1. The connection to the Internet can be broken down into which of the following? A. Physical connection B. Logical connection C. Applications D. All of the above
2. What is the main circuit board of a computer? A. PC subsystem B. Motherboard C. Backplane D. Computer memory 3. What is a NIC? A. A WAN adapter
B. A printed circuit board that provides network communication C. A card used only for Ethernet networks D. A standardized data link layer address 4. Which number system is based on powers of 2? A. Octal B. Hexadecimal C. Binary D. ASCII
5. Match the following terms with their definitions.
Bit Byte The smallest unit of data in a computer A standard measurement of the rate at which data is transferred over a network connection kbps A unit of frequency; the rate of change in the state or cycle in a sound wave, alternating current, or another cyclical waveform A unit of measure that describes the size of a data file, the amount of space on a disk or another storage medium, or the amount of data being transferred over a network MHz 6. What is the largest decimal value that can be stored in 1 byte? A. 254 B. 256 C. 255 D. 257
7. What is the decimal number 151 in binary? A. 10100111 B. 10010111 C. 10101011 D. 10010011
8. What is the binary number 11011010 in decimal? A. 186 B. 202 C. 218 D. 222
9. What is the binary number 0010000100000000 in hexadecimal? A. 0x2100 B. 0x2142 C. 0x0082 D. 0x0012
10. What is the hexadecimal number 0x2101 in binary? A. 0010 0001 0000 0001
B. 0001 0000 0001 0010 C. 0100 1000 0000 1000 D. 1000 0000 1000 0100
11. Which of the following statements is true of ping?
A. The ping command is used to test a device’s network connectivity. B. Ping stands for packet Internet groper.
C. The ping 127.0.0.1 command is used to verify the operation of the TCP/IP stack and the NIC transmit/receive function. D. All of the above
12.Which classes of IP addresses are available for use as unicast IP addresses? (Pick three correct answers.) a. A b. B c. C d. D e. E
13. What class of address is 224.0.0.6? a. A b. B c. C d. D e. E
14.From what class of network is binary address 01100001.11010011.11110001.00000001? a. A b. B c. C d. D e. E
15.From what class of network is binary address 11010010.10101101.01111010.10000001? a. A b. B c. C d. D e. E
16. How many Class C networks exist? a. 16,382 b. 126
c. 2,097,152 d. 65,534
17.How many valid host addresses are available on a Class B network that is not subnetted? a. 254 b. 65,536 c. 16,382 d. 65,534
18.Which of the following are valid host addresses for use on the Internet? a. 224.235.55.1 b. 172.16.100.1 c. 172.32.100.1 d. 127.0.0.1
e. None of the other answers are correct
19. How many bytes does an IP v4 address have? a. 1 b. 4 c. 2 d. 3
20. What is the Network address for 168.25.111.245? a. 168.25.0.1 b. 168.25.111.0 c. 168.25.0.0 d. 168.0.0.0
21.Which of the following combination of addresses and subnet masks will give exactly 30 valid host addresses?
a. 192.253.89.0 255.255.255.224 b. 222.3.23.0 255.255.255.192 c. 201.147.85.0 255.255.255.240 d. 198.25.35.0 255.255.255.128
22.Which of the following are valid subnets for the network 192.168.55.0 if it is subnetted with the mask 255.255.255.224? (Pick two correct answers.) a. 192.168.55.0 255.255.255.224 b. 192.168.55.96 255.255.255.224 c. 192.168.55.80 255.255.255.224 d. 192.168.55.160 255.255.255.224
23.Which of the following are valid host addresses for the subnet 205.64.168.128 255.255.255.192? (Pick two correct answers.)
a. 205.64.168.191 255.255.255.192
b. 205.64.168.212 255.255.255.192 c. 205.64.168.130 255.255.255.192 d. 205.64.168.189 255.255.255.192
24.What is the valid host address range for the subnet 199.56.2.136 255.255.255.248? a. .136 - .144 b. .137 - .143 c. .137 - .138 d. .137 - .142
25.How many bits are borrowed from the host portion of the default subnet mask given the subnet 122.26.29.192 255.255.255.192? a. 8 b. 16 c. 24 d. 20 e. 18 f. 14
26.What is the broadcast address of the first valid subnet for 94.0.0.0 using a 23 bit subnet mask? a. 94.0.2.255 b. 94.0.3.255 c. 94.0.0.255 d. 94.0.1.255
27.What is the valid host range for the 5th valid subnet of 192.168.25.0 using a 255.255.255.240 subnet mask?
