1. What is the decimal equivalent to the hexadecimal number E6D3?
A. 59019
B. 59091
C. 59136
D. 59093
Answer::-B.
2. Convert the decimal number 2989 to hex.
A. FDD1
B. BAD
C. TED
D. CAD
Answer::- B.
3. MAC address are _________ bits in length.
A. 12
B. 24
C. 48
D. 64
Answer::- C.
4. Where does the MAC address reside?
A. Transceiver
B. Computer BIOS
C. NIC
D. CMOS
Answer::- C.
5. Which of the following statements best describes communication between two devices on a LAN?
A. The source device encapsulates data in a frame with the MAC address of the destination device, and then transmits it. Everyone on the LAN sees it, but the devices with non-matching addresses otherwise ignore the frame.
B. The source encapsulates the data and places a destination MAC address in the frame. It puts the frame on the LAN, where only the device with the matching address can check the address field.
C. The destination device encapsulates data in a frame with the MAC address of the source device, puts it on the LAN, and the device with the matching address removes the frame.
D. Each device on the LAN receives the frame and passes it up to the computer, where software decides whether to keep or to discard the frame.
Answer::-A.
6. Which are the functions associated with framing?
A. Identifies which computers are communicating with one another
B. Signals when communication between individual computers begins and when it ends
C. Flags corrupted frames
D. All of the above
Answer::-D.
7. How does a computer on a LAN detect an error in a frame?
A. It sends a copy of the frame back to the sender for verification.
B. It checks the destination address to verify that the frame was really intended for them.
C. It compares an FCS in the frame to one that the computer calculates from the contents of the frame.
D. It calculates a checksum from the data in the frame, and then sends it back to the source for verification.
Answer::- C.
8. Which best describes a CSMA/CD network?
A. One node's transmission traverses the entire network and is received and examined by every node.
B. Signals are sent directly to the destination if the source knows both the MAC and IP addresses.
C. One node's transmission goes to the nearest router, which sends it directly to the destination.
D. Signals are always sent in broadcast mode.
Answer::- A.
9. Which best describes broadcasting?
A. Sending a single frame to many stations at the same time
B. Sending a single frame to all routers to simultaneously update their routing tables
C. Sending a single frame to all routers at the same time
D. Sending a single frame to all hubs and bridges at the same time
Answer::- A.
10. A half-duplex circuit means
A. Only one side can talk at a time
B. The signal strength is cut in half
C. The signal strength is doubled
D. Two hosts can talk simultaneously
Answer::-A.
11. Attenuation means
A. Travel
B. Delay
C. A signal losing strength over distance
D. Loss of signal due to EMI
Answer::-C.
12. Which of the following is an external source of electrical impulses that can attack the quality of electrical signals on a cable?
A. EMI caused by electrical motors
B. RFI caused by electrical motors
C. Impedance caused by radio systems
D. EMI caused by lightning
Answer::- A.
13. What is the primary cause of crosstalk?
A. Cable wires that are too large in diameter
B. Too much noise in a cable's data signal
C. Electrical motors and lighting
D. Electrical signals from other wires in a cable
Answer::-D.
14. Which of the following describes cancellation?
A. Wires in the same circuit cancel each other's electrical current flow.
B. Cancellation is a commonly used technique to protect the wire from undesirable interference.
C. The magnetic fields from one cable run cancel magnetic fields of another cable run.
D. External magnetic fields cancel the fields inside network cabling.
Answer::- B.
15. What is it called when two bits from two different communicating computers are on a shared medium at the same time?
A. Latency
B. Dispersion
C. Collision
D. Obstruction
Answer::-C.
16. Reflection does not occur with what kind of signals?
A. Electrical
B. Radio waves
C. Microwaves
D. None of the above
Answer::- D.
17. __________ means to convert binary data into a form that can travel on a physical communications link.
A. Encoding
B. Decoding
C. Encrypting
D. Decrypting
Answer::- A.
18. Which of the following is the correct order for the network layers?
A. 1: Physical 2: Data Link 3: Transport 4. Network 5: Presentation 6: Session 7: Application
B. 1: Physical 2: Data Link 3: Network 4: Transport 5: Session 6: Presentation 7: Application
C. 1: Physical 2: Data Link 3: Network 4: Session 5: Transport 6: Application 7: Presentation
D. 1: Physical 2: Network 3: Session 4: Data Link 5: Transport 6: Application 7: Presentation
Ans::- B.
19. Which layer of the OSI model handles error detection, network topology, and medium access?
A. The physical layer
B. The data link layer
C. The transport layer
D. The network layer
Ans::- B.
20. Which layer of the OSI model establishes, maintains, and manages sessions between applications?
A. The transport layer
B. The session layer
C. The presentation layer
D. The application layer
Answer::-B.
