100
1. How many digits of the DNIC (Data Network Identification Code) identify the country? A. first three B. first four C. first five D. first six E. None of the above 2. A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? A. hot potato routing B. flooding C. static routing D. delta routing E. None of the above 3. The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to A. 0.003 B. 0.009 C. 0.991 D. 0.999 E. None of the above 4. Frames from one LAN can be transmitted to another LAN via the device A. Router B. Bridge C. Repeater D. Modem 5. Which of the following condition is used to transmit two packets over a medium at the same time? A. Contention B. Collision C. Synchronous

Cauhoitracnghiemncc (Autosaved)

Embed Size (px)

Citation preview

Page 1: Cauhoitracnghiemncc (Autosaved)

1. How many digits of the DNIC (Data Network Identification Code) identify the country?

A. first three

B. first four

C. first five

D. first six

E. None of the above

2. A station in a network forwards incoming packets by placing them on its shortest output queue.

What routing algorithm is being used?

A. hot potato routing

B. flooding

C. static routing

D. delta routing

E. None of the above

3. The probability that a single bit will be in error on a typical public telephone line using 4800 bps

modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for

a communication line using 9-bit frames is approximately equal to

A. 0.003

B. 0.009

C. 0.991

D. 0.999

E. None of the above

4. Frames from one LAN can be transmitted to another LAN via the device

A. Router B. Bridge

C. Repeater D. Modem

5. Which of the following condition is used to transmit two packets over a medium at the same time?

A. Contention

B. Collision

C. Synchronous

Page 2: Cauhoitracnghiemncc (Autosaved)

D. Asynchronous

E. None of the above

6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new

subnets very soon. You would like to still allow for the largest possible number of host IDs per

subnet. Which subnet mask should you assign?

A. 255.240.0.0 B. 255.248.0.0

C. 255.252.0.0 D. 255.254.0.0

E. 255.255.255.255

7. What are the most commonly used transmission speeds in BPS used in data communication?

A. 300

B. 1200

C. 2400

D. 9600

E. None of the above

8. What is the default subnet mask for a class C network?

A. 127.0.0.1

B. 255.0.0.0

C. 255.255.0.0

D. 255.255.255.0

E. None of the above

9. Which of the following is used for modulation and demodulation?

A. modem

B. protocols

C. gateway

D. multiplexer

E. None of the above

10. Which of the following is not a disadvantage of wireless LAN?

A. Slower data transmission

Page 3: Cauhoitracnghiemncc (Autosaved)

B. higher error rate

C. interference of transmissions from different computers

D. All of the above

11. The Internet Control Message Protocol (ICMP)

A. allows gateways to send error a control messages to other gateways or hosts

B.

provides communication between the Internet Protocol Software on one machine and

the Internet Protocol Software on another

C.

reports error conditions to the original source, the source must relate errors to

individual application programs and take action to correct the problem

D. All of the above

E. None of the above

12. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing

plant in the suburbs. To enable everyone to share data and resources between the two LANs,

what type of device(s) are needed to connect them? Choose the most correct answer.

A. Modem B. Cable

C. Hub D. Router

13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming

message to the sender. In full duplex data transmission, both the sender and the receiver

A. cannot talk at once

B. can receive and send data simultaneously

C. can send or receive data one at a time

D. can do one way data transmission only

E. None of the above

14. How many hosts are attached to each of the local area networks at your site?

A. 128

B. 254

C. 256

D. 64

E. None of the above

15. Which of the following technique is used for fragment?

A. a technique used in best-effort delivery systems to avoid endlessly looping packets

Page 4: Cauhoitracnghiemncc (Autosaved)

B.

a technique used by protocols in which a lower level protocol accepts a message from a

higher level protocol and places it in the data portion of the low level frame

C.

one of the pieces that results when an IP gateway divides an IP datagram into

smaller pieces for transmission across a network that cannot handle the

original datagram size

D. All of the above

E. None of the above

16. Contention is

A.

One or more conductors that serve as a common connection for a related group of

devices

B. a continuous frequency capable of being modulated or impressed with a second signal

C.

the condition when two or more stations attempt to use the same channel at

the same time

D.

a collection of interconnected functional units that provides a data communications

service among stations attached to the network

E. None of the above

17. Avalanche photodiode receivers can detect hits of transmitted data by receiving

A. 100 photons

B. 200 photons

C. 300 photons

D. 400 photons

E. None of the above

18. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is

A.

the method of determining which device has access to the transmission medium at any

time.

B. a medium access control technique for multiple access transmission media

C.

a form of TDMA in which circuit switching is used to dynamically change the

channel assignments

D. All of the above

E. None of the above

19. When you ping the loopback address, a packet is sent where?

A. On the network

Page 5: Cauhoitracnghiemncc (Autosaved)

B. Down through the layers of the IP architecture and then up the layers again

C. Across the wire

D. through the loopback dongle

E. None of the above

20. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one

machine to another?

A. FTP

B. SNMP

C. SMTP

D. RPC

E. None of the above

21. Which of the following device is used to connect two systems, especially if the systems use

different protocols?

A. hub

B. bridge

C. gateway

D. repeater

E. None of the above

22. The synchronous modems are more costly than the asynchronous modems because

A. they produce large volume of data

B. they contain clock recovery circuits

C. they transmit the data with stop and start bits.

D. they operate with a larger bandwidth

E. None of the above

23. A distributed network configuration in which all data/information pass through a central computer

is

A. bus network

B. star network

C. ring network

Page 6: Cauhoitracnghiemncc (Autosaved)

D. Point-to-point network

E. None of the above

24. Which of the following TCP/IP protocol allows an application program on one machine to send a

datagram to an application program on another machine?

A. UDP

B. VMTP

C. X.25

D. SMTP

E. None of the above

25. A remote batch-processing operation in which data is solely input to a central computer would

require a:

A. telegraph line

B. simplex lines

C. mixedband channel

D. All the above

E. None of the above

26. ICMP (Internet Control Message Protocol) is

A.

a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level

physical hardware address

B. a TCP/IP high level protocol for transferring files from one machine to another

C. a protocol used to monitor computers

D. a protocol that handles error and control messages

E. None of the above

27. If you get both local and remote echoes, every character you type will appear on the screen

A. once

B. twice

C. three times

D. never

E. None of the above

Page 7: Cauhoitracnghiemncc (Autosaved)

28. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?

A. 192

B. 192.168.10

C. 0.0.0.5

D. 51

E. None of the above

29. The slowest transmission speeds are those of

A. twisted-pair wire

B. coaxial cable

C. fiber-optic cable

D. microwaves

30. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data

rate?

A. 3 Kbps

B. 6 Kbps

C. 12 Kbps

D. 24 Kbps.

31. Carrier is

A.

One or more conductors that serve as a common connection for a related group of

devices

B.

a continuous frequency capable of being modulated or impressed with a

second signal

C.

the condition when two or more sections attempt to use the same channel at the same

time

D.

a collection of interconnected functional units that provides a data communications

service among stations attached to the network

E. None of the above

32. What can greatly reduce TCP/IP configuration problems?

A. WINS Server

B. WINS Proxy

C. DHCP Server

Page 8: Cauhoitracnghiemncc (Autosaved)

D. PDC

E. None of the above

33. In CRC there is no error if the remainder at the receiver is _____.

A. equal to the remainder at the sender

B. zero

C. nonzero

D. the quotient at the sender

34. Which of the following statements is correct for the use of packet switching?

A.

the subdivision of information into individually addressed packets in conjunction with

alternative routing arrangement enabled the transmission path to be altered in the

event of congestion or individual link failure

B.

the employment of additional intelligence within the network enabled more

sophisticated error control and link control procedures to be applied

C.

by employing wide bandwidth circuits for the trunk networks substantial economies

through extensive sharing of capacity could be achieved.

D. All of the above

E. None of the above

35. A front-end processor is

A. a user computer system

B. a processor in a large-scale computer that executes operating system instructions

C.

a minicomputer that relieves main-frame computers at a computer centre of

communications control functions

D. preliminary processor of batch jobs.

E. None of the above

36. What is the port number for NNTP?

A. 119 B. 80

C. 79 D. 70

37. Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk

Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are

needed to resolve the contention?

A. 7 slots

B. 5 slots

Page 9: Cauhoitracnghiemncc (Autosaved)

C. 10 slots

D. 14 slots

38. Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a

speed of 1200 BPS?

A. 10

B. 12

C. 120

D. 1200

E. None of the above

39. To connect a computer with a device in the same room, you might be likely to use

A. a coaxial cable

B. a dedicated line

C. a ground station

D. All of the above

E. None of the above

40. Internet-like networks within an enterprise.

A. Intranets

B. Switching alternating

C. Inter organizational networks

D. Extranets

41. How many bits internet address is assigned to each host on a TCP/IP internet which is used in all

communications with the host?

A. 16 - bits

B. 32 - bits

C. 48 - bits

D. 64 - bits

E. None of the above

42. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to

maximize the number of available hosts?

Page 10: Cauhoitracnghiemncc (Autosaved)

A. 192 B. 224

C. 240 D. 248

E. 252

43. Which of the following types of channels moves data relatively slowly?

A. wideband channel

B. voiceband channel

C. narrowband channel

D. broadband channel

E. None of the above

44. Which of the following is required to communicate between two computers?

A. communications software

B. protocol

C. communications hardware

D. access to transmission medium

E. All of the above

45. Which of the following does not allow multiple users or devices to share one communications line?

A. doubleplexer

B. multipplexer

C. concentrator

D. controller

E. None of the above

46. The geostationary satellite used for communication systems

A. rotates with the earth

B. remains stationary relative to the earth

C. is positioned over equator

D. All of the above

E. None of the above

Page 11: Cauhoitracnghiemncc (Autosaved)

47. Telecommunication networks frequently interconnect an organization with its customers and

suppliers. Select the best fit for answer:

A. Bandwidth alternatives

B. Switching alternating

C. Inter organizational networks

D. Extranets

48. The packets switching concept was first proposed

A. in the late 1980s for the Defense Ministry of US.

B.

in the early 1960s for military communication systems, mainly to handle

speech

C. in the late 1950s for Defense Ministry of US

D. All of the above

E. None of the above

49. The _____ houses the switches in token ring.

A. transceiver

B. nine-pin connector

C. MAU

D. NIC

E. None of the above

50. What device separates a single network into two segments but lets the two segments

appear as one to higher protocols?

A. Switch B. Bridge

C. Gateway D. Router

51. Which of the following refers to the terms "residual error rate"?

A.

the number of bit errors per twenty four hours of continuous operation on an

asynchronous line

B.

The probability that one or more errors will be undetected when an error

detection scheme is used

C.

the probability that one or more errors will be detected when an error detection

mechanism is used

D. signal to noise ratio divided by the ratio of energy per bit to noise per hertz

Page 12: Cauhoitracnghiemncc (Autosaved)

E. None of the above

52. Which of the following summation operations is performed on the bits to check an error-

detecting code?

A. Codec B. Coder-decoder

C. Checksum D. Attenuation

53. The research and development department at your office has been experimenting with

different technologies to help improve the performance of the network. One group has been

examining the use of a broadband network versus a based band network. Select the correct

statement about broadband and baseband.

A.

Broadband networks carry several channels on a single cable, whereas in a

baseband network several cables carry one channel

B.

Baseband networks carry a single channel on a single cable, whereas

broadband networks carry several channels on a single cable

C.

Baseband refers to local area networks, and broadband refers to wide area

networks.

D.

Baseband operates at a standard bit rate, whereas broadband may operate at

different rates as needed

E.

