2nd Year
2nd Year
Multiple Choice
Practice Questions/Answers
2nd Year
ICTSM Trade Theory
LINUX
1. Which command is used to record a user 12. How many links are created when we
login session in a file create a directory file?
a) macro b) read c) script d) none of a) 1 b) 2 c) 3 d) 4
the mentioned 13. Which command is used to change
2. Which command is used to display the permissions of files and directories?
operating system name a) mv b) chgrp c) chmod d) set
a) os b) unix c) kernel d) uname 14. Where can I find the printer in the file
3. Which command is used to print a file structure?
a) print b) ptr c) lpr d) none of a) /etc b) /dev c) /lib d) /printer
the mentioned 15. What UNIX command is used to update
4. Find / -name ‘*’ will the modification time of a file?
a) List all files and directories recursively a) time b) modify c) cat d) touch
starting from /
b) List a file named * in / 16. Which one of the following statement is
c) List all files in / directory not true?
d) List all files and directories in / directory a) vim editor is the improved version of vi
5. wtmp and utmp files contain: editor
a) Temporary system data b) vi editor commands are not case
b) User login-logout log sensitive
c) The user’s command execution log c) vi editor has two modes of operation:
d) The user’s su and sudo attempts command mode and insert mode
6. Which is the core of the operating d) vi stands for visual editor
system? 17. Which command is used to close the vi
a) Shell b) Kernel c) Commands d) editor?
Script a) q b) wq c) both q and wq d) none
7. The system calls in UNIX is written using of the mentioned
which language 18. Which vi editor command copies the
a) C b) C++ c) Assembly Language current line of the file?
d) Fortran a) yy b) yw c) yc d) none of the
8. Unix is which kind of Operating System? mentioned
a) Multi User b) Multi Processes c) Multi 19. In vi editor, which command reads the
Tasking d) All of the mentioned content of another file?
9. Which represents the user home directory a) read b) r c) ex d) none of the
a) / b) . c) .. d) ~ mentioned
10. If a file is removed in Unix using ‘rm’ then 20. Which command sets the number for all
a) The file can be recovered by a normal lines?
user a) :set li b) :set ln c) :set nu d) :set nl
b) The file cannot be recovered by a user 21. Which command reads user input from
c) The file can be fully recovered provided the terminal and assign this value to a
the system is not rebooted variable name?
d) The file will be moved to /lost+found a) read b) get c) declare d) set
directory and can be recovered only by 22. Effective user id can be set using
administrator’s intervention following permission
11. What command is used to copy files and a) 0777 b) 2666 c) 4744 d) 1711
directories? 23. What is the command to set the execute
a) copy b) cp c) rn d) cpy permissions to all the files and
subdirectories within the directory
/home/user1/direct
a) chmod –r +x /home/user1/direct 28. Write the command to display the current
b) chmod –R +x /home/user1/direct date in the form dd/mm/yyyy.
c) chmod –f –r +x /home/user1/direct a) date +%d/%m/%Y b) date
d) chmod –F +x /home/user1/direct +”%d/%m/%Y”
24. Which command is used to view c) date +/%d/%m/20%y
compressed text file contents d) date +”/%d/%m/20%y”
a) cat b) type c) zcat d) print 29. Which command gives the first byte
25. Which command is used to perform where the difference is in the file1 & file2?
backup in unix? a) diff b) cmp c) comm d) ls –a
a) backup b) cpio c) zip d) gzip 30. The command syntax to display the file
26. Which command is used to identify file ‘sample.txt’ one page at a time is
type? a) man sample.txt>more b) cat
a) Type b) File c) Finfo d) Info sample.txt<more
27. Which of the following command output c) cat sample.txt|more
contains userid? d) none of the mentioned
a) ls b) help c) date d) ls –l
Answer:- LINUX
1- C 2- D 3- C 4- A 5- B 6- B
7- A 8- D 9- D 10- B 11- B 12- B
13-C 14-B 15-D 16-B 17-C 18-A
19-C 20-C 21-A 22-C 23-B 24-C
25-B 26-B 27-D 28-A 29-B 30-C
PRINTER
7. What is the first thing you could do to check for damage to a printer after receiving it?
A. Run MSD diagnostics
B. Attach it to a PC and print something
C. Check the cables
D. Unbox it and examine it for physical damage
8. On a dot matrix printer, you should never lubricate which part?
A. carriage rails C. paper advance bearings
B. print head pins D. carriage bearings
9. Laser Jet printer speeds are measured in pages per minute (ppm) what do we use to
measure dot matrix printers?
