MCQs > IT & Programming > Networking MCQs > Basic Networking MCQs

Basic Networking MCQ

Basic Networking MCQ

1. The most common data link layer protocol for wired connections is _____.

Answer

Correct Answer: Ethernet

Note: This Question is unanswered, help us to find answer for this one

2. What sets atm apart from ethernet is its ____ size.

Answer

Correct Answer: Fixed packet

Note: This Question is unanswered, help us to find answer for this one

3. Individuals often join _____ organizations for monetary reasons.

Answer

Correct Answer: Utilitarian

Note: This Question is unanswered, help us to find answer for this one

4. In classful addressing, the class b ipv4 address network id is located in the ____.

Answer

Correct Answer: First 16 bits

Note: This Question is unanswered, help us to find answer for this one

5. The key point with ipv6 deployments is that they use a new ____ layer or routed protocol.

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

6. __________________ is the detection and signaling of device, link, or component faults.

Answer

Correct Answer: Fault management

Note: This Question is unanswered, help us to find answer for this one

7. ____ defines a method for discovering a path mtu (pmtu) using icmp.

Answer

Correct Answer: RFC 1191

Note: This Question is unanswered, help us to find answer for this one

8. Without ____, a bus network would suffer from signal bounce.

Answer

Correct Answer: Terminators

Note: This Question is unanswered, help us to find answer for this one

9. Today, ____ remains the lan protocol of preference for netware 6 and above.

Answer

Correct Answer: TCP/IP

Note: This Question is unanswered, help us to find answer for this one

10. The advantage of ________________ is they can be read over greater distances.

Answer

Correct Answer: Active RFID tags.

Note: This Question is unanswered, help us to find answer for this one

11. The 10gbase-t standard is considered a breakthrough for transmitting 10 gbps over ____ medium.

Answer

Correct Answer: Twisted pair

Note: This Question is unanswered, help us to find answer for this one

12. The 10-gigabit fiber optic standard with the shortest segment length is ____.

Answer

Correct Answer: 10GBase-SR

Note: This Question is unanswered, help us to find answer for this one

13. The ___________________ wiring standard uses the green pair of wires for pins 1 and 2.

Answer

Correct Answer: T568A

Note: This Question is unanswered, help us to find answer for this one

14. By far, the most popular expansion board nic today is one that uses a(n) ____ bus.

Answer

Correct Answer: PCIe

Note: This Question is unanswered, help us to find answer for this one

15. Broadband is measured in _____ .

Answer

Correct Answer: Mbps

Note: This Question is unanswered, help us to find answer for this one

16. ____ are often considered first level support

Answer

Correct Answer: Help desk analysts

Note: This Question is unanswered, help us to find answer for this one

17. Voip sends packets using real-time transport protocol (rtp), which is a ________ protocol.

Answer

Correct Answer: Layer 4

Note: This Question is unanswered, help us to find answer for this one

18. A neuron will fire if excitatory signals are stronger than _____ signals.

Answer

Correct Answer: INHIBITORY

Note: This Question is unanswered, help us to find answer for this one

19. A(n) ________ is made up of two or more lans that are miles apart.

Answer

Correct Answer: Wan

Note: This Question is unanswered, help us to find answer for this one

20. When you are using the internet, you are ____ with other computers.

Answer

Correct Answer: NETWORKING

Note: This Question is unanswered, help us to find answer for this one

21. One of the most common transmission flaws affecting data signals is ____.

Answer

Correct Answer: Noise

Note: This Question is unanswered, help us to find answer for this one

22. A ________ is a network located in your residence that connects to all your digital devices.

Answer

Correct Answer: HAN.

Note: This Question is unanswered, help us to find answer for this one

23. The domain controllers are the computers that store and run the _______________.

Answer

Correct Answer: Active Directory database

Note: This Question is unanswered, help us to find answer for this one

24. The ability for a protocol or program to determine that something went wrong is known as ________.

Answer

Correct Answer: Error detection

Note: This Question is unanswered, help us to find answer for this one

25. Tier 1 isps connect together and exchange data at ___________.

Answer

Correct Answer: Inter Exchange Points (IXPs)

Note: This Question is unanswered, help us to find answer for this one

26. The traditional network design approach does not work well for _________ networks.

Answer

Correct Answer: Rapidly growing

Note: This Question is unanswered, help us to find answer for this one

27. A(n) ________ is a number that identifies a particular device.

Answer

Correct Answer: IP address

Note: This Question is unanswered, help us to find answer for this one

28. A(n) ______ is a computer on a local network where e-mail is stored for local users.

Answer

Correct Answer: Email server

Note: This Question is unanswered, help us to find answer for this one

29. A mask has ________ bits.

Answer

Correct Answer: 32

Note: This Question is unanswered, help us to find answer for this one

30. ____ is an updated, digital version of x.25 that also relies on packet switching.

Answer

Correct Answer: Frame relay

Note: This Question is unanswered, help us to find answer for this one

31. The protocols pop3 and __________ can be used to manage your incoming mail.

Answer

Correct Answer: IMAP

Note: This Question is unanswered, help us to find answer for this one

32. Some incoming email servers use the ____ communications protocol.

Answer

Correct Answer: POP3

Note: This Question is unanswered, help us to find answer for this one

33. Isp stands for ________.

Answer

Correct Answer: Internet Service Provider

Note: This Question is unanswered, help us to find answer for this one

34. Jitter is a problem for ________.

Answer

Correct Answer: Both A and B

Note: This Question is unanswered, help us to find answer for this one

35. An airing of the television show friends on fox at 6:30 p.m. is an example of ______.

Answer

Correct Answer: Off-network syndication

Note: This Question is unanswered, help us to find answer for this one

36. The application layer separates data into ____, or discrete amounts of data.

Answer

Correct Answer: PDUs (protocol data units)

Note: This Question is unanswered, help us to find answer for this one

37. A web crawler uses a search _______ to traverse the web.

Answer

Correct Answer: Algorithm

Note: This Question is unanswered, help us to find answer for this one

38. Wireless networks usually use ____ signals to send data.

Answer

Correct Answer: Radio

Note: This Question is unanswered, help us to find answer for this one

39. Wireless network devices use ________ to communicate with each other.

Answer

Correct Answer: Node

Note: This Question is unanswered, help us to find answer for this one

40. To connect to a lan, a computer requires ____.

Answer

Correct Answer: Network interface

Note: This Question is unanswered, help us to find answer for this one

41. The web browser?s job is to ____ the html code that it receives from the web server.

Answer

Correct Answer: Interpret

Note: This Question is unanswered, help us to find answer for this one

42. The way a network is designed to communicate is known as its ____.

Answer

Correct Answer: Architecture

Note: This Question is unanswered, help us to find answer for this one

43. The most popular configuration for a local area network is the ____ topology.

Answer

Correct Answer: Tree

Note: This Question is unanswered, help us to find answer for this one

44. The most important network device is a ____.

Answer

Correct Answer: Router

Note: This Question is unanswered, help us to find answer for this one

45. The memory allocated for a float value is ____ bytes.

Answer

Correct Answer: Four

Note: This Question is unanswered, help us to find answer for this one

46. The local loop commonly consists of either four or ____ wires.

Answer

Correct Answer: Eight

Note: This Question is unanswered, help us to find answer for this one

47. The internet backbone uses mostly ____ cabling for transmitting data between users.

Answer

Correct Answer: Fiber optic

Note: This Question is unanswered, help us to find answer for this one

48. The command ____ is used to find a specified string of characters in a file.

Answer

Correct Answer: Grep

Note: This Question is unanswered, help us to find answer for this one

49. One type of mobile phone that is not commonly used is the ____.

Answer

Correct Answer: Satellite phone

Note: This Question is unanswered, help us to find answer for this one

50. Devices designed primarily to be used with a company network are called ____.

Answer

Correct Answer: Both a and c

Note: This Question is unanswered, help us to find answer for this one

51. Data is physically transmitted from one computer or terminal to another in the ________ layer.

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

52. A ____ loop is best used when the specific number of iterations required is known.

Answer

Correct Answer: For

Note: This Question is unanswered, help us to find answer for this one

53. A ____ is not a type of network device.

Answer

Correct Answer: Linux

Note: This Question is unanswered, help us to find answer for this one

54. A ____ is a repeater with more than one output port.

Answer

Correct Answer: Hub

Note: This Question is unanswered, help us to find answer for this one

55. There are 13 _____ name servers.

Answer

Correct Answer: Root

Note: This Question is unanswered, help us to find answer for this one

56. Traditional switches operate at the ____ layer of the osi model.

Answer

Correct Answer: Data link

Note: This Question is unanswered, help us to find answer for this one

57. The highest-level dns servers are called ________.

Answer

Correct Answer: Root servers.

