Brooklyn Technical High School Per



Brooklyn Technical High School Per. ___________ Name ________________________________

Networking Review MP3 Test 1 Spring 2011 Date ________________

1. What wireless standard is the following PC Card most likely using based on the picture at right?

A) 802.11a B) 802.11b

C) 802.11d D) 802.11n

E) 802.16

2. What is the SSID of this wireless LAN?

A) NETGEAR

B) Smart Wizard

C) nglan

D) 00-0F-B5-D4-C6-82

3. What frequency range is shared by most new cellular telephones, some portable phones, and also the most popular type of Wireless LAN?

A) 2.4 – 2.4835GHz B) 3.4 – 3.4835 GHz C) 2.5 – 250 MHz D) 340 – 345 MHz

4. When a wireless network card is using passive scanning, how does it locate an available access point?

A) It initiates a discovery process for the nearest access point

B) It receives an identifying token from another workstation in the range of the access point

C) It receives a beacon signal from a nearby access point

D) It receives a response from the nearest access point the first time it tries to transmit to the network

5. Which wireless technology uses the 5-GHz frequency range?

A) 802.11 B) 802.11a C) 802.11b D) 802.11g

6. What is the maximum range of Bluetooth devices?

A) 1 meter B) 3 feet C) 10 meters D) 300 feet

7. Why should you configure a unique SSID for your wireless network?

A) A unique SSID number enables backward compatibility between 802.11g and 802.11b

B) A unique SSID boosts wireless network range

C) A unique SSID boosts wireless network data throughput

D) A unique SSID prevents access by any network device that does not have the same SSID configured

8. Wireless networking, or Wi-Fi, can be used to connect computers in a home, and many cities are using the technology to offer free or low-cost Internet access to residents. What's another name for Wi-Fi?

A) 802.3 B) 801.11 C) 801.12 D) 802.11 E) 801.22

9. A wireless network uses ___ waves to transmit signals.

A) Mechanical B) Radio C) Sound D) Oceanic

10. When would you use the program at right?

A) To play WWW Smackdown Professional Edition

B) To configure your Wireless NIC card for WEP Security

C) It is a GUI version of the ARP protocol

D) It is used to spoof your MAC address

11. Of the following networking standards, which is NOT used in Wi-Fi data transmissions?

A) 802.11a B) 802.11b

C) 802.11g D) 802.11n

E) 802.11q

12. WiMax, also known as _____, looks to combine the benefits of broadband and wireless. WiMax will provide high-speed wireless Internet over very long distances and will most likely provide access to large areas such as cities.

A) 802.11n B) 802.11b C) 802.11g D) 802.15 E) 802.16

13. What kind of card is pictured at right?

A) 802.11a B) 802.11b

C) 802.11g D) 802.11n

E) 802.16

14. What channel do most wireless routers use by default?

A) 1 B) 2 C) 4 D) 6 E) 11

15. What does the following picture show?

A) MAC address filtering

B) MAC address spoofing

C) Wireless NIC installation screen

D) Wireless Access Point Beaconing

16. Identify the class of the following IP address: 4.5.6.7

A) A B) B C) C

D) D E) None of the other choices

17. Using 129.19.78.100/22, what is the subnet mask for the given IP address?

A) 255.255.255.248

B) 255.255.248.0

C) 255.255.252.0

D) 255.255.255.252

E) 255.255.255.240

18. What does the picture at right indicate?

A) I am currently connected to the Network via the Wireless Card.

B) I am currently connected via the Ethernet Card

C) I am currently connected via the 802.3 Card

D) My dial-up network connection is on hold because I am making a telephone call at the moment

19. I’ve just moved my mouse cursor over the configuration utility icon in the taskbar. What information is displayed?

A) The WEP Key B) The WPA Key

C) The Protocol D) The SSID

20. I move the mouse pointer over the wireless adapter card icon in the taskbar and the displayed information pops us. Which standard is this card running?

A) 802.11a B) 802.11b

C) 802.11g D) 802.11d

E) 802.11e

21. What does the Wireless Mode shown indicate?

A) Devices will communicate directly with each other

B) Devices will communicate in simplex mode

C) Devices will communicate via an access point

D) This device is being configured as an access point.

