Thursday, October 6, 2016

Soal Pilihan Ganda Cisco dan Jawaban



1. Why were TCP/IP protocols developed?
 a. To insure that error correction of each packet takes place.
 b. To allow cooperating computers to share resources across a network.
 c. To allocate resources that are needed for operating a computer on a LAN. *
 d. To determine the "best path" decision making when forwarding packets of data.

2. Which of the following are functions of a web browser without the addition of plug-ins? (Choose three.)
 a. updates IRQ's *
 b. receives information #
 c. requests information
 d. contacts web servers *
 e. displays flash animation
 f. displays Quicktime movies

3. What is the numeric base of hexadecimal numbers?
 a. Base 2
 b. Base 8
 c. Base 10
 d. Base 16 #
 e. Base 32

4. In an 8 bit binary number, what is the total number of combinations of the eight bits?
 a. 128
 b. 254
 c. 255
 d. 256 #
 e. 512
 f. 1024

5. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
 a. 11110010
 b. 11011011
 c. 11110110
 d. 11100111 #
 e. 11100101
 f. 11101110

6. Convert the hexadecimal number CD into its base 10 equivalent. Select the correct answer from the list below.
 a. 197
 b. 199
 c. 201
 d. 203
 e. 205*
 f. 207

7. Convert the hexadecimal number 19 into its base 10 equivalent. Select the correct answer from the list below.
 a. 19
 b. 91
 c. 52
 d. 25 #
 e. 36
 f. 63

8. Which of the following are popular web browsers? (Choose two.)
 a. Acrobat
 b. Internet Explorer #
 c. Macromedia Flash
 d. Netscape Navigator
 e. Quicktime
 f. World Wide Web#

9. Which of the following are valid hexadecimal numbers? (Choose three.)
 a. DEF3
 b. 1G45
 c. 1F35
 d. DH3F
 e. 453
 f. X35F#

10. What are the requirements for an Internet connection? (Choose three.)
 a. remote host
 b. physical connection* (Bertangung jwb untk mengaktivkan dan mengatur physical intf jaringan kmpt )
 c. logical connection (
 d. firewall (perangkat lnak keamanan jaringan yg melindungi jar kmpt dr tnpa izin)
 e. application*

11. Which of the following interprets the data and displays the information in an understandable form for the user to see?
 a. application (interface antara user dan pc.)*
 b. protocol stack (menginflementasikan suatu arsitektur komunikasi tertentu)
 c. remote devices
 d. logical connection
 e. physical connection (yg menghubungkan antara prangkt keras)

12. Which of the following are considered to be "always on" services? (Choose two.)
 a. DSL *
 b. ISDN
 c. 56kbps
 d. cable modem

 13. Which of the following will test the internal loopback of a node?
 a. ping 10.10.10.1
 b. ping 192.168.1.1
 c. ping 127.0.0.1
 d. ping 223.223.223.223
 e. ping 255.255.255.255 *

14. If you perform a Boolean AND on the IP address 172.16.20.23 using the subnet mask of 255.255.248.0, which of the following is the subnetwork address?
 a. 172.16.0.0
 b. 172.16.16.0 *
 c. 172.16.20.0
 d. 172.16.20.16
 e. 172.16.24.0

15. Which specialized equipment is used to make a physical connection from a PC to a network? (Choose two.)
 a. router
 b. modem *
 c. CD Rom
 d. network interface card *

16. When purchasing a NIC for a computer, which of the following factors need to be considered? (Choose three.)
 a. protocols *
 b. system bus *
 c. brand of PC
 d. web browser
 e. type of media used on the network *

17. Which of the following describes a network interface card?
 a. large circuit board that contains sockets for expansion cards
 b. interface card capable of transferring more than one bit simultaneously and is
     used to connect external devices *
 c. interface card inserted into a computer so that the computer can be connected to a network
 d. interface card that can be used for parallel communication in which only 1
     bit is   transmitted at a time

