Hardware Network Service Level III and IV: Answer: (D)
Hardware Network Service Level III and IV: Answer: (D)
Hardware Network Service Level III and IV: Answer: (D)
1
Prepared by Chala T
Hardware Network Service Level III and IV
6. Which one of the following computer network is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
Answer: (d).
overlay network
7. In computer network nodes are
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
Answer: (d).
all of the mentioned
8. Communication channel is shared by all the machines on the network in
a) unicast network
b) multicast network
c) broadcast network
d) none of the mentioned
Answer: c
broadcast network
9. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned
Answer: (a).
personal area network
10. A _____ is a device that forwards packets between networks by processing the routing
information included in the packet.
a) bridge
b) firewall
c) router
d) all of the mentioned
Answer: (c).
router
2
Prepared by Chala T
Hardware Network Service Level III and IV
11. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suit
d) none of the mentioned
Answer: (b).
protocol stack
12. Network congestion occurs
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned
Answer: (a).
in case of traffic overloading
13. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
Answer: (b).
virtual private network
14. The IETF standards documents are called
a) RFC
b) RCF
c) ID
d) IEEE
Answer: (a).
RFC
15. The structure or format of data is called
a) Syntax
b) Semantics
c) Struct
d) None of the mentioned
Answer: (a).
Syntax
3
Prepared by Chala T
Hardware Network Service Level III and IV
4
Prepared by Chala T
Hardware Network Service Level III and IV
Switch
21. A set of rules that governs data communication
a) Protocols
b) Standards
c) RFCs
d) None of the mentioned
Answer: (a).
Protocols
22. Three or more devices share a link in ________ connection
a) Unipoint
b) Multipoint
c) Point to point
d) None of the mentioned
Answer: (b).
Multipoint
23. Delimiting and synchronization of data exchange is provided by
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
Answer: (b).
Session layer
24. The_____ address identifies a process on a host.
a) physical
b) IP
c) port
d) specific
Answer: (c).
port
25. The ____ address uniquely defines a host on the Internet.
a) physical
b) IP
c) port
d) specific
Answer: (b).
IP
5
Prepared by Chala T
Hardware Network Service Level III and IV
26. The ________ address, also known as the link address, is the address of a node as defined by
its LAN or WAN.
a) physical
b) IP
c) port
d) specific
Answer: (a).
physical
27. The ______ layer adds a header to the packet coming from the upper layer that includes the
logical addresses of the sender and receiver.
a) physical
b) data link
c) network
d) none of the above
Answer: (c).
network
28. The ______ layer is responsible for moving frames from one hop (node) to the next.
a) physical
b) data link
c) network
d) none of the above
Answer: (b).
data link
29. ICMPv6 includes _______.
a) IGMP
b) ARP
c) RARP
d) a and b
Answer: (d).
a and b
30. IPv6 has _______ -bit addresses.
a) 32
b) 64
c) 128
d) variable
Answer: (c).
6
Prepared by Chala T
Hardware Network Service Level III and IV
128
31. The _______ layer changes bits into electromagnetic signals.
a) Physical
b) Data link
c) Transport
d) None of the above
Answer: (a).
Physical
32. The _______ layer is the layer closest to the transmission medium.
a) Physical
b) Data link
c) Network
d) Transport
Answer: (a).
Physical
33. The process-to-process delivery of the entire message is the responsibility of the _______
layer.
a) Network
b) Transport
c) Application
d) Physical
Answer: (b).
Transport
34. The information to be communicated in a data communications system is the _______.
a) Medium
b) Protocol
c) Message
d) Transmission
Answer: (c).
Message
35. Frequency of failure and network recovery time after a failure are measures of the _______
of a network.
a) Performance
b) Reliability
c) Security
d) Feasibility
7
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: (b).
Reliability
36. An unauthorized user is a network _______ issue.
a) Performance
b) Reliability
c) Security
d) All the above
Answer: (c).
Security
37. Communication between a computer and a keyboard involves ______________
transmission.
a) simplex
b) half-duplex
c) full-duplex
d) automatic
Answer: (a).
simplex
38. A television broadcast is an example of _______ transmission.
a) simplex
b) half-duplex
c) full-duplex
d) automatic
Answer: (a).
simplex
39. A _______ connection provides a dedicated link between two devices.
a) point-to-point
b) multipoint
c) primary
d) secondary
Answer: (a).
point-to-point
40. In a _______ connection, more than two devices can share a single link.
a) point-to-point
b) multipoint
c) primary
d) secondary
8
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: (b).
multipoint
41. In _______ transmission, the channel capacity is shared by both communicating devices at
all times.
a) simplex
b) half-duplex
c) full-duplex
d) half-simplex
Answer: c
full-duplex
42. In the original ARPANET, _______ were directly connected together.
a) IMPs
b) host computers
c) networks
d) routers
Answer: (a).
IMPs
43. _______ are special-interest groups that quickly test, evaluate, and standardize new
technologies.
a) Forums
b) Regulatory agencies
c) Standards organizations
d) All of the above
Answer: (a).
Forums
44. Which agency developed standards for physical connection interfaces and electronic
signaling specifications?
a) EIA
b) ITU-T
c) ANSI
d) ISO
Answer: (a).
EIA
45. _______ refers to the structure or format of the data, meaning the order in which they are
presented.
a) Semantics
9
Prepared by Chala T
Hardware Network Service Level III and IV
b) Syntax
c) Timing
d) All of the above
Answer: (b).
Syntax
46. ________ defines how a particular pattern to be interpreted, and what action is to be taken
based on that interpretation.
a) Semantics
b) Syntax
c) Timing
d) None of the above
Answer: (a).
Semantics
47. _______ refers to two characteristics: when data should be sent and how fast it can be sent.
a) Semantics
b) Syntax
c) Timing
d) none of the above
Answer: (c).
Timing
48. Data flow between two devices can occur in a _______ way.
a) simplex
b) half-duplex
c) full-duplex
d) all of the above
Answer: (d).
all of the above
49. In a ______ connection, two and only two devices are connected by a dedicated link.
a) multipoint
b) point-to-point
c) (a) and (b)
d) none of the above
Answer: (b).
point-to-point
50. In a ________ connection, three or more devices share a link.
a) multipoint
10
Prepared by Chala T
Hardware Network Service Level III and IV
b) point-to-point
c) (a) and (b)
d) none of the above
Answer: (a).
multipoint
51. ______ refers to the physical or logical arrangement of a network.
a) Data flow
b) Mode of operation
c) Topology
d) None of the above
Answer: (c).
Topology
52. Devices may be arranged in a _____ topology.
a) ring
b) mesh
c) bus
d) all of the above
Answer: (d).
all of the above
53. A _______ is a data communication system within a building, plant, or campus, or between
nearby buildings.
a) LAN
b) MAN
c) WAN
d) none of the above
Answer: (a).
LAN
54. A ______ is a data communication system spanning states, countries, or the whole world.
a) MAN
b) LAN
c) WAN
d) none of the above
Answer: (c).
WAN
55. ________ is a collection of many separate networks.
a) A WAN
11
Prepared by Chala T
Hardware Network Service Level III and IV
b) An internet
c) a LAN
d) None of the above
Answer: (b).
An internet
56. There are ______________ Internet service providers.
a) local
b) regional
c) national and international
d) all of the above
Answer: (d).
all of the above
57. A ________ is a set of rules that governs data communication.
a) forum
b) protocol
c) standard
d) none of the above
Answer: (b).
protocol
58. ________ is an idea or concept that is a precursor to an Internet standard.
a) RCF
b) RFC
c) ID
d) none of the above
Answer: (b).
RFC
59. Network protocols are?
a) Agreements on how communication components and DTE's are to communicate
b) Logical communication channels for transferring data
c) Physical communication channels sued for transferring data
d) None of above
Answer: (a).
Agreements on how communication components and DTE's are to communicate
60. What is a stub network?
a) A network that has only one entry and exit point.
b) A network with only one entry and no exit point.
12
Prepared by Chala T
Hardware Network Service Level III and IV
13
Prepared by Chala T
Hardware Network Service Level III and IV
d) MAC
Answer: (a).
Switch
66. Which of the following is the type of the computer network?
a) Metropolitan area network (MAN)
b) Local area network (LAN)
c) Personal area network (PAN)
d) All of the above
Answer: (d).
All of the above
67. You have shared printers and scanners centrally in a Computer network, what is it called?
a) Data sharing
b) Recourse sharing
c) Device sharing
d) Hardware sharing
Answer: (b).
Recourse sharing
68. Which of the following is the set of rules that governs data communication?
a) FCC
b) Standards
c) Protocols
d) RFCs
Answer: (c).
Protocols
69. How many layers does OSI have?
a) 4
b) 7
c) 5
d) 6
Answer: (b).
7
70. Collection of network or networks is called
a) Intranet
b) Internet
c) Extranet
d) LAN network
14
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: (b).
Internet
81. What does protocol defines?
a) Protocol defines what data is communicated.
b) Protocol defines how data is communicated.
c) Protocol defines when data is communicated.
d) All of above
Answer: (d).
All of above
82. Which of the following includes the benefit of the Networking?
a) File Sharing
b) Easier access to Resources
c) Easier Backups
d) All of the Above
Answer: (d).
All of the Above
83. Which of the following is not the Networking Devices?
a) Gateways
b) Linux
c) Routers
d) Firewalls
Answer: (b).
Linux
84. A network point that provides entrance into another network is called as ___________.
a) Node
b) Gateway
c) Switch
d) Router
Answer: (b).
Gateway
85. We can divide today's networks into ____ broad categories based on switching.
a) four
b) three
c) five
d) two
Answer: (b).
15
Prepared by Chala T
Hardware Network Service Level III and IV
three
86. A repeater is a connecting device that operates in the _______ layer of the Internet model.
a) physical
b) data link
c) network
d) all of the above
Answer: (a).
physical
87. A _______ regenerates a signal, connects segments of a LAN, and has no filtering capability.
a) repeater
b) bridge
c) router
d) none of the above
Answer: (a).
repeater
88. A _______ is a connecting device that operates in the physical and data link layers of the
Internet model.
a) repeater
b) bridge
c) router
d) none of the above
Answer: (b).
bridge
89. A ________ bridge can forward and filter frames and automatically build its forwarding
table.
a) simple
b) dual
c) transparent
d) none of the above
Answer: (c).
transparent
90. A bridge can use the _________ algorithm to create a loopless topology.
a) binary tree
b) spanning tree
c) multiway tree
d) none of the above
16
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: (b).
spanning tree
91. A _______ is a device that operates only in the physical layer.
a) passive hub
b) repeater
c) bridge
d) router
Answer: (b).
repeater
92. A ________receives a signal and, before it becomes too weak or corrupted, regenerates the
original bit pattern. It then sends the refreshed signal.
a) passive hub
b) repeater
c) bridge
d) router
Answer: (b).
repeater
93. A __________ forwards every frame; it has no filtering capability.
a) passive hub
b) repeater
c) bridge
d) router
Answer: (b).
repeater
94. ________ is actually a multiport repeater. It is normally used to create connections between
stations in a physical star topology.
a) An active hub
b) A passive hub
c) either (a) or (b)
d) neither (a) nor (b)
Answer: (a).
An active hub
95. A ________ operates in both the physical and the data link layer.
a) passive hub
b) repeater
c) bridge
17
Prepared by Chala T
Hardware Network Service Level III and IV
d) router
Answer: (c).
bridge
96. A _______ can check the MAC addresses contained in the frame.
a) passive hub
b) repeater
c) bridge
d) router
Answer: (c).
bridge
97. A ______ has a table used in filtering decisions.
a) passive hub
b) repeater
c) bridge
d) none of the above
Answer: (c).
bridge
98. A ________ is a device in which the stations are completely unaware of its existence.
a) passive hub
b) repeater
c) simple bridge
d) transparent bridge
Answer: (d).
transparent bridge
99. A three-layer switch is a kind of ________.
a) repeater
b) bridge
c) router
d) none of the above
Answer: (c).
router
100. A two-layer switch is a ______.
a) repeater
b) bridge
c) router
d) none of the above
18
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: (b).
bridge
101. Some new two-layer switches, called _______ switches, have been designed to forward the
frame as soon as they check the MAC addresses in the header of the frame.
a) cut-through
b) go-through
c) come-through
d) none of the above
Answer: (a).
cut-through
102. A _______ is a three-layer device that handles packets based on their logical addresses.
a) repeater
b) bridge
c) router
d) none of the above
Answer: (c).
router
103. A ______ normally connects LANs and WANs in the Internet and has a table that is used for
making decisions about the route.
a) repeater
b) bridge
c) router
d) none of the above
Answer: (c).
router
104. A ______ switch is a faster and more sophisticated router.
a) two-layer
b) three-layer
c) four-layer
d) none of the above
Answer: (b).
three-layer
105. A ________ is normally a computer that operates in all five layers of the Internet model or
seven layers of OSI model.
a) repeater
b) bridge
19
Prepared by Chala T
Hardware Network Service Level III and IV
c) router
d) gateway
Answer: (d).
gateway
106. A _____ can be used as a connecting device between two internetworks that use different
models.
a) repeater
b) bridge
c) router
d) gateway
Answer: (d).
gateway
107. In a _____ backbone, the backbone is just one switch.
a) bus
b) ring
c) star
d) none of the above
Answer: (c).
star
108. _______ is a first-generation cellular phone system.
a) AMPS
b) D-AMPS
c) GSM
d) none of the above
Answer: (a).
AMPS
109. __________ is a second-generation cellular phone system.
a) AMPS
b) D-AMPS
c) GSM
d) none of the above
Answer: (b).
D-AMPS
110. ____________ is a digital version of AMPS.
a) GSM
b) D-AMPS
20
Prepared by Chala T
Hardware Network Service Level III and IV
c) IS-95
d) none of the above
Answer: (b).
D-AMPS
121. D-AMPS uses ______ to divide each 25-MHz band into channels.
a) FDMA
b) TDMA
c) CDMA
d) both (a) and (b)
Answer: (d).
both (a) and (b)
122. GSM allows a reuse factor of _______.
a) 1
b) 3
c) 5
d) 7
Answer: (b).
3
123. GSM is a digital cellular phone system using ________.
a) FDMA
b) TDMA
c) CDMA
d) both (a) and (b)
Answer: (d).
both (a) and (b)
124. IS-95 is based on ____________.
a) FDMA
b) CDMA
c) DSSS
d) all of the above
Answer: (d).
all of the above
125. IS-95 uses the ISM _______band.
a) 800-MHz
b) 900-MHz
c) 1900-MHz
21
Prepared by Chala T
Hardware Network Service Level III and IV
22
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: (d).
IMT-SC
B. 128 bytes
C. 64 bits
D
128 bits
.
Answer: Option D
Explanation:
An IPv6 address is 128 bits long.
View Answer Discuss
2. What flavor of Network Address Translation can be used to have one IP address allow
many users to connect to the global Internet?
A. NAT
B. Static
C. Dynamic
D
PAT
.
Answer: Option D
Explanation:
Port Address Translation (PAT) allows a one-to-many approach to network address
translation.
