Network+ Quiz C

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ctstravis
C
Ctstravis
Community Contributor
Quizzes Created: 8 | Total Attempts: 2,494
| Attempts: 1,440 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. QUESTION NO: 143 Which of the following utilities will produce the results printed below? Tracing route to 172.30.0.78 over a maximum of 30 hops 1 <1 ms <1 ms l72.30.0.78

Explanation

Tracert is the correct answer because it is a utility that is used to trace the route that packets take from a source to a destination on a network. In this case, the utility is being used to trace the route to the IP address 172.30.0.78 and it is showing that the packet is taking 1 millisecond to reach the destination.

Submit
Please wait...
About This Quiz
Network Plus Quizzes & Trivia

Network+ quiz C assesses knowledge on network troubleshooting, firewall configurations, and DNS issues. It is designed for those preparing for professional certification in network administration, focusing on practical... see moreskills like tracing routes, configuring host-based firewalls, and understanding network cabling issues. see less

2. QUESTION NO: 138* Which of the following is correct when converting 192 to binary?

Explanation

When converting 192 to binary, the correct answer is 11000000. This is because in binary, each digit can have a value of either 0 or 1. Starting from the right, the first digit represents 2^0, the second digit represents 2^1, the third digit represents 2^2, and so on. By adding the corresponding values for each digit, we get the decimal value of 192. In this case, the binary representation of 192 is 11000000.

Submit
3. QUESTION NO: 136* A technician is creating a patch cable to connect two PC's for file sharing. Which of the following cables should the teclmician use?

Explanation

A crossover cable should be used to connect two PCs for file sharing. A crossover cable is designed to allow direct communication between two devices without the need for a hub or switch. It has a specific wiring configuration that allows the transmit and receive lines to be crossed over, enabling the PCs to send and receive data directly to each other. This is different from a straight cable, which is used to connect a PC to a hub or switch. A rollover cable is used to connect a PC to a networking device, such as a router or switch, for configuration purposes.

Submit
4. QUESTION NO: 146 Which of the following protocols provides a secure method to remotely administer a server?

Explanation

SSH (Secure Shell) is a protocol that provides a secure method to remotely administer a server. It encrypts the communication between the client and the server, ensuring that sensitive information such as passwords and data are protected from unauthorized access. Unlike Telnet, which sends data in plain text, SSH encrypts the data, making it much more secure. Similarly, HTTP is not designed for remote administration and does not provide encryption. SFTP (Secure File Transfer Protocol) is a secure version of FTP, which is used for transferring files, but it does not provide remote administration capabilities like SSH.

Submit
5. QUESTION NO: 130 A technician wants to remotely log into an office computer using remote desktop. The technicain needs to do this in a secure manner. Which of the following would accomplish this?

Explanation

A VPN (Virtual Private Network) would accomplish remote logging into an office computer in a secure manner. VPNs create a secure and encrypted connection between the remote device and the office computer, ensuring that data transmitted between them is protected from unauthorized access. This allows the technician to securely access and control the office computer from a remote location, without the risk of data interception or compromise. Telnet, VLAN, and tagged packets do not provide the same level of security as a VPN.

Submit
6. QUESTION NO: 129* Which of the following is considered a connection-oriented protocol?

Explanation

TCP (Transmission Control Protocol) is considered a connection-oriented protocol because it establishes a reliable and dedicated connection between the sender and receiver before transmitting data. This connection ensures that data packets are delivered in the correct order and without errors. TCP also provides features like flow control and congestion control to manage network traffic effectively. Unlike UDP (User Datagram Protocol), which is a connectionless protocol, TCP guarantees the delivery of data packets and ensures the integrity of the transmitted data. SPX (Sequenced Packet Exchange) and IP (Internet Protocol) are also connectionless protocols, making TCP the correct answer.

Submit
7. QUESTION NO: 149* A network technician is assigned the task of  connecting two switches in two different wiring closets. Which of the following cable types is the appropriate choice?

Explanation

A crossover cable is the appropriate choice for connecting two switches in different wiring closets. Unlike straight-through cables, which are used to connect devices of different types (e.g. switch to router), crossover cables are specifically designed to connect devices of the same type (e.g. switch to switch). Crossover cables have the transmit and receive wires crossed over, allowing the switches to communicate directly with each other. This enables them to exchange information and establish a network connection.