Broadband and baseband refer to the different frequencies at which infrared

operates then transmitting signals in certain conditions

54. An error-detecting code inserted as a field in a block of data to be transmitted is known as

A. Frame check sequence

B. Error detecting code

C. Checksum

D. flow control

E. None of the above

55. The cheapest modems can transmit

A. 300 bits per second

B. 1,200 bits per second

C. 2,400 bits per second

D. 4,800 bits per second

E. None of the above

56. Computers cannot communicate with each other directly over telephone lines because they

use digital pulses whereas telephone lines use analog sound frequencies. What is the name

of the device which permits digital to analog conversion at the start of a long distance

transmission?

Page 13: Cauhoitracnghiemncc (Autosaved)

A. Interface

B. Modem

C. Attenuation

D. Teleprocessor

E. None of the above

57. What is the usual number of bits transmitted simultaneously in parallel data transmission

used by microcomputers?

A. 16

B. 9

C. 8

D. 4

E. None of the above

58. The receive equalizer reduces delay distortions using a

A. tapped delay lines

B. gearshift

C. descrambler

D. difference engine

E. None of the above

59. Four routers have to be interconnected in a point-to-point Network. Each pair of root us

may connected by a high-speed line, a medium speed line or a low speed line. Find the total

number of topologies.

A. 12 B. 81

C. 48 D. 729

60. A network consists of eight NT servers. You are planning to move servers to different

segments of your network, what utility should be used at each server to determine which

server generates the most traffic?

A. NBTSTAT

B. NETSTAT.EXE

C. Performance Monitor

D. Network Monitor

Page 14: Cauhoitracnghiemncc (Autosaved)

E. ARP.EXE

61. Sending a file from your personal computer's primary memory or disk to another computer

is called

A. uploading

B. downloading

C. logging on

D. hang on

E. None of the above

62. What is the name of the software package that allows people to send electronic mail along a

network of computers and workstations?

A. Memory resident package

B. Project management package

C. Data communication package

D. Electronic mail package

E. None of the above

63. The communication mode that supports two-way traffic but only one direction at a time is

A. simplex

B. duplex

C. half duplex

D. multiplex

E. None of the above

64. HMP (Host Monitoring Protocol) is:

A.

a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level

physical hardware address

B. a TCP/IP high level protocol for transferring files from one machine to another.

C. a protocol used to monitor computers

D. a protocol that handles error and control messages

E. None of the above

65. Which of the following is a voiceband channel?

Page 15: Cauhoitracnghiemncc (Autosaved)

A. Telephone line

B. Telegraph line

C. Coaxial cable

D. Microwave systems

E. None of the above

66. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame

(assume header bits are negligible) that can be sent on this ring?

A. 8000 B frame

B. 80,000 B frame

C. 8 x 105 bit frame

D. 10,000 B frame

67. Data are sent over pin _____ of the EIA-232 interface.

A. 2

B. 3

C. 4

D. All of the above

68. To connect a computer with a device in the same room, you might be likely to use

A. a coaxial cable

B. a dedicated line

C. a ground station

D. All of the above

69. Demodulation is a process of

A. converting analog to digital signals

B. converting digital to analog signals

C. multiplexing various signals into one high speed line signals

D. performing data description.

70. Internet-like networks between a company and its business partners. Select the best fit for

answer:

A. Bandwidth alternatives

Page 16: Cauhoitracnghiemncc (Autosaved)

B. Switching alternating

C. Inter organizational networks

D. Extranets

71. An example of an analog communication method is

A. laser beam

B. microwave

C. voice grade telephone line

D. All of the above

E. None of the above

72. Which of the following layer protocols are responsible for user and the application

programme support such as passwords, resource sharing, file transfer and network

management?

A. Layer 7 protocols

B. Layer 6 protocols

C. Layer 5 protocols

D. Layer 4 protocols

E. None of the above

73. What frequency range is used for FM radio transmission?

A. Very Low Frequency : 3 kHz to 30. kHz

B. Low Frequency : 30 kHz to 300 kHz

C. High Frequency : 3 MHz to 30 MHz

D. Very High Frequency : 30 MHz to 300 MHz

E. None of the above

74. Transmission of computerised data from one location to another is called

A. data transfer

B. data flow

C. data communication

D. data management

Page 17: Cauhoitracnghiemncc (Autosaved)

E. None of the above

75. Compared to analog signals, digital signals

A. allow faster transmission

B. are more accurate

C. both (a) and (b)

D. All of the above

E. None of the above

76. FDDI is a

A. ring network

B. star network

C. mesh network

D. bus based network

E. None of the above

77. An anticipated result from multiprogramming operations is:

A. reduced computer idle time

B. the handling of more jobs

C. better scheduling of work

D. All of the above

E. None of the above

78. A central computer surrounded by one or more satellite computers is called a

A. bus network

B. ring network

C. star network

D. All of the above

E. None of the above

79. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are

exchanged twice a second, how much bandwidth per fill duplex line is occupied by the

distributed routing algorithm?

A. 500 bps

Page 18: Cauhoitracnghiemncc (Autosaved)

B. 1500 bps

C. 5 bps

D. 1000 bps

80. HOSTS file entries are limited to how many characters?

A. 8

B. 255

C. 500

D. Unlimited

E. None of the above

81. Demodulation is the process of

A. converting digital signals to analog signals

B. converting analog signals to digital signals

C. combining many low speed channels into one high speed channel

D. dividing the high-speed signals into frequency bands

E. None of the above

82. Which of the following statement is incorrect?

A.

The Addresses Resolution Protocol, ARP, allows a host to find the physical

address of a target host on the same physical network, given only the target IP

address.

B.

The sender's IP - to- physical address binding is included in every ARP broadcast;

receivers update the IP-to-Physical address binding information in their cache

before processing an ARP packet.

C.

ARP is a low-level protocol that hides the underlying network physical addressing,

permitting us to assign IP-addresses of our choice to every machine.

D. All of the above

E. None of the above

83. You are working with a network that has the network ID 192.168.10.0. What subnet should

you use that supports up to 25 hosts and a maximum number of subnets?

A. 255.255.255.192 B. 255.255.255.224

C. 255.255.255.240 D. 255.255.255.248

E. 255.255.255.252

Page 19: Cauhoitracnghiemncc (Autosaved)

84. Which of the following best illustrates the default subnet mask for a class A,B, and C

Network?

A. 0.0.0.0, 0.0.0.1, 0.0.1.1

B. 255.255.255.0, 255.255.0.0, 255.0.0.0

C. 255.0.0.0, 255.255.0.0, 255.255.255.0

D. 255.255.0.0, 255.255.255.0, 255.255.255.255

E. None of the above

85. Modulation is the process of

A. converting analog signals to digital signals

B. converting digital signals to analog signals

C. Multiplexing various signals into high speed line signals

D. performing data encryption.

86. Devices interconnected by the LAN should include

A. Computers and terminals

B. mass storage device, printers and plotters

C. bridges and gateways

D. All of the above

E. None of the above

87. What are the data transmission channels available for carrying data from one location to

another?

A. Narrowband

B. Voiceband

C. Broadband

D. All of the above

E. None of the above

88.On a class B network, how many hosts are available at each site with a subnet mask of 248?

A. 16,382 B. 8,190

C. 4,094 D. 2,046

E. 1,022

Page 20: Cauhoitracnghiemncc (Autosaved)

89. Which of the following technique is used for encapsulation?

A.

a technique used in best-effort delivery systems to avoid endlessly looping

packets.

B.

a technique used by protocols in which a lower level protocol accepts a

message from a higher level protocol and places it in the data portion of

the low level frame.

C.

One of the pieces that results when an IP gateway divides an IP datagram into

smaller pieces for transmission across a network that cannot handle the original

datagram size

D. All of the above

E. None of the above

90. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0,

and 192.168.7.0. What subnet mask can you use to combine these addresses into one?

A. 255.255.252.0 B. 225.255.254.0

C. 255.255.255.240 D. 255.255.255.252

91. With an IP address set starting with 150, you currently have six offices that you are treating

as subnets. Plans are in place to open 10 more offices before the end of the year. What

subnet mask should you use to satisfy the needed number of subnets and maximize the

number of hosts available at each site?

A. 192 B. 224

C. 240 D. 248

E. 252

92. A machine that connects to two or more electronic mail systems and transfers mail messages

among them is known as

A. Gateways

B. mail gateway

C. bridges

D. User Agent

E. None of the above

93. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the

modulation rate is

A. 1200 bands

B. 3200 bands

C. 4800 bands

Page 21: Cauhoitracnghiemncc (Autosaved)

D. 9600 bands

E. None of the above

94.

Error detection at a data link level is achieved by

A. bit stuffing

B. cyclic redundancy codes

C. Hamming codes

D. equalization

95.When the computer provides the manager with a multiple choice of possible answers, the

prompting technique is

A. question and answer

B. form filling

C. open-ended question

D. menu selection

E. None of the above

96.. Which network topology is considered passive?

A. Cross B. Ring

C. Star D. Mesh

E. Bus

97.If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use

a(n)

A. POS terminal

B. data collection terminal

C. batch processing terminal

D. intelligent terminal

E. None of the above

98. Which address is the loopback address?

A. 0.0.0.1

B. 127.0.0.0

Page 22: Cauhoitracnghiemncc (Autosaved)

C. 127.0.0.1

D. 255.255.255.255

E. None of the above

99.Error rate is

A.

an error-detecting code based on a summation operation performed on the bits to be

checked.

B. a check bit appended to an array of binary digits to make the sum of all the binary digits.

C.

a code in which each expression conforms to specific rules of construction, so that if certain

errors occur in an expression, the resulting expression will not conform to the rules of

construction and thus the presence of the errors is detected.

D. the ratio of the number of data units in error to the total number of data units

E. None of the above

100. Intranets and extranets can use their network fire walls and other security features

to establish secure Internet links within an enterprise or with its trading partners.

Select the best fit for answer:

A. Network Server

B. Virtual Private Network

C. Network operating system

D. OSI

101.Modem is used in data transmission. When was it invented and in which country?

A. 1963, USA

B. 1965, Germany

C. 1950, USA

D. 1950, Japan

E. None of the above

102. Which of the following technique is used for Time-To-Line (TTL)?

A.

a technique used in best-effort delivery system to avoid endlessly

looping packets.

B.

a technique used by protocols in which a lower level protocol accepts a

message from a higher level protocol and places it in the data portion of

the low level frame

C. One of the pieces that results when an IP gateway divides an IP datagram

Page 23: Cauhoitracnghiemncc (Autosaved)

into smaller pieces for transmission across a network that cannot handle

the original datagram size.

D. All of the above

E. None of the above

103.Communication network is

A. one or more conductors that serve as a common connection for a related group of devices

B. a continuous frequency capable of being modulated or impressed with a second signal

C. the condition with two or more stations attempt to use the same channel at the same time

D.

a collection of interconnected functional units that provides a data

communications service among stations attached to the network

E. None of the above

104.Which of the following is an advantage to using fiber optics data transmission?

A. resistance to data theft

B. fast data transmission rate

C. low noise level

D. few transmission errors

E. All of the above

105.Which of the following statement is incorrect?

A. if a host moves from one network to another, its IP address must change

B.

routing uses the network portion of the IP address, the path taken by packets travelling to

a host with multiple IP addresses depends on the address used.

C.

IP addresses encode both a network and a host on that network, they do not specify an

individual machine, but a connection to a network.