E) This will use the Full Mesh physical topology

22. Right-clicking on the Wireless Network Adapter Icon and Clicking “View Available Wireless Networks” or clicking the D-Link configuration utility icon on the desktop displays the window below. What are “smitty” and “Belkin”?

A) The current users on the wireless network

B) The name brand of the wireless cards install on the PC.

C) The MAC addresses of WAPs in the area.

D) The name brand of the WAPs connected to the wireless network.

E) The SSIDs being broadcast by nearby WAPs.

23. Why are “smitty” and “Belkin” appearing in this list?

A) Because we are viewing all Wireless networks in the area

B) Because “smitty” and “Belkin” have configurations that broadcast their SSIDs

C) Popular name brand wireless routers like “smitty” and “Belkin” are detected by Windows XP

D) When you convert your MAC address to a NetBIOS name such as “smitty” or “Belkin”, it is automatically broadcast over the network.

E) Because “smitty” and “Belkin” are looking for free Internet access.

24. Double Clicking on the Wireless Adapter Icon displays the Wireless Network Connection Status Window

Which standard is this card running?

A) 802.11n B) 802.11b

C) 802.11g D) 802.11d

E) 802.11e

25. What kind of protection is Mojo using?

A) SSID B) WPA

C) WPA2 D) WEP

26. Clicking on Properties of the Wireless Network Connection Status Window produces the Window at right. I don’t want people who pass by my computer to see this icon. What should I do in the Window at right?

A) Uncheck QoS Packet Scheduler

B) Uncheck Client for Microsoft Networks.

C) Uncheck “Show icon in notification area when connected”

D) Uninstall TCP/IP

27. Clicking on the Wireless Network Tab produces the window below. Of all the available wireless networks

discovered by this Wireless NIC, which is the first one

that it tries to associate itself with?

A) DOETWAC00M001vl60g

B) Mojo

C) Natto

D) lynksys

28. What classful network does 171.16.1.1 address belong

in and what is its default subnet mask?

A) Class A / 255.0.0.0

B) Class C / 255.255.255.0

C) Class B / 255.255.0.0

D) Class B / 255.255.255.0

29. Clicking on properties yields the dialog box at right.

What can you tell from this Window?

A) You are using 802.11g B) You are using 802.11b

C) The WEP key was entered on this station directly

D) There is no security enabled on this machine

30. What would be the broadcast address IP address for a class

C network?

A) x.x.x.255

B) x.255.255.255.255

C) 192.168.255.255

D) 172.16.1.255

31. Say the hosts formula is [pic], what does the [pic]

Represent?

A) Number of 1’s in the subnet mask in binary

B) Number of 0’s in the subnet mask in binary

C) Number of 1’s in the IP Address

D) Number of 1’s in the IP address in binary

32. A couple of the members of the research team are going to meet in the park and want to be able to share our ideas on our laptops. Which choice should we choose to have this type of network in the park, a couple of blocks from our office building?

A) Any available network

B) Access Point

C) Computer to Computer

D) Turn off wireless network and sit close to each other and just look at each other’s work

33. The purpose of the OSI model is to

A) Standardize communication and facilitate vendor interoperability

B) Allow the Department of Defense to create DARPANet

C) Allow IBM compatible computers to interoperate with Macintosh PCs

D) Allow Rapid Development of Windows XP

34. When would you get the dialog box at right?

A) When trying to log on to my dial-up connection

B) When trying to connect to my Cable-modem connection

C) When trying to log on to my neighbors wireless network that has an SSID enabled

D) When trying to configure my wireless cable modem/DSL router

35. The OSI model has how many layers?

A) 7 B) 5 C) 4 D) 9

36. Connecting a node to another network over TCP/IP requires an IP #, a subnet mask and this.

A) WINS address B) Default Gateway

C) DNS address D) DHCP address

37. The Wireless Cable Modem/DSL Router below meets the following wireless networking standards:

802.11n, 802.11g, and 802.11b. Which is the fastest?

