You are on page 1of 89

1

NETWORK+ CERTIFICATION

STUDY GUIDE OF CH1-4 OF DEAN

____ 1. An organization that shares devices, saves ____.

a.

money

c.

time

b.

space

d.

All of the above.

____ 2. Networks enable multiple users to share devices and data that,
collectively, are referred to as the networks' ____.
a.

devices

c.

data files

b.

resources

d.

peripherals

____ 3. The peer-to-peer network is an example of a ____ network.

a.

metropolitan

c.

local area
b.

wide area

d.

tiny area

____ 4. Which is not true about peer-to-peer networks?

a.

They do not require a special operating system.

b.

One computer has more authority than the others.

c.

Most computers are general

purpose personal computers that are not designed to handle

heavy processing loads.

d.
None of the above.

____ 5. Which is not true about networks?

a.

They increase productivity.

b.

They allow you to manage hardware and software on multiple computers


from one central

location.

c.

They enable multiple users to share devices and data.

d.

None of the above.

____ 6. Peer-to-peer networks are not ____.

a.
less expensive to maintain

c.

flexible

b.

less expensive to set up

d.

None of the above.

____ 7. Peer-to-peer networks are ____.

a.

often used in environments where technical expertise is scarce

b.

very

secure

c.
practical for connecting a large number of computers

d.

All of the above.

____ 8. LANs involving many ____ are usually server-based.

a.

computers

c.

peripherals

b.

systems

d.

All of the above.


____ 9. On a server-based network, special computers known as ____, process
data for and facilitate communications between the other computers on the
network.

a.

primary computers

c.

servers

b.

domains

d.

workstations

____ 10. Which would not qualify as a network-operating system?

a.

UNIX

c.
Win

dows 98

b.

Novell NetWare

d.

None of the above.

____ 11. The term ____ refers to a networking model in which clients use a
central server to share applications, devices, and data.

a.

client/server architecture

c.

sharing architecture

b.

master/slave d

esign
d.

All of the above.

____ 12. Which is not true?

a.

Clients on a network cannot run applications from their local hard disks.

b.

Typically, clients on a client/server network do not communicate directly with


each other.

c.

Clients on a network c

an save data to their local hard disks.

d.

None of the above.


____ 13. The ____ is an example of a very intricate and extensive WAN that
spans the globe.

a.

Network Operating System

c.

Intranet

b.

Internet

d.

Metropolis

____ 14. The figure above depicts a(n) ____.

a.

complex network

c.
simple network

b.

simple WAN

d.

intranet

____ 15. The figure above depicts a(n) ____.

a.

complex network

c.

simple network

b.
simple WAN

d.

complex WAN

____ 16. The device that enables a workstation to connect to the network is
called a(n) ____.

a.

access card

c.

server

b.

client

d.

network interface card


____ 17. Which is true?

a.

A NIC that works in one workstation will work in another.

b.

A workstation must be connected to a network.

c.

A client

can act as a server.

d.

All of the above.

____ 18. The physical layout of a computer network is called the ____.

a.

topology

c.
mapping

b.

architecture

d.

configuration

____ 19. ____ ensure(s) that data are transferred whole, in sequence, and
without error from one node on the network to another.

a.

Data packets

c.

Protocol

b.

Addressing

d.
File services

____ 20. ____ are distinct units of data that are transmitted from one
computer on a network to another.

a.

Data packets

c.

Frames

b.

Datagram

d.

All of the above.

____ 21. Which is not an example of transmission media?

a.
wire

c.

radio waves

b.

coaxial cable

d.

None of the above.

____ 22. ____ refer to the capability of a server to share data files,
applications, and disk storage space.

a.

File services

c.

Protocol

b.
Transmission media

d.

Transmission services

____ 23. A server that provides file services is called a(n) ____.

a.

file server

c.

network server

b.

filer

d.

system server
____ 24. Communications servers are also referred to as ____ servers.

a.

file

c.

print

b.

access

d.

gateway

____ 25. ____ servers allow external users to use network resources and
devices just as if they were logged in to a workstation in the office.

a.

Communications

c.

Remote
b.

Access

d.

