General HNS Level - IV Question & Answer
General HNS Level - IV Question & Answer
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 1
Dandi Boru College Shambu Campus
7.
Department of Hardware and Networking Service
Which of the following are connectionless protocols.
A. TCP C. IPX
B. SPX D. UDP
Answer: D
8. How can Jim Herr, a client on an NT TCP/IP network see which remote hosts are currently
connected using NBT
A. Use NBTSTAT C. Use NSLOOKUP
B. Use NETSTAT D. Use IPCONFIG
Answer: A
9. You are setting up a new Windows 98 workstation on your network, and your DHCP server
provides all of the normal TCP/IP configuration information. What must you do to configure the IP
address on the workstation after you add the TCP/IP protocol
A. The DHCP option is enabled automatically, and the server will auto-configure everything.
B. Find out what the subnet mask on your network is, and add this information only.
C. Manually enter an IP address that is not in use on the network.
D. Put the address of the router in the default gateway, and put all 0s in the IP field.
Answer: A
10. Which of the following is considered a Network Attached Storage device
A. A 60 GB DAT tape drive attached to the Network Server
B. A file server with special software that is at a separate location from the departmental file
server
C. In a Windows NT environment, it would be the Backup Domain Controller
D. A high speed specialized sub-network attached to the enterprise
Answer: B
11. Credit card size, designed for notebooks, self-configuring, and non-OS dependent describes which
PC bus architecture
A. PCI C. EISA
B. ISA D. PCMCIA
Answer: D
12. What protocol is used between E-Mail servers
A. HTTP C. SNMP
B. POP3 D. SMTP
Answer: D
13. When installing a manually configured adapter, what information must you know to avoid resource
conflicts
A. IRQ C. Base I/O port address
B. Number of bits D. Base Memory address
Answer: A, C & D
14. Which of the following OSI layers is responsible for identifying communications partners
A. Application C. Network
B. Session D. Presentation
Answer: A
15. A broadcast message is an example of which dialog control method
A. Half duplex C. Broadband
B. Baseband D. Simplex
Answer: D
16. Which of the following are used to resolve Windows NetBIOS names to IP addresses
A. DNS C. LMhosts file
B. WINS D. Hosts
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 2
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
Answer: B, C
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 3
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
C.Co-axial D. UTP
Answer: D
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 4
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
Answer: A
36. AUI connectors are commonly associated with which of the following items?
A. A Vampire Tap C. 10Base2
B. Fiber Optic Cable D. Wireless Networks
Answer: A
37. A hub works in conjunction with which of the following network topologies?
A. Ring C. Bus
B. Star D. Mesh
Answer: B
38. Which of the following is a correct MAC address?
A. 190. 168. 80. 1 C. 08:34:FE:4C:F2:54
B. www. certyourself. com D. G2:G3:23:87:GG
Answer: C
39. A Hub operates at which of the following layers of the OSI model?
A. Physical C. Transport
B. Session D. Application
Answer: A
40. Which of the following devices operate at the Data Link layer of the OSI model?
A. A Hub C. A Switch
B. A NIC D. A Router
Answer: C
41. A Router operates in which layer of the OSI model?
A. The Physical Layer C. The Transport Layer
B. The Data Link Layer D. The Network Layer
Answer: D
42. A Network Interface Card operates at the Network Layer of the OSI model.
A. True
B. False
Answer: B
43. Which of the following is the correct order of the OSI model from bottom to top?
A. Application, Presentation, Session, Transport, Network, Data Link, Physical
B. Physical, Network, Data Link, Session, Transport, Application, Presentation
C. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. Application, Session, Presentation, Transport, Network, Data Link, Physical
Answer:C
44. What is the maximum speed of 10Base5 Ethernet cable?
A. 100 Mbps C. 50 Mbps
B. 500 Mbps D. 10 Mbps
Answer: D
45. 100Base-FX uses which of the following types of cable?
A. Fiber Optic C. Coax
B. Unshielded Twisted Pair D. Shielded Twisted Pair
Answer: A
46. Which of the following TCP/IP protocols is used to communicate between a Web Browser and a
A. SMTP C. UDP
B. HTTP D. POP3
Answer: B
47. Which of the following layers of the OSI model does a Bridge operate in?
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 5
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
A.The Data Link Layer C. The Transport Layer
B.The Network Layer D. The Session Layer
Answer: A
48. While reviewing the security logs for your server, you notice that a user on the Internet has
attempted to access your internal mail server. Although it appears that the user's attempts were
unsuccessful, you are still very concerned about the possibility that your systems may be
compromised. Which of the following solutions are you most likely to implement?