D. All of the above

E. None of the above

106. Bandlimited signal is

A. transmission of signals without modulation

B.

a signal all of whose energy is contained within a finite frequency

range

C. simultaneous transmission of data to a number of stations

Page 24: Cauhoitracnghiemncc (Autosaved)

D. All of the above

E. None of the above

107.Computers in a LAN can be interconnected by radio and infrared technologies.

A. Wireless LANs

B. Network Topologies

C. Multiplexer

D. Modem

108.You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at

least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets

available. Which subnet mask should you assign?

A. 255.255.224.0 B. 255.255.240.0

C. 255.255.248.0 D. 255.255.255.0

E. 255.255.255.255

109.How many digits of the Network User Address are known as the DNIC (Data Network

Identification Code)?

A. first three

B. first four

C. first five

D. first seven

E. None of the above

110. Which of the following is the address of the router?

A. The IP address

B. The TCP address

C. The subnet mask

D. The default gateway

E. None of the above

111. Thorough planning must take place when setting up an 802.3 network. A maximum

number of segments can separate any two nodes on the network. What is the

maximum number of segments allowed between two nodes?

A. Five B. Two

Page 25: Cauhoitracnghiemncc (Autosaved)

C. Four D. Six

E. Three

112. A devices that links two homogeneous packet-broadcast local networks, is

A. hub

B. bridge

C. repeater

D. gateway

E. None of the above

113.Identify the odd term amongst the following group:

A. Coaxial cable

B. Optical fibre

C. Twisted pair wire

D. Microwaves

E. None of the above

114.Which of the following divides the high speed signal into frequency bands?

A. t-switch

B. modem

C. frequency-division multiplexer

D. time-division multiplexer

E. None of the above

115.What is the first octet range for a class C IP address?

A. 192 - 255

B. 192 - 223

C. 192 - 226

D. 128 - 191

E. 1 - 126

116.Which utility is useful for finding the local host name?

Page 26: Cauhoitracnghiemncc (Autosaved)

A. NBTSTAT

B. Netstat

C. PING

D. Hostname

E. None of the above

117. Which of the following conditions is used to transmit two packets over a medium at the

same time?

A. Contention B. Collision

C. Synchronous D. Asynchronous

118.The slowest transmission speeds are those of

A. twisted-pair wire

B. coaxial cable

C. fiber-optic cable

D. microwaves

E. None of the above

119.Distributed Queue Dual Bus is a standard for

A. LAN

B. MAN

C. WAN

D. Wireless LAN.

E. LAN and MAN

120. A teleprocessing system may consist of

A. user systems

B. communications systems

C. computer center systems

D. All of the above

E. None of the above

121. If the ASCII character G is sent and the character D is received, what type of error is this?

Page 27: Cauhoitracnghiemncc (Autosaved)

A. single-bit B. multiple-bit

C. burst D. recoverable

122.Which layer of OSI determines the interface of the system with the user?

A. Network

B. Application

C. Data-link

D. Session

E. None of the above

123.

The transfer of data from a CPU to peripheral devices of a computer is achieved through

A. modems

B. computer ports

C. interfaces

D. buffer memory

E. None of the above

124. What is the number of separate protocol layers at the serial interface gateway specified by

the X.25 standard?

A. 4

B. 2

C. 6

D. 3

E. None of the above

125.Many data communication networks have been established which provide a wealth of on-demand

information services to people at home. What is the name of the system which provides an interactive,

graphics-rich service that permits user to select what they want?

A. Teletex system

B. Fax system

C. Videotex system

D. Microwave system

Page 28: Cauhoitracnghiemncc (Autosaved)

E. None of the above

126. Which of the following statements is correct?

A. Terminal section of a synchronous modem contains the scrambler

B. Receiver section of a synchronous modem contains the scrambler

C. Transmission section of a synchronous modem contains the scrambler

D. Control section of a synchronous modem contains the scrambler

E. None of the above

127.Which of the following characteristic(s) is/are suited to the PSS applications?

A. bursty traffic and low communications intensity

B. widely dispersed terminals and access to international packets switched services

C.

Multiple remote host or applications accessed by a single local access circuit terminal and

circuit

D. All of the above

E. None of the above

128.Because the configuration infor-mation for a DHCP client is received dynamically, you must use

which utility to read the current configuration to verify the settings?

A. PING

B. TRACERT

C. ARP

D. IPCONFIG

E. None of the above

129. Which of the following is separated by a subnet mask?

A. DHCP scopes

B. Network ID and host ID

C. Domains

D. Subnets

130. The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of

1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz

to 4300 Hz is

A. 6200 bps

Page 29: Cauhoitracnghiemncc (Autosaved)

B. 9600 bps

C. 34000 bps

D. 31000 bps

E. None of the above

131. TCP is:

A. Operates at the Data Link layer

B. Connection orientated and unreliable

C. Connection orientated and reliable

D. Connectionless and unreliable

132. An encyclopedic database

A. is an information utility that specializes in storing and searching information

B. is generally free

C. is easy for beginners to use

D. All of the above

E. None of the above

133.Which of the following statements is correct?

A. Protocol converters are the same as multiplexers

B. Protocol converters are the same as TDMs

C. Protocol converters are usually not operated in pairs.

D. Protocol converters are usually operated in

E. None of the above

134.The dialogue techniques for terminal use do not include

A. questions and answers

B. open-ended questions

C. form fillings

D. menu display

E. None of the above

Page 30: Cauhoitracnghiemncc (Autosaved)

135.

You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with

the largest amount of subnets available. Which subnet mask should you assign?

A. 255.255.255.192 B. 255.255.255.224

C. 255.255.255.240 D. 255.255.255.248

E. 255.255.255.255

136. The encoding method specified in the EIA-232 standard is _____.

A. NRZ-I

B. NRZ-L

C. Manchester

D. Differential Manchester

137.Examples are packet switching using frame relay, and cell switching using ATM technologies.

Select the best fit for answer:

A. Bandwidth alternatives

B. Switching alternating

C. Inter organizational networks

D. Extranets

138.The physical layer, in reference to the OSI model, defines

A.

data link procedures that provide for the exchange of data via frames that can be sent and

received

B. the interface between the X.25 network and packet mode device

C. the virtual circuit interface to packet-switched service

D. All of the above

E. None of the above

139.A required characteristic of an online real-time system is:

A. more than one CPU

B. offline batch processing

C. no delay in processing

D. All of the above

Page 31: Cauhoitracnghiemncc (Autosaved)

E. None of the above

140.How many class A, B, and C network IDs can exist?

A. 2,113,658

B. 16,382

C. 126

D. 128

E. None of the above

141.The transmission signal coding method of TI carrier is called

A. Bipolar

B. NRZ

C. Manchester

D. Binary

E. None of the above

142.Which of the following statement is correct?

A.

Buffering is the process of temporarily storing the data to allow for small variation

in device speeds

B. Buffering is a method to reduce cross-talks

C. Buffering is a method to reduce the routing overhead

D.

Buffering is storage of data within the transmitting medium until the receiver is ready to

receive

E. None of the above

143.You are working with a network that has the network ID 192.168.10.0 and require nine subsets

for your company and the maximum number of hosts. What subnet mask should you use?

A. 255.255.255.192 B. 255.255.255.224

C. 255.255.255.240 D. 255.255.255.248

E. 255.255.255.252

144.Messages from one computer terminal can be sent to another by using data networks. The

message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or

satellite and then converted back again at the receiving end. What is this system of sending messages

called?

A. Paperless office

Page 32: Cauhoitracnghiemncc (Autosaved)

B. Electronic mail

C. Global network

D. Electronic newspaper

E. None of the above

145.HDLC (High-level Data Link Control) is

A. a method of determining which device has access to the transmission medium at any time

B. a method access control technique for multiple-access transmission media

C. a very common bit-oriented data link protocol issued by ISO.

D. network access standard for connecting stations to a circuit-switched network

E. None of the above

146.You are working with a network that has the network ID 192.168.10.0. What subnet should you

use that supports four subnets and a maximum number of hosts?

A. 255.255.255.192 B. 255.255.255.224

C. 255.255.255.240 D. 255.255.255.248

E. 255.255.255.252

147.Establishing a virtual connection is functionally equivalent to

A. Connecting as virtual memory

B. Physically connecting a DTE and DCE

C. Placing a telephone call prior to a conversation

D. Placing a modem prior to a conversation

E. None of the above

148.The first step in troubleshooting many problems is to verify which of the following?

A. The subnet mask is valid

B. TCP/IP is installed correctly on the client

C. The WINS server is running

D. The BDC is operable

E. None of the above

Page 33: Cauhoitracnghiemncc (Autosaved)

149.You are working with a network that is 172.16.0.0 and would like

to have the maximum number of hosts per subnet. This assumes

support for eight subnets. What subnet mask should you use?

A. 255.255.192.0 B. 255.255.224.0

C. 255.255.240.0 D. 255.255.248.0

E. 255.255.255.0

150. Which of the following files is used for

NetBIOS name resolution?

A. HOSTS

B. LMHOSTS

C. ARP

D. FQDN

E. None of the above

151.What protocol is used between E-Mail servers?

A. FTP B. SMTP

C. SNMP D. POP3

152.If you configure the TCP/IP address and other TCP/IP parameters

manually, you can always verify the configuration through which of

the following? Select the best answer.

A. Network Properties dialog box

B. Server Services dialog box

C. DHCPINFO command-line utility

D. Advanced Properties tab of TCP/ IP Info.

E. None of the above

153.In a PC to telephone hookup for long distance communication,

modem is connected between the telephone line and

A. PC

B. synchronous port

C. crossover cable

D. asynchronous port

E. None of the above

154.Which of the following communications service provides message

Page 34: Cauhoitracnghiemncc (Autosaved)

preparation and transmission facilities?

A. Teletex

B. Teletext

C. x400

D. Fax

E. None of the above

155.Four bits are used for packet sequence numbering in a sliding

window protocol used in a computer network. What is the maximum

window size?

A. 4

B. 8

C. 15

D. 16

E. None of the above

156.A hard copy would be prepared on a

A. typewriter terminal

B. line printer

C. plotter

D. All of the above

E. None of the above

157.Which of the following device copies electrical signals from one

Ethernet to another?

A. bridge

B. repeater

C. hub

D. passive hub

E. None of the above

158.Stephanie is in charge of a small network and wants to make it

simple but secure. The users want to have full control over their data

and still be able to share data with the rest of the office. The

networking knowledge of the office staff is basic. Which network(s)

would be the best for Stephanie to set up?

Page 35: Cauhoitracnghiemncc (Autosaved)

A. Peer-to-peer

B. Master domain

C. Server-based

D. WAN

E. Share-level

159.When UPC is used, the price of the item is located

A. on the item

B. on the item and on the shelf

C. in computer storage

D. on the shelf and in computer storage

E. None of the above

160.Error control is needed at the transport layer because of potential

errors occurring _____.

A. from transmission line noise

B. in routers

C. from out-of-sequence delivery

D. from packet losses.

161. The transport layer protocol is

connectionless.

A. NVT

B. FTP

C. TCP

D. UDP

E. None of the above

162.The fundamental requirements of private-to-public network

interconnection methods which need to be provided in gateways

is/are

A.

universal accessibility for private network Data Terminal

Equipment (DTE)

B. adequate cost control mechanisms for administration of the

Page 36: Cauhoitracnghiemncc (Autosaved)

private networks

C. to assign address to private network DTEs

D. a and b both

E. None of the above

163.Communication between computers is almost always

A. serial

B. parallel

C. series parallel

D. direct

E. None of the above

164. Which of the following is

considered a broadband

communications channel?