A) 802.11a B) 802.11b

C) 802.11g D) 802.11n

38. Which TCP/IP protocol is responsible for Domain Name to IP address resolution?

A) ARP B) DHCP C) WINS D) DNS

39. The NIC interface has a specific address by which it is identified. What is this address known as?

A) TCP address B) Address Resolution Protocol (ARP) address

C) Media Access Control (MAC) address D) Network Address

40. The classful IP address 192.23.45.123 has a default subnet mask of

A) 255.0.0.0 B) 255.255.0.0 C) 255.255.255.0 D) 255.255.255.255

41. There are two methods to assign IP addresses to nodes a TCP/IP network. Select the two methods.

A) static and dynamic B) static and automatic

C) Automatic and assigned D) Reserved and assigned

42. If a user wants to find his DNS address with a command line utility, what should he use?

A) IPCONFIG /ALL B) IPCONFIG

C) IPCONFIG /RELEASE D) IPCONFIG /REFRESHDNS

43. What is the E0 port considered in the network at right?

A) Default Gateway

B) Subnet Mask

C) DNS Server

D) DHCP Server

44. Scott’s system wants to send data to Roger’s system. Scott’s system knows Roger’s IP address, but it doesn’t know the MAC address, which it needs. What does the system use to request a MAC address for a known IP address?

A) ARP B) WINIPCFG C) IPCONFIG D) MACIP

45. What is the loopback address for IPv4?

A) 127.0.0.1 B) 0:0:0:0:0:0:0:0 C) ::1 D) 0:0:0:0:0:0:0:0

46. How many bits are in an IP address?

A) 16 B) 32 C) 64 D) None of the above

47. What is the maximum value of each octet in an IP address?

A) 28 B) 255 C) 256 D) None of the above

48. Convert the binary IP address 11000000.00000101.00100010.00001011 to its decimal form

A) 190.4.34.11 B) 192.4.34.10 C) 192.4.32.11 D) None of the above

49. If you are running into interference on your wireless network from other devices such as cordless phones, which of the settings at right would you change?

A) Wireless

B) SSID

C) Channel

D) Broadcast

50. Using classful addressing, what portion of the IP address 129.219.51.18 represents the network?

A) 129.219 B) 129

C) 14.1 D) 1

51. Which of the following addresses is an example of a broadcast address on the network 123.10.0.0 with a subnet mask of 255.255.0.0

A) 123.255.255.255 B) 123.10.255.255 C) 123.13.0.0 D) 123.1.1.1

52. What is the minimum number of bits that can be borrowed to form a subnet?

A) 1 B) 2 C) 4 D) None of the above

53. Which devices are recommended to have the IP addresses manually configured?

A) Only PC2, the laptop B) all servers

C) PC1 and PC2 D) all hosts and all servers

54. How many bits are in a subnet mask?

A) 16 B) 32 C) 64 D) None of the above

55. With a Class C address of 197.15.22.31 and a subnet mask of 255.255.255.224, how many bits have been borrowed to create a subnet?

A) 1 B) 2 C) 3 D) None of the above

56. What is the purpose of the Obtain an IP address automatically option shown in the exhibit?

A) To configure the computer to use DHCP

B) To configure the computer to use ARP

C) To configure the computer with a statically assigned IP address

D) To configure the computer to use a routing protocol

57. I want to connect to a computer via the address bar in a web browser. Which is a way that I CAN’T connect to the computer?

A) MAC address B) Domain name C) IP address D) Decimal IP address

58. Which is a setting that CAN’T be configured in the TCP/IP settings of a network connection on a local computer?

A) IP address B) DNS server address C) DHCP server address

D) Subnet Mask E) Default Gateway

59. Based on the information shown, which statement is true?

A) An ARP request must be used to obtain an address that is placed in the ARP table

B) Frames from other hosts in the network to this host will use a destination address of 00-06-25-25-6e-5d.

C) The only remote locations that can be reached from this host are 192.168.1.97 and 192.168.1.254.

D) If a packet is sent to a network device other than 192.168.1.97 and 192.168.1.254, an ARP request must be used.

