1. ____ is/are frequently added to buttons, logos, banners, and other web page graphics.
Answer
Correct Answer:
Text
Note: This Question is unanswered, help us to find answer for this one
2. In ipv6, each extension header is identified by a specific ____ value.
Answer
Correct Answer:
Next Header
Note: This Question is unanswered, help us to find answer for this one
3. The result from anding 11001111 with 10010001 is ____.
Answer
Correct Answer:
10000001.
Note: This Question is unanswered, help us to find answer for this one
4. The ip addresses 169.254.0.1 and 169.254.255.254 are both examples of ___________________.
Answer
Correct Answer:
Private IP Addressing (APIPA)( record)
Note: This Question is unanswered, help us to find answer for this one
5. Arpanet, a new network of computers funded by arpa, was based on a plan developed by ____.
Answer
Correct Answer:
When performing a natural language search, a search engine generally includes stop terms.
Note: This Question is unanswered, help us to find answer for this one
6. The older version of ip has a ________ header of control information.
Answer
Correct Answer:
192-bit
Note: This Question is unanswered, help us to find answer for this one
7. A virtual private network may include ________.
Answer
Correct Answer:
Any of these
Note: This Question is unanswered, help us to find answer for this one
8. The _____ cable is a better-constructed version of the phone twisted-pair cable.
Answer
Correct Answer:
Cat 5.
Note: This Question is unanswered, help us to find answer for this one
9. Ring networks use the ________ method to avoid data collisions.
Answer
Correct Answer:
Token.
Note: This Question is unanswered, help us to find answer for this one
10. Quickbooks is an example of ________ software.
Answer
Correct Answer:
Accounting.
Note: This Question is unanswered, help us to find answer for this one
11. On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
Answer
Correct Answer:
Repeaters
Note: This Question is unanswered, help us to find answer for this one
12. In a client-server network, _________ gets software from different vendors to work together.
Answer
Correct Answer:
Middleware
Note: This Question is unanswered, help us to find answer for this one
13. Bluetooth, 3g, and wimax are examples of _____.
Answer
Correct Answer:
Network standards.
Note: This Question is unanswered, help us to find answer for this one
14. Before data is transmitted on a network, it is first broken up into ____________________.
Answer
Correct Answer:
Segments
Note: This Question is unanswered, help us to find answer for this one
15. An ip address in the form 197.169.100.1 is called a(n) ________.
Answer
Correct Answer:
Dotted quad.
Note: This Question is unanswered, help us to find answer for this one
16. At the top of the internet structure are tier 1 ___________, such as at&t and sprint.
Answer
Correct Answer:
Internet service providers
Note: This Question is unanswered, help us to find answer for this one
17. A(n) ________ device facilitates file sharing and data backup.
Answer
Correct Answer:
NAS
Note: This Question is unanswered, help us to find answer for this one
18. A _________ is the place at which the isp provides services to its customers.
Answer
Correct Answer:
Point-of-presence
Note: This Question is unanswered, help us to find answer for this one
19. ________ software helps you manage e-mail, contacts, calendars, and tasks in the same application.
Answer
Correct Answer:
Personal information manager
Note: This Question is unanswered, help us to find answer for this one
20. Email is the transmission of messages and files between computers or smart devices over a(n) ____.
Answer
Correct Answer:
Network.
Note: This Question is unanswered, help us to find answer for this one
21. High-speed ________ communication lines on the internet backbone use fiber optics.
Answer
Correct Answer:
OC
Note: This Question is unanswered, help us to find answer for this one
22. The most common type of internet search is the ____.
Answer
Correct Answer:
Keyword search
Note: This Question is unanswered, help us to find answer for this one
23. The connection to a peripheral is often called the ____.
Answer
Correct Answer:
Interface
Note: This Question is unanswered, help us to find answer for this one
24. Local area networks (lans) are used to _____.
Answer
Correct Answer:
Integrate services, such as email and file sharing
Note: This Question is unanswered, help us to find answer for this one
25. Internet networks are _____.
Answer
Correct Answer:
Packet-switched networks
Note: This Question is unanswered, help us to find answer for this one
26. Installing proper shielding on cables prevents ____.
Answer
Correct Answer:
Crosstalk
Note: This Question is unanswered, help us to find answer for this one
27. With ____, you can send electrical power over the ethernet connection.
Answer
Correct Answer:
Power over Ethernet (PoE)
Note: This Question is unanswered, help us to find answer for this one
28. With ____, data is sent one bit at a time, one after the other along a single path.
Answer
Correct Answer:
Serial transmission
Note: This Question is unanswered, help us to find answer for this one
29. Your computer needs a(n) _____ to access a network.
Answer
Correct Answer:
NIC
Note: This Question is unanswered, help us to find answer for this one
30. You need your own domain name if ____.
Answer
Correct Answer:
You have your own website
Note: This Question is unanswered, help us to find answer for this one
31. To access a newsgroup, a(n) ________ program is needed.
Answer
Correct Answer:
Newsreader
Note: This Question is unanswered, help us to find answer for this one
32. The _________ language, which was used in the first web page ever created, is still in use today.
Answer
Correct Answer:
HTML
Note: This Question is unanswered, help us to find answer for this one
33. In a web-based design, the internet serves as the _____ for the database management system.
Answer
Correct Answer:
Interface Front end
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
34. A(n) ________ network is often the type of network that is set up in a home or very small business.
Answer
Correct Answer:
Peer-to-peer
Note: This Question is unanswered, help us to find answer for this one
35. A _____ defines what must take place, not how it will be accomplished.
Answer
Correct Answer:
Logical design
Note: This Question is unanswered, help us to find answer for this one
36. The most common way to access the internet is through _______.
Answer
Correct Answer:
ISP (Internet Service Provider)
Note: This Question is unanswered, help us to find answer for this one
37. The fact that signal strength falls off with distance is called ________________.
Answer
Correct Answer:
Attenuation.
Note: This Question is unanswered, help us to find answer for this one
38. The ____ is the parent organization for all the various internet boards and task forces.
Answer
Correct Answer:
Internet Society
Note: This Question is unanswered, help us to find answer for this one
39. In _____, each department has its own computer for performing and controlling processing tasks.
Answer
Correct Answer:
Decentralized processing
Note: This Question is unanswered, help us to find answer for this one
40. Http is an example of a(n) ______ layer protocol.
Answer
Correct Answer:
Application
Note: This Question is unanswered, help us to find answer for this one
41. Developing effective apps is considered a critical element to the successful adoption of ________.
Answer
Correct Answer:
Wearable computing
Note: This Question is unanswered, help us to find answer for this one
42. All of the following are tasks for network administration of a large organization except ________.
Answer
Correct Answer:
Purchasing initial equipment for the network
Note: This Question is unanswered, help us to find answer for this one
43. _______is a nonprofit organization that is responsible for creating top-level domain names.
Answer
Correct Answer:
ICANN
Note: This Question is unanswered, help us to find answer for this one
44. A _____ links computer resources using either a wired or wireless connection.
Answer
Correct Answer:
Network
Note: This Question is unanswered, help us to find answer for this one
45. Examples of ____ include what, where, is, the, of, in, and how.
Answer
Correct Answer:
Stop words
Note: This Question is unanswered, help us to find answer for this one
46. ____ is an example of a web crawler.
Answer
Correct Answer:
Googlebot
Note: This Question is unanswered, help us to find answer for this one
47. ____ is a popular cable type used as a network backbone by major telecommunications companies.
Answer
Correct Answer:
Fiber optic
Note: This Question is unanswered, help us to find answer for this one
48. ____ defines how information travels across the internet.