A. coaxial cable

B. fiber optic cable

C. microwave circuits

D. satellites systems

E. All of the above

165. Data link layer retransmits the

damaged frames in most

networks. If the probability of a

frame's being damaged is p, what

is the mean number of

transmissions required to send a

frame if acknowledgements are

never lost.

A. P I (K + 1)

B. KIK (1 + F)

C. 1/ (1 - F)

D. K I (K - P)

E. None of the above

166.Which of the following characteristics is not true of NetBEUI?

Page 37: Cauhoitracnghiemncc (Autosaved)

A. Highly-customizable

B. Routable

C. Little configuration required

D. Fast for small networks to Self-tuning

167. The difference between a

multiplexer and a statistical

multiplexer is

A.

Statistical multiplexers

need buffers while

multiplexers do not

need buffers

B.

Multiplexer use X.25

protocol, while statistical

multiplexers use the

Aloha protocol

C.

Multiplexers often waste

the output link capacity

while statistical

multiplexers optimize its

use

D.

Multiplexers use Time

Division Multiplexing

(TDM) while statistical

multiplexers use

Frequency Division

Multiplexing (FDM)

E. None of the above

168. You are trying to decide which type of

network you will use at your office,

and you want the type that will

provide communication and avoid

collisions on the cable. Which of the

following is the best choice?

A.

Token-

Ring B. CSMA/CD

C. Ethernet D. CSMA/CA

E. ARCnet

169. Which of the following network access

standard is used for connecting

stations to a packet-switched

network?

A. X.3

Page 38: Cauhoitracnghiemncc (Autosaved)

B. X.21

C. X.25

D. X.75

E. None of the above

170.Interconnected networks need communication processors such as

switches, routers, hubs, and gateways. Select the best fit for answer:

A. TCP/IP

B. Protocol

C. Open Systems

D. Internetwork processor

171.A decrease in magnitude of current, voltage, a power of a signal

in transmission between points, is known as

A. Attenuation

B. Amplitude

C. Aloha

D. Carrier

E. None of the above

172.The term "remote job entry" relates to

A. batch processing

B. realtime processing

C. transaction processing

D. distributed processing

E. None of the above

173. Which of the following performs

modulation and demodulation?

A. fiber optic

B. satellite

C. coaxial cable

D. modem

Page 39: Cauhoitracnghiemncc (Autosaved)

E. None of the above

174. Data communications monitors

available on the software market

include

A. ENVIRON/1

B. TOTAL

C. BPL

D. Telenet

E. None of the above

175. Which of the following statement is

correct?

A.

A spin stabilized satellite

used solar cells mounted

on a cylinder body that

continuously rotates so

that 40 a time and it also

uses gyroscopic action of

a spinning satellite to

maintain its orientation

towards the earth and

the sun.

B.

A spin stabilized satellite

uses solar panels whose

cells are continually

oriented toward the sun

C.

Satellite transponders use

lower frequency reception

of radiation from earth

stations and higher

frequency for transmission

to earth stations.

D.

satellite transponders use a

single frequency for

reception and transmission

from one point on earth to

another

E. None of the above

176. What is the default subnet mask for a

class A network?

A. 127.0.0.1

B. 255.0.0.0

Page 40: Cauhoitracnghiemncc (Autosaved)

C. 255.255.255.0.0

D. 255.255.255.0

E. None of the above

177.When using the loopback address, if TCP/IP is installed correctly,

when should you receive a response?

A. Immediately

B. Only if the address fails

C. After the next host comes online

D. Within two minutes

E. None of the above

178. Which of the following statement is

correct?

A.

Satellite transponders

contain a receiver and

transmitter designed to

relay microwave

transmissions from one

point on earth to

another.

B.

Satellite transponders

contain a device that echos

the radiation without

change from one point on

earth to another.

C.

Satellite transponder

contains devices that

transform the message sent

from one location on earth

to a different code for

transmission to another

location.

D.

Satellite transponders use

lower frequency reception

of radiation from earth

stations and higher

frequency for transmission

to earth stations

E. None of the above

179.The modern enterprise is interconnected internally and externally

by the Internet, intranets, and other networks. Select the best fit for

answer:

Page 41: Cauhoitracnghiemncc (Autosaved)

A. Internetworked enterprise

B. Information super highway

C. Business applications of telecommunications

D. Client/Server networks

E. None of the above

180.

The data communication support should include, but is not restricted

to

A. file transfer and transaction processing

B. file and database access

C. terminal support, electronic mail and voice grams.

D. All of the above

181.MAC is

A.

a method of determining which device has access to

the transmission medium at any time

B.

a method access control technique or multiple-access

transmission media

C.

a very common bit-oriented data link protocol issued to

ISO.

D.

network access standard for connecting stations to a

circuit-switched network

E. None of the above

182.What is the name of the device that converts computer output

into a form that can be transmitted over a telephone line?

A. Teleport

B. Modem

C. Multiplexer

D. Concentrator

E. None of the above

183.You are working with a network that has the network ID

172.16.0.0, and you require 25 subnets for your company and an

additional 30 for the company that will merge with you within a

month. Each network will contain approximately 600 nodes. What

Page 42: Cauhoitracnghiemncc (Autosaved)

subnet mask should you assign?

A. 255.255.192.0 B. 255.255.224.0

C. 255.255.240.0 D. 255,255.248.0

E. 255.255.252.0

184.Which application allows a user to access and change remote files

without actual transfer?

A. TELNET

B. NFS

C. FTP

D. DNS

E. None of the above

185.Parity bit is

A.

an error-detecting code based on a summation operation

performed on the bits to be checked.

B.

a check bit appended to an array of binary digits to

make the sum of all the binary digits.

C.

a code in which each expression conforms to specific rules

of construction, so that if certain errors occur in an

expression, the resulting expression will not conform to the

rules of construction and thus the presence of the errors in

detected

D.

the ratio of the number of data units in error to the total

number of data units

E. None of the above

186.Which of the following file retrieval methods use hypermedia?

A. HTTP

B. WAIS

C. Veronica

D. Archie

E. None of the above

187. Which IP address class has few hosts

per network?

A. D

Page 43: Cauhoitracnghiemncc (Autosaved)

B. C

C. B

D. A

E. None of the above

188. Microprogramming is

A.

assembly language

programming

B.

programming of

minicomputers

C.

control unit

programming

D.

macro programming of

microcomputers

E. None of the above

189.You are working with a network that has the network ID

192.168.10.0. What subnet should you use that supports up to 12

hosts and a maximum number of subnets?

A. 255.255.255.192

B. 255.255.255.224

C. 255.255.255. 240

D. 255.255.255.248

E. 255.255.255.252

190.Which of the following statements is incorrect?

A.

Multiplexers are designed to accept data from several I/O

devices and transmit a unified stream of data on one

communication line.

B. HDLC is a standard synchronous communication protocol.

C.

RTS/CTS is the way the DTE indicates that it is ready to

transmit data and the way the DCE indicates that it is ready

to accept data.

D. RTS/CTS is the way the terminal indicates ringing

E. None of the above

191. If communication software can be

Page 44: Cauhoitracnghiemncc (Autosaved)

called the "traffic cop" of a micro

communication system, then what

should the modem be called?

A. Park

B. Bridge

C. Interface

D. Link

E. None of the above

192.Which of the following specifies the network address and host

address of the computer?

A. The IP address

B. The TCP address

C. The subnet mask

D. The default gateway

E. None of the above

193. For connecting modem, a computer

must be equipped with a port that

conforms to the RS-232 standard of

the Electronic Industries Association of

America. What do the letters 'RS'

stand for?

A. Recognised standard

B. Random sequence

C. Recommended standard

D. Registered source

E. None of the above

194.A network that requires human intervention of route signals is

called a

A. bus network

B. ring network

C. star network

Page 45: Cauhoitracnghiemncc (Autosaved)

D. T-switched network

E. None of the above

195.What is the port number for POP3?

A. 110 B. 90

C. 80 D. 49

196.Which of the following provides a storage mechanism for

incoming mail but does not allow a user to download messages

selectively?

A. SMTP B. DHCP

C. IMAP D. POP3

197. On a class C network with a subnet

mask of 192, how many subnets are

available?

A. 254 B. 62

C. 30 D. 14

E. 2

198. Ethernet and Token-Ring are the two most commonly used

network architectures in the world. Jim has heard of the different

topologies for networks and wants to choose the architecture that will

provide him with the most options. Which of the following would that

be? Choose the most correct answer.

A.

Token-Ring because it currently can run at both 4Mbps and

16Mbps. This means that it can be used in any topology

B. Ethernet, because it is cabled using fiber-optic cable

C. Token-Ring, because it uses a MAU

D.

Ethernet, because it can be set up with most

topologies and can use multiple transfer speeds

E.

Neither Token-Ring nor Ethernet is the proper choice. Only

ARCnet can be used in all topologies

199. A 4 KHz noiseless channel with one sample every 125 per sec, is

used to transmit digital signals. Find the bit rate (bits per second) that

are sent, if CCITT 2.048 Mbps encoding is used.

A. 500 Kbps

B. 32 Kbps

C. 8 Kbps

Page 46: Cauhoitracnghiemncc (Autosaved)

D. 64 Kbps.

200. How can you see the address of the DHCP server from which a

client received its IP address?

A. By using Advanced Properties of TCP/IP

B. By using IPCONFIG/ALL

C. By using DHCPINFO

D. By pinging DHCP

E. None of the above

201. In a synchronous modem, the receive equalizer is known as

A. adaptive equalizer

B. impairment equalizer

C. statistical equalizer

D. compromise equalizer

E. None of the above

202. Alex is required to provide information on how many people are

using the network at any one time. Which network will enable him to

do so?

A. Server-based B. Token-Ring

C. Ethernet D. Star

E. Peer-to-peer

203. Now-a-days computers all over the world can talk to each other.

Which is one of the special accessories essential for this purpose?

A. Keyboard

B. Modem

C. Scanner

D. Fax

E. None of the above

204. To make possible the efficient on-line servicing of many

teleprocessing system users on large computer systems, designers

are developing

A. communication systems

Page 47: Cauhoitracnghiemncc (Autosaved)

B. multiprogramming systems

C. virtual storage systems

D. All of the above

E. None of the above

205. Which of the following best describes the scopes on each DHCP

server, in the absence of configuration problems with DHCP

addresses, if you use multiple DHCP servers in your environment?

A. Unique to that subnet only

B. For different subnets

C. For no more than two subnets

D. For no subnets

E. None of the above

206. The main difference between TCP and UDP is

A.

UDP is connection oriented where as TCP is datagram

service

B.

TCP is an Internet protocol where as UDP is an ATM

protocol

C.

UDP is a datagram where as TCP is a connection

oriented service

D. All of the above

207. What operates in the Data Link and the Network layer?

A. NIC

B. Bridge

C. Brouter

D. Router

E. None of the above

208. What is the name of the computer based EMMS that provides a

common forum where users can check in at their convenience, post

messages, actively exchange ideas and participate in ongoing

discussions?

A. E-mail

B. Bulletin board system (BBS)

Page 48: Cauhoitracnghiemncc (Autosaved)

C. Teleconferencing

D. Videoconferencing

E. None of the above

209. Which of the following statement is incorrect?

A.

The CCITT Recommendation X.25 specifies three layers of

communication: physical, link and network.

B. The second layer of communication is the data-link layer

C.

Errors in the physical layer can be detected by the data link

layer

D.

The fourth layer, in reference to the OSI model, is the

session layer

E. None of the above

210. Devices on one network can communicate with devices on

another network via a

A. file server

B. utility server

C. printer server

D. gateway

E. None of the above

211. After coding a document into a digital signal, it can be sent by

telephone, telex or satellite to the receiver where the signal is

decoded and an exact copy of the original document is made. What is

it called?

