Network+ (N10-004) Quiz F

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rich70
R
Rich70
Community Contributor
Quizzes Created: 8 | Total Attempts: 2,002
| Attempts: 145 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. QUESTION NO: 251 Which of the following is the point when local exchange carrier responsibility ends?

Explanation

The point when local exchange carrier responsibility ends is known as the demarcation point or "demarc" for short. This is the point where the responsibility for the telephone or data line transitions from the service provider to the customer. At the demarc, the service provider's network ends and the customer's internal wiring begins. It is typically marked by a physical device or connection point where the service provider's line terminates and the customer's equipment is connected.

Submit
Please wait...
About This Quiz
Network+ (N10-004) Quiz F - Quiz

Network+ (N10-004) quiz F assesses knowledge on network configurations, troubleshooting, and standards. It covers DNS server identification, newsfeed port configurations, and wireless standards, crucial for IT professionals aiming to certify in network management.

Personalize your quiz and earn a certificate with your name on it!
2. QUESTION NO: 298 Which of the following logical topologies uses centralized authentication?

Explanation

The client/server logical topology uses centralized authentication. In a client/server network, there is a central server that manages and controls access to resources. The server authenticates users and grants them access based on their credentials. This centralized authentication ensures that only authorized users can access the network resources, providing a higher level of security and control. In contrast, peer-to-peer, VPN, and VLAN topologies do not necessarily have centralized authentication mechanisms.

Submit
3. QUESTION NO: 278 Which of the following tools are needed to create a CAT5e crossover cable?(Select TWO).

Explanation

To create a CAT5e crossover cable, you would need snips and a cable crimper. Snips are necessary to cut the CAT5e cable to the desired length, while a cable crimper is required to attach the RJ-45 connectors to the cable ends. TDR (Time Domain Reflectometer), multimeter, and OTDR (Optical Time Domain Reflectometer) are not needed for creating a crossover cable.

Submit
4. QUESTION NO: 297 The network amninistrator needs to use an IP addressing method that will not require manual updating. Which of the following should be used?

Explanation

Dynamic IP addressing should be used by the network administrator because it does not require manual updating. With dynamic addressing, IP addresses are automatically assigned to devices on the network by a DHCP (Dynamic Host Configuration Protocol) server. This allows for easier management and scalability as devices can be added or removed from the network without the need for manual configuration.

Submit
5. QUESTION NO: 266 A technician needs to connect a laptop via the small office, home office (SOHO)wireless access point. When the technician does a site survey using the laptop the wireless network is not discovered. Computers previously on the wireless network were connected, and the wireless card appears to be working. Which of the following could be causing the issue?

Explanation

The reason for the issue could be that the SSID (Service Set Identifier) is set to not broadcast. This means that the wireless network's name is hidden and not visible during a site survey. Even though the wireless card on the laptop is working, it cannot detect the network because it is not broadcasting its SSID.

Submit
6. QUESTION NO: 259 Which of the following is a utility that translates the physical network address to its IP address?

Explanation

RARP (Reverse Address Resolution Protocol) is a utility that translates the physical network address to its IP address. It is used to find the IP address of a device when only the physical address (MAC address) is known. RARP is the opposite of ARP (Address Resolution Protocol), which translates IP addresses to physical addresses. Therefore, the correct answer is RARP.

Submit
7. QUESTION NO: 265 Which of the following tools can send a signal down a cable and measure how long it takes to comeback?

Explanation

A Time Domain Reflectometer (TDR) is a tool that can send a signal down a cable and measure how long it takes to come back. This is done by sending an electrical pulse down the cable and analyzing the reflections that occur when the pulse encounters impedance mismatches or faults in the cable. By measuring the time it takes for the reflections to return, the TDR can determine the length of the cable and locate any faults or discontinuities.

Submit
8. QUESTION NO: 282 Which of the following cable types are the MOST widely used in a corporate gigabit network scheme?

Explanation

CAT6 cables are the most widely used in a corporate gigabit network scheme because they offer higher bandwidth and faster data transmission speeds compared to CAT5, CAT1, and CAT3 cables. CAT6 cables are designed to support gigabit Ethernet and can handle higher frequencies, resulting in better performance and less signal loss. They are also backward compatible with previous cable types, making them a popular choice for upgrading existing network infrastructure.

Submit
9. QUESTION NO: 262 Which of the following frequency ranges does 802.11a operate at?