A. A firewall system at the connection point to the Internet
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication
Answer: A
49. A server has two NIC cards installed. The first one uses IRQ 10 and I/O range of B800-B81F. The
second uses IRQ 10 and I/O range of D700-D80A. What action, if any, should be taken?
A. No action is required.
B. Locate any available IRQ to resolve the IRQ conflict.
C. Locate any available I/O range to resolve the I/O conflict.
D. Change the I/O of the second NIC to B800-B81F. Answer: B
50. Which of the following IEEE 802 standards pertain to token ring?
A. IEEE 802. 5 C. IEEE 802. 2
B. IEEE 802. 3 D. IEEE
Answer: A
51. Protocol that is often used to facilitate communications with an IBM mainframe?
A. NetBEUI
B. RIP
C. DLC
Answer: C
52. Which of these protocols provide fast connectionless communications that relies on upper layers of
the OSI model for error correction?
A. TCP (Transmission Control Protocol)
B. UDP (User Datagram Protocol)
C. SPX
Answer: B
53. _______ can be used to reduce traffic bottlenecks in a NetBEUI network
A. Bridge
B. Router
C. Gateway
Answer: A
54. You have just finished the installation of two computers on a 28 computer network using Novell's
IPX/SPX. Both computers initialize with no error messages yet they cannot contact other computers
on the network. All other computers are functioning normally. You probably have an ___?
A. incorrect IRQ
B. incorrect frame type
C. invalid IP setting
Answer: B
55. Uses amplifiers to regenerate analog signals?
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 6
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
A.baseband
B.broadband
C.fiber-optic
Answer: B
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 7
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
C. incorrect frame type
Answer: B
63. The two key components of a digital signature include the secure hash algorithm and a ___?
A. blowfish value
B. certificate authority
C. IPsec
Answer: B
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 8
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
A. registry
B. boot files
C. all of the above
Answer: C
72. Equipment that is designed to help identify breaks and shorts in cables?
A. TDR
B. performance monitor
C. SNMP
Answer: A
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 9
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
C. X. 25
Answer: B
80. The only files on a Win 2000 Prof Emergency Repair Disk (ERD) are autoexec. nt, config. nt, and
setup. log?
A. True
B. False
Answer: A
81. OSI layer responsible for mail and file transfers?
A. transport
B. data link
C. application
Answer: C
82. A protocol that functions at the network layer of the OSI model?
A. TCP
B. IP
C. SPX
Answer: B
83. A major advantage of ___ in an NT network is centralized security and administration?
A. user-level security
B. share-level security
C. RAID 5
Answer: A
84. OC-1 has a transmission rate that is close to ___?
A. T-1
B. T-3
C. ISDN
Answer: B
85. The maximum number of populated segments allowed in an Ethernet network?
A. 3
B. 4
C. 5
Answer: A
86. Using the TCP/IP protocol if the destination of the packet is outside the subnet then the packet is
sent to the ___?
A. switch
B. bridge
C. default gateway
Answer: C
87. Entry in DNS to identify your mail server?
A. IDC
B. TU
C. MX
Answer: C
88. Topology which is the least expensive to install?
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 10
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
A. ring
B. star
C. bus
Answer: C
89. Utility which can be used to identify bottlenecks in the network?
A. PING
B. WINIPCFG
C. TRACERT
Answer: C
90. What is the first octet range for a class A IP address?
A. 1- 126
B. 1- 128
C. 1- 191
Answer: A
91. After you setup the IP address and subnet mask your FIRST test should be with ___?
A. tracert to a known good server
B. ping 127. 0. 0. 1
C. ping another computer on your segment
Answer: B
92. NetBIOS computer names can have up to ___ characters?
A. 256
B. 15
C. 20
Answer: B
93. Refers to the part of the network that is separated by routers, bridges, or switches?
A. partition
B. node
C. segment
Answer: C
94. Data is organized into FRAMES for transmission at this OSI level?
A. physical
B. data-link
C. network
Answer: B
95. 10Base2 coaxial has a limit of ___ computers per segment?
A. 2
B. 30
C. 100
Answer: B
96. Cable used for Arc Net networks?
A. RG-58
B. RG-59
C. RG-62
Answer: C
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 11
Dandi Boru College Shambu Campus
97.