60. The DNS root directory is represented by what symbol?

A) . (dot) B) / (forward slash) C) \ (Back Slash) D) $ (Dollar Sign)

61. What do you call the pool of addresses that a DHCP server may allocate to client systems?

A) DHCP pool B) DHCP scope C) DHCP array D) DHCP lease

62. What folder in the DHCP program lists the systems currently leasing DHCP IP addresses?

A) Reservations B) Address Pool C) Address Leases D) Current addresses

63. The users on your network haven’t been able to connect to the server for 30 minutes. You check and reboot the server, but it’s unable to ping either its own loopback address or any of your client systems. What should you do?

A) Restart the DHCP server B) Restart the DNS server

C) Replace the NIC on the server, because it failed D) Have you users ping the server

64. Select the protocol suite that is used to communicate across the Internet.

A) TCP/IP B) IPX/SPX C) NetBEUI D) AppleTalk

65. A web site address such as is called a(an)

A) IP address B) domain name C) MAC address D) protocol

66. For an IP address to be valid, it must use a combination of an IP address, along with a(n)

A) ARP B) DNS C) host address D) subnet mask

67. Why is a RARP request made?

A) A source knows its MAC address but not its IP address

B) The data packet needs to find the shortest route between the destination and the source

C) The administrator needs to manually configure the system

D) A link in the network fails, and a redundant system must be activated.

68. What is the main difference between BOOTP and DHCP?

A) BOOTP does not support subnetting while DHCP does

B) BOOTP requires that IP addresses be assigned manually at each client, while DHCP assigns addresses dynamically

C) BOOTP relies on a static table to associate IP addresses with MAC addresses, while DHCP does not

D) BOOTP is limited to serving

69. On a client server network, what computer initiates the process of assigning an IP address through DHCP?

A) The DHCP server B) The gateway C) The client’s primary authentication server D) The client

70. You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and note-taking. Clients need to access to the Internet, so you have configured your network’s DHCP server to issue them IP addresses automatically. What DHCP option should you modify to make sure you are not wasting addresses that were used by client’s who have completed a class and no longer need them?

A) The number of available addresses in the DHCP pool

B) The subnet mask for client computers, to isolate their group of IP addresses

C) The priority with which DHCP address requests are handled by the server

D) The lease duration for client computers

71. Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork?

A) 255.255.254.0 B) 255.255.248.0 C) 255.255.255.0 D) 255.255.0.0

72. Which IPv4 class of addresses provides the most networks?

A) class A B) Class B C) Class C D) Class D E) Class E

73. Which statement is correct in reference to the output shown?

A) The host automatically obtained the IP addresses 192.168.1.100

B) The LAN segment is subnetted to allow 254 subnets.

C) The DNS server for this host is on the same subnet as the host.

D) The host is assigned an address of 00-50-8D-F1-EA-8D by the administrator.

74. Which IPv4 class provides the highest number of host addresses per network?

A) class A B) Class B C) Class C D) Class D E) Class E

75. Which is not a private IP address?

A) 172.17.78.98 B) 192.168.45.23 C) 10.45.09.23 D) 15.87.234.87

76. IPv6 has _______ -bit addresses.

A) 32 B) 64 C) 128 D) 16

77. Which IPCONFIG switch releases DHCP-assigned addresses for all of the device's network interfaces?

A) /renew B) /clear C) /flush D) /release

78. ____________coordinates all the Internet's naming, addressing and protocol systems, and it accredits domain name registrars.

A) ICANN B) IEEE C) EIA/TIA D) ISO

79. What mode is shown in the picture at right?

A) Ad-hoc B) Infrastructure Mode

C) Token Star D) Ethernet

80. Which of the IEEE standards is considered to be the Ethernet standard?

A) 802.1 B) 802.3 C) 802.5 D) 802.15

81. A protocol that provides encrypted data transmissions for security on a wireless network is

A) 802.11b B) WEP C) 802.11a D) WINIPCFG

82. Which of the following is a physical address?

A) 00-0D-F3-23-A7-CC B) 124.100.15.4 C) 255.255.255.0 D)

83. A network consists of two subnets. A DHCP server is installed on one subnet and is configured to supply IP leases to hosts on both subnets. However, only hosts on the same subnet as the DHCP server receive IP addresses from the DHCP server. Which IP addresses would be assigned to hosts on the subnet not given IP addresses by the DHCP server?