Answer
Correct Answer:
Both a and b
Note: This Question is unanswered, help us to find answer for this one
49. Dsl uses ____ to transmit data.
Answer
Correct Answer:
Phone lines
Note: This Question is unanswered, help us to find answer for this one
50. Dependability is a characteristic of ____
Answer
Correct Answer:
Soft skills
Note: This Question is unanswered, help us to find answer for this one
51. Application layer data lives in the _____ section of the transport layer protocol
Answer
Correct Answer:
Data payload
Note: This Question is unanswered, help us to find answer for this one
52. A(n) _____ identifies a web page and is the address of a document or site on the internet.
Answer
Correct Answer:
Uniform resource locator (URL)
Note: This Question is unanswered, help us to find answer for this one
53. A(n) ____ is a computer used to host programs and data for a network.
Answer
Correct Answer:
Midrange server
Note: This Question is unanswered, help us to find answer for this one
54. A wired network is one that uses ____ to connect network devices.
Answer
Correct Answer:
Cables
Note: This Question is unanswered, help us to find answer for this one
55. A mainframe computer that controls a large network is called the ________ computer.
Answer
Correct Answer:
Host
Note: This Question is unanswered, help us to find answer for this one
56. A ____________________ is the name of a computer and can be used in place of its ip address.
Answer
Correct Answer:
Host name
Note: This Question is unanswered, help us to find answer for this one
57. A ______ has a similar role to a hub.
Answer
Correct Answer:
Switch
Note: This Question is unanswered, help us to find answer for this one
58. A ____ is a web-based resource that helps you find specific information on the web.
Answer
Correct Answer:
Search tool
Note: This Question is unanswered, help us to find answer for this one
59. You can create web pages using a(n) ____, such as adobe dreamweaver or amaya.
Answer
Correct Answer:
WYSIWYG editor
Note: This Question is unanswered, help us to find answer for this one
60. Many network problems can be traced to poor cable ____ techniques.
Answer
Correct Answer:
Installation
Note: This Question is unanswered, help us to find answer for this one
61. A ____ occurs when two transmissions interfere with each other
Answer
Correct Answer:
Collision
Note: This Question is unanswered, help us to find answer for this one
62. An mis infrastructure is ________and ________.
Answer
Correct Answer:
Dynamic; continually changing
Note: This Question is unanswered, help us to find answer for this one
63. A wireless ____ connects a wireless network to a wired network.
Answer
Correct Answer:
Access point
Note: This Question is unanswered, help us to find answer for this one
64. Each _____ contains data about people, places, things, or events.
Answer
Correct Answer:
Table
Note: This Question is unanswered, help us to find answer for this one
65. When voip relies on the internet, it is often called ____.
Answer
Correct Answer:
Telephony
Note: This Question is unanswered, help us to find answer for this one
66. Using a vpc, an organization can store its ________.
Answer
Correct Answer:
Most sensitive data.
Note: This Question is unanswered, help us to find answer for this one
67. The standard method of specifying the format of web pages is called ________.
Answer
Correct Answer:
Hypertext Markup Language (HTML)
Note: This Question is unanswered, help us to find answer for this one
68. A(n) ________ is a computer that connects to or requests services from a server.
Answer
Correct Answer:
Server
Note: This Question is unanswered, help us to find answer for this one
69. The most popular wireless lan technology is ____
Answer
Correct Answer:
Wi-Fi
Note: This Question is unanswered, help us to find answer for this one
70. A(n) ________ is an information system (is) that provides computer-based activity at a distance.
Answer
Correct Answer:
Remote action system
Note: This Question is unanswered, help us to find answer for this one
71. You use ________ to predict when a computer hardware system becomes saturated.
Answer
Correct Answer:
Capacity planning
Note: This Question is unanswered, help us to find answer for this one
72. The concept of two keys, public and private, is called ____ cryptography.
Answer
Correct Answer:
Public key
Note: This Question is unanswered, help us to find answer for this one
73. ____ is commonly used to enable web browsers to communicate with web servers.
Answer
Correct Answer:
HTTP
Note: This Question is unanswered, help us to find answer for this one
74. A ____ connects devices on a network so all the devices can access network components.
Answer
Correct Answer:
Router
Note: This Question is unanswered, help us to find answer for this one
75. Organizations can dynamically reuse servers that use web services internally by ________.
Answer
Correct Answer:
Creating a private cloud
Note: This Question is unanswered, help us to find answer for this one
76. _____ involves updating one or more databases with new transactions.
Answer
Correct Answer:
Data storage
Note: This Question is unanswered, help us to find answer for this one
77. Hardware diagnosis and failure alert are handled by ____
Answer
Correct Answer:
Network management services
Note: This Question is unanswered, help us to find answer for this one
78. Amazon redshift offers ________.
Answer
Correct Answer:
Petabyte-scale data warehouse
Note: This Question is unanswered, help us to find answer for this one
79. A ________ network can contain servers as well as individual computers.
Answer
Correct Answer:
Client/server
Note: This Question is unanswered, help us to find answer for this one
80. The network architecture that spans the largest physical distance is called a ________.
Answer
Correct Answer:
WAN
Note: This Question is unanswered, help us to find answer for this one
81. The internet protocol suite consists of the internet protocol and _____.
Answer
Correct Answer:
Transmission Control Protocol
Note: This Question is unanswered, help us to find answer for this one
82. One task of the ____ layer in a lan is to handle error detection using a crc.
Answer
Correct Answer:
Data Link
Note: This Question is unanswered, help us to find answer for this one
83. Ipv4 uses ________ bytes per internet address.
Answer
Correct Answer:
4
Note: This Question is unanswered, help us to find answer for this one
84. A typical tcp segment has a _______ header of control information.
Answer
Correct Answer:
192
Note: This Question is unanswered, help us to find answer for this one
85. The ____________ protocol places packets on, and receives them from, the network medium.
Answer
Correct Answer:
Network interface
Note: This Question is unanswered, help us to find answer for this one
86. A 32-bit-word computer can access _______.
Answer
Correct Answer:
4 bytes at a time
Note: This Question is unanswered, help us to find answer for this one
87. The ________ is a core internet protocol that guarantees the reliable delivery of packets.
Answer
Correct Answer:
TCP
Note: This Question is unanswered, help us to find answer for this one
88. The application layer separates data into ____, or discrete amounts of data.
Answer
Correct Answer:
PDU (protocol data units)
Note: This Question is unanswered, help us to find answer for this one
89. Network technologies that use _______________ light use single-mode fiber optic cabling.
Answer
Correct Answer:
Lazer light
Note: This Question is unanswered, help us to find answer for this one
90. In the osi (open system interconnection) model, the session layer ____.
Answer
Correct Answer:
Five
Note: This Question is unanswered, help us to find answer for this one
91. In the osi (open system interconnection) model, the presentation layer ____.
Answer
Correct Answer:
Six
Note: This Question is unanswered, help us to find answer for this one
92. In the osi (open system interconnection) model, the application layer ____.
Answer
Correct Answer:
Seven
Note: This Question is unanswered, help us to find answer for this one
93. A ____ can be used to intercept a telephone conversation.
Answer
Correct Answer:
Butt set
Note: This Question is unanswered, help us to find answer for this one
94. 802.11 is a series of standards to identify ______ networks.
Answer
Correct Answer:
Wi-Fi
Note: This Question is unanswered, help us to find answer for this one
95. 1000base-sx has a maximum throughput of ____.
Answer
Correct Answer:
1 Gbps
Note: This Question is unanswered, help us to find answer for this one
96. The primary design of a(n) _____ is to capture the transmissions from legitimate users.
Answer
Correct Answer:
Rogue access point
Note: This Question is unanswered, help us to find answer for this one
97. A hierarchical topology is also called a ____ topology.
Answer
Correct Answer:
Tree
Note: This Question is unanswered, help us to find answer for this one
98. ________ is used to allow remote login on another computer.
Answer
Correct Answer:
Telnet
Note: This Question is unanswered, help us to find answer for this one
99. A ____ can interpret physical addressing information
Answer
Correct Answer:
Bridge
Note: This Question is unanswered, help us to find answer for this one
100. ______________ provides a nonexclusive it infrastructure over the internet.
Answer
Correct Answer:
Public Cloud Computing
Note: This Question is unanswered, help us to find answer for this one
101. __________ encompasses intrusion detection, prevention and response.