A. lines per inch C. characters per inch
B. lines per sheet D. characters per second
10. Which component must be vacuumed or replaced during preventative maintenance on a laser
printer?
A. Scanning mirror B. Toner cartridge C. Ozone filter D. All of the above
11. When is the risk for electrostatic discharge the greatest?
A. Day time B. High humidity
C. Low humidity D. Night time
12. Which output device is used for translating information from a computer into pictorial form on
paper.
A. Mouse B. Plotter C. Touch panel D. Card punch
13. In inkjet printers, what is the most common problem with the paper tray?
A. inconsistent printing B. Misalignment of the sheet feeder
C. malfunctioning pick-up rollers D. paper jamming on the ink cartridge
14. What action will correct patchy, faint, uneven or intermittent print on a dot matrix printer?
A. Replacing the ribbon B. Replacing the timing belt
C. Adjusting the paper feed tension D. Adjusting the tractor feed tension
15. With a dot matrix printer, light then dark print is most commonly caused by:
A. Erratic paper advancement B. Erratic ribbon advancement
C. Misaligned print head D. Overheating print head
16 What allows you to print on both sides of the printer?
a. fuser b. duplexer c. paper swamping unit d. none of these
17. The roller that grabs the paper to feed it into the printer___
a. separation roller b. pick roller c. pull roller d. All of these
18. Which of the following devices gives the paper a positive charge?
A. The laser B. The print drum
C. The registration rollers D. The transfer corona wire
19. Why is the print drum given a negative charge?
A. To attract the toner to every area of the drum
B. To attract the toner to the areas of the drum that have a stronger negative charge
C. To attract the toner to the areas of the drum that have a weaker negative charge
D. To attract the positively charged paper to the print drum
20. At what voltage is the paper charged?
A. +600Vdc B. –600Vdc C. –100Vdc D. +100Vdc
21. In laser printer technology, what happens during the conditioning stage?
A. The corona wire places a uniform positive charge on the paper
B. A uniform negative charge is placed on the photosensitive drum
C. A uniform negative charge is placed on the toner
D .All of the above
22. Your customer tells you the print quality of their dot matrix printer is light then dark. Which of
the following could cause the problem ?
A. Paper slippage B. Improper ribbon advancement C. Paper thickness D. Head position
23. In Inkjet technology the droplets of ink are deflected by?
A. multi directional nozzles C. high pressure plates
B. electronically charged plates D. electro static absorption
24. What is the first thing you could do to check for damage to a printer after receiving it?
A. Run MSD diagnostics C. Check the cables
B. Attach it to a PC and print something D. Unbox it and examine it for physical damage
25. Laser Jet printer speeds are measured in pages per minute (ppm) what do we use to measure dot-
matrix printers?
A. lines per inch B. lines per sheet C. characters per inch D. characters per second
26. Which component must be vacuumed or replaced during preventative maintenance on a laser
printer?
A. Scanning mirror B. Toner cartridge C. Ozone filter D. All of the above
27. Which of the following devices gives the paper a positive charge?
A. The laser B. The print drum C. The registration rollers D. The transfer corona wire
28. Why is the print drum given a negative charge?
A. To attract the toner to every area of the drum
B. To attract the toner to the areas of the drum that have a stronger negative charge
C. To attract the toner to the areas of the drum that have a weaker negative charge
D. To attract the positively charged paper to the print drum
29. What best describes how an inkjet printer prints an image?
A. One dot at a time to form a character B. Spray-painting a character
C. Striking an inked ribbon D. Dropping ink onto the paper
30. What is another name for a dot-matrix printer?
A. Impact printer B. Page printer C. Spray printer D. USB
42. There is a horizontal line on printed characters. This may be due to faulty…….
a)Carriage movement b) Initial position sensor c)paper sensor d)print head
43. There is a horizontal line on printed characters. When tested print head coil and firing needles
and flexible PCB are okay. What could be the reason for the white lines.
a) Carriage movement b- power supply c)platen sensor d)print head shield
45. In a print head if any one of the coils is open, then the head will be…..
a)function normally b)not function
c)function with some defect in printing d)result a white line on printed matter
47. What could be defective if printer head and flexible PCB are okay but the printer head is not
working?
a)printer head alignment position b)print head adjust lever
c)printer head shield d)coil (drive) energizer transistor defective
Answer:- PRINTER
1- C 2- B 3- B 4- A 5- D 6- D
7- D 8- B 9- D 10- C 11- C 12- B
13-C 14-A 15-B 16-B 17-B 18-D
19-C 20-A 21- B 22- B 23- A 24- D
25- D 26-C 27-D 28- C 29- B 30-A
31- B 32- A 33-A 34-B 35- C 36- C
37- A 38-B 39- C 40-B 41-D 42-D
43-D 44-C 45-D 46-B 47-D 48-B
49-C 50- C
MONITOR, SOUND CARD AND AUDIO CARD
1. A monitor's _____ is the distance between the holes in the mask behind the screen. This helps
determine how sharp the dots appear.