Department of Hardware and Networking Service
A Class A IP address uses the last ___ octet(s) for the host ID. The host ID is the unique part and
identifies the individual user and part of the reason 50% of all IP addresses are Class A?
A. one
B. two
C. three
Answer: C
98. Of the three (3) RAID levels used by a Win 2000 server choose the one(s) that is/are fault tolerant?
A. 0, 1, and 5
B. 1 and 5
C. 5
Answer: B
99. The best method to restore the latest copy of the registry in a Win 2000 Server is to select the ___?
A. Emergency Repair Disk (ERD)
B. Recovery Console
C. Last Known Good Configuration
Answer: C
100. What routing protocol counts hops to the destination along multiple paths to determine the most
efficient route?
A. ARP
B. DLC
C. RIP
Answer: C
101. The source and destination addresses are stored in the ___ of a packet?
A. data
B. trailer
C. header
Answer: C
102. Most commonly used type of modem?
A. synchronous
B. asynchronous
C. external
Answer: B
103. Operates at the network layer of the OSI model?
A. bridge
B. gateway
C. router
Answer: C
104. Disk duplexing (RAID1) requires a minimum of ___?
A. 2 hard drives and 1 controller
B. 3 hard drives and 2 controllers
C. 2 hard drives and 2 controllers
Answer: C
105. Organization responsible for the OSI model?
A. ANSI
B. IEEE
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 12
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
C. ISO
Answer: C
106. Which topology uses the least amount of cabling?
A. star
B. bus
C. ring
Answer: B
107. According to RFC 1918 this range of Class A IP addresses are reserved for private intranets and are
not supposed to be used on the internet (where x is any number from 1 to 254)?
A. 10. x. x. x
B. 20. x. x. x
C. 30. x. x. x
Answer: A
108. Cable classification for 10Base5 thicknet coaxial?
A. RG-8
B. RG-10
C. RG-58
Answer: A
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 13
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
Answer: B
114. Prescribes the greatest packet octet length that can be transmitted?
A. SAP
B. subnet mask
C. MTU
Answer: C
115. The default protocol on NT4 or Win 2000 servers?
A. IPX/SPX
B. NWLink
C. TCP/IP
Answer: C
116. A standard security algorithm developed in 1975 that uses 56-bit symmetric key encryption?
A. DES
B. EAP
C. PAP
Answer: A
117. Win 2000 security service that maintains permissions and passwords used to logon?
A. MMPE
B. CHAP
C. SAM
Answer: C
118. A voice grade demand priority standard developed by HP that is capable of 100Mbps
transmissions?
A. 100VG-AnyLAN
B. 100BaseT
C. 100BaseFX
Answer: A
119. PPP is part of the ___ OSI layer?
A. physical
B. data link
C. network
Answer: B
120. Network connection device that is capable of sending packets along multiple paths depending on
which path is the most efficient?
A. bridge
B. router
C. all of the above
Answer: B
121. Processes data using applications stored on its hard drive and sends the results back to the client.
Saving the client the extra hard drive space he would need for the application as well as the CPU
processing time?
A. file server
B. print server
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 14
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
C. application server
Answer: C
122. The static HOSTS text file used on UNIX systems that requires manual entries by the administrator
was the precursor of ___. Today the HOSTS file system finds use mainly in maximum security
operations which don't want anything changed automatically?
A. WINS
B. LMHOSTS
C. DNS
Answer: C
123. The minimum category of UTP cable that will meet the 10BaseT standard?
A. cat2
B. cat3
C. cat5
Answer: B
124. The easiest protocol to setup?
A. NetBEUI
B. NWLink
C. TCP/IP
Answer: A
125. Displays data on hardware components such as memory, CPU, and the hard drive in a chart or
graph which describes how these devices are operating?
A. protocol analyzer
B. performance monitor
C. network monitor
Answer: B
126. The OSI layer responsible for name recognition, security logins, and synchronization of the
connection?
A. presentation
B. application
C. session
Answer: C
127. Has twenty-four 64 Kbps channels for a total of 1. 544 Mbps throughput?
A. T3
B. T1
C. X. 25
Answer: B
128. Microsoft recommends that the %CPU usage should not be above 90% for a single CPU or above
__% for multiple processors for any extended period?
A. 50
B. 70
C. 90
Answer: A
129. Your customer's computer is loaded with peripherals and is using COM1, COM2, LPT5, and LPT7.
You install the NIC on IRQ3 and have a conflict. Which of the following is the NIC conflicting
with?