Answer
Correct Answer:
Intrusion management
Note: This Question is unanswered, help us to find answer for this one
102. ____ is the process of reconstructing segmented data
Answer
Correct Answer:
Reassembly
Note: This Question is unanswered, help us to find answer for this one
103. The current version of wireless ethernet is ________.
Answer
Correct Answer:
802.11n
Note: This Question is unanswered, help us to find answer for this one
104. The ____ layer is the interface between network software and hardware.
Answer
Correct Answer:
Data Link
Note: This Question is unanswered, help us to find answer for this one
105. A(n) ____ network uses a central cable to which all network devices connect.
Answer
Correct Answer:
Bus
Note: This Question is unanswered, help us to find answer for this one
106. The exclusive use of 0s and 1s as a way to communicate with the computer is known as ____ language.
Answer
Correct Answer:
Machine
Note: This Question is unanswered, help us to find answer for this one
107. A wireless ________ extender is a wireless network device that repeats your wireless signal.
Answer
Correct Answer:
Range
Note: This Question is unanswered, help us to find answer for this one
108. A wi-fi ______ is a wireless local area network that provides internet access to the public.
Answer
Correct Answer:
Hot spot
Note: This Question is unanswered, help us to find answer for this one
109. ____ is an example of a circuit-switched network.
Answer
Correct Answer:
Telephone network
Note: This Question is unanswered, help us to find answer for this one
110. The main reason for offshore outsourcing is to _____.
Answer
Correct Answer:
lower bottom-line costs
Note: This Question is unanswered, help us to find answer for this one
111. _____ is a satellite-based tracking system that enables users to determine a person’s position.
Answer
Correct Answer:
Global positioning system
Note: This Question is unanswered, help us to find answer for this one
112. ____ describes a popular serial data transmission method.
Answer
Correct Answer:
RS-232
Note: This Question is unanswered, help us to find answer for this one
113. _____ radio frequency identification (rfid) tags have no internal power supply.
Answer
Correct Answer:
Passive
Note: This Question is unanswered, help us to find answer for this one
114. ________ is a very well known free voip provider
Answer
Correct Answer:
Skype
Note: This Question is unanswered, help us to find answer for this one
115. An organization that hires cloud services ________.
Answer
Correct Answer:
Can limit the response time of its Web pages
Note: This Question is unanswered, help us to find answer for this one
116. A ________ detects the speed that a given device can handle and communicates with it at that speed.
Answer
Correct Answer:
Modem
Note: This Question is unanswered, help us to find answer for this one
117. A _____ sends messages through several connected lans or to a wide-area network.
Answer
Correct Answer:
Router
Note: This Question is unanswered, help us to find answer for this one
118. A ____ measures the time a package takes to process a certain number of transactions
Answer
Correct Answer:
Benchmark
Note: This Question is unanswered, help us to find answer for this one
119. A firm that offers outsourcing solutions is called a _____.
Answer
Correct Answer:
Service provider
Note: This Question is unanswered, help us to find answer for this one
120. A firm that offers outsourcing solutions is called a ____ provider
Answer
Correct Answer:
Service
Note: This Question is unanswered, help us to find answer for this one
121. A communications ____ determines how devices on a network communicate
Answer
Correct Answer:
Protocol
Note: This Question is unanswered, help us to find answer for this one
122. __________ are high speed central networks to which multiple smaller networks connect
Answer
Correct Answer:
Corporate backbone networks
Note: This Question is unanswered, help us to find answer for this one
123. A(n) __________ circuit is another name for a multipoint configuration.
Answer
Correct Answer:
Shared
Note: This Question is unanswered, help us to find answer for this one
124. A(n) _____ is a device that connects a user to the internet.
Answer
Correct Answer:
Modem
Note: This Question is unanswered, help us to find answer for this one
125. The process of deciding which path the data takes on a network is called _____.
Answer
Correct Answer:
Routing
Note: This Question is unanswered, help us to find answer for this one
126. Step d in the accompanying figure is known as the ____ step.
Answer
Correct Answer:
Storage
Note: This Question is unanswered, help us to find answer for this one
127. The ____________ protocol enables client application programs to access the other layers.
Answer
Correct Answer:
Application
Note: This Question is unanswered, help us to find answer for this one
128. The ____________ command shows current sessions with associated port numbers.
Answer
Correct Answer:
Netstat -n
Note: This Question is unanswered, help us to find answer for this one
129. The ____ is a large, distributed database of internet addresses and domain names.
Answer
Correct Answer:
Domain Name System (DNS)
Note: This Question is unanswered, help us to find answer for this one
130. Switches can create ____ by grouping a number of ports into a broadcast domain.
Answer
Correct Answer:
VLANs
Note: This Question is unanswered, help us to find answer for this one
131. The cloud is defined with all the following terms, except ________.
Answer
Correct Answer:
Dedicated
Note: This Question is unanswered, help us to find answer for this one
132. The three basic types of subnetworks are ____, packet-switched, and broadcast.
Answer
Correct Answer:
Circuit-switched
Note: This Question is unanswered, help us to find answer for this one
133. The telephone system is an example of a ________ network.
Answer
Correct Answer:
Circuit-switched
Note: This Question is unanswered, help us to find answer for this one
134. The sonet network topology is a ____.
Answer
Correct Answer:
Ring
Note: This Question is unanswered, help us to find answer for this one
135. Wireless network devices use ________ to communicate with each other
Answer
Correct Answer:
Radio waves
Note: This Question is unanswered, help us to find answer for this one
136. Wireless internet is available using ________
Answer
Correct Answer:
Radio waves
Note: This Question is unanswered, help us to find answer for this one
137. When setting up a home network, make sure each node has ________.
Answer
Correct Answer:
Network adapter
Note: This Question is unanswered, help us to find answer for this one
138. Two of the most common types of communications hardware are ____ and network adapters.
Answer
Correct Answer:
Modems
Note: This Question is unanswered, help us to find answer for this one
139. To prevent eavesdropping, applications should ________.
Answer
Correct Answer:
Use encryption for confidentiality.
Note: This Question is unanswered, help us to find answer for this one
140. To connect to a lan, a computer requires ____.
Answer
Correct Answer:
A network interface card
Note: This Question is unanswered, help us to find answer for this one
141. The world-wide-web uses _____ protocol for transmitting content.
Answer
Correct Answer:
Hyper-text transfer
Note: This Question is unanswered, help us to find answer for this one
142. The web, messaging, and ____ communications are three of the more widely used internet services.
Answer
Correct Answer:
Video
Note: This Question is unanswered, help us to find answer for this one
143. The web server software accepts ____ requests from web browsers connected to the internet.
Answer
Correct Answer:
HTTP
Note: This Question is unanswered, help us to find answer for this one
144. The way people view and understand an object or subject depends primarily on ___________.
Answer
Correct Answer:
Perception
Note: This Question is unanswered, help us to find answer for this one
145. The individual geographic locations connected by a wan are known as ____.
Answer
Correct Answer:
WAN sites
Note: This Question is unanswered, help us to find answer for this one
146. The function of _____ is to convert digital signals to analog signals and vice-versa.
Answer
Correct Answer:
Modems
Note: This Question is unanswered, help us to find answer for this one
147. The fastest version of wireless ethernet is ________.
Answer
Correct Answer:
802.11ac
Note: This Question is unanswered, help us to find answer for this one
148. Web-based application software is software that ________.
Answer
Correct Answer:
Is stored completely on a web server instead of your hard drive
Note: This Question is unanswered, help us to find answer for this one
149. Using a ______________, packets are delivered to a single node on a network
Answer
Correct Answer:
Unicast address
Note: This Question is unanswered, help us to find answer for this one
150. To connect devices within your workspace, use a ______.
Answer
Correct Answer:
PAN.