View Answer Discuss
3. What are the two main types of access control lists (ACLs)?
Standard
23
Prepared by Chala T
Hardware Network Service Level III and IV
IEEE
Extended
Specialized
A. 1 and 3
B. 2 and 4
C. 3 and 4
D
1 and 2
.
Answer: Option A
Explanation:
Standard and extended access control lists (ACLs) are used to configure security on a
router.
View Answer Discuss
C. config mem
D
wr mem
.
Answer: Option B
Explanation:
The command to back up the configuration on a router is copy running-config
startup-config.
View Answer Discuss
5. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server
connected to the switch running 10Mbps half-duplex as well. How much bandwidth
does each host have to the server?
A. 100 kbps
24
Prepared by Chala T
Hardware Network Service Level III and IV
B. 1 Mbps
C. 2 Mbps
D
10 Mbps
.
Answer: Option D
Explanation:
Each device has 10 Mbps to the server.
6. Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
A. A
B. B
C. G
D
N
.
Answer: Option C
Explanation:
IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the
2.4GHz range, with a top speed of 54Mbps.
7. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192 resides?
A
192.168.168.129-190
.
B. 192.168.168.129-191
C. 192.168.168.128-190
D
192.168.168.128-192
.
25
Prepared by Chala T
Hardware Network Service Level III and IV
D
copy flash tftp
.
Answer: Option D
Explanation:
The command copy flash tftp will prompt you to back up an existing IOS in flash to a
TFTP host.
9. What protocol does PPP use to identify the Network layer protocol?
A. NCP
B. ISDN
C. HDLC
D
LCP
.
Answer: Option A
Explanation:
Network Control Protocol is used to help identify the Network layer protocol used in
the packet.
View Answer Discuss
10. Which of the following commands will allow you to set your Telnet password on a
Cisco router?
A. line telnet 0 4
B. line aux 0 4
26
Prepared by Chala T
Hardware Network Service Level III and IV
C. line vty 0 4
D. line con 0
Answer: Option C
Explanation:
The command line vty 0 4 places you in a prompt that will allow you to set or change
your Telnet password.
11. Which protocol does DHCP use at the Transport layer?
A. IP
B. TCP
C. UDP
D. ARP
Answer: Option C
Explanation:
User Datagram Protocol is a connection network service at the Transport layer, and
DHCP uses this connectionless service.
View Answer Discuss
B. show interface
C. show ip interface
Answer: Option C
Explanation:
The show ip interface command will show you if any outbound or inbound interfaces
have an access list set.
View Answer Discuss
27
Prepared by Chala T
Hardware Network Service Level III and IV
B. Physical layer
D. Application layer
Answer: Option B
Explanation:
Hubs regenerate electrical signals, which are specified at the Physical layer.
View Answer Discuss
Stops an interface from sending periodic dynamic updates but not from
B.
receiving updates.
Answer: Option B
Explanation:
The passive command, short for passive-interface, stops regular updates from being
sent out an interface. However, the interface can still receive updates.
View Answer Discuss
15. Which protocol is used to send a destination network unknown message back to
originating hosts?
A. TCP
B. ARP
C. ICMP
28
Prepared by Chala T
Hardware Network Service Level III and IV
D. BootP
Answer: Option C
Explanation:
ICMP is the protocol at the Network layer that is used to send messages back to an
originating router.
16. How often are BPDUs sent from a layer 2 device?
A. Never
B. Every 2 seconds
C. Every 10 minutes
D. Every 30 seconds
Answer: Option B
Explanation:
Every 2 seconds, BPDUs are sent out from all active bridge ports by default.
View Answer Discuss
17. How many broadcast domains are created when you segment a network with a 12-
port switch?
A. 1
B. 2
C. 5
D
12
.
Answer: Option A
Explanation:
By default, switches break up collision domains but are one large broadcast domain.
View Answer Discuss
18. What does the command routerA(config)#line cons 0 allow you to perform next?
A. Set the Telnet password.
29
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option C
Explanation:
The command line console 0 places you at a prompt where you can then set your
console user-mode password.
View Answer Discuss
19. Which router command allows you to view the entire contents of all access lists?
A. show all access-lists
B. show access-lists
C. show ip interface
D. show interface
Answer: Option B
Explanation:
To see the contents of all access lists, use the show access-lists command.
View Answer Discuss
20. Which class of IP address has the most host addresses available by default?
A. A
B. B
C. C
D. A and B
Answer: Option A
Explanation:
Class A addressing provides 24 bits for host addressing.
30
Prepared by Chala T
Hardware Network Service Level III and IV
21. In a network with dozens of switches, how many root bridges would you have?
A. 1
B. 2
C. 5
D. 12
Answer: Option A
Explanation:
You should have only one root bridge per network.
View Answer Discuss
22. What PPP protocol provides dynamic addressing, authentication, and multilink?
A. NCP
B. HDLC
C. LCP
D. X.25
Answer: Option C
Explanation:
Link Control Protocol in the PPP stack provides dynamic addressing, authentication,
and multilink.
View Answer Discuss
Answer: Option D
31
Prepared by Chala T
Hardware Network Service Level III and IV
Explanation:
Stub networks have only one connection to an internetwork. Only default routes can
be set on a stub network or network loops may occur.
View Answer Discuss
24. If your router is facilitating a CSU/DSU, which of the following commands do you
need to use to provide the router with a 64000bps serial link?
A. RouterA(config)#bandwidth 64
B. RouterA(config-if)#bandwidth 64000
C. RouterA(config-if)#clock rate 64
Answer: Option D
Explanation:
The clock rate command is two words, and the speed of the line is in bps.
View Answer Discuss
C. You should not have more than 10 switches in the same VTP domain.
Answer: Option D
Explanation:
Switches do not propagate VLAN information by default; you must configure the VTP
domain. VLAN Trunking Protocol (VTP) is used to propagate VLAN information across
a trunk link
26. What does a VLAN do?
A. Acts as the fastest port to all servers.
32
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option C
Explanation:
VLANs break up broadcast domains at layer 2.
View Answer Discuss
27. What is the main reason the OSI model was created?
A. To create a layered model larger than the DoD model.
Answer: Option C
Explanation:
The primary reason the OSI model was created was so that different networks could
inter-operate.
View Answer Discuss
28. How many collision domains are created when you segment a network with a 12-
port switch?
A. 1
B. 2
C. 5
D. 12
Answer: Option D
Explanation:
33
Prepared by Chala T
Hardware Network Service Level III and IV
29. What command will display the line, protocol, DLCI, and LMI information of an
interface?
A. sh pvc
B. show interface
D. show run
Answer: Option B
Explanation:
The show interface command shows the line, protocol, DLCI, and LMI information of
an interface.
View Answer Discuss
B. ARP
C. ICMP
D. BootP
Answer: Option C
Explanation:
ICMP is the protocol at the Network layer that is used to send echo requests and
replies.
31. Which command is used to upgrade an IOS on a Cisco router?
A. copy tftp run
C. config net
34
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option D
Explanation:
The copy tftp flash command places a new file in flash memory, which is the default
location for the Cisco IOS in Cisco routers.
View Answer Discuss
32. If you wanted to delete the configuration stored in NVRAM, what would you type?
A. erase startup
B. erase nvram
C. delete nvram
D. erase running
Answer: Option A
Explanation:
The command erase startup-config deletes the configuration stored in NVRAM.
View Answer Discuss
B. 3 and 4
C. 1 only
D. 2 only
35
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option B
Explanation:
VTP is not right because it has nothing to do with trunking except that it sends VLAN
information across a trunk link. 802.1Q and ISL are used to configure trunking on a
port.
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4
Answer: Option B
Explanation:
SMTP, HTTP and FTP use TCP.
View Answer Discuss
2. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
Answer: Option B
Explanation:
The four layers of the TCP/IP stack (also called the DoD model) are Application/Process,
Host-to-Host, Internet, and Network Access. The Host-to-Host layer is equivalent to the
36
Prepared by Chala T
Hardware Network Service Level III and IV
B. 1 and 2
C. 3 and 4
D. 4 only
Answer: Option B
Explanation:
A client that sends out a DHCP Discover message in order to receive an IP address sends out
a broadcast at both layer 2 and layer 3. The layer 2 broadcast is all Fs in hex,
or FF:FF:FF:FF:FF:FF. The layer 3 broadcast is 255.255.255.255, which means all networks
and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at
the Transport layer, also called the Host-to-Host layer.
View Answer Discuss
4. You want to implement a mechanism that automates the IP configuration, including IP
address, subnet mask, default gateway, and DNS information. Which protocol will you use
to accomplish this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
Answer: Option C
Explanation:
37
Prepared by Chala T
Hardware Network Service Level III and IV
B
168.172.19.39
.
C
172.15.14.36
.
D
192.168.24.43
.
Answer: Option D
Explanation:
Class A private address range is 10.0.0.0 through 10.255.255.255. Class B private address
range is 172.16.0.0 through 172.31.255.255, and Class C private address range is
192.168.0.0 through 192.168.255.255.
6. Which of the following allows a router to respond to an ARP request that is intended
for a remote host?
A
Gateway DP
.
B
Reverse ARP (RARP)
.
C
Proxy ARP
.
D
Inverse ARP (IARP)
.
Answer: Option C
Explanation:
Proxy ARP can help machines on a subnet reach remote subnets without configuring
routing or a default gate
38
Prepared by Chala T
Hardware Network Service Level III and IV
way.
View Answer Discuss
7. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD
model is equivalent to
the Network layer of the OSI model?
A
Application
.
B
Host-to-Host
.
C
Internet
.
D
Network Access
.
Answer: Option C
Explanation:
The four layers of the DoD model are Application/Process, Host-to-Host, Internet,
and Network Access. The Internet layer is equivalent to the Network layer of the OSI
model.
View Answer Discuss
39
Prepared by Chala T
Hardware Network Service Level III and IV
B
2 and 4
.
C
1, 2 and 4
.
D
All of the above
.
Answer: Option A
Explanation:
DHCP, SNMP, and TFTP use UDP.
9. Which class of IP address provides a maximum of only 254 host addresses per
network ID?
A
Class A
.
B
Class B
.
C
Class C
.
D
Class D
.
View Answer Discuss
10. If you use either Telnet or FTP, which is the highest layer you are using to
transmit data?
A
Application
.
B
Presentation
.
C
Session
.
40
Prepared by Chala T
Hardware Network Service Level III and IV
D
Transport
.
Answer: Option A
Explanation:
Both FTP and Telnet use TCP at the Transport layer; however, they both are
Application layer protocols, so the Application layer is the best answer.
11. Which of the following is the decimal and hexadecimal equivalents of the binary
number 10011101?
A
155, 0x9B
.
B
157, 0x9D
.
C
159, 0x9F
.
D
185, 0xB9
.
Answer: Option B
Explanation:
To turn a binary number into decimal, you just have to add the values of each bit that
is a 1. The values of 10011101 are 128, 16, 8, 4, and 1. 128 + 16 + 8 + 4 + 1 = 157.
Hexadecimal is a base-16 number system. The values of hexadecimal are 0, 1, 2, 3, 4,
5, 6, 7, 8, 9, A, B, C, D, E, F-16 characters total, from which to create all the numbers
you'll ever need. So, if 1001 in binary is 9, then the hexadecimal equivalent is 9. Since
we then have 1101, which is 13 in binary, the hexadecimal answer is D and the
complete hexadecimal answer is 0x9D.
View Answer Discuss
41
Prepared by Chala T
Hardware Network Service Level III and IV
A
1 only
.
B
2 and 3
.
C
3 and 4
.
D
2, 3 and 4
.
Answer: Option C
Explanation:
Internet Control Message Protocol (ICMP) is used to send error messages through the
network, but they do
not work alone. Every segment or ICMP payload must be encapsulated within an IP
datagram (or packet).
View Answer Discuss
B
1, 3 and 4
.
C
2, 3 and 5
.
42
Prepared by Chala T
Hardware Network Service Level III and IV
D
3, 4 and 5
.
Answer: Option B
Explanation:
This seems like a hard question at first because it doesn't make sense. The listed
answers are from the OSI
model and the question asked about the TCP/IP protocol stack (DoD model).
However, let's just look for what is wrong. First, the Session layer is not in the TCP/IP
model; neither are the Data Link and Physical layers. This
leaves us with the Transport layer (Host-to-Host in the DoD model), Internet layer
(Network layer in the OSI), and Application layer (Application/Process in the DoD).
View Answer Discuss
14. Which layer 4 protocol is used for a Telnet connection?
A
IP
.
B
TCP
.
C
TCP/IP
.
D
UDP
.
Answer: Option B
Explanation:
Although Telnet does use TCP and IP (TCP/IP), the question specifically asks about
layer 4, and IP works at
layer 3. Telnet uses TCP at layer 4.
View Answer Discuss
43
Prepared by Chala T
Hardware Network Service Level III and IV
A
1 only
.
B
2 and 3
.
C
1 and 4
.
D
All of the above
.
Answer: Option B
Explanation:
ICMP is used for diagnostics and destination unreachable messages. ICMP is
encapsulated within IP datagrams, and because it is used for diagnostics, it will
provide hosts with information about network problems.
16. Which of the following are TCP/IP protocols used at the Application layer of the OSI
model?
IP
TCP
Telnet
FTP
TFTP
A
1 and 3
.
B
1, 3 and 5
.
C
3, 4 and 5
.
D
All of the above
.
Answer: Option C
Explanation:
Telnet, File Transfer Protocol (FTP), and Trivial FTP (TFTP) are all Application layer
protocols. IP is a Network
44
Prepared by Chala T
Hardware Network Service Level III and IV
B
ARP
.
C
IP
.
D
ICMP
.
Answer: Option B
Explanation:
Address Resolution Protocol (ARP) is used to find the hardware address from a
known IP address.
View Answer Discuss
B
SMTP
.
C
Telnet
.
D
DNS
.
Answer: Option D
Explanation:
DNS uses TCP for zone exchanges between servers and UDP when a client is trying to
resolve a hostname to an IP address.
45
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
B
0xxxxxxx
.
C
10xxxxxx
.
D
110xxxxx
.
Answer: Option C
Explanation:
The range of a Class B network address is 128-191. This makes our binary
range 10xxxxxx.
1. Which of the following commands sets the secret password to Cisco?
A
enable secret password Cisco
.
B
enable secret cisco
.
C
enable secret Cisco
.
D
enable password Cisco
.
Answer: Option C
Explanation:
The enable secret password is case sensitive, so the second option is wrong. To set
the enable secret <password>, use the enable secret <password> command from
global configuration mode.
View Answer Discuss
46
Prepared by Chala T
Hardware Network Service Level III and IV
2. You type the following command into the router and receive the following output:
A
You need to be in privileged mode.
.
B
You cannot have a space between serial and 0/0.
.
C
The router does not have a serial0/0 interface.
.
D
Part of the command is missing.
.
Answer: Option D
Explanation:
You can view the interface statistics from user mode, but the command is show
interface serial 0/0.
View Answer Discuss
3. Which of the following commands will display the current IP addressing and the layer
1 and 2 status of an interface?
show version
show protocols
show interfaces
show controllers
show ip interface
A
1, 2 and 4
.