Submit
8. QUESTION NO: 142* Which of the following would limit the availability of the types of sites that users on a LAN have access to?

Explanation

A proxy server would limit the availability of the types of sites that users on a LAN have access to. A proxy server acts as an intermediary between the LAN users and the internet. It can be configured to block certain websites or types of content, thereby restricting the access of LAN users. By controlling and filtering the incoming and outgoing traffic, a proxy server can limit the availability of certain sites for the LAN users.

Submit
9. QUESTION NO: 127 A technician is sent to troubleshoot a connectivity issue on A company's web server. Which of the following is the NEXT step after verifying that one of the NICs has no LEDs flashing?

Explanation

After verifying that one of the NICs has no LEDs flashing, the next step would be to check for hardware conflicts or disabled devices. This is because a lack of LED activity on a NIC could indicate a hardware issue or a disabled device, which could be causing the connectivity problem on the web server. By checking for hardware conflicts or disabled devices, the technician can identify and resolve any issues that may be affecting the NIC's functionality and restore connectivity to the web server.

Submit
10. QUESTION NO: 141 A remote user cannot connect to the office via VPN. The user has established Internet connectivity. Which of the following is the MOST likely next step in troubleshooting?

Explanation

The most likely next step in troubleshooting is to determine if the user has the correct VPN address and password. This is because if the user does not have the correct VPN address or password, they will not be able to establish a connection to the office via VPN. Reinstalling the VPN client, determining if the VPN service is running, or power cycling the VPN concentrator may be potential troubleshooting steps, but they would not be the most likely next step in this scenario.

Submit
11. QUESTION NO: 148* On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which off the following is the cause of the problem?

Explanation

The cause of the problem is that the DNS server is not resolving correctly. This means that the DNS server is not able to translate domain names into IP addresses, which is necessary for users to access network resources. As a result, users are only able to connect to network resources using the IP address. This indicates that there is an issue with the DNS server's functionality or configuration.

Submit
12. QUESTION NO: 108* Which of the following is the default port for POP3?

Explanation

The default port for POP3 is 110.

Submit
13. QUESTION NO: 115 A company is getting a new sales system that must remain secure and isolated. The network administrator needs to segregate network traffic for security reasons. Currently there is one addressing scheme 10.2.1 O.x, with a subnet mask of 255.255.255.0. Which of the following methods would BEST help in segregating the traffic?

Explanation

Creating a new subnet for this system would be the best method to segregate the traffic. By creating a new subnet, the network administrator can assign a different range of IP addresses to the new sales system, effectively separating it from the rest of the network. This ensures that the traffic for the new sales system remains isolated and secure. Implementing a dedicated broadcast or multicast network, or changing the IP scheme to class C addresses, would not provide the same level of segregation and security as creating a new subnet.

Submit
14. QUESTION NO: 121* A user reports that when the phone rings in their house the wireless on their laptops becomes disconnected. Which of the following BEST describes the issue?

Explanation

The issue is that the cordless phones in the user's house operate on the same frequency as the wireless network (2.4Ghz), causing interference and disconnecting the wireless connection on their laptops.

Submit
15. QUESTION NO: 122* Which of the following documentation would a network administrator need to update if they have just finished upgrading the firmware on all the switches within the LAN?

Explanation

After upgrading the firmware on all the switches within the LAN, the network administrator would need to update the baseline and configuration documentation. This documentation contains information about the initial settings and configurations of the switches. By updating this documentation, the network administrator ensures that it accurately reflects the current state of the switches after the firmware upgrade. This is important for future reference and troubleshooting purposes.

Submit
16. QUESTION NO: 135* A technician wants to see how many server connections are open on a client machine. Which of the following is the command to see these connections?

Explanation

The correct answer is "netstat". The netstat command is used to display active network connections on a client machine. By running this command, the technician can see how many server connections are currently open. This information can be useful for troubleshooting network issues or monitoring network activity.

Submit
17. QUESTION NO: 114* A Network address of 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten in classlessinterdomain routing notation (CIDR) as which of the following?

Explanation

The given network address 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten in CIDR notation as 220.100.100.100 /24. This means that the first 24 bits of the IP address represent the network portion, while the remaining 8 bits represent the host portion.