Note: This Question is unanswered, help us to find answer for this one
151. The technique used for data sent over the internet is ____.
Answer
Correct Answer:
Packet Switching
Note: This Question is unanswered, help us to find answer for this one
152. With ____ transmission, data is sent one bit at a time.
Answer
Correct Answer:
Serial transmission
Note: This Question is unanswered, help us to find answer for this one
153. To transfer data packets between two or more networks, a ________ is used.
Answer
Correct Answer:
Router
Note: This Question is unanswered, help us to find answer for this one
154. The purpose of the ________ protocol is to ensure the integrity of the communication.
Answer
Correct Answer:
TCP
Note: This Question is unanswered, help us to find answer for this one
155. The process of naming program variables and assigning a type to them is called ____ variables.
Answer
Correct Answer:
Declaring
Note: This Question is unanswered, help us to find answer for this one
156. The problem of using ip numbers for addressing hosts in the internet are resolved using __________.
Answer
Correct Answer:
The concept of domains and the use of domain names
Note: This Question is unanswered, help us to find answer for this one
157. The protocols pop3 and __________ can be used to manage your incoming mail.
Answer
Correct Answer:
B. IMAP
Note: This Question is unanswered, help us to find answer for this one
158. Secure wi-fi networks and vpns use _____ to secure data transferred over a network.
Answer
Correct Answer:
Encryption
Note: This Question is unanswered, help us to find answer for this one
159. On most modern wans, a ring topology relies on ____ rings to carry data.
Answer
Correct Answer:
Redundant
Note: This Question is unanswered, help us to find answer for this one
160. On a client/server system, most of the powerful processing is handled by the ________.
Answer
Correct Answer:
Server
Note: This Question is unanswered, help us to find answer for this one
161. Normal telephone cable is a type of ________.
Answer
Correct Answer:
Twisted-pair cable
Note: This Question is unanswered, help us to find answer for this one
162. Network architectures are classified according to ________
Answer
Correct Answer:
The way they are controlled and the distance between their nodes
Note: This Question is unanswered, help us to find answer for this one
163. Multiple companies may take advantage of the ____ cloud to pool their cloud resources.
Answer
Correct Answer:
Community
Note: This Question is unanswered, help us to find answer for this one
164. Most wireless networks transport data as ____ signals.
Answer
Correct Answer:
RF (radio frequency)
Note: This Question is unanswered, help us to find answer for this one
165. Microsoft’s ____ is one of the major web-based development environments.
Answer
Correct Answer:
.NET
Note: This Question is unanswered, help us to find answer for this one
166. Many it ____ offer specialized services that help companies select software packages.
Answer
Correct Answer:
Consultants
Note: This Question is unanswered, help us to find answer for this one
167. Many certificates conform to the ____ standard.
Answer
Correct Answer:
X.509
Note: This Question is unanswered, help us to find answer for this one
168. Ipv6 was needed when ipv4 ________
Answer
Correct Answer:
No longer had enough unique addresses
Note: This Question is unanswered, help us to find answer for this one
169. In the sliding windows mechanism for flow control, the ____ before waiting for an acknowledgment
Answer
Correct Answer:
Sender sends as much data as specified by the receiver in the window size field
Note: This Question is unanswered, help us to find answer for this one
170. In the context of networking, on-demand computing is also known as ____.
Answer
Correct Answer:
Utility
Note: This Question is unanswered, help us to find answer for this one
171. In csma/ca, the amount of time a device is made to wait before it can transmit is called the ____.
Answer
Correct Answer:
Interframe space (IFS)
Note: This Question is unanswered, help us to find answer for this one
172. In a(n) ____ relationship, multiple users are provided with access to a server at the same time.
Answer
Correct Answer:
Client/server
Note: This Question is unanswered, help us to find answer for this one
173. In a(n) ____ cluster, every server in the cluster performs useful work.
Answer
Correct Answer:
Symmetric server
Note: This Question is unanswered, help us to find answer for this one
174. In a ___________ architecture, computers are both client and server, thus sharing the work.
Answer
Correct Answer:
Peer-to-peer
Note: This Question is unanswered, help us to find answer for this one
175. In ____, each datagram can follow one of many paths to reach its destination.
Answer
Correct Answer:
Packet switching
Note: This Question is unanswered, help us to find answer for this one
176. In _____ processing, each department has its own computer for performing processing tasks.
Answer
Correct Answer:
Decentralized
Note: This Question is unanswered, help us to find answer for this one
177. In _____ data transmission, multiple pieces of data are sent simultaneously.
Answer
Correct Answer:
Broadband
Note: This Question is unanswered, help us to find answer for this one
178. If an organization opts for software as a service (saas), it will have to ________.
Answer
Correct Answer:
Transfer data and develop procedures
Note: This Question is unanswered, help us to find answer for this one
179. High speed ________ communication lines use fiber optics
Answer
Correct Answer:
OC
Note: This Question is unanswered, help us to find answer for this one
180. Every computer on the internet has a unique numeric address called a(n) _______.
Answer
Correct Answer:
IP address
Note: This Question is unanswered, help us to find answer for this one
181. Electrical data suitable for transmission is called a(n) _______.
Answer
Correct Answer:
Signal
Note: This Question is unanswered, help us to find answer for this one
182. Each vm is known as a ____
Answer
Correct Answer:
Guest
Note: This Question is unanswered, help us to find answer for this one
183. Each computer or device on a network is called a(n) ______.
Answer
Correct Answer:
Node
Note: This Question is unanswered, help us to find answer for this one
184. Data is physically transmitted from one computer or terminal to another in the ________ layer.
Answer
Correct Answer:
Physical
Note: This Question is unanswered, help us to find answer for this one
185. Data is broken into _____ to be transmitted over the internet.
Answer
Correct Answer:
Packets
Note: This Question is unanswered, help us to find answer for this one
186. Data are sent through a network in bundles called ________.
Answer
Correct Answer:
Packets
Note: This Question is unanswered, help us to find answer for this one
187. Connecting two wide area networks requires devices such as high-speed ____.
Answer
Correct Answer:
Reflectors
Note: This Question is unanswered, help us to find answer for this one
188. Computer criminals use denial-of-service attacks on information systems to __________.
Answer
Correct Answer:
Prevent legitimate users from using the system's resources
Note: This Question is unanswered, help us to find answer for this one
189. Combining voice, video, and data communications into one interface is known as ____ communications.
Answer
Correct Answer:
Unified
Note: This Question is unanswered, help us to find answer for this one
190. Cloud resources are described as pooled because ________.
Answer
Correct Answer:
The same physical hardware is shared by many different organizations
Note: This Question is unanswered, help us to find answer for this one
191. Cloud resources are ________ because many different organizations use the same physical hardware.
Answer
Correct Answer:
Pooled
Note: This Question is unanswered, help us to find answer for this one
192. Cellular services use _____ to provide wireless connectivity to the internet.
Answer
Correct Answer:
3G and 4G cellular networks
Note: This Question is unanswered, help us to find answer for this one
193. Benefits of using the cloud include all of the following except ________.
Answer
Correct Answer:
Use of dumb terminals
Note: This Question is unanswered, help us to find answer for this one
194. An organization that uses cloud services ________.
Answer
Correct Answer:
Public
Note: This Question is unanswered, help us to find answer for this one
195. An it infrastructure includes ________.
Answer
Correct Answer:
Hardware, software, and services
Note: This Question is unanswered, help us to find answer for this one
196. A voip system supports voice and ____ services.
Answer
Correct Answer:
Videophone
Note: This Question is unanswered, help us to find answer for this one
197. A network ____ usually contains a computer, networked peripheral, or network device.
Answer
Correct Answer:
Node
Note: This Question is unanswered, help us to find answer for this one
198. A distributed computing system usually includes ____.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
199. A computer bus consists of data lines, __________, control lines, and power lines.
Answer
Correct Answer:
Address lines
Note: This Question is unanswered, help us to find answer for this one
200. A communication ______ is a virtual end point for data entering and leaving a digital device.
Answer
Correct Answer:
Port
Note: This Question is unanswered, help us to find answer for this one
201. A ___________ topology is fully redundant and is the most expensive to implement.
Answer
Correct Answer:
Mesh
Note: This Question is unanswered, help us to find answer for this one
202. A ________ topology uses more than one topology when building a network.
Answer
Correct Answer:
Hybrid
Note: This Question is unanswered, help us to find answer for this one
203. A ________ sends data from one collision domain to another.
Answer
Correct Answer:
Bridge
Note: This Question is unanswered, help us to find answer for this one
204. A ________ is a collection of computers connected to one another or to a common connection medium.
Answer
Correct Answer:
LAN
Note: This Question is unanswered, help us to find answer for this one
205. A ____ network is the only network that offers a dedicated path.
Answer
Correct Answer:
Circuit-switched
Note: This Question is unanswered, help us to find answer for this one
206. A ____ network uses radio frequencies to transmit data between computers and devices on a network.
Answer
Correct Answer:
Wireless
Note: This Question is unanswered, help us to find answer for this one
207. A ____ is not a type of network device.
Answer
Correct Answer:
Workstation
Note: This Question is unanswered, help us to find answer for this one
208. A ____ is a repeater with more than one output port.
Answer
Correct Answer:
Hub
Note: This Question is unanswered, help us to find answer for this one
209. A ____ is a computer on a network used to store files.
Answer
Correct Answer:
Server
Note: This Question is unanswered, help us to find answer for this one
210. ___________ ensures that the network is operating as efficiently as possible.
