1.
You've had your computer for a while, and you begin to notice changes. They were small @ first; a different desktop pic, some peach fuzz on the monitor, colored text on your word documents, a deeper voice tells you “you've got mail”. Suddenly your baby fresh pc has changed into a punked out teenager. You suspect outside influence. What utility can you run to see if someone is connected (via tcp/ip) to your pc?
A. 
B. 
C. 
D. 
E. 
2.
You run winipcfg on your XP OS. What happens?
A. 
B. 
C. 
Sasquatch comes to pay u a visit.
D. 
You see a list of all current TCP/IP network configuration values.
E. 
You see how many hops the packet requires to reach the host and how long each hop takes.
3.
Nestat -r command does what?
A. 
Displays the routing table, plus the current active connections.
B. 
Displays detailed network traffic statistics for IP, IPV6, ICMP, ICMPV6, TCP, TCPV6, UDP, UDPV6. The -p option may be used to spcify a subset of the default.
C. 
Tells netstat to show u the status of all open sockets.
D. 
Gives a quick view of how ur system is resolving and registering names
E. 
Used to release + refresh NETBIOS names on resource servers in WINS database.
4.
What command Displays a list of the computer's currently active NETBIOS settings(identifying remote computers by name), their current status, and the amount of data transmitted to and received from each system?
A. 
B. 
C. 
D. 
E. 
5.
You are a network guy for a medium sized buisness. Your boss has octuplets, and decides to dump them on you one day when the nanny calls in sick; your boss just thinks you play on the internet all day and wants to get their money's worth. The 8 babies r swinging from the hanging lamps, chewing cables, throwing poop @ monitors; it's a mad house. You finally manage to corral them all into a baby safe environment(the closet) and begin cleaning up the mess. Your boss comes back from lunch and demands to know what happened to the internet. What command will tell you where there is a loose connection?
A. 
B. 
C. 
D. 
E. 
6.
What port does RDP(remote desktop protocol) use?
A. 
B. 
C. 
D. 
E. 
7.
____# designates the # assigned to the 1st Byte of data in the current message. Used to identify the initial _____# thats gonna be used in the upcoming data transfer.
A. 
B. 
C. 
D. 
E. 
8.
You need to send an e-valentine to your half sister in Utah. It's been uncomfortable because you hooked up the last time you saw her. You don't want to give your half sister the wrong impression, but you don't wanna let on to your mother that the relationship has gone beyond “i'll show you mine if you show me yours”. You want to use something that might fail, but at least shows that you made the effort. What protocol is NOT guaranteed to get the message there?
A. 
B. 
C. 
D. 
E. 
9.
What is the IRQ# for the keyboard?
A. 
B. 
C. 
D. 
E. 
10.
What is the IRQ# for the math co-processor?
A. 
B. 
C. 
D. 
E. 
11.
Your mother calls you every morning for a month to tell u that it's a bad idea to start your own business; what with the econonmy the way it is. But you decide to anyway, cuz you just can't live in her basement anymore. And since you've begun a daily coffee clatch, a Java Hut sounds right up your alley. Of course all your buddies can't hang out without the internet, what would they do all day, talk to each other? No no no, you need the internet; but you're concerned that all your equipment will be on the same frequency as your WLAN. What IEEE standard will this not be a problem for?
A. 
B. 
C. 
D. 
12.
You live on a hundred acres of property. You want to build a shed 400 meters away from the house, so you can watch porno in peace; and you don't want your wife to know. What kind of cable can you use that will have a max of 100Mbps?
A. 
B. 
C. 
D. 
13.
The first 6 hexadecimal digits from a mac address come from ________
14.
You've been receiving weird emails; something about somone sniffing your old shoes. You track down the IP address, but the shoe sniffer has been using an internet cafe to masquerade his identity. What protocol is capable of this?
A. 
B. 
C. 
D. 
15.
______Encrypts data btwn web browsers and web servers, also uses public key infrastructure(PKI)
A. 
B. 
C. 
D. 
E. 
16.
SLIP offers link configuration, testing, error detection, and compression.
17.
Everyday around lunch (at work) your wireless goes out on your laptop. you know it's because Suzy from accounting insists on using her old microwave for an hour everyday! You've tried explaining it to her nicely, that it's knocking everyone (who uses wireless) off the internet, but she doesn't believe you, and you don't have the power to make her stop. what tool could you use to prove to her boss that her microwave is causing problems for the office?
A. 
B. 
C. 
D. 
18.
_____is a link state routing protocol and NOT usually used in large enterprise networks
A. 
B. 
C. 
D. 
E. 
19.
________is a transparent public key encryption technology that works in conjunction with NTFS permissions to grant and deny users access to files and folders in Windows NT (excluding NT4), 2000 and XP (excluding XP Home Edition) operating systems.
A. 
B. 
C. 
D. 
E. 
20.
What kind of connector is this?
A. 
B. 
Sc twisted pair connector
C. 
D. 
E. 
21.
Which protocol works w/ping and tracert; and is used for error reporting, error control, and info packets for IP protocol/IP maintenance traffic.
A. 
B. 
C. 
D. 
E. 
22.
In an inebriated haze of misjudgment, you allowed some very naughty pictures to be taken of you; with a donkey...and cheetos...at the washington monument. anyway, u need to retrieve them from a unix computer( you have a windows pc) before they are uploaded to the internet for your whole family to see; yes even granma can use the internet. will SAMBA, using SMB, allow you to delete these files from the UNIX directory, or will you forever hold your head in shame?
A. 
B. 
C. 
Please let this be a bad dream
23.
What Is an open standard for authenticating users who r dialing up to a network and provides verification.
A. 
B. 
C. 
D. 
E. 
24.
What allows an organization to present itself to the Internet with far fewer IP addresses than there are nodes on its internal network. (choose all that apply)
A. 
B. 
C. 
D. 
E. 
25.
What exposes properties from both circuit switched and small packet switched networking?
A. 
B. 
C. 
D. 
E.