a. 192.168.25.81 – 192.168.25.94 b. 192.168.25.65 – 192.168.25.94 c. 192.168.25.49 – 192.168.25.54 d. 192.168.25.97 – 192.168.25.104
28.To what address class does the host 191.253.68.17 with a subnet mask of 255.255.255.0 belong? a. A b. B c. C d. D e. E
29. What is the network portion of the following address: 118.128.192.254? (assume a default classful network) a. 118 b. 118.128 c. 118.128.192
d. None of the above
30.Which of the following is a valid host address on a Class B network? a. 151.16.255.0 b. 135.246.255.255 c. 188.112.0.0 d. 192.11.252.1
31. Which of the following describe the default subnet mask for a class C network? (Pick two correct answers.) a. 255.255.0.0 b. /16 c. /24
d. 255.255.255.0
Chapter 2: Networking Fundamentals
1. What was the first type of microcomputer network to be implemented? A. MAN B. WAN C. LAN D. PAN
2. What is the information that is “burned in” to a network interface card? A. NIC B. MAC address C. Hub D. LAN
3. Which topology has all its nodes connected directly to one center point and has no other connections between nodes? A. Bus B. Ring C. Star D. Mesh
4. LANs are designed to do which of the following? (Select all that apply.) A. Operate within a limited geographic area B. Allow many users to access high-bandwidth media C. Connect to the Internet
D. Provide full-time connectivity to local services
5. Which of the following statements best describes a WAN? A. It connects LANs that are separated by a large geographic area.
B. It connects workstations, terminals, and other devices in a metropolitan area. C. It connects LANs within a large building.
D. It connects workstations, terminals, and other devices within a building. 6. Which of the following statements correctly describes a MAN?
A. A MAN is a network that connects workstations, peripherals, terminals, and other devices in a single building.
B. A MAN is a network that serves users across a broad geographic area. It often uses transmission devices provided by common carriers.
C. A MAN is a network that spans a metropolitan area such as a city or suburban area.
D. A MAN is a network that is interconnected by routers and other devices and that functions as a single network.
7. Which of the following is not one of the features of a SAN?
A. SANs enable concurrent access of disk or tape arrays, providing enhanced system performance. B. SANs provide a reliable disaster recovery solution. C. SANs are scalable.
D. SANs minimize system and data availability.
8. What service offers secure, reliable connectivity over a shared public network infra structure A. Internet
B. Virtual private network C. Virtual public network D. WAN
9. What is the movement of data through layers? A. Wrapping B. Encapsulation C. Traveling D. Transmission
10. The OSI model has how many layers? A. Four B. Five C. Six D. Seven
11. What is the OSI model?
A. A conceptual framework that specifies how information travels through networks B. A model that describes how data makes its way from one application program to another throughout a network
C. A conceptual framework that specifies which network functions occur at each layer D. All of the above
12. Which of the following is the correct order of the network layers? A. 1: Physical 2: Data link 3: Transport 4: Network 5: Presentation 6: Session 7: Application B. 1: Physical 2: Data link 3: Network 4: Transport 5: Session 6: Presentation 7: Application C. 1: Physical 2: Data link 3: Network 4: Session
5: Transport 6: Application 7: Presentation - D. I: Physical 2: Network 3: Session 4: Data link 5: Transport 6: Application 7: Presentation
13. Which layer of the OSI model handles physical addressing, network topology, network access, and flow control? A. The physical layer B. The data link layer C. The transport layer D. The network layer
18. Which of the following best defines encapsulation?
A. Segmenting data so that it flows uninterrupted through the network B. Compressing data so that it moves faster C. Moving data in groups so that it stays together D. Wrapping data in a particular protocol header
14. An e-mail message is sent from Host A to Host B on a LAN. Before this message can be sent, the data must be encapsulated. Which of the following best describes what happens after a packet is constructed?
A. The packet is transmitted along the medium. B. The packet is encapsulated into a frame. C. The packet is segmented into frames. D. The packet is converted to binary format.