A) Static IP addresses B) Class A IP addresses

C) IP addresses in the range 224.0.0.0 – 239.255.255.255

D) 169.254.0.0 – 169.255.255.255

84. At right is a picture of a device used on a wireless network. What is this device?

A) An access point B) A switch C) A router

D) An access point, switch, and router all in one.

85. What is the first step you should take to connect to a shared printer over your network?

A) From the Control Panel, choose Connect To Network Printer

B) From Windows Explorer, choose Connect To Network Printer

C) From the printers folder, double click Add Printer and choose Network Printer

D) From control Panel, select Add New Hardware and choose network printer

86. What is a static IP address?

A) A DHCP Client B) A permanently assigned address

C) One that must be grounded before use D) One that was generated by a capacitor

E) One that was generated for that session only

87. The PING command is used to check for

A) IP connectivity B) Modem functions

C) Computer domain name D) Corruption on a hard drive

88. What is the main function of a WINS server on the network?

A) It assigns IP addresses B) It assigns computer names

C) It resolves NETBIOS names to IP addresses

D) It allows dual booting between operating systems

89. Which is an example of a dynamic IP address?

A) WINS assigned address B) DHCP assigned address

C) Manually entered address D) Permanently assigned address

90. The IEEE Committee that was assigned oversight of wireless networking was the ________ committee.

A) 802.3 B) 802.5 C) 802.10 D) 802.11 E) 802.12

91. What IEEE specification governs wireless networking?

A) 802.1 B) 802.3 C) 802.7 D) 802.11

92. If an 802.11b device is communicating with an 802.11g device, at what speed will they communicate?

A) 11Mbps B) 54Mbps C) 1000Mbps D) 1Gbps

93. Why is NetBEUI not routable?

A) Because it does not contain a subprotocol at the Application Layer of the OSI model

B) Because it does not contain Network Layer addressing information

C) Because it is incompatible with modern routing techniques

D) Because its data frames are too large and slow to be periodically routed

94. What type of information must a protocol suite supply to be routable?

A) Logical Link Layer address B) Network Layer address

C) Physical Layer address D) MAC address

95. On networks, computers must use a common __________ in order for communication to occur

A) protocol B) operating system C) manufacturer D) hardware platform

96. If you the source knows the IP address of a local host, but must still determine the MAC address, which protocol is used?

A) WINS B) LMHOSTS C) DNS D) ARP

97. Which of the following addresses is an RFC1918 private IP address?

A) 19.109.220.103 B) 188.209.75.46 C) 192.168.54.10 D) 216.127.51.121

98. Which of the following can be used to automatically assign IP configuration to host computers?

A) DNS B) SNMP C) SMTP D) DHCP

99. At which of the following layers of the OSI model does a router function?

A) Physical B) Network C) Data-Link D) Application

100. In a Class B address, which of the four octets would be part of the network address?

A) The first one on the left B) The first three on the right

C) The first two on the left D) The last two on the right

101. APIPA is a protocol that does what?

A) It assures that information sent over the Internet remains private.

B) It protects encapsulated packets from corruption.

C) If a system is configured to obtain its IP address through DHCP, and there is no DHCP server found, it automatically assigns a private address.

D) It’s a 128-bit encryption protocol

102. In order to resolve the name , which type of server is required?

A) DHCP B) DNS

C) WINS D) NAT

103. What function would a DHCP server perform?

A) Block network intruders B) Lease IP addresses to clients

C) Locate a DNS server D) Translate NetBIOS names to TCP/IP addresses

104. You work as a network administrator. You notice suspicious IP traffic on the local subnet. After successfully pinging the source, which utility can you use to find the associated MAC address?

A) ipconfig B) nbtstat C) arp D) tracert

105. At what speed does 802.11n transmit data?

A) 11Mbps B) 27Mbps C) 54 Mbps D) more than 100Mbps

106. What is it called when a NIC “attaches” itself to an access point?

1) Attach B) Scan C) Probe D) Beacon E) Associate

107. What is the first step of the DHCP process?

A) The server broadcasts a discover packet to locate devices that have not been assigned an IP address.

B) The server broadcasts a message containing IP address available for devices that have not been assigned an IP address.

C) The client sends its IP address to the DHCP server for confirmation.