A. Telex

B. Word processor

C. Facsimile

D. Electronic mail

E. None of the above

212. Which file transfer protocol uses UDP?

A. NFS

B. TELNET

Page 49: Cauhoitracnghiemncc (Autosaved)

C. TFTP

D. FTP

E. None of the above

213. You are working with a class C network. You are required to

configure it for five subnets, each of which will support 25 nodes.

What subnet should you use?

A. 255.255.255.0 B. 255.255.255.224

C. 255.255.255.240 D. 255.255.255.248

E. 255.255.255.252

214. A network designer wants to connect

5 routers as point-to-point simplex

line. Then the total number of lines

required would be

A. 5

B. 10

C. 20

D. 32

E. None of the above

215. Which of the following medium access control technique is used

for bus/tree?

A. token ring

B. token bus

C. CSMA

D. MAC

E. None of the above

216. A distributed data processing

configuration in which all activities

must pass through a centrally located

computer is called a:

A. ring network

B. spider network

C. hierarchical network

Page 50: Cauhoitracnghiemncc (Autosaved)

D. data control network

E. None of the above

217. The size or magnitude of a voltage or current waveform is

A. Amplitude

B. Aloha

C. Angle Modulation

D. Attenuation

E. None of the above

218. Which of the following network access standard is used for

connecting stations to a circuit-switched network?

A. X.3

B. X.21

C. X.25

D. X.75

E. None of the above

219. Which of the following is not a transmission medium?

A. telephone lines

B. coaxial cable

C. modem

D. microwave systems

E. satellite systems

220. Which of the following statement is incorrect?

A.

Gateways are assumed to know correct routes; hosts begin

with minimal routing information and learn new routes from

gateways.

B.

Layered protocols are designed so that layer n at the

destination receives exactly the same object sent by layer n

at the source.

C.

Application programs as well as all protocol software from

the Internet layer upward use only IP addresses; the

network interface layer handles physical addresses.

Page 51: Cauhoitracnghiemncc (Autosaved)

D. All of the above

E. None of the above

221. A batch processing terminal would not

include a

A. CPU

B. card reader

C. card punch

D. line printer

E. None of the above

222. Packet Switch Stream (PSS) was introduced in

A. the US in 1961 (6) the UK in 1981

B. the UK in 1971

C. the US in 1961

D. None of the above

223.The physical layer of a network

A.

defines the electrical characteristics of signals

passed between the computer and communication

devices

B. controls error detection and correction

C.

constructs packets of data and sends them across the

network

D. All of the above

E. None of the above

224. Which of the following allows devices on one network to

communicate with devices on another network?

A. multiplexer

B. gateway

C. t-switch

D. modern

E. None of the above

Page 52: Cauhoitracnghiemncc (Autosaved)

225. An error detecting code is which code is

the remainder resulting from dividing the

bits to be checked by a predetermined

binary number, is known as

A. Cyclic redundancy check

B. Checksum

C. Error detecting code

D. Error rate

E. None of the above

226.Bulletin board system

A. is a public access message system

B. is a modem capable of accepting commands

C. converts analog signals to digital signals

D. converts digital signals to analog signals

E. None of the above

227. In OSI model, which of the following layer provides error-free

delivery of data?

A. Data link

B. Network

C. transport

D. Session

E. None of the above

228.Error detection at the data link level is achieved by?

A. Bit stuffing

B. Hamming codes

C. Cyclic Redundancy codes

D. Equalization

E. None of the above

229.The area of coverage of a satellite radio beam is known as

A. Footprint

Page 53: Cauhoitracnghiemncc (Autosaved)

B. Circular polarization

C. Beam width

D. Identity

E. None of the above

230. Which of the following data transmission

media has the largest terrestrial range

without the use of repeaters or other

devices?

A. Hardwiring

B. Microwave

C. Satellite

D. Laser

E. None of the above

231.What is the minimum number of wires needed to send data over

a serial communication link layer?

A. 1

B. 2

C. 4

D. 6

E. none of the above

232. The _____ layer is the layer

closest to the transmission

medium.

A. transport

B. network

C. data link

D. physical

E. None of the above

233.What is the name of the device that connects two computers by

means of a telephone line?

A. Tape

Page 54: Cauhoitracnghiemncc (Autosaved)

B. modem

C. bus

D. cable

E. None of the above

234. What is the main difference between DDCMP and SDLG?

A.

DDCMP does not need special hardware to final the

beginning of a message.

B. DDCMP has a message header

C. SDLC has a IP address

D. SDLC does not use CRC

E. None of the above

235. On a class B network, how many

subnets are available with a

subnet mask of 248?

A. 2 B. 6

C. 30 D. 62

E. 126

236. Ethernet networks can be cabled in a number of topologies,

depending on what works best in each environment. As more nodes

are added, the efficiency of Ethernet decreases. Select the best

answer as to why Ethernet becomes less efficient as size increases.

A. Network collisions occur

B. Repeaters cannot increase the signal strength sufficiently

C. Cable terminators do not reflect the signal properly

D. Cable terminators do not absorb the signal properly

E. "Line echo" occurs due to the impedance of the cable

237. In a _____ topology, if there are n devices in a network, each

device has n - 1 ports for cables.

A. ring

B. bus

C. star

Page 55: Cauhoitracnghiemncc (Autosaved)

D. mesh

E. None of the above

238. Typewriter terminals can print computer-generated data at a

rate of

A. 10 characters per second

B. 120 characters per second

C. 120 characters per minute

D. 1200 characters per minute

E. None of the above

239. To avoid transmission errors, a check figure is calculated by the

A. transmitting computer

B. receiving computer

C. both (a) and (b)

D. Start and stop bit

E. None of the above

240. What is the first octet range for a

class A IP address?

A. 1 - 126

B. 192 - 255

C. 192 - 223

D. 1 - 127

E. 128 - 191

241. Which of the following is not a standard synchronous

communication protocol?

A. SDLC

B. SMTP

C. SLIP

D. PAS

E. None of the above

Page 56: Cauhoitracnghiemncc (Autosaved)

242. The network layer, in reference to the OSI model, provide

A.

data link procedures that provide for the exchange of data

via frames that can be sent and received

B.

the interface between the X.25 network and packet mode

device

C.

the virtual circuit interface to packet-switched

service

D. All of the above

E. None of the above

243. In OSI network architecture, the

routing is performed by

A. network layer

B. data link layer

C. transport layer

D. session layer

E. None of the above

244.

Which of the following communications lines is best suited to

interactive processing applications?

A. narrowband channels

B. simplex lines

C. full-duplex lines

D. mixed band channels

E. None of the above

245. What is the first octet range for a class B IP address?

A. 128 - 255

B. 1 - 127

C. 192 - 223

D. 128 - 191

E. 127 - 191

246. The 32-bit internet address 10000000 00001010 00000010

00011110 will be written in dotted decimal notation as

Page 57: Cauhoitracnghiemncc (Autosaved)

A. 148.20.2.30

B. 164.100.9.61

C. 210.20.2.64

D. 128.10.2.30

E. None of the above

247. Which of the following items is not used in Local Area Networks

(LANs)?

A. Computer

B. Modem

C. Printer

D. Cable

E. None of the above

248. Error detection at a data link level is achieved by

A. bit stuffing

B. cyclic redundancy codes

C. Hamming codes

D. equalization

E. None of the above

249. RS-232-G

A.

is an interface between two data circuit terminating

equipment as examplified by a local and remote modem

B.

is an interface standard between Data terminal

Equipment and Data Circuit Terminating Equipment

C.

specifies only the mechanical characteristics of an interface

by providing a 25-pin connector

D.

requires only 7 pin out of 25 in order to transmit digital

data over public telephone lines

E. None of the above

250. A subdivision of main storage created

by operational software is referred to

as a:

Page 58: Cauhoitracnghiemncc (Autosaved)

A. compartment

B. time-shared program

C. divided core

D. partition

E. None of the above

251. RS-449/442-A/423-A is

A.

a set of physical layer standards developed by EIA

and intended to replace RS-232-C.

B.

a check bit appended to an array of binary digits to make

the sum of the all the binary digits

C.

a code in which each expression conforms to specific rules

of construction, so that if certain errors occur in an

expression the resulting expression will not conform to the

rules of construction and thus the presence of the errors is

detected

D.

the ratio of the number of data units in error to the total

number of data units

E. None of the above

252. Which of the following digits are known as the area code of the

Network User Address (NUA)?

A. 5-7

B. 1-4

C. 8-12

D. 13-14

E. None of the above

253. End-to-end connectivity is provided from host-to-host in:

A. Network layer

B. Session layer

C. Data link layer

D. Transport layer

E. None of the above

254. A form of modulation In which the amplitude of a carrier wave is

Page 59: Cauhoitracnghiemncc (Autosaved)

varied in accordance with some characteristic of the modulating

signal, is known as

A. Aloha

B. Angle modulation

C. Amplitude modulation

D. modem

E. None of the above

255. CSMA (Carrier Sense Multiple Access) is

A.

a method of determining which device has access to the

transmission medium at any time

B.

a method access control technique for multiple-

access transmission media.

C.

a very common bit-oriented data link protocol issued by

ISO.

D.

network access standard for connecting stations to a

circuit-switched network

E. None of the above

256. Which of the following summation operation is performed on the

bits to check an error-detecting code?

A. Codec

B. Coder-decoder

C. Checksum

D. Attenuation

E. None of the above

257. The standard suit of protocols used by the Internet, intranets,

extranets, and some other networks.

A. TCP/IP

B. Protocol

C. Open Systems

D. Internetwork processor

258. Networks that follow the 802.5 standard appear to be in a star

topology but are actually operating in what type of topology?

Page 60: Cauhoitracnghiemncc (Autosaved)

A. Linear bus

B. Modified star

C. Modified ring

D. Ring

E. Hybrid hub

259.A communications device that combines transmissions from

several 1/ O devices into one line is a:

A. concentrator

B. modifier

C. multiplexer

D. full-duplex line

E. None of the above

260. The main difference between synchronous and asynchronous

transmission is

A.

the clocking is derived from the data in synchronous

transmission

B.

the clocking is mixed with the data in asynchronous

transmission

C. the pulse height is different.

D. the bandwidth required is different

E. None of the above

261. ARP (Address Resolution Protocol) is

A.

a TCP/IP protocol used

to dynamically bind a

high level IP Address to

a low-level physical

hardware address

B.

a TCP/IP high level protocol

for transferring files from

one machine to another

C.

a protocol used to monitor

computers

D. a protocol that handles

Page 61: Cauhoitracnghiemncc (Autosaved)

error and control messages

E. None of the above

262. Which of the following uses network address translation?

A. Routers

B. Network adapter drivers

C. Hubs

D. Windows 95

263. The X.25 standard specifies a

A. technique for start-stop data

B. technique for dial access

C. DTE/DCE interface

D. data bit rate

E. None of the above

264. The most important part of a multiple DHCP configurations is to

make sure you don't have which of the following in the different

scopes? Select the best answer.

A. Duplicate addresses

B. Duplicate pools

C. Duplicate subnets

D. Duplicate default gateways

E. None of the above

265. When a group of computers is

connected together in a small area

without the help of telephone lines, it

is called

A.

Remote communication

network (RCN)

B. Local area network(LAN)

C. Wide area network (WAN)

D. Value added network (VAN)

E. None of the above

Page 62: Cauhoitracnghiemncc (Autosaved)

266. The 802.5 standard implements a way for preventing collisions

on the network. How are collisions prevented when using this

standard?

