Wednesday, December 3, 2008

Wednesday, October 22, 2008

Tuesday, October 21, 2008

Saturday, September 27, 2008

song

Computer Short Cuts

Key -Description
CTRL+( -Unhides any hidden rows within the selection.
CTRL+) -Unhides any hidden columns within the selection.
CTRL+& -Applies the outline border to the selected cells.
CTRL+_ -Removes the outline border from the selected cells.
CTRL+~ -Applies the General number format.
CTRL+$ -Applies the Currency format with two decimal places (negative numbers in parentheses).
CTRL+% -Applies the Percentage format with no decimal places.
CTRL+^ -Applies the Exponential number format with two decimal places.
CTRL+# -Applies the Date format with the day, month, and year.
CTRL+@ -Applies the Time format with the hour and minute, and AM or PM.
CTRL+! -Applies the Number format with two decimal places, thousands separator, and minus sign (-) for negative values.
CTRL+- -Displays the Delete dialog box to delete the selected cells.
CTRL+* -Selects the current region around the active cell (the data area enclosed by blank rows and blank columns).
In a PivotTable, it selects the entire PivotTable report.
CTRL+: -Enters the current time.
CTRL+; -Enters the current date.
CTRL+` -Alternates between displaying cell values and displaying formulas in the worksheet.
CTRL+' -Copies a formula from the cell above the active cell into the cell or the Formula Bar.
CTRL+" -Copies the value from the cell above the active cell into the cell or the Formula Bar.
CTRL++ -Displays the Insert dialog box to insert blank cells.
CTRL+1 -Displays the Format Cells dialog box.
CTRL+2 -Applies or removes bold formatting.
CTRL+3 -Applies or removes italic formatting.
CTRL+4 -Applies or removes underlining.
CTRL+5 -Applies or removes strikethrough.
CTRL+6 -Alternates between hiding objects, displaying objects, and displaying placeholders for objects.
CTRL+7 -Displays or hides the Standard toolbar.
CTRL+8 -Displays or hides the outline symbols.
CTRL+9 -Hides the selected rows.
CTRL+0 -Hides the selected columns.
CTRL+A -Selects the entire worksheet.
If the worksheet contains data, CTRL+A selects the current region. Pressing CTRL+A a second time selects the entire worksheet.
When the insertion point is to the right of a function name in a formula, displays the Function Arguments dialog box.
CTRL+SHIFT+A inserts the argument names and parentheses when the insertion point is to the right of a function name in a formula.
CTRL+B -Applies or removes bold formatting.
CTRL+C -Copies the selected cells.
CTRL+C followed by another CTRL+C displays the Microsoft Office Clipboard.
CTRL+D -Uses the Fill Down command to copy the contents and format of the topmost cell of a selected range into the cells below.
CTRL+F -Displays the Find dialog box.
SHIFT+F5 also displays this dialog box, while SHIFT+F4 repeats the last Find action.
CTRL+G -Displays the Go To dialog box.
F5 also displays this dialog box.
CTRL+H -Displays the Find and Replace dialog box.
CTRL+I -Applies or removes italic formatting.
CTRL+K -Displays the Insert Hyperlink dialog box for new hyperlinks or the Edit Hyperlink dialog box for selected existing hyperlinks.
CTRL+L -Displays the Create List dialog box.
CTRL+N -Creates a new, blank file.
CTRL+O -Displays the Open dialog box to open or find a file.
CTRL+SHIFT+O -selects all cells that contain comments.
CTRL+P -Displays the Print dialog box.
CTRL+R -Uses the Fill Right command to copy the contents and format of the leftmost cell of a selected range into the cells to the right.
CTRL+S -Saves the active file with its current file name, location, and file format.
CTRL+U -Applies or removes underlining.
CTRL+V -Inserts the contents of the Clipboard at the insertion point and replaces any selection. Available only after you cut or copied an object, text, or cell contents.
CTRL+W -Closes the selected workbook window.
CTRL+X -Cuts the selected cells.
CTRL+Y -Repeats the last command or action, if possible.
CTRL+Z -Uses the Undo command to reverse the last command or to delete the last entry you typed.
CTRL+SHIFT+Z -uses the Undo or Redo command to reverse or restore the last automatic correction when AutoCorrect Smart Tags are

Thursday, September 11, 2008

MS-Word Shortcut Keys

Command Name Shortcut Keys
------------------------------------------------------------------------

All Caps - CTRL+SHIFT+A
Annotation- ALT+CTRL+M
App Maximize- ALT+F10
App Restore- ALT+F5
Apply Heading1- ALT+CTRL+1
Apply Heading2- ALT+CTRL+2
Apply Heading3- ALT+CTRL+3
Apply List Bullet- CTRL+SHIFT+L
Auto Format- ALT+CTRL+K
Auto Text- F3 or ALT+CTRL+V
Bold- CTRL+B or CTRL+SHIFT+B
Bookmark- CTRL+SHIFT+F5
Browse Next- CTRL+PAGE DOWN
Browse Previous- CTRL+PAGE UP
Browse Sel- ALT+CTRL+HOME
Cancel- ESC
Center Para- CTRL+E
Change Case- SHIFT+F3
Char Left- LEFT
Char Left Extend- SHIFT+LEFT
Char Right- RIGHT
Char Right Extend- SHIFT+RIGHT
Clear- DELETE
Close or Exit- ALT+F4
Close Pane- ALT+SHIFT+C
Column Break- CTRL+SHIFT+ENTER
Column Select- CTRL+SHIFT+F8
Copy - CTRL+C or CTRL+INSERT
Copy Format- CTRL+SHIFT+C
Copy Text - SHIFT+F2
Create Auto Text - ALT+F3
Customize Add Menu - ALT+CTRL+=
Customize Keyboard - ALT+CTRL+NUM +
Customize Remove Menu- ALT+CTRL+-
Cut - CTRL+X or SHIFT+DELETE
Date Field - ALT+SHIFT+D
Delete Back Word - CTRL+BACKSPACE
Delete Word - CTRL+DELETE
Dictionary - ALT+SHIFT+F7
Do Field Click - ALT+SHIFT+F9
Doc Close - CTRL+W or CTRL+F4
Doc Maximize -CTRL+F10
Doc Move -CTRL+F7
Doc Restore -CTRL+F5
Doc Size -CTRL+F8
Doc Split -ALT+CTRL+S
Double Underline - CTRL+SHIFT+D
End of Column - ALT+PAGE DOWN
End of Column -ALT+SHIFT+PAGE DOWN
End of Doc Extend -CTRL+SHIFT+END
End of Document -CTRL+END
End of Line -END
End of Line Extend -SHIFT+END
End of Row -ALT+END
End of Row -ALT+SHIFT+END
End of Window -ALT+CTRL+PAGE DOWN
End of Window Extend -ALT+CTRL+SHIFT+PAGE DOWN
Endnote Now -ALT+CTRL+D
Extend Selection -F8
Field Chars - CTRL+F9
Field Codes -ALT+F9
Find -CTRL+F
Font -CTRL+D or CTRL+SHIFT+F
Font Size Select -CTRL+SHIFT+P
Footnote Now -ALT+CTRL+F
Go Back -SHIFT+F5 or ALT+CTRL+Z
Go To -CTRL+G or F5
Grow Font -CTRL+SHIFT+.
Grow Font One Point -CTRL+]
Hanging Indent -CTRL+T
Header Footer Link -ALT+SHIFT+R
Help -F1
Hidden -CTRL+SHIFT+H
Hyperlink -CTRL+K
Indent -CTRL+M
Italic -CTRL+I or CTRL+SHIFT+I
Justify Para -CTRL+J
Left Para -CTRL+L
Line Down -DOWN
Line Down Extend -SHIFT+DOWN
Line Up -UP
Line Up Extend -SHIFT+UP
List Num Field -ALT+CTRL+L
Lock Fields -CTRL+3 or CTRL+F11
Macro -ALT+F8
Mail Merge Check -ALT+SHIFT+K
Mail Merge Edit Data Source -ALT+SHIFT+E
Mail Merge to Doc -ALT+SHIFT+N
Mail Merge to Printer -ALT+SHIFT+M
Mark Citation -ALT+SHIFT+I
Mark Index Entry -ALT+SHIFT+X
Mark Table of Contents Entry -ALT+SHIFT+O
Menu Mode -F10
Merge Field - ALT+SHIFT+F
Microsoft Script Editor -ALT+SHIFT+F11
Microsoft System Info -ALT+CTRL+F1
Move Text -F2
New -CTRL+N
Next Cell -TAB
Next Field -F11 or ALT+F1
Next Misspelling -ALT+F7
Next Object -ALT+DOWN
Next Window -CTRL+F6 or ALT+F6
Normal -ALT+CTRL+N
Normal Style -CTRL+SHIFT+N or ALT+SHIFT+CLEAR (NUM 5)
Open -CTRL+O or CTRL+F12 or ALT+CTRL+F2
Open or Close Up Para - CTRL+0
Other Pane - F6 or SHIFT+F6
Outline - ALT+CTRL+O
Outline Collapse - ALT+SHIFT+- or ALT+SHIFT+NUM -
Outline Demote - ALT+SHIFT+RIGHT
Outline Expand - ALT+SHIFT+=
Outline Expand - ALT+SHIFT+NUM +
Outline Move Down - ALT+SHIFT+DOWN
Outline Move Up - ALT+SHIFT+UP
Outline Promote - ALT+SHIFT+LEFT
Outline Show First Line - ALT+SHIFT+L
Overtype - INSERT
Page - ALT+CTRL+P
Page Break - CTRL+ENTER
Page Down - PAGE DOWN
Page Down Extend - SHIFT+PAGE DOWN
Page Field - ALT+SHIFT+P
Page Up - PAGE UP
Page Up Extend - SHIFT+PAGE UP
Para Down -CTRL+DOWN
Para Down Extend -CTRL+SHIFT+DOWN
Para Up -CTRL+UP
Para Up Extend -CTRL+SHIFT+UP
Paste -CTRL+V or SHIFT+INSERT
Paste Format -CTRL+SHIFT+V
Prev Cell -SHIFT+TAB
Prev Field -SHIFT+F11 or ALT+SHIFT+F1
Prev Object -ALT+UP
Prev Window -CTRL+SHIFT+F6 or ALT+SHIFT+F6
Print -CTRL+P or CTRL+SHIFT+F12
Print Preview -CTRL+F2 or ALT+CTRL+I
Proofing -F7
Redo -ALT+SHIFT+BACKSPACE
Redo or Repeat -CTRL+Y or F4 or ALT+ENTER
Repeat Find -SHIFT+F4 or ALT+CTRL+Y
Replace -CTRL+H
Reset Char -CTRL+SPACE or CTRL+SHIFT+Z
Reset Para -CTRL+Q
Revision Marks Toggle -CTRL+SHIFT+E
Right Para -CTRL+R
Save -CTRL+S or SHIFT+F12 or ALT+SHIFT+F2
Save As -F12
Select All -CTRL+A or CTRL+CLEAR (NUM 5) or CTRL+NUM 5
Select Table -ALT+CLEAR (NUM 5)
Show All -CTRL+SHIFT+8
Show All Headings -ALT+SHIFT+A
Show Heading1 -ALT+SHIFT+1
Show Heading2 -ALT+SHIFT+2
Show Heading3 -ALT+SHIFT+3
Show Heading4 -ALT+SHIFT+4
Show Heading5 -ALT+SHIFT+5
Show Heading6 -ALT+SHIFT+6
Show Heading7 -ALT+SHIFT+7
Show Heading8 -ALT+SHIFT+8
Show Heading9 -ALT+SHIFT+9
Shrink Font -CTRL+SHIFT+,
Shrink Font One Point -CTRL+[
Small Caps -CTRL+SHIFT+K
Space Para1 -CTRL+1
Space Para15 -CTRL+5
Space Para2 -CTRL+2
Spike -CTRL+SHIFT+F3 or CTRL+F3
Start of Column -ALT+PAGE UP
Start of Column -ALT+SHIFT+PAGE UP
Start of Doc Extend -CTRL+SHIFT+HOME
Start of Document -CTRL+HOME
Start of Line -HOME
Start of Line Extend -SHIFT+HOME
Start of Row -ALT+HOME
Start of Row -ALT+SHIFT+HOME
Start of Window -ALT+CTRL+PAGE UP
Start of Window Extend -ALT+CTRL+SHIFT+PAGE UP
Style -CTRL+SHIFT+S
Subscript -CTRL+=
Superscript -CTRL+SHIFT+=
Symbol Font -CTRL+SHIFT+Q
Thesaurus -SHIFT+F7
Time Field -ALT+SHIFT+T
Toggle Field Display -SHIFT+F9
Toggle Master Subdocs -CTRL+\
Tool -SHIFT+F1
Un Hang -CTRL+SHIFT+T
Un Indent -CTRL+SHIFT+M
Underline -CTRL+U or CTRL+SHIFT+U
Undo -CTRL+Z or ALT+BACKSPACE
Unlink Fields -CTRL+6 or CTRL+SHIFT+F9
Unlock Fields -CTRL+4 or CTRL+SHIFT+F11
Update Auto Format -ALT+CTRL+U
Update Fields -F9 or ALT+SHIFT+U
Update Source -CTRL+SHIFT+F7
VBCode -ALT+F11
Web Go Back -ALT+LEFT
Web Go Forward -ALT+RIGHT
Word Left -CTRL+LEFT
Word Left Extend -CTRL+SHIFT+LEFT
Word Right -CTRL+RIGHT
Word Right Extend -CTRL+SHIFT+RIGHT
Word Underline -CTRL+SHIFT+W