B
2, 3 and 5
.
C
3 and 4 only
.
47
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option B
Explanation:
The commands show protocols, show interfaces, and show ip interface will show you
the layer 1 and 2 status and the IP addresses of your router's interfaces.
View Answer Discuss
[output cut]
Line console 0
Exec-timeout 1 35
Password BIXPASSWD
Login
[output cut]
B If no router activity has been detected in 1 hour and 35 minutes, the console
. will be locked out.
Answer: Option C
Explanation:
The exec-timeout command is set in minutes and seconds.
View Answer Discuss
5. What layer of the OSI model would you assume the problem is in if you type show
interface serial 1 and receive the following message?"Serial1 is down, line protocol is
down."
A
Physical layer
.
48
Prepared by Chala T
Hardware Network Service Level III and IV
B
Data Link layer
.
C
Network layer
.
D
None. It is a router problem.
.
Answer: Option A
Explanation:
If you see that a serial interface and the protocol are both down, then you have a
Physical layer problem. If you see serial1 is up, line protocol is down, then you are not
receiving (Data Link) keepalives from the remote end.
6. Which of the following commands displays the configurable parameters and statistics
of all interfaces on a router?
A
show running-config
.
B
show startup-config
.
C
show interfaces
.
D
show versions
.
Answer: Option C
Explanation:
With the show interfaces command, you can view the configurable parameters, get
statistics for the interfaces on the router, verify if the interfaces are shut down, and
see the IP address of each interface.
View Answer Discuss
7. Which of the following commands will configure all the default VTY ports on a
router?
A
Router#line vty 0 4
.
B Router(config)#line vty 0 4
49
Prepared by Chala T
Hardware Network Service Level III and IV
C
Router(config-if)#line console 0
.
D
Router(config)#line vty all
.
Answer: Option B
Explanation:
From global configuration mode, use the line vty 0 4 command to set all five default
VTY lines.
View Answer Discuss
8. You need to find the broadcast address used on a LAN on your router. What
command will you type into the router from user mode to find the broadcast
address?
A
show running-config
.
B
show startup-config
.
C
show interfaces
.
D
show protocols
.
Answer: Option C
Explanation:
The command show ip protocols will actually show you the broadcast address for
each interface - too bad it isn't a possible answer. Your best answer is show
interfaces, which will provide the IP address and mask for each interface.
View Answer Discuss
50
Prepared by Chala T
Hardware Network Service Level III and IV
B
delete startup-config
.
C
erase NVRAM
.
D
erase start
.
Answer: Option D
Explanation:
The erase startup-config command erases the contents of NVRAM and will put you in
setup mode if the router is restarted.
View Answer Discuss
B
Ctrl+^
.
C
Ctrl+C
.
D
Ctrl+Shift+^
.
Answer: Option C
Explanation:
You can exit setup mode at any time by using the keystroke Ctrl+C.
11. What command do you type to save the configuration stored in RAM to NVRAM?
A
Router(config)#copy current to starting
.
B
Router#copy starting to running
.
C
Router(config)#copy running-config startup-config
.
51
Prepared by Chala T
Hardware Network Service Level III and IV
D
Router#copy run startup
.
Answer: Option D
Explanation:
To copy the running-config to NVRAM so that it will be used if the router is restarted,
use the copy running-config startup-config command (copy run start for short).
View Answer Discuss
12. You type Router#sh ru and receive an % ambiguous command error. Why did you
receive this message?
A
The command requires additional options or parameters.
.
B
There is more than one show command that starts with the letters ru.
.
C
There is no show command that starts with ru.
.
D
The command is being executed from the wrong router mode.
.
Answer: Option B
Explanation:
The % ambiguous command error means that there is more then one possible
command that starts with ru. Use a question mark to find the correct command.
View Answer Discuss
13. If you wanted administrators to see a message when logging into the router, which
command would you use?
A
message banner motd
.
B
banner message motd
.
C
banner motd
.
52
Prepared by Chala T
Hardware Network Service Level III and IV
D
message motd
.
Answer: Option C
Explanation:
The typical banner is a message of the day (MOTD) and is set by using the global
configuration mode command banner motd.
View Answer Discuss
14. How many simultaneous Telnet sessions does a Cisco router support by default?
A
2
.
B
3
.
C
4
.
D
5
.
Answer: Option D
Explanation:
Cisco routers, if they do not have the Enterprise edition of the IOS, will default to 5
simultaneous Telnet sessions.
View Answer Discuss
15. You set the console password, but when you display the configuration, the password
doesn't show up; it looks like this:
[output cut]
Line console 0
Exec-timeout 1 44
Password 7098C0BQR
Login
[output cut]
53
Prepared by Chala T
Hardware Network Service Level III and IV
A
encrypt password
.
B
service password-encryption
.
C
service-password-encryption
.
D
exec-timeout 1 35
.
Answer: Option B
Explanation:
The command service password-encryption, from global configuration mode, will
encrypt the passwords.
16. Which command will show you whether a DTE or a DCE cable is plugged into serial 0?
A
sh int s0
.
B
sh int serial 0
.
C
show controllers serial 0
.
D
show serial 0 controllers
.
Answer: Option C
Explanation:
The show controllers serial 0 command will show you whether either a DTE or DCE
cable is connected to the interface. If it is a DCE connection, you need to add clocking
with the clock rate command.
View Answer Discuss
17. You want to totally reinitialize the router and replace the current running-config with
the current startup-config. What command will you use?
A
replace run start
.
54
Prepared by Chala T
Hardware Network Service Level III and IV
B
copy run start
.
C
copy start run
.
D
reload
.
Answer: Option D
Explanation:
To completely replace the running-config with the startup-config, you must reload
the router. Note : You may have picked option C, which isn't a bad answer.
Remember, though, it doesn't replace the configuration, it appends it.
View Answer Discuss
18. If you delete the contents of NVRAM and reboot the router, what mode will you be
in?
A
Privileged mode
.
B
Global mode
.
C
Setup mode
.
D
NVRAM loaded mode
.
Answer: Option C
Explanation:
If you delete the startup-config and reload the router, the router will automatically
enter setup mode. You can also type setup from privileged mode at any time.
View Answer Discuss
19. What is the problem with an interface if you type show interface serial 0 and receive
the following message? "Serial0 is administratively down, line protocol is down."
55
Prepared by Chala T
Hardware Network Service Level III and IV
A
The keepalives are different times.
.
B
The administrator has the interface shut down.
.
C
The administrator is pinging from the interface.
.
D
No cable is attached.
.
Answer: Option B
Explanation:
If an interface is shut down, the show interface command will show the interface as
administratively shut down. (It is possible that no cable is attached, but you can't tell
that from this message.)
View Answer Discuss
1. Which layer 1 devices can be used to enlarge the area covered by a single LAN
segment?
Switch
NIC
Hub
Repeater
RJ45 transceiver
A
1 only
.
B
1 and 3
.
C
3 and 4
.
D
5 only
.
56
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option C
Explanation:
Not that you really want to enlarge a single collision domain, but a hub (multiport
repeater) will provide this for you.
View Answer Discuss
2. Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs
operate at layer _____. Word processing operates at layer _____.
A
3, 3, 1, 7
.
B
3, 2, 1, none
.
C
3, 2, 1, 7
.
D
3, 3, 2, none
.
Answer: Option B
Explanation:
Routers operate at layer 3. LAN switches operate at layer 2. Ethernet hubs operate at
layer 1. Word processing applications communicate to the Application layer interface,
but do not operate at layer 7, so the answer would be none.
View Answer Discuss
B
Packet filtering
.
C
Internetwork communication
.
D
Path selection
.
57
Prepared by Chala T
Hardware Network Service Level III and IV
E
All of the above
.
Answer: Option E
Explanation:
Routers provide packet switching, packet filtering, internetwork communication, and
path selection.
View Answer Discuss
4. Why does the data communication industry use the layered OSI reference model?
It divides the network communication process into smaller and simpler components,
thus aiding component development, design, and troubleshooting.
It enables equipment from different vendors to use the same electronic components,
thus saving research and development funds.
It supports the evolution of multiple competing standards and thus provides business
opportunities for equipment manufacturers.
It encourages industry standardization by defining what functions occur at each layer
of the model.
A
1 only
.
B
1 and 4
.
C
2 and 3
.
D
3 only
.
Answer: Option B
Explanation:
The main advantage of a layered model is that it can allow application developers to
change aspects of a program in just one layer of the layer model's specifications.
Advantages of using the OSI layered model include, but are not limited to, the
following:
It divides the network communication process into smaller and simpler components,
thus aiding compo- nent development, design, and troubleshooting;
it allows multiple-vendor development through standardization of network
58
Prepared by Chala T
Hardware Network Service Level III and IV
components;
it encourages industry standardization by defining what functions occur at each layer
of the model;
it allows various types of network hardware and software to communicate;
and it prevents changes in one layer from affecting other layers, so it does not
hamper development.
View Answer Discuss
5. A receiving host has failed to receive all of the segments that it should acknowledge.
What can the host do to improve the reliability of this communication session?
A
Send a different source port number.
.
B
Restart the virtual circuit.
.
C
Decrease the sequence number.
.
D
Decrease the window size.
.
Answer: Option D
Explanation:
A receiving host can control the transmitter by using flow control (TCP uses
Windowing by default). By decreasing the window size, the receiving host can slow
down the transmitting host so the receiving host does not overflow its buffers.
View Answer Discuss
Networking :: Internetworking
Home » Engineering » Networking » Internetworking » Internetworking
Exercise :: Internetworking - Internetworking
Internetworking - Internetworking
6. What are the decimal and hexadecimal equivalents for the binary number 10110111?
A
69/0x2102
.
B
183/B7
.
59
Prepared by Chala T
Hardware Network Service Level III and IV
C
173/A6
.
D
83/0xC5
.
Answer: Option B
Explanation:
You must be able to take a binary number and convert it into both decimal and
hexadecimal. To convert to decimal, just add up the 1s using their values. The values
that are turned on with the binary number of 10110111 are 128 + 32 + 16 + 4 + 2 + 1
= 183. To get the hexadecimal equivalent, you need to break the eight binary digits
into nibbles (4 bits), 1011 and 0111. By add- ing up these values, you get 11 and 7. In
hexadecimal, 11 is B, so the answer is 0xB7.
View Answer Discuss
B
To reassemble segments in the correct order at the destination device.
.
C To provide a means for the receiver to govern the amount of data sent by the
. sender.
D
To regulate the size of each segment.
.
Answer: Option C
Explanation:
Flow control allows the receiving device to control the transmitter so the receiving
device's buffer does not overflow.
View Answer Discuss
8. Which three statements are true about the operation of a full-duplex Ethernet
network?
There are no collisions in full-duplex mode.
A dedicated switch port is required for each full-duplex node.
60
Prepared by Chala T
Hardware Network Service Level III and IV
B
2 and 4
.
C
2, 3 and 4
.
D
5 only
.
Answer: Option A
Explanation:
Full-duplex means you are using both wire pairs simultaneously to send and receive
data. You must have a dedicated switch port for each node, which means you will not
have collisions. Both the host network card and the switch port must be capable and
set to work in full-duplex mode.
View Answer Discuss
B
1, 3 and 4
.
C
2 only
.
61
Prepared by Chala T
Hardware Network Service Level III and IV
D
3 only
.
Answer: Option B
Explanation:
The common types of flow control are buffering, windowing, and congestion
avoidance.
View Answer Discuss
B
2 and 3
.
C
2 and 4
.
D
4 only
.
Answer: Option B
Explanation:
Bridges break up collision domains, which allow more bandwidth for users.
View Answer
11. How does a host on an Ethernet LAN know when to transmit after a collision has
occurred?
In a CSMA/CD collision domain, multiple stations can successfully transmit data
simultaneously.
In a CSMA/CD collision domain, stations must wait until the media is not in use
before transmitting.
You can improve the CSMA/CD network by adding more hubs.
After a collision, the station that detected the collision has first priority to resend
62
Prepared by Chala T
Hardware Network Service Level III and IV
B
2 and 4
.
C
1,3 and 4
.
D
2 and 5
.
Answer: Option D
Explanation:
Once transmitting stations on an Ethernet segment hear a collision, they send an
extended jam signal to ensure that all stations recognize the collision. After the
jamming is complete, each sender waits a predetermined amount of time, plus a
random time. After both timers expire, they are free to transmit, but they must
make sure the media is clear before transmitting and that they all have equal
priority.
View Answer Discuss
B
3 and 4
.
C 3 and 5
63
Prepared by Chala T
Hardware Network Service Level III and IV
D
2, 3 and 5
.
Answer: Option D
Explanation:
Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-
point connection between two devices capable of running full duplex. Switches
and hosts can run full duplex between each other, but a hub can never run full
duplex.
View Answer Discuss
B
Layer 3
.
C
Layer 4
.
D
Layer 7
.
View Answer Discuss
B 2 only
64
Prepared by Chala T
Hardware Network Service Level III and IV
C
2 and 3 only
.
D
3 only
.
Answer: Option A
Explanation:
An Ethernet frame has source and destination MAC addresses, an Ether-Type field
to identify the Network layer protocol, the data, and the FCS field that holds the
answer to the CRC.
View Answer Discuss
15. What type of RJ45 UTP cable do you use to connect a PC's COM port to a router or
switch console port?
A
Straight-through
.
B
Crossover cable
.
C
Crossover with a CSU/DSU
.
D
Rolled
.
Answer: Option D
Explanation:
To connect to a router or switch console port, you would use an RJ45 UTP rolled
cable
16. How to implement a network medium that is not susceptible to EMI. Which type of
cabling should you use?
A
Thicknet coax
.
B
Thinnet coax
.
65
Prepared by Chala T
Hardware Network Service Level III and IV
C
Category 5 UTP cable
.
D
Fiber-optic cable
.
Answer: Option D
Explanation:
Fiber-optic cable provides a more secure, long-distance cable that is not susceptible
to EMI interference at high speeds.
View Answer Discuss
B
Data Link
.
C
Network
.
D
Transport
.
Answer: Option D
Explanation:
The Transport layer receives large data streams from the upper layers and breaks
these up into smaller pieces called segments.
View Answer Discuss
B
Segment, data, packet, frame, bit
.
66
Prepared by Chala T
Hardware Network Service Level III and IV
D
Data, segment, frame, packet, bit
.
View Answer Discuss
B
1,2 and 3
.
C
1 and 4
.
D
4 only
.
Answer: Option C
Explanation:
Unlike full duplex, half-duplex Ethernet operates in a shared collision domain, and it
has a lower effective throughput than full duplex.
View Answer Discuss
B
Crossover cable
.
67
Prepared by Chala T
Hardware Network Service Level III and IV
C
Crossover with a CSU/DSU
.
D
Crossover with a router in between the two switches
.
Answer: Option B
Explanation:
To connect two switches together, you would use a RJ45 UTP crossover cable.
1. What
command is
used to
count the
total number
of lines,
words, and
characters
contained in
a file?
A
countw
.
B
wcount
.
C
wc
.