A. CSMA/CD

B. Token passing

C. Collision detection

D. Time sharing

E. Switched repeaters

267. A communication network which is used by large organizations

over regional, national or global area is called

A. LAN

B. WAN

C. MAN

D. Intranet

E. None of the above

268. Information systems with common

hardware, software, and network

standards that provide easy access for

end users and their networked

computer systems. Select the best fit

for answer:

A. TCP/IP

B. Protocol

C. Open Systems

D. Internetwork processor

269. Which of the following TCP/IP protocol is used for file transfer

with minimal capability and minimal overhead?

A. RARP

B. FTP

C. TFTP

D. TELNET

E. None of the above

270. Terminals are required for

Page 63: Cauhoitracnghiemncc (Autosaved)

A. realtime, batch processing, and timesharing

B. realtime, timesharing, and distributed processing

C. realtime, distributed processing, and manager inquiry

D. realtime, timesharing, and message switching

E. None of the above

271. Sending a file from your personal computer's primary memory or

disk to another computer is called

A. uploading

B. downloading

C. logging on

D. hang on

272. Business meeting and conferences can

be held by linking distantly located

people through a computer network.

Not only the participants exchange

information but are able to see each

other. What is it called?

A. Telemeeting

B. Telemailing

C. Teleconferencing

D. Teletalking

E. None of the above

273. What frequency range is used for

microwave communications, satellite

and radar?

A.

Low Frequency : 30 kHz to

300 kHz

B.

Medium Frequency : 300

kHz to 3 MHz

C.

Super High Frequency :

3000 MHz to 30000 MHz

D.

Extremely High

Frequency :30,000 MHz

Page 64: Cauhoitracnghiemncc (Autosaved)

E. None of the above

274. Which of the following statements is incorrect?

A.

The difference between synchronous and asynchronous

transmission is the clocking derived from the data in

synchronous transmission

B.

Half-duplex line is a communication line in which data can

move in two directions, but not at the same time.

C.

Teleprocessing combines telecommunications and DP

techniques in online activities.

D.

Batch processing is the preferred processing mode

for telecommunication operations

E. None of the above

275. If the ASCII character H is sent and the

character I is received, what type of error

is this?

A. single-bit B. multiple-bit

C. burst D. recoverable

276. A 4 KHz noise less channel with one sample ever 125 per sec is

used to transmit digital signals. If Delta modulation is selected, then

how many bits per second are actually sent?

A. 32 kbps

B. 8 kbps

C. 128 kbps

D. 64 kbps.

277. UDP is:

A. Not a part of the TCP/IP suite

B. Connection oriented and unreliable

C. Connection orientated and reliable

D. Connectionless and unreliable

278. . The interactive transmission of data

within a time sharing system may be best

suited to

A. simplex lines

B. half-duplex lines

Page 65: Cauhoitracnghiemncc (Autosaved)

C. full-duplex lines

D. biflex-line

E. None of the above

279. What OSI layer handles logical address to logical name

resolution?

A. Transport

B. Physical

C. Presentation

D. Data Link

280. The MAC (Media Access Control) address

of the network card is used in both

Ethernet and Token-Ring networks and is

essential for communication. What does

MAC provide?

A.

A logical address that identifies

the workstation

B.

A physical address that is

randomly assigned each time

the computer is started

C.

A physical address that is

assigned by the

manufacturer

D.

The logical domain address for

the workstation

E. An alias for the computer name

281. Which of the following is an example of a client-server model?

A. TELNET

B. FTP

C. DNS

D. All of the above

E. None of the above

282. In CRC there is no error if the remainder at the receiver is _____.

A. the quotient at the sender

Page 66: Cauhoitracnghiemncc (Autosaved)

B. nonzero

C. zero

D. equal to the remainder at the sender

E. None of the above.

283. A WATS arrangement

A. is always less expensive than flat-rate service

B.

is less expensive than flat-rate service only when the number of calls is large and

the duration of each is short

C.

is less expensive than flat-rate service only when the number of calls is small and the

duration of each is long

D. is never less expensive than flat-rate service

E. None of the above

284. A T-switch is used to

A. control how messages are passed between computers

B. echo every character that is received

C. transmit characters one at a time

D. rearrange the connections between computing equipment

E. None of the above

285. A global network of millions of business, government, educational, and research networks;

computer systems; database; and end users. Select the best fit for answer:

A. Internet works

B. The Internet

C. Internet revolution

D. Internet technologies

E. None of the above

286. Alice is setting up a small network in her home so that she can study for

her MCSE exams. She doesn't have a lot of money to spend on hardware,

so she wants to use a network topology that requires the least amount of

hardware possible. Which topology should she select?

A. Star B. Right

Page 67: Cauhoitracnghiemncc (Autosaved)

C. Token-Ring D. Ethernet

E. Bus

287. The CCITT Recommendation X.25 specifies three layers of communications:

A. application, presentation and session

B. Session, transport and network

C. physical datalink and network

D. datalink, network and transport

288. Which of the following technique is used for allocating capacity on a satellite channel using fixed-

assignment FDM?

A. Amplitude modulation

B. Frequency-division multiple access

C. Frequency modulation

D. Frequency-shift keying

E. None of the above

289. The amount of uncertainty in a system of symbol is called

A. Bandwidth

B. Entropy

C. loss

D. Quantum

E. None of the above

290. Which of the following allows a simple email service and is responsible for moving messages from

one mail server to another?

A. IMAP B. DHCP

C. SMTP D. FTP

E. POP3

291. What does 192 translate to in binary?

A. 11000000

B. 00111110

C. 00001111

Page 68: Cauhoitracnghiemncc (Autosaved)

D. 00000011

E. None of the above

292. An information utility can offer a user

A. instant bonds and stock quotations

B. news stories from wire services

C. complete airline schedules for all domestic flights

D. All of the above

E. None of the above

293. An international standard, multilevel set of protocols to promote

compatibility among telecommunications networks. Select the best fit for

answer:

A. Network Server

B. Virtual Private Network

C. Network operating system

D. OSI

294. Many large organizations with their offices in different countries of the

world connect their computers through telecommunication satellites and

telephone lines. Such a communication network is called

A. LAN

B. WAN

C. ECONET

D. EITHERNET

E. None of the above

295. A network which is used for sharing data, software and hardware among several users owning

microcomputers is called

A. WAN

B. MAN

C. LAN

D. VAN

E. None of the above

Page 69: Cauhoitracnghiemncc (Autosaved)

296. In geosynchronous orbit, satellite

A. remains in a fixed position so that as earth rotates, it can fully cover the earth

B. remains in a fixed position related to points on earth

C. moves faster than the earth's rotation so that it can cover larger portion of earth.

D. moves simultaneously

E. None of the above

297. A proposed network infrastructure of interconnected local, regional, and global networks that

would support universal interactive multimedia communications. Select the best fit for answer:

A. Internetworked enterprise

B. Information super highway

C. Business applications of telecommunications

D. Client/Server networks

298. What does 240 translate to in binary?

A. 11110000

B. 00011110

C. 00001111

D. 11100000

E. None of the above

299. You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In

the next year, you will be adding an additional 27 branch offices to your company. For simplified

management, you want to keep the most possible hosts per subnet. Which subnet mask should you

management, you want to keep the most possible hosts per subnet. Which subnet mask should you

use?

A. 255.224.0.0 B. 255.240.0.0

C. 255.248.0.0 D. 255.252.0.0

E. 255.254.0.0

300. A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree

node. Router I communicate with router J by sending a message to the root of the tree. The root then

sends the message back down to J. Then find the mean router-router path length.

A. 2 (m - 2)

B. 2 (2m - 1)

C. m - 1

Page 70: Cauhoitracnghiemncc (Autosaved)

D. (2m - l)/mJ

301. Most networks are connected to other local area or wide area networks. Select the best fit for

answer:

A. Internet works

B. The Internet

C. Internet revolution

D. Internet technologies

302. You are working with a network that is 172.16.0.0 and would like to support 600 hosts per

subnet. What subnet mask should you use?

A. 255.255.192.0 B. 255.255.224.0

C. 255.255.240.0 D. 255.255.248.0

E. 255.255.252.0

303. A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the

maximum possible transmission rate?

A. 1.5 Mbaud/sec

B. 6 Mband/sec

C. 12 Mbaud/sec

D. 24 Mbaud/sec

E. None of the above

304. Which of the following digits are known as the sub-address digits (for use by the user) of the

Network User Address (NUA)?

A. 5-7

B. 1-4

C. 8-12

D. 13-14

E. None of the above

305. Error detecting code is

A.

an error-detecting code based on a summation operation performed on the bits to be

checked

B. a check bit appended to an array of binary digits to make the sum of all the binary digits.

Page 71: Cauhoitracnghiemncc (Autosaved)

C.

a code in which each expression conforms to specify rules of construction, so that

if certain errors occur in an expression, the resulting expression will not conform

to the rules of construction and thus the presence of the error is detected.

D. the ratio of the data units in error to the total number of data units

E. None of the above

306.A modulator converts a _____ signal to a(n) _____ signal.

A. FSK; PSK

B. PSK; FSK

C. analog; digital

D. digital; analog

E. None of the above

307. The birthplace of the World Wide Web is considered to be

A. the Department of Defense

B. CERN

C. ARPA

D. Netscape

E. None of the above

308. You have purchased a MAU (Multistation Access Unit) from your computer supplier and now must

decide what type of network card you should install in the workstations. Which of the following would

be the most appropriate?

A. Fast SCSI Wide

B. Token-Ring

C. ArcServe

D. Ethernet

E. None of the above

309. What is the loopback address?

A. 127.0.0.1

B. 255.0.0.0

C. 255.255.0.0

Page 72: Cauhoitracnghiemncc (Autosaved)

D. 255.255.255.255.0

E. None of the above

310. An ROP would be attached to a

A. simplex channel

B. duplex channel

C. half duplex channel

D. full duplex channel

E. None of the above

311. Who originally designed TCP/IP?

A. The Department of Defense

B. Novell

C. IBM

D. Xerox

312. The systematic access of small computers in a distributed data processing system is referred to

as:

A. dialed service

B. multiplexing

C. polling

D. conversational mode

E. None of the above

313. The process of converting analog signals into digital signals so they can be processed by a

receiving computer is referred to as:

A. modulation

B. demodulation

C. synchronizing

D. synchronizing

E. None of the above

314. An example of digital, rather than analog, communication is

A. DDD

Page 73: Cauhoitracnghiemncc (Autosaved)

B. DDS

C. WATS

D. DDT

E. None of the above

315. How many OSI layers are covered in the X.25 standard?

A. two

B. three

C. seven

D. six

E. None of the above

316. A band is always equivalent to

A. a byte

B. a bit

C. 100 bits

D. 16 bits

E. None of the above

317. What is the port number for HTTP?

A. 99 B. 86

C. 80 D. 23

318. The most flexibility in how devices are wired together is provided by

A. bus networks

B. ring networks

C. star networks

D. T-switched networks

E. None of the above

319. Which of the following statement is incorrect?

A.

The transport layer provides for any format, translationer code conversion

necessary to put the data into an intelligible format.

Page 74: Cauhoitracnghiemncc (Autosaved)

B.

The presentation layer transforms information from machine format to the understandable

format.

C. The data link layer handles the transfer of data between the ends of a physical link.

D. All of the above

E. None of the above

320. When you connect to an online information service, you are asked to provide some kind of

identification such as your name, an account number and a password. What is the name given to this

brief dialogue between you and the information system?