Note: This Question is unanswered, help us to find answer for this one

58. The devices that usually connect two or more lans are the switch, hub, and ____.

Answer

Correct Answer: Router

Note: This Question is unanswered, help us to find answer for this one

59. There are some network modeling tools that can ________ the existing network.

Answer

Correct Answer: Discover

Note: This Question is unanswered, help us to find answer for this one

60. The way a network is configured is called the network ____.

Answer

Correct Answer: Topology

Note: This Question is unanswered, help us to find answer for this one

61. Networks are structured in two principle ways: client/server and ________.

Answer

Correct Answer: Peer to peer

Note: This Question is unanswered, help us to find answer for this one

62. Network technologies that use _______________ light use single-mode fiber optic cabling.

Answer

Correct Answer: Laser

Note: This Question is unanswered, help us to find answer for this one

63. "network problems are often traceable to ____.

Answer

Correct Answer: Some combination of all of these

Note: This Question is unanswered, help us to find answer for this one

64. Malware programs that masquerade as system files are called ________.

Answer

Correct Answer: Trojan horses

Note: This Question is unanswered, help us to find answer for this one

65. In ipv6, __________ is commonly used with dns.

Answer

Correct Answer: Anycast

Note: This Question is unanswered, help us to find answer for this one

66. In a client/server system, the database resides on a computer called the ____.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

67. In a client/server network, the _______ provides access to resources and services.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

68. In ____ both computers verify the credentials of the other

Answer

Correct Answer: Mutual authentication

Note: This Question is unanswered, help us to find answer for this one

69. Compared with education, the primary goal of training is to ____.

Answer

Correct Answer: Perform tasks and build expertise

Note: This Question is unanswered, help us to find answer for this one

70. A ____ application does not guarantee the delivery of any information or data.

Answer

Correct Answer: Connectionless

Note: This Question is unanswered, help us to find answer for this one

71. Before you perform any upgrade procedure, you should ______.

Answer

Correct Answer: Backup the entire system.

Note: This Question is unanswered, help us to find answer for this one

72. The URL Connection class can be used to read and write data to the specified resource referred by the URL?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

73. The client in socket programming must know which informations?

Answer

Correct Answer: IPaddress of Server And Port number

Note: This Question is unanswered, help us to find answer for this one

74. TCP,FTP,Telnet,SMTP,POP etc. are examples of?

Answer

Correct Answer: Protocol

Note: This Question is unanswered, help us to find answer for this one

75. The flush() method of PrintStream class flushes any uncleared buffers in memory?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

76. Which constructor of DatagramSocket class is used that it creates a datagram socket and binds it with the given Port Number?

Answer

Correct Answer: DatagramSocket(int port, InetAddress address)

Note: This Question is unanswered, help us to find answer for this one

77. Datagram is basically an information but there is no guarantee of its content, arrival or arrival time.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

78. Which classes are used for connection-oriented socket programming?

Answer

Correct Answer: Socket And ServerSocket

Note: This Question is unanswered, help us to find answer for this one

79. Which class is used to create servers that listen for either local client or remote client programs?

Answer

Correct Answer: ServerSockets

Note: This Question is unanswered, help us to find answer for this one

80. In InetAddress class which method it returns the host name of the IP Address?

Answer

Correct Answer: Public String getHostName()

Note: This Question is unanswered, help us to find answer for this one

81. Which class can be used to create a server socket. This object is used to establish communication with the clients?

Answer

Correct Answer: ServerSocket

Note: This Question is unanswered, help us to find answer for this one

82. Which package provides core functionality?

Answer

Correct Answer: Java.lang

Note: This Question is unanswered, help us to find answer for this one

83. Which classes are used for connection-less socket programming?

Answer

Correct Answer: DatagramSocket And DatagramPacket

Note: This Question is unanswered, help us to find answer for this one

84. Which steps occur when establishing a TCP connection between two computers using sockets?

Answer

Correct Answer: The server instantiates a ServerSocket object, denoting which port number communication is to occur on

Note: This Question is unanswered, help us to find answer for this one

85. URL is an acronym for?

Answer

Correct Answer: Uniform Resource locator

Note: This Question is unanswered, help us to find answer for this one

86. The java.net.InetAddress class represents an?

Answer

Correct Answer: IP address

Note: This Question is unanswered, help us to find answer for this one

87. Which of the following log file is created on SUS client hard disk for keeping track of Windows Update?

Answer

Correct Answer: %windir%\Windows Update.log

Note: This Question is unanswered, help us to find answer for this one

88. Which of the following protocols are considered as Mutual Authentication Protocols?

Answer

Correct Answer: EAP-TLS

Note: This Question is unanswered, help us to find answer for this one

89. What is true regarding the character underscore( _ ) in DNS zone naming convention?

Answer

Correct Answer: It is the reserved character for active directory

Note: This Question is unanswered, help us to find answer for this one

90.

 The network administrator for company abc.com is running Active Directory in Windows Server 2003. Users in the network save their confidential data on a server named server1. He wants the communication between client and server to be secure and the data saved on server1 should be encrypted. What action should he take?

Answer

Correct Answer:

Assign the Secure Server policy on server1 and Client Only policy on clients. 


Note: This Question is unanswered, help us to find answer for this one

91. Which of the following protocols are part of Internet Layer in TCP/IP Model?

Answer

Correct Answer: ICMP
IGMP
ARP

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

92. What does /29 represent?

Answer

Correct Answer: 255.255.255.248

Note: This Question is unanswered, help us to find answer for this one

93.

An SUS server in Windows Server 2003 is installed. Clients running Win XP has been configured for automatic Updates. All client computers are the members of an OU named sales. GPO is applied to that OU for automatic client updation through SUS server. Which command line utility can be used to check if clients have been getting correct SUS configurations and GPO deployed?  

Answer

Correct Answer:

gpresult 


Note: This Question is unanswered, help us to find answer for this one

94. Which packet is forwarded by DHCP Relay Agent to DHCP Server on behalf of DHCP Clients?

Answer

Correct Answer: Unicast

Note: This Question is unanswered, help us to find answer for this one

95. Which of the following utility should be used so that roaming users can read their digital and secured mails from any location?

Answer

Correct Answer: Use smart cards

Note: This Question is unanswered, help us to find answer for this one

96.

Jane is the network administrator for her company. Her network consists of one Windows Server 2003 hosting her domain, and clients on Windows XP, Windows 2000 and Windows NT 4.0 service pack 3. Security Templates (hisec.inf) have been configured for securing network. Later on, Windows NT users complain that they are unable to login to server. But other users have no problem in logging and accessing resources. What should she do?

Answer

Correct Answer:

Install Windows NT Service Pack 4 or later   


Note: This Question is unanswered, help us to find answer for this one

97. An organization has been assigned the 172.16.0.0 subnet and uses 255.255.224.0 subnet mask. How many addresses are available for host addresses?

Answer

Correct Answer: 8190

Note: This Question is unanswered, help us to find answer for this one

98.

Which of the following statements regarding routing protocols are correct?

Answer

Correct Answer:

RIP maximum hop count support is 15    


OSPF is the link state routing protocol


RIP v2 supports unicasting


Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

99.

The users of Harry's company connect to his network from their homes using dial-up connection to the RRAS server running on Windows Server 2003. Users have no problem with the connection. Later on, he enabled callback for home users. After callback is enabled, users report that they are unable to maintain the RRAS connections. How should he allow the users to be able to maintain this connection using Callback?

Answer

Correct Answer:

Enable Line control protocol in RRAS server


Note: This Question is unanswered, help us to find answer for this one

100. Which of the following command can be used to display the local NETBIOS Table?

Answer

Correct Answer: nbtstat

Note: This Question is unanswered, help us to find answer for this one

101. Which of the following are the benefits of static routes over dynamic routing?

Answer

Correct Answer: Static routes are less resource-intensive than dynamic routing protocols
Static routes supports unnumbered connections

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

102.

 Routing and remote access server is configured on Windows Server 2003. The network consists of many subnets and each uses different routing protocols. Which route would the router use if the routing table consists of entries from different routing protocols?

Answer

Correct Answer:

Route with higher preference level is added to the routing table 


Note: This Question is unanswered, help us to find answer for this one

103.

Which type of network should the WINS proxies be installed on?

Answer

Correct Answer:

b-node


Note: This Question is unanswered, help us to find answer for this one

104.

 The network administrator installed an Enterprise Certificate server on Windows Server 2003. His network consists of clients on Windows 2000 and XP. They are configured with roaming profiles and each day the seat of every user changes. The administrator installs and configures an Exchange Server on Windows Server 2003 for Internal communication. The next day users complain that they are unable to open encrypted messages. Identify the problem. 

Answer

Correct Answer:

Private key is missing onto multiple machines     


Note: This Question is unanswered, help us to find answer for this one

105.

The network consists of one Windows Server 2003, 500 Win XP and 1000 Windows 2000 client systems and all are running on workgroup. The administrator has created an IP sec policy on all client computers with Kerberos rule specified for authentication. Later on, users report that they can ping each other by the IP address but are unable to access resources on the server. What may be the possible cause of the problem?