Submit
18. QUESTION NO: 110* A technician needs to trace a wire that is in the wall. Which of the following is the BEST way for the technician to identify the wires location?

Explanation

A tone generator is the best way for a technician to identify the location of a wire in a wall. A tone generator can send a signal through the wire, which can then be detected using a tone probe or receiver. This allows the technician to trace the path of the wire without having to physically access it. A media tester, continuity tester, and multimeter are useful tools for other purposes, but they do not provide the same functionality as a tone generator for wire tracing.

Submit
19. QUESTION NO: 106* Which of the following is the MOST likely cause of a wireless connection drop-off in a wireless G network?

Explanation

Cordless phones are the most likely cause of a wireless connection drop-off in a wireless G network. Cordless phones operate on the same frequency range as wireless G networks, which can lead to interference and signal degradation. This interference can result in dropped connections and reduced network performance.

Submit
20. QUESTION NO: 131* A user is trying to establish an FTP connection to a computer at home. The home computer is turned on and has Intemet connectivity? However, they are unable to connect from the PC at work. The IP address that the user is trying to connect to is 192.168.1.125.Which of the following is the MOST likely problem?

Explanation

The most likely problem is that the IP address of the home computer (192.168.1.125) is not routable across the Internet. This is because the IP address falls within the range of private IP addresses, which are not directly accessible from the Internet. In order for the user to establish an FTP connection from the PC at work, they would need to use a public IP address that is routable across the Internet.

Submit
21. QUESTION NO: 120 Which of the following devices allows segregation of collision domains but not broadcasting domains?

Explanation

A switch allows segregation of collision domains but not broadcasting domains. A collision domain is a network segment where collisions can occur if multiple devices try to transmit data at the same time. A switch separates these collision domains by creating individual connections between devices, allowing for simultaneous data transmission without collisions. However, a switch does not separate broadcasting domains, meaning that broadcast messages are still transmitted to all devices connected to the switch.

Submit
22. QUESTION NO: 144* Which of the following would a network administrator MOST likely configure on a workstation to block certain websites and ports?

Explanation

A network administrator would most likely configure a host-based firewall on a workstation to block certain websites and ports. A host-based firewall is a software-based firewall that is installed directly on the workstation and can control incoming and outgoing network traffic. It allows the administrator to set specific rules and filters to block access to certain websites and ports, providing an additional layer of security for the workstation.

Submit
23. QUESTION NO: 140* Which of the following is port 123 commonly used for?

Explanation

Port 123 is commonly used for NTP (Network Time Protocol). NTP is a networking protocol used to synchronize the time on computer systems and networks. It allows devices to maintain accurate time by syncing with a reference time source. By using port 123, NTP can communicate and exchange time information between devices, ensuring accurate timekeeping across the network.

Submit
24. QUESTION NO: 117 Which of the following uses pointer records and A records?

Explanation

A DNS server uses pointer records and A records. Pointer records, also known as PTR records, are used to map IP addresses to domain names. A records, on the other hand, are used to map domain names to IP addresses. The DNS server uses these records to translate domain names into their corresponding IP addresses and vice versa, allowing computers to communicate with each other over the internet.

Submit
25. QUESTION NO: 150* Which of the following access methods is used for wireless medium access?

Explanation

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is the correct answer. It is an access method used for wireless medium access. In CSMA/CA, devices listen to the wireless medium and check if it is busy before transmitting data. If the medium is busy, they wait for a random amount of time before attempting to transmit again. This method helps to avoid collisions and ensures efficient use of the wireless medium.

Submit
26. QUESTION NO: 133* Which of the following tools enables the technician to trace cables in multiple pair wiring?

Explanation

A toner probe is a tool that enables a technician to trace cables in multiple pair wiring. It is used to locate and identify specific cables by sending a tone through one end of the cable and then using the probe to detect the tone at the other end. This allows the technician to easily identify and trace the path of the cables, making it a valuable tool for troubleshooting and cable management.

Submit
27. QUESTION NO: 123 After deploying three large additional servers in a rack there are reports of network instability and other issues across all servers in the rack. It has been verified that there is sufficient power resources and network bandwidth. Which of the following should the technician check NEXT?