D count
. p
None
E
of the
.
above
Answer: Opti
on C
Explanation:
No answer
description
available for
68
Prepared by Chala T
Hardware Network Service Level III and IV
this
question. Let
us discuss.
View
Answer Disc
uss
B. rm
C. delete
D. erase
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. remove
C. rd
D. rmdir
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
69
Prepared by Chala T
Hardware Network Service Level III and IV
B. y
C. a
D. z
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. IBM-compatible
C. Alpha
D. Macintosh
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
6. The physical layer of a network
A. constructs packets of data and sends them across the network
defines the electrical characteristics of signals passed between the computer and
C.
communication devices
70
Prepared by Chala T
Hardware Network Service Level III and IV
D
All of the above
.
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
7. What TCP/IP protocol is used for remote terminal connection service?
A. UDP
B. RARP
C. FTP
D
TELNET
.
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
8. How many networks and nodes per network, are allowed by the Class B network?
A. 127 networks and 16,777,216 nodes per network
D
All of the above
.
71
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. SMB
C. NIS
D
DNS
.
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
10. Which of the following command is used to create a Linux installation boot floppy?
A. mkboot disk
B. bootfp disk
C. ww and rawwrite
D. dd and rawrite
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
11. How can you add Amit, a new user, to your system?
A. Using useradd
72
Prepared by Chala T
Hardware Network Service Level III and IV
B. Using adduser
C. Using linuxconf
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
12. What file specifies the order in which to use specified name services?
A. /etc/services
B. /etc/nsorder
C. /etc/nsswitch.conf
D. /etc/hosts
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 4
C. 2
73
Prepared by Chala T
Hardware Network Service Level III and IV
D. 1
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
14. In which directory can you store system user default files used for creating user
directories?
A. /usr/tmp
B. /etc/default
C. /etc/skel
D. /etc/users
Answer: Option C
Explanation:
The /etc/skel directory contains files and directories that are automatically copied over
to a new user's home directory when such user is created.
View Answer Discuss
D. rpm -e ipchains-1.3.9-5.i386.rpm
Answer: Option C
74
Prepared by Chala T
Hardware Network Service Level III and IV
Explanation:
No answer description available for this question. Let us discuss.
1. Telecommunications networks come in a wide range of speed and capacity capabilities.
Select the best fit for answer:
A. Bandwidth alternatives
B. Switching alternating
D. Extranets
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
75
Prepared by Chala T
Hardware Network Service Level III and IV
B. computer
C. communication adapter
D. serial port
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
4. What frequency range is used for TV transmission and low power microwave applications?
A. Very Low Frequency : 3 kHz to 30 kHz
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Satellite transponders contain a device that echos the radiation without change from
B.
one point on earth to another
Satellite transponder contain devices that transform the message sent from one
C.
location on earth to a different code for transmission to another location
76
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
6. We can receive data either through our television aerial or down our telephone lines and
display this data on our television screen. What is the general name given to this process?
A. Viewdata
B. Teletext
C. Telesoftware
D. Videotex
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
7. ASK, PSK, FSK, and QAM are examples of _____ encoding.
A. digital-to-digital
B. digital-to-analog
C. analog-to-analog
D. analog-to-digital
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
77
Prepared by Chala T
Hardware Network Service Level III and IV
B. the interface between the X.25 network and packet mode device
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
10. You need to determine whether IP information has been assigned to your Windows NT.
Which utility should you use?
A. NBTSTAT
B. NETSTAT
78
Prepared by Chala T
Hardware Network Service Level III and IV
C. IPCONFIG
D. WINIPCFG
E. PING
Answer: Option C
11. Eight stations are competing for the use of the shared channel using the modified Adaptive
free walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once,
how many bit slots are needed to resolve the contention?
A. 1 slots
B. 5 slots
C. 10 slots
D. 14 slots
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
12. When two computers communicate with each other, they send information back and forth.
If they are separated by a reasonable distance, they can send and receive the information
through a direct cable connection which is called a null-modem connection. Presently what
is the maximum distance in metres permitted in this null-modem connection?
A. 80
B. 100
C. 30
D. 150
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
79
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
13. Modulation in which the two binary values are represented by two different amplitudes of
the carrier frequency is known as
A. Amplitude-shift keying
B. Amplitude
C. Amplitude modulation
D. Aloha
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
14. You have been contracted to install a windows NT network in an office that is located in a
strip mall. The office is located next to the power plant of the building, so a UPS
(uninterruptible power supply) has already been installed. What type of cable should you
use for the network cabling? Choose the best answer.
A. TI
B. UTP
C. Fiber-optic
D. PSTN
E. STP
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
80
Prepared by Chala T
Hardware Network Service Level III and IV
15. Communication circuits that transmit data in both directions but not at the same time are
operating in
A. a simplex mode
B. a half-duplex mode
C. a full-duplex mode
D. an asynchronous mode
Answer: Option B
16. In a synchronous modem, the digital-to-analog converter transmits signal to the
A. equalizer
B. modulator
C. demodulator
D. terminal
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
17. If the client receives an address from a DHCP server, what is the only information available
in the Network Properties dialog box?
A. The IP address
81
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
18. An internetworking protocol that provides virtual circuit service across multiple X.25
protocol, is
A. X.75
B. X.25
C. X.400
D. X.21
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
19. Which of the following TCP/IP protocol is used for transferring files from one machine to
another?
A. RARP
B. ARP
C. TCP
D. FTP
Answer: Option D
Explanation:
82
Prepared by Chala T
Hardware Network Service Level III and IV
B. Wave guide
Answer: Option D
21. Which transmission mode is used for data communication along telephone lines?
A. Parallel
B. Serial
C. Synchronous
D. Asynchronous
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
83
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
23. With an IP address starting at 200, you currently have 10 subnets. What subnet mask should
you use to maximize the number of available hosts?
A. 192
B. 224
C. 240
D. 248
E. 252
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
24. Which of the following communications modes support two-way traffic but in only one
direction of a time?
A. simplex
B. half-duplex
C. three-quarters duplex
Answer: Option B
Explanation:
84
Prepared by Chala T
Hardware Network Service Level III and IV
25. Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP
address from a server?
A. RDP
B. RARP
C. RIP
D. X.25
Answer: Option B
26. In OSI network architecture, the dialogue control and token management are
responsibilities of
A. session layer
B. network layer
C. transport layer
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
27. Which of the following transmission systems provides the highest data rate to an individual
device
A. Computer bus
B. Telephone lines
85
Prepared by Chala T
Hardware Network Service Level III and IV
D. leased lines
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
28. Which of the following connectivity devices is used to extend a network on a purely
mechanical basis?
A. Gateway
B. Switch
C. Router
D. Active hub
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
29. The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI
model. A number of standards were agreed upon during that time. Which of the following is
the standard for Ethernet?
A. 802.2
B. 802.3
C. 802.4
D. 802.5
E. 802.6
86
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
30. Which of the following digits are known as the terminal number of the Network User
Address (NUA)?
A. 5-7
B. 1-4
C. 8-12
D. 13-14
Answer: Option C
Explanation:
No answer description available for this question
31. Which of the following device is used with an X.25 network to provide service to
asynchronous terminals
A. repeater
B. bridges
C. gateway
D. Packet assembler/disassemble
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
32. A medium access control technique for multiple access transmission media is
87
Prepared by Chala T
Hardware Network Service Level III and IV
A. Aloha
B. Amplitude
C. Angle modulation
D. Attenuation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
34. Which of the following TCP/IP protocol is used for remote terminal connection service?
A. TELNET
B. FTP
C. RARP
88
Prepared by Chala T
Hardware Network Service Level III and IV
D. UDP
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
35. Networks where end user workstations are tied to LAN servers to share resources and
application processing.
A. Internetworked enterprise
D. Client/Server networks
Answer: Option D
36. The frequency range : 300 kHz to 3 MHz is used for
A. AM radio transmission
B. FM radio transmission
C. TV transmission
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
89
Prepared by Chala T
Hardware Network Service Level III and IV
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
38. A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who
provides the appropriate instruction to the modem for this purpose?
A. Communications software
D. Telecommunications
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
39. IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____
sublayer.
A. HDLC, PDU
B. PDU, HDLC
C. MAC, LLC
90
Prepared by Chala T
Hardware Network Service Level III and IV
D. LLC, MAC
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
40. Two computers that communicate with each other use a simple parity check to detect
errors for ASCII transmissions. Which of the following events will always lead to an
undeleted error?
A. one bit or any odd number of bits inverted in a block of data during transmission
B. two bits or any even number of bits inverted in a block during transmission
C. one bit or any odd number of bits inverted in a byte during transmission
D. two bits or any even number of bits inverted in a byte during transmission
Answer: Option D
41. Which utility is an all-purpose tool for troubleshooting TCP/IP problems?
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
91
Prepared by Chala T
Hardware Network Service Level III and IV
B. modulator
C. stations
D. transponders
Answer: Option D
B. repeater
C. bridge
D. hub
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
2. A computer that handles resource sharing and network management in a local area
network. Select the best fit for answer:
A. Network Server
D. OSI
Answer: Option A
92
Prepared by Chala T
Hardware Network Service Level III and IV
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
3. Repeaters are often used on an 802.3 network to help strengthen the signals being
transmitted. As with the length of segments and the number of segments, a limit exists as to
how many repeaters can be used between any two nodes. What is the maximum number of
repeaters that can be used?
A. Five
B. Two
C. Four
D. Six
E. Three
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
4. How much power (roughly) a light-emitting diode can couple into an optical fiber?
A. 100 microwatts
B. 440 microwatts
C. 100 picowatts
D. 10 milliwatts
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
93
Prepared by Chala T
Hardware Network Service Level III and IV
5. A modem that is attached to the telephone system by jamming the phone's handset into
two flexible receptacles in the coupler?
A. gateway
B. bridge
C. acoustic coupler
D. time-division multiplexer
Answer: Option C
6. With telecommunications and a personal computer you can
A. "download" free public domain programs
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
94
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 00011110
C. 00001111
D. 11100000
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
9. What can cause a problem with communication with a client by name but not by IP
address?
A. The IP address
C. Subnet mask
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
95
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
B. link layer
C. transport layer
D. network layer
Answer: Option A
11. What is the term used to describe addresses available on a DHCP server?
A. Pools
B. Scopes
C. Ranges
D. Notes
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. RTS
C. CTS
D. DSR
96
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
14. Which of the following files is used for NetBIOS name resolution?
A. HOSTS
B. LMHOSTS
C. ARP
D. FQDN
Answer: Option B
Explanation:
97
Prepared by Chala T
Hardware Network Service Level III and IV
C. is discarded
D. is the remainder
Answer: Option C
16. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A. 1
B. 2
C. 3
D. multiple
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. wand
C. cursor
98
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
18. A protocol is a set of rules governing a time sequence of events that must take place
A. between peers
B. between modems
C. between an interface
D. across an interface
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
19. The coming together of three technologies i.e. microelectronics, computing and
communications has ushered in
A. information explosion
B. information technology
C. business revolution
D. educational upgradation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
99
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
Answer: Option D
21. Sales persons and other employees of the company who spend much of their time away
from their offices but keep in touch with their company's microcomputers or main frame
computers over telephone lines are called
A. field workers
B. telecommuters
C. teleprocessors
D. company directors
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. FTP
C. SNMP
100
Prepared by Chala T
Hardware Network Service Level III and IV
D. SMS
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
24. Brad is in charge of a small network and wants to make it simple but secure. The users want
to have full control over their data and still be able to share data with the rest of the office.
The networking knowledge of the office staff is excellent. Which network(s) would be the
best to set up?
A. Peer-to-peer
B. Master domain
C. Server-based
D. Ethernet
E. Share-level
Answer: Option A
Explanation:
101
Prepared by Chala T
Hardware Network Service Level III and IV
B. Band width
C. Aloha
D. Analog transmission
Answer: Option A
26. Most data communications involving telegraph lines use:
A. simplex lines
B. wideband channels
C. narrowband channels
D. dialed service
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
27. You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible
number of host IDs per subnet. Which subnet mask should you assign?
A. 255.255.224.0
B. 255.255.240.0
C. 255.255.248.0
102
Prepared by Chala T
Hardware Network Service Level III and IV
D. 255.255.252.0
E. 255.255.255.255
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
29. Which multiplexing technique shifts each signal to a different carrier frequency?
A. FDM
B. synchronous TDM
C. asynchronous TDM
Answer: Option A
Explanation:
103
Prepared by Chala T
Hardware Network Service Level III and IV
B. UDP
C. NetBEUI
D. TCP
Answer: Option D
31. The loss in signal power as light travels down the fiber is called
A. attenuation
B. propagation
C. scattering
D. interruption
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. virtual storage
C. multiprogramming
104
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
33. Which layer of international standard organization's OSI model is responsible for creating
and recognizing frame boundaries?
A. physical layer
C. transport layer
D. network layer
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
34. Which of the following might be used by a company to satisfy its growing communications
needs?
A. front-end processor
B. multiplexer
C. controller
D. concentrator
Answer: Option E
Explanation:
105
Prepared by Chala T
Hardware Network Service Level III and IV
B. interface card
C. special wires
D. telephone lines
Answer: Option B
36. The Token-Ring architecture was developed for a more efficient way to determine who
should be transmitting at any one time. With Ethernet, collisions may take place, causing
the transmitting computers to have to retransmit their data. The use of token guarantees
that only one computer can transmit at a time. What happens as the network increases in
size? Choose the best answer
A. An additional token is added for every 1,000 nodes
The speed of the Token-Ring network must be 16Mbps if the number of nodes is
B.
greater then 500
After the number of nodes exceeds 550, the Multistation Access Unit must be
D.
replaced by the more powerful Hyperstation Unified Bandwidth device
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
106
Prepared by Chala T
Hardware Network Service Level III and IV
C. multiple CPUs
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
38. When a host knows its physical address but not its IP address, it can use _____.
A. RARP
B. ARP
C. IGMP
D. ICMP
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
39. What is the name given to the exchange of control signals which is necessary for
establishing a connection between a modem and a computer at one end of a line and
another modem and computer at the other end?
A. Handshaking
B. Modem options
107
Prepared by Chala T
Hardware Network Service Level III and IV
C. Protocol
D. Duplexing
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
40. A communications medium that uses pulses of laser light in glass fibers. Select the best fit
for answer:
A. Fiber optic cables
C. Telecommunications processors
D. Telecommunications software
Answer: Option A
41. After you have verified that TCP/IP is installed correctly, what is the next step in verifying
the TCP/IP configuration?
A. Ping the broadcast address
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
108
Prepared by Chala T
Hardware Network Service Level III and IV
42. Which utility is useful for troubleshooting NetBIOS name resolution problems?
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 24
C. 25
D. 30
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
44. In OSI model, which of the following layer transforms information from machine format into
that understandable by user
A. application
B. presentation
C. session
109
Prepared by Chala T
Hardware Network Service Level III and IV
D. physical
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. telephone lines
C. radio signals
Answer: Option D
46. Which of the following is an important characteristic of LAN?
A. application independent interfaces
B. unlimited expansion
D. parallel transmission
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
110
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
48. A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell
how long will it take?