Comedy03

Comedy02

Comedy01

Tuesday, September 9, 2008

Amazing Art



































Networking Interview Quastions

Networking Interview Questions and Answers

What is an Object server?

With an object server, the Client/Server application is written as a set of communicating objects. Client object communicate with server objects using an Object Request Broker (ORB). The client invokes a method on a remote object. The ORB locates an instance of that object server class, invokes the requested method and returns the results to the client object. Server objects must provide support for concurrency and sharing. The ORB brings it all together.
What is a Transaction server?
With a transaction server, the client invokes remote procedures that reside on the server with an SQL database engine. These remote procedures on the server execute a group of SQL statements. The network exchange consists of a single request/reply message. The SQL statements either all succeed or fail as a unit.
What is a Database Server?
With a database server, the client passes SQL requests as messages to the database server. The results of each SQL command are returned over the network. The server uses its own processing power to find the request data instead of passing all the records back to the client and then getting it find its own data. The result is a much more efficient use of distributed processing power. It is also known as SQL engine.
What are the most typical functional units of the Client/Server applications?
User interface
Business Logic and
Shared data.
What are all the Extended services provided by the OS?

Ubiquitous communications
Network OS extension
Binary large objects (BLOBs)
Global directories and Network yellow pages
Authentication and Authorization services
System management
Network time
Database and transaction services
Internet services
Object- oriented services
What are Triggers and Rules?
Triggers are special user defined actions usually in the form of stored procedures, that are automatically invoked by the server based on data related events. It can perform complex actions and can use the full power of procedural languages.
A rule is a special type of trigger that is used to perform simple checks on data.
What is meant by Transparency?
Transparency really means hiding the network and its servers from the users and even the application programmers.
What are TP-Lite and TP-Heavy Monitors?
TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy are TP Monitors which supports the Client/Server architecture and allow PC to initiate some very complex multiserver transaction from the desktop.
What are the two types of OLTP?
TP lite, based on stored procedures. TP heavy, based on the TP monitors.
What is a Web server?
This new model of Client/Server consists of thin, protable, "universal" clients that talk to superfat servers. In the simplet form, a web server returns documents when clients ask for them by name. The clients and server communicate using an RPC-like protocol called HTTP.
What are Super servers?
These are fully-loaded machines which includes multiprocessors, high-speed disk arrays for intervive I/O and fault tolerant features.
What is a TP Monitor?
There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".
TP Monitor does mainly two things extremely well. They are Process management and Transaction management.?
They were originally introduced to run classes of applications that could service hundreds and sometimes thousands of clients. TP Monitors provide an OS - on top of existing OS - that connects in real time these thousands of humans with a pool of shared server processes.
What is meant by Asymmetrical protocols?
There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a service. Servers are passively awaiting for requests from clients.
What are the types of Transparencies?
The types of transparencies the NOS middleware is expected to provide are:-
Location transparency
Namespace transparency
Logon transparency
Replication transparency
Local/Remote access transparency
Distributed time transparency
Failure transparency and
Administration transparency.
What is the difference between trigger and rule?
The triggers are called implicitly by database generated events, while stored procedures are called explicitly by client applications.
What are called Transactions?
The grouped SQL statements are called Transactions (or) A transaction is a collection of actions embused with ACID properties.
What are the building blocks of Client/Server?
The client
The server and
Middleware.
Explain the building blocks of Client/Server?
The client side building block runs the client side of the application.
The server side building block runs the server side of the application.
The middleware buliding block runs on both the client and server sides of an application. It is broken into three categories:-

Transport stack
Network OS
Service-specific middleware.
What are all the Base services provided by the OS?
Task preemption
Task priority
Semaphores
Interprocess communications (IPC)
Local/Remote Interprocess communication
Threads
Intertask protection
Multiuser
High performance file system
Efficient memory management and
Dynamically linked Run-time extensions.
What are the roles of SQL?
SQL is an interactive query language for ad hoc database queries.
SQL is a database programming language.
SQL is a data definition and data administration language.
SQL is the language of networked database servers
SQL helps protect the data in a multi-user networked environment.
Because of these multifacted roles it plays, physicists might call SQL as "The grand unified theory of database".
What are the characteristics of Client/Server?
Service
Shared resources
Asymmentrical protocols
Transparency of location
Mix-and-match
Message based exchanges
Encapsulation of services
Scalability
Integrity
Client/Server computing is the ultimate "Open platform". It gives the freedom to mix-and-match components of almost any level. Clients and servers are loosely coupled systems that interact through a message-passing mechanism
What is Structured Query Langauge (SQL)?
SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It consists of a short list of powerful, yet highly flexible, commands that can be used to manipulate information collected in tables. Through SQL, we can manipulate and control sets of records at a time.
What is Remote Procedure Call (RPC)?
RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every programmer. A client process calls a function on a remote server and suspends itself until it gets back the results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is synchoronous. The process that issues the call waits until it gets the results.
Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the reply back to the client. It is a telephone-like metaphor.
What are the main components of Transaction-based Systems?
Resource Manager
Transaction Manager and
Application Program.
What are the three types of SQL database server architecture?
Process-per-client Architecture. (Example: Oracle 6, Informix )
Multithreaded Architecture. (Example: Sybase, SQL server)
Hybrid Architecture
What are the Classification of clients?
Non-GUI clients - Two types are:-
Non-GUI clients that do not need multi-tasking
(Example: Automatic Teller Machines (ATM), Cell phone)
Non-GUI clients that need multi-tasking
(Example: ROBOTs)