21. Which best describes the function of the presentation layer?
A. It provides data representation and code formatting.
B. It handles error notification, network topology, and flow control.
C. It provides network services to user applications.
D. It provides electrical, mechanical, procedural, and functional means for activating and maintaining the link between systems.
Answer::-A.
22. Which layer of the OSI model provides network services to user applications?
A. The transport layer
B. The session layer
C. The presentation layer
D. The application layer
Answer::-D.
23. Which layer offers provisions for data expedition, class of service, and exception reporting?
A. Session
B. Presentation
C. Network
D. Data link
Answer::-A.
24. Which of the following statements regarding encapsulation is untrue?
A. Encapsulation allows computers to communicate data.
B. If one computer wants to send data to another computer, the data first must be packaged by a process called encapsulation.
C. Encapsulation occurs at one layer.
D. Encapsulation wraps data with the necessary protocol information before network transit.
Answer::- C.
25. Which of the following correctly describes the five conversion steps of data encapsulation when one computer sends an e-mail message to another computer?
A. Data, segments, packets, frames, bits
B. Bits, frames, packers, segments, data
C. Packets, segments, data, bits, frames
D. Segments, packets, frames, bits, data
Answer::- A.
26. An e-mail message is sent from Host A to Host B on a LAN. To send this message, the data must be encapsulated. Which of the following best describes the first step of data encapsulation?
A. Alphanumeric characters are converted into data.
B. The message is segmented into easily transportable chunks.
C. A network header is added to the message (source and destination addresses).
D. The message is converted into binary format.
Answer::- A.
27. An e-mail message is sent from Host A to Host B on a LAN. Before you can send this message, the data must be encapsulated. Which of the following best describes what happens after a packet is constructed?
A. The packet is transmitted along the medium.
B. The packet is put into a frame.
C. The packet is segmented into frames.
D. The packet is converted to binary format.
Answer::- B.
28. An e-mail message is sent from Host A to Host B on a LAN. Before you can send this message, the data must be encapsulated. Which of the following best describes what happens after the e-mail message's alphanumeric characters are converted into data?
A. The data is converted into binary format.
B. A network header is added to the data.
C. The data is segmented into smaller chunks.
D. The data is put into a frame.
Answer::- C.
29. Which best describes a datagram?
A. A message sent to the source to confirm the receipt of uncorrupted data
B. A binary representation of routing information
C. A data packet less than 100 bytes in size
D. A network layer packet
Answer::- D.
30. Which of the following layers of the OSI model is not present in the TCP/IP protocol stack?
A. Transport
B. Network
C. Internet
D. Data link
Answer::- D.
A. 59019
B. 59091
C. 59136
D. 59093
Answer::-B.
2. Convert the decimal number 2989 to hex.
A. FDD1
B. BAD
C. TED
D. CAD
Answer::- B.
3. MAC address are _________ bits in length.
A. 12
B. 24
C. 48
D. 64
Answer::- C.
4. Where does the MAC address reside?
A. Transceiver
B. Computer BIOS
C. NIC
D. CMOS
Answer::- C.
5. Which of the following statements best describes communication between two devices on a LAN?
A. The source device encapsulates data in a frame with the MAC address of the destination device, and then transmits it. Everyone on the LAN sees it, but the devices with non-matching addresses otherwise ignore the frame.
B. The source encapsulates the data and places a destination MAC address in the frame. It puts the frame on the LAN, where only the device with the matching address can check the address field.
C. The destination device encapsulates data in a frame with the MAC address of the source device, puts it on the LAN, and the device with the matching address removes the frame.
D. Each device on the LAN receives the frame and passes it up to the computer, where software decides whether to keep or to discard the frame.
Answer::-A.
6. Which are the functions associated with framing?
A. Identifies which computers are communicating with one another
B. Signals when communication between individual computers begins and when it ends
C. Flags corrupted frames
D. All of the above
Answer::-D.
7. How does a computer on a LAN detect an error in a frame?
A. It sends a copy of the frame back to the sender for verification.
B. It checks the destination address to verify that the frame was really intended for them.
C. It compares an FCS in the frame to one that the computer calculates from the contents of the frame.
D. It calculates a checksum from the data in the frame, and then sends it back to the source for verification.
Answer::- C.
8. Which best describes a CSMA/CD network?
A. One node's transmission traverses the entire network and is received and examined by every node.
B. Signals are sent directly to the destination if the source knows both the MAC and IP addresses.
C. One node's transmission goes to the nearest router, which sends it directly to the destination.
D. Signals are always sent in broadcast mode.
Answer::- A.
9. Which best describes broadcasting?
A. Sending a single frame to many stations at the same time
B. Sending a single frame to all routers to simultaneously update their routing tables
C. Sending a single frame to all routers at the same time
D. Sending a single frame to all hubs and bridges at the same time
Answer::- A.
10. A half-duplex circuit means
A. Only one side can talk at a time
B. The signal strength is cut in half
C. The signal strength is doubled
D. Two hosts can talk simultaneously
Answer::-A.