15. In the TCP/IP model, which layer deals with reliability, flow control, and error correction? A. Application B. Transport C. Internet D. Network access
16. Repeaters can provide a simple solution for what problem? A. Too many types of incompatible equipment on the network B. Too much traffic on a network C. Too-slow convergence rates
D. Too much distance between nodes or not enough cable
17. Which of the following is true of a bridge and its forwarding decisions? A. Bridges operate at OSI Layer 2 and use IP addresses to make decisions. B. Bridges operate at OSI Layer 3 and use IP addresses to make decisions. C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions. D. Bridges operate at OSI Layer 3 and use MAC addresses to make decisions. 18. Which of the following is true of a switch’s function? A. Switches increase the size of collision domains.
B. Switches combine the connectivity of a hub with the capability to filter or flood traffic based on the destination MAC address of the frame.
C. Switches combine the connectivity of a hub with the traffic direction of a router. D. Switches perform Layer 4 path selection. 19. What does a router route? A. Layer 1 bits B. Layer 2 frames C. Layer 3 packets D. Layer 4 segments
32. Which layer of the TCP/IP model defines protocols for host-to-host application communication? a. Internet b. Host-to-host
c. Network access d. Application
33. Which of the following is a protocol that resides at the Internet layer of the TCP/IP model?
(Pick two correct answers.) a. SNMP b. ICMP c. TCP d. ARP
34. Which layer of the TCP/IP model does the Transport layer of the OSI model correspond to? a. Internet b. Transport
c. Network access d. Application
35. Which layer of the OSI model does SMTP operate at? a. Session b. Transport c. Network d. Application
36. Which of the following OSI layers is concerned with managing communications between
applications? a. Transport b. Session
c. Presentation d. Data Link
37. Which of the following is the PDU (Protocol Data Unit) of the Transport layer? a. Frame b. Bit c. Packet d. Segment
Chapter 6: Ethernet Fundamentals
1. Which of the following is not one of the recognized IEEE sublayers? A. Media Access Control B. Data Link Control C. Logical Link Control D. None of the above
2. The recognized IEEE 802.3 sublayers are concerned with what layers of the OSI reference model? A. 2 and 3 B. l and 2 C. 3 and 4 D. 1 and 3
3. The LLC, as a sublayer, participates in which process? A. Encryption B. Encapsulation C. Framing D. All of the above
4. What do the first six hexadecimal numbers in a MAC address represent? A. Interface serial number
B. Organizationally unique identifier C. Interface unique identifier D. None of the above
5. MAC addresses are how many bits in length? A. 12 B. 24 C. 48 D. 64
6. What is the name of the access method used in Ethernet that explains how Ethernet works?
A. TCP/IP B. CSMA/CD C. CMDA/CS D. CSMA/CA
7. Where does the MAC address reside? A. Transceiver B. Computer BIOS C. NIC D. CMOS
8. Which of the following statements best describes communication between two devices on a LAN? A. The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it, but the devices with nonmatching addresses otherwise ignore the frame.
B. The source encapsulates the data and places a destination MAC address in the frame. It puts the frame on the LAN, where only the device with the matching address can check the address field. C. The destination device encapsulates data in a frame with the MAC address of the source device and puts it on the LAN. The device with the matching address removes the frame.
D. Each device on the LAN receives the frame and passes it up to the computer, where software decides whether to keep or to discard the frame. 9. Which functions are associated with framing?
A. Identifies which computers are communicating with one another
B. Signals when communication between individual computers begins and when it ends C. Flags corrupted frames D. All of the above
10. Media Access Control refers to what?
A. The state in which a NIC has captured the networking medium and is ready to transmit B. Rules that govern media capture and release
C. Rules that determine which computer on a shared-medium environment is allowed to transmit the data
D. A formal byte sequence that has been transmitted
11. Which best describes a CSMA/CD network?
A. One node’s transmission traverses the entire network and is received and examined by every node.
B. Signals are sent directly to the destination if the source knows both the MAC and IP addresses. C. One node’s transmission goes to the nearest router, which sends it directly to the destination. D. Signals always are sent in broadcast mode
12. In an Ethernet or IEEE 802.3 LAN, when do collisions occur?
A. When one node places a packet on a network without informing the other nodes B. When two stations listen for traffic, hear none, and transmit simultaneously C. When two network nodes send packets to a node that no longer is broadcasting D. When jitter is detected and traffic is disrupted during normal transmission 13. Which is an important Layer 2 data link layer function? A. Logical link control B. Addressing
C. Media access control D. All of the above
14. Which is true of a deterministic MAC protocol? A. It defines collisions and specifies what to do about them
B. It allows the hub to determine the number of users active at any one time. C. It allows hosts to “take turns” sending data.