D) The client broadcasts a discover packet seeking an IP address from a DHCP server.

108. You work as a network technician. You are troubleshooting a connectivity problem at a particular website. You receive a timeout when you ping the website by name. You verify the TCP/IP configuration on the local computer. You successfully ping to the default gateway and the web server by IP address. Which is the probable cause of this problem?

A) The DNS server is down B) The DHCP server is down

C) The LAN is down D) The router is down.

109. In wireless networking, what is a beacon?

A) A person driving around trying to steal someone’s Internet access

B) A signal sent out by an access point advertising its presence

C) A signal sent out by a wireless NIC looking for a response from an access point

D) When a light on a wireless NIC lights up.

110. In wireless networking, what is a probe?

A) A person driving around trying to steal someone’s Internet access

B) A signal sent out by an access point advertising its presence

C) A signal sent out by a wireless NIC looking for a response from an access point

D) When a light on a wireless NIC lights up.

111. The original IP specification implemented name resolution using a special text file call

A) ARP B) LMHOSTS C) HOSTS D) CACHE E) START1.TXT

112. _______is the system used on the Internet for the mapping of names, such as , to IP Addresses such as 216.239.51.99.

A) DHCP B) DNS C) ARP D) WINS E) RouterSIM

113. Name the five steps of encapsulation

A) Data, frame, segment, bits, packets B) Bits, frame, packet, segment, data

C) Frame, bits, packet, segment, data D) Data, segment, packet frame, bits

114. The subment mask for the IP address 191.13.34.15/19 would be

A) 255.255.240.0 B) 255.254.224.0 C) 255.255.255.0 D) 255.255.224.0

115. The “/18” in the IP address 131.1.71.0/18 means:

A) There are 18 bits reserved for the subnet mask B) There are 18 bits reserved for hosts

C) There are 18 network addresses available D) There are 18 host addresses available

116. Your company is given a class B address of 150.5.0.0. You are responsible for creating 32 subnets with 500 hosts per subnet. What is your subnet mask?

A) 255.255.240.0 B) 255.255.248.0 C) 255.255.255.0 D) 255.255.252.0

117. You have an IP address of 165.100.32.44/19. What are the valid host addresses for the network?

A) 165.100.17.1-165.100.63.254 B) 165.100.32.1-165.100.63.254

C) 165.100.32.1-165.100.95.254 D) 165.100.33.1-165.100.96.254

118. How can you see the ARP cache?

A) ARP –A B) ARP –B C) ARP –C D) ARP –D E) ARP –S

119. What is the term used when a person drives around an area with a laptop computer and an 802.11 wireless LAN adapter in order to find unsecured wireless LANs.

A) Cheating B) Lying C) MAC Address Filtering D) War Driving

120. What is NOT a purpose of MAC-Address Filtering

A) To allow more than one person access to the Internet with only 1 IP address on your wireless connection

B) To allow only those users you want to access you wireless connection

C) To keep out unauthorized users from using your wireless connection

D) To secure your wireless LAN

121. How can you spoof your MAC address?

A) Open up your computer, take out the NIC and change the jumpers that determine the MAC address

B) Run software that causes your computer to send out a MAC address other than the one burned into the NIC.

C) Change your NIC card

D) Install a Token Ring NIC in place of the Ethernet NIC

122. Before a WINS server came about, the mapping of IP address to NetBIOS names used to be stored in a file called ________

A) ARP B) LMHOSTS C) HOSTS D) CACHE E) START1.TXT

123. What is it called when the computer with the appropriate IP address replies to the source that initiated the ARP request?

A) ARP Exchange B) ARP Acknowledgement C) ARP Reply D) ARP Table

124. What is the class of an IP address whose first octet is 174?

A) A B) B C) C D) D E) E

125. How do you enable IPv6 on your computer?

A) It is enabled by default on Windows XP B) Get Vista and it is the only IP version available

C) Go to your Local Area Connection Properties and Bind TCP/IP v6 to your NIC

D) Download TCP/IP v6 from Microsoft and install it in the root directory

126. Which of the following initiates an ARP request?

A) A device that can locate the destination IP address in its ARP table

B) The RARP server in response to a malfunctioning device

C) A diskless workstation with an empty cache

D) A device that cannot locate the destination MAC address in its ARP table

127. Which of the following best describes an APR table?

A) A way to reduce network traffic by providing lists of shortcuts and routers to common destinations.