Explanation

802.11a operates at the frequency range of 5GHz. This frequency range allows for faster data transmission and reduces interference from other devices that operate on the 2.4GHz frequency range, such as cordless phones and microwaves. The higher frequency also allows for more channels to be available, which increases the overall capacity and performance of the wireless network.

Submit
10. QUESTION NO: 289 At which of the following layers of the OSI model would a repeater operate?

Explanation

A repeater operates at Layer 1 of the OSI model, which is the Physical layer. The Physical layer is responsible for transmitting raw bit streams over a physical medium, such as copper or fiber optic cables. A repeater receives a weak or degraded signal and regenerates it to boost the signal strength and extend the distance over which the signal can be transmitted. Therefore, a repeater operates at the lowest layer of the OSI model, which deals with the physical transmission of data.

Submit
11. QUESTION NO: 286 Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?

Explanation

Enabling MAC address filtering on a switch can be used to mitigate the security threat of rogue access points. MAC address filtering allows the switch to only allow specific devices with approved MAC addresses to connect to the network. By implementing this security measure, unauthorized devices, such as rogue access points, will be prevented from connecting to the network, reducing the risk of unauthorized access and potential security breaches.

Submit
12. QUESTION NO: 277 Which of the following network devices would a network administrator use to create a DMZ?

Explanation

A network administrator would use a network-based firewall to create a DMZ. A DMZ (demilitarized zone) is a separate network that sits between the internal network and the external network (usually the internet). It is used to host public-facing services, such as web servers, while keeping them isolated from the internal network for security purposes. A network-based firewall is specifically designed to filter and control network traffic, making it an ideal choice for creating and securing a DMZ.

Submit
13. QUESTION NO: 257 Which of the following is the recommended maximum distance CAT6 cable should be run?

Explanation

The recommended maximum distance that CAT6 cable should be run is 328 feet (100 meters). This is because CAT6 cable is designed to support higher bandwidth and faster data transmission compared to previous versions of Ethernet cable. Beyond this recommended distance, there may be a decrease in signal quality and potential for data loss or interference. Therefore, it is important to adhere to this maximum distance guideline to ensure optimal performance of the CAT6 cable.

Submit
14. QUESTION NO: 293 .Which of the following software types would BEST be used at identifying and reacting to an attack by shutting down a port or dropping certain types of packets?

Explanation

An Intrusion Prevention System (IPS) would be the best software type for identifying and reacting to an attack by shutting down a port or dropping certain types of packets. IPS is designed to monitor network traffic, detect potential threats or attacks, and take proactive measures to prevent them. It can analyze network packets in real-time, identify malicious activity, and respond by blocking or dropping the suspicious packets or closing the affected ports. This helps to protect the network and prevent further damage or unauthorized access.

Submit
15. QUESTION NO: 252 A company would like to configure newsfeeds on the network for employees to be aware of internal company information. Which of the following ports would be used to allow news feeds to pass-through?

Explanation

Port 119 is the correct answer because it is the standard port used for Network News Transfer Protocol (NNTP), which is commonly used for news feeds. This port allows news articles and updates to be transmitted and received by clients, such as newsreader applications, allowing employees to stay informed about internal company information. Ports 25, 22, and 143 are used for other purposes such as email (SMTP), SSH (Secure Shell), and IMAP (Internet Message Access Protocol), respectively, and are not specifically designed for news feeds.

Submit
16. QUESTION NO: 279 A technician received a call from a remote user who is having issues connecting to a new VPN. Which of the following is the FIRST step the technician should take?

Explanation

The technician should first identify the symptoms and potential causes of the issue. This step is important in order to understand the root cause of the problem and determine the appropriate solution. By identifying the symptoms, the technician can gather information about the specific issues the user is facing. Then, by exploring potential causes, the technician can narrow down the possible reasons for the problem and develop an effective troubleshooting plan.

Submit
17. QUESTION NO: 256 Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?

Explanation

The correct answer is 802.11a. This standard has a maximum bandwidth of 54Mbps and operates at 5GHz. 802.11g has a maximum bandwidth of 54Mbps but operates at 2.4GHz. 802.11b has a maximum bandwidth of 11Mbps and also operates at 2.4GHz. 802.11 is a general term that encompasses all the different IEEE standards for wireless networking.

Submit
18. QUESTION NO: 273 Routing convergence time is which of the following?