Explanation

The technician should check the temperature monitor next because the deployment of three large additional servers may have caused an increase in heat within the rack. Excessive heat can lead to network instability and other issues with the servers. By monitoring the temperature, the technician can identify if the servers are overheating and take appropriate measures to cool them down, such as adjusting airflow or installing additional cooling systems.

Submit
28. QUESTION NO: 103* Which of the following is found in a layer two switch?

Explanation

A layer two switch is primarily responsible for forwarding data packets based on MAC addresses. VLAN settings, which stands for Virtual Local Area Network settings, allow the switch to create separate virtual networks within a physical network, enabling better network management and security. Therefore, VLAN settings are commonly found in a layer two switch.

Submit
29. QUESTION NO: 109 A user contacts a technician and states that they are unable to access the network. The technician discovers that the IP address of the workstation is 169.123.142.34. Which of the following has occurred?

Explanation

The IP address 169.123.142.34 is within the range of APIPA (Automatic Private IP Addressing) addresses, which are used when a device is unable to obtain an IP address from a DHCP server. APIPA addresses are self-assigned and are not routable on the internet. This indicates that the workstation is unable to connect to the network and has automatically assigned itself an APIPA address.

Submit
30. QUESTION NO: 107* Which of the following tools will identify if a CAT5e cable is operating at optimal performance?

Explanation

A certifier is a tool specifically designed to test and certify the performance of network cables, including CAT5e cables. It measures various parameters such as signal strength, attenuation, noise, and crosstalk to determine if the cable is operating at optimal performance. This tool is commonly used by network technicians and installers to ensure that the cables meet industry standards and can support high-speed data transmission. A toner probe, multimeter, and butt set are not specifically designed for certifying network cables and may not provide accurate measurements of cable performance.

Submit
31. QUESTION NO: 116* A network administrator has been receiving work orders about poor voice quality crossing a branch T1 . The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?

Explanation

Configuring traffic shaping to reduce the bandwidth available to the file sharing application would improve voice quality. By limiting the bandwidth allocated to the file sharing application, it would prevent it from consuming excessive resources and causing delays for the smaller voice streams. This would ensure that the voice traffic is prioritized and given sufficient bandwidth for better quality.

Submit
32. QUESTION NO: 102* A network technician has been asked to retrieve device statistics, information, and errors. Which of the following tools would the technician likely use?

Explanation

SNMP (Simple Network Management Protocol) is a protocol used to manage and monitor network devices. It allows the network technician to retrieve device statistics, information, and errors from network devices such as routers, switches, and servers. SNMP provides a standardized way for network administrators to collect and organize information about network devices, making it the most suitable tool for the given task. TFTP is a file transfer protocol, Packet sniffer is used to capture and analyze network traffic, and SMTP is a protocol used for sending email.

Submit
33. QUESTION NO: 145 A user is having intermittent problems connecting to their network shares. A network technician is able to determine that there is a problem within the network cabling in between the workstation and the switch. All other users are able to connect successfully to the network. Which of the following is the MOST likely cause?

Explanation

The most likely cause for the intermittent problems connecting to the network shares is crosstalk and interference. Crosstalk occurs when signals from one cable interfere with signals on another cable, leading to data corruption or loss. Interference can be caused by electromagnetic interference (EMI) from nearby electrical devices or radio frequency interference (RFI) from sources like cell phones or wireless devices. In this case, since all other users are able to connect successfully, it suggests that the issue is specific to the user's network cabling rather than a larger network problem like a crossover cable or a cut cable.

Submit
34. QUESTION NO: 111 Users are reporting that they can access Intenet web pages but cannot access the internal company website. Which of the following is the MOST likely source of the problem?

Explanation

The most likely source of the problem is that the intranet server is down. This means that the server hosting the internal company website is not functioning properly or is experiencing technical difficulties, which is why users are unable to access it. The other options, such as the intranet DNS entry being non-authoritative, the DHCP DNS address being incorrect, or the default gateway being incorrect, are less likely to be the cause of the issue compared to the server itself being down.

Submit
35. QUESTION NO: 118* DNS services are in a failed state on a network. Some users require FQDN to access specific services. A temporary solution would be to:

Explanation

A temporary solution to the failed DNS services on the network would be to create a local host file on the PC. By creating a local host file, the PC will have a record of the specific FQDNs and their corresponding IP addresses, allowing the users to access the required services. This bypasses the need for DNS resolution and ensures that the users can still access the services they need.