A. the printer
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 15
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
B. COM1
C. COM2
Answer: C
130. The most widely used protocol?
A. NetBEUI
B. NWLink
C. TCP/IP
Answer: C
131. Can be thought of as a "hop counter" determining how many hops it takes along various paths to the
destination and then telling the router which is the one with the least number of hops which most of
the time is the quickest route?
A. DLC
B. SAP
C. RIP
Answer: C
132. Apple's Local Talk protocol has a ___ computer limit?
A. 8
B. 32
C. 128
Answer: B
133. Ensures that one device is NOT overwhelmed by another with a data transmission?
A. SMB
B. CRC
C. flow control
Answer: C
134. You are setting up a 10Base2 Ethernet network for a client with three segments. There are 20
computers in each segment. How many terminators will you need for this network?
A. 1
B. 2
C. 6
Answer: C
135. Used to connect different media types but cannot filter or segment traffic?
A. bridge
B. hub
C. router
Answer: B
136. The most efficient way to control security in a client/ server network is to assign permissions to
___?
A. each shared resource
B. directories
C. groups
Answer: C
137. Which of the following IRQs can you set your NIC to without usually causing a conflict?
A. 4
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 16
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
B. 7
C. 10
Answer: C
138. Arc Net is one of the oldest protocols used. What year was it invented?
A. 1967
B. 1977
C. 1987
Answer: B
139. OSI layer that determines whether the transmission is a full or half-duplex transfer?
A. presentation
B. session
C. application
Answer: B
140. Compensates for a hard drive failure on an NT server?
A. RAID
B. WINS
C. DHCP
Answer: A
141. In addition to DNS, DHCP, and Active Directory to boot from an RIS server in Win 2000 requires a
___ compliant NIC?
A. RAS
B. PXE
C. SAP
Answer: B
142. The most popular dial-up protocol?
A. SLIP
B. UDP
C. PPP
Answer: C
143. The standard for several hubs connected in a linear fashion (token-bus)?
A. 802. 3
B. 802. 4
C. 802. 5
Answer: B
144. The minimum number of disks required to implement a fault tolerant RAID system?
A. 1
B. 2
C. 3
Answer: B
145. For increased security Win 2000 enables encryption of files or folders on ___ volumes?
A. FAT32
B. NTFS
C. either FAT32 or NTFS
Answer: B
146. Characteristic of the TCP protocol?
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 17
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
A. fast but unreliable delivery
B. best effort delivery
C. assurance of packet delivery
Answer: C
147. Cable type that offers the least resistance to EMI?
A. coaxial
B. fiber-optic
C. UTP
Answer: C
148. Novell introduced TCP/IP as its default protocol in NetWare ___?
A. 3. x
B. 4. x
C. 5. x
Answer: C
149. This OSI layer packages bits into frames?
A. physical
B. data-link
C. network
Answer: B
150. Protocol used in Win 2000 to print to a URL on the internet. It requires either Peer Web Services or
an IIS server to be installed?
A. IPP
B. SAP
C. IPsec
Answer: A
151. Novell added ___ which could bind many protocols to a NIC starting with NetWare 4. 0?
A. NDIS
B. TSM
C. ODI
Answer: C
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 18
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
A. setup. exe
B. winnt. exe
C. win. com
Answer: B
155. OSI layer responsible for error checking frames and adding MAC addresses to its tables?
A. presentation
B. transport
C. data-link
Answer: C
156. The initial formation of the packet header is started at this OSI level?
A. Application
B. Session
C. Physical
Answer: A
157. For a Class C IP address the first ___ octet(s) are reserved for the network ID?
A. 1
B. 2
C. 3
Answer: C
158. Utility used to check SMTP connectivity?
A. SNMP
B. LMHOSTS
C. Telnet
Answer: C
159. Prevents bounce-back of signals in a 10Base2 network?
A. T-connector
B. BNC
C. terminator
Answer: C
160. A set of "rules" for network transmissions?
A. topologies
B. protocols
C. gateways
Answer: B
161. What bridging protocol can be used to prevent bridge looping when more than one physical path
exists between two or more network segments?