Explanation

The correct answer is "Time required by protocols to update their forwarding tables after changes have occurred." Routing convergence time refers to the time it takes for routing protocols to update their forwarding tables after changes have occurred in the network. This includes updating routes, calculating new paths, and redistributing this information to other routers in the network. It is an important factor in network performance and can affect the overall efficiency and stability of the network.

Submit
19. QUESTION NO: 264 Which of the following features of a switch will allow two switches to pass network infonnation?

Explanation

Trunking is a feature of a switch that allows two switches to pass network information. Trunking is used to combine multiple network connections into a single logical connection, which increases bandwidth and efficiency. It allows for the transmission of multiple VLANs (Virtual Local Area Networks) over a single physical link, enabling switches to exchange network information and communicate with each other effectively. Disabling routing protocols, port speeds, and PoE (Power over Ethernet) are not directly related to the ability of switches to pass network information.

Submit
20. QUESTION NO: 274 A new business with five computers moves into an office where coaxial cable exists. In order to use the existing infrastucture, which of the following topologies would be used?

Explanation

In order to use the existing coaxial cable infrastructure, the most suitable topology would be the Bus topology. In a Bus topology, all devices are connected to a single cable, which acts as a shared communication medium. Each device can transmit data onto the cable, and all other devices on the network can receive that data. This topology is cost-effective and easy to install, making it a good choice for a small business with existing coaxial cable infrastructure.

Submit
21. QUESTION NO: 291 A technician is troubleshooting a printer problem in a SOHO enviromnent. The printer is connected to the network and the computers can print using TCP/IP directly. The computers were able to print the day before, but now they cannot. Which of the following setups would aid in preventing this problem?

Explanation

Placing the printer on a static IP address would prevent the problem of the computers being unable to print. By assigning a static IP address to the printer, it ensures that the IP address does not change, allowing the computers to consistently connect to the printer. This is especially important in a SOHO environment where there may not be a dedicated network administrator to manage IP address assignments.

Submit
22. QUESTION NO: 294 A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?

Explanation

The correct answer is "The user is connecting to the wrong SSID." This is the cause of the problem because if the user is connecting to the wrong SSID, they will be accessing a different wireless network than intended. This can result in slower network speeds and accessing shared folders that are unknown to the user, as they are connecting to a different network with different settings and permissions.

Submit
23. QUESTION NO: 299 Which of the following command and switch combination would provide the following output? Interface: 172.30.0.102 --- Ox2 Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic

Explanation

The command "arp-a" is used to display the ARP (Address Resolution Protocol) cache table on a Windows system. It provides the output of the interface with the IP address 172.30.0.102 and its corresponding physical address (MAC address) 00-30-48-82-72-8c. This command is used to view the mapping between IP addresses and MAC addresses in the local network.

Submit
24. QUESTION NO: 268 A company has installed a new 802.11g point-to-point connection between two buildings and is experiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omni-directional antenna. Which of the following would BEST improve the link perfonnance?

Explanation

Replacing the omni-directional antennas with Yagi antennas would be the best solution to improve the link performance. Yagi antennas are directional antennas that focus the signal in a specific direction, allowing for a stronger and more focused connection between the two buildings. This would help to reduce interference and increase the throughput across the link.

Submit
25. QUESTION NO: 254 Which of the following commands would allow the technician to identify the currently assigned DNS server?

Explanation

The nslookup command is used to query DNS servers and retrieve information about domain names, including the currently assigned DNS server. It allows the technician to identify the IP address of the DNS server that is currently being used for DNS resolution. This information can be helpful in troubleshooting network connectivity or DNS-related issues.

Submit
26. QUESTION NO: 271 A network using RIP has taken several minutes to begin routing traffic around a failed piece of equipment. Which of the following could be implemented to improve convergence time?

Explanation

Replacing RIP with a link-state routing protocol such as OSPF would improve convergence time in the network. Link-state routing protocols use a more efficient and accurate method of exchanging routing information, which allows them to quickly adapt to changes in the network topology. This means that when a piece of equipment fails, OSPF would be able to identify the failure and reroute traffic much faster than RIP.

Submit
27. QUESTION NO: 267 A technician has determined that a single computer has suddenly lost network connectivity. Which of the following should be the next troubleshooting step the technician should take?