Submit
36. QUESTION NO: 113* Which of the following protocols allows email to be viewed while remaining on the email server?

Explanation

IMAP4 is the correct answer because it is a protocol that allows users to view their email messages while they remain on the email server. Unlike POP3, which downloads the emails to the user's device, IMAP4 keeps the emails stored on the server, allowing users to access them from multiple devices. SMTP is a protocol used for sending emails, SSL is a security protocol used for encrypting data transmission, and POP3 is a protocol that downloads emails to the user's device.

Submit
37. QUESTION NO: 134* Which of the following is a routable public class A address?

Explanation

A routable public Class A address is an IP address that can be used to route traffic on the internet. In the given options, the only address that falls within the range of Class A addresses (0.0.0.0 to 127.255.255.255) is 19.16.18.1. Therefore, 19.16.18.1 is the correct answer as it is a routable public Class A address.

Submit
38. QUESTION NO: 137 Which of the following is the maximum number of wire pairs that can be used in an RJ-11 connector?

Explanation

An RJ-11 connector is commonly used for telephone connections and supports up to 6 positions, but typically only 4 positions are used. Each position can accommodate one wire pair, so the maximum number of wire pairs that can be used in an RJ-11 connector is 2.

Submit
39. QUESTION NO: 126* A router receives a packet with a destination address 72.44.69.254?however, no entry in the routing table exists for the network. Which of the following actions will the router take?  

Explanation

When a router receives a packet with a destination address for which there is no entry in the routing table, it will follow the default route. The default route is a pre-configured route that is used when there is no specific route available for the destination network. In this case, the router will forward the packet to the next hop address specified in the default route, allowing it to reach its destination.

Submit
40. QUESTION NO: 105 A technician is dispatched to a remote office to install a new NIC in a client computer. After successfully installing and configuring the operating system to recognize the device, the computer still cannot access the network. Which of the following would MOST likely be the problem?


Explanation

The most likely problem is that the CAT5 cable is defective. This is because even though the technician has successfully installed and configured the NIC, the computer still cannot access the network. This suggests that there is an issue with the physical connection between the computer and the network, which could be caused by a defective CAT5 cable.

Submit
41. QUESTION NO: 128 Which of the following WAN technologies uses thirty 64Kbps channels?

Explanation

E-1 is the correct answer because it is a WAN technology that uses thirty 64Kbps channels. E-1 is a digital transmission format that is commonly used in Europe and other parts of the world. It provides a total bandwidth of 2.048 Mbps, which is divided into thirty 64Kbps channels. These channels can be used for voice, data, or video transmission, making E-1 an efficient and versatile WAN technology.

Submit
42. QUESTION NO: 124 A network engineer for a company has issued the 10.44.210.0/24 network for a branch office. The network administrator for the branch has three separate VLANs for voice, workstations, and servers. There are approximately 50 end user workstations, 50 IP phones that require addressing, and a dozen servers. How should the network administrator use the block allocated to the branch?

Explanation

The network administrator should subnet the block into /26s and assign one to each VLAN. By subnetting the block into /26s, the administrator can create separate subnets for each VLAN, ensuring that each VLAN has its own unique network range. This allows for better network management and security, as well as efficient allocation of IP addresses.

Submit
43. QUESTION NO: 119 A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?

Explanation

A four port wireless router would allow the user to connect their small network of four computers to a single cable modem. A wireless router combines the functions of a router, switch, and access point, allowing multiple devices to connect to the internet through a single modem. The four ports on the router provide wired connections for the computers, while the wireless capabilities allow for additional wireless devices to connect as well.

Submit
44. QUESTION NO: 125* Which of the following is the standard data transmission rate for an OC-31ine?

Explanation

The standard data transmission rate for an OC-31 line is 155.52Mbps. This is the correct answer because OC-31 is a specific type of optical carrier that has a transmission rate of 155.52Mbps. The other options listed are not the standard transmission rates for an OC-31 line.

Submit
45. QUESTION NO: 147 Which of the following is the maximum distance a 10GBase-EW connection can transmit with one repeater?

Explanation

The correct answer is 80,000 meters (262,467 feet). This is the maximum distance that a 10GBase-EW connection can transmit with one repeater.