GUI clients
OOUI clients
What are called Non-GUI clients, GUI Clients and OOUI Clients?
Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction.
GUI Clients: These are applicatoins, where occassional requests to the server result from a human interacting with a GUI
(Example: Windows 3.x, NT 3.5)
OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats.
(Example: MAC OS, Windows 95, NT 4.0)
What is Message Oriented Middleware (MOM)?
MOM allows general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over networks by simply putting messages in the queues and getting messages from queues. It typically provides a very simple high level APIs to its services.
MOM's messaging and queuing allow clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a post-office like metaphor.
What is meant by Middleware?
Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it acts as a bridge between the clients and servers. It starts with the API set on the client side that is used to invoke a service and it covers the transmission of the request over the network and the resulting response.
It neither includes the software that provides the actual service - that is in the servers domain nor the user interface or the application login - that's in clients domain.
What are the functions of the typical server program?
It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster.
What is meant by Symmentric Multiprocessing (SMP)?
It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided into threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads.
What are General Middleware?
It includes the communication stacks, distributed directories, authentication services, network time, RPC, Queuing services along with the network OS extensions such as the distributed file and print services
What are Service-specific middleware?
It is needed to accomplish a particular Client/Server type of services which includes:-
Database specific middleware
OLTP specific middleware
Groupware specific middleware
Object specific middleware
Internet specific middleware and
System management specific middleware.
What is meant by Asymmetric Multiprocessing (AMP)?
It imposses hierarchy and a division of labour among processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.
What is OLTP?
In the transaction server, the client component usually includes GUI and the server components usually consists of SQL transactions against a database. These applications are called OLTP (Online Transaction Processing) OLTP Applications typically,
Receive a fixed set of inputs from remote clients. Perform multiple pre-compiled SQL comments against a local database. Commit the work and Return a fixed set of results.
What is meant by 3-Tier architecture?
In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible.
Example: TP monitor, Web.
What is meant by 2-Tier architecture?
In 2-tier Client/Server systems, the application logic is either burried inside the user interface on the client or within the database on the server.
Example: File servers and Database servers with stored procedures.
What is Load balancing?
If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor may dynamically start new ones and this is called Load balancing.
What are called Fat clients and Fat servers?
If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal software.
If the bulk of the application runs on the Server side, then it is Fat servers. It tries to minimize network interchanges by creating more abstract levels of services.
What is meant by Horizontal scaling and Vertical scaling?
Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers.
What is Groupware server?
Groupware addresses the management of semi-structured information such as text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct contact with other people.
What are the two broad classes of middleware?
General middleware
Service-specific middleware.
What are the types of Servers?
File servers
Database servers Transaction servers Groupware servers Object servers Web servers.
What is a File server?
File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over nerwork to file server.
What are the five major technologies that can be used to create Client/Server applications?
Database Servers
TP Monitors
Groupware
Distributed Objects
Intranets
What is Client/Server?
Clients and Servers are separate logical entities that work together over a network to accomplish a task. Many systems with very different architectures that are connected together are also called Client/Server.
List out the benefits obtained by using the Client/Server oriented TP Monitors?
Client/Server applications development framework.
Firewalls of protection.
High availability.
Load balancing.
MOM integration.
Scalability of functions.
Reduced system cost.
What are the services provided by the Operating System?
Extended services - These are add-on modular software components that are layered on top of base service.
What is ACID property?
ACID is a term coined by Andrew Reuter in 1983, which stands for Atomicity, Consistence, Isolation and Durability.
What are Stored procedures?
A stored procedure i s named collection of SQL statements and procedural logic that is compiled, verified and stored in a server database. It is typically treated like any other database object. Stored procedures accept input parameters so that a single procedure can be used over the network by multiple clients using different input data. A single remote message triggers the execution of a collection of stored SQL statements. The results is a reduction of network traffic and better performance.
What is wide-mouth frog?
Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.
What is passive topology?
When the computers on the network simply listen and receive the signal, they are referred to as passive because they don’t amplify the signal in any way.
Example for passive topology - linear bus.
What is region?
When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.
What is virtual channel?
Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.
Difference between the communication and transmission?
Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc.
Communication means the meaning full exchange of information between two communication media.
What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.
What are the advantages and disadvantages of the three types of routing tables?
The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table's contents can change without the administrator being aware of the change.
What is Beaconing?
The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.
What does the Mount protocol do ?
The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request.
What are Digrams and Trigrams?
The most common two letter combinations are called as digrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion.
What is the HELLO protocol used for?
The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol.
What is the minimum and maximum length of the header in the TCP segment and IP datagram?
The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.
What do you meant by "triple X" in Networks?
The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between the PAD and the network, called X.29. Together, these three recommendations are often called "triple X".
What is attenuation?
The degeneration of a signal over distance on a network cable is called attenuation.
What is Protocol Data Unit?
The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame).
What are the data units at different layers of the TCP / IP protocol suite?
The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.
What is difference between ARP and RARP?
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.
What is MAC address?
The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.
What is terminal emulation, in which layer it comes?
Telnet is also called as terminal emulation. It belongs to application layer.
What are the types of Transmission media?
Signals are usually transmitted over some transmission media that are broadly classified in to two categories:-

Guided Media:

These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.
Unguided Media:

This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.
What are major types of networks and explain?
Server-based network.
Peer-to-peer network.

Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources.
Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration.
What is SAP?
Series of interface points that allow other computers to communicate with the other layers of network protocol stack.
What is multicast routing?
Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.
What is the difference between routable and non- routable protocols?
Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router.
What is REX?
Request to Exit (REX) - A signal that informs the controller that someone has requested to exit from a secure area.
What are the different type of networking / internetworking devices?
Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.
Bridges:
These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.
Routers:
They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission. Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
What is redirector?
Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.
What is packet filter?
Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.
What is logical link control?
One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.
What is traffic shaping?
One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.
What is NETBIOS and NETBEUI?
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.
NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.
Why should you care about the OSI Reference Model?
It provides a framework for discussing network operations and design.
What is Proxy ARP?
is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.
What is EGP (Exterior Gateway Protocol)?
It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system.
What is IGP (Interior Gateway Protocol)?
It is any routing protocol used within an autonomous system.
What is OSPF?
It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.
What is Kerberos?
It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.
What is SLIP (Serial Line Interface Protocol)?
It is a very simple protocol used for transmission of IP datagrams across a serial line.
What is Mail Gateway?
It is a system that performs a protocol translation between different electronic mail delivery protocols.
What is RIP (Routing Information Protocol)?
It is a simple protocol used to exchange information between the routers.
What is NVT (Network Virtual Terminal)?
It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.
What is source route?
It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header.
What is BGP (Border Gateway Protocol)?
It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).
What is Gateway-to-Gateway protocol?
It is a protocol formerly used to exchange routing information between Internet core routers.
What is Project 802?
It is a project started by IEEE to set standards that enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN protocols.
It consists of the following:
802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols.
802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is non-architecture-specific, that is remains the same for all IEEE-defined LANs. Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. The modules are
Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).
802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.
What is silly window syndrome?
It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.
What is a Multi-homed Host?
It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.
What is autonomous system?
It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.
What is the difference between interior and exterior neighbor gateways?
Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.
What is MAU?
In token Ring , hub is called Multistation Access Unit(MAU).
Explain 5-4-3 rule.?
In a Ethernet network, between any two points on the network, there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated.
What is difference between baseband and broadband transmission?
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.
What is ICMP?
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.
What is Brouter?
Hybrid devices that combine the features of both bridges and routers.
What is frame relay, in which layer it comes?
Frame relay is a packet switching technology. It will operate in the data link layer.
What is External Data Representation?
External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent.
What is Bandwidth?
Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.
What protocol is used by DNS name servers?
DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.
What is the range of addresses in the classes of internet addresses?
Class A 0.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255
Class D 224.0.0.0 - 239.255.255.255
Class E 240.0.0.0 - 247.255.255.255
What are the important topologies for networks?
BUS topology:
In this each computer is directly connected to primary network cable in a single line.
Advantages:
Inexpensive, easy to install, simple to understand, easy to extend.
STAR topology:
In this all computers are connected using a central hub.
Advantages:
Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
RING topology:
In this all computers are connected in loop.
Advantages:
All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.
Difference between bit rate and baud rate?
Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.
baud rate = bit rate / N
where N is no-of-bits represented by each signal shift.
What is anonymous FTP and why would you use it?
Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.
What is the difference between an unspecified passive open and a fully specified passive open?
An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a specific client.
What is virtual path?
Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.
Explain the function of Transmission Control Block?
A TCB is a complex data structure that contains a considerable amount of information about each connection.
What is a DNS resource record?
A resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.
What is a pseudo tty?
A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place.
What is the Network Time Protocol?
A protocol that assures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is capable of synchronising distributed clocks within milliseconds over long time periods. It is defined in STD 12, RFC 1119.
What is mesh network?
A network in which there are multiple network links between computers to provide multiple paths for data to travel.
What is RAID?
A method for providing fault tolerance by using multiple hard disk drives.
What is a Management Information Base (MIB)?
A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration. The MIB is queried by SNMP.
What is cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
What is subnet?
A generic term for section of a large networks usually separated by a bridge or router.