A. Security procedure

B. Safeguard procedure

C. Identification procedure

D. Log-on procedure

E. None of the above

321. Bus is

A.

one or more conductors that some as a common

connection for a related group of devices

B.

a continuous frequency capable of being modulated or impressed

with a second signal

C.

the condition when two or more stations attempt to use the

same channel at the same time

D.

a collection of interconnected functional units that provides a

data communications service among stations attached to the

network

E. None of the above

322. Which of the following medium is used for broadband local networks?

A. Coaxial cable

B. optic fiber

C. CATV

D. UTP

E. None of the above

323. In cyclic redundancy checking what is the CRC?

A. the divisor

Page 75: Cauhoitracnghiemncc (Autosaved)

B. the quotient

C. the dividend

D. the remainder

324. What is the maximum number of entries in the HOSTS file?

A. 8

B. 255

C. 500

D. Unlimited

E. None of the above

325. The communication mode that supports data in both directions at the same time is

A. simplex

B. half-duplex

C. full-duplex

D. multiplex

E. None of the above

326. Which of the following program is used to copy files to or from another

UNIX timesharing system over a single link?

A. VMTP

B. TFTP

C. UUCP

D. UART

E. None of the above

327.One important characteristic of the hub architecture of ARC-net is

A. directionalized transmission

B. access control and addressing

C. multiple virtual networks

D. alternative routing

Page 76: Cauhoitracnghiemncc (Autosaved)

E. None of the above

328. the basic Ethernet design does not provide

A. access control

B. addressing

C. automatic retransmission of a message

D. multiple virtual networks

E. None of the above

329. Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels.

Find the line signaling speed (i.e., modulation rate)

A. 2400 bands

B. 1200 bands

C. 4800 bands

D. 9600 bands.

330. You are in the process of analyzing a problem that requires you to collect

and store TCP/IP Packets. Which of the following utilities is best suited for

this purpose?

A. NBTSTAT

B. Performance Monitor

C. NETSTAT

D. Network Monitor

E. DHCP Management Console

331. A software that allows a personal computer to pretend it as a terminal is

A. auto-dialing

B. bulletin board

C. modem

D. terminal emulation

E. None of the above

332. What is the name of the network topology in which there are bi-directional

links between each possible node?

A. Ring

Page 77: Cauhoitracnghiemncc (Autosaved)

B. Star

C. Tree

D. Mesh

E. None of the above

333. What is the main purpose of a data link content monitor?

A. to detect problems in protocols

B. to determine the type of transmission used in a data link

C. to determine the type of switching used in a data link.

D. to determine the flow of data

334. Synchronous protocols

A. transmit characters one at a time

B. allow faster transmission than asynchronous protocols do

C. are generally used by personal computers

D. are more reliable

E. None of the above

335. . To set up a bulletin board system you need

A. a smart modem with auto-answer capabilities

B. a telephone line

C. a personal computer

D. All of the above

E. None of the above

336. Videotex is a combination of

A. television

B. communication

C. computer technology

D. All of the above

E. None of the above

Page 78: Cauhoitracnghiemncc (Autosaved)

337. Which of the following frequency ranges is used for AM radio transmission?

A. Very Low Frequency : 3 kHz to 30 kHz

B. Medium Frequency : 300 kHz to 3 MHz

C. High Frequency : 3 MHz to 30 MHz

D. Very High Frequency : 30 MHz to 300 MHz

E. None of the above

338. Baseband is

A. transmission of signals without modulation

B. a signal all of whose energy is contained within a finite frequency range

C. the simultaneous transmission of data to a number of stations

D. All of the above

E. None of the above

339. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals.

Differential PCM with 4 bit relative signal value is used. Then how many bits per second are actually

sent?

A. 32 Kbps

B. 64 Kbps

C. 8 Kbps

D. 128 Kbps.

340. X.21 is

A.

a method of determining which device has access to the

transmission medium at any time

B.

a method access control technique for multiple-access

transmission media

C. a very common bit-oriented data link protocol issued by ISO

D.

network access standard for connecting stations to a

circuit-switched network

E. None of the above

341. What is the minimum number of wires required for sending data over a serial

communications links?

A. 2

Page 79: Cauhoitracnghiemncc (Autosaved)

B. 1

C. 4

D. 3

E. None of the above

342. In cyclic redundancy checking, the divisor is _____ the CRC.

A. the same size as

B. one bit less than

C. one bit more than

D. two bits more

343. Which command-line tool is included with every Microsoft TCP/IP client?

A. DHCP

B. WINS

C. PING

D. WINIPCFG

E. None of the above

344. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.

A. even B. odd

C. indeterminate D. 42

345. An error-detecting code inserted as a field in a block of data to be transmitted is known as

A. Frame check sequence

B. Error detecting code

C. Checksum

D. flow control

346. Number of bits per symbol used in Baudot code is

A. 1

B. 5

C. 8

D. 9

Page 80: Cauhoitracnghiemncc (Autosaved)

E. None of the above

347. Working of the WAN generally involves

A. telephone lines

B. microwaves

C. satellites

D. All of the above

E. None of the above

348. What does the acronym ISDN stand for?

A. Indian Standard Digital Network

B. Integrated Services Digital Network

C. Intelligent Services Digital Network

D. Integrated Services Data Network

E. None of the above

349. Which of the following services dynamically resolves NetBIOS-to-IP resolution?

A. DNS

B. DHCP

C. WINS

D. LMHOSTS

E. None of the above

350. An example of a medium-speed, switched communications service is

A. Series 1000

B. Dataphone 50

C. DDD

D. All of the above

E. None of the above

351. A devices that links two homogeneous packet-broadcast local networks, is

A. gateway

Page 81: Cauhoitracnghiemncc (Autosaved)

B. repeater

C. bridge

D. hub

E. None of the above

352. A computer that handles resource sharing and network management in a local area network.

Select the best fit for answer:

A. Network Server

B. Virtual Private Network

C. Network operating system

D. OSI

353. Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted.

As with the length of segments and the number of segments, a limit exists as to how many repeaters

can be used between any two nodes. What is the maximum number of repeaters that can be used?

A. Five B. Two

C. Four D. Six

E. Three

354. How much power (roughly) a light-emitting diode can couple into an optical fiber?

A. 100 microwatts

B. 440 microwatts

C. 100 picowatts

D. 10 milliwatts

E. None of the above

355. A modem that is attached to the telephone system by jamming the phone's handset into two

flexible receptacles in the coupler?

A. gateway

B. bridge

C. acoustic coupler

D. time-division multiplexer

E. None of the above

356. With telecommunications and a personal computer you can

Page 82: Cauhoitracnghiemncc (Autosaved)

A. "download" free public domain programs

B. send letters to be printed and delivered by the post office

C. order goods at a substantial discount

D. All of the above

E. None of the above

357.

Which of the following statement is correct?

A. Teleprinters are used for printing at remote locations, not for input.

B. Teleprinters are same as teletypes

C. Teleprinters are same as x400

D. Teleprinters have a printer for output and keyboard for input

E. None of the above

358. What does 224 translate to in binary?

A. 11110000

B. 00011110

C. 00001111

D. 11100000

E. None of the above

359. What can cause a problem with communication with a client by name but not by IP address?

A. The IP address

B. Static files such as an LMHOSTS file or a DNS database

C. Subnet mask

D. The default gateway

E. None of the above

360. Layer one of the OSI model is

A. physical layer

B. link layer

Page 83: Cauhoitracnghiemncc (Autosaved)

C. transport layer

D. network layer

E. None of the above

361. What is the term used to describe addresses available on a DHCP server?

A. Pools

B. Scopes

C. Ranges

D. Notes

E. None of the above

362. Which of the following signals is not standard RS - 232-C signal?

A. VDR

B. RTS

C. CTS

D. DSR

E. None of the above

363. What is the default subnet mask for a class B network?

A. 127.0.01

B. 255.0.0.0

C. 255.255.0.0

D. 255.255.255.0

E. None of the above

364. Which of the following files is used for NetBIOS name resolution?

A. HOSTS

B. LMHOSTS

C. ARP

D. FQDN

E. None of the above

Page 84: Cauhoitracnghiemncc (Autosaved)

365. In CRC the quotient at the sender

A. becomes the dividend at the receiver

B. becomes the divisor at the receiver

C. is discarded

D. is the remainder

366. How many pairs of stations can simultaneously communicate on Ethernet LAN?

A. 1

B. 2

C. 3

D. multiple

E. None of the above

367. The OCR reading unit attached to a POS terminal is called a

A. light pen

B. wand

C. cursor

D. All of the above

E. None of the above

368. A protocol is a set of rules governing a time sequence of events that must take

place

A. between peers

B. between modems

C. between an interface

D. across an interface

E. None of the above

369. The coming together of three technologies i.e. microelectronics, computing and

communications has ushered in

A. information explosion

B. information technology

C. business revolution

Page 85: Cauhoitracnghiemncc (Autosaved)

D. educational upgradation

E. None of the above

370. Terminals are used to

A. collect data from the physical system

B. provide information for the manager

C. communicate management decisions to the physical system

D. All of the above

E. None of the above

371. Sales persons and other employees of the company who spend much of their time away from

their offices but keep in touch with their company's microcomputers or main frame computers over

telephone lines are called

A. field workers

B. telecommuters

C. teleprocessors

D. company directors

E. None of the above

372. What is the standard protocol for network management features?

A. SNA B. FTP

C. SNMP D. SMS

373. The application layer of a network

A. establishes, maintains, and terminates virtual circuits

B. defines the user's port into the network

C. consists of software being run on the computer connected to the network

D. All of the above

E. None of the above

374. Brad is in charge of a small network and wants to make it simple but secure. The

users want to have full control over their data and still be able to share data with

the rest of the office. The networking knowledge of the office staff is excellent.

Which network(s) would be the best to set up?

A. Peer-to-peer

Page 86: Cauhoitracnghiemncc (Autosaved)

B. Master domain

C. Server-based

D. Ethernet

E. Share-level

375. The simultaneous transmission of data to a number of stations is known as

A. broadcast

B. Band width

C. Aloha

D. Analog transmission

E. None of the above

376. Most data communications involving telegraph lines use:

A. simplex lines

B. wideband channels

C. narrowband channels

D. dialed service

E. None of the above

377. You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible

number of host IDs per subnet. Which subnet mask should you assign?

A. 255.255.224.0 B. 255.255.240.0

C. 255.255.248.0 D. 255.255.252.0

E. 255.255.255.255

378. Modulation is the process of

A. sending a file from one computer to another computer

B. converting digital signals to analog signals

C. converting analog signals to digital signals

D. echoing every character that is received

E. None of the above

379. Which multiplexing technique shifts each signal to a different carrier frequency?

Page 87: Cauhoitracnghiemncc (Autosaved)

A. FDM

B. synchronous TDM

C. asynchronous TDM

D. All of the above

380. Which of the following protocol is connection-oriented?

A. IPX B. UDP

C. NetBEUI D. TCP

381. The loss in signal power as light travels down the fiber is called

A. Attenuation (su lam mong di)

B. propagation

C. scattering

D. interruption

E. None of the above

382. Operating system functions may include

A. input/output control

B. virtual storage

C. multiprogramming

D. All of the above

E. None of the above

383. Which layer of international standard organization's OSI model is responsible for creating and

recognizing frame boundaries?

A. physical layer

B. data link layer

C. transport layer

D. network layer

E. None of the above

384. Which of the following might be used by a company to satisfy its growing communications

needs?