Answer

Correct Answer:

Kerberos cannot be used as authentication mechanism in workgroup  


Note: This Question is unanswered, help us to find answer for this one

106. Which of the following addresses fall under private range?

Answer

Correct Answer: 192.168.250.2
172.25.10.1
10.200.2.1

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

107.

A network consists of one Windows Server 2003 running Enterprise Certificate Server. When a user requests for a new certificate, the request is processed. If, later on, the administrator checks the Event Viewer and views a lot of Certificate errors related to Time and Date and when he opened the Certificate manager he found the Certificate Server down. When he tried to restart, there was the same time and date problem. What does this mean and how can it be corrected?

Answer

Correct Answer:

Server date and time had been changed


The proper date and time should be set and certificate services restarted


Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

108.

Sammy the network administrator, installs a Windows Server 2003 as WINS server in his HQ. As his network expands, various branch offices are opened at different locations. HQ and Branches are connected through slow WAN links. Clients at branch generates a lot of lookup traffic for HQ. How should he minimize the lookup traffic between client and server?

Answer

Correct Answer:

Configure WINS forward lookups between client and server 


Note: This Question is unanswered, help us to find answer for this one

109.

The network administrator installed Windows Server 2003 and Enterprise Certificate on the same server, for his network clients running on Windows XP. He enabled the autoenrollment feature so that clients did not need to enter for requesting a new certificate. A lot of error messages were displayed in Event Viewer regarding failure of autoenrollment of the clients. Identify the error.

Answer

Correct Answer:

The RPC server was not available on the CA 


Note: This Question is unanswered, help us to find answer for this one

110.

One SUS server is configured in Windows Server 2003 for updating Win XP clients. All clients are configured for Automatic Updates. All users are able to connect to and download updates from SUS server. But one automatic update client is unable to download update from SUS server. What should be done to update that client without wasting any time?

Answer

Correct Answer:

Enter registry path of server in SUS client  


Note: This Question is unanswered, help us to find answer for this one

111. Which of the following commands can be used to check the integrity of corrupted security database in Windows Server 2003?

Answer

Correct Answer: esentutl

Note: This Question is unanswered, help us to find answer for this one

112. Which two, among the following Operating Systems support NTLMv2?

Answer

Correct Answer: Windows NT Service Pack 4 or later
Windows 2000

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

113. Which of the following is the limitation of NAT over ICS?

Answer

Correct Answer: NAT answers incoming calls after only two rings

Note: This Question is unanswered, help us to find answer for this one

114.

Harry is the network administrator of his company having Windows 2003 domain controller under the domain of his company. His network consists of 100 Windows 2000 professional and 200 Windows 98 clients. His company policy states that all systems be upgraded to Windows XP. How will he check that after upgradation, all systems are with the same security settings? 

Answer

Correct Answer:

Use the Setup security.inf templates on all Windows XP clients


Note: This Question is unanswered, help us to find answer for this one

115.

John is the network administrator and his network consists of two Windows Server 2003 servers named server1 and server2. NAT is configured on server1 for securing the network and providing network access to clients. DHCP server is installed and configured on server2. A new subnet has been added to the network which will be assigned the addresses from server1 located on a different subnet. DHCP Relay agent has been configured on server1. Users complain that when they request the address from DHCP server, it fails and they get an error message that DHCP server is unreachable. John checked both the servers and found no error related to misconfiguration. Identify the problem.

Answer

Correct Answer:

DHCP server cannot be configured on server running NAT 


Note: This Question is unanswered, help us to find answer for this one

116. Which of the following security templates can be used for restoring default settings in Windows Server 2003?

Answer

Correct Answer: security.inf

Note: This Question is unanswered, help us to find answer for this one

117.

The network adminmistrator installed and configured one SUS server on Windows Server 2003 for updating 200 Windows XP clients. After some time, users are unable to connect to SUS server. What should he do to allow them to connect to SUS server for downloading latest updates?


Answer

Correct Answer:

Restart www publishing services  


Note: This Question is unanswered, help us to find answer for this one

118. Where can the Protected Extensible Authentication Protocol(PEAP) be used in Windows Server 2003 under Remote access?

Answer

Correct Answer: Wireless devices

Note: This Question is unanswered, help us to find answer for this one

119. Which ns lookup switch will be used to check the MX resource record information from the command prompt?

Answer

Correct Answer: Set type=MX

Note: This Question is unanswered, help us to find answer for this one

120. The order in which WINS P-node works is:

Answer

Correct Answer: Cache, wins server, lmhosts

Note: This Question is unanswered, help us to find answer for this one

121. Which of the following component/protocol is required for relaying broadcast traffic of DHCP client for DHCP server across another network? Answers:

Answer

Correct Answer: BootP
DHCP Relay Agent

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

122. Which of the following routing protocols support authentication?

Answer

Correct Answer: RIP v2
OSPF
EIGRP

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

123. What should be done to resolve name resolution traffic for NAT environment without installing DNS server in NAT server in windows server 2003?

Answer

Correct Answer: Configure DNS proxy on NAT server

Note: This Question is unanswered, help us to find answer for this one

124.

RRAS server has been configured in Windows Server 2003. MS-CHAP v2 has been configured for encryption. The remote clients consists of Win 98 and XP systems. Win XP clients report no problem in connections. But Win 98 are unable to connect to server over dial-up. Identify the cause of the  

problem.

Answer

Correct Answer:

Win 98 clients can use MS-CHAP v2 only over VPN connections  


Note: This Question is unanswered, help us to find answer for this one

125. Which of the following protocol can be used over VPN with IPsec for secure communication in Windows Server 2003?

Answer

Correct Answer: L2TP

Note: This Question is unanswered, help us to find answer for this one

126. Which of the following commands can be used by the administrator in Windows Server 2003 to check the IPsec configurations and rules?

Answer

Correct Answer: netsh ipsec dynamic

Note: This Question is unanswered, help us to find answer for this one

127. How can the administrator forcibly release and renew the client entries on WINS server?

Answer

Correct Answer: nbtstat -RR

Note: This Question is unanswered, help us to find answer for this one

128. Which DNS file points to the well known Top-Level Domains (Root Zones)?

Answer

Correct Answer: cache.dns

Note: This Question is unanswered, help us to find answer for this one

129. Which of the following is equivalent to the ipconfig/flushdns?

Answer

Correct Answer: Clear cache

Note: This Question is unanswered, help us to find answer for this one

130. Which of the following IP class ranges is used for multicasting?

Answer

Correct Answer: D

Note: This Question is unanswered, help us to find answer for this one

131. Which command can be used to repopulate the Active Directory DNS entries?

Answer

Correct Answer: netdiag

Note: This Question is unanswered, help us to find answer for this one

132.

A network consists of one DHCP server running on Windows server 2003 server and client on Windows 2000 and later versions.Which of the following packets will be sent by the DHCP clients for confirming conflict detection?  

Answer

Correct Answer:

Gratuitous ARP


Note: This Question is unanswered, help us to find answer for this one

133.

Allen is the network administrator of his company. His network consists of Windows Server 2003. Network clients are using Windows XP and 200 professional computers for connecting the server. IPsec is deployed for a secure network. One of the managers uses VPN over dial-up from his home for connecting the company server. Later on, it is discovered that communication from dial-up is not secured. Identify the causes.

Answer

Correct Answer:

Ipsec doesnot support dynamic addressing


Third part VPN clients might disable the IPsec


Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

134.

A DHCP server is installed on Windows server 2003 server with a scope from 192.168.0.1 to 192.168.0.200. A client is reserved with address of 192.168.0.150. Later on, a new DHCP server is configured with the same scope.The user whose address was reserved complains that he is unable to receive the same address from DHCP server. What should the network administrator do so that the reserved client gets the same address?

Answer

Correct Answer:

Create same reservation on second DHCP server  


Note: This Question is unanswered, help us to find answer for this one

135. Administrator has installed and configured DHCP server in windows 2003 .He wants to check which processing mode the client sends their MAC address to the DHCP server.Which part of mode should be checked from Network Monitor?

Answer

Correct Answer: DHCP DISCOVER

Note: This Question is unanswered, help us to find answer for this one

136.

Some of the VPN client computers are unable to connect with VPN server configured on windows server 2003. It is suspected that client computers are not updated with most recent hotfixes. Which command should be run on clients to check details of all Hotfixes status?

Answer

Correct Answer:

run 'wmic qfe' command


Note: This Question is unanswered, help us to find answer for this one

137. Which of the following statements hold true regarding PPTP-based VPN connections?

Answer

Correct Answer: It provides data confidentiality
It does not require a certificate infrastructure

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

138. What does the term "attenuation" mean in networking?

Answer

Correct Answer: Signal weakened as it travel along a medium

Note: This Question is unanswered, help us to find answer for this one

139. Which of the following are security recommendations for WINS in Windows server 2003 that is connected with external network?