Explanation

The next troubleshooting step the technician should take is to determine if anything has changed. This is because sudden loss of network connectivity can often be attributed to recent changes in the computer's configuration or network settings. By identifying any recent changes, the technician can narrow down the potential causes of the issue and focus their troubleshooting efforts more effectively.

Submit
28. QUESTION NO: 290 Which of the following documentations would a network technician find ports that a company has blocked?

Explanation

A network technician would find the ports that a company has blocked in the policies, procedures, and configurations documentation. This documentation provides information on the rules and restrictions set by the company regarding network access and security. It includes details on which ports are blocked or restricted to ensure the network's integrity and protect against potential threats.

Submit
29. QUESTION NO: 292 Which of the following systems detects and reports attempts of unauthorized access to the network?

Explanation

An Intrusion Detection System (IDS) is a system that detects and reports attempts of unauthorized access to a network. It monitors network traffic and analyzes it for any suspicious or malicious activity. Unlike a firewall, which primarily focuses on blocking or allowing network traffic based on predefined rules, an IDS is designed to detect and alert administrators about potential security breaches. An IDS can help identify and respond to unauthorized access attempts, providing an additional layer of security to the network.

Submit
30. QUESTION NO: 269 A users workstation is able to resolve IP addresses of any host, and can ping other workstations on the local subnet, but is unable to ping addresses on other subnets. Which of the following is the MOST likely cause of the problem?

Explanation

The most likely cause of the problem is that the workstation is configured with the incorrect default gateway. The default gateway is the IP address of the router that connects the local subnet to other subnets. If the workstation has the wrong default gateway configured, it will not be able to send packets to other subnets, resulting in the inability to ping addresses on other subnets.

Submit
31. QUESTION NO: 270 The 66 block termination point is:

Explanation

The 66 block termination point is CAT3 compliant. This means that it is designed to handle and support CAT3 cables, which are commonly used for voice and data transmission in telecommunications and networking applications. CAT3 cables have a maximum data transfer rate of 10 Mbps and are suitable for applications such as telephone systems and Ethernet networks.

Submit
32. QUESTION NO: 258 A user calls saying they are having issues connecting to the Intenet, but they are able to connect to the email server. Which of the following commands would the user type in at the command prompt to display the MAC address?

Explanation

The correct answer is "arp-a". The "arp-a" command is used to display the ARP (Address Resolution Protocol) cache, which contains the mappings of IP addresses to MAC addresses. By using this command, the user can verify if their device has the correct MAC address for the default gateway or any other network device. This can help troubleshoot connectivity issues by ensuring that the device is communicating with the correct network devices.

Submit
33. QUESTION NO: 272 Which of the following devices is used to connect a WAN to a LAN?

Explanation

A basic router is used to connect a wide area network (WAN) to a local area network (LAN). Routers are networking devices that forward data packets between networks, allowing devices on different networks to communicate with each other. In this case, the basic router would be used to connect the LAN to the WAN, enabling devices on the LAN to access the resources and services available on the WAN.

Submit
34. QUESTION NO: 288 Which of the following is an advantage of  lOOBase-FX over IOOBase-TX?

Explanation

lOOBase-FX has an advantage over lOOBase-TX in terms of longer cable runs. This means that lOOBase-FX can transmit data over a greater distance compared to lOOBase-TX.

Submit
35. QUESTION NO: 287 Which of the following mechanisms is used to calculate back-off time on an Ethernet link after a collision?

Explanation

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is the correct answer. This mechanism is used in Ethernet networks to avoid collisions between data packets. When a collision occurs, CSMA/CD initiates a back-off time, during which the devices involved in the collision wait before attempting to retransmit their packets. This back-off time is calculated using a random algorithm to prevent repeated collisions. CSMA/CD is an important component of Ethernet networks, ensuring efficient and reliable data transmission.

Submit
36. QUESTION NO: 300 A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?

Explanation

A second network card in a server that activates if the primary card fails is an example of fault tolerance. Fault tolerance refers to the ability of a system to continue functioning even in the presence of hardware or software failures. In this case, having a second network card ensures that the server can maintain network connectivity even if the primary card fails, thus providing fault tolerance.

Submit
37. QUESTION NO: 260 Which of the following cable standards has the highest effective range at a greater expense?

