Intro To Networking Midterm Exam Prep

106 Questions | Total Attempts: 159

SettingsSettingsSettings
Please wait...
Intro To Networking Midterm Exam Prep

Networking


Questions and Answers
  • 1. 
    When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?
    • A. 

      PCs will attempt to use the last address assigned to them.

    • B. 

      PCs will pull from a static address pool.

    • C. 

      PCs will use APIPA

    • D. 

      PCs will prompt the user for an address

  • 2. 
    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?
    • A. 

      Coaxial

    • B. 

      CAT3

    • C. 

      CAT3

    • D. 

      CAT5e

  • 3. 
    What information can the Netstat command line utility provide?
    • A. 

      Verify local and remote connectivity

    • B. 

      Identifies all the routers between your system and a remote destination system

    • C. 

      Displays all IP address configuration information

    • D. 

      Displays all open connections along with protocols and ports used

  • 4. 
    Other than segmentation what other service do both TCP and UDP provide for the upper layer protocols?
    • A. 

      Acknowledgements of received segments

    • B. 

      Establish sessions

    • C. 

      Provide connectionless service

    • D. 

      Provide service addressing

    • E. 

      All of the above

  • 5. 
    Where can a client system get an IP address and the associated information from? (choose 2)
    • A. 

      DHCP server

    • B. 

      DNS server

    • C. 

      Network Administrator

    • D. 

      Windows Domain Controller

    • E. 

      IEEE OUI corporate assignment

  • 6. 
    Which of the following remote access methods allows an administrator to take control of a user's machine and block the user from seeing the active session?
    • A. 

      PPP

    • B. 

      PPPoE

    • C. 

      RDP

    • D. 

      RAS

  • 7. 
    L2TP and PPTP are protocols associated with what service?
    • A. 

      Web

    • B. 

      Email

    • C. 

      File transfer

    • D. 

      VPN

  • 8. 
    Which secure command line utility is used for remote management of a cisco router or switch?
    • A. 

      Telnet

    • B. 

      SSH

    • C. 

      RDP

    • D. 

      CISC

  • 9. 
    What protocol does Microsoft clients employ for file transfers?
    • A. 

      SFTP

    • B. 

      SMB

    • C. 

      TFTP

    • D. 

      RDP

  • 10. 
    The PDU created at the Internet layer of the TCP/IP 4 layer model is called ___________________.
    • A. 

      Data

    • B. 

      A segment

    • C. 

      A packet

    • D. 

      A frame

  • 11. 
    At what layer does the TCP/IP protocol stack define the most protocols?
    • A. 

      Application

    • B. 

      Transport

    • C. 

      Internet

    • D. 

      Network Interface

  • 12. 
    What command will display your cache of IP to MAC address name resolutions?
    • A. 

      Arp -a

    • B. 

      Route print

    • C. 

      Ipconfig /all

    • D. 

      Ping /?

  • 13. 
    Given the following configuration information: IP address: 150.150.150.38 subnet mask: 255.255.255.0 default gateway: 150.150.150.1 DNS server: 150.150.150.10 Which of the following would you ping to verify that the DNS server was functioning normally?
    • A. 

      Ping 255.255.255.0

    • B. 

      Ping 150.150.150.10

    • C. 

      Ping 127.0.0.1

    • D. 

      Ping www.google.ca

  • 14. 
    What IP helper protocol is used by both the Ping and Tracert utilities to perform their jobs?
    • A. 

      ARP

    • B. 

      DNS

    • C. 

      ICMP

    • D. 

      UDP

  • 15. 
    What type of address is the following? 169.254.73.244 255.255.0.0
    • A. 

      Public class B

    • B. 

      IEEE OUI

    • C. 

      Multicast

    • D. 

      APIPA

  • 16. 
    Which three of the following protocols are associated with email? (choose 3)
    • A. 

      SNMP

    • B. 

      HTTPS

    • C. 

      NTP

    • D. 

      SMTP

    • E. 

      POP3

    • F. 

      IMAP4

  • 17. 
    Which of the following is a key rule concerning subnet masks?
    • A. 

      The default is 255.0.0.0

    • B. 

      The binary 1’s must all be together at the end of the address

    • C. 

      The binary 0’ must all be together at the end of the address

    • D. 

      The most significant bit must be 1 for all subnet masks

  • 18. 
    What does the tracert utility mostly help with?
    • A. 

      Troubleshooting ICMP errors

    • B. 

      Troubleshooting ARP broadcasting

    • C. 

      Troubleshooting routers

    • D. 

      Troubleshooting name resolution

  • 19. 
    Which of the following devices separates a LAN segment into two collision domains, without affecting the broadcast domain?
    • A. 

      Firewall

    • B. 

      Bridge

    • C. 

      Repeater

    • D. 

      Router

  • 20. 
    Looking at the following address, identify what class address it is: 126.128.255.99 255.255.255.0
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

  • 21. 
    What is required to make sense of an IP address or to make it useful?
    • A. 

      A MAC address

    • B. 

      A DHCP server

    • C. 

      A DNS server

    • D. 

      A subnet mask

  • 22. 
    How many bits is an IPv4 address?
    • A. 

      8

    • B. 

      32

    • C. 

      64

    • D. 

      128

  • 23. 
    It’s impossible for a system to communicate directly with a destination system that is on a different network. How can systems on different networks share information?
    • A. 

      They work through the DNS server

    • B. 

      They do it through a Microsoft/Unix/Linux network servers

    • C. 

      They do it through their default gateways (local routers)

    • D. 

      They are able to communicate directly using IP addresses instead of MAC addresses

  • 24. 
    What does a system need before they can communicate directly with another system on the same network?
    • A. 

      System name

    • B. 

      The destination system subnet mask

    • C. 

      DNS server IP

    • D. 

      Destination MAC address

  • 25. 
    Logical addressing today is pretty much exclusively represented by ___________________.
    • A. 

      MAC address

    • B. 

      IP address

    • C. 

      HTTP address

    • D. 

      ARP address

Back to Top Back to top