A. front-end processor

Page 88: Cauhoitracnghiemncc (Autosaved)

B. multiplexer

C. controller

D. concentrator

E. All of the above

385. Different computers are connected to a LAN by a cable and a/an

A. modem

B. interface card

C. special wires

D. telephone lines

E. None of the above

386. The Token-Ring architecture was developed for a more efficient way to determine who should be

transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting

computers to have to retransmit their data. The use of token guarantees that only one computer can

transmit at a time. What happens as the network increases in size? Choose the best answer

A. An additional token is added for every 1,000 nodes

B.

The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater

then 500

C. The network becomes less efficient

D.

After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by

the more powerful Hyperstation Unified Bandwidth device

E. The network becomes more efficient

387. A characteristic of a multiprogramming system is:

A. simultaneous execution of program instructions from two applications

B. concurrent processing of two or more programs

C. multiple CPUs

D. All the above

E. None of the above

388. When a host knows its physical address but not its IP address, it can use _____.

A. RARP

B. ARP

Page 89: Cauhoitracnghiemncc (Autosaved)

C. IGMP

D. ICMP

E. None of the above

389. What is the name given to the exchange of control signals which is necessary for establishing a

connection between a modem and a computer at one end of a line and another modem and computer

at the other end?

A. Handshaking

B. Modem options

C. Protocol

D. Duplexing

E. None of the above

390. A communications medium that uses pulses of laser light in glass fibers. Select the

best fit for answer:

A. Fiber optic cables

B. Cellular phone systems

C. Telecommunications processors

D. Telecommunications software

391. After you have verified that TCP/IP is installed correctly, what is the next step in verifying the

TCP/IP configuration?

A. Ping the broadcast address

B. Ping the Microsoft Web site

C. Ping a distant router.

D. Ping the address of the local host

E. None of the above

392. Which utility is useful for troubleshooting NetBIOS name resolution problems?

A. NBTSTAT

B. Netstat

C. PING

D. Hostname

Page 90: Cauhoitracnghiemncc (Autosaved)

E. None of the above

393. The EIA-232 interface has _____ pins.

A. 20 B. 24

C. 25 D. 30

394. In OSI model, which of the following layer transforms information from machine format into that

understandable by user

A. application

B. presentation

C. session

D. physical

E. None of the above

395. The channel in the data communication model can be

A. postal mail service

B. telephone lines

C. radio signals

D. All of the above

E. None of the above

396. . Which of the following is an important characteristic of LAN?

A. application independent interfaces

B. unlimited expansion

C. low cost access for low bandwidth channels

D. parallel transmission

E. None of the above

397. Which of the following is a wrong example of network layer:

A. Internet Protocol (IP) ARPANET

B. X. 25 Packet Level Protocol (PLP) - ISO

C. Source routing and Domain naming - Usenet

D. X.25 level 2 - ISO

Page 91: Cauhoitracnghiemncc (Autosaved)

E. None of the above

398. A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can

you tell how long will it take?

A. 2 seconds

B. 20 seconds

C. 120 seconds

D. 12 seconds

E. None of the above

399. Telecommunications networks come in a wide range of speed and capacity capabilities. Select the

best fit for answer:

A. Bandwidth alternatives

B. Switching alternating

C. Inter organizational networks

D. Extranets

400. Which of the following statements is correct?

A. characteristic of the hub architecture of ARC-net is alternative routing.

B. characteristic of LAN is unlimited expansion

C. characteristic of LAN is low cost access for low bandwidth channels

D. characteristic of the hub architecture of ARC-net is directionalized transmission

E. None of the above

401. A modem is connected in between a telephone line and a

A. network

B. computer

C. communication adapter

D. serial port

E. None of the above

402. What frequency range is used for TV transmission and low power microwave applications?

A. Very Low Frequency : 3 kHz to 30 kHz

B. Medium Frequency : 300 kHz to 3 MHz

Page 92: Cauhoitracnghiemncc (Autosaved)

C. Ultra High Frequency : 300 MHz to 3000 MHz

D. Super High Frequency : 3000 MHz to 30000 MHz

E. None of the above

403. Which of the following statement is correct?

A.

Satellite transponders use a higher frequency for reception of radiation from earth

stations and lower frequency for transmission to earth stations.

B.

Satellite transponders contain a device that echos the radiation without change from one

point on earth to another

C.

Satellite transponder contain devices that transform the message sent from one location on

earth to a different code for transmission to another location

D.

satellite transponders us lower frequency reception of radiation from earth stations and

higher frequency for transmission to earth stations

E. None of the above

404. We can receive data either through our television aerial or down our telephone lines and display

this data on our television screen. What is the general name given to this process?

A. Viewdata

B. Teletext

C. Telesoftware

D. Videotex

E. None of the above

405. ASK, PSK, FSK, and QAM are examples of _____ encoding.

A. digital-to-digital B. digital-to-analog

C. analog-to-analog D. analog-to-digital

406. The data-link layer, in reference to the OSI model, specifies

A.

data link procedures that provide for the exchange of data via frames that can be

sent and received

B. the interface between the X.25 network and packet mode device

C. the virtual circuit interface to packet-switched service

D. All of the above

E. None of the above

407. What function does a serial interface perform in data communication?

Page 93: Cauhoitracnghiemncc (Autosaved)

A. Converts serial data into audio signals

B. Converts analog signals into digital signals

C. Converts parallel data into a stream of bits

D. Decodes incoming signals into computer data

E. None of the above

408. You need to determine whether IP information has been assigned to your Windows NT. Which

utility should you use?

A. NBTSTAT B. NETSTAT

C. IPCONFIG D. WINIPCFG

E. PING

409. Eight stations are competing for the use of the shared channel using the modified Adaptive free

walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once, how many bit

slots are needed to resolve the contention?

A. 1 slots

B. 5 slots

C. 10 slots

D. 14 slots

410.

When two computers communicate with each other, they send information back and forth. If they are

separated by a reasonable distance, they can send and receive the information through a direct cable

connection which is called a null-modem connection. Presently what is the maximum distance in

metres permitted in this null-modem connection?

A. 80

B. 100

C. 30

D. 150

E. None of the above

411. Modulation in which the two binary values are represented by two different amplitudes

of the carrier frequency is known as

A. Amplitude-shift keying

B. Amplitude

Page 94: Cauhoitracnghiemncc (Autosaved)

C. Amplitude modulation

D. Aloha

E. None of the above

412. You have been contracted to install a windows NT network in an office that is located in a

strip mall. The office is located next to the power plant of the building, so a UPS

(uninterruptible power supply) has already been installed. What type of cable should you

use for the network cabling? Choose the best answer.

A. TI B. UTP

C. Fiber-optic D. PSTN

E. STP

413. Communication circuits that transmit data in both directions but not at the same time are

operating in

A. a simplex mode

B. a half-duplex mode

C. a full-duplex mode

D. an asynchronous mode

E. None of the above

414. In a synchronous modem, the digital-to-analog converter transmits signal to the

A. equalizer

B. modulator

C. demodulator

D. terminal

E. None of the above

415. If the client receives an address from a DHCP server, what is the only information available

in the Network Properties dialog box?

A. The IP address

B. The subnet address

C. That the client is receiving its address from DHCP

D. The default gateway

E. None of the above

Page 95: Cauhoitracnghiemncc (Autosaved)

416. An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is

A. X.75

B. X.25

C. X.400

D. X.21

E. None of the above

417. Which of the following TCP/IP protocol is used for transferring files from one machine to another?

A. RARP

B. ARP

C. TCP

D. FTP

E. None of the above

418. Which of the following is an example of bounded medium?

A. Coaxial cable

B. Wave guide

C.

Fiber optic cable

All of the above

D. None of the above

419. Which transmission mode is used for data communication along telephone lines?

A. Parallel

B. Serial

C. Synchronous

D. Asynchronous

E. None of the above

420. Who invented the modem?

A. Wang Laboratories Ltd.

B. AT & T Information Systems, USA

C. Apple Computers Inc.

Page 96: Cauhoitracnghiemncc (Autosaved)

D. Digital Equipment Corpn.

E. None of the above

421. With an IP address starting at 200, you currently have 10 subnets. What subnet mask should

you use to maximize the number of available hosts?

A. 192 B. 224

C. 240 D. 248

E. 252

422. Which of the following communications modes support two-way traffic but in only one direction

of a time?

A. simplex

B. half-duplex

C. three-quarters duplex

D. full-of the above

E. None of the above

423. Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address

from a server?

A. RDP

B. RARP

C. RIP

D. X.25

E. None of the above

424. In OSI network architecture, the dialogue control and token management are responsibilities

of

A. session layer

B. network layer

C. transport layer

D. data link layer

E. None of the above

425. Which of the following transmission systems provides the highest data rate to an individual

device

Page 97: Cauhoitracnghiemncc (Autosaved)

A. Computer bus

B. Telephone lines

C. Voice band modem

D. leased lines

E. None of the above

426. Which of the following connectivity devices is used to extend a network on a purely mechanical

basis?

A. Gateway

B. Switch

C. Router

D. Active hub

427. The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI

model. A number of standards were agreed upon during that time. Which of the following is the

standard for Ethernet?

A. 802.2 B. 802.3

C. 802.4 D. 802.5

E. 802.6

428. Which of the following digits are known as the terminal number of the Network User Address

(NUA)?

A. 5-7

B. 1-4

C. 8-12

D. 13-14

E. None of the above

429. Which of the following device is used with an X.25 network to provide service to asynchronous

terminals

A. repeater

B. bridges

C. gateway

D. Packet assembler/disassemble

Page 98: Cauhoitracnghiemncc (Autosaved)

E. None of the above

430. A medium access control technique for multiple access transmission media is

A. Aloha

B. Amplitude

C. Angle modulation

D. Attenuation

E. None of the above

431. The core diameter of a single-mode fibers is about

A. 10 times the wavelength of the light carried in the fiber

B. 10 times the fiber radius

C. 7 times the light carried in the fiber

D. 3 times the wavelength of the light carried in the fiber

E. None of the above

432. Which of the following TCP/IP protocol is used for remote terminal connection service?

A. TELNET

B. FTP

C. RARP

D. UDP

E. None of the above

433. Networks where end user workstations are tied to LAN servers to share resources and application

processing.

A. Internetworked enterprise

B. Information super highway

C. Business applications of telecommunications

D. Client/Server networks

434. The frequency range : 300 kHz to 3 MHz is used for

A. AM radio transmission

B. FM radio transmission

Page 99: Cauhoitracnghiemncc (Autosaved)

C. TV transmission

D. microwave communications, satellite and radar

E. None of the above

435. With an IP address of 201.142.23.12, what is your default subnet mask?

A. 0.0.0.0

B. 255.0.0.0

C. 255.255.0.0

D. 255.255.255.0

E. None of the above

436. IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____

sublayer.

A. HDLC, PDU

B. PDU, HDLC

C. MAC, LLC

D. LLC, MAC

E. None of the above

437. Two computers that communicate with each other use a simple parity check to detect errors for

ASCII transmissions. Which of the following events will always lead to an undeleted error?

A. one bit or any odd number of bits inverted in a block of data during transmission

B. two bits or any even number of bits inverted in a block during transmission

C. one bit or any odd number of bits inverted in a byte during transmission

D. two bits or any even number of bits inverted in a byte during transmission

E. None of the above

438. Which utility is an all-purpose tool for troubleshooting TCP/IP problems?

A. NBTSTAT

B. Netstat

C. PING

D. Hostname

Page 100: Cauhoitracnghiemncc (Autosaved)

E. None of the above

439. In communication satellite, multiple repeaters are known as

A. detector

B. modulator

C. stations

D. transponders

E. None of the above