Académique Documents
Professionnel Documents
Culture Documents
Assessment System
Time Remaining:
1 Top of Form
The Internet is an example of which type of network?
LAN
SAN
WAN
WLAN
Bottom of Form
2 Top of Form
Which suite of protocols is used to transmit data across the Internet?
Appletalk
ARP
DNS
IPX/SPX
TCP/IP
Bottom of Form
3 Top of Form
Workers are required to access the company LAN when traveling. Which networking technology can provide
secure and encrypted access to the LAN?
ADSL
ISDN
VPN
WAN
Bottom of Form
4 Top of Form
Which two statements are true of network computing in contrast to non-network computing? (Choose two.)
File duplication is more likely.
5 Top of Form
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choo
three.)
The network is small with less than eight users.
The company network requires secure access to confidential information.
The users need a central database to store inventory and sales information.
The data gathered by the employees is critical and should be backed up on a regular basis.
All employees passed a strict background check as part of the corporate hiring practices.
Bottom of Form
6 Top of Form
Which Windows XP command displays the route taken by packets crossing an IP network?
iproute
netview
nslookup
ping
tracert
Bottom of Form
7 Top of Form
Which networking protocol translates a network name such as www.cisco.com to a unique IP address?
APIPA
ARP
DHCP
DNS
Proxy ARP
Bottom of Form
8 Top of Form
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
3280 ft (1000 m)
1640 ft (500 m)
984 ft (300 m)
607 ft (185 m)
328 ft (100 m)
Bottom of Form
9 Top of Form
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation
the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a
computer to get such an IP address?
a bad network cable
10 Top of Form
Which dotted decimal number is used to distinguish the network portion of an IP address from the host portio
default gateway
MAC address
physical address
subnet mask
Bottom of Form
11 Top of Form
What is the most commonly used DSL technology?
ADSL
HDSL
IDSL
SDSL
VDSL
Bottom of Form
12 Top of Form
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school
network. What is the first thing that the student should check?
the laptop battery level
13 Top of Form
Which procedure is normally performed when connecting a computer to an Ethernet network for the first tim
Manually assign an IP address.
14 Top of Form
Which device enables computers to be attached to a network without segmenting the network?
bridge
hub
router
switch
Bottom of Form
15 Top of Form
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
The distance a signal can travel through the cable.
The number of twists in the wires inside the cable.
Top of Form
Close Window
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window
Assessment System
16 Top of Form
What is true about the TIA/EIA?
It develops and maintains the 802 standards for LANs.
It developed standards to replace proprietary standards after U.S. telephone industry deregulation.
Bottom of Form
17 Top of Form
A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. Th
technician then notes that the link lights are not active on the NIC. Which two problems could be indicated b
this lack of activity? (Choose two.)
faulty NIC
bad IP address
18 Top of Form
Why should network cables always be labeled?
to prevent cable wear
to improve appearance
19 Top of Form
Which method is recommended in order to avoid problems with counterfeit network equipment?
Buy extra parts in case one fails.
20 Top of Form
Which two characteristics describe Ethernet technology? (Choose two.)
supported by IEEE 802.3 standards
Top of Form
Close Window
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
Bottom of Form
Top of Form
Bottom of Form