1. Why were TCP/IP protocols developed?
a. To insure that error correction of each
packet takes place.
b. To allow cooperating computers to share
resources across a network.
c. To allocate resources that are
needed for operating a computer on a LAN. *
d. To determine the "best path"
decision making when forwarding packets of data.
2. Which of the following are functions of a web
browser without the addition of plug-ins? (Choose three.)
a. updates IRQ's *
b. receives information #
c. requests information
d. contacts web servers *
e. displays flash animation
f. displays Quicktime movies
3. What is the numeric base of hexadecimal numbers?
a. Base 2
b. Base 8
c. Base 10
d. Base 16 #
e. Base 32
4. In an 8 bit binary number, what is the total number
of combinations of the eight bits?
a. 128
b. 254
c. 255
d. 256 #
e. 512
f. 1024
5. Convert the decimal number 231 into its binary
equivalent. Select the correct answer from the list below.
a. 11110010
b. 11011011
c. 11110110
d. 11100111 #
e. 11100101
f. 11101110
6. Convert the hexadecimal number CD into its base 10
equivalent. Select the correct answer from the list below.
a. 197
b. 199
c. 201
d. 203
e. 205*
f. 207
7. Convert the hexadecimal number 19 into its base 10
equivalent. Select the correct answer from the list below.
a. 19
b. 91
c. 52
d. 25 #
e. 36
f. 63
8. Which of the following are popular web browsers?
(Choose two.)
a. Acrobat
b. Internet Explorer #
c. Macromedia Flash
d. Netscape Navigator
e. Quicktime
f. World Wide Web#
9. Which of the following are valid hexadecimal
numbers? (Choose three.)
a. DEF3
b. 1G45
c. 1F35
d. DH3F
e. 453
f. X35F#
10. What are the requirements for an Internet
connection? (Choose three.)
a. remote host
b. physical connection* (Bertangung
jwb untk mengaktivkan dan mengatur physical intf jaringan kmpt )
c. logical connection (
d. firewall (perangkat lnak keamanan jaringan yg
melindungi jar kmpt dr tnpa izin)
e. application*
11. Which of the following interprets the data and
displays the information in an understandable form for the user to see?
a. application (interface antara user
dan pc.)*
b. protocol stack (menginflementasikan suatu arsitektur komunikasi
tertentu)
c. remote devices
d. logical connection
e. physical connection (yg menghubungkan antara
prangkt keras)
12. Which of the following are considered to be
"always on" services? (Choose two.)
a. DSL *
b. ISDN
c. 56kbps
d. cable modem
13. Which of the following will test the internal
loopback of a node?
a. ping 10.10.10.1
b. ping 192.168.1.1
c. ping 127.0.0.1
d. ping 223.223.223.223
e. ping 255.255.255.255 *
14. If you perform a Boolean AND on the IP address
172.16.20.23 using the subnet mask of 255.255.248.0, which of the following is
the subnetwork address?
a. 172.16.0.0
b. 172.16.16.0 *
c. 172.16.20.0
d. 172.16.20.16
e. 172.16.24.0
15. Which specialized equipment is used to make a
physical connection from a PC to a network? (Choose two.)
a. router
b. modem *
c. CD Rom
d. network interface card *
16. When purchasing a NIC for a computer, which of the
following factors need to be considered? (Choose three.)
a. protocols *
b. system bus *
c. brand of PC
d. web browser
e. type of media used on the network *
17. Which of the following describes a network
interface card?
a. large circuit board that contains sockets for
expansion cards
b. interface card capable of transferring more
than one bit simultaneously and is
used to connect external devices *
c. interface card inserted into a computer so
that the computer can be connected to a network
d. interface card that can be used for parallel
communication in which only 1
bit is transmitted at a time
18. Which statements best describe a physical
connection? (Choose two.)
a. internet standard is TCP/IP
b. could utilize modem or NIC *
c. interprets data and displays information
d. used to transfer data between PC
and local network *
19. Which device connects a computer with a telephone
line by providing modulation
and
demodulation of incoming and outgoing data?
a. NIC
b. CSU/DSU *
c. router
d. modem
e. telco switch
20. Which phrases describe a byte? (Choose two.)
a. a single binary digit
b. a grouping of eight binary digits #
c. +5 volts of electricity
d. a single addressable storage
location #
e. the value range from 0 to 127
21. Convert the Base 10 number 116 into its eight bit
binary equivalent. Choose the
correct answer
from the following list:
a. 01111010
b. 01110010
c. 01110100 #
d. 01110110
e. 01110111
f. 01010110
22. Refer to the exhibit. Identify the devices
labeled A, B, C, and D in the network
physical
documentation.
a. A=bridge, B=switch, C=router, D=hub
b. A=bridge, B=hub, C=router, D=switch
c. A=bridge, B=router, C=hub, D=switch
d. A=hub, B=bridge, C=router, D=switch
23. The central hub has malfunctioned in the
network. As a result, the entire network
is down. Which
type of physical network topology is implemented?
a. bus
b. star*
c. ring
d. mesh
24. A switch has failed in the network. As a
result, only one segment of the network is
down. Which
type of physical network topology is implemented?
a. bus
b. ring
c. star
d. extended star*
25. Which three features apply to LAN
connections? (Choose three.)
a. operate using serial interfaces*
b. make network connection using a hub*
c. limited to operation over small geographic areas*
d. provide part-time connectivity to remote services
e. typically operate under local administrative control
f. provide lower bandwidth services compared to WANs
26. What is one advantage of defining network
communication by the seven layers
of the OSI
model?
a. It increases(bertambah) the bandwidth of a network.
b. It makes networking easier to learn and understand.*
c. It eliminates many protocol restrictions.
d. It increases the throughput of a network.
e. It reduces the need for testing network connectivity.
27. What makes it easier for different
networking vendors to design software and
hardware that
will interoperate?
a. OSI model*
b. proprietary designs
c. IP addressing scheme
d. standard logical topologies
e. standard physical topologies
28. Which term describes the process of adding
headers to data as it moves down
OSI layers?
a. division
b. encoding
c. separation
d. segmentation
e. encapsulation
29. What is the term used to describe the
transport layer protocol data unit?
a. bits
b. packets
c. segments
d. frames
e. data streams
30. Which of the following are layers of the
TCP/IP model? (Choose three.)
a. Application*
b. Physical*
c. Internet
d. Network Access
e. Presentation*
31. Which of the following are data link layer
encapsulation details? (Choose two.)
a. A header and trailer are added.
b. Data is converted into packets. c. Packets are packaged into frames.*
d. Frames are divided into segments.
e. Packets are changed into bits for Internet travel.*
32. Which layer of the OSI model provides
network services to processes in electronic mail and
file transfer programs?
a. data link
b. transport
c. network
d. application*
33. Which two features apply to WAN connections?
(Choose two.)
a. operate using serial interfaces
b. make network connection using a hub
c. limited to operation over small geographic areas
d. typically operate under local administrative control*
e. provide lower bandwidth services compared to LANs
34. Which of the following are ways that
bandwidth is commonly measured? (Choose three.)
a. GHzps
b. kbps#
c. Mbps#
d. Nbps
e. MHzps#
f. Gbps
35. Refer to the following list. Choose the
correct order of data encapsulation when a
device sends
information. segments bits packetsdata frames
a. 1 - 3 - 5 - 4 - 2
b. 2 - 1 - 3 - 5 - 4
c. 2 - 4 - 3 - 5 - 1
d. 4 - 3 - 1 - 2 - 5
e. 4 - 1 - 3 - 5 - 2#
f. 3 - 5 - 1 - 2 - 4
EmoticonEmoticon