Explanation

IOOOBase-LX is the correct answer because it has the highest effective range compared to the other cable standards mentioned. It is a fiber optic cable standard that can transmit data up to 10 kilometers, whereas the other cable standards have shorter ranges. However, IOOOBase-LX is more expensive than the other options, making it a trade-off between cost and range.

Submit
38. QUESTION NO: 281 Which of the following is an advantage of  lOOBase-T over lOOBase-FX?

Explanation

The advantage of using a more flexible cable in lOOBase-T over lOOBase-FX is that it allows for easier installation and flexibility in network design. The more flexible cable used in lOOBase-T, such as twisted pair cables, can be easily routed and maneuvered around obstacles, making it more convenient for network setups in various environments. On the other hand, lOOBase-FX uses fiber optic cables which are less flexible and may require more careful planning and installation.

Submit
39. QUESTION NO: 296 A new virus was just released and has infected several workstations. A technician receives a newly released patch. Which of the following troubleshooting steps should the technician take FIRST?

Explanation

The technician should first implement an action plan. This is the first step because it allows the technician to assess the situation, prioritize tasks, and create a plan of action to address the virus infection. By implementing an action plan, the technician can ensure that the necessary steps are taken in a systematic and organized manner to effectively mitigate the impact of the virus on the workstations.

Submit
40. QUESTION NO: 276 Which of the following protocols are used to transfer files between two systems?(Select TWO).

Explanation

The correct answer is SCP and FTP. SCP (Secure Copy Protocol) is a network protocol that allows secure file transfer between hosts. It uses SSH (Secure Shell) for authentication and encryption. FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It provides a reliable and efficient way to transfer files and supports various operations such as uploading, downloading, and deleting files.

Submit
41. QUESTION NO: 283 Which of the following LAN types would utilize CAT5 UTP?

Explanation

CAT5 UTP (Unshielded Twisted Pair) is a type of Ethernet cable that is commonly used for LAN (Local Area Network) connections. It is capable of supporting data transfer speeds of up to 100 Mbps (megabits per second). Among the given LAN types, 100Base-TX is the only one that would utilize CAT5 UTP. 100Base-TX is a standard for Fast Ethernet, which uses two pairs of twisted-pair wires for transmitting and receiving data. Therefore, the correct answer is 100Base-TX.

Submit
42. QUESTION NO: 295 Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment?

Explanation

T3 is the correct answer because it provides a 45Mbps circuit over TDM (Time Division Multiplexing) equipment. T3 is a high-speed digital transmission line that uses DS3 (Digital Signal 3) technology to achieve this speed. SONET, E3, and OC-12 are not capable of providing a 45Mbps circuit over TDM equipment.

Submit
43. QUESTION NO: 253 A technician needs to change locations of a telephone between 66 blocks. Which of the following tools would be used in locating the positions in the cross connections?

Explanation

A toner probe is used to locate the positions in the cross connections between 66 blocks. It is a tool that consists of a tone generator and a probe. The tone generator is connected to the telephone line at one end, and the probe is used to trace the tone on the other end. By using the toner probe, the technician can identify the specific cross connection point on the 66 block where the telephone is located.

Submit
44. QUESTION NO: 280 A technician installed a new wireless router. The customer is now having a problem playing online games, but they can connect to websites. Which of the following should the technician configure to resolve this problem?

Explanation

To resolve the customer's problem with playing online games, the technician should configure port forwarding. Port forwarding allows specific ports or protocols to be directed to a specific device on the network, in this case, the customer's gaming console or computer. By configuring port forwarding, the technician can ensure that the necessary ports for online gaming are open and properly directed to the customer's device, allowing them to play games without any issues.

Submit
45. QUESTION NO: 255 Two ports on switch A are connected to switch B. The advanced switch feature that allows these ports to be combined and managed as a single entity is called:

Explanation

Trunking is the advanced switch feature that allows two ports on switch A to be combined and managed as a single entity. Trunking enables the transmission of multiple VLANs over a single physical link, increasing network efficiency and reducing the number of required physical connections. This feature is commonly used in larger networks where there is a need to consolidate and manage multiple connections between switches.

Submit
46. QUESTION NO: 275 A company is in the process of upgrading their network infrastructure to support new VoIP telephony equipment. Which of the following is a primary feature to consider when selecting a new switch to support the phones?