A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats.
What is point-to-point protocol?
A communications protocol used to connect computers to remote networking services including Internet service providers.
What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ?
10Base2—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments
10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.
What are the possible ways of data exchange?
(i) Simplex
(ii) Half-duplex
(iii) Full-duplex.
What are the two types of transmission technology available?
(i) Broadcast
(ii) point-to-point.
How do I convert a numeric IP address like 192.18.97.39 into a hostname like java.sun.com?
String hostname = InetAddress.getByName("192.18.97.39").getHostName();

Network+ Sample Questions
Network+ is a certification that measures the technical knowledge of networking professionals.

Earning the Network+ certification means that the candidate possesses the knowledge needed to configure and operate a variety of networking products.
The Network+ test is available throughout the world in a variety of languages including English, German, French and Japanese.
Following are some Network+ sample questions:

1. You install File and Printer Sharing for Microsoft Networks.You share a folder and leave the password option blank.Who can gain access to the folder

A. Anyone who can gain access to your network and has a Microsoft redirector such as the Client for Microsoft Networks installed.
B. Windows 98 will not allow a blank password in this field.
C. Anyone with Internet Explorer installed.
D. Only users that are members of the same workgroup as you.

Answer: A

2. The figure below shows a typical Home Network Setup.Identify the network components marked in red.

Answer:
A: Cable/DSL Modem
B: CAT 5 Ethernet cable
C: Wireless Signal
E: Wirelss Router

3. Some protocols are considered to be technically non-routable.Which of the following statements best describes the most common reason why a protocol would be considered non-routable

A. It does not contain the appropriate Data Link layer information required by routers.
B. It uses advanced Transport layer services to move across the Internet and avoids the routing overhead required by the more primitive networking protocols.
C. It defines Physical layer network addresses for internal routing.
D. It does not specify the Network layer addresses required by routers.

Answer: D

4. What is the binary network ID of the loopback IP address
A. 1
B. 10101010
C. 0
D. 1111111

Answer: D

5. You are the LAN administrator for your company.You have couple Windows 2000 Professional clients that dial in via PPP to the company network’s RAS server.You want the remote clients to be assigned dynamic IP addresses.You reserve a pool of class B addresses for these clients.Upon connecting, you find that the Windows 2000 computers are using a subnet mask of all 255s.What should you do

A. Run ipconfig with the /release and /renew switch on the client
B. Run ipconfig with the /renew_all switch on the client
C. Run winipcfg on the client
D. Do nothing.This is normal

Answer: D

6. You are configuring a router.According to the manual, you will need a transceiver to connect to the LAN ports of the router.What kind of physical interface does the router have

A. MSAU
B. RJ-11
C. AUI
D. BNC

Answer: C

7. Which of the following are connectionless protocols.(Choose the three best answers.)

A. IP
B. SPX
C. IPX
D. UDP

Answer: A, C, D

8. How can Jim Herr, a client on an NT TCP/IP network see which remote hosts are currently connected using NBT

A. Use NBTSTAT
B. Use NETSTAT
C. Use NSLOOKUP
D. Use IPCONFIG

Answer: A

9. You are setting up a new Windows 98 workstation on your network, and your DHCP server provides all of the normal TCP/IP configuration information.What must you do to configure the IP address on the workstation after you add the TCP/IP protocol

A. The DHCP option is enabled automatically, and the server will auto-configure everything.
B. Find out what the subnet mask on your network is, and add this information only.
C. Manually enter an IP address that is not in use on the network.
D. Put the address of the router in the default gateway, and put all 0s in the IP field.

Answer: A

10. Which of the following is considered a Network Attached Storage device

A. A 60 GB DAT tape drive attached to the Network Server
B. A file server with special software that is at a separate location from the departmental file server
C. In a Windows NT environment, it would be the Backup Domain Controller
D. A high speed specialized sub-network attached to the enterprise

Answer: B

11. Credit card size, designed for notebooks, self-configuring, and non-OS dependent describes which PC bus architecture

A. PCI
B. ISA
C. EISA
D. PCMCIA

Answer: D

12. What protocol is used between E-Mail servers

A. HTTP
B. POP3
C. SNMP
D. SMTP

Answer: D

13. When installing a manually configured adapter, what information must you know to avoid resource conflicts

A. IRQ
B. Number of bits
C. Base I/O port address
D. Base Memory address

Answer: A, C & D

14. Which of the following OSI layers is responsible for identifying communications partners

A. Application
B. Session
C. Network
D. Presentation

Answer: A

15. A broadcast message is an example of which dialog control method
A. Half duplex
B. Baseband
C. Broadband
D. Simplex

Answer: D

16. Which of the following are used to resolve Windows NetBIOS names to IP addresses

A. DNS
B. WINS
C. LMhosts file
D. Hosts file

Answer: B,C

17. What is a router

A. A hardware device that connects dissimilar networks, such as Cat 5 cabling and
FDDI
B. A network host that reads the source and destination addresses in the packet header and makes decisions about where to forward the packet
C. A network host that can forward LAN-based email messages onto the Internet, after repackaging them into the SMTP format
D. A software system that can translate between dissimilar networks such as Ethernet and Token Ring

Answer: B

18. Which of the following is Class C IP address?

A. 10.10.14.118
B. 135.23.112.57
C. 191.200.199.199
D. 204.67.118.54

Answer: D

19. A Windows 95 user complains that she cannot connect to any other computers on her local subnet even when using the IP address to communicate.However, she can ping 127.0.0.1 and receive a reply.Other users on her subnet do not report having any trouble.All client computers on the network are WINS-enabled.What is the most probable cause of the problem?

A. The TCP/IP stack is not installed properly
B. The subnet mask is not correct, check whether the subnet mask is configured correctly.
C. The default gateway is not configured properly.
D. The computer is not configured to use LMHOSTS

Answer: B

20. WINS or ___ may be used for NetBIOS name resolution?
A. HOSTS
B. DNS
C. LMHOSTS
Answer: C

21. You have set up a server that connects to an Internet services provider ( ISP) over ISDN line.How should the default gateway address be configured so that windows 95 users on the local network can access the Internet through the RAS server.The RAS server is located on the same subnet as that of the WIN95 machines.

A. The default Gateway address on WINS95 must specify the IP address of the remote ISP
B. The default Gateway on WN95 must specify the IP address of the RAS server on the local network.
C. The HOSTS file in WIN95 machines must be configured with the host name of the RAS Server.
D. The HOSTS file in WIN 95 machines must be configured with the host name of the ISP

Answer: B

22. Which of the following is the standard adopted for Ethernet CSMA/CD by IEEE Committee?

A. 802.2
B. 802.1d
C. 802.3
D. 802.5

Answer: C

23. Disk Striping with Parity corresponds to which RAID level?
A. RAID 0
B. RAID 1
C. RAID 3
D. RAID 5

Answer: D.

24. Which of the following media types is most susceptible to EMI?

A. Fiber Optic
B. STP
C. Co-axial
D. UTP

Answer: D

25. Which type of connector does a 10BaseT Ethernet cable use?

A. BNC
B. RJ-45
C. RJ-11
D. MSAU

Answer: B

26. Which of the following is suitable for mission critical and time sensitive applications?

A. 10BaseT
B. 10Base2
C. Token Ring
D. Mesh

Answer: C

27. What is the default subnet mask for Class C network?

A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.0.255.0

Answer: C

28. Which of the following network topologies have each computer connected to a
central point?

A. Bus
B. Ring
C. Star
D. Mesh

Answer: C

29. Which of the following network topologies is the most fault tolerant?

A. Bus
B. Mesh
C. Star
D. Ring

Answer: B

30. A Bus network topology is best described as which of the following?

A. All computers are attached to a single cable in a chain style
B. All computers are connected to a central point
C. All computers are connected to every other computer or resource in the network
D. Fault Tolerant

Answer: A

31. A Ring network topology provides two links from each computer.A link in and a link out.

A. True
B. False

Answer:A

32. Which connector is often used with Thinnet cable?

A. RJ-11
B. AUI
C. DIX
D. BNC

Answer:D

33. Which of the following media connectors are used in conjunction with telephones?

A. RJ-45
B. RJ-11
C. RJ-T
D. None of the above are correct

Answer:B

34. 10BaseT Ethernet networks, most commonly use which of the following types of
cable?