Answer

Correct Answer: Burst handling should always be disabled
WINS logging must always be enabled

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

140. Which of the following protocols run in the layer 3 of TCP/IP model?

Answer

Correct Answer: ICMP
ARP
IP

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

141.

Which command line utility comes up with Windows Server 2003 Resource Kit to write down the new signature in new hard disk after a failed hard disk is replaced?

Answer

Correct Answer:

confdisk.exe 


Note: This Question is unanswered, help us to find answer for this one

142.

What is recommended for resolving name-to-address mapping in a computer that does not support NetBIOS name registration with windows server 2003 WINS Server?

Answer

Correct Answer:

Static entries 


Note: This Question is unanswered, help us to find answer for this one

143. Which of the following statements are true regarding Certificate Manager(certmgr)?

Answer

Correct Answer: Enterprise certificates can only be requested with the same key from Certmgr We can o
We can only move an object within certificate stores in certificates

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

144.

There is only one DHCP server in a network running on windows server 2003. A scope of 192.168.0.0/24 has been configured to assign addresses to clients. But when the DHCP server was authorized, it failed with the error message "A constraint violation has occured". What may be the cause of the problem?

Answer

Correct Answer:

FQDN of the DHCP server exceeding 64 character   


Note: This Question is unanswered, help us to find answer for this one

145. Which rule should be created in Windows server 2003 to prevent the virus or Trojan horse to be able to run in a network?

Answer

Correct Answer: Hash rule

Note: This Question is unanswered, help us to find answer for this one

146. Which of the following network devices generates more broadcast domains?

Answer

Correct Answer: Hubs
Switches

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

147.

Which of the following is the feature of TCP/IP where large packets can be sent without waiting for positive acknowledgment?

Answer

Correct Answer:

Windows size


Note: This Question is unanswered, help us to find answer for this one

148. Which of the following statements are true regarding shadow copies ?

Answer

Correct Answer: File permissions do not change after restoration
Destination directory permissions will be the default when copying a previous version file

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

149.

Kate is the network administrator for a company. She is planning to use 172.16.0.0 address scheme for her network that consists of 1000 clients. Which of the following subnet mask should she use so that addresses should not go waste?

Answer

Correct Answer:

255.255.252.0


Note: This Question is unanswered, help us to find answer for this one

150.

John is working as a network engineer in an ISP. His company's growth required a large setup in different locations that need multiple networks and implementing various networks thereon. He has estimated the network size of 500 subnets. Which routing protocol is recommended for such a scenario?

Answer

Correct Answer:

OSPF


Note: This Question is unanswered, help us to find answer for this one

151.

Jo is the network administrator for a company. Her network consists of one Windows 2003 server and 100 Windows XP clients out of which 10 use portable computers from remote access. DHCP server is installed and configured to provide addresses to both of the clients. But due to shortage of address, some clients are unable to obtain address from DHCP server. Her company policies states to have a shorter lease time duration for remote access clients and default lease duration for local network. 

Which of the DHCP server options must she configure?

Answer

Correct Answer:

user class 


Note: This Question is unanswered, help us to find answer for this one

152. Which of the following protocols support mutual authentication in remote access server?

Answer

Correct Answer: MS-CHAP V2
EAP-TLS

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

153.

Sanjay is a network administrator for a company. He is using LMHOSTS file in each windows XP client computer for resolving NETBIOS name. When modifying the file in one of the client computer successfully, he went go the command prompt and entered "nbtstat -c" command but noticed outdated records. What should he do to refresh LMHOSTS file?

Answer

Correct Answer:

nbtstat - R 


Note: This Question is unanswered, help us to find answer for this one

154. Which FSMO role is responsible for synchronizing clock between domain controllers?

Answer

Correct Answer: PDC emulator master

Note: This Question is unanswered, help us to find answer for this one

155.

Tom is the network administrator for a company. His network consists of front-end exchange server 2003 such as Outlook Web Access and back-end servers. He is worried that some malicious users might try to capture user's password information. Which of the following protocol provides secure communication?

Answer

Correct Answer:

HTTPS 


Note: This Question is unanswered, help us to find answer for this one

156. Which tool should be used to compare the current security configuration with an existing template?

Answer

Correct Answer: secedit

Note: This Question is unanswered, help us to find answer for this one

157.

Which of the following may be the possibilities, if the administrator discovers that cluster service fails to initialize quorum resources in Windows Server 2003?

Answer

Correct Answer:

Cables are not properly connected


Physical disks does not spin after getting power


Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

158. Which of the following statements are true regarding BootP and DHCP?

Answer

Correct Answer: Dynamic BootP has a default 30-day expiration
BootP clients contacts TFTP servers to transfer boor image

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

159. Which of the following multicast address is used by the ALLSPF routers to send its routing table information to other OSPF routers?

Answer

Correct Answer: 224.0.0.5

Note: This Question is unanswered, help us to find answer for this one

160. Which of the followings certificate types can be used for auto-enrollment?

Answer

Correct Answer: Enterprise root CA
Enterprise subordinate CA

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

161. Which is the default protocol to be used if any of the system in Windows XP or server 2003 does not support Kerberos v5?

Answer

Correct Answer: NTLM

Note: This Question is unanswered, help us to find answer for this one

162. Which of the following statements hold true regarding Multicasting and Unicasting routing?

Answer

Correct Answer: Multicast traffic is sent to an ambiguous group destination
Unicast routing table summarized globally unique destinations

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

163. Which applications are supported under TCP protocols?

Answer

Correct Answer: FTP
TELNET
DNS

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

164.

The shadow copies feature is enabled on windows server 2003 for providing access to users to restore previous version files. When the users restore, they are unable to write anything in previous version files. Identify the problem.

Answer

Correct Answer:

Previous versions are read-only


Note: This Question is unanswered, help us to find answer for this one

165.

Which of the following are types of fiber-optic media?

Answer

Correct Answer:

Multimode


Single mode


Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

166.

Users in Windows 2003 server environment face problem in receiving mails from outside, but do not encounter a problem in sending. Which command based utility can be used to verify whether it is a DNS problem or not?

Answer

Correct Answer:

dnslint.exe  


Note: This Question is unanswered, help us to find answer for this one

167. Which of the following protocols are supported by IP Multicasting?

Answer

Correct Answer: IGMP
MOSPF(Multicast Extension to OSPF)
PIM (Protocol-Independent Multicast)

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

168. Which of the following security tool should be used to secure communication between an Exchange 2003 front-end server and a back-end server?

Answer

Correct Answer: IPSec

Note: This Question is unanswered, help us to find answer for this one

169. Which information structure does the OSI model follow?

Answer

Correct Answer: Packet

Note: This Question is unanswered, help us to find answer for this one

170. Which service uses DNS for registering domain controllers in DNS domain namespace?

Answer

Correct Answer: Net Logon

Note: This Question is unanswered, help us to find answer for this one

171. Which of the following are connection-oriented protocols?

Answer

Correct Answer: TCP
SPX

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

172. Which of the following network troubleshooting command computes result based on the packets returned from each hop?

Answer

Correct Answer: pathping

Note: This Question is unanswered, help us to find answer for this one

173. Which protocol is required to be enabled on router, when using NLB in either multicast or unicast mode?

Answer

Correct Answer: Proxy ARP

Note: This Question is unanswered, help us to find answer for this one

174.

 Which command-line utility can be used to restore the default domain and domain controller group policy to their original state?

Answer

Correct Answer:

dcgpofix 


Note: This Question is unanswered, help us to find answer for this one

175.

Remote users connecting to the Windows 2003 VPN server face problem of VPN profile taking much time to download thereby causing delay in login. What may be the cause of the problem?

Answer

Correct Answer:

Certificates are invalid


Note: This Question is unanswered, help us to find answer for this one

176.

 An administrator faced the problem with IPSec when implemented with NAT in Windows server 2003. What may have caused this problem?

Answer

Correct Answer:

IPSec 


Note: This Question is unanswered, help us to find answer for this one

177.

How can the administrator in windows server 2003 temporarily check the DNS performance and the packets sent and received by DNS server without affecting overall server performance and consuming disk space?

Answer

Correct Answer:

Enable debug logging in DNS 


Note: This Question is unanswered, help us to find answer for this one

178. How many hosts can be configured in class-c private ip range?

Answer

Correct Answer: 65535

Note: This Question is unanswered, help us to find answer for this one

179.

A network consists of mixed client environment of UNIX and earlier-version microsoft clients. DNS service is installed and configured on Windows 2003. Which of the following resource records will permit UNIX clients to locate their WINS clients by extending their DNS name?

Answer

Correct Answer:

wins-r 


Note: This Question is unanswered, help us to find answer for this one

180.

A VPN server was configured on Windows server 2003 for a company users so that they can connect and access resources over a secure channel. But when client tried to connect the VPN server, they are unable to establish Tunnel. What must be verified on clients that failed in establishing a Tunnel?