B) A way to route data within networks that are divided into subnetworks.

C) A protocol that performs an application layer conversion of information from one stack to another

D) A section of RAM on each device that maps IP address to MAC addresses

128. What does ICMP stand for?

A) Internet Computer Management Protocol

B) Internet Control Management Protocol

C) Internet Control Message Protocol

D) Internet Computer Message Protocol

129. Which of the following program uses ICMP?

A) DNS B) FTP C) Telnet D) ping

130. You are unable to FTP files on the internet, using a SLIP dial-up connection. Which of the following could pose an alternative?

A) Install a proxy with TCP/IP B) Use a leased line C) Use a ISDN connection D) Change to PPP

131. If a Web Server was also configured with FTP services, how will the server differentiate between incoming packets intended for each respective service?

A) Protocol B) Port number C) Host header D) TCP address

132. The _________ protocol stores email on a remote server, allows users to view the headers and then decide whether they wish to download the message or not. You can also create and manipulate folders or mailboxes on the server, delete messages or search for certain parts.

A) IMAP B) SMTP C) POP3 D) NTP

133. Before a WINS server came about, the mapping of IP address to NetBIOS names used to be stored in a file called ________

A) ARP B) LMHOSTS C) HOSTS D) CACHE E) START1.TXT

134. What is it called when the computer with the appropriate IP address replies to the source that initiated the ARP request?

A) ARP Exchange B) ARP Acknowledgement C) ARP Reply D) ARP Table

135. What is the class of an IP address whose first octet is 174?

A) A B) B C) C D) D E) E

136. How do you enable IPv6 on your computer?

A) It is enabled by default on Windows XP B) Get Vista and it is the only IP version available

C) Go to your Local Area Connection Properties and Bind TCP/IP v6 to your NIC

D) Download TCP/IP v6 from Microsoft and install it in the root directory

137. What command line utility returns the output shown below?

[pic]

A) ARP –A B) IPCONFIG /ALL C) SHOW /PHYSICAL

D) GETMAC E) SHOW /MAC

138. Which of the following initiates an ARP request?

A) A device that can locate the destination IP address in its ARP table

B) The RARP server in response to a malfunctioning device

C) A diskless workstation with an empty cache

D) A device that cannot locate the destination MAC address in its ARP table

139. Which of the following best describes an ARP table?

A) A way to reduce network traffic by providing lists of shortcuts and routers to common destinations.

B) A way to route data within networks that are divided into subnetworks.

C) A protocol that performs an application layer conversion of information from one stack to another

D) A section of RAM on each device that maps IP address to MAC addresses

140. In the diagram at right, what kinds of IP addresses are shown for the attached computers?

A) Private IP addresses

B) Public IP addresses

C) APIPA addresses

D) Subnet Mask addresses

E) Physical Addresses

141. A protocol that provides encrypted data transmissions for security on a wireless network is

A) 802.11b B) WEP C) 802.11a D) WINIPCFG

142. What IEEE specification governs wireless networking?

A) 802.1 B) 802.3 C) 802.7 D) 802.11

143. If an 802.11b device is communicating with an 802.11g device, at what speed will they communicate?

A) 11Mbps B) 54Mbps C) 1000Mbps D) 1Gbps

144. On networks, computers must use a common __________ in order for communication to occur

A) protocol B) operating system C) manufacturer D) hardware platform

145. What is it called when a NIC “attaches” itself to an access point?

2) Attach B) Scan C) Probe D) Beacon E) Associate

146. In wireless networking, what is a beacon?

A) A person driving around trying to steal someone’s Internet access

B) A signal sent out by an access point advertising its presence

C) A signal sent out by a wireless NIC looking for a response from an access point

D) When a light on a wireless NIC lights up.

147. In wireless networking, what is a probe?

A) A person driving around trying to steal someone’s Internet access

B) A signal sent out by an access point advertising its presence

C) A signal sent out by a wireless NIC looking for a response from an access point

D) When a light on a wireless NIC lights up.

