Name Service) enabled.
Answer: C

31.  A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall, FTP (File Transfer Protocol) still does not work. What is the source of the problem?
A. TFTP (Trivial File Transfer Protocol) is not installed.
B. NFS (Network File System) is not installed.
C. Port 20 must also be unblocked.
D. Port 22 must also be unblocked.
Answer: C

32.  A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correctly and the network is up, which of the following will the technician see on the NIC (Network Interface Card)?
A. The amber light is flashing occasionally and the green light is lit steadily.
B. The amber light is flashing continually, the green light is lit steadily, and neither light will be on until data is transferred.
C. The amber light is lit and steady and the green light is flashing continually.
D. The amber light is flashing occasionally, the green light is lit steadily, and neither light will be on until data is transferred.
Answer: A

33.  A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for Internet access. The network administrator has noticed that particular subnet users have complained of downtime. Upon further troubleshooting, the administrator notices that the each day the downtime lasts approximately an hour around midday. The administrator also realizes that this period of downtime is affecting wireless users only. The administrator travels to the troubled subnet around midday and connects using a wired workstation, but a wireless laptop will not connect. The administrator also notices that the WAP (Wireless Access Point) is 802.11g. Which one of the following would be an appropriate action to address this problem?
A. Upgrade all affected computers to a uniform platform running in ad-hoc mode
B. Eliminate any sources of RFI (Radio Frequency Interface) around the WAP (Wireless Access
Point)
C. During the affected time, connect the WAP (Wireless Access Point) directly into the router
D. Change the WAP (Wireless Access Point) and all affected computers to operate in ad-hoc mode
Answer: B

34.  You work as an administrator at ABC Computer. You implement packet filtering on the router between the finance department and the marketing department. The following night, a batch script runs that sends a file from the marketing server to the finance FTP (File Transfer Protocol) server, but it does not work. What should be done?
A. You should make sure port 21 is open on the router.
B. You should change the batch script to run during the day.
C. You should make sure ICMP (Internet Control Message Protocol) is enabled on the router.
D. You should set the batch script to run with elevated privileges.
Answer: A

35.  Which of the following are classified as Layer 2 devices?
A. Hubs, switches and routers
B. Hubs, switches and bridges
C. Switches, bridges, and NICs (network Interface Card)
D. Switches, bridges and routers
Answer: C

36.  Which of the following options describes a valid reason for subnetting a network?
A. To separate the network into smaller broadcast domains
B. To minimize TCP/IP (Transmission Control Protocol/Internet Protocol) conflicts
C. To convert from a DHCP (Dynamic Host Configuration Protocol) to static addresses
D. To allow reception of multicast telecom traffic
Answer: A

37.  All of the following are true statements about private IP (Internet Protocol) addressing except:
A. private IP (Internet Protocol) addresses may be duplicated across many networks without causing address conflicts.
B. private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
C. private IP (Internet Protocol) addresses allow organizations to share a single public IP (Internet Protocol) address.
D. large networks may be broken into several private IP (Internet Protocol) networks.
Answer: B

38.  All of the following options transmit data over a modem except:
A. POTS/PSTN (Plain Old Telephone System/Public Switched Telephone Network).
B. xDSL (Digital Subscriber Line).
C. cable.
D. T1 (T-Carrier Level 1).
Answer: D

39.  RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
A. Verification
B. Encryption
C. Addressing
D. Tunneling
Answer: A

40.  Which proved NetBIOS (Network Basic Input/Output System) name to IP (Internet Protocol) address resolution?
A. ipconfig
B. LMHOSTS
C. DNS (Domain Name Services)
D. DHCP (Dynamic Host Configuration Protocol)
Answer: B

41.  Which address is within an IANA (Internet Assigned Numbers Authority) private range?
A. 19.109.220.103
B. 188.209.75.46
C. 192.168.54.10
D. 216.127.51.121
Answer: C

42.  Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
A. 802.5
B. 802.1x
C. 802.3
D. 802.4
Answer: B

43.  Which one of the following is a class A IP (Internet Protocol) address?
A. 172.168.12.4
B. 18.12.4.1
C. 169.254.254.254
D. 255.255.255.0
Answer: B

44.  Which layer of the OSI (Open Systems Interconnect) models handles formatting and code conversations?
A. Transport
B. Data Link
C. Application
D. Presentation
Answer: D

45.  A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
A. 20
B. 21
C. 23
D. 25
Answer: D



  1. Which type of connector does a 10BaseT Ethernet cable use?
a.       BNC
b.      RJ-45
c.       RJ-11
d.      MSAU
Ans:  B
  1. What is the default subnet mask for Class C network?(multiple choice)
a.       255.0.0.0
b.      255.255.0.0
c.       255.255.255.0
d.      /24

Ans: C and D
  1. Which of the following is the standard adopted for Ethernet CSMA/CD by IEEE Committee?
a.       802.2
b.      802.1d
c.       802.3
d.      802.5

Ans: C
  1. Disk Striping with distributed Parity corresponds to which RAID level?
a.       RAID 0
b.      RAID1
c.       RAID3
d.      RAID5

Ans: D
  1. Which of the following are class C IP address
a.       10.10.14.118
b.      135.23.112.57
c.       191.200.199.199
d.      204.67.118.54

Ans: D