Answer

Correct Answer:

Winsock Proxy


Note: This Question is unanswered, help us to find answer for this one

181.

How many bits would be used as a network ID after subnetting in the class-B address of: 175.12.8.97 255.255.252.0?

Answer

Correct Answer:



Note: This Question is unanswered, help us to find answer for this one

182. How can the administrator improve shadow copies performance?

Answer

Correct Answer: Shadow copies should always be stored on separate disk

Note: This Question is unanswered, help us to find answer for this one

183.

A network consists of domain controllers running on 2000 and 2003. What will happen if one user is logged in two different machines and password is changed in one of them?

Answer

Correct Answer:

Account will be locked out in second machine due to authentication failure 


Note: This Question is unanswered, help us to find answer for this one

184.

 Harry is a network administrator for a company. He has configured shadow copies feature in Windows 2003 server because network users often delete or modify the contents of company's sensitive data. A user complained that when he tries to restore an old version, new version gets deleted. How will Harry guide the user so that current version should not be replaced?

Answer

Correct Answer:

Use copy to copy the previous version to a different location 


Note: This Question is unanswered, help us to find answer for this one

185.

How will the administrator of a company secure the DNS zones in Windows server 2003?

Answer

Correct Answer:

Configure secure dynamic updates


Restrict zone transfer to specified addresses


Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

186.

A Windows 2003 server based VPN server is implemented in a company. User faces problem when connecting to VPN server that they are unable to make connection to VPN server and that attempt is failed. Correct user name and password is entered but still connection refused by the VPN server. What can be the cause of such a problem?

Answer

Correct Answer:

User account may be locked due to remote access account lockout


WAN Miniport(PPTP) and WAN Miniport(L2TP)may be disabled in RRAS


Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

187.

A server cluster was implemented and configured in Windows server 2003. Another Windows 2003 server has been configured as software router that connects an inside network with an outside network. After configuring cluster in Windows server 2003, remote clients complain that they were unable to ping to cluster's server address. How can the outside network be allowed to be able to use ping to access the cluster's address without exposing the network security?

Answer

Correct Answer:

Enable Proxy ARP support in router


Enter a static ARP entry


Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

188. Which among the following are true regarding dynamic disks?

Answer

Correct Answer: There can be any number of logical drives in the dynamic disk
Dynamic disk can't be reverted back to basic disk
1 MB of free disk space is required for conversion
Dynamic disk is implemented for RAID support

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

189. Which of the following utilities are used to improve disk performance?

Answer

Correct Answer: Disk clean-up
Disk de-fragmentation
Check disk

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

190. What could be done to improve the performance of Windows XP Professional in one's computer?

Answer

Correct Answer: Run Disk De-fragmentation
Increase the size of Page file
Set the Adjust For Best Performance optiong

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

191. Why does the administrator fail to rename the drive letter of the system partition in Basic Disk?

Answer

Correct Answer: System/boot partition drive letters cannot be modified

Note: This Question is unanswered, help us to find answer for this one

192. What do administrative shared folder names always end with?

Answer

Correct Answer: $

Note: This Question is unanswered, help us to find answer for this one

193. User A in a network required the permissions to change the system time in Windows XP as workgroup. How should he be granted the above permissions without affecting others?

Answer

Correct Answer: Grant him the right to change the system time

Note: This Question is unanswered, help us to find answer for this one

194. User is trying to shutdown another system by using Shutdown command from XP. An error message is displayed " Access is denied". Troubleshoot this error message.

Answer

Correct Answer: User is not authenticated

Note: This Question is unanswered, help us to find answer for this one

195. A basic disk has Windows 2000 professional installed on NTFS. When administrator converts it to dynamic disk and tries to install windows XP professional, installation fails. Identify the cause.

Answer

Correct Answer: Fresh installation is not possible in dynamic disk

Note: This Question is unanswered, help us to find answer for this one

196. Internet Connection Firewall ( ICF) should be replaced with which of the following firewalls after installing Windows XP SP 2?

Answer

Correct Answer: Windows firewall

Note: This Question is unanswered, help us to find answer for this one

197. When the administrator tries to convert basic disk to dynamic disk from computer management, he finds no options for conversion. Identify the reason.

Answer

Correct Answer: There is no unformatted free space available
The disk is in a portable computer

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

198. Which three additional features, among the following, are available in Windows XP Professional editions compared to the home edition?

Answer

Correct Answer: IIS
Remote desktop
EFS

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

199. Which tool is used for installing Win XP Professional onto multiple computers by using disk cloning?

Answer

Correct Answer: Sysprep.exe

Note: This Question is unanswered, help us to find answer for this one

200. What does the term "member server" mean?

Answer

Correct Answer: Server that is a member of a Domain, but not configured as a DC

Note: This Question is unanswered, help us to find answer for this one

201. Choose the 24 bit format of IP Address in Decimal form.

Answer

Correct Answer: 255.255.255.192

Note: This Question is unanswered, help us to find answer for this one

202. A user in a network reports that someone in the network is sending him unwanted messages. How will the system administrator find out about the machine from where messages are generated?

Answer

Correct Answer: Event Viewer

Note: This Question is unanswered, help us to find answer for this one

203. A user in a company left the job. The administrator wants to decrypt all data because of loss of owner private key. Who can recover the decrypted data?

Answer

Correct Answer: Recovery agent

Note: This Question is unanswered, help us to find answer for this one

204. Which of the following are the differences between NT DNS and 2000 DNS?

Answer

Correct Answer: Win 2000 supports Active-Directory Integrated Zone
Secure Dynamic zones can be configured in Win 2000 DNS
Zone transfer can be restricted to only Authorized DNS Server in Win 2000

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

205. When can password reset disk be used?

Answer

Correct Answer: To change old password without knowing the old password

Note: This Question is unanswered, help us to find answer for this one

206. What does "Principle of Least Privilege" mean?

Answer

Correct Answer: Assign most restrictive permissions on resources

Note: This Question is unanswered, help us to find answer for this one

207. Which protocol/method is used to encrypt data over the network?

Answer

Correct Answer: SSL

Note: This Question is unanswered, help us to find answer for this one

208. Which command is used to encrypt or decrypt files?

Answer

Correct Answer: cipher

Note: This Question is unanswered, help us to find answer for this one

209. Which of the following protocols are used to establish a remote Desktop Connection?

Answer

Correct Answer: RDP
UDP
HTTP

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

210. Which of the following protocols are used in authenticating RRAS users?

Answer

Correct Answer: MS-CHAP
MS-CHAP v2
PAP
EAP

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

211. Where should the complete IRQ list in Windows XP be checked?

Answer

Correct Answer: Computer management >> Device manager >> View resource by type

Note: This Question is unanswered, help us to find answer for this one

212. How can the priority of the processes be set?

Answer

Correct Answer: Task Manager

Note: This Question is unanswered, help us to find answer for this one

213. What is the private IP range of Class-B?

Answer

Correct Answer: 172.16.0.0 - 172.31.255.255
172.16.0.0 - 172.31.255.255

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

214. Which feature is used at the folder level, so that any temporary copy of an encrypted file is also encrypted?

Answer

Correct Answer: EFS

Note: This Question is unanswered, help us to find answer for this one

215. What does Author Mode mean in MMC (Microsoft Management Console)?

Answer

Correct Answer: Multiple windows
Add/Remove snap-ins
New Task pad views

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

216. Why is a user not able to access the sharing and security permissions tab on folder?

Answer

Correct Answer: Simple file sharing is enabled

Note: This Question is unanswered, help us to find answer for this one

217. Which protocol is used by Global catalog for searching objects in Domain?

Answer

Correct Answer: LDAP

Note: This Question is unanswered, help us to find answer for this one

218. How can you troubleshoot "stop memory errors" and the drivers causing the errors?

Answer

Correct Answer: Small memory dump

Note: This Question is unanswered, help us to find answer for this one

219. What are the physical components of Active Directory?

Answer

Correct Answer: Domain Controllers
Sites

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

220. When Administrator tries to open a folder created in the desktop, he gets an error message " Access is denied". How can the administrator access that folder?

Answer

Correct Answer: Assign himself the Full control permission on security Tab of the folder
Remove any deny permissions on the folder to administr

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

221. A test folder consists of unattend.txt and i386 folder on drive C. Which command should be used for unattended installation on server1 if distribution share folder name is test located at server1?