A. The Spanning Tree Protocol C. The Transparent Tree Protocol
B. The Inverted Tree Protocol D. The Domain Name Tree Protocol
Answer: A
162. What are the two methods switching hubs use to transport data between devices?
A. Forwarding C. Active
B. Cut-through D. Store-and-forward
Answer: B, D
163. What happens when a device is disconnected from the middle of a BUS network?
A. The hub will propagate error messages to the rest of the network
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 19
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
B.All devices on the network will fail
C.The Server will stop responding to that device
D.Data will not be able to get to devices on the other side of this device
Answer: A
164. What are some advantages of a Client/Server network over a Peer-to-Peer network?
A. Performance is better on a Peer-to-Peer C. Security is better on a Peer-to-Peer
B. Security is better on a Client/Server D. Client/Server is easier to administrate
Answer: E, D
165. Name two protocols in the TCP/IP suite that function at the Transport layer of the OSI model.
A. TCP C. UDP
B. IP D. SNMP
Answer: C, A
166. IP is responsible for sorting and _________________ of packets.
A. Addressing C. Organizing
B. Holding D. Delivery
Answer: D
167. What is the first octet range for a class B IP address?
A. 127-191 C. 192-223
B. 128-191 D. 1-127
Answer: B
168. What is the first octet range for a class C IP address?
A. 1-126 C. 192-225
B. 128-191 D. 192-223
Answer: D
169. What method of transporting data with a switch is fastest?
A. Store-and-forward C. Routing
B. Cut-through D. Spanning Tree
Answer: B
171. The inner core of a coaxial cable that carries the signals is made of ___?
A. aluminum
B. copper
C. zinc
Answer: B
172. Active hubs can ___?
A. route the signal using the most efficient path
B. send an acknowledgement once the packet is received
C. regenerate the signal like repeaters
Answer: C
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 20
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
Answer: C
175. A packet in a TCP/IP network whose destination is outside the local network goes to the ___?
A. TCP transceiver
B. default gateway
C. IP subnet
Answer: B
176. One important difference between routers and bridges is that when a bridge can't locate the
destination address in its table it ___?
A. sends the transmission to the default gateway
B. dumps the packet
C. broadcasts the transmission to all ports
Answer: C
177. Novell's NetWare 5. 0 was developed in part from the ___ standard?
A. ATM
B. NDIS
C. X. 500
Answer: C
178. The freely distributed open source UNIX based operating system that has gained in popularity
recently?
A. XP
B. Linux
C. DLC
Answer: B
179. The term used to describe the physical layout of a network?
A. protocol
B. server
C. topology
Answer: C
180. Is the interface between the NIC drivers and MAC sublayer?
A. WINS
B. NDIS
C. DLC
Answer: B
181. Which topology provides for equal access to the network for all computers?
A. star
B. bus
C. ring
Answer: C
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 21
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
B. network
C. transport
Answer: C
184. The IEEE specification for a token ring network?
A. 802. 3
B. 802. 5
C. 802. 6
Answer: B
185. RIP counts hops (or routers it encounters) as the packet travels to its destination.
Another name for a hop is a ___?
A. interval
B. sequence
C. metric
Answer: C
186. A protocol that functions at the transport layer of the OSI model?
A. IP
B. IPX
C. SPX
Answer: C
187. How many bits are there in an IP address?
A. 64
B. 32
C. 128
Answer: B
188. An easy to configure, fast, and efficient protocol recommended for small no routable networks?
A. NetBEUI
B. TCP/IP
C. X. 25
Answer: A
189. What type of troubleshooting device examines the network at the packet level?
A. TDR
B. VOM
C. protocol analyzer
Answer: C
190. Resolves domain names into IP addresses?
A. DHCP
B. DNS
C. WINIPCFG
Answer: B
191. ___ uses data encryption to secure data being transmitted over the internet so even if it is
intercepted it can't be read without knowing the key?
A. DLC
B. SSL
C. ARP
Answer: B
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 22
Dandi Boru College Shambu Campus
192.
Department of Hardware and Networking Service
Device drivers can be disabled in Win 2000 Prof in Device Manager or by using the ___?
A. ERD
B. Recovery Console
C. RDISK
Answer: B
193. Smart Cards in Win 2000 use the ___ RAS authentication protocol for security?
A. PAP
B. MSCHAP
C. EAP
Answer: C
194. Because of its low overhead this is the fastest of these protocols?
A. TCP/IP
B. NWLink
C. NetBEUI
Answer: C
195. The ERD made in the Win 2000 Server Backup utility contains the files needed to boot the
computer?