Explanation

When selecting a new switch to support VoIP telephony equipment, a primary feature to consider is Power over Ethernet (PoE). PoE allows the switch to provide power to the VoIP phones through the Ethernet cables, eliminating the need for separate power cables and adapters. This simplifies installation and reduces clutter. Without PoE, the phones would require an additional power source, which can be inconvenient and may limit the placement options for the phones. Therefore, PoE is an important feature to ensure the smooth operation of the VoIP telephony system.

Submit
47. QUESTION NO: 285 Which of the following devices would be used to connect different broadcast domains in order to allow them to communicate with each other?

Explanation

A multilayer switch would be used to connect different broadcast domains and allow them to communicate with each other. Unlike a bridge or a layer 2 switch, which operate at the data link layer and can only forward packets within the same broadcast domain, a multilayer switch operates at both the data link layer and the network layer. This means that it can not only forward packets within a broadcast domain but also route packets between different broadcast domains, enabling communication between them. A hub, on the other hand, simply broadcasts all incoming packets to all connected devices without any intelligence or segmentation.

Submit
48. QUESTION NO: 261 Which of the following technologies is BEST suited for a point-to-point circuit that is 6 kilometers (3 .7 miles) in distance?

Explanation

The best technology suited for a point-to-point circuit that is 6 kilometers in distance is lOGBase-LR. This technology is designed for long-range connections, making it suitable for the given distance. lOGBase-T is for short-range connections, lOGBase-ER is for extended-range connections, and lOGBase-SR is for short-range connections over fiber optics.

Submit
49. QUESTION NO: 263 Which of the following protocols provides the actual encryption used over VPN?

Explanation

PPTP (Point-to-Point Tunneling Protocol) is the correct answer because it provides the actual encryption used over VPN. PPTP creates a secure tunnel between the client and the server, encrypting the data that is transmitted over the VPN connection. PPP (Point-to-Point Protocol) is a data link protocol but does not provide encryption. HTTPS (Hypertext Transfer Protocol Secure) is a protocol used for secure communication over a network, but it is not specific to VPN encryption. SSH (Secure Shell) is a cryptographic network protocol used for secure remote access, but it is not specific to VPN encryption.

Submit
50. QUESTION NO: 284 A network administrator configured several network devices earlier today, but now the Internet is no longer available to several users. Which of the following logs should the network administrator reference to help identify the problem?

Explanation

The network administrator should reference the history logs to help identify the problem. History logs provide a record of past events and actions taken on the network devices. By reviewing the history logs, the administrator can determine if any recent changes or configurations may have caused the loss of internet connectivity for the users. This can help in troubleshooting and resolving the issue effectively.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 14, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 14, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 24, 2010
    Quiz Created by
    Rich70
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
QUESTION NO: 251 ...
QUESTION NO: 298 ...
QUESTION NO: 278 ...
QUESTION NO: 297 ...
QUESTION NO: 266 ...
QUESTION NO: 259 ...
QUESTION NO: 265 ...
QUESTION NO: 282 ...
QUESTION NO: 262 ...
QUESTION NO: 289 ...
QUESTION NO: 286 ...
QUESTION NO: 277 ...
QUESTION NO: 257 ...
QUESTION NO: 293 ...
QUESTION NO: 252 ...
QUESTION NO: 279 ...
QUESTION NO: 256 ...
QUESTION NO: 273 ...
QUESTION NO: 264 ...
QUESTION NO: 274 ...
QUESTION NO: 291 ...
QUESTION NO: 294 ...
QUESTION NO: 299 ...
QUESTION NO: 268 ...
QUESTION NO: 254 ...
QUESTION NO: 271 ...
QUESTION NO: 267 ...
QUESTION NO: 290 ...
QUESTION NO: 292 ...
QUESTION NO: 269 ...
QUESTION NO: 270 The 66 block termination point is:
QUESTION NO: 258 ...
QUESTION NO: 272 ...
QUESTION NO: 288 ...
QUESTION NO: 287 ...
QUESTION NO: 300 ...
QUESTION NO: 260 ...
QUESTION NO: 281 ...
QUESTION NO: 296 ...
QUESTION NO: 276 ...
QUESTION NO: 283 ...
QUESTION NO: 295 ...
QUESTION NO: 253 ...
QUESTION NO: 280 ...
QUESTION NO: 255 ...
QUESTION NO: 275 ...
QUESTION NO: 285 ...
QUESTION NO: 261 ...
QUESTION NO: 263 ...
QUESTION NO: 284 ...
Alert!

Advertisement