Answer

Correct Answer: c:>test>i386>winnt32 /unattend:c:\test\unattend.txt /s:c:\test i386

Note: This Question is unanswered, help us to find answer for this one

222. Which of the following commands would be used to open registry?

Answer

Correct Answer: regedit
regedt32

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

223. Which of the following items can be recovered if user account is deleted in Windows XP?

Answer

Correct Answer: Desktop items
My document folders

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

224. What is the binary form of 150.210.99.5?

Answer

Correct Answer: 10010110.11010010.01100011.00000101

Note: This Question is unanswered, help us to find answer for this one

225. What does represent when dir command is run on c: drive? 11/14/2005 12:35 pm abc

Answer

Correct Answer: Mounted drive

Note: This Question is unanswered, help us to find answer for this one

226. By which of the following components can replication traffic be controlled and managed?

Answer

Correct Answer: Sites

Note: This Question is unanswered, help us to find answer for this one

227. Which of the following commands is used to check the port status?

Answer

Correct Answer: netstat

Note: This Question is unanswered, help us to find answer for this one

228. If a user gets "Destination Host Unreachable" error, what is the root cause of message?

Answer

Correct Answer: Default Gateway

Note: This Question is unanswered, help us to find answer for this one

229. Which additional features are available in NTFS as compared to FAT?

Answer

Correct Answer: Disk quotas
Encryption
Ownership

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

230. Which of the following protocols is used in class D?

Answer

Correct Answer: IGMP

Note: This Question is unanswered, help us to find answer for this one

231. How should the recovery console from a system be uninstalled?

Answer

Correct Answer: Delete hidden cmdcons from system drive and edit boot.ini file

Note: This Question is unanswered, help us to find answer for this one

232. A user in the network is unable to open Internet Explorer in Windows XP. There is suspicion about some corrupted system files. The user's computer needs to be repaired with minimum effort. Which command should be run to check the system file status?

Answer

Correct Answer: sfc

Note: This Question is unanswered, help us to find answer for this one

233. Which method would be used to repair the following error - "NTLDR is missing"?

Answer

Correct Answer: Recovery console

Note: This Question is unanswered, help us to find answer for this one

234. How should the default Microsoft Error reporting feature in Windows XP be disabled?

Answer

Correct Answer: My computer--properties--Advanced--Error reporting

Note: This Question is unanswered, help us to find answer for this one

235. Multiple display is configured for User A but one user application failed to display on the secondary display. Troubleshoot.

Answer

Correct Answer: Check if application works on primary display
Check if the problem is only with secondary display

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

236. The administrator of XYZ company finds that one of the users in his network is trying to upload some unwanted material. He needs to prevent that user from uploading that immediately without effecting the work of other users who are accessing shared folders from the server. How should he disconnect that user without wasting time?

Answer

Correct Answer: Disconnect user from computer management

Note: This Question is unanswered, help us to find answer for this one

237. Which of the following access techniques is used by Ethernet?

Answer

Correct Answer: CSMA/CD

Note: This Question is unanswered, help us to find answer for this one

238. Which of the following is a valid disadvantage of Client Server networks?

Answer

Correct Answer: They require high investment in the form of purchase of a server

Note: This Question is unanswered, help us to find answer for this one

239. The hex BF value in decimal is 191. What is the value of hex BF in binary?

Answer

Correct Answer: 10111111

Note: This Question is unanswered, help us to find answer for this one

240. According to the OSI model, which layer defines network topologies (star, ring, bus etc)?

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

241. Which of the following is the correct sequence of layers in OSI model (from lowest layer to highest)?

Answer

Correct Answer: Physical, Data Link, Network, Transport, Session, Presentation, Application

Note: This Question is unanswered, help us to find answer for this one

242. Which of the following cables can be used to directly connect two PCs if only one of the PC support AUTO-MIX?

Answer

Correct Answer: Cross cable

Note: This Question is unanswered, help us to find answer for this one

243. Complete the following sentence by choosing the correct set of homophones from the options below. The skilful candidate's ____________ speech was delightful to listen to, but failed to explain how he would achieve the ___________ goals of peace and prosperity.

Answer

Correct Answer: allusive/illusive

Note: This Question is unanswered, help us to find answer for this one

244. What is the purpose of twisting the pairs of cables together in an UTP (unshielded twisted pair) cable?

Answer

Correct Answer: To reduce cross talk
To reduce Electromagnetic Interference

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

245. According to the OSI model, which layer organizes data bits into small data units called frames?

Answer

Correct Answer: Data Link

Note: This Question is unanswered, help us to find answer for this one

246. Which of following network topologies can be used by Standard Ethernet and ThinNet Ethernet?

Answer

Correct Answer: Star
Bus

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

247. Which of the following layer of the OSI model provide support for browsing World Wide Web?

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

248. What is the recommended maximum length per TIA/EIA 568-5-A for a segment of category 5 cable?

Answer

Correct Answer: 100m

Note: This Question is unanswered, help us to find answer for this one

249. What do you call a fiber optic cable in which the light signals follow multiple paths?

Answer

Correct Answer: Multi mode

Note: This Question is unanswered, help us to find answer for this one

250. Which of the following devices breaks up a Broadcast Domain by default?

Answer

Correct Answer: Router

Note: This Question is unanswered, help us to find answer for this one

251. Which of the following cables is used for the RJ11 connectors?

Answer

Correct Answer: Telephone Cable

Note: This Question is unanswered, help us to find answer for this one

252. What is the binary equivalent of the decimal number 157?

Answer

Correct Answer: 10011101

Note: This Question is unanswered, help us to find answer for this one

253. How many twisted pairs does a UTP Cat 5 cable have?

Answer

Correct Answer: 4

Note: This Question is unanswered, help us to find answer for this one

254. According to the OSI model, which layer is responsible for routing?

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

255. Which of the following services is feasible using standard ISDN?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

256. What is a token?

Answer

Correct Answer: A special packet which travels from computer to computer in a token ring network

Note: This Question is unanswered, help us to find answer for this one

257. What is the binary value of hex BF?

Answer

Correct Answer: 10111111

Note: This Question is unanswered, help us to find answer for this one

258. What is V.42, V.22, V.42bis?

Answer

Correct Answer: Modem standards

Note: This Question is unanswered, help us to find answer for this one

259. What is the binary value of 157?

Answer

Correct Answer: 10011101

Note: This Question is unanswered, help us to find answer for this one

260. What does CSMA/CA stand for?

Answer

Correct Answer: Carrier Sense Multiple Access/ Collision Avoidance

Note: This Question is unanswered, help us to find answer for this one

261. When compared to OSI model, the functionality of which of the following two layers is incorporated in the application layer of TCP/IP model?