A. True
B. False
Answer: B
196. Your client has a 10Base2 Ethernet network which is using 160m of RG-58A/U cable and two 50
ohm terminators that are both grounded. What is wrong with his network?
A. the terminators should be 93 ohms
B. he should be using RG-59/U cable
C. only one terminator should be grounded
Answer: C
197. Of the following the one that is NOT an algorithm that determines the shortest path for routers?
A. SAP
B. RIP
C. OSPF
Answer: A
198. The most common topology in use today among corporate users?
A. bus
B. ring
C. star-bus
Answer: C
199. Uses a 93 ohm resistor?
A. RG-62
B. RG-58
C. RG-59
Answer: A
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 23
Dandi Boru College Shambu Campus
201.
Department of Hardware and Networking Service
Analog transmissions with multiple frequencies such as cable television signals use ___?
A. baseband
B. broadband
C. multiband
Answer: B
202. Network device which cannot be used to filter traffic by segmenting a network?
A. bridge B. hub C. switch
Answer: B
203. RAID can be used in these network operating systems?
A. NT
B. Netware
C. all of the above
Answer: C
204. When multiple protocols are used in a network ___ should always be placed at the top of the
binding order?
A. TCP/IP
B. IPX/SPX
C. the one most frequently used
Answer: C
205. The standard cabling type used in AppleTalk and Token Ring?
A. UTP
B. STP
C. RG-58A/U
Answer: B
206. Arrange these WAN technologies in chronological order beginning with the oldest?
A. X. 25, ISDN, ATM
B. ISDN, X. 25, ATM
C. ATM, ISDN, X, 25
Answer: A
207. A crossover cable can be used to connect?
A. a hub to a hub
B. a computer to a computer
C. all of the above
Answer: C
208. The RJ-45 connector used in UTP networks has ___ wires?
A. 2 pairs or 4
B. 4 pairs or 8
C. 6 pairs or 12
Answer: B
209. Displays the IP configuration information on a Win NT computer?
A. IPCONFIG
B. WINIPCFG
C. ARP
Answer: A
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 24
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
Answer: B
211. The IEEE 802standards operate at these layers of the OSI model?
A. network and transport
B. session and presentation
C. physical and data link
Answer: C
212. Can be used to show only one IP address for multiple users on the subnet?
A. proxy server
B. DHCP server
C. DNS server
Answer: A
213. What must be configured in TCP/IP for two computers on the same segment to communicate with
each other?
A. IP address and subnet mask
B. default gateway
C. all of the above
Answer: A
214. The Windows NetBIOS name resolution protocol?
A. DNS
B. WINS
C. NDIS
Answer: B
215. The IEEE standard for wireless networks?
A. 802. 2
B. 802. 11
C. 802. 8
Answer: B
216. SLIP supports ___?
A. TCP/IP
B. NetBEUI
C. all of the above
Answer: A
217. The proposed IPv6 standard is designed to dramatically extend the present limit of 4 billion IP
addresses by using ___ bits instead of the present 32 bit IP addresses in use today?
A. 64 bit
B. 128 bit
C. 256 bit
Answer: B
218. You are installing cables for an Ethernet network in an office. The office manager doesn't want the
media hanging in the crawl spaces and drop ceiling and wants you to share an existing conduit that
already has telephone cables to hide the network cables you are installing. The cable segments will
not be over 100 m. Which type of media should you choose?
A. coaxial
B. UTP
C. fiber optic
Answer: C
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 25
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
B. 2. 5 Mbps
C. 100 Mbps
Answer: B
220. Besides Token Ring ___ also uses tokens?
A. ArcNet
B. FDDI
C. all of the above
Answer: C
221. Running performance monitor your CPU usage averages 45% except when you load an application
and it surges to 100%. Is there a problem?
A. yes, your CPU needs an upgrade or multiple CPUs may have to be installed
B. yes, but it is not the CPU, you need more RAM
C. no, it’s normal for the %usage to surge when loading an application
Answer: C
222. Interface between the computer and POTS?
A. ATAPI
B. SONET
C. TAPI
Answer: C
223. The following protocols are supported by RAS?
A. TCP/IP
B. NetBEUI
C. all of the above
Answer: C
224. Which architecture is recommended under high network utilization of up to 70% or 80%?
A. Ethernet bus
B. Token Ring
C. DLC
Answer: B
225. A token-ring network has a maximum limit of ___ computers?
A. 1024
B. 260
C. 512
Answer: B
226. Dial-up protocol used when a secure connection is desired?
A. PPP
B. SLIP
C. PPTP
Answer: C
227. Your IP address is 135. 72. 14. 43. What portion of this IP address identifies your network ID?
A. 135
B. 135. 72
C. 135. 72. 14
Answer: B
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 26
Dandi Boru College Shambu Campus
228.