Submit
46. NedQUESTION NO: 101 A network administrator is summarizing the following IP address ranges into a single route for redistribution into the network core: 192.168.0.0 /24 192.168.1.0 /24 192.168.2 .0 /24 192.168.3.0 /24
Which of the following IP summary addresses will represent the listed network ranges without including any ranges not listed?

Explanation

The correct answer is 192.168.0.0/22 because it includes all the given IP address ranges (192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24) without including any additional ranges. The /22 subnet mask allows for a range of IP addresses from 192.168.0.0 to 192.168.3.255, which covers all the given ranges.

Submit
47. QUESTION NO: 112 When connecting two devices for voice on a vertical connect, which of the following cables would be used to connect the two devices?

Explanation

The 25 pair cable would be used to connect two devices for voice on a vertical connect. This type of cable is commonly used in telecommunications for connecting telephone lines and is capable of carrying multiple voice signals simultaneously. It consists of 25 pairs of twisted copper wires, providing enough capacity to handle the voice connections between the devices.

Submit
48. QUESTION NO: 139 Which of the following is the FIRST criterion used to select a nexthop from the routing table?

Explanation

The first criterion used to select a nexthop from the routing table is the most precise matching prefix. This means that the router will look for the route with the longest prefix match for the destination IP address. The more specific the prefix match, the more accurate the route is for reaching the destination. This allows for efficient routing and ensures that the router chooses the best path based on the destination address.

Submit
49. QUESTION NO: 132 A company requires a hub and spoke WAN solution. Which of the following are BEST suited to meet this need? (Select THREE).

Explanation

MPLS, Frame-relay, and ATM are the best options for a hub and spoke WAN solution. MPLS (Multiprotocol Label Switching) is a flexible and scalable solution that allows for efficient routing of data between multiple locations. Frame-relay is a cost-effective solution that provides reliable and high-speed connections between a central hub and remote locations. ATM (Asynchronous Transfer Mode) is a high-speed networking technology that offers low latency and high bandwidth, making it suitable for a hub and spoke architecture. ISDN, ADSL, SONET, and DOCSIS are not typically used in hub and spoke WAN solutions.

Submit
50. QUESTION NO: 104 Which of the following cable types transmits data over lOOMbps per direction?

Explanation

The correct answer is l0GBase-T. l0GBase-T is a cable type that can transmit data at a speed of 10Gbps per direction. This makes it the fastest option among the given cable types, which include 100Base-TX, I0Base-T, and 100Base-T.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 16, 2011
    Quiz Created by
    Ctstravis
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
QUESTION NO: 143 ...
QUESTION NO: 138* ...
QUESTION NO: 136* ...
QUESTION NO: 146 ...
QUESTION NO: 130 ...
QUESTION NO: 129* ...
QUESTION NO: 149* ...
QUESTION NO: 142* ...
QUESTION NO: 127 ...
QUESTION NO: 141 ...
QUESTION NO: 148* ...
QUESTION NO: 108* ...
QUESTION NO: 115 ...
QUESTION NO: 121* ...
QUESTION NO: 122* ...
QUESTION NO: 135* ...
QUESTION NO: 114* ...
QUESTION NO: 110* ...
QUESTION NO: 106* ...
QUESTION NO: 131* ...
QUESTION NO: 120 ...
QUESTION NO: 144* ...
QUESTION NO: 140* ...
QUESTION NO: 117 ...
QUESTION NO: 150* ...
QUESTION NO: 133* ...
QUESTION NO: 123 ...
QUESTION NO: 103* ...
QUESTION NO: 109 ...
QUESTION NO: 107* ...
QUESTION NO: 116* ...
QUESTION NO: 102* ...
QUESTION NO: 145 ...
QUESTION NO: 111 ...
QUESTION NO: 118* ...
QUESTION NO: 113* ...
QUESTION NO: 134* ...
QUESTION NO: 137 ...
QUESTION NO: 126* ...
QUESTION NO: 105 ...
QUESTION NO: 128 ...
QUESTION NO: 124 ...
QUESTION NO: 119 ...
QUESTION NO: 125* ...
QUESTION NO: 147 ...
NedQUESTION NO: 101 ...
QUESTION NO: 112 ...
QUESTION NO: 139 ...
QUESTION NO: 132 ...
QUESTION NO: 104 ...
Alert!

Advertisement