Answer

Correct Answer: Session, Presentation

Note: This Question is unanswered, help us to find answer for this one

262. In a TCP/IP network, which of the following must be unique for each computer in the network?

Answer

Correct Answer: IP address

Note: This Question is unanswered, help us to find answer for this one

263. According to the OSI model, at which of the following layers internet protocol (IP) addresses are assigned?

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

264. What are V.42, V.22, V.42bis?

Answer

Correct Answer: Modem standards

Note: This Question is unanswered, help us to find answer for this one

265. According to the OSI model, which layer performs the encryption and decryption of data?

Answer

Correct Answer: Presentation

Note: This Question is unanswered, help us to find answer for this one

266. What is the IEEE 802.2 standard related to?

Answer

Correct Answer: Definition of the Logical Link Control (LLC) sublayer

Note: This Question is unanswered, help us to find answer for this one

267. At which of the following layers of the OSI model does Ethernet operate?

Answer

Correct Answer: Both a and b

Note: This Question is unanswered, help us to find answer for this one

268. Which of the following is a Fiber Optic Connector?

Answer

Correct Answer: MT-RJ

Note: This Question is unanswered, help us to find answer for this one

269. At which layer of the OSI model, does a World Wide Web browser operate?

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

270. According to the OSI model, which layer provides services such as file transfer, database access and email?

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

271. For which of the following cables 8P8C connectors are used?

Answer

Correct Answer: Unshielded Twisted Pair Cable
Shielded Twisted Pair Cable

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

272. How is a unique MAC address assigned to a Network Card?

Answer

Correct Answer: It is built into the card when the card is manufactured

Note: This Question is unanswered, help us to find answer for this one

273. What is the speed of ISDN PRI service with 30B + 1D channel?

Answer

Correct Answer: 2.048 Mbps

Note: This Question is unanswered, help us to find answer for this one

274. At which layer does a Hub operate?

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

275. According to the OSI model, which layer performs compression and decompression?

Answer

Correct Answer: Presentation

Note: This Question is unanswered, help us to find answer for this one

276. At which layer does a Router operate?

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

277. What is the maximum transmission speed supported by a standard ISDN BRI?

Answer

Correct Answer: 128 kbps

Note: This Question is unanswered, help us to find answer for this one

278. What is the recommended maximum length(approx) for a segment of UTP cable?

Answer

Correct Answer: 100m

Note: This Question is unanswered, help us to find answer for this one

279. What do you call a medium which allows multiple channels?

Answer

Correct Answer: Broadband

Note: This Question is unanswered, help us to find answer for this one

280. Which of the following networks use optical fiber?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

281. How many bearer (B) and data (D) channels are there in a standard ISDN BRI service?

Answer

Correct Answer: 2B + 1D channel

Note: This Question is unanswered, help us to find answer for this one

282. Which layer of the OSI model corresponds to TCP?

Answer

Correct Answer: Transport

Note: This Question is unanswered, help us to find answer for this one

283. At which layer of OSI model does a network bridges or switches operate?

Answer

Correct Answer: Data Link

Note: This Question is unanswered, help us to find answer for this one

284. Which layer do Network Cards and their drivers correspond to?

Answer

Correct Answer: Data Link
Network
Transport

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

285. According to the OSI model, which layer handles the LAN switching?

Answer

Correct Answer: Data Link

Note: This Question is unanswered, help us to find answer for this one

286. What do you call a communication system in which data can be sent in both directions at the same time?

Answer

Correct Answer: Full Duplex

Note: This Question is unanswered, help us to find answer for this one

287. According to the OSI model, which layer is responsible for sending acknowledgements of successful data transfer?

Answer

Correct Answer: Transport

Note: This Question is unanswered, help us to find answer for this one

288. Which type of connector is mostly used these days for connectivity with the network card?

Answer

Correct Answer: RJ-45 8P8C

Note: This Question is unanswered, help us to find answer for this one

289. At which layer of the OSI model, does HTTP operate?

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

290. Which one is an "end-to-end" layer?

Answer

Correct Answer: Transport

Note: This Question is unanswered, help us to find answer for this one

291. Which of the following cables can be used to directly connect two PCs?

Answer

Correct Answer: Cross cable

Note: This Question is unanswered, help us to find answer for this one

292. At which layer does a Bridge operate?

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

293. Which protocol uses port number 23?

Answer

Correct Answer: Telnet

Note: This Question is unanswered, help us to find answer for this one

294. Which network topology does Ethernet use?

Answer

Correct Answer: Bus
Mesh

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

295. What is the X.25 protocol?

Answer

Correct Answer: It is a packet switching WAN protocol based on public data networks

Note: This Question is unanswered, help us to find answer for this one

296. Which cabling media does not suffer from Electro-Magnetic Interference(EMI)?

Answer

Correct Answer: Fibre Optic Cable

Note: This Question is unanswered, help us to find answer for this one

297. According to the OSI model, at which layer are network addresses assigned?

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

298. What do you call a medium which only allows a single channel?

Answer

Correct Answer: Baseband

Note: This Question is unanswered, help us to find answer for this one

299. At which layer of the OSI model, does SMTP (Simple Mail Transfer Protocol) operate?

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

300. What is the speed of a E1 line?

Answer

Correct Answer: 2.048 Mbps

Note: This Question is unanswered, help us to find answer for this one

301. In a TCP/IP network, which layers are basically absent?

Answer

Correct Answer: Session, Presentation

Note: This Question is unanswered, help us to find answer for this one

302. According to the OSI model, which layer performs encryption and decryption?

Answer

Correct Answer: Presentation

Note: This Question is unanswered, help us to find answer for this one

303. What is attenuation?

Answer

Correct Answer: Weakening of the signal in a cable over a distance

Note: This Question is unanswered, help us to find answer for this one

304. What is the IEEE 802.5 standard related to?

Answer

Correct Answer: Token Ring

Note: This Question is unanswered, help us to find answer for this one

305. Which layer of the OSI model corresponds to IP?

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

306. What do you call a communication system which uses start and stop bits to synchronize the sender and receiver?

Answer

Correct Answer: Asynchronous

Note: This Question is unanswered, help us to find answer for this one

307. What is the maximum number of valid IP addresses in a class B network?

Answer

Correct Answer: 65534

Note: This Question is unanswered, help us to find answer for this one

308. What do you call a communication system which uses a clocking mechanism to synchronize the sender and receiver?

Answer

Correct Answer: Synchronous

Note: This Question is unanswered, help us to find answer for this one

309. What does CSMA/CD stand for?

Answer

Correct Answer: Carrier Sense Multiple Access/ Collision Detection

Note: This Question is unanswered, help us to find answer for this one

310. Which of the following cables can be used to connect a PC and a Hub?

Answer

Correct Answer: Straight cable
Cross cable

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

311. According to the OSI model, which layer performs parity checking and error checking?

Answer

Correct Answer: Data Link

Note: This Question is unanswered, help us to find answer for this one

312. According to the OSI model, which layer breaks down the data into frames?

Answer

Correct Answer: Data Link

Note: This Question is unanswered, help us to find answer for this one

313. What is the binary value of hex 9F?

Answer

Correct Answer: 10011111

Note: This Question is unanswered, help us to find answer for this one

314. What is the purpose of the MAC sublayer?

Answer

Correct Answer: Controlliing the way multiple devices share the same media

Note: This Question is unanswered, help us to find answer for this one

315. What is the purpose of the shielding in a Shielded Twisted Pair (STP) cable?

Answer

Correct Answer: To reduce cross talk

Note: This Question is unanswered, help us to find answer for this one

316. According to the OSI model, which layer addresses the issue of network topologies (star, ring, bus etc)?

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

317. At which layer of the OSI model, does FTP operate?

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

318. Which of the following is used as a high speed network backbone media?

Answer

Correct Answer: Fibre Optic Cable

Note: This Question is unanswered, help us to find answer for this one

319. Which of the following is a disadvantage of Peer Networks?

Answer

Correct Answer: They have poor network security

Note: This Question is unanswered, help us to find answer for this one

320. Which of the following protocols does not support Routing?

Answer

Correct Answer: NetBEUI

Note: This Question is unanswered, help us to find answer for this one

321. What is multiplexing?

Answer

Correct Answer: Allowing multiple senders and receivers to share a single media

Note: This Question is unanswered, help us to find answer for this one

322. At which layer of the OSI model, does a Proxy Server operate?

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

323. Which of the following ranges are reserved as private addresses?

Answer

Correct Answer: 10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

324. What is the full form of PPPoE?

Answer

Correct Answer: Point to Point Protocol over Ethernet

Note: This Question is unanswered, help us to find answer for this one

325. What is the full form of DSL?

Answer

Correct Answer: Digital Subscriber Line

Note: This Question is unanswered, help us to find answer for this one

326. Which protocol is connection oriented?

Answer

Correct Answer: TCP

Note: This Question is unanswered, help us to find answer for this one

327. Which type of network uses dual fibre-optic rings?

Answer

Correct Answer: FDDI

Note: This Question is unanswered, help us to find answer for this one

328. Which cable used for RJ11 connectors?

Answer

Correct Answer: Telephone Cable

Note: This Question is unanswered, help us to find answer for this one

329. What does ISDN stand for?

Answer

Correct Answer: Integrated Services Digital Network

Note: This Question is unanswered, help us to find answer for this one

330. Which of the following is a Class A network?

Answer

Correct Answer: 126.0.0.0

Note: This Question is unanswered, help us to find answer for this one

331. What is ATM (Asynchronous Transfer Mode)?

Answer

Correct Answer: It is a WAN technology based on time division multiplexing that uses fixed size packets known as cells

Note: This Question is unanswered, help us to find answer for this one

332. For which layer of the OSI model has the Ethernet standard been defined?

Answer

Correct Answer: Both a and b

Note: This Question is unanswered, help us to find answer for this one

333. According to the OSI model, which layer addresses the issues of communication media and cable connectors etc?

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

334. Which media access technique does Ethernet use?

Answer

Correct Answer: CSMA/CD

Note: This Question is unanswered, help us to find answer for this one

335. According to the OSI model, which layer is responsible for sending acknowledgements?

Answer

Correct Answer: Transport

Note: This Question is unanswered, help us to find answer for this one

336. What is the maximum transmission speed of CAT 5 cable?

Answer

Correct Answer: 1000 Mbps

Note: This Question is unanswered, help us to find answer for this one

337. According to the OSI model, which layer performs the function of transforming bits of data into electrical signals and sending those signals across the media?

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

338. What is a checksum?

Answer

Correct Answer: An error detection technique

Note: This Question is unanswered, help us to find answer for this one

339. What do you call a communication system in which data cannot be sent in both directions at the same time?

Answer

Correct Answer: Half Duplex

Note: This Question is unanswered, help us to find answer for this one

340. How many bits of the MAC address are used by OUI portion?

Answer

Correct Answer: 24 bits

Note: This Question is unanswered, help us to find answer for this one

341. According to the OSI model, which layer addresses the issue of connections (connection-oriented/ connection-less communication)?

Answer

Correct Answer: Transport

Note: This Question is unanswered, help us to find answer for this one

342. What is the IEEE 802.3 standard related to?

Answer

Correct Answer: Ethernet

Note: This Question is unanswered, help us to find answer for this one

343. What is the speed of a T1 line?

Answer

Correct Answer: 1.544 Mbps

Note: This Question is unanswered, help us to find answer for this one

344. Which of the following is not a fiber optic based network?

Answer

Correct Answer: Frame Relay

Note: This Question is unanswered, help us to find answer for this one

345. Which cable uses RJ45 connectors?

Answer

Correct Answer: Unshielded Twisted Pair Cable
Shielded Twisted Pair Cable

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

346. What is the recommended number of times you should update your status on LinkedIn so you remain active and are visible to connections?