D. It allows the use of a “talking stick” by network administrators to control the media access of any users considered “troublemakers.”
15.What is the longest length of a cable run for UTP 1Gbps transmission? a. 100m b. 500m c. 185m d. 200m
16.What topology types describe a LAN with 5 PCs connected via a switch? (Pick two correct answers.)
a. Physical bus b. Physical star
c. Physical Full mesh d. Physical Partial mesh e. Logical bus f. Logical star
17.Which of the following are benefits of fiber cabling over copper? (Pick three correct answers.) a. Longer cable runs b. Less expensive
c. Not susceptible to electro-magnetic interference (EMI) d. Not susceptible to radio frequency interference (RFI)
18. Which three of the following companies were involved with the development of original Ethernet? (Pick three correct answers.) a. Cisco b. Xerox c. DEC
d. Northern Telecom e. Intel
f. Microsoft
19. Which IEEE standard defines the Ethernet MAC sub-layer? a. IEEE 802.2 b. IEEE 802.3 c. IEEE 802.4 d. IEEE 802.5
20. What type of topologies did older 10BASE2 Ethernet networks use? (Pick two correct answers.) a. Physical loop b. Physical bus c. Physical star d. Logical star e. Logical loop f. Logical bus
21. Which of the following describe a network comprised of PCs connected via a 10BASE-T hub, or shared Ethernet? (Pick two correct answers.) a. Physical bus b. Logical Star c. Physical Star d. Logical Bus e. Physical ring
Chapter 8: Ethernet Switching
1. Which of the following is not a feature of microsegmentation? A. It enables dedicated access.
B. It supports multiple conversations at any given time.
C. It increases the capacity for each workstation connected to the network. D. It increases collisions.
2. Which of the following is used by LAN switches for making the forwarding decision? A. IP address B. MAC address C. Network address D. Host address
3. Which of the following is a feature of full-duplex transmission? A. It offers two 10-Mbps to 1-Gbps data-transmission paths. B. It doubles bandwidth between nodes. C. It provides collision-free transmission. D. All of the above.
4. What are the three common types of switching methods? What are the five states of a STP interface?
5. The Spanning Tree Protocol allows which of the following? A. Bridges to communicate Layer 3 information
B. A redundant Layer 2 network path without suffering the effects of loops in the network C. Static network paths for loop prevention D. None of the above
6. Which of the following is not one of the STP port states? A. Blocking B. Learning C. Listening
D. Transmitting
7. Which of the following is true concerning a bridge and its forwarding decisions? A. Bridges operate at OSI Layer 2 and use IP addresses to make decisions. B. Bridges operate at OSI Layer 3 and use IP addresses to make decisions. C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions. D. Bridges operate at OSI Layer 3 and use MAC addresses to make decisions. 8. Which of the following is not a feature of bridges? A. They operate at Layer 2 of the OSI model. B. They are less intelligent than hubs. C. They make forwarding decisions. D. They build and maintain address tables.
9. Which of the following statements is true of microsegmentation? A. Each workstation gets its own dedicated segment through the network. B. All the workstations are grouped as one segment.
C. Microsegmentation increases the number of collisions on a network. D. None of the above.
10. Which of the following is true for LAN switches? A. They repair network fragments known as microsegments. B. They are very high-speed multiport bridges C. Lower bandwidth makes up for higher latency.
D. They require new network interface cards on attached hosts.
11. What is a network area called where two or more Ethernet stations are separated by a bridge or Layer 2 switch, in which data frames originate and collide? A. Collision domain B. Network domain C. Broadcast domain D. Network segment
12. Using repeaters does which of the following to the collision domain?
A. Reduces B. Has no effect on C. Extends
D. None of the above
13. The process of using the complex networking devices, such as bridges, switches, and routers, to break up the collision domains is known as which of the following? A. Sectioning B. Segmentation
C. Collision domain reduction D. None of the above
因篇幅问题不能全部显示,请点此查看更多更全内容