A. Fiber
B. Coax
C. STP
D. UTP

Answer:D

35. A Gateway is able to connect network environments that are dissimilar.

A. True
B. False

Answer:A

36. AUI connectors are commonly associated with which of the following items?

A. A Vampire Tap
B. Fiber Optic Cable
C. 10Base2
D. Wireless Networks

Answer:A

37. A hub works in conjunction with which of the following network topologies?
A. Ring
B. Star
C. Bus
D. Mesh

Answer:B

38. Which of the following is a correct MAC address?

A. 190.168.80.1
B. www.certyourself.com
C. 08:34:FE:4C:F2:54
D. G2:G3:23:87:GG

Answer:C

39. A Hub operates at which of the following layers of the OSI model?

A. Physical
B. Session
C. Transport
D. Application

Answer:A

40. Which of the following devices operate at the Data Link layer of the OSI model?

A. A Hub
B. A NIC
C. A Switch
D. A Router
Answer:C

41. A Router operates in which layer of the OSI model?

A. The Physical Layer
B. The Data Link Layer
C. The Transport Layer
D. The Network Layer

Answer:D

42. A Network Interface Card operates at the Network Layer of the OSI model.

A. True
B. False
Answer:B

43. Which of the following is the correct order of the OSI model from bottom to top?

A. Application, Presentation, Session, Transport, Network, Data Link, Physical
B. Physical, Network, Data Link, Session, Transport, Application, Presentation
C. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. Application, Session, Presentation, Transport, Network, Data Link, Physical

Answer:C

44. What is the maximum speed of 10Base5 Ethernet cable?

A. 100 Mbps
B. 500 Mbps
C. 50 Mbps
D. 10 Mbps

Answer:D

45. 100Base-FX uses which of the following types of cable?

A. Fiber Optic
B. Unshielded Twisted Pair
C. Coax
D. Shielded Twisted Pair

Answer:A

46. Which of the following TCP/IP protocols is used to communicate between a Web
Browser and a Web Server?

A. SMTP
B. HTTP
C. UDP
D. POP3

Answer:B

47. Which of the following layers of the OSI model does a Bridge operate in?

A. The Data Link Layer
B. The Network Layer
C. The Transport Layer
D. The Session Layer

Answer:A

48. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server.Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised.Which of the following solutions are you most likely to implement?

A. A firewall system at the connection point to the Internet
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication

Answer: A

49. A server has two NIC cards installed.The first one uses IRQ 10 and I/O range of B800-B81F.The second uses IRQ 10 and I/O range of D700-D80A.What action, if any, should be taken?

A. No action is required.
B. Locate any available IRQ to resolve the IRQ conflict.
C. Locate any available I/O range to resolve the I/O conflict.
D. Change the I/O of the second NIC to B800-B81F.