Answer
Correct Answer:
Performance management
Note: This Question is unanswered, help us to find answer for this one
211. ________ use multiple wi-fi access points to create a wide area network.
Answer
Correct Answer:
Mesh networks
Note: This Question is unanswered, help us to find answer for this one
212. ________ is a set of function and call programs that allow clients and servers to intercommunicate.
Answer
Correct Answer:
Middleware
Note: This Question is unanswered, help us to find answer for this one
213. ________ can be used to create what appears to be a private secure network over the internet.
Answer
Correct Answer:
Virtual Private Networks
Note: This Question is unanswered, help us to find answer for this one
214. ______ is a set of applications that manages the activities and resources of a computer.
Answer
Correct Answer:
System software
Note: This Question is unanswered, help us to find answer for this one
215. _____ is a markup language designed to transport and store data on the web.
Answer
Correct Answer:
Extensible Markup Language (XML)
Note: This Question is unanswered, help us to find answer for this one
216. _____ computing is also known as on-demand computing.
Answer
Correct Answer:
Utility
Note: This Question is unanswered, help us to find answer for this one
217. _____ combine data from different item attributes, or characteristics, to build a code.
Answer
Correct Answer:
Derivation code
Note: This Question is unanswered, help us to find answer for this one
218. _____ are used to share data between networks around the world.
Answer
Correct Answer:
WANs
Note: This Question is unanswered, help us to find answer for this one
219. ____ refers to the act of breaking into a computer or network.
Answer
Correct Answer:
Pharming
Note: This Question is unanswered, help us to find answer for this one
220. ____ provide a web-based client for checking e-mail.
Answer
Correct Answer:
Mail servers
Note: This Question is unanswered, help us to find answer for this one
221. ____ is the most widely implemented virtualization software today
Answer
Correct Answer:
VMware
Note: This Question is unanswered, help us to find answer for this one
222. ____ is an updated, digital version of x.25 that also relies on packet switching.
Answer
Correct Answer:
Frame relay
Note: This Question is unanswered, help us to find answer for this one
223. ____ is a disadvantage of using a wireless network when compared to a wired network.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
224. ____ ip addresses are ip addresses that are not assigned to any specific user or organization.
Answer
Correct Answer:
Private
Note: This Question is unanswered, help us to find answer for this one
225. ____ involves security audit personnel trying to hack into a network.
Answer
Correct Answer:
Penetration testing
Note: This Question is unanswered, help us to find answer for this one
226. ____ are wide area networks that are logically defined over public transmission systems.
Answer
Correct Answer:
VPNs
Note: This Question is unanswered, help us to find answer for this one
227. ____ are often considered first-level support.
Answer
Correct Answer:
Help desk analysts
Note: This Question is unanswered, help us to find answer for this one
228. ____ are encrypted messages that can be mathematically proven to be authentic.
Answer
Correct Answer:
Digital signatures
Note: This Question is unanswered, help us to find answer for this one
229. ____ and distributed routing are methods for controlling routing information.
Answer
Correct Answer:
Centralized
Note: This Question is unanswered, help us to find answer for this one
230. Which is an example of wireless encryption?
Answer
Correct Answer:
WPA
Note: This Question is unanswered, help us to find answer for this one
231. Which technology exists that allows a non-routable IP address to communicate with the global IP Internet Network?
Answer
Correct Answer:
NAT (Network Address Translation)
Note: This Question is unanswered, help us to find answer for this one
232. Which of the following is the maximum supported distance for an Ethernet cable run?
Answer
Correct Answer:
100 m / 328 ft
Note: This Question is unanswered, help us to find answer for this one
233. Which one is a connectionless protocol?
Answer
Correct Answer:
UDP
Note: This Question is unanswered, help us to find answer for this one
234. Which describes the purpose of an IP?
Answer
Correct Answer:
To uniquely identify a host computer on a network
Note: This Question is unanswered, help us to find answer for this one
235. Which best describes a client/server model?
Answer
Correct Answer:
A client host requests a service from an always-on server
Note: This Question is unanswered, help us to find answer for this one
236. Which type of device is a hub?
Answer
Correct Answer:
Broadcast
Note: This Question is unanswered, help us to find answer for this one
237. In TCP/IP model, on which layer does TCP and UDP protocols work?
Answer
Correct Answer:
Transport layer
Note: This Question is unanswered, help us to find answer for this one
238. Which of the following is the correct term for a WA router that responds to an ARP request intended for a remote host?
Answer
Correct Answer:
Proxy ARP
Note: This Question is unanswered, help us to find answer for this one
239. Which term is used to describe variability of packet delays within the same packet stream?
Answer
Correct Answer:
Jitter
Note: This Question is unanswered, help us to find answer for this one
240. Which entity is responsible for top-level country domains such as uk, ca, and jp?
Answer
Correct Answer:
Top-level domain (TLD) servers
Note: This Question is unanswered, help us to find answer for this one
241. Which is the name of the unit exchanged at the Data Link Layer?
Answer
Correct Answer:
Frames
Note: This Question is unanswered, help us to find answer for this one
242. Which of the following is the primary Layer 3 protocol in the TCP/IP suite?
Answer
Correct Answer:
IP
Note: This Question is unanswered, help us to find answer for this one
243. Which of the following is currently the most common and fastest transmission rate for ethernet cables?
Answer
Correct Answer:
Gigabit
Note: This Question is unanswered, help us to find answer for this one
244. Which does ADSL stand for?
Answer
Correct Answer:
Asymmetric digital subscriber line
Note: This Question is unanswered, help us to find answer for this one
245. Which defines a firewall in a Computer Network?
Answer
Correct Answer:
System to prevent unauthorized access
Note: This Question is unanswered, help us to find answer for this one
246. Which is the port number of HTTP?
Answer
Correct Answer:
80
Note: This Question is unanswered, help us to find answer for this one
247. Which of the following defines bandwidth?
Answer
Correct Answer:
Transmission rate
Note: This Question is unanswered, help us to find answer for this one
248. Which type of network is commonly used in houses?
Answer
Correct Answer:
LAN
Note: This Question is unanswered, help us to find answer for this one
249. Which of the following is NIC?
Answer
Correct Answer:
Network Interface Card
Note: This Question is unanswered, help us to find answer for this one
250. Which of the following describes a TCP protocol?
Answer
Correct Answer:
Connection Oriented
Note: This Question is unanswered, help us to find answer for this one
251. Which port number does SSH run on?
Answer
Correct Answer:
22
Note: This Question is unanswered, help us to find answer for this one
252. In the Command Prompt, which is the command to show the most detailed printout of IP address info?
Answer
Correct Answer:
ipconfig /all
Note: This Question is unanswered, help us to find answer for this one
253. Which network type covers the country level location?
Answer
Correct Answer:
Wide Area Network
Note: This Question is unanswered, help us to find answer for this one
254. Which type of Ethernet cable is used when connecting two network switches or two computers directly?
Answer
Correct Answer:
Cross-over
Note: This Question is unanswered, help us to find answer for this one
255. Which is the normal reach of a signal from a wireless router?
Answer
Correct Answer:
Depends on the physical constructs of the environment, e.g., walls
Note: This Question is unanswered, help us to find answer for this one
256. Which of the following is an example of a physical network address?
Answer
Correct Answer:
MAC address
Note: This Question is unanswered, help us to find answer for this one
257. Which of the following is the name of unit exchanged at network layer?
Answer
Correct Answer:
Packets
Note: This Question is unanswered, help us to find answer for this one
258. Which is the maximum Ethernet cable length between repeaters (computers or switches)?
Answer
Correct Answer:
100 m (328 feet)
Note: This Question is unanswered, help us to find answer for this one
259. Which process forwards information packets to hops?
Answer
Correct Answer:
Routing
Note: This Question is unanswered, help us to find answer for this one
260. At which port does the FTP client contact the FTP server?
Answer
Correct Answer:
21
Note: This Question is unanswered, help us to find answer for this one
261. Which of the following is the default MTU of a typical Ethernet?
Answer
Correct Answer:
1500
Note: This Question is unanswered, help us to find answer for this one
262. Which of the following defines a protocol?
Answer
Correct Answer:
A protocol defines the order and format of messages within a network.