18. Which statements best describe a physical connection? (Choose two.)
 a. internet standard is TCP/IP
 b. could utilize modem or NIC *
 c. interprets data and displays information
 d. used to transfer data between PC and local network *

19. Which device connects a computer with a telephone line by providing modulation
      and demodulation of incoming and outgoing data?
 a. NIC
 b. CSU/DSU *
 c. router
 d. modem
 e. telco switch

20. Which phrases describe a byte? (Choose two.)
 a. a single binary digit
 b. a grouping of eight binary digits #
 c. +5 volts of electricity
 d. a single addressable storage location #
 e. the value range from 0 to 127

21. Convert the Base 10 number 116 into its eight bit binary equivalent. Choose the
      correct answer from the following list:
 a. 01111010
 b. 01110010
 c. 01110100 #
 d. 01110110
 e. 01110111
 f. 01010110


22.  Refer to the exhibit. Identify the devices labeled A, B, C, and D in the network
       physical documentation.
a. A=bridge, B=switch, C=router, D=hub
b. A=bridge, B=hub, C=router, D=switch
c. A=bridge, B=router, C=hub, D=switch
d. A=hub, B=bridge, C=router, D=switch

23.  The central hub has malfunctioned in the network. As a result, the entire network
       is down. Which type of physical network topology is implemented?
a. bus
b. star*
c. ring
d. mesh

24.  A switch has failed in the network. As a result, only one segment of the network is
       down. Which type of physical network topology is implemented?
a. bus
b. ring
c. star
d. extended star*

25.  Which three features apply to LAN connections? (Choose three.)
a. operate using serial interfaces*
b. make network connection using a hub*
c. limited to operation over small geographic areas*
d. provide part-time connectivity to remote services
e. typically operate under local administrative control
f. provide lower bandwidth services compared to WANs

26.  What is one advantage of defining network communication by the seven layers
       of the OSI model?
            a. It increases(bertambah) the bandwidth of a network.
            b. It makes networking easier to learn and understand.*
            c. It eliminates many protocol restrictions.
            d. It increases the throughput of a network.
            e. It reduces the need for testing network connectivity.

27.  What makes it easier for different networking vendors to design software and
        hardware that will interoperate?
a. OSI model*
b. proprietary designs
c. IP addressing scheme
d. standard logical topologies
e. standard physical topologies

28.  Which term describes the process of adding headers to data as it moves down
        OSI layers?
a. division
b. encoding
c. separation
d. segmentation
e. encapsulation

29.  What is the term used to describe the transport layer protocol data unit?
a. bits
b. packets
c. segments
d. frames
e. data streams

30.  Which of the following are layers of the TCP/IP model? (Choose three.)
a. Application*
b. Physical*
c. Internet
d. Network Access
e. Presentation*

31.  Which of the following are data link layer encapsulation details? (Choose two.)
a. A header and trailer are added.
b. Data is converted into packets. 
c. Packets are packaged into frames.*
d. Frames are divided into segments.
e. Packets are changed into bits for Internet travel.*

32.  Which layer of the OSI model provides network services to processes in electronic mail and 
        file transfer programs?
a. data link
b. transport
c. network
 d. application*

33.  Which two features apply to WAN connections? (Choose two.)
a. operate using serial interfaces
b. make network connection using a hub
c. limited to operation over small geographic areas
d. typically operate under local administrative control*
e. provide lower bandwidth services compared to LANs
34.  Which of the following are ways that bandwidth is commonly measured? (Choose three.)
a. GHzps
b. kbps#
c. Mbps#
d. Nbps
e. MHzps#
f. Gbps

35.  Refer to the following list. Choose the correct order of data encapsulation when a
       device sends information. segments bits packetsdata frames
a. 1 - 3 - 5 - 4 - 2
b. 2 - 1 - 3 - 5 - 4
c. 2 - 4 - 3 - 5 - 1
d. 4 - 3 - 1 - 2 - 5
e. 4 - 1 - 3 - 5 - 2#
f. 3 - 5 - 1 - 2 - 4



EmoticonEmoticon