Gate

way

____ 26. In Windows NT, the communications software is known as ____.

a.

Network Access Server

c.

Remote Access Server

b.

Communications Access Server

d.
Mail Access Server

____ 27. In NetWare, the communications software is known as ____.

a.

Ne

twork Access Server

c.

Remote Access Server

b.

Communications Access Server

d.

NetWare Access Server

____ 28. Mail services typically do not include ____.

a.

routing capabilities
c.

document management

b.

notification

d.

None of the above.

____ 29. Mail services require a significant commitment of technical support


and administration resources due to their ____.

a.

instability

c.

heavy use

b.

routing capabilities
d.

access ability

____ 30. Distributing processing activity evenly across a network so that no


single device becomes overwhelmed, is handled by the ____ service.

a.

traffic monitoring

c.

hardware diagnosis

b.

load balancing

d.

communications

____ 31. The ____ service determines when a network component fails.

a.
network

c.

hardware d

iagnosis

b.

load balancing

d.

communications

____ 32. The Computing Technology Industry Association established the ____
certification.

a.

A+

c.

MCSE
b.

Net+

d.

CNE

____ 33. If you want to become a PC technician, you should attain the ____
certification.

a.

A+

c.

MCSE

b.

Net+

d.

CNE
____ 34. If you want to specialize in Novell networking product support and
administration, you should attain the ____ certification.

a.

A+

c.

MCSE

b.

Net+

d.

CNE

____ 35. Which is not true about finding a job in networking?

a.

Companies in the computer industry typically do not mind receiving resumes


and letters

5
through e

mail.

b.

When looking at an ad, you should only apply for positions for which you have
all the

qualifications required.

c.

Visit a college ca

reer center, even if you are not a registered university or college student.

d.

None of the above.

____ 36. The Open Systems Interconnection (OSI) reference model divides
networking architecture into ____ layers.

a.

six

c.
five

b.

eight

d.

seven

____ 37. IEEE is an international society composed of ____ professionals.

a.

engineering

c.

computer hardware

b.

networking

d.
programming

____ 38. ____ is not involved in setting standards for ISDN communications.

a.

ANSI

c.

EIA

b.

ITU

d.

None of the a

bove.

____ 39. ____'s goal is to establish international technological standards to


facilitate global exchange of information and barrier-free trade.

a.
ISO

c.

IEEE

b.

ITU

d.

EIA

____ 40. About ____ of ISO's nearly 12,000 standards apply to computer-
related products and functions.

a.

1,000

c.

10,000

b.
500

d.

250

____ 41. The ____ regulates international telecommunications.

a.

FCC

c.

ISO

b.

ITU

d.

EIA

____ 42. In the ____ ISO began to work on the OSI model.
a.

early 1970s

c.

early 1980s

b.

ate 1970s

d.

late 1980s

____ 43. The OSI model is a theoretical representation of what happens


between ____ nodes on a network.

a.

two

c.

five
b.

three

d.

multiple

____ 44. The OSI Model ____.

a.

describes how software programs interact with other s

oftware programs

b.

describes how software programs interact with humans

c.

prescribes the type of hardware that should support each layer

d.
None of the above.

____ 45. The Physical layer does not ____.

a.

set the data transmission rate

c.

monitor d

ata error rates

b.

provide error correction services

d.

None of the above.

____ 46. The primary function of the ____ layer is to divide data it receives
from the Network layer into distinct frames that can then be transmitted by
the Physical layer.

a.
Communication

c.

Data Link

b.

Transform

d.

Transport

____ 47. Ethernet is an example of a ____ layer technology.

a.

Communication

c.

Data Link

b.
Transform

d.

Transport

____ 48. ____ refers to the process of decreasing the size of the data units
when moving data from a network segment that can handle larger data units
to a network segment that can handle only smaller data units.

a.

Reallocation

c.

Reassembly

b.

Segmentation

d.

Minimizing
____ 49. ____ is the process of reconstructing the segmented data units.

a.

Sequencing

c.

Resegmenting

b.

Rebuilding

d.

Reassembly

____ 50. Which is not performed in the Network layer?

a.

segmentation

c.
sequencing

b.

reassembly

d.