A. 2 seconds
B. 20 seconds
C. 120 seconds
D. 12 seconds
Answer: Option B
1. Most networks are connected to other local area or wide area networks. Select the best fit
for answer:
A. Internet works
B. The Internet
C. Internet revolution
D. Internet technologies
Answer: Option A
111
Prepared by Chala T
Hardware Network Service Level III and IV
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
2. You are working with a network that is 172.16.0.0 and would like to support 600 hosts per
subnet. What subnet mask should you use?
A. 255.255.192.0
B. 255.255.224.0
C. 255.255.240.0
D. 255.255.248.0
E. 255.255.252.0
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
3. A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the
maximum possible transmission rate?
A. 1.5 Mbaud/sec
B. 6 Mband/sec
C. 12 Mbaud/sec
D. 24 Mbaud/sec
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
112
Prepared by Chala T
Hardware Network Service Level III and IV
4. Which of the following digits are known as the sub-address digits (for use by the user) of the
Network User Address (NUA)?
A. 5-7
B. 1-4
C. 8-12
D. 13-14
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
a check bit appended to an array of binary digits to make the sum of all the binary
B.
digits.
D. the ratio of the data units in error to the total number of data units
Answer: Option C
6. A modulator converts a _____ signal to a(n) _____ signal.
A. FSK; PSK
B. PSK; FSK
C. analog; digital
113
Prepared by Chala T
Hardware Network Service Level III and IV
D. digital; analog
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. CERN
C. ARPA
D. Netscape
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
8. You have purchased a MAU (Multistation Access Unit) from your computer supplier and
now must decide what type of network card you should install in the workstations. Which of
the following would be the most appropriate?
A. Fast SCSI Wide
B. Token-Ring
C. ArcServe
D. Ethernet
Answer: Option B
114
Prepared by Chala T
Hardware Network Service Level III and IV
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.255.0
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. duplex channel
Answer: Option A
11. Who originally designed TCP/IP?
A. The Department of Defense
B. Novell
C. IBM
115
Prepared by Chala T
Hardware Network Service Level III and IV
D. Xerox
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
12. The systematic access of small computers in a distributed data processing system is referred
to as:
A. dialed service
B. multiplexing
C. polling
D. conversational mode
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
13. The process of converting analog signals into digital signals so they can be processed by a
receiving computer is referred to as:
A. modulation
B. demodulation
C. synchronizing
D. synchronizing
Answer: Option B
116
Prepared by Chala T
Hardware Network Service Level III and IV
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. DDS
C. WATS
D. DDT
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
15. How many OSI layers are covered in the X.25 standard?
A. two
B. three
C. seven
D. six
Answer: Option B
16. A band is always equivalent to
A. a byte
B. a bit
C. 100 bits
117
Prepared by Chala T
Hardware Network Service Level III and IV
D. 16 bits
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 86
C. 80
D. 23
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
18. The most flexibility in how devices are wired together is provided by
A. bus networks
B. ring networks
C. star networks
D. T-switched networks
Answer: Option A
Explanation:
118
Prepared by Chala T
Hardware Network Service Level III and IV
C. The data link layer handles the transfer of data between the ends of a physical link.
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
20. When you connect to an online information service, you are asked to provide some kind of
identification such as your name, an account number and a password. What is the name
given to this brief dialogue between you and the information system?
A. Security procedure
B. Safeguard procedure
C. Identification procedure
D. Log-on procedure
Answer: Option D
21. Bus is
one or more conductors that some as a common connection for a related group of
A.
devices
119
Prepared by Chala T
Hardware Network Service Level III and IV
the condition when two or more stations attempt to use the same channel at the
C.
same time
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
22. Which of the following medium is used for broadband local networks?
A. Coaxial cable
B. optic fiber
C. CATV
D. UTP
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. the quotient
C. the dividend
120
Prepared by Chala T
Hardware Network Service Level III and IV
D. the remainder
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 255
C. 500
D. Unlimited
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
25. The communication mode that supports data in both directions at the same time is
A. simplex
B. half-duplex
C. full-duplex
D. multiplex
Answer: Option C
26. Which of the following program is used to copy files to or from another UNIX timesharing
system over a single link?
A. VMTP
121
Prepared by Chala T
Hardware Network Service Level III and IV
B. TFTP
C. UUCP
D. UART
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
D. alternative routing
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. addressing
122
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
29. Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16
levels. Find the line signaling speed (i.e., modulation rate)
A. 2400 bands
B. 1200 bands
C. 4800 bands
D. 9600 bands.
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
30. You are in the process of analyzing a problem that requires you to collect and store TCP/IP
Packets. Which of the following utilities is best suited for this purpose?
A. NBTSTAT
B. Performance Monitor
C. NETSTAT
D. Network Monitor
Answer: Option D
31. A software that allows a personal computer to pretend it as a terminal is
A. auto-dialing
123
Prepared by Chala T
Hardware Network Service Level III and IV
B. bulletin board
C. modem
D. terminal emulation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
32. What is the name of the network topology in which there are bi-directional links between
each possible node?
A. Ring
B. Star
C. Tree
D. Mesh
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
124
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. a telephone line
C. a personal computer
Answer: Option D
36. Videotex is a combination of
A. television
125
Prepared by Chala T
Hardware Network Service Level III and IV
B. communication
C. computer technology
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
37. Which of the following frequency ranges is used for AM radio transmission?
A. Very Low Frequency : 3 kHz to 30 kHz
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
38. Baseband is
A. transmission of signals without modulation
126
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
39. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital
signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per
second are actually sent?
A. 32 Kbps
B. 64 Kbps
C. 8 Kbps
D. 128 Kbps.
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
40. X.21 is
a method of determining which device has access to the transmission medium at any
A.
time
Answer: Option D
41. What is the minimum number of wires required for sending data over a serial
communications links?
A. 2
127
Prepared by Chala T
Hardware Network Service Level III and IV
B. 1
C. 4
D. 3
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
43. Which command-line tool is included with every Microsoft TCP/IP client?
A. DHCP
B. WINS
C. PING
D. WINIPCFG
128
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
44. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is
_____.
A. even
B. odd
C. indeterminate
D. 42
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
C. Checksum
D. flow control
Answer: Option A
46. Number of bits per symbol used in Baudot code is
A. 1
B. 5
C. 8
129
Prepared by Chala T
Hardware Network Service Level III and IV
D. 9
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. microwaves
C. satellites
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option B
Explanation:
130
Prepared by Chala T
Hardware Network Service Level III and IV
B. DHCP
C. WINS
D. LMHOSTS
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. Dataphone 50
C. DDD
Answer: Option C
1. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the
following can be valid host IDs on the LAN interface attached to the router?
172.16.1.100
172.16.1.198
172.16.2.255
131
Prepared by Chala T
Hardware Network Service Level III and IV
172.16.3.0
A. 1 only
B. 2 and 3 only
C. 3 and 4 only
Answer: Option C
Explanation:
The router's IP address on the E0 interface is 172.16.2.1/23, which is 255.255.254.0. This
makes the third octet a block size of 2. The router's interface is in the 2.0 subnet, and the
broadcast address is 3.255 because the next subnet is 4.0. The valid host range is 2.1
through 3.254. The router is using the first valid host address in the range.
View Answer Discuss
B. 2 and 4
C. 1, 2 and 4
D. 2, 3 and 4
Answer: Option B
Explanation:
The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet
bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the
subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in
the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255.
The valid host addresses are 2.1 through 3.254.
View Answer Discuss
132
Prepared by Chala T
Hardware Network Service Level III and IV
3. A network administrator is connecting hosts A and B directly through their Ethernet
interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful.
What can be done to provide connectivity between the hosts?
B. 2 only
C. 3 and 4 only
D. 1 and 5 only
E. 2 and 5 only
Answer: Option D
Explanation:
First, if you have two hosts directly connected, as shown in the graphic, then you need a
crossover cable. A straight-through cable won't work. Second, the hosts have different
masks, which puts them in different subnets. The easy solution is just to set both masks to
255.255.255.0 (/24).
View Answer Discuss
4. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
A. 14
133
Prepared by Chala T
Hardware Network Service Level III and IV
B. 15
C. 16
D. 30
Answer: Option D
Explanation:
A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30
hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all.
The number of host bits would never change.
View Answer Discuss
5. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful
subnet mask would you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer: Option B
Explanation:
You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 provides 16
subnets with 14 hosts-this will not work. The mask 255.255.255.224 provides 8 subnets,
each with 30 hosts. This is the best answer
6. You have a network that needs 29 subnets while maximizing the number of host addresses
available on each subnet. How many bits must you borrow from the host field to provide
the correct subnet mask?
A. 2
B. 3
C. 4
D. 5
Answer: Option D
Explanation:
134
Prepared by Chala T
Hardware Network Service Level III and IV
A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more
subnets, so let's add subnet bits. One more subnet bit would be a 248 mask. This provides 5
subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
View Answer Discuss
7. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would
be the valid subnet address of this host?
A. 172.16.112.0
B. 172.16.0.0
C. 172.16.96.0
D. 172.16.255.0
Answer: Option A
Explanation:
A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are
used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the
fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a
value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address
of 127 since 128 is the next subnet.
View Answer Discuss
8. You have an interface on a router with the IP address of 192.168.192.10/29. Including the
router interface, how many hosts can have IP addresses on the LAN attached to the router
interface?
A. 6
B. 8
C. 30
D. 32
Answer: Option A
Explanation:
A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits. Six hosts is
the maximum number of hosts on this LAN, including the router interface.
135
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer: Option C
Explanation:
A /21 is 255.255.248.0, which means we have a block size of 8 in the third octet, so we just
count by 8 until we reach 66. The subnet in this question is 64.0. The next subnet is 72.0, so
the broadcast address of the 64 subnet is 71.255.
View Answer Discuss
10. The network address of 172.16.0.0/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each
Answer: Option B
Explanation:
A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet
bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
11. You need to configure a server that is on the subnet 192.168.19.24/29. The router has the
first available host address. Which of the following should you assign to the server?
A. 192.168.19.0 255.255.255.0
B. 192.168.19.33 255.255.255.240
C. 192.168.19.26 255.255.255.248
136
Prepared by Chala T
Hardware Network Service Level III and IV
D. 192.168.19.31 255.255.255.248
Answer: Option C
Explanation:
A /29 is 255.255.255.248, which is a block size of 8 in the fourth octet. The subnets are 0, 8,
16, 24, 32, 40, etc. 192.168.19.24 is the 24 subnet, and since 32 is the next subnet, the
broadcast address for the 24 subnet is 31. 192.168.19.26 is the only correct answer.
View Answer Discuss
12. You have an interface on a router with the IP address of 192.168.192.10/29. What is the
broadcast address the hosts will use on this LAN?
A. 192.168.192.15
B. 192.168.192.31
C. 192.168.192.63
D. 192.168.192.127
Answer: Option A
Explanation:
A /29 (255.255.255.248) has a block size of 8 in the fourth octet. This means the subnets are
0, 8, 16, 24, etc. 10 is in the 8 subnet. The next subnet is 16, so 15 is the broadcast address.
View Answer Discuss
13. You have a network with a subnet of 172.16.17.0/22. Which is the valid host address?
A. 172.16.17.1 255.255.255.252
B. 172.16.0.1 255.255.240.0
C. 172.16.20.1 255.255.254.0
D. 172.16.18.255 255.255.252.0
Answer: Option D
Explanation:
A Class B network ID with a /22 mask is 255.255.252.0, with a block size of 4 in the third
octet. The network address in the question is in subnet 172.16.16.0 with a broadcast
address of 172.16.19.255. Only option E even has the correct subnet mask listed, and
137
Prepared by Chala T
Hardware Network Service Level III and IV
14. On a VLSM network, which mask should you use on point-to-point WAN links in order to
reduce the waste of IP addresses?
A. /27
B. /28
C. /29
D. /30
Answer: Option D
Explanation:
A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two
hosts per subnet.
View Answer Discuss
15. To test the IP stack on your local host, which IP address would you ping?
A. 127.0.0.0
B. 1.0.0.127
C. 127.0.0.1
D. 127.0.0.255
Answer: Option C
Explanation:
To test the local stack on your host, ping the loopback interface of 127.0.0.1.
16. If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host
belongs to?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
138
Prepared by Chala T
Hardware Network Service Level III and IV
D. 172.16.45.12
Answer: Option D
Explanation:
A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a
block size of 4 and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12
subnet.
View Answer Discuss
17. Using the following illustration, what would be the IP address of E0 if you were using the
eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP
address in the range. The zero subnet should not be considered valid for this question.
A. 192.168.10.142
B. 192.168.10.66
C. 192.168.100.254
D. 192.168.10.143
E. 192.168.10.126
Answer: Option A
Explanation:
A /28 is a 255.255.255.240 mask. Let's count to the ninth subnet (we need to find the
broadcast address of the eighth subnet, so we need to count to the ninth subnet). Starting
139
Prepared by Chala T
Hardware Network Service Level III and IV
at 16 (remember, the question stated that we will not use subnet zero, so we start at 16,
not 0), 16, 32, 48, 64, 80, 96, 112, 128, 144. The eighth subnet is 128 and the next subnet is
144, so our broadcast address of the 128 subnet is 143. This makes the host range 129-142.
142 is the last valid host.
View Answer Discuss
18. Which configuration command must be in effect to allow the use of 8 subnets if the Class C
subnet mask is 255.255.255.224?
A. Router(config)#ip classless
B. Router(config)#no ip classful
C. Router(config)#ip unnumbered
D. Router(config)#ip subnet-zero
Answer: Option D
Explanation:
A Class C subnet mask of 255.255.255.224 is 3 bits on and 5 bits off (11100000) and provides
8 subnets, each with 30 hosts. However, if the command ip subnet-zero is not used, then
only 6 subnets would be available for use.
View Answer Discuss
19. Using the illustration from the previous question, what would be the IP address of S0 if you
were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last
available IP address in the range. Again, the zero subnet should not be considered valid for
this question.
A. 192.168.10.24
B. 192.168.10.62
C. 192.168.10.30
D. 192.168.10.127
Answer: Option C
Explanation:
A /28 is a 255.255.255.240 mask. The first subnet is 16 (remember that the question stated
not to use subnet zero) and the next subnet is 32, so our broadcast address is 31. This
makes our host range 17-30. 30 is the last valid host.
140
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
20. What is the subnetwork address for a host with the IP address 200.10.5.68/28?
A. 200.10.5.56
B. 200.10.5.32
C. 200.10.5.64
D. 200.10.5.0
Answer: Option C
Explanation:
This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is
16 in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
1. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the
following can be valid host IDs on the LAN interface attached to the router?
172.16.1.100
172.16.1.198
172.16.2.255
172.16.3.0
A. 1 only
B. 2 and 3 only
C. 3 and 4 only
Answer: Option C
Explanation:
The router's IP address on the E0 interface is 172.16.2.1/23, which is 255.255.254.0. This
makes the third octet a block size of 2. The router's interface is in the 2.0 subnet, and the
broadcast address is 3.255 because the next subnet is 4.0. The valid host range is 2.1
through 3.254. The router is using the first valid host address in the range.