Answer: B

50. Which of the following IEEE 802 standards pertain to token ring?
A. IEEE 802.5
B. IEEE 802.3
C. IEEE 802.2
D. IEEE 802.11
Answer: A
51. Protocol that is often used to facilitate communications with an IBM mainframe?
A. NetBEUI
B. RIP
C. DLC
Answer: C
52. Which of these protocols provide fast connectionless communications that relies on upper layers of the OSI model for error correction?
A. TCP (Transmission Control Protocol)
B. UDP (User Datagram Protocol)
C. SPX
Answer: B
53. Can be used to reduce traffic bottlenecks in a NetBEUI network?
A. bridge
B. router
C. gateway
Answer: A
54. You have just finished the installation of two computers on a 28 computer network using Novell's IPX/SPX.Both computers initialize with no error messages yet they cannot contact other computers on the network.All other computers are functioning normally.You probably have an ___?
A. incorrect IRQ
B. incorrect frame type
C. invalid IP setting
Answer: B
55. Uses amplifiers to regenerate analog signals?
A. baseband
B. broadband
C. fiber-optic
Answer: B
56. Uses single frequency digital signals?
A. baseband
B. broadband
C. multiband
Answer: A
57. You are hired to investigate a slow performing network server for a client.Using the performance monitor you obtain the following readings: CPU usage= 25%, Disk time= 25%, Page faults/sec= 25.What one change will increase the performance of this network server the most?
A. buy another CPU
B. add another hard drive
C. increase RAM
Answer: C
58. Which of the following should you check if you can connect using the IP address but NOT with the host name?
A. DNS
B. WINS
C. DHCP
Answer: A
59. The fastest method of transporting data with a switch?
A. store and forward
B. cut through
C. loop back
Answer: B
60. Although NOT fault tolerant this RAID level is often used when one wants the highest level of performance?
A. RAID 0
B. RAID 1
C. RAID 5
Answer: A
61. Four _____ are used in the 5-4-3 rule of 10Base2 networking?
A. repeaters
B. segments
C. routers
Answer: A
62. You have just finished installing an Ethernet PCI NIC (network interface card) in a client's computer.The computer initializes successfully and has no apparent hardware problems.The computer however is not able to communicate with other computers on this NetBEUI network.All other client computers are able to communicate.What is the most likely cause of this problem?
A. IRQ conflict
B. incorrect transceiver setting
C. incorrect frame type
Answer: B
63. The two key components of a digital signature include the secure hash algorithm and a ___ ?
A. blowfish value
B. certificate authority
C. IPSec
Answer: B
64. The Microsoft version of Novell's IPX/SPX protocol?
A. ODI
B. NWLink
C. DLC
Answer: B
65. Utility used to run applications on a computer at a remote location?
A. ODI
B. Telnet
C. ARP (Address Resolution Protocol)
Answer: B
66. Topology that offers the highest level of redundancy, is easy to troubleshoot but is expensive to install.It is the topology of the internet?
A. star
B. ring
C. mesh
Answer: C
67. Ordinary telephone wire has a thickness of AWG 22.Of the following which is the thickest wire?
A. AWG 14
B. AWG 28
C. AWG 32
Answer: A
68. Backup method which clears the archive bit and is the shortest to perform but takes the longest to restore?
A. full
B. incremental
C. differential
Answer: B
69. Which of the following protocols map a logical address to a MAC (Media Access Control) address?
A. DNS
B. WINS
C. ARP
Answer: C
70. The major limiting factor for how long a cable can be in a segment is ___?
A. collisions
B. EMI
C. attenuation
Answer: C
71. Backing up the system state in Win 2000 Prof will backup the ___?
A. registry
B. boot files
C. all of the above
Answer: C
72. Equipment that is designed to help identify breaks and shorts in cables?
A. TDR
B. performance monitor
C. SNMP
Answer: A
73. Which company developed the Unix Operating System?
A. Sun
B. Microsoft
C. ATT
Answer: C
74. To start a Win 2000 Prof computer in the safe mode press ___ at startup?
A. F8
B. Ctl and Esc
C. F1
Answer: A
75. A bridge filters traffic using which type of address?
A. IP address
B. MAC address
C. TCP address
Answer: B
76. A large network with 500 users notice that at specific times in the morning and afternoon network congestion ties up their computers.What is the most likely cause?
A. power fluctuations
B. a terminator is not grounded
C. many users are logging on or off
Answer: C
77. A ___ is created when a unique IP address and port number are used to connect two computers?
A. SAP
B. media transfer coefficient
C. socket
Answer: C
78. During disaster recovery of a Win 2000 Prof computer if you "Enable Boot Logging" the file ___ is saved to the C:\winnt folder for analysis?
A. setuplog.txt
B. bootlog.txt ntbtlog.txt
Answer: C
79. Which of these WAN (Wide Area Network) protocols is the fastest?
A. Frame Relay
B. ATM
C. X.25
Answer: B
80. The only files on a Win 2000 Prof Emergency Repair Disk (ERD) are autoexec.nt, config.nt, and setup.log?
A. True
B. False
Answer: A
81. OSI layer responsible for mail and file transfers?
A. transport
B. data link
C. application
Answer: C
82. A protocol that functions at the network layer of the OSI model?
A. TCP
B. IP
C. SPX
Answer: B
83. A major advantage of ___ in an NT network is centralized security and administration?
A. user-level security
B. share-level security
C. RAID 5
Answer: A
84. OC-1 has a transmission rate that is close to ___ ?
A. T-1
B. T-3
C. ISDN
Answer: B
85. The maximum number of populated segments allowed in an Ethernet network?
A. 3
B. 4
C. 5
Answer: A
86. Using the TCP/IP protocol if the destination of the packet is outside the subnet then the packet is sent to the ___?
A. switch
B. bridge
C. default gateway
Answer: C
87. Entry in DNS to identify your mail server?
A. IDC
B. TU
C. MX
Answer: C
88. Toplology which is the least expensive to install?
A. ring
B. star
C. bus
Answer: C
89. Utility which can be used to identify bottlenecks in the network?
A. PING
B. WINIPCFG
C. TRACERT
Answer: C
90. What is the first octet range for a class A IP address?
A. 1- 126
B. 1- 128
C. 1- 191
Answer: A
91. After you setup the IP address and subnet mask your FIRST test should be with ___?
A. tracert to a known good server
B. ping 127.0.0.1
C. ping another computer on your segment
Answer: B
92. NetBIOS computer names can have up to ___ characters?
A. 256
B. 15
C. 20
Answer: B
93. Refers to the part of the network that is separated by routers, bridges, or switches?
A. partition
B. node
C. segment
Answer: C
94. Data is organized into FRAMES for transmission at this OSI level?
A. physical
B. data-link
C. network
Answer: B
95. 10Base2 coaxial has a limit of ___ computers per segment?
A. 2
B. 30
C. 100
Answer: B
96. Cable used for ArcNet networks?
A. RG-58
B. RG-59
C. RG-62
Answer: C
97. A Class A IP address uses the last ___ octet(s) for the host ID.The host ID is the unique part and identifies the individual user and part of the reason 50% of all IP addresses are Class A?
A. one
B. two
C. three
Answer: C
98. Of the three (3) RAID levels used by a Win 2000 server choose the one(s) that is/are fault tolerant?
A. 0, 1, and 5
B. 1 and 5
C. 5
Answer: B
99. The best method to restore the latest copy of the registry in a Win 2000 Server is to select the ___?
A. Emergency Repair Disk (ERD)
B. Recovery Console
C. Last Known Good Configuration
Answer: C
100. What routing protocol counts hops to the destination along multiple paths to determine the most efficient route?
A. ARP
B. DLC
C. RIP
Answer: C
101. The source and destination addresses are stored in the ___ of a packet?
A. data
B. trailer
C. header
Answer: C
102. Most commonly used type of modem?
A. synchronous
B. asynchronous
C. external
Answer: B
103. Operates at the network layer of the OSI model?
A. bridge
B. gateway
C. router
Answer: C
104. Disk duplexing (RAID 1) requires a minimum of ___?
A. 2 hard drives and 1 controller
B. 3 hard drives and 2 controllers
C. 2 hard drives and 2 controllers
Answer: C
105. Organization responsible for the OSI model?
A. ANSI
B. IEEE
C. ISO
Answer: C
106. Which topology uses the least amount of cabling?
A. star
B. bus
C. ring
Answer: B
107. According to RFC 1918 this range of Class A IP addresses are reserved for private intranets and are not supposed to be used on the internet (where x is any number from 1 to 254)?
A. 10.x.x.x
B. 20.x.x.x
C. 30.x.x.x
Answer: A
108. Cable classification for 10Base5 thicknet coaxial?
A. RG-8
B. RG-10
C. RG-58
Answer: A
109. Dial-up protocol that uses a virtual private network (VPN)?
A. SLIP (Serial Line Internet Protocol)
B. PPTP (Point-to-Point Tunneling Protocol)
C. PPP (Point to Point Protocol)
Answer: B
110. Type 9 ___ rated coaxial cable should be installed in drop ceilings to conform to fire code regulations?
A. SPF
B. PVC
C. plenum
Answer: C
111. The best device to use when monitoring a broadcast storm?
A. TDR
B. Digital Voltmeter
C. Protocol Analyzer
Answer: C
112. Class A IP addresses can accomodate 16 million hosts while a Class B can accomodate ___?
A. 254
B. 65,534
C. 4 million
Answer: B
113. SNMP relies on the information found in ___ to chart and graph components of the network for analysis and troubleshooting?
A. SMPs
B. MIBs
C. SAPs
Answer: B
114. Prescribes the greatest packet octet length that can be transmitted?
A. SAP
B. subnet mask
C. MTU
Answer: C
115. The default protocol on NT4 or Win 2000 servers?
A. IPX/SPX
B. NWLink
C. TCP/IP
Answer: C
116. A standard security algorithm developed in 1975 that uses 56-bit symmetric key encryption?
A. DES
B. EAP
C. PAP
Answer: A
117. Win 2000 security service that maintains permissions and passwords used to logon?
A. MMPE
B. CHAP
C. SAM
Answer: C
118. A voice grade demand priority standard developed by HP that is capable of 100Mbps transmissions?
A. 100VG-AnyLAN
B. 100BaseT
C. 100BaseFX
Answer: A
119. PPP is part of the ___ OSI layer?
A. physical
B. data link
C. network
Answer: B
120. Network connection device that is capable of sending packets along multiple paths depending on which path is the most efficient?
A. bridge
B. router
C. all of the above
Answer: B
121. Processes data using applications stored on its hard drive and sends the results back to the client.Saving the client the extra hard drive space he would need for the application as well as the CPU processing time?
A. file server
B. print server
C. application server
Answer: C
122. The static HOSTS text file used on UNIX systems that requires manual entries by the administrator was the precursor of ___.Today the HOSTS file system finds use mainly in maximum security operations which don't want anything changed automatically?
A. WINS
B. LMHOSTS
C. DNS
Answer: C
123. The minimum category of UTP cable that will meet the 10BaseT standard?
A. cat2
B. cat3
C. cat5
Answer: B
124. The easiest protocol to setup?
A. NetBEUI
B. NWLink
C. TCP/IP
Answer: A
125. Displays data on hardware components such as memory, CPU, and the hard drive in a chart or graph which describes how these devices are operating?
A. protocol analyzer
B. performance monitor
C. network monitor
Answer: B
126. The OSI layer responsible for name recognition, security logins, and synchronization of the connection?
A. presentation
B. application
C. session
Answer: C
127. Has twenty-four 64 Kbps channels for a total of 1.544 Mbps throughput?
A. T3
B. T1
C. X.25
Answer: B
128. Microsoft recommends that the %CPU usage should not be above 90% for a single CPU or above __% for multiple processors for any extended period?
A. 50
B. 70
C. 90
Answer: A
129. Your customer's computer is loaded with peripherals and is using COM1, COM2, LPT5, and LPT7.You install the NIC on IRQ3 and have a conflict.Which of the following is the NIC conflicting with?
A. the printer
B. COM1
C. COM2
Answer: C
130. The most widely used protocol?
A. NetBEUI
B. NWLink
C. TCP/IP
Answer: C
131. Can be thought of as a "hop counter" determining how many hops it takes along various paths to the destination and then telling the router which is the one with the least number of hops which most of the time is the quickest route?
A. DLC
B. SAP
C. RIP
Answer: C
132. Apple's LocalTalk protocol has a ___ computer limit?
A. 8
B. 32
C. 128
Answer: B
133. Ensures that one device is NOT overwhelmed by another with a data transmission?
A. SMB
B. CRC
C. flow control
Answer: C
134. You are setting up a 10Base2 Ethernet network for a client with three segments.There are 20 computers in each segment.How many terminators will you need for this network?
A. 1
B. 2
C. 6
Answer: C
135. Used to connect different media types but cannot filter or segment traffic?
A. bridge
B. hub
C. router
Answer: B
136. The most efficient way to control security in a client/ server network is to assign permissions to ___?
A. each shared resource
B. directories
C. groups
Answer: C
137. Which of the following IRQs can you set your NIC to without usually causing a conflict?
A. 4
B. 7
C. 10
Answer: C
138. ArcNet is one of the oldest protocols used.What year was it invented?
A. 1967
B. 1977
C. 1987
Answer: B
139. OSI layer that determines whether the transmission is a full or half-duplex transfer?
A. presentation
B. session
C. application
Answer: B
140. Compensates for a hard drive failure on an NT server?
A. RAID
B. WINS
C. DHCP
Answer: A
141. In addition to DNS, DHCP, and Active Directory to boot from an RIS server in Win 2000 requires a ___ compliant NIC?
A. RAS
B. PXE
C. SAP
Answer: B
142. The most popular dial-up protocol?
A. SLIP
B. UDP
C. PPP
Answer: C
143. The standard for several hubs connected in a linear fashion (token-bus)?
A. 802.3
B. 802.4
C. 802.5
Answer: B
144. The minimum number of disks required to implement a fault tolerant RAID system?
A. 1
B. 2
C. 3
Answer: B
145. For increased security Win 2000 enables encryption of files or folders on ___ volumes?
A. FAT32
B. NTFS
C. either FAT32 or NTFS
Answer: B
146. Characteristic of the TCP protocol?
A. fast but unreliable delivery
B. best effort delivery
C. assurance of packet delivery
Answer: C
147. Cable type that offers the least resistance to EMI?
A. coaxial
B. fiber-optic
C. UTP
Answer: C
148. Novell introduced TCP/IP as its default protocol in NetWare ___ ?
A. 3.x
B. 4.x
C. 5.x
Answer: C
149. This OSI layer packages bits into frames?
A. physical
B. data-link
C. network
Answer: B
150. Protocol used in Win 2000 to print to a URL on the internet.It requires either Peer Web Services or a IIS server to be installed?
A. IPP
B. SAP
C. IPSec
Answer: A
151. Novell added ___ which could bind many protocols to a NIC starting with NetWare 4.0?
A. NDIS
B. TSM
C. ODI
Answer: C
152. Port ___ is assigned to the SMTP?
A. 21
B. 25
C. 80
Answer: B
153. You are setting up a local peer-to-peer network that will have seven Win 98 computers.Internet access is not needed.Which protocol should you use?
(NetBEUI is the best one but if its not listed then pick the one with the lowest overhead)
A. X.25
B. NWLink
C. TCP/IP
Answer: B
154. Used for installing Win NT4?
A. setup.exe
B. winnt.exe
C. win.com
Answer: B
155. OSI layer responsible for error checking frames and adding MAC addresses to its tables?
A. presentation
B. transport
C. data-link
Answer: C
156. The initial formation of the packet header is started at this OSI level?
A. Application
B. Session
C. Physical
Answer: A
157. For a Class C IP address the first ___ octet(s) are reserved for the network ID?
A. 1
B. 2
C. 3
Answer: C
158. Utility used to check SMTP connectivity?
A. SNMP
B. LMHOSTS
C. Telnet
Answer: C
159. Prevents bounce-back of signals in a 10Base2 network?
A. T-connector
B. BNC
C. terminator
Answer: C
160. A set of "rules" for network transmissions?
A. topologies
B. protocols
C. gateways
Answer: B
161. What bridging protocol can be used to prevent bridge looping when more than one physical path exists between two or more network segments?