11. Attenuation means
A. Travel
B. Delay
C. A signal losing strength over distance
D. Loss of signal due to EMI
Answer::-C.
12. Which of the following is an external source of electrical impulses that can attack the quality of electrical signals on a cable?
A. EMI caused by electrical motors
B. RFI caused by electrical motors
C. Impedance caused by radio systems
D. EMI caused by lightning
Answer::- A.
13. What is the primary cause of crosstalk?
A. Cable wires that are too large in diameter
B. Too much noise in a cable's data signal
C. Electrical motors and lighting
D. Electrical signals from other wires in a cable
Answer::-D.
14. Which of the following describes cancellation?
A. Wires in the same circuit cancel each other's electrical current flow.
B. Cancellation is a commonly used technique to protect the wire from undesirable interference.
C. The magnetic fields from one cable run cancel magnetic fields of another cable run.
D. External magnetic fields cancel the fields inside network cabling.
Answer::- B.
15. What is it called when two bits from two different communicating computers are on a shared medium at the same time?
A. Latency
B. Dispersion
C. Collision
D. Obstruction
Answer::-C.
16. Reflection does not occur with what kind of signals?
A. Electrical
B. Radio waves
C. Microwaves
D. None of the above
Answer::- D.
17. __________ means to convert binary data into a form that can travel on a physical communications link.
A. Encoding
B. Decoding
C. Encrypting
D. Decrypting
Answer::- A.
18. Which of the following is the correct order for the network layers?
A. 1: Physical 2: Data Link 3: Transport 4. Network 5: Presentation 6: Session 7: Application
B. 1: Physical 2: Data Link 3: Network 4: Transport 5: Session 6: Presentation 7: Application
C. 1: Physical 2: Data Link 3: Network 4: Session 5: Transport 6: Application 7: Presentation
D. 1: Physical 2: Network 3: Session 4: Data Link 5: Transport 6: Application 7: Presentation
Ans::- B.
19. Which layer of the OSI model handles error detection, network topology, and medium access?
A. The physical layer
B. The data link layer
C. The transport layer
D. The network layer
Ans::- B.
20. Which layer of the OSI model establishes, maintains, and manages sessions between applications?
A. The transport layer
B. The session layer
C. The presentation layer
D. The application layer
Answer::-B.
21. Which best describes the function of the presentation layer?
A. It provides data representation and code formatting.
B. It handles error notification, network topology, and flow control.
C. It provides network services to user applications.
D. It provides electrical, mechanical, procedural, and functional means for activating and maintaining the link between systems.
Answer::-A.
22. Which layer of the OSI model provides network services to user applications?
A. The transport layer
B. The session layer
C. The presentation layer
D. The application layer
Answer::-D.
23. Which layer offers provisions for data expedition, class of service, and exception reporting?
A. Session
B. Presentation
C. Network
D. Data link
Answer::-A.
24. Which of the following statements regarding encapsulation is untrue?
A. Encapsulation allows computers to communicate data.
B. If one computer wants to send data to another computer, the data first must be packaged by a process called encapsulation.
C. Encapsulation occurs at one layer.
D. Encapsulation wraps data with the necessary protocol information before network transit.
Answer::- C.
25. Which of the following correctly describes the five conversion steps of data encapsulation when one computer sends an e-mail message to another computer?
A. Data, segments, packets, frames, bits
B. Bits, frames, packers, segments, data
C. Packets, segments, data, bits, frames
D. Segments, packets, frames, bits, data
Answer::- A.
26. An e-mail message is sent from Host A to Host B on a LAN. To send this message, the data must be encapsulated. Which of the following best describes the first step of data encapsulation?
A. Alphanumeric characters are converted into data.
B. The message is segmented into easily transportable chunks.
C. A network header is added to the message (source and destination addresses).
D. The message is converted into binary format.
Answer::- A.
27. An e-mail message is sent from Host A to Host B on a LAN. Before you can send this message, the data must be encapsulated. Which of the following best describes what happens after a packet is constructed?
A. The packet is transmitted along the medium.
B. The packet is put into a frame.
C. The packet is segmented into frames.
D. The packet is converted to binary format.
Answer::- B.
28. An e-mail message is sent from Host A to Host B on a LAN. Before you can send this message, the data must be encapsulated. Which of the following best describes what happens after the e-mail message's alphanumeric characters are converted into data?
A. The data is converted into binary format.
B. A network header is added to the data.
C. The data is segmented into smaller chunks.
D. The data is put into a frame.
Answer::- C.
29. Which best describes a datagram?
A. A message sent to the source to confirm the receipt of uncorrupted data
B. A binary representation of routing information
C. A data packet less than 100 bytes in size
D. A network layer packet
Answer::- D.
30. Which of the following layers of the OSI model is not present in the TCP/IP protocol stack?
A. Transport
B. Network
C. Internet
D. Data link
Answer::- D.