View Answer Discuss
141
Prepared by Chala T
Hardware Network Service Level III and IV
B. 2 and 4
C. 1, 2 and 4
D. 2, 3 and 4
Answer: Option B
Explanation:
The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet
bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the
subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in
the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255.
The valid host addresses are 2.1 through 3.254.
View Answer Discuss
3. A network administrator is connecting hosts A and B directly through their Ethernet
interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful.
What can be done to provide connectivity between the hosts?
142
Prepared by Chala T
Hardware Network Service Level III and IV
A. 1 only
B. 2 only
C. 3 and 4 only
D. 1 and 5 only
E. 2 and 5 only
Answer: Option D
Explanation:
First, if you have two hosts directly connected, as shown in the graphic, then you need a
crossover cable. A straight-through cable won't work. Second, the hosts have different
masks, which puts them in different subnets. The easy solution is just to set both masks to
255.255.255.0 (/24).
View Answer Discuss
4. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
Answer: Option D
Explanation:
A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30
hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all.
The number of host bits would never change.
View Answer Discuss
5. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful
subnet mask would you use?
A. 255.255.255.192
143
Prepared by Chala T
Hardware Network Service Level III and IV
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer: Option B
Explanation:
You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 provides 16
subnets with 14 hosts-this will not work. The mask 255.255.255.224 provides 8 subnets,
each with 30 hosts. This is the best answer
6. You have a network that needs 29 subnets while maximizing the number of host addresses
available on each subnet. How many bits must you borrow from the host field to provide
the correct subnet mask?
A. 2
B. 3
C. 4
D. 5
Answer: Option D
Explanation:
A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more
subnets, so let's add subnet bits. One more subnet bit would be a 248 mask. This provides 5
subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
View Answer Discuss
7. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would
be the valid subnet address of this host?
A. 172.16.112.0
B. 172.16.0.0
C. 172.16.96.0
D. 172.16.255.0
Answer: Option A
Explanation:
144
Prepared by Chala T
Hardware Network Service Level III and IV
A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are
used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the
fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a
value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address
of 127 since 128 is the next subnet.
View Answer Discuss
8. You have an interface on a router with the IP address of 192.168.192.10/29. Including the
router interface, how many hosts can have IP addresses on the LAN attached to the router
interface?
A. 6
B. 8
C. 30
D. 32
Answer: Option A
Explanation:
A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits. Six hosts is
the maximum number of hosts on this LAN, including the router interface.
View Answer Discuss
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer: Option C
Explanation:
A /21 is 255.255.248.0, which means we have a block size of 8 in the third octet, so we just
count by 8 until we reach 66. The subnet in this question is 64.0. The next subnet is 72.0, so
the broadcast address of the 64 subnet is 71.255.
View Answer Discuss
145
Prepared by Chala T
Hardware Network Service Level III and IV
10. The network address of 172.16.0.0/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each
Answer: Option B
Explanation:
A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet
bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
11. You need to configure a server that is on the subnet 192.168.19.24/29. The router has the
first available host address. Which of the following should you assign to the server?
A. 192.168.19.0 255.255.255.0
B. 192.168.19.33 255.255.255.240
C. 192.168.19.26 255.255.255.248
D. 192.168.19.31 255.255.255.248
Answer: Option C
Explanation:
A /29 is 255.255.255.248, which is a block size of 8 in the fourth octet. The subnets are 0, 8,
16, 24, 32, 40, etc. 192.168.19.24 is the 24 subnet, and since 32 is the next subnet, the
broadcast address for the 24 subnet is 31. 192.168.19.26 is the only correct answer.
View Answer Discuss
12. You have an interface on a router with the IP address of 192.168.192.10/29. What is the
broadcast address the hosts will use on this LAN?
A. 192.168.192.15
B. 192.168.192.31
C. 192.168.192.63
146
Prepared by Chala T
Hardware Network Service Level III and IV
D. 192.168.192.127
Answer: Option A
Explanation:
A /29 (255.255.255.248) has a block size of 8 in the fourth octet. This means the subnets are
0, 8, 16, 24, etc. 10 is in the 8 subnet. The next subnet is 16, so 15 is the broadcast address.
View Answer Discuss
13. You have a network with a subnet of 172.16.17.0/22. Which is the valid host address?
A. 172.16.17.1 255.255.255.252
B. 172.16.0.1 255.255.240.0
C. 172.16.20.1 255.255.254.0
D. 172.16.18.255 255.255.252.0
Answer: Option D
Explanation:
A Class B network ID with a /22 mask is 255.255.252.0, with a block size of 4 in the third
octet. The network address in the question is in subnet 172.16.16.0 with a broadcast
address of 172.16.19.255. Only option E even has the correct subnet mask listed, and
172.16.18.255 is a valid host.
View Answer Discuss
14. On a VLSM network, which mask should you use on point-to-point WAN links in order to
reduce the waste of IP addresses?
A. /27
B. /28
C. /29
D. /30
Answer: Option D
Explanation:
A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two
hosts per subnet.
147
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
15. To test the IP stack on your local host, which IP address would you ping?
A. 127.0.0.0
B. 1.0.0.127
C. 127.0.0.1
D. 127.0.0.255
Answer: Option C
Explanation:
To test the local stack on your host, ping the loopback interface of 127.0.0.1.
16. If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host
belongs to?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
Answer: Option D
Explanation:
A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a
block size of 4 and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12
subnet.
View Answer Discuss
17. Using the following illustration, what would be the IP address of E0 if you were using the
eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP
address in the range. The zero subnet should not be considered valid for this question.
148
Prepared by Chala T
Hardware Network Service Level III and IV
A. 192.168.10.142
B. 192.168.10.66
C. 192.168.100.254
D. 192.168.10.143
E. 192.168.10.126
Answer: Option A
Explanation:
A /28 is a 255.255.255.240 mask. Let's count to the ninth subnet (we need to find the
broadcast address of the eighth subnet, so we need to count to the ninth subnet). Starting
at 16 (remember, the question stated that we will not use subnet zero, so we start at 16,
not 0), 16, 32, 48, 64, 80, 96, 112, 128, 144. The eighth subnet is 128 and the next subnet is
144, so our broadcast address of the 128 subnet is 143. This makes the host range 129-142.
142 is the last valid host.
View Answer Discuss
18. Which configuration command must be in effect to allow the use of 8 subnets if the Class C
subnet mask is 255.255.255.224?
A. Router(config)#ip classless
B. Router(config)#no ip classful
C. Router(config)#ip unnumbered
149
Prepared by Chala T
Hardware Network Service Level III and IV
D. Router(config)#ip subnet-zero
Answer: Option D
Explanation:
A Class C subnet mask of 255.255.255.224 is 3 bits on and 5 bits off (11100000) and provides
8 subnets, each with 30 hosts. However, if the command ip subnet-zero is not used, then
only 6 subnets would be available for use.
View Answer Discuss
19. Using the illustration from the previous question, what would be the IP address of S0 if you
were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last
available IP address in the range. Again, the zero subnet should not be considered valid for
this question.
A. 192.168.10.24
B. 192.168.10.62
C. 192.168.10.30
D. 192.168.10.127
Answer: Option C
Explanation:
A /28 is a 255.255.255.240 mask. The first subnet is 16 (remember that the question stated
not to use subnet zero) and the next subnet is 32, so our broadcast address is 31. This
makes our host range 17-30. 30 is the last valid host.
View Answer Discuss
20. What is the subnetwork address for a host with the IP address 200.10.5.68/28?
A. 200.10.5.56
B. 200.10.5.32
C. 200.10.5.64
D. 200.10.5.0
Answer: Option C
Explanation:
150
Prepared by Chala T
Hardware Network Service Level III and IV
This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is
16 in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
1. Most networks are connected to other local area or wide area networks. Select the best fit
for answer:
A. Internet works
B. The Internet
C. Internet revolution
D. Internet technologies
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
2. You are working with a network that is 172.16.0.0 and would like to support 600 hosts per
subnet. What subnet mask should you use?
A. 255.255.192.0
B. 255.255.224.0
C. 255.255.240.0
D. 255.255.248.0
E. 255.255.252.0
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
3. A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the
maximum possible transmission rate?
A. 1.5 Mbaud/sec
151
Prepared by Chala T
Hardware Network Service Level III and IV
B. 6 Mband/sec
C. 12 Mbaud/sec
D. 24 Mbaud/sec
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
4. Which of the following digits are known as the sub-address digits (for use by the user) of the
Network User Address (NUA)?
A. 5-7
B. 1-4
C. 8-12
D. 13-14
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
a check bit appended to an array of binary digits to make the sum of all the binary
B.
digits.
152
Prepared by Chala T
Hardware Network Service Level III and IV
D. the ratio of the data units in error to the total number of data units
Answer: Option C
6. A modulator converts a _____ signal to a(n) _____ signal.
A. FSK; PSK
B. PSK; FSK
C. analog; digital
D. digital; analog
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. CERN
C. ARPA
D. Netscape
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
153
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
8. You have purchased a MAU (Multistation Access Unit) from your computer supplier and
now must decide what type of network card you should install in the workstations. Which of
the following would be the most appropriate?
A. Fast SCSI Wide
B. Token-Ring
C. ArcServe
D. Ethernet
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.255.0
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
154
Prepared by Chala T
Hardware Network Service Level III and IV
A. simplex channel
B. duplex channel
Answer: Option A
11. Who originally designed TCP/IP?
A. The Department of Defense
B. Novell
C. IBM
D. Xerox
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
12. The systematic access of small computers in a distributed data processing system is referred
to as:
A. dialed service
B. multiplexing
C. polling
D. conversational mode
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
155
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
13. The process of converting analog signals into digital signals so they can be processed by a
receiving computer is referred to as:
A. modulation
B. demodulation
C. synchronizing
D. synchronizing
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. DDS
C. WATS
D. DDT
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
15. How many OSI layers are covered in the X.25 standard?
A. two
156
Prepared by Chala T
Hardware Network Service Level III and IV
B. three
C. seven
D. six
Answer: Option B
16. A band is always equivalent to
A. a byte
B. a bit
C. 100 bits
D. 16 bits
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 86
C. 80
D. 23
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
157
Prepared by Chala T
Hardware Network Service Level III and IV
View Answer Discuss
18. The most flexibility in how devices are wired together is provided by
A. bus networks
B. ring networks
C. star networks
D. T-switched networks
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
C. The data link layer handles the transfer of data between the ends of a physical link.
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
20. When you connect to an online information service, you are asked to provide some kind of
identification such as your name, an account number and a password. What is the name
158
Prepared by Chala T
Hardware Network Service Level III and IV
given to this brief dialogue between you and the information system?
A. Security procedure
B. Safeguard procedure
C. Identification procedure
D. Log-on procedure
Answer: Option D
21. Bus is
one or more conductors that some as a common connection for a related group of
A.
devices
the condition when two or more stations attempt to use the same channel at the
C.
same time
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
22. Which of the following medium is used for broadband local networks?
A. Coaxial cable
B. optic fiber
C. CATV
D. UTP
159
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. the quotient
C. the dividend
D. the remainder
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. 255
C. 500
D. Unlimited
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
160
Prepared by Chala T
Hardware Network Service Level III and IV
25. The communication mode that supports data in both directions at the same time is
A. simplex
B. half-duplex
C. full-duplex
D. multiplex
Answer: Option C
26. Which of the following program is used to copy files to or from another UNIX timesharing
system over a single link?
A. VMTP
B. TFTP
C. UUCP
D. UART
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
D. alternative routing
161
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. addressing
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
29. Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16
levels. Find the line signaling speed (i.e., modulation rate)
A. 2400 bands
B. 1200 bands
C. 4800 bands
D. 9600 bands.
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
162
Prepared by Chala T
Hardware Network Service Level III and IV
30. You are in the process of analyzing a problem that requires you to collect and store TCP/IP
Packets. Which of the following utilities is best suited for this purpose?
A. NBTSTAT
B. Performance Monitor
C. NETSTAT
D. Network Monitor
Answer: Option D
31. A software that allows a personal computer to pretend it as a terminal is
A. auto-dialing
B. bulletin board
C. modem
D. terminal emulation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
32. What is the name of the network topology in which there are bi-directional links between
each possible node?
A. Ring
B. Star
C. Tree
D. Mesh
163
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
164
Prepared by Chala T
Hardware Network Service Level III and IV
B. a telephone line
C. a personal computer
Answer: Option D
36. Videotex is a combination of
A. television
B. communication
C. computer technology
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
37. Which of the following frequency ranges is used for AM radio transmission?
A. Very Low Frequency : 3 kHz to 30 kHz
Answer: Option B
165
Prepared by Chala T
Hardware Network Service Level III and IV
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
38. Baseband is
A. transmission of signals without modulation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
39. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital
signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per
second are actually sent?
A. 32 Kbps
B. 64 Kbps
C. 8 Kbps
D. 128 Kbps.
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
40. X.21 is
166
Prepared by Chala T
Hardware Network Service Level III and IV
a method of determining which device has access to the transmission medium at any
A.
time
Answer: Option D
41. What is the minimum number of wires required for sending data over a serial
communications links?
A. 2
B. 1
C. 4
D. 3
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
Answer: Option C
Explanation:
167
Prepared by Chala T
Hardware Network Service Level III and IV
43. Which command-line tool is included with every Microsoft TCP/IP client?
A. DHCP
B. WINS
C. PING
D. WINIPCFG
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
44. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is
_____.
A. even
B. odd
C. indeterminate
D. 42
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
168
Prepared by Chala T
Hardware Network Service Level III and IV
C. Checksum
D. flow control
Answer: Option A
46. Number of bits per symbol used in Baudot code is
A. 1
B. 5
C. 8
D. 9
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. microwaves
C. satellites
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
169
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. DHCP
C. WINS
D. LMHOSTS
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss
B. Dataphone 50
C. DDD
170
Prepared by Chala T
Hardware Network Service Level III and IV
Answer: Option C
The first layered protocol model we will study is the 4-layer DoD Model. This is the
model originally designed for the Internet, and is important because all of the Internet's
core protocols adhere to it.
The Department of Defense Four-Layer Model was developed in the 1970s for the
DARPA Internetwork Project that eventually grew into the Internet. The core Internet
protocols adhere to this model, although the OSI Seven Layer Model is justly preferred
for new designs.
171
Prepared by Chala T
Hardware Network Service Level III and IV
The four layers in the DoD model, from bottom to top, are:
1. The Network Access Layer is responsible for delivering data over the particular
hardware media in use. Different protocols are selected from this layer,
depending on the type of physical network.
2. The Internet Layer is responsible for delivering data across a series of different
physical networks that interconnect a source and destination machine. Routing
protocols are most closely associated with this layer, as is the IP Protocol, the
Internet's fundamental protocol.
3. The Host-to-Host Layer handles connection rendezvous, flow control,
retransmission of lost data, and other generic data flow management. The
mutually exclusive TCP and UDP protocols are this layer's most important
members.
4. The Process Layer contains protocols that implement user-level functions, such
as mail delivery, file transfer and remote login.
