Q.1

Which of the following TCP/IP protocol is used for remote terminal connection service?

  • TELNET
  • FTP
  • RARP
  • UDP
  • None of the above
Q.2

You are working with a network that is 172.16.0.0 and would like to supporthosts per subnet. What subnet mask should you use?

  • 255.255.192.0
  • 255.255.224.0
  • 255.255.240.0
  • 255.255.248.0
  • 255.255.252.0
Q.3

After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration?

  • Ping the broadcast address
  • Ping the Microsoft Web site
  • Ping a distant router.
  • Ping the address of the local host
  • None of the above
Q.4

Most data communications involving telegraph lines use:

  • simplex lines
  • wideband channels
  • narrowband channels
  • dialed service
  • None of the above
Q.5

Which of the following statement is incorrect?

  • The transport layer provides for any format, translationer code conversion necessary to put the data into an intelligible format.
  • The presentation layer transforms information from machine format to the understandable format.
  • The data link layer handles the transfer of data between the ends of a physical link.
  • All of the above
  • None of the above
Q.6

The loss in signal power as light travels down the fiber is called

  • attenuation
  • propagation
  • scattering
  • interruption
  • None of the above
Q.7

An example of digital, rather than analog, communication is

  • DDD
  • DDS
  • WATS
  • DDT
  • None of the above
Q.8

The basic Ethernet design does not provide

  • access control
  • addressing
  • automatic retransmission of a message
  • multiple virtual networks
  • None of the above
Q.9

Which of the following services dynamically resolves NetBIOS-to-IP resolution?

  • DNS
  • DHCP
  • WINS
  • LMHOSTS
  • None of the above
Q.10

Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?

  • one bit or any odd number of bits inverted in a block of data during transmission
  • two bits or any even number of bits inverted in a block during transmission
  • one bit or any odd number of bits inverted in a byte during transmission
  • two bits or any even number of bits inverted in a byte during transmission
  • None of the above
Q.11

Which command-line tool is included with every Microsoft TCP/IP client?

  • DHCP
  • WINS
  • PING
  • WINIPCFG
  • None of the above
Q.12

Sales persons and other employees of the company who spend much of their time away from their offices but keep in touch with their company's microcomputers or main frame computers over telephone lines are called

  • field workers
  • telecommuters
  • teleprocessors
  • company directors
  • None of the above
Q.13

What is the term used to describe addresses available on a DHCP server?

  • Pools
  • Scopes
  • Ranges
  • Notes
  • None of the above
Q.14

The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer

  • An additional token is added for every 1,000 nodes
  • The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500
  • The network becomes less efficient
  • After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
  • The network becomes more efficient
Q.15

With telecommunications and a personal computer you can

  • "download" free public domain programs
  • send letters to be printed and delivered by the post office
  • order goods at a substantial discount
  • All of the above
  • None of the above
Q.16

A devices that links two homogeneous packet-broadcast local networks, is

  • gateway
  • repeater
  • bridge
  • hub
  • None of the above
Q.17

Baseband is

  • transmission of signals without modulation
  • a signal all of whose energy is contained within a finite frequency range
  • the simultaneous transmission of data to a number of stations
  • All of the above
  • None of the above
Q.18

Networks where end user workstations are tied to LAN servers to share resources and application processing.

  • Internetworked enterprise
  • Information super highway
  • Business applications of telecommunications
  • Client/Server networks
Q.19

A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the maximum possible transmission rate?

  • 1.5 Mbaud/sec
  • 6 Mband/sec
  • 12 Mbaud/sec
  • 24 Mbaud/sec
  • None of the above
Q.20

A protocol is a set of rules governing a time sequence of events that must take place

  • between peers
  • between modems
  • between an interface
  • across an interface
  • None of the above
Q.21

A 2000-character text file has to be transmitted by using a 1,baud modem. Can you tell how long will it take?

  • 2 seconds
  • 20 seconds
  • 120 seconds
  • 12 seconds
  • None of the above
Q.22

Which utility is useful for troubleshooting NetBIOS name resolution problems?

  • NBTSTAT
  • Netstat
  • PING
  • Hostname
  • None of the above
Q.23

The EIA-interface has _____ pins.

  • 20
  • 24
  • 25
  • 30
Q.24

You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign?

  • 255.255.224.0
  • 255.255.240.0
  • 255.255.248.0
  • 255.255.252.0
  • 255.255.255.255
Q.25

Modulation is the process of

  • sending a file from one computer to another computer
  • converting digital signals to analog signals
  • converting analog signals to digital signals
  • echoing every character that is received
  • None of the above
Q.26

When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system?

  • Security procedure
  • Safeguard procedure
  • Identification procedure
  • Log-on procedure
  • None of the above
Q.27

Operating system functions may include

  • input/output control
  • virtual storage
  • multiprogramming
  • All of the above
  • None of the above
Q.28

How many OSI layers are covered in the X.standard?

  • two
  • three
  • seven
  • six
  • None of the above
Q.29

Phase shift keying (psk) method is used to modulate digital signals atbps usinglevels. Find the line signaling speed (i.e., modulation rate)

  • 2400 bands
  • 1200 bands
  • 4800 bands
  • 9600 bands.
Q.30

An example of a medium-speed, switched communications service is

  • Series 1000
  • Dataphone 50
  • DDD
  • All of the above
  • None of the above
0 h : 0 m : 1 s