Note: This Question is unanswered, help us to find answer for this one
263. Which protocol is used by Telnet?
Answer
Correct Answer:
TCP
Note: This Question is unanswered, help us to find answer for this one
264. Which is the difference between a network address and a port number?
Answer
Correct Answer:
Network address resolves the address of a hardware device, and port number searches and identifies a software application.
Note: This Question is unanswered, help us to find answer for this one
265. If you are able to browse to a website by IP address but not URL, which of these would be the cause?
Answer
Correct Answer:
The wireless networking capability on your computer is turned off.
Note: This Question is unanswered, help us to find answer for this one
266. What is the IEEE standard for Ethernet?
Answer
Correct Answer:
802.3
Note: This Question is unanswered, help us to find answer for this one
267. Which layer provide end-to-end delivery:
Answer
Correct Answer:
Network layer
Note: This Question is unanswered, help us to find answer for this one
268. How many collision domains exist on a 24 port switch?
Answer
Correct Answer:
24
Note: This Question is unanswered, help us to find answer for this one
269. What protocol does PPP use to identify the Network layer protocol?
Answer
Correct Answer:
NCP
Note: This Question is unanswered, help us to find answer for this one
270. Which of the following is the decimal and hexadecimal equivalents of the binary number 01101101?
Answer
Correct Answer:
109, 6D
Note: This Question is unanswered, help us to find answer for this one
271. How does a host determine that an IP address is not located on the local network?
Answer
Correct Answer:
"The ANDing process"
Note: This Question is unanswered, help us to find answer for this one
272. Assuming no PPP compression, standard network MTU of 1500, an IP packet that contains a TCP segment with TCP timestamps and is encapsulated in a Ethernet frame with no 802.1q tags, what would the data rate efficiency be?
Answer
Correct Answer:
94.1482%
Note: This Question is unanswered, help us to find answer for this one
273. What is the IP protocol number of TCP?
Answer
Correct Answer:
6
Note: This Question is unanswered, help us to find answer for this one
274. What is circuit switching?
Answer
Correct Answer:
A networking model where a computer is assigned dedicated network resources for transmission
Note: This Question is unanswered, help us to find answer for this one
275. An IP header contains a "Blank" field that identifies the type of data that is encapsulated in an IP Packet.
Answer
Correct Answer:
The Protocol Number
Note: This Question is unanswered, help us to find answer for this one
276. What is packet switching?
Answer
Correct Answer:
A networking model where a computer shares networking resources for transmission.
Note: This Question is unanswered, help us to find answer for this one
277. For UDP/IP or TCP/IP socket communication, what four parameters are generally needed?
Answer
Correct Answer:
Source Identifier, Source Port, Destination Identifier, and Destination Port
Note: This Question is unanswered, help us to find answer for this one
278. You have a network address of 192.168.56.0 with four subnets. You want to allow for maximum number of Hosts. What is the subnet mask you need to apply?
Answer
Correct Answer:
255.255.255.192
Note: This Question is unanswered, help us to find answer for this one
279. 138.19.50.0/27 provides how many subnets (including the all 0 and 1s subnet)?
Answer
Correct Answer:
8
Note: This Question is unanswered, help us to find answer for this one
280. How many collision domains exist on an 8 port hub?
Answer
Correct Answer:
1
Note: This Question is unanswered, help us to find answer for this one
281. Which of the following high-speed circuits is the fastest?
Answer
Correct Answer:
DS3
Note: This Question is unanswered, help us to find answer for this one
282. Which multiplexing allows an optical fibre to carry multiple optical signals simultaneously
Answer
Correct Answer:
WDM
Note: This Question is unanswered, help us to find answer for this one
283. You were given a network address of 67.230.100.64/27 from your ISP, what would the broadcast address be?
Answer
Correct Answer:
67.230.100.95
Note: This Question is unanswered, help us to find answer for this one
284. What is binary 00011000.01001100.00001010 equivalent to in Decimal?
Answer
Correct Answer:
24.76.10
Note: This Question is unanswered, help us to find answer for this one
285. Which protocol does DHCP use at the Transport layer?
Answer
Correct Answer:
UDP
Note: This Question is unanswered, help us to find answer for this one
286. Which is NOT a transport layer protocol?
Answer
Correct Answer:
SMTP
Note: This Question is unanswered, help us to find answer for this one
287. Which of the following is not a layer of the three tier hierarchical model?
Answer
Correct Answer:
Server
Note: This Question is unanswered, help us to find answer for this one
288. Which of the following is an example of a Class B network address?
Answer
Correct Answer:
163.4.2.1
Note: This Question is unanswered, help us to find answer for this one
289. An IPv4 header contains a Time To Live (TTL) field, what is the purpose of TTL?
Answer
Correct Answer:
To prevent routing loops
Note: This Question is unanswered, help us to find answer for this one
290. Which of the following cable types is most susceptible to cross talk?
Answer
Correct Answer:
UTP
Note: This Question is unanswered, help us to find answer for this one
291. What debugging tool would you use to troubleshoot TCP connections from client to a server that was experiencing slow transfers and intermittent connectivity?
Answer
Correct Answer:
Wireshark/TCPDump
Note: This Question is unanswered, help us to find answer for this one
292. Which wireless standard is designed for a maximum data tranfer rate of 11 Mb?
Answer
Correct Answer:
IEEE 802.11b
Note: This Question is unanswered, help us to find answer for this one
293. Which of the following protocol belongs to "Exterior Gateway Protocol"?
Answer
Correct Answer:
BGP
Note: This Question is unanswered, help us to find answer for this one
294. Which layer of the OSI model is responsible for establishing, managing, and terminating communications between two computers?
Answer
Correct Answer:
Session
Note: This Question is unanswered, help us to find answer for this one
295. The TCP 3-Way handshake contains three messages that are exchange between two hosts before any application data is transmitted, what does a SYN-ACK message indicate?
Answer
Correct Answer:
Second message of a 3-Way handshake
Note: This Question is unanswered, help us to find answer for this one
296. What layer of the OSI model does ICMP work on ?
Answer
Correct Answer:
Layer 3
Note: This Question is unanswered, help us to find answer for this one
297. How many layers does a TCP/IP Protocol stack have?
Answer
Correct Answer:
4
Note: This Question is unanswered, help us to find answer for this one
298. IPv4 addresses are divided into how many classes?
Answer
Correct Answer:
5
Note: This Question is unanswered, help us to find answer for this one
299. What command to view routing table in Windows
Answer
Correct Answer:
route print
Note: This Question is unanswered, help us to find answer for this one
300. What does RFC1918 provide?
Answer
Correct Answer:
3 ranges of non-routable addresses to use for private networks.