A. The Spanning Tree Protocol
B. The Inverted Tree Protocol
C. The Transparent Tree Protocol
D. The Domain Name Tree Protocol
E. The Looping Bridge Protocol
Answer: A
162. What are the two methods switching hubs use to transport data between devices?
A. Routing
B. Forwarding
C. Cut-through
D. Active
E. Store-and-forward
Answer: E,C
163. What happens when a device is disconnected from the middle of a BUS network?
A. The hub will propagate error messages to the rest of the network
B. All devices on the network will fail
C. The Server will stop responding to that device
D. Data will not be able to get to devices on the other side of this device
E. If a bridge is on the network, only that segment will be effected
Answer: A
164. What are some advantages of a Client/Server network over a Peer-to-Peer network?
A. Performance is better on a Peer-to-Peer
B. Security is better on a Client/Server
C. Performance is better on a Client/Server
D. Security is better on a Peer-to-Peer
E. Client/Server is easier to administrate
Answer: E,B
165. Name two protocols in the TCP/IP suite that function at the Transport layer of the OSI model.
A. TCP
B. IP
C. UDP
D. SNMP
E. ARP
Answer: C,A
166. IP is responsible for sorting and _________________ of packets.
A. Addressing
B. Holding
C. Organizing
D. Delivery
E. Verifying
Answer: D
167. What is the first octet range for a class B IP address?
A. 127-191
B. 128-191
C. 192-223
D. 1-127
E. 128-255
Answer: B
168. What is the first octet range for a class C IP address?
A. 1-126
B. 128-191
C. 192-225
D. 192-223
E. 192-255
Answer: D
169. What method of transporting data with a switch is fastest?
A. Store-and-forward
B. Cut-through
C. Routing
D. Spanning Tree
E. Pass-Through
Answer: B
171. The inner core of a coaxial cable that carries the signals is made of ___?
A. aluminum
B. copper
C. zinc
Answer: B
172. Active hubs can ___?
A. route the signal using the most efficient path
B. send an acknowledgement once the packet is received
C. regenerate the signal like repeaters
Answer: C
173. RAID 5 requires a minimum of __ hard drives?
A. 3
B. 4
C. 5
Answer: A
174. What is an advantage of Cat 3 UTP cable instead of RG-58 A/U coaxial?
A. UTP supports longer cable segments
B. UTP is less susceptible to EMI
C. UTP is easier to install and less expensive
Answer: C
175. A packet in a TCP/IP network whose destination is outside the local network goes to the ___?
A. TCP transceiver
B. default gateway
C. IP subnet
Answer: B
176. One important difference between routers and bridges is that when a bridge can't locate the destination address in its table it ___?
A. sends the transmission to the default gateway
B. dumps the packet
C. broadcasts the transmission to all ports
Answer: C
177. Novell's NetWare 5.0 was developed in part from the ___ standard?
A. ATM
B. NDIS
C. X.500
Answer: C
178. The freely distributed open source Unix based operating system that has gained in popularity recently?
A. XP
B. Linux
C. DLC
Answer: B
179. The term used to describe the physical layout of a network?
A. protocol
B. server
C. topology
Answer: C
180. Is the interface between the NIC drivers and MAC sublayer?
A. WINS
B. NDIS
C. DLC
Answer: B
181. Which topology provides for equal access to the network for all computers?
A. star
B. bus
C. ring
Answer: C
182. Using the TCP/IP protocol when is a subnet mask required?
A. only when connecting outside the LAN
B. only when using TCP/IP
C. for both intranet and internet usage
Answer: C
183. OSI level that ensures error-free delivery of packets?
A. data-link
B. network
C. transport
Answer: C
184. The IEEE specification for a token ring network?
A. 802.3
B. 802.5
C. 802.6
Answer: B
185. RIP counts hops (or routers it encounters) as the packet travels to its destination.Another name for a hop is a ___?
A. interval
B. sequence
C. metric
Answer: C
186. A protocol that functions at the transport layer of the OSI model?
A. IP
B. IPX
C. SPX
Answer: C
187. How many bits are there in an IP address?
A. 64
B. 32
C. 128
Answer: B
188. An easy to configure, fast, and efficient protocol recommended for small non-routable networks?
A. NetBEUI
B. TCP/IP
C. X.25
Answer: A
189. What type of troubleshooting device examines the network at the packet level?
A. TDR
B. VOM
C. protocol analyzer
Answer: C
190. Resolves domain names into IP addresses?
A. DHCP
B. DNS
C. WINIPCFG
Answer: B
191. ___ uses data encryption to secure data being transmitted over the internet so even if it is intercepted it can't be read without knowing the key?
A. DLC
B. SSL
C. ARP
Answer: B
192. Device drivers can be disabled in Win 2000 Prof in Device Manager or by using the ___?
A. ERD
B. Recovery Console
C. RDISK
Answer: B
193. Smart Cards in Win 2000 use the ___ RAS authentication protocol for security?
A. PAP
B. MSCHAP
C. EAP
Answer: C
194. Because of its low overhead this is the fastest of these protocols?
A. TCP/IP
B. NWLink
C. NetBEUI
Answer: C
195. The ERD made in the Win 2000 Server Backup utility contains the files needed to boot the computer?
A. True
B. False
Answer: B
196. Your client has a 10Base2 Ehternet network which is using 160m of RG-58A/U cable and two 50 ohm terminators that are both grounded.What is wrong with his network?
A. the terminators should be 93 ohms
B. he should be using RG-59/U cable
C. only one terminator should be grounded
Answer: C
197. Of the following the one that is NOT an alogorithm that determines the shortest path for routers?
A. SAP
B. RIP
C. OSPF
Answer: A
198. The most common topology in use today among corporate users?
A. bus
B. ring
C. star-bus
Answer: C
199. Uses a 93 ohm resistor?
A. RG62
B. RG58
C. RG59
Answer: A
200. OSI level responsible for compression and encryption of data?
A. session
B. application
C. presentation
Answer: C
201. Analog transmissions with multiple frequencies such as cable television signals use ___?
A. baseband
B. broadband
C. multiband
Answer: B
202. Network device which cannot be used to filter traffic by segmenting a network?
A. bridge
B. hub
C. switch
Answer: B
203. RAID can be used in these network operating systems?
A. NT
B. Netware
C. all of the above
Answer: C
204. When multiple protocols are used in a network ___ should always be placed at the top of the binding order?
A. TCP/IP
B. IPX/SPX
C. the one most frequently used
Answer: C
205. The standard cabling type used in AppleTalk and Token Ring?
A. UTP
B. STP
C. RG-58A/U
Answer: B
206. Arrange these WAN technologies in chronological order beginning with the oldest?
A. X.25, ISDN, ATM
B. ISDN, X.25, ATM
C. ATM, ISDN, X,25
Answer: A
207. A crossover cable can be used to connect?
A. a hub to a hub
B. a computer to a computer
C. all of the above
Answer: C
208. The RJ-45 connector used in UTP networks has ___ wires?
A. 2 pairs or 4
B. 4 pairs or 8
C. 6 pairs or 12
Answer: B
209. Displays the IP configuration information on a Win NT computer?
A. IPCONFIG
B. WINIPCFG
C. ARP
Answer: A
210. Displays the IP configuration information on a Win 98 computer?
A. IPCONFIG
B. WINIPCFG
C. WINS
Answer: B
211. The IEEE 802 standards operate at these layers of the OSI model?
A. network and transport
B. session and presentation
C. physical and data link
Answer: C
212. Can be used to show only one IP address for multiple users on the subnet?
A. proxy server
B. DHCP server
C. DNS server
Answer: A
213. What must be configured in TCP/IP for two computers on the same segment to communicate with each other?
A. IP address and subnet mask
B. default gateway
C. all of the above
Answer: A
214. The Windows NetBIOS name resolution protocol?
A. DNS
B. WINS
C. NDIS
Answer: B
215. The IEEE standard for wireless networks?
A. 802.2
B. 802.11
C. 802.8
Answer: B
216. SLIP supports ___?
A. TCP/IP
B. NetBEUI
C. all of the above
Answer: A
217. The proposed IPv6 standard is designed to dramatically extend the present limit of 4 billion IP addresses by using ___ bits instead of the present 32 bit IP addresses in use today?
A. 64 bit
B. 128 bit
C. 256 bit
Answer: B
218. You are installing cables for an Ethernet network in an office.The office manager doesn't want the media hanging in the crawl spaces and drop ceiling and wants you to share an existing conduit that already has telephone cables to hide the network cables you are installing.The cable segments will not be over 100 m.Which type of media should you choose?
A. coaxial
B. UTP
C. fiber optic
Answer: C
219. ArcNet was originally setup to operate at ___ Mbps?
A. 10 Mbps
B. 2.5 Mbps
C. 100 Mbps
Answer: B
220. Besides Token Ring ___ also uses tokens?
A. ArcNet
B. FDDI
C. all of the above
Answer: C
221. Running performance monitor your CPU usage averages 45% except when you load an application and it surges to 100%.Is there a problem?
A. yes, your CPU needs an upgrade or multiple CPUs may have to be installed
B. yes, but it is not the CPU, you need more RAM
C. no, its normal for the %usage to surge when loading an application
Answer: C
222. Interface between the computer and POTS?
A. ATAPI
B. SONET
C. TAPI
Answer: C
223. The following protocols are supported by RAS?
A. TCP/IP
B. NetBEUI
C. all of the above
Answer: C
224. Which architecture is recommended under high network utilization of up to 70% or 80%?
A. Ethernet bus
B. Token Ring
C. DLC
Answer: B
225. A token-ring network has a maximum limit of ___ computers?
A. 1024
B. 260
C. 512
Answer: B
226. Dial-up protocol used when a secure connection is desired?
A. PPP
B. SLIP
C. PPTP
Answer: C
227. Your IP address is 135.72.14.43.What portion of this IP address identifies your network ID?
A. 135
B. 135.72
C. 135.72.14
Answer: B
228. Allows users to connect to a remote network with a PPP dial-up connection?
A. RAS
B. SAP
C. SONET
Answer: A
229. Which of the following protocols need to be installed on your client's NT system before DHCP and DNS can be enabled?
A. TCP/IP
B. IPX/SPX
C. NetBEUI
Answer: A
230. A router uses ___ addressing to choose its path?
A. physical
B. logical
C. system
Answer: B
231. A ___ is used to connect two pieces of 10Base2 coaxial cable together?
A. T-connector
B. barrel connector
C. patch cable
Answer: B
232. One reason the ATM WAN protocol is faster than Frame Relay is because its packets are a ___ size which allows them to be switched and routed more easily?
A. variable
B. fixed
C. compressed
Answer: B
233. SQL is used to ___?
A. access databases
B. setup the default gateway
C. identify a defective NIC
Answer: A
234. Which of the following is a routable protocol?
A. LAT
B. NWLink
C. DLC
Answer: B
235. Uses token passing?
A. Frame Relay
B. ArcNet
C. ATM
Answer: B
236. For Cat 5 UTP, patch cables from the wall outlet to the computer can be a maximum of ___ m?
A. 1
B. 3
C. 10
Answer: B
237. The static text file ___ and DNS contain similar names and IP addresses?
A. LMHOSTS
B. HOSTS
C. WINS
Answer: B
238. Increases the data rate of modems?
A. encryption
B. compression
C. synchronization
Answer: B
239. Wireless technology commonly used to connect workstations that are all located in a single room?
A. IrDA
B. microwave
C. SONET
Answer: A
240. Your customer has a client/ server Ethernet network consisting of a server and 225 computers running Win NT4.What kind of security would you recommend to him for centralized control of access to files and directories on the network?
A. use a password for each file and groups for each directory
B. use a password for each file and directory shared
C. setup groups of shared resources and users who have access to these groups
Answer: C
241. Characteristic of an IEEE 802.3 10BaseT Ethernet network?
A. BNC T-connectors
B. RJ-11
C. UTP
Answer: C
242. You suspect a faulty NIC is causing a broadcast storm in a network.What troubleshooting tool would you use to locate which computer has the defective NIC?
A. VOM
B. protocol analyzer
C. TDR
Answer: B
243. A dial-up protocol that does not support automatic IP addressing using DHCP?
A. PPP
B. DLC
C. SLIP
Answer: C
244. Of the two types of routers the one that uses the discovery process to create its routing table?
A. static
B. dynamic
C. multiplexed
Answer: B
245. Your client's NT server has been having trouble booting.Where should you look first for some answers?
A. performance monitor
B. event viewer
C. SNMP
Answer: B
246. Another fast non-routable protocol with low overhead developed by DEC?
A. ATM
B. LAT
C. SPX
Answer: B
247. You are hired to setup a 100Mbps Ethernet network for a client in an office that already has cat 3 UTP installed.Your client wants to keep the costs to a minimum but needs the 100Mbps throughput.What should you recommend?
A. keep the existing cable but purchase 100Mbps hubs
B. keep the existing cable but use 100Mbps patch cable from the wall outlet
C. new cat 5 UTP and if not already installed 100 Mbps hubs and 100 Mbps NICs
Answer: C
248. Your client's 10BaseT Ethernet network using NetBEUI wants to access data on an IBM mainframe.What device will allow this connection?
A. bridge
B. gateway
C. router
Answer: B
249. Of the following protocols which is the fastest?
A. TCP/IP
B. IPX/SPX
C. UDP/IP
Answer: C
250. Access to files and folders in Win 2000 is accomplished using ___ ?
A. compression
B. tunneling
C. permissions
Answer: C
251. What happens when a device is disconnected from the middle of a BUS network?
A. The hub will propagate error messages to the rest of the network
B. All devices on the network will fail
C. The Server will stop responding to that device
D. Data will not be able to get to devices on the other side of this device
E. If a bridge is on the network, only that segment will be effected
Answer: B
252. Why is there a limit to the number of MAUs that can be connected together in a standard Token-ring network?
A. Too many MAUs would exceed the cable limits imposed by the Token Ring specification
B. Too many MAUs would create to large of a collision domain for communications to take place
C. Too many MAUs require more electricity than the devices can support
D. Too many devices connected through MAUs requires more time to get control of the token that communications becomes unacceptable
E. There is no limit to the number of MAUs a token ring network can support
Answer: D
253. How many devices can communicate simultaneously within a Token-ring LAN?
A. One for each MAU on the LAN
B. One
C. Two
D. As many devices as the administrator defines within the NOS
E. Between 1 and 5 if the ring speed is 16mbp/s
Answer: B
254. What are three common items that must be configured correctly when installing a Network Interface Card (NIC)?
A. PCI or ISA slot
B. IRQ setting
C. DMA Address
D. Driver
E. I/O Address
Answer: B,C,D,E
255. When troubleshooting connection problems you can confirm that physical layer devices are communicating by visually inspecting _______________ on the NIC and hub.
A. Cross over cable
B. The Link-Lights
C. The electrical connection
D. The Patch cable
E. The power light
Answer: B
256. What is the name of a common test performed on a NIC with vendor supplied diagnostic software?
A. NIC Test
B. Diagnostic Test
C. PING
D. Loopback
E. NICBack
Answer: D
257. Name two driver interfaces that allow a NIC to communicate on more than one protocol.
A. NDIS
B. NetBEUI
C. NetBIOS
D. ODI
E. UNIX
Answer: D,A
258. Bridges operate at the _____________ OSI level.
A. The Data-Link Layer
B. Top Layer
C. The Transport Layer
D. The Session Layer
E. The Network Layer
Answer: A
259. What bridging method is commonly used in Ethernet with only one bridge.
A. Collision
B. Routing
C. Transparent
D. Spanning Tree
E. Open Shortest Path First (OSPF)
Answer: C
260. Where are bridging address tables maintained when using source-route bridging?
A. In routing tables on the hard drive
B. In routing tables in RAM
C. In routing tables in ROM
D. At each PC on the network
E. On special routing devices