148. Name the five steps of encapsulation

A) Data, frame, segment, bits, packets B) Bits, frame, packet, segment, data

C) Frame, bits, packet, segment, data D) Data, segment, packet frame, bits

149. What is the term used when a person drives around an area with a laptop computer and an 802.11 wireless LAN adapter in order to find unsecured wireless LANs.

A) Cheating B) Lying C) MAC Address Filtering D) War Driving

150. What is NOT a purpose of MAC-Address Filtering

A) To allow more than one person access to the Internet with only 1 IP address on your wireless connection

B) To allow only those users you want to access you wireless connection

C) To keep out unauthorized users from using your wireless connection

D) To secure your wireless LAN

151. How can you spoof your MAC address?

A) Open up your computer, take out the NIC and change the jumpers that determine the MAC address

B) Run software that causes your computer to send out a MAC address other than the one burned into the NIC.

C) Change your NIC card

D) Install a Token Ring NIC in place of the Ethernet NIC

152. The IEEE Committee that was assigned oversight of wireless networking was the ________ committee.

A) 802.3 B) 802.5 C) 802.10 D) 802.11 E) 802.12

153. What IEEE specification governs wireless networking?

A) 802.1 B) 802.3 C) 802.7 D) 802.11

154. If an 802.11b device is communicating with an 802.11g device, at what speed will they communicate?

A) 11Mbps B) 54Mbps C) 1000Mbps D) 1Gbps

155. At what speed does 802.11n transmit data?

A) 11Mbps B) 27Mbps C) 54 Mbps D) more than 100Mbps

156. What is it called when a NIC “attaches” itself to an access point?

Attach B) Scan C) Probe D) Beacon E) Associate

157. In wireless networking, what is a beacon?

A) A person driving around trying to steal someone’s Internet access

B) A signal sent out by an access point advertising its presence

C) A signal sent out by a wireless NIC looking for a response from an access point

D) When a light on a wireless NIC lights up.

158. In wireless networking, what is a probe?

A) A person driving around trying to steal someone’s Internet access

B) A signal sent out by an access point advertising its presence

C) A signal sent out by a wireless NIC looking for a response from an access point

D) When a light on a wireless NIC lights up.

159. Name the five steps of encapsulation

A) Data, frame, segment, bits, packets B) Bits, frame, packet, segment, data

C) Frame, bits, packet, segment, data D) Data, segment, packet frame, bits

160. How can you see the ARP cache?

A) ARP –A B) ARP –B C) ARP –C D) ARP –D E) ARP –S

161. What is the term used when a person drives around an area with a laptop computer and an 802.11 wireless LAN adapter in order to find unsecured wireless LANs.

A) Cheating B) Lying C) MAC Address Filtering D) War Driving

162. What is NOT a purpose of MAC-Address Filtering

A) To allow more than one person access to the Internet with only 1 IP address on your wireless connection

B) To allow only those users you want to access you wireless connection

C) To keep out unauthorized users from using your wireless connection

D) To secure your wireless LAN

163. How can you spoof your MAC address?

A) Open up your computer, take out the NIC and change the jumpers that determine the MAC address

B) Run software that causes your computer to send out a MAC address other than the one burned into the NIC.

C) Change your NIC card

D) Install a Token Ring NIC in place of the Ethernet NIC

164. I found an older hub with a port labeled MDI/MDI-X and had a toggle switch on it. What is the purpose of this port?

A) It allows you to connect a monitor to it to configure the hub.

B) It allows you to connect a computer to it to configure the hub

C) It allows you to use a straight through cable with the MDI position to connect to another hub

D) It allows you to use a crossover cable with the MDI position to connect to another hub.

165. My daughter took her laptop to her grandmother’s house that doesn’t have any Internet access, but she was browsing the Internet. How is this possible? Which is NOT a possible answer?

A) A neighbor has a wireless router that is set to broadcast SSIDs

B) A neighbor has a wireless router that doesn’t have a WEP key set

C) My daughter has a wireless NIC on her laptop that picked up a beacon signal from a wireless router and connected to it.

D) She used a WEP key cracking tool I accidentally left running on the laptop.

E) The wireless card in the laptop picked up the Time Warner Cable signal from the cable box.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download