Note: This Question is unanswered, help us to find answer for this one
301. Which method of communication is used to support Ethernet type networks?
Answer
Correct Answer:
Broadcast
Note: This Question is unanswered, help us to find answer for this one
302. Which of the following is a rfc1918 address?
Answer
Correct Answer:
10.70.40.103
Note: This Question is unanswered, help us to find answer for this one
303. What is the Subnet Mask of this CIDR Block 123.45.67.89/29?
Answer
Correct Answer:
255.255.255.248
Note: This Question is unanswered, help us to find answer for this one
304. Which of the following documents detail address allocation for private internets?
Answer
Correct Answer:
RFC 1918
Note: This Question is unanswered, help us to find answer for this one
305. There are 5 class of IPv4 addresses, what are the class D addresses used for?
Answer
Correct Answer:
Multicast
Note: This Question is unanswered, help us to find answer for this one
306. In WLAN, the problem of a station not being able to detect a potential competitor because of being distant is the
Answer
Correct Answer:
Hidden Station Problem
Note: This Question is unanswered, help us to find answer for this one
307. At layer 4, what port is reserved for TFTP and what protocol is used?
Answer
Correct Answer:
69, UDP
Note: This Question is unanswered, help us to find answer for this one
308. When a host is generating an ARP packet, what is unknown?
Answer
Correct Answer:
The Target’s Ethernet Hardware Address
Note: This Question is unanswered, help us to find answer for this one
309. Your ISP has given you a block of addresses: 199.200.199.0/25; how many IP addresses are available for devices on a network.
Answer
Correct Answer:
126
Note: This Question is unanswered, help us to find answer for this one
310. There are two access points (wireless routers) A and B that belong to the same subnet. What happens when a mobile device connected to A leaves A's range and enters B's range?
Answer
Correct Answer:
The mobile device connects to the new access point B and keeps the same IP address.
Note: This Question is unanswered, help us to find answer for this one
311. TCP contains several features that benefit the protocol, which of the following answers is not a feature?
Answer
Correct Answer:
Low overhead
Note: This Question is unanswered, help us to find answer for this one
312. Is a socket controlled at the application level in an operating system?
Answer
Correct Answer:
Yes
Note: This Question is unanswered, help us to find answer for this one
313. If a maximum MTU was set to 1300 in the Windows Vista operating system, what would be the smallest packet you can send if you utilize the PING command with the Don't Fragment bit option set?
Answer
Correct Answer:
1272
Note: This Question is unanswered, help us to find answer for this one
314. A subset of machines receive and process the packets, this type of addressing is called:
Answer
Correct Answer:
Multicast
Note: This Question is unanswered, help us to find answer for this one
315. What is the purpose of the ARP (Address Resolution Protocol)?
Answer
Correct Answer:
Resolves an IP address to a MAC address
Note: This Question is unanswered, help us to find answer for this one
316. You are a Network Administrator for the ACME company; one of your webservers had a hardware issue, so you moved the IP address (192.168.1.99) to another webserver. Users from other networks are reporting that they still are not able to access the website. You are able to access the website locally; What is the best answer that will fix the issue.
Answer
Correct Answer:
Clear the ARP Cache on the router
Note: This Question is unanswered, help us to find answer for this one
317. What is the primary Layer 3 protocol in the TCP/IP suite?
Answer
Correct Answer:
IP
Note: This Question is unanswered, help us to find answer for this one
318. Is a DNS required for hosting a website?
Answer
Correct Answer:
No, but that means there will be no translation from hostname to IP address.
Note: This Question is unanswered, help us to find answer for this one
319. In what Operating System(s) are sockets file descriptors?
Answer
Correct Answer:
Unix and Mac OSX
Note: This Question is unanswered, help us to find answer for this one
320. Variability of packet delays within the same packet stream is called
Answer
Correct Answer:
Jitter
Note: This Question is unanswered, help us to find answer for this one
321. Which protocol is used to send a destination network unknown message back to originating hosts?
Answer
Correct Answer:
ICMP
Note: This Question is unanswered, help us to find answer for this one
322. Which topology uses terminators?
Answer
Correct Answer:
BUS
Note: This Question is unanswered, help us to find answer for this one
323. What is the maximum speed of a wireless G network?
Answer
Correct Answer:
54Mbps
Note: This Question is unanswered, help us to find answer for this one
324. What or who is responsible for top-level country domains such as uk, ca, and jp?
Answer
Correct Answer:
Top-level domain (TLD) servers.
Note: This Question is unanswered, help us to find answer for this one
325. In IPv4 addresses, how many addresses are available?
Answer
Correct Answer:
2^32
Note: This Question is unanswered, help us to find answer for this one
326. What does an assigned IP addres 169.254.0.12 indicate?
Answer
Correct Answer:
The computer is configured for DHCP and cannot connect to the DHCP server
Note: This Question is unanswered, help us to find answer for this one
327. Which topology has a single point failure, i.e. One cable broken whole network is off.
Answer
Correct Answer:
Bus
Note: This Question is unanswered, help us to find answer for this one
328. The name of unit exchanged at Data Link Layer is called:
Answer
Correct Answer:
Frames
Note: This Question is unanswered, help us to find answer for this one
329. A router that responds to an ARP request intended for a remote host is called what?
Answer
Correct Answer:
Proxy ARP
Note: This Question is unanswered, help us to find answer for this one
330. For 802.11b wireless, how many frequency channels are available to avoid collisions/interference?
Answer
Correct Answer:
11
Note: This Question is unanswered, help us to find answer for this one
331. Does P2P require an always on server?
Answer
Correct Answer:
No
Note: This Question is unanswered, help us to find answer for this one
332. In TCP/IP model, TCP and UDP protocols work on which layer:
Answer
Correct Answer:
Transport layer
Note: This Question is unanswered, help us to find answer for this one
333. Which network topology is based on a hierarchy of nodes?
Answer
Correct Answer:
Tree
Note: This Question is unanswered, help us to find answer for this one
334. What is the subnet mask of this network: 192.168.0.0/29
Answer
Correct Answer:
255.255.255.248
Note: This Question is unanswered, help us to find answer for this one
335. Which network type can have transmission of data in both directions but not simultaneously.
Answer
Correct Answer:
Half Duplex
Note: This Question is unanswered, help us to find answer for this one
336. IP Addresses are 48 bit addresses and MAC addresses are 32 bit addresses written in hexadecimal format
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
337. A network with more than one exit point.
Answer
Correct Answer:
different networks could communicate.
Note: This Question is unanswered, help us to find answer for this one
338. Who initiates a connection between a client and server?
Answer
Correct Answer:
Client
Note: This Question is unanswered, help us to find answer for this one
339. Which of the following IP addresses is a class A Network?
Answer
Correct Answer:
0.0.0.1
Note: This Question is unanswered, help us to find answer for this one
340. A server that has HTTP services and SMTP services bound to an interface functions with what protocol?
Answer
Correct Answer:
TCP
Note: This Question is unanswered, help us to find answer for this one
341. What fields in the header of an IP packet will be decremented by one that is passed through each router?
Answer
Correct Answer:
The Time to Live (TTL)
Note: This Question is unanswered, help us to find answer for this one
342. Where is a hub specified in the OSI model?
Answer
Correct Answer:
Physical layer
Note: This Question is unanswered, help us to find answer for this one
343. Which of the following is/are NOT the difference between TCP and UDP?
Answer
Correct Answer:
All of them are correct
Note: This Question is unanswered, help us to find answer for this one
344. Which are the default settings for a Windows XP computer network adapter?
Answer
Correct Answer:
DHCP and configured as part of a workgroup.
Note: This Question is unanswered, help us to find answer for this one
345. If you wanted to test to see if a TCP port was opened on a server, what command/tool would you use?
Answer
Correct Answer:
Telnet
Note: This Question is unanswered, help us to find answer for this one
346. Which service reduce the response time for client request and satisfy client request without involving origin server.
Answer
Correct Answer:
Web Caching(Proxy Server)
Note: This Question is unanswered, help us to find answer for this one
347. ____ protocol is used by Telnet.
Answer
Correct Answer:
TCP
Note: This Question is unanswered, help us to find answer for this one
348. Which IPv4 address is not valid?
Answer
Correct Answer:
25.740.265.70
Note: This Question is unanswered, help us to find answer for this one
349. Which switching type has the re-route capability:
Answer
Correct Answer:
Packet Switching
Note: This Question is unanswered, help us to find answer for this one
350. Hub is a ----------- device.
Answer
Correct Answer:
Broadcast
Note: This Question is unanswered, help us to find answer for this one
351. The default MTU of a typical Ethernet is
Answer
Correct Answer:
1500
Note: This Question is unanswered, help us to find answer for this one
352. IPv6 address space is:
Answer
Correct Answer:
2^128
Note: This Question is unanswered, help us to find answer for this one
353. What is a protocol?
Answer
Correct Answer:
A protocol defines the order and format of messages within a network.