The DoD model is basically a condensed version of the OSI model—it’s composed of
four, instead of seven, layers:
Process/Application layer
Host-to-Host layer
Internet layer
Figure 3-1 shows a comparison of the DoD model and the OSI reference model. As you
can see, the two are similar in concept, but each has a different number of layers with
different names.
routing messages
In the Internet reference model, the layer above the network access layer is called
theinternetwork layer. This layer is responsible for routing messages through
internetworks. Two types of devices are responsible for routing messages between
networks.
The purpose was to allow computers to communicate over long distance networks.
TheTCP part has to do with the verifying delivery of the packets. The IP part refers to the
moving of data packets between nodes. TCP/IP has since then become the foundation
of the Internet.
TCP and IP are two separate computer network protocols. IP is the part that obtains the
address to which data is sent. TCP is responsible for data delivery once that IP address
has been found.
172
Prepared by Chala T
Hardware Network Service Level III and IV
Corresponding Layers
DoD Model OSI Model
Application
Session
Data Link
Network Access Layer
Physical
Defines protocols for node-to-node application communication and also controls user interface
specifications. Consists of a set of services that provide ubiquitous access to all types of networks.
Applications utilize the services to communicate with other devices and remote applications
Have to know what you want and where it is on the server, no directory browsing,
69 TFTP
no user authentication (Trivial File Transfer Protocol)
2049 NFS Allows remote file systems to be mounted as local (Network File System)
25 SMTP Used to send mail between mail servers (Simple Mail Transfer Protocol)
515 LPD Used for print sharing of network printers with TCP/IP (Line Printer Daemon)
161 SNMP Collect and manipulates network information (Simple Network Management
173
Prepared by Chala T
Hardware Network Service Level III and IV
Protocol)
67 BootP Used by diskless workstations to receive boot file and other information via TFTP
Assigns IP addresses to hosts from a pool. Can send IP address, Subnet mask,
DHCP Domain Name, Default Gateway, DNS IP, WINS info. (Dynamic Host Configuration
Protocol)
Host-to-Host Layer
This layer shields the upper layers from the process of sending data. Also provides an end-to-end
connection between two devices during communication by performing sequencing, acknowledgments,
checksums, and flow control. Applications using services at this layer can use two different protocols: TCP
and UDP.
TCP provides a connection-oriented, reliable services to the applications that use its services.
Main Functions of TCP
174
Prepared by Chala T
Hardware Network Service Level III and IV
Before data is sent, the transmitting host contacts the receiving host to set up a connection known as a
virtual circuit. This makes TCP connection-oriented. During the handshake the two hosts agree upon the
amount of information to be sent before an acknowledgment is needed (Windowing). TCP takes the large
blocks of data from the upper layers and breaks them up into segments that it numbers and sequences.
TCP will the pass the segments to the network layer, which will route them through the Internetwork. The
receiving TCP can put the segments back into order. After packets are sent, TCP waits for an
acknowledgment from the receiving end of the virtual circuit. If no acknowledgment is received then the
sending host will retransmit the segment.
Destinatio
n Port
Source Port Number Number
16 bits 16 bits
(Number of calling port) (Number
of called
port)
Sequence Number
32 bits
(Number to ensure proper sequence of data.)
175
Prepared by Chala T
Hardware Network Service Level III and IV
Acknowledgment Number
32-bits
(Identifies next segment expected)
Window
Header size
Length Code bits 16 bits
Reserved
4 bits 6 bits (Number
6 bits
(Number of (Identifies type of segment, setup/termination of octets
(Always 0)
32 bit words of session) the device
in header) is willing
to accept)
Urgent
Pointer
TCP Checksum 16 bits
16 bits (Indicates
(Used to ensure data integrity) end of
urgent
data)
Options
0 or 32 bits
(Identifies maximum segment size)
Data
UDP transports information that doesn't require reliable delivery; therefore it can have less overhead
than TCP as no sequencing or acknowledgments are used. NFS and SNMP use UDP for their sessions,
the applications have their own methods to ensure reliability. UDP receives blocks of information from the
upper layers, which it breaks into segments. It gives each segment a number, sends it, and then forgets
about it. No acknowledgments, no virtual circuits, connectionless protocol.
UDP Checksum
UDP Length
16 bits
16 bits
(Used to ensure data
(Length of UDP in bytes)
integrity)
Data
176
Prepared by Chala T
Hardware Network Service Level III and IV
TCP UDP
Sequenced Unsequenced
TCP and UDP use port numbers to communicate with the upper layers. Port numbers keep track of
different sessions across the network. The source port will be above 1024 (unprivileged). 1023 and below
(privileged) are known as well known ports and are assigned to common protocols. TCP and upper layer
don't use hardware (MAC) and logical (IP) addresses to see the host's address; instead they use port
numbers.
Internet Layer
The Internet Layer exists for routing and providing a single network interface to the upper layers. IP
provides the single network interface for the upper layers.
177
Prepared by Chala T
Hardware Network Service Level III and IV
The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing information and
some control information that enables packets to be routed. IP has two primary responsibilities: providing
connectionless, best-effort delivery of datagrams through an internetwork; and providing fragmentation and
reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes.
All machines on a TCP/IP network have a unique logical address, an IP address. The Internet Layer
(IP) has a complete picture of the entire network and is responsible for path determination and packet
switching. IP is the transport for TCP, UDP, and ICMP and provides an unreliable service. It lets the upper
layer protocols that use it worry about reliability. IP will perform as a connectionless service because it
handles each datagram as an independent entity. IP performs packet switching and path determination by
maintaining tables that indicate where to send a packet based on its IP address. IP gets the destination
address from the packet. IP receives segments from the Host-to-Host layer and fragments them into
packets. IP will then reassemble the packets into segments on the receiving end to send to the Host-to-
Host layer. Each packet has the source and destination IP address. Each router will make path
determinations based on the destination IP address.
The Internet Control Message Protocol (ICMP) is a network-layer Internet protocol that provides
message packets to report errors and other information regarding IP packet processing back to the
source. ICMP utilizes IP to carry the ICMP data within it through a network.
ICMP Messages
ICMPs generate several kinds of useful messages, including Destination Unreachable, Echo Request
and Reply, Redirect, Time Exceeded, and Router Advertisement and Router Solicitation. If an ICMP
message cannot be delivered, no second one is generated. This is to avoid an endless flood of ICMP
messages.
An ICMP echo-request message, which is generated by the ping command, is sent by any host to test
node reachability across an internetwork. The ICMP echo-reply message indicates that the node can be
successfully reached. PING - Packet Internet Gropher, uses echo message to test physical connectivity.
An ICMP Redirect message is sent by the router to the source host to stimulate more efficient routing.
The router still forwards the original packet to the destination. ICMP redirects allow host routing tables to
remain small because it is necessary to know the address of only one router, even if that router does not
178
Prepared by Chala T
Hardware Network Service Level III and IV
provide the best path. Even after receiving an ICMP Redirect message, some devices might continue using
the less-efficient route.
Used to find the MAC address from the known IP address. ARP sends a broadcast asking for the
machine with the specified IP address to respond with its MAC address. If two devices want to
communicate, the first device can send a broadcast ARP message requesting the physical address for a
specified IP address. The receiving device responds with its IP address and the first device maintains the
entry in its ARP cache. If a device doesn't exist on the same subnet, the sending device addresses the the
default gateway's physical address and sends the packet to the default gateway.
This protocol is used to find an IP address when the MAC address is known. A machine sends a
broadcast with its MAC address and requests its IP address. An example of a device that uses RARP is a
diskless workstation. Since it can't store its logical network address, it sends its MAC address to a RARP
server to requests its IP address. A RARP server responds to the RARP request with the device's IP
address.
The Network Access Layer monitors the data exchange between the host and the network. Oversees
MAC addressing and defines protocols for the physical transmission of data.
179
Prepared by Chala T
Hardware Network Service Level III and IV
You can store the zone in files on the DNS server or in the Active Directory Domain
Services (AD DS) database. It is important that you know how and when to create
primary and secondary zones, delegated zones, AD DS–integrated zones, and stub
zones.
Forward lookup zones contain a variety of DNS record type (discussed in the next
section) include:
180
Prepared by Chala T
Hardware Network Service Level III and IV
Less often, a DNS client queries a DNS server for the name of a host when it has the
IPv4 or IPv6 address of the host. This is called a reverse lookup, and is satisfied by
reference to a reverse lookup zone. Reverse lookup zones contain pointer (PTR)
records.
Before you create your zone, you must first determine whether the zone is a forward or
reverse lookup zone. Then you must determine whether the zone is primary, secondary,
or AD DS–integrated. Strictly speaking, it is not the zone that is primary or secondary.
Instead, it is the local copy of the zone that is primary or secondary. In other words, for
there to be a secondary zone for Adatum.com, there must already exist a primary zone
for Adatum.com on another DNS server from which the secondary can obtain the zone
data.
When you first deploy the DNS server role in Windows Server 2016, the DNS Manager
console navigation pane contains the server node, and beneath this, nodes for Forward
Lookup Zones, Reverse Lookup Zones, Trust Points, and Conditional Forwarders.
These nodes are all empty until you start to create zones on the DNS server.
1. Right-click the Forward Lookup Zones node, and then click New Zone.
2. In the New Zone Wizard, on the Welcome To The New Zone Wizard page, click Next.
3. On the Zone Type page, select Primary Zone, as shown in Figure 1-17, and then click
Next.
4. On the Zone Name page, in the Zone name box, type the zone name. For example, type
Contoso.com. Click Next.
5. On the Zone File page:
If you have a DNS zone file with which to populate your zone (for example, from
another DNS server), click Use This Existing File, specify the path to the file, and
then click Next.
If you do not have an existing zone file, click Create A New File With This File
Name and click Next. Figure 1-18 shows the filename that is created
automatically when you choose this option.
6. On the Dynamic Update page, shown in Figure 1-19, choose one of the following, and
then click Next:
Allow Only Secure Dynamic Updates (Recommended For Active
Directory) This option enables clients that support dynamic DNS to update their
records in the DNS zone, such as when a client computer obtains a different IPv4
address from a Dynamic Host Configuration Protocol (DHCP) server. This option
requires that each DNS record has an owner—the entity that registered the
original record. Only the owner can update the record, which helps you secure
your DNS records. This option is only available if you are creating an AD DS–
integrated zone.
181
Prepared by Chala T
Hardware Network Service Level III and IV
After you have created your primary zone, you can view the initial contents of the zone
by using the DNS Manager console, as shown in Figure 1-20. It contains the Start of
Authority (SOA) record and a Name Server (NS) record. These two records define which
computer(s) are responsible, or authoritative, for the zone.
You can also add a primary zone by using the Add-DnsServerPrimaryZone Windows
PowerShell cmdlet. For example, to complete the same process as in the preceding
example by using Windows PowerShell, run the following command:
General You can change the zone type, zone file name, the dynamic updates setting,
and configure aging and scavenging.
Start of Authority (SOA) Shown in Figure 1-21, you can reconfigure the SOA record.
This includes the Primary server’s Fully Qualified Domain Name (FQDN), the
responsible person’s contact details, and the Refresh, Retry, and Expire intervals. These
intervals determine:
Refresh interval The frequency with which other DNS servers that host the zone
must refresh the zone data.
Retry interval The interval at which other DNS servers retry a refresh operation.
Expires after The length of time after failure to refresh zone data other DNS
servers assume that the zone data has expired.
The Start of Authority (SOA) tab also contains the Minimum (Default) TTL value. This is
the value that determines how long records in this zone can be cached by other
recursive DNS servers.
Name Servers Use this tab to add, remove, or edit the name and IP addresses of other
DNS servers that host this zone.
Zone Transfers Use this tab to configure how the zone data is transferred to other
name servers hosting copies of the zone.
WINS Use this tab to configure Windows Internet Name Service (WINS) and DNS
integration. WINS supports the resolution of NetBIOS names. Less relevant today,
NetBIOS names use a nonhierarchical structure based on a 16-character name.
Enabling the Use WINS Forward Lookup option enables the DNS server to respond to
requests for NetBIOS names without the client computer having to petition a WINS
server directly.
182
Prepared by Chala T
Hardware Network Service Level III and IV
To review further details about modifying primary zone properties with Windows
PowerShell, refer to the Microsoft TechNet website at https://technet.microsoft.com/en-
us/library/jj649865.aspx.
To create a secondary zone, you must know the name of the zone, and have the name
and IP address of a DNS server that hosts a copy of the zone.
Exam Tip
The name server you specify as a source for a secondary zone does not have to be
hosting a primary copy of the zone. You can point one secondary zone server to another
secondary zone server. However, somewhere a primary copy of the zone must exist.
You can use the DNS Manager console to create a secondary zone. To do this, use the
following procedure:
1. Right-click the Forward Lookup Zones node, and then click New Zone.
2. In the New Zone Wizard, on the Welcome To The New Zone Wizard page, click Next.
3. On the Zone Type page, select Secondary Zone, and then click Next.
4. On the Zone Name page, in the Zone Name box, type the zone name, and click Next.
5. On the Master DNS Servers page, in the Master Servers list, type the FQDN or IP
address of the server that hosts a copy of the zone, press Enter, and then click Next, as
shown in
6. On the Completing The New Zone Wizard page, click Finish.
After you have added the secondary zone, it is necessary to configure the master DNS
server that you specified. This is to enable zone transfers to your secondary server. To
perform this step, switch to the DNS Manager console on the master server and perform
the following procedure:
183
Prepared by Chala T
Hardware Network Service Level III and IV
In Figure 1-25, you can see two DNS zones: Adatum.com, which contains a
subdomain, marketing.adatum.com, and a second zone, sales.adatum.com, which
contains a single domain, sales.adatum.com.
Your DNS zones are large, and delegation enables you to distribute the zone into
smaller pieces across your organization.
Organizational changes, such as mergers and acquisitions, mean that you have
additional subdomains to manage.
You have a distributed management structure, and want different departments or
locations to be responsible for managing their own DNS namespaces.
184
Prepared by Chala T
Hardware Network Service Level III and IV
To create a DNS delegation, in the DNS Manager console, perform the following
procedure:
1. Right-click the parent zone. For example, right-click Adatum.com, and then click New
Delegation. The New Delegation Wizard launches.
2. In the New Delegation Wizard, on the Welcome page, click Next.
3. On the Delegated Domain Name page, as shown in Figure 1-26, in the Delegated
domain box, type the subdomain name. For example, type Sales. The suffix is added
automatically. Click Next.
4. On the Name Servers page, click Add.
5. In the New Name Server Record dialog box, on the Server Fully Qualified Domain name
(FQDN) box, type the name of the DNS server that hosts the new delegated zone, click
Resolve, and then click OK.
6. On the Name Servers page, click Next, and then click Finish.
Multimaster updates AD DS-integrated DNS zones are multimaster, and updates can
be made to any copy of the zone data. This provides for redundancy in your DNS
infrastructure. If your organization implements dynamic updates to the DNS zone, then
geographically remote DNS clients can update their records by connecting to the nearest
DNS server.
Replicated using AD DS replication AD DS replication is based at the attribute-level.