None of the above.

____ 51. The ____ layer is primarily responsible for ensuring that data are
transferred from point A to point B reliably, in the correct sequence, and
without errors.

a.

Network

c.

Transport

b.

Communication
d.

Session

____ 52. Flow control is handled in the ____ layer.

a.

Transport

c.

Session

b.

Network

d.

Application

____ 53. Transport layer services break arbitrarily long packets into ____.

a.
the maximum size that the type network in use can handle

b.

the minimum size that the type network in use can handle

c.

a standard size that is used by all p

rotocols

d.

a size smaller than standard size so it may fit all frames

____ 54. If you insert a NIC but fail to seat it deeply enough in the computer's
circuit board, your computer will experience network problems at the ____
layer.

a.

Data Link

c.

Tra

nsport
b.

Physical

d.

Network

____ 55. The Data Link layer accomplishes the jobs of finding out if
information has been dropped and asking for a retransmission, by the ____
process.

a.

token ring

c.

error checking

b.

protocol

d.
framing

____ 56. Error checking and control information ensure that a(n) ____ arrives
without any problems.

a.

token

c.

checksum

b.

protocol

d.

frame

____ 57. The "C" in TCP stands for ____.

a.

Computer
c.

Communication

b.

Cohesion

d.

Control

____ 58. The Session layer is sometimes called the "____" of network
communications.

a.

coach

c.

workhorse

b.

leader
d.

traffic cop

____ 59. The ____ layer sets the terms of communication by deciding which
node will communicate first and how long a node can communicate.

a.

Da

ta Link

c.

Transport

b.

Session

d.

Network

____ 60. Which is not a function of the Session layer?

a.
Data encryption.

b.

Establishing and keeping alive the communications link for the duration of
the session.

c.

Monitoring the identification of the s

ession participants.

d.

None of the above.

____ 61. The ____ layer protocols code and decodes graphics and file format
information.

a.

Presentation

c.

Application
7

b.

Communication

d.

Session

____ 62. One of the services provided by the Application layer is ____.

a.

file transfer

c.

segmentation

b.

decoding

d.
sequencing

____ 63. Services for message handling for electronic mail are found in the
____ layer.

a.

Network

c.

Session

b.

Application

d.

Both B and C.

____ 64. If you are running Microsoft Word on a network and choose to open a
file, your request for that data is transferred from Microsoft Word to the
network by the ____ layer.

a.
Data Link

c.

Transport

b.

Application

d.

Network

____ 65. The Transport layer passes the data blocks, one at a time, to the ____
layer.

a.

Session

c.

Data Link

b.
Network

d.

Presentation

____ 66. Today ____ types of Ethernet technology are used on LANs.

a.

two

c.

four

b.

three

d.

five
____ 67. Which is not a field that composes the Token Ring frame?

a.

Start Delimiter

c.

Access Control

b.

Frame Control

d.

End Delimiter

____ 68. The MAC sublayer lies within the ____ layer.

a.

Data Link

c.

Network
b.

Physical

d.

Transport

____ 69. The part of the MAC address that is unique to a particular vendor is
called the ____.

a.

Device ID

c.

Block ID

b.

Starting Delimiter

d.

MAC ID
____ 70. Which is not true?

a.

The Network+ certification exam includes questions about IEEE 802


specification.

b.

The LLC provides a common interface and supplies reliab

ility and flow control services.

c.

The MAC appends the physical address of the destination computer onto the
data frame.

d.

None of the above.

____ 71. Protocols that span more than one LAN segment are ____.

a.

global
c.

segmented

b.

routable

d.

int

egrated

____ 72. A network that uses more than one protocol is called a(n) ____
network.

a.

multiprotocol

c.

global

b.
routable

d.

diverse

____ 73. Protocols define the standards for communication between ____.

a.

network segments

c.

LANs

b.

operat

ing systems

d.

network devices
____ 74. Which is the most commonly used protocol?

a.

SNA

c.

NetBIOS

b.

TCP/IP

d.

IPX/SPX

____ 75. ____'s roots lie with the U.S. Department of Defense.

a.

SNA

c.

NetBIOS
b.

TCP/IP

d.