Department of Hardware and Networking Service
Allows users to connect to a remote network with a PPP dial-up connection?
A. RAS
B. SAP
C. SONET
Answer: A
229. Which of the following protocols need to be installed on your client's NT system before DHCP and
DNS can be enabled?
A. TCP/IP
B. IPX/SPX
C. NetBEUI
Answer: A
230. A router uses ___ addressing to choose its path?
A. physical
B. logical
C. system
Answer: B
231. A ___ is used to connect two pieces of 10Base2 coaxial cable together?
A. T-connector
B. barrel connector
C. patch cable
Answer: B
232. One reason the ATM WAN protocol is faster than Frame Relay is because its packets are a ___ size
which allows them to be switched and routed more easily?
A. variable
B. fixed
C. compressed
Answer: B
233. SQL is used to ___?
A. access databases
B. setup the default gateway
C. identify a defective NIC
Answer: A
234. Which of the following is a routable protocol?
A. LAT
B. NWLink
C. DLC
Answer: B
235. Uses token passing?
A. Frame Relay
B. ArcNet
C. ATM
Answer: B
236. For Cat 5 UTP, patch cables from the wall outlet to the computer can be a maximum of ___ m?
A. 1
B. 3
C. 10
Answer: B
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 27
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
237. The static text file ___ and DNS contain similar names and IP addresses?
A. LMHOSTS
B. HOSTS
C. WINS
Answer: B
238. Increases the data rate of modems?
A. encryption
B. compression
C. synchronization
Answer: B
239. Wireless technology commonly used to connect workstations that are all located in a single room?
A. IrDA
B. microwave
C. SONET
Answer: A
240. Your customer has a client/ server Ethernet network consisting of a server and 225 computers
running Win NT4. What kind of security would you recommend to him for centralized control of
access to files and directories on the network?
A. use a password for each file and groups for each directory
B. use a password for each file and directory shared
C. setup groups of shared resources and users who have access to these groups
Answer: C
241. Characteristic of an IEEE 802. 3 10BaseT Ethernet network?
A. BNC T-connectors
B. RJ-11
C. UTP
Answer: C
242. You suspect a faulty NIC is causing a broadcast storm in a network. What troubleshooting tool
would you use to locate which computer has the defective NIC?
A. VOM
B. protocol analyzer
C. TDR
Answer: B
243. A dial-up protocol that does not support automatic IP addressing using DHCP?
A. PPP
B. DLC
C. SLIP
Answer: C
244. Of the two types of routers the one that uses the discovery process to create its routing table?
A. static
B. dynamic
C. multiplexed
Answer: B
245. Your client's NT server has been having trouble booting. Where should you look first for some
A. performance monitor
B. event viewer
C. SNMP
Answer: B
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 28
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
246. Another fast non-routable protocol with low overhead developed by DEC?
A. ATM
B. LAT
C. SPX
Answer: B
247. You are hired to setup a 100Mbps Ethernet network for a client in an office that already has cat 3
UTP installed. Your client wants to keep the costs to a minimum but needs the 100Mbps
throughput. What should you recommend?
A. keep the existing cable but purchase 100Mbps hubs
B. keep the existing cable but use 100Mbps patch cable from the wall outlet
C. new cat 5 UTP and if not already installed 100 Mbps hubs and 100 Mbps NICs
Answer: C
248. Your client's 10BaseT Ethernet network using NetBEUI wants to access data on an IBM
mainframe. What device will allow this connection?
A. bridge
B. gateway
C. router
Answer: B
249. Of the following protocols which is the fastest?
A. TCP/IP
B. IPX/SPX
C. UDP/IP
Answer: C
250. Access to files and folders in Win 2000 is accomplished using ___?
A. compression
B. tunneling
C. permissions
Answer: C
251. What happens when a device is disconnected from the middle of a BUS network?
A. The hub will propagate error messages to the rest of the network
B. All devices on the network will fail
C. The Server will stop responding to that device
D. Data will not be able to get to devices on the other side of this device
E. If a bridge is on the network, only that segment will be effected
Answer: B
252. Why is there a limit to the number of MAUs that can be connected together in a standard Token-
ring network?