Answer: A

261. Can switching hubs propagate broadcast packets on the network?

A. Yes
B. No

Answer: A

262. How many physical addresses can be assigned to a NIC?

A. One
B. Two
C. Three; One by the IEEE, one by the NIC vendor, and one by the Network Administrator
D. Depends on the NOS
E. Depends on the NIC driver

Answer: A

263. What are the two types of routing connections?

A. Token passing
B. Connectionless
C. Reliable
D. Connection Orientated
E. Unreliable

Answer: D,B

264. What type of routing connection would typically fragment data packets?

A. Connection Orientated
B. Cut-Through
C. Reliable
D. Connectionless
E. Static

Answer: D

265. What name is given to Novell's client software loaded on the workstation, and what feature does it provide that earlier versions of the Generic Windows client do not offer?

A. NETX
B. Client for NetWare Networks
C. Client32
D. Support for NetWare Print Queues
E. Support for NetWare Directory Services

Answer: C,E

266. If two computers are assigned the same IP address then ___?

A. neither computer will be able to connect
B. the first computer to sign on will be able to connect the other will not
C. both computers will be able to connect to the local network but not to the internet

Answer: B

267. The physical address assigned by the NIC manufacturer?

A. subnet mask
B. IP address
C. MAC address

Answer: C

268. Similar to WINS in that it resolves NetBIOS names into IP address but stores this information in a text file?

A. LMHOSTS
B. DLC
C. DNS

Answer: A

269. A small peer to peer network uses ___ security?

A. user-level
B. share-level
C. permissions for

Answer: B

270. The TCP/IP protocol used on the internet allows for approximately ___ billion unique IP addresses?

A. 1
B. 4
C. 10

Answer: B

271. Records the number of hops and latency of the packet on its way to its destination?

A. IPCONFIG
B. TRACERT
C. PING

Answer: B

272. NDIS operates at which layer of the OSI model?

A. presentation
B. data-link
C. network

Answer: B

273. When checking the TCP/IP protocol you have just finished installing for connectivity the proper first step it to ___?

A. PING another computer on that segment
B. PING 127.0.0.1
C. PING the default gateway

Answer: B

274. As data travels down the OSI layers it reaches the ___ layer which is responsible for its bit conversion and actual transmission to other computers?

A. network
B. application
C. physical
Answer: C