This means that only changed attributes, rather than entire records, are replicated. This
means that the volume of zone transfer traffic can be reduced.
Secure dynamic updates You can implement secure dynamic updates in an AD DS–
integrated zone. This is discussed in the next section.
185
Prepared by Chala T
Hardware Network Service Level III and IV
Exam Tip
When you promote a new domain controller in your AD DS forest, the DNS server role
deploys automatically. This is configurable on the Domain Controller Options page of the
Active Directory Domain Services Configuration Wizard.
When you create zones on a DNS server that is also a domain controller, you have the
option to install an AD DS-integrated zone. To create an AD DS-integrated DNS zone,
use the following procedure:
You can also create an AD DS-integrated primary zone by using the Add-
DnsServerPrimaryZone Windows PowerShell cmdlet. For example, to complete the
same process as in the preceding example by using Windows PowerShell, run the
following command:
186
Prepared by Chala T
Hardware Network Service Level III and IV
With secure dynamic updates, the DNS server assigns ownership to the registered DNS
records, and only the owner—the original DNS client—can update the records. To
enable secure dynamic updates, you can choose one of the following options:
Select the Allow Only Secure Dynamic Updates (Recommended For Active Directory)
option on the Dynamic Updates page of the New Zone Wizard when you create an AD
DS-integrated primary zone.
After creating the AD DS-integrated primary zone, in DNS Manager, right-click the DNS
zone, and then click Properties. On the General page, in the Dynamic Updates list, click
Secure Only.
After creating the AD DS-integrated primary zone in Windows PowerShell, use the Set-
DnsServerPrimaryZone command. For example:
Alternatively, you can also use a stub zones to achieve a similar result. A stub zone is
used by a DNS server to help resolve names between two separate DNS namespaces,
such as following a merger or acquisition. A stub zone differs from conditional forwarding
in that the stub zone contains the complete list of DNS servers for the other domain.
To avoid this, in the Adatum.com domain, you could configure DNS conditional
forwarding for the Contoso.com domain. With conditional forwarding, you configure to
which DNS server(s) in the Contoso.com domain to forward DNS queries.
187
Prepared by Chala T
Hardware Network Service Level III and IV
You can also use a stub zone for Contoso.com in the Adatum.com domain. This stub
zone contains the complete list of DNS server that are authoritative for the foreign
domain. This list of servers is updated automatically.
You must manually maintain conditional forwarding records, while stub zones are
maintained automatically.
With conditional forwarding, you can designate the specific foreign DNS server to
forward queries to, but with a stub zone, you cannot.
1. Right-click the Forward Lookup Zones node, and then click New Zone.
2. On the New Zone Wizard, on the Welcome to the New Zone Wizard page, click Next.
3. On the Zone Type page, select Stub Zone, and then click Next.
4. On the Zone Name page, in the Zone name box, type the DNS domain name for the
foreign domain, and then click Next.
5. On the Zone File page, if you have a DNS zone file that you use to populate your zone
(for example, from another DNS server), click Use This Existing File, specify the path to
the file on the Zone File page, and then click Next.
6. On the Master DNS Servers page, in the Master Servers list, type the IP address or
FQDN of the DNS server in the foreign domain from which the DNS server obtains zone
updates, and then click Next.
7. Click Finish to create the stub zone.
You must now populate the stub zone with the required records that includes the Start of
Authority (SOA) record, and the Host (A) and NS records that pertain to the foreign DNS
servers, and are retrieved from the specific master server(s). To manually perform this
task, in the DNS Manager, right-click the stub zone and then click Transfer from Master.
You can use the Windows PowerShell Add-DnsServerStubZone cmdlet to create a stub
zone. For example, to create a stub zone for Contoso.com, use the following command:
Exam Tip
You can create AD DS-integrated stub zones, either in the DNS Manager console, or by
using Windows PowerShell. To use Windows PowerShell, replace the zonefile
parameter with ReplicationScope.
188
Prepared by Chala T
Hardware Network Service Level III and IV
Organizations must maintain two name services, with the resultant administrative
overhead.
Network clients potentially use both DNS and WINS to resolve names, resulting in
possible name resolution delay.
As an alternative to WINS, you can use the DNS GlobalNames zone in Windows Server
2016. When clients resolve single-label names, such as LON-SVR2, these names are
resolved by reference to the GlobalNames zone. An organization has only a single
GlobalNames zone, which you must create manually. Also, you must populate the zone
with the required CNAME resource records that point to your organization’s server and
app resources.
Host A host record—commonly given the abbreviation A—holds the IPv4 address for
the specified hostname. AAAA records hold the IPv6 address for the specified
hostname. These are probably the most common resource records and are found in
forward lookup zones.
Pointer Also known as PTR records, these enable a DNS client to resolve an IPv4 or
IPv6 address into a hostname. These records exist in reverse lookup zones.
Start of Authority Created when you create a primary zone, the SOA record contains
information about the authoritative server for the zone, contact information for the zone,
and other information, including TTL values for resource records in the zone.
Name Server Name server (NS) records identify the authoritative name servers in the
zone, including both primary and secondary servers. They also identify name servers for
any delegated zones.
Service Location Known as SRV records, these enable you to specify by service,
protocol, and DNS domain name, which servers are hosting particular apps or services.
If a DNS client is looking for a web server, for example, you can configure SRV records
189
Prepared by Chala T
Hardware Network Service Level III and IV
for the http service enabling clients to find all servers providing that service. Clients then
use corresponding A or AAAA records to resolve the server names into IP addresses.
An SRV record is more complex than many others, and contains the following fields:
_Service.Proto.Name TTL Class SRV Priority Weight Port Target. For example:
http._tcp.Contoso.com. IN SRV 0 0 80 www.Contoso.com. AD DS services, such as the
Kerberos authentication service, use SRV records to advertise themselves to clients in
an AD DS network.
Alias CNAME records enable you to create an alias for a host. For example, the server
lon-svr2.adatum.com might host a website. You can create an alias for this host with the
name www by adding a CNAME record that points to the FQDN of the lon-svr2 server.
Mail Exchanger MX records are used by Simple Mail Transfer Protocol (SMTP) hosts
for transferring email around the Internet. In order for an originating SMTP host to route
mail to a recipient with the email address Dave@Contoso.com, it is necessary for the
originating host to know which hosts can receive the email at Contoso.com. You create
MX records in the Contoso.com namespace to advertise which hosts provide this
service. To help to ensure a reliable inbound email flow, you can advertise several hosts
by using multiple MX records. Each can be assigned the same or different mail server
priorities, or preference values. If you implement MX records with the same priority,
email is routed to them randomly, distributing the load. If you use different values, the
lower value is used first by the originating server, thereby enabling you to specify a
preferred inbound server.
Remember that you can enable dynamic updates for your DNS zone in Microsoft DNS.
This enables hosts to register and update their own resource records. This is particularly
relevant for A, AAAA, PTR, and SRV records that might commonly be expected to
change.
You can create these records manually from the DNS Manager console. Right-click the
appropriate forward lookup zone (reverse lookup zone for PTR records), and then click
the appropriate option for the record type you want to create, as shown in Figure 1-29.
Creating the resource records are straightforward, but vary slightly for each record type
because you must specify different information for each separately. However, this is a
very intuitive process. For example, for a new host record, you must specify the host’s
name and its IP address. You can also select the option to create a PTR record for the
host automatically. For an MX record, you must specify the FQDN of the host that
provides SMTP email support, and a Mail server priority value.
If the record type you want is not listed on the context menu, (for example, SRV), select
Other New Record from the context menu. Then select the record type you want in the
Resource Record Type dialog box, and then click Create Record, shown in Figure 1-30.
This list contains all record types, including those used less frequently.
190
Prepared by Chala T
Hardware Network Service Level III and IV
No-refresh Interval The no-refresh interval is the period of time that the record is not
eligible to be refreshed. By default, this is also seven days.
Refresh Interval The refresh interval is the time that the record is eligible to be
refreshed by the client. The default is seven days.
Usually, a client host record cannot be refreshed for seven days after it is first registered
(or refreshed). But then it must be refreshed within the following seven days. If it is not,
the record becomes eligible to be scavenged.
Exam Tip
To enable scavenging, you must enable it on both the DNS zone(s) and on the server(s)
that host those zones.
1. In DNS Manager, right-click the appropriate zone, and then click Properties.
2. On the General tab, click Aging.
3. In the Zone Aging/Scavenging Properties dialog box, shown in Figure 1-31, select the
Scavenge Stale Resource Records check box, and then configure your preferred No-
Refresh Interval and Refresh Interval values.
4. Click OK twice.
Exam Tip
You can configure aging/scavenging for all zones by right-clicking a server in the DNS
Manager console and then clicking Set Aging/Scavenging for All Zones.
191
Prepared by Chala T
Hardware Network Service Level III and IV
Exam Tip
You can force scavenging to be initiated by right-clicking a server in the DNS Manager
console and then clicking Scavenge Stale Resource Records. Alternatively, use the
Start-DnsServerScavenging Windows PowerShell command.
You can adjust these initial values to determine which Kerberos authentication server is
used by clients. DNS clients attempt to use the server with the lowest priority value. If
multiple servers have the same priority value, clients use the server in proportion to their
weight values. Similarly, if multiple MX records exist for an email domain name, then the
server with the lowest preference value is used. You can adjust these values using the
DNS Manager console or the Windows PowerShell Add-DnsServerResourceRecord or
Set-DnsServerResourceRecord cmdlets using the Priority, Weight, and Preference
parameters.
192
Prepared by Chala T
Hardware Network Service Level III and IV
Exam Tip
To change individual TTL values for resource records in a zone by using the DNS
Manager console, you must enable the Advanced view. In DNS Manager, click View,
and then click Advanced.
Exam Tip
You can use the Add-DnsServerResourceRecord Windows PowerShell cmdlet with the -
Unknown parameter to create unknown resource records.
www.contoso.com 60 IN A 172.16.0.10
www.contoso.com 60 IN A 172.16.0.12
www.contoso.com 60 IN A 172.16.0.14
Round robin works by responding to each client request for the resolution
of www.contoso.com with a differently ordered list of IP addresses. On the first request,
the server with the IPv4 address of 172.16.0.10 is returned at the top of the list. Next,
172.16.0.12 is returned first on the list, and so on.
You configure round robin on DNS server on the Advanced server settings dialog box. It
is enabled by default. You can also use the Set-DnsServer Windows PowerShell cmdlet.
193
Prepared by Chala T
Hardware Network Service Level III and IV
Exam Tip
You can also use netmask ordering to achieve a similar result, but in this case, a client
receives the result that is most relevant to their location, based on their subnet.
Typically, the first step in creating a zone scope is to create and configure client subnets.
You do this in reference to your physical network topology. For example, to create
subnet for DNS clients in New York and another for clients in London, use the following
Windows PowerShell commands:
194
Prepared by Chala T
Hardware Network Service Level III and IV
Monitor DNS
Since DNS is such a critical service, providing name resolution and service location for
configured clients, it is important that you ensure that DNS is running reliably and is
optimized. To help you achieve this, you can use a number of monitoring and auditing
tools in Windows Server.
You can also use DNS Audit events and DNS Analytic events.
DNS Audit Events These are enabled by default. Use to enable change tracking on
your DNS servers. Every time a server, zone, or resource record is edited, an audit
event is logged. Event IDs numbered 513 through 582 are logged in this regard, and are
explained on the following website.
DNS Analytic Events These are disabled by default. Windows logs an analytic event
every time the DNS server sends or receives DNS information. Event IDs numbered 257
through 280 are logged in this regard, and are explained on the website listed below.
195
Prepared by Chala T
Hardware Network Service Level III and IV
You can gather and view the following zone level statistics:
Chapter summary
You can install the DNS server role on Windows Server 2016 and Nano Server.
196
Prepared by Chala T
Hardware Network Service Level III and IV
DNS forwarders, recursion, and root hints enable you to control the flow of DNS query
traffic throughout your organization’s network.
You can implement DNSSEC, DNS socket pool, cache locking, DANE, and response
rate limiting to help to secure your DNS infrastructure from malicious attacks.
DNS policies in Windows Server 2016 help you configure DNS behavior throughout your
organization without needing to manually configure each DNS server.
DNS logging can help you to pinpoint problems with the DNS servers in your
organization before they can affect your users.
The DNS server role is affected by CPU and memory resources, and proactive
monitoring of these resources can be beneficial.
Although the DNS namespace is based on domains and subdomains, the data that
maintains this namespace is stored in DNS zones.
Secondary zones receive updates via their configured master server.
DNS delegation enables a part of your DNS namespace, such as a child domain, to be
authoritatively maintained in a separate zone.
AD DS-integrated zones provide for multimaster updates, secure replication, and secure
dynamic updates.
Conditional forwarding provides similar function to stub zones.
DNS scopes are based on DNS policies.
DNS Delegation is the process of dividing up different parts of the DNS name space.
This name space can be independently managed. This video looks at how to divide up
DNS so different parts can be stored on different servers and managed independently.
Demonstration
1) To create a new DNS delegation, open Server Manager. If your DNS server is not
present in Server Manager, right click “All Servers” and add the DNS server. It is
possible to add a DNS server using its IP Address. However, if that DNS server is not
part of the domain or trust relationship does not exist, Server Manager will not be able to
create a connection to it.
2) Launch DNS Manager by right clicking a server in the server manager if DNS installed
on it and selecting the option “DNS Manager”. It is also possible to run DNS Manager by
selecting the tools menu and selecting DNS Manager from the list.
3) To add additional DNS Servers, right click DNS at the top of the DNS Manager and
select the option “Connect to DNS Server”. When prompted, enter in the DNS server
address or its IP Address.
4) To create a new namespace. Right click the Forward Lookup Zone that you want to
create the DNS zone in and select the option new zone. Creating the zone is the same
process as creating a standard DNS zone.
5) Once a zone has been created, a DNS delegation needs to be created in the zone
197
Prepared by Chala T
Hardware Network Service Level III and IV
above it telling it where this new zone is. To do this, right click on the zone and select the
option New Delegation.
6) The delegation wizard will ask for the name of the delegated DNS zone and also the
name of the DNS server that is an authoritative DNS server for that DNS name. If the
DNS server does not resolve, the IP Address for the DNS server can be used instead.
Once this is done, the DNS server will pass DNS requests to the other DNS server.
References
“Understanding Zone
Delegation” http://technet.microsoft.com/en-us/library/cc771640.aspx
A delegation is a record in a parent zone that lists a name server that is authoritative for
thezone in the next level of the hierarchy.Delegations make it possible for servers in
onezone to refer clients to servers in other zones.
Zone name servers (also known as root nameservers) are servers that maintain a list
of every domain's name servers. In summary, they tell web browsers where to find a
certain domain's name servers. Then the domain's name serverstell the browser where
that domain's website is located by returning an IP address.
A "domain" represents the entire set of names / machines that are contained under an
organizational domain name. For example, alldomain names ending with ".com" are
part of the "com" domain. A "zone" is a domain less any sub-domains delegated to
other DNS servers (see NS-records).
198
Prepared by Chala T