Note: This Question is unanswered, help us to find answer for this one
354. Print server uses ________ which is a buffer that holds data before it is send to the printer.
Answer
Correct Answer:
Spool
Note: This Question is unanswered, help us to find answer for this one
355. What best describes a client/server model?
Answer
Correct Answer:
A client host requests a service from an always-on server.
Note: This Question is unanswered, help us to find answer for this one
356. What is the difference between network address and port number?
Answer
Correct Answer:
Network address resolve the address of hardware device and port number search and identify software application.
Note: This Question is unanswered, help us to find answer for this one
357. UDP is an unreliable protocol.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
358. Which device is the central device of star topology?
Answer
Correct Answer:
Hub/Switch
Note: This Question is unanswered, help us to find answer for this one
359. Which of the following major networks contain an incorrect subnet mask?
Answer
Correct Answer:
Class D with a mask 255.255.255.255 or /32
Note: This Question is unanswered, help us to find answer for this one
360. The process in which information packets are forwarded to hops is called:
Answer
Correct Answer:
Routing
Note: This Question is unanswered, help us to find answer for this one
361. How is data transferred over a network?
Answer
Correct Answer:
Through chunks called packets.
Note: This Question is unanswered, help us to find answer for this one
362. Is it possible to program at the socket level?
Answer
Correct Answer:
Yes
Note: This Question is unanswered, help us to find answer for this one
363. What is the maximum Ethernet cable length between repeaters (computers or switches)?
Answer
Correct Answer:
100 m (328 feet)
Note: This Question is unanswered, help us to find answer for this one
364. A user loads a web browser and browses to http://www.google.com, what is the highest layer of the OSI model the user is functioning at?
Answer
Correct Answer:
Application Layer
Note: This Question is unanswered, help us to find answer for this one
365. FTP client contacts FTP server at port:
Answer
Correct Answer:
21
Note: This Question is unanswered, help us to find answer for this one
366. When you connect two network switches or two computers directly what type of Ethernet cable do you need?
Answer
Correct Answer:
Cross-over
Note: This Question is unanswered, help us to find answer for this one
367. Which of the following describes how two communicating parties exchange information?
Answer
Correct Answer:
Protocols
Note: This Question is unanswered, help us to find answer for this one
368. Can a computer also act as a router?
Answer
Correct Answer:
Yes
Note: This Question is unanswered, help us to find answer for this one
369. Which of the network type covers the country level location:
Answer
Correct Answer:
Wide area Network
Note: This Question is unanswered, help us to find answer for this one
370. Which item is an example of a physical network address?
Answer
Correct Answer:
MAC address
Note: This Question is unanswered, help us to find answer for this one
371. What is the purpose of a static IP?
Answer
Correct Answer:
To gaurantee the IP of the computer/server will not change.
Note: This Question is unanswered, help us to find answer for this one
372. Which one is connectionless protocol?
Answer
Correct Answer:
UDP
Note: This Question is unanswered, help us to find answer for this one
373. What is the maximum supported distance for an Ethernet cable run?
Answer
Correct Answer:
100m / 328 ft
Note: This Question is unanswered, help us to find answer for this one
374. When can a wireless device NOT connect to a wireless network?
Answer
Correct Answer:
All of these.
Note: This Question is unanswered, help us to find answer for this one
375. What is currently the most common and fastest transmission rate for ethernet cables?
Answer
Correct Answer:
Gigabit
Note: This Question is unanswered, help us to find answer for this one
376. What technology exists that allows a non-routable IP address to communicate with the global IP Internet Network.
Answer
Correct Answer:
NAT (Network Address Translation)
Note: This Question is unanswered, help us to find answer for this one
377. Which is example of wireless encryption?
Answer
Correct Answer:
WPA
Note: This Question is unanswered, help us to find answer for this one
378. What is a handshake?
Answer
Correct Answer:
The intial set-up between two communicating hosts.
Note: This Question is unanswered, help us to find answer for this one
379. Is it possible for a computer on local network A to talk to a computer on a local network B?
Answer
Correct Answer:
Yes only if an entry-point (such as a router) for each local network is provided.
Note: This Question is unanswered, help us to find answer for this one
380. ADSL stands for:
Answer
Correct Answer:
Asymmetric digital subscriber line
Note: This Question is unanswered, help us to find answer for this one
381. Which protocol is used for email transmission?
Answer
Correct Answer:
IMAP
Note: This Question is unanswered, help us to find answer for this one
382. Which command will display the assigned IP address of a network adpater installed on a Windows XP system?
Answer
Correct Answer:
Ipconfig
Note: This Question is unanswered, help us to find answer for this one
383. What is a MAC address?
Answer
Correct Answer:
A unique hardware identification number for a network card.
Note: This Question is unanswered, help us to find answer for this one
384. TCP is a ___ protocol.
Answer
Correct Answer:
Connection Oriented
Note: This Question is unanswered, help us to find answer for this one
385. A firewall in a Computer Network is a
Answer
Correct Answer:
system to prevent unauthorized access.
Note: This Question is unanswered, help us to find answer for this one
386. Which of the following is not a network topology?
Answer
Correct Answer:
Access
Note: This Question is unanswered, help us to find answer for this one
387. Which of the following is a connection oriented protocol?
Answer
Correct Answer:
TCP
Note: This Question is unanswered, help us to find answer for this one
388. What is bandwidth?
Answer
Correct Answer:
Transmission rate.
Note: This Question is unanswered, help us to find answer for this one
389. What type of network is commonly used in houses?
Answer
Correct Answer:
LAN
Note: This Question is unanswered, help us to find answer for this one
390. Which of the following is an Ethernet connector type?
Answer
Correct Answer:
RJ-45
Note: This Question is unanswered, help us to find answer for this one
391. Is it possible to connect two computers without using any hubs or routers for network communication?
Answer
Correct Answer:
Yes, using a cross-over cable.
Note: This Question is unanswered, help us to find answer for this one
392. Can computers with different operating systems communicate over a network?
Answer
Correct Answer:
Yes, network communication is operating system independent. What is important is if the computers are using the same protocol.
Note: This Question is unanswered, help us to find answer for this one
393. What is NIC?
Answer
Correct Answer:
Network Interface Card
Note: This Question is unanswered, help us to find answer for this one
394. Port number of HTTP is:
Answer
Correct Answer:
80
Note: This Question is unanswered, help us to find answer for this one
395. Which is the best example of a secure password?
Answer
Correct Answer:
MySpecialPa$$w0rd
Note: This Question is unanswered, help us to find answer for this one
396. Open System Interconnection (OSI) Model has following layers:
Answer
Correct Answer:
7
Note: This Question is unanswered, help us to find answer for this one
397. Which IP address is reserved for loopback testing and debugging?
Answer
Correct Answer:
127.0.0.1
Note: This Question is unanswered, help us to find answer for this one
398. The name of unit exchanged at network layer is called:
Answer
Correct Answer:
Packets
Note: This Question is unanswered, help us to find answer for this one
399. When using the PING utility, what are you trying to accomplish?
Answer
Correct Answer:
Does connectivity exist between two IP end points
Note: This Question is unanswered, help us to find answer for this one
400. What is the normal reach of a signal from a wireless router?
Answer
Correct Answer:
Depends on the physical constructs of the environment, e.g., walls.
Note: This Question is unanswered, help us to find answer for this one
401. Given the IP address 82.77.201.1/24, what is the network number?
Answer
Correct Answer:
82.77.201.0
Note: This Question is unanswered, help us to find answer for this one
402. In the Command Prompt, what is the command to show the most detailed printout of IP address info?
Answer
Correct Answer:
ipconfig /all
Note: This Question is unanswered, help us to find answer for this one