IPX/SPX

____ 76. Which is not true about TCP/IP?

a.

It is routable.

b.

It is flexible.

c.

It does not require significant configuration.

d.
None of the above.

____ 77. Which is not true about TCP/IP?

a.

It is expensive.

b.

It can communicate between a multitude of dissimilar pla

tforms.

c.

It is the de facto standard on the Internet.

d.

None of the above.

____ 78. The TCP/IP Application layer does not correspond to which layer of
the OSI Model?

a.
Transport

c.

Presentation

b.

Application

d.

Session

____ 79. The TCP/IP Transport layer corresponds to which layer(s) of the OSI
Model?

a.

Transport

c.

Application

b.
Transport and Network

d.

Session and Transport

____ 80. The TCP/IP Internet layer corresponds to which layer(s) of the OSI
Model?

a.

Transport and Data Link

c.

Network

b.

Transport and Network

d.

Network and Session

____ 81. The TCP/IP Network Interface layer corresponds to which layer(s) of
the OSI Model?

a.

Data Link

c.

Network

b.

Network and Physical

d.

Data Link and Physical

____ 82. The original version of the IP subprotocol is ____.

a.

IPv1

c.

IPv4
b.

IPv2

d.

IPv6

____ 83. The component of an IP datagram header that indicates the


maximum time in seconds, that a datagram can remain on the network
before it is discarded is called ____.

a.

time to d

estination

c.

time to be active

b.

time to remain

d.
time to live

____ 84. If a protocol is connectionless, it does not ____.

a.

have a way to connect and must rely on other components

b.

guarantee delivery of data

c.

function on any of the network l

ayers

d.

None of the above.

____ 85. The IP datagram contains a checksum component that verifies the
integrity of the ____.

a.
routing information on the IP header

c.

time to live information

b.

data in the datagram

d.

protocol

____ 86. The Identification component of an IP diagram header does not ____.

a.

identify the message to which a datagram belongs

b.

tell IP how to process the incoming datagram by indicating the data's speed,
priority, or

reliability

c.
enable the receiving node to reassemb

le fragmented or segmented messages

d.

assist in segmentation and reassembly of packets

____ 87. Which is not true about UDP?

a.

It offers no assurance that packets will be received in the correct sequence.

b.

Its lack of sophistication makes it less

efficient than TCP.

c.

Its header contains only four source fields.

d.

It offers no assurance that packets will be received at all.


____ 88. Which is true about ICMP?

a.

It provides error control.

b.

It reports which networks are not reachable.

c.

t reports which packets' TLL has expired.

d.

Both B and C.

____ 89. To make ARP more efficient, computers save recognized address
mappings in a(n) ____.

a.
temporary variable

c.

file

b.

host

d.

cache

____ 90. In addition to core Transport and Internet layer protocols, TCP/IP
encompasses several ____ layer protocols that work over TCP or UDP and IP,
translating user requests into a format the network can read.

a.

Network

c.

Internet

b.
Application

d.

Network Interface

____ 91. Each IP address is a unique ____-bit number.

a.

32

c.

b.

16

d.

24
____ 92. An IP address contains ____ types of information.

a.

three

c.

four

b.

two

d.

eight

____ 93. Networks recognize ____ types of addresses.

a.

five

c.

three
b.

one

d.

two

____ 94. The numbers 128 through 191 in the first octet of an IP address
indicate that the address is a ____.

a.

Class A

c.

Class C

b.

Class B

d.

Class D
____ 95. A secondary number, known as a subnet ____, is also assigned as
part of the TCP/IP configuration process.

a.

segment

c.

mask

b.

part

d.

identifier

____ 96. Together, the host name and domain name constitute the ____
domain name.

a.

single
c.

global

b.

fully qualified

d.

total

____ 97. Like TCP/IP, IPX/SPX is a routable protocol because it carries network
____ information.

a.

platform

c.

protocol

b.

addressing
d.

layer

____ 98. IPX/SPX was originally developed by ____.

a.

Xerox

c.

IBM

b.