Answer

Correct Answer: 3 times a day

Note: This Question is unanswered, help us to find answer for this one

347. Which of the following is the best example of a strategic alliance?

Answer

Correct Answer: A celebrity endorses a car dealership in return for a discount

Note: This Question is unanswered, help us to find answer for this one

348. The most effective networkers take frequent breaks from networking, to give their mental batteries a chance to recharge.

Answer

Correct Answer: F

Note: This Question is unanswered, help us to find answer for this one

349. What is the suggested waiting period between meeting a new professional connection and contacting them?

Answer

Correct Answer: 2 days

Note: This Question is unanswered, help us to find answer for this one

350. Which side should you wear your name tag on at a networking event?

Answer

Correct Answer: The right side

Note: This Question is unanswered, help us to find answer for this one

351. What is a referral group?

Answer

Correct Answer: A meeting group where participants from non-competing companies exchange leads and referrals

Note: This Question is unanswered, help us to find answer for this one

352. What is the recommended number of times you should share and comment on a LinkedIn connections' posts?

Answer

Correct Answer: Once a day maximum

Note: This Question is unanswered, help us to find answer for this one

353. Apologizing when asking a professional contact for help shows:

Answer

Correct Answer: A lack of confidence and a lack of professionalism

Note: This Question is unanswered, help us to find answer for this one

354. You should think of your networking connections as:

Answer

Correct Answer: Advisers

Note: This Question is unanswered, help us to find answer for this one

355. When arriving at a networking event with a colleague, you should _________.

Answer

Correct Answer: split up

Note: This Question is unanswered, help us to find answer for this one

356. When attempting to connect with someone you haven't met yet on LinkedIn, which of the following would be good to include in your message?

Answer

Correct Answer: Point out a mutual connection

Note: This Question is unanswered, help us to find answer for this one

357. True or False? You should try to sell your product by making a sales pitch while networking.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

358. True or false? The main goal of networking is to get as many questions answered as possible.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

359. To avoid seeming intrusive or presumptuous, you should offer to help contacts only when they specifically ask for your help.

Answer

Correct Answer: F

Note: This Question is unanswered, help us to find answer for this one

360. Which of the following are inappropriate places for networking?

Answer

Correct Answer: None of these

Note: This Question is unanswered, help us to find answer for this one

361. Is it appropriate to drink at a networking event?

Answer

Correct Answer: Yes, in moderation

Note: This Question is unanswered, help us to find answer for this one

362. True or false? Twitter can be an effective networking tool.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

363. Which of the following is an aspect of personal brand?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

364. True or False? Networking is an activity for young people at the beginning of their career, not for successful professionals.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

365. What should you always bring to a networking event?

Answer

Correct Answer: Business Cards

Note: This Question is unanswered, help us to find answer for this one

366. When inviting someone to connect with you on LinkedIn, what is the appropriate etiquette?

Answer

Correct Answer: Send a personal message reminding them where you met, or saying why you're adding them

Note: This Question is unanswered, help us to find answer for this one

367. When you meet someone you want to build a relationship with, it's best to:

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

368. Thanking people who help you is one way to stand out from the crowd and get even more referrals from them.

Answer

Correct Answer: T

Note: This Question is unanswered, help us to find answer for this one

369. True or False? At a networking event, you should listen more than you talk about yourself.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

370. What is a good question to ask someone you're networking with?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

371. What should you do immediately with a new contact's business card?

Answer

Correct Answer: Write where you met them, a quick note of what you discussed, and how you can help them on the back of it

Note: This Question is unanswered, help us to find answer for this one

372. True or false? Introducing your contacts to each other can help strengthen your personal network.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

373. Which of the following is the best way to end a conversation at a networking event?

Answer

Correct Answer: May I have your contact info so we can schedule a time to finish this conversation?

Note: This Question is unanswered, help us to find answer for this one

374. True or false? If you cannot establish a contact in the first meeting, then it is a waste of time to keep building the relationship.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

375. True of false? Online social networks are not effective tools for formal business networking.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

376. True or False? When attempting to connect with someone for the first time via social media, you should send them a long, detailed message.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

377. At a networking event, it is generally best to ask _________ questions.

Answer

Correct Answer: open-ended

Note: This Question is unanswered, help us to find answer for this one

378. If you become bored with the new person you are speaking with at a networking event, you should:

Answer

Correct Answer: When at an appropriate point in the conversation, smile and genuinely thank them for their time

Note: This Question is unanswered, help us to find answer for this one

379. What is LinkedIn most commonly used for?

Answer

Correct Answer: Industry networking

Note: This Question is unanswered, help us to find answer for this one

380. Which of the following is probably the best networking question?

Answer

Correct Answer: How did you get started in this line of work?

Note: This Question is unanswered, help us to find answer for this one

381. At a networking event, you should open up a conversation with ________.

Answer

Correct Answer: casual conversation

Note: This Question is unanswered, help us to find answer for this one

382. What is the recommended way to tag-team a networking event with a co-worker or friend?

Answer

Correct Answer: Split up as soon as you arrive, but have a game plan to help each other when needed

Note: This Question is unanswered, help us to find answer for this one

383. What is the recommended number of people should you speak with at one time while networking?

Answer

Correct Answer: Two people maximum. You don't want to miss anything important either one of them says

Note: This Question is unanswered, help us to find answer for this one

384. Which is an appropriate comment during a networking event.

Answer

Correct Answer: Wow, attendees went out of their way to wear their best outfits.

Note: This Question is unanswered, help us to find answer for this one

385. After landing a job, what should you do?

Answer

Correct Answer: Let your networking contacts know and thank them for their assistance

Note: This Question is unanswered, help us to find answer for this one

386. If you're applying for a position at a contact's company, you should ask:

Answer

Correct Answer: If you can use the contact's name in an email or phone call with the hiring manager

Note: This Question is unanswered, help us to find answer for this one

387. At a networking event, you should:

Answer

Correct Answer: Talk to strangers and mingle with people you haven't met yet

Note: This Question is unanswered, help us to find answer for this one

388. Which of the following is probably the worst networking question?

Answer

Correct Answer: How much revenue did your company make last year?

Note: This Question is unanswered, help us to find answer for this one

389. When meeting someone for the first time, what do you want to avoid?

Answer

Correct Answer: Asking for favors

Note: This Question is unanswered, help us to find answer for this one

390. In a networking situation, when should you give the other person your business card?

Answer

Correct Answer: At the end of the conversation

Note: This Question is unanswered, help us to find answer for this one

391. True or False? It is best to start networking when you are looking for a job and not before or after you are hired.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

392. Prior to attending a networking event, you should:

Answer

Correct Answer: Send a personalized email to everyone you want to meet

Note: This Question is unanswered, help us to find answer for this one

393. What is LinkedIn most commonly used for amongst Middle Management?

Answer

Correct Answer: Keeping in touch and industry networking

Note: This Question is unanswered, help us to find answer for this one

394. After meeting a new contact, it is recommended that you:

Answer

Correct Answer: Follow up that day with a quick email saying it was nice to meet them,

Note: This Question is unanswered, help us to find answer for this one

395. Which of the following is an appropriate way to keep in touch with a contact you made while networking?

Answer

Correct Answer: Email them an article you think they might be interested in with a quick message

Note: This Question is unanswered, help us to find answer for this one

396. True or false? For efficiency's sake, you should ignore contacts that are not directly related to your interests.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

397. What should you ask your contacts for when job hunting?

Answer

Correct Answer: Advice and introductions

Note: This Question is unanswered, help us to find answer for this one

398. What is the recommended way you should act while at a networking event?

Answer

Correct Answer: Be genuine- being yourself is best

Note: This Question is unanswered, help us to find answer for this one

399. Which of the following is a good icebreaker at a networking event?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

400. What is LinkedIn most commonly used for amongst entry-level employees?

Answer

Correct Answer: Job search and networking with co-workers

Note: This Question is unanswered, help us to find answer for this one

401. Which of the following is the best definition of professional networking?

Answer

Correct Answer: Relationship-building that exposes you to to a new interest

Note: This Question is unanswered, help us to find answer for this one

402. Which of the following is NOT commonly found on business cards?

Answer

Correct Answer: Home address

Note: This Question is unanswered, help us to find answer for this one

403. What is the golden rule of networking?

Answer

Correct Answer: Ask how you can help your contact

Note: This Question is unanswered, help us to find answer for this one

404. If you want to maintain a professional connection with your old supervisor, what is the recommended frequency in which you should you touch base?

Answer

Correct Answer: Every 3-4 months

Note: This Question is unanswered, help us to find answer for this one

405. If you only know someone through a social networking site like LinkedIn or Facebook, it's inappropriate to ask him or her for an in-person meeting.

Answer

Correct Answer: F

Note: This Question is unanswered, help us to find answer for this one

406. True or false? Inviting colleagues to lunch can be an effective networking tool.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

search