A. Too many MAUs would exceed the cable limits imposed by the Token Ring specification
B. Too many MAUs would create too large of a collision domain for communications to take place
C. Too many MAUs require more electricity than the devices can support
D. Too many devices connected through MAUs requires more time to get control of the token that
communications becomes unacceptable
E. There is no limit to the number of MAUs a token ring network can support
Answer: D
253. How many devices can communicate simultaneously within a Token-ring LAN?
A. One for each MAU on the LAN
B. One
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 29
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
C. Two
D. Between 1 and 5 if the ring speed is 16mbp/s
Answer: B
254. What are three common items that must be configured correctly when installing a Network
Interface Card (NIC)?
A. PCI or ISA slot
B. IRQ setting
C. DMA Address
D. Driver
E. I/O Address
Answer: B, C, D, E
255. When troubleshooting connection problems you can confirm that physical layer devices are
communicating by visually inspecting _______________ on the NIC and hub.
A. Cross over cable C. The electrical connection
B. The Link-Lights D. The Patch cable
Answer: B
256. What is the name of a common test performed on a NIC with vendor supplied diagnostic software?
A. NIC Test C. PING
B. Diagnostic Test D. Loopback
Answer: D
257. Name two driver interfaces that allow a NIC to communicate on more than one protocol.
A. NDIS C. NetBIOS
B. NetBEUI D. ODI
Answer: D, A
258. Bridges operate at the _____________ OSI level.
A. The Data-Link Layer C. The Transport Layer
B. Top Layer D. The Session Layer
Answer: A
259. What bridging method is commonly used in Ethernet with only one bridge?
A. Collision C. Transparent
B. Routing D. Spanning Tree
Answer: C
260. Where are bridging address tables maintained when using source-route bridging?
A. In routing tables on the hard drive C. In routing tables in ROM
B. In routing tables in RAM D. At each PC on the network
Answer: A
261. Can switching hubs propagate broadcast packets on the network?
A. Yes
B. No
Answer: A
262. How many physical addresses can be assigned to a NIC?
A. One C. Three
B. Two D. Depends on the NOS
Answer: A
263. What are the two types of routing connections?
A. Token passing C. Connection Orientated
B. Connectionless D. Unreliable
Answer: D, B
264. What type of routing connection would typically fragment data packets?
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 30
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
A. Connection Orientated C. Reliable
B. Cut-Through D. Connectionless
Answer: D
265. What name is given to Novell's client software loaded on the workstation, and what feature does it
A. Client for NetWare Networks C. Support for NetWare Print Queues
B. Client32 D. Support for NetWare Directory Services
Answer: B, D
266. If two computers are assigned the same IP address then ___?
A. neither computer will be able to connect
B. the first computer to sign on will be able to connect the other will not
C. both computers will be able to connect to the local network but not to the internet
Answer: B
267. The physical address assigned by the NIC manufacturer?
A. subnet mask B. IP address C. MAC address
Answer: C
268. Similar to WINS in that it resolves NetBIOS names into IP address but stores this information in a
text file?
A. LMHOSTS
B. DLC
C. DNS
Answer: A
269. A small peer to peer network uses ___ security?
A. user-level
B. share-level
C. permissions for
Answer: B
270. The TCP/IP protocol used on the internet allows for approximately ___ billion unique IP addresses?
A. 1 B. 4 C. 10
Answer: B
271. Records the number of hops and latency of the packet on its way to its destination?
A. IPCONFIG
B. TRACERT
C. PING
Answer: B
272. NDIS operates at which layer of the OSI model?
A. presentation
B. data-link
C. network
Answer: B
273. When checking the TCP/IP protocol you have just finished installing for connectivity the proper
first step it to ___?
A. PING another computer on that segment
B. PING 127. 0. 0. 1
C. PING the default gateway
Answer: B
274. As data travels down the OSI layers it reaches the ___ layer which is responsible for its bit
conversion and actual transmission to other computers?
A. network
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 31
Dandi Boru College Shambu Campus
Department of Hardware and Networking Service
B. application
C. physical
Answer: C
Prep by: Bilisa Shobe HNS Level –IV Friday, December 13, 2024 32