Novell

d.

the U.S. Department of Defense

____ 99. A(n) ____ is a logical address assigned to a specific process running
on a computer.

a.
MAC

c.

dynamic address

b.

node

d.

socket

____ 100. The NCP, SAP, and RIP subprotocols correspond to the ____ layer(s)
in the OSI Model.

a.

Application

c.

Application and Presentation

b.
Presentation

d.

Application and Sessio

____ 101. The SPX subprotocol corresponds to the ____ layer in the OSI Model.

a.

Session

c.

Transport

b.

Presentation

d.

Network
____ 102. The IPX subprotocol corresponds to the ____ layer in the OSI Model.

a.

Session

c.

Transport

b.

Presentation

d.

Network

____ 103. The NetBIOS subprotocol corresponds to the ____ layer in the OSI
Model.

10

a.

Session

c.
Transport

b.

Presentation

d.

Network

____ 104. Which is true?

a.

Socket addresses are appended to IPX addresses.

b.

In addition to the netwo

rk and node addresses, processes running on IPX

enabled

workstations are identified by socket addresses.

c.
Novell has reserved socket 456h for its diagnostics process.

d.

None of the above.

____ 105. NetBIOS was originally designed for ____.

a.

Xerox

c.

IBM

b.

Novell

d.

U.S. Department of Defense


____ 106. Which is not true about NetBEUI?

a.

It requires extensive configuration.

c.

It provides excellent error correction.

b.

It is fast and efficient.

d.

None of the above.

____ 107. In order to transmit data between network nodes while using
NetBIOS, a network administrator must assign a(n) ____ to each station.

a.

logical address

c.

IP address
b.

MAC

d.

NetBIOS name

____ 108. Information can be transmitted via one of ____ signaling method(s).

a.

one

c.

four

b.

two

d.

five
____ 109. ____ is a term used by networking professionals to describe the
nondata information that must accompany data in order for a signal to be
properly routed and interpreted by the network.

a.

Noise

c.

Overhead

b.

arbage

d.

Commenting

____ 110. Which is not true about modulation?

a.

A modem modulates analog signals into digital signals at the transmitting


end, then

demodulates digital signals into analog signals at the receiving end.

b.

The carrier wave does not

represent information.

c.

Modulation may be used to issue multiple signals to the same


communications channel

and prevent the signals from interfering with one another.

d.

None of the above

____ 111. A football coach calling out orders to his team through a
megaphone is using ____ communication.

a.

half

duplex
c.

simplex

b.

duplex

d.

one

directional

____ 112. An apartment's intercom system that requires you to press a "talk"
button in order to allow your voice to be transmitted over the wire uses ____
communication.

a.

half

duplex

c.
simplex

b.

duplex

d.

bidirectional

____ 113. Modern Ethernet networks use ____ communication.

a.

half

duplex

c.

simplex

b.

duplex
d.

Both A and B.

____ 114. A form of transmission that allows multiple signals to travel


simultaneously over one medium is known as ____.

a.

channeling

c.

subchanneling

b.

modulating

d.

multiplexing

11
____ 115. The figure shown above is an example of ____ multiplexing.

a.

time

c.

wavelength division

b.

statistical

d.

fiber

opti

____ 116. The figure shown above is an example of ____ multiplexing.

a.
time

c.

wavelength division

b.

statistical

d.

fiber

optic

____ 117. ____ is a measure of the difference between the highest and lowest
frequencies that a medium can transmit.

a.

throughput

c.

amplitude
b.

wavelength

d.

bandwidth

____ 118. Which is not true about a baseband system?

a.

It involves analog pulses.

b.

Every device shares the same channel.

c.

Ethernet is an example of a baseband system.

d.

Both A and B.
____ 119. A device that regenerates a signal is called a(n) ____.

a.

amplifier

c.

regenerator

b.

repeater

d.

attenuator

____ 120. The maximum number of nodes per segment depends on the ____.

a.

bandwidth

c.
attenuation

b.

desired throughput

d.

regener

ation ability

____ 121. Which does not help to limit the impact of noise on a network?

a.

Using antinoise algorithms to protect data from being corrupted by noise.

b.

Using metal conduits to protect cabling.

c.

Installing cabling well away from powerf

ul electromagnetic forces.
d.

None of the above.

You might also like