A. refresh rate B. dot pitch C. resolution D. color depth
11. Which statements are true for a passive matrix LCD display?
18. Board that are used to connect additional devices to the motherboard are call ?
A. Bay cards B. Expansion card C. port card D. bus card
19. The main circuit board in the system unit is also called the ?
a. Bus board B. daughterboard C. chipboard D. motherboard
20. Computer expansion slots connects the interface cards to the?
A. Ports B. peripheral devices C. mother board D. system bus
21. port of computer may be connected to ?
A. expansion card B.CPU C. mother board D. both A and C
22. WV motherboard form factor uses one 20 pin connector ?
A.ATX B. AT C. BABY AT D.ALL OF THE ABOVE
23. THE DC voltage on most circuit board is ?
A. -12V B. 0V C. +5V D. +12V
24. Contrary to television receiver, the pc monitor works on…….
a)low frequency carrier b) high frequency carrier c)base band signal d)PC H signal
25. In personal systems, the video adapter circuitry comes…
a)as video card only b)built into motherboard
c)either as a card or built into motherboard d)as a simple IC
26. The control responsible for vertical scrolling of the picture is…………
a)H- position b)V- position c)V-hold d)pin cushion
27. The no. of cathodes acting as electron guns in a color monitor CRT is…….
a)3 b)2 c)1 d)4
28. A monitor becomes dead when.
a)horizontal state is defective b)vertical state is defective
c)picture tube is defective d)SMPS fails.
29. How many devices can be used on a single SCSI bus? Keep in mind that the SCSI host
adapter counts as a device?
A.1 B.8 C.20 D.10
30. Match the device driver HIMEM.SYS to its operation ?
A. Supports (ANSI) terminal emulation B. Manages the use of extended memory
C. Uses expanded memory on a 80386 processor D. Supports code page switching
31. _____ help prevent power surges ?
A. Surge suppressor B. Spike protector C.UPS system D. High-grade multi-meter
32. An anti static strap uses a small _____ to make sure you do not become the least path of
resistance to the ground?
A. capacitor B. diode C. transistor D. resistor
33. If the memory slots have 30 pins then the chip is a?
A. DIMMB. SIMMC. SDRAMD. All of the above
34. Which values are held in CMOS for the hard drive ?
A. size (heads, cylinders, sectors) B.IRQ C. Free space D. Virus alert
35. Which of the following would be a logical first step in troubleshooting a PC?
A. Check the computer CMOS B. Define the circumstances of the problem
C. Call the vendor D. Define what applications are being used
Answer:- MONITOR
1- B 2- A 3- B 4- A 5- C 6- A
7- B 8- C 9- A 10- B 11- A 12- B
13. A 14. C 15. A 16. B 17. D 18.B
19.D 20.C 21.D 22.A 23.C 24.C
25.C 26.C 27.A 28.D 29.B 30.C
31.A 32.D 33.B 34.C 35.A
UNINTERRUPTED POWER SUPPLY ( UPS )
1. _________ is used for critical loads where temporary power failure can cause a great
deal of inconvenience.
a) SMPS b) UPS c) MPS d) RCCB
2. __________ is used in the rotating type UPS system to supply the mains.
a) DC motor b) Self excited DC generator c) Alternator d) Battery bank
3. Static UPS requires __________
a) only rectifier b) only inverter c) both inverter and rectifier d) none of the mentioned
4. Usually __________ batteries are used in the UPS systems.
a) NC b) Li-On c) Lead acid d) All of the mentioned
5. IGBT stands for
a. Insulated gate bipolar transistor c. Inductive gate bipolar transistor
b. Insulated gate bidirectional transistor d. Inductive gate bidirectional transistor
6. UPS stands for____
a)Unwanted power supply b)Uninterrupted power supply
c)Universal power supply d) None of these
7. inverter converts
a. DC to AC b.AC to DC c. DC to DC d.AC to AC
8. Voltage is measured ?
A.in parallel B.in series C. after breaking the circuit D. after checking resistance
9. What beep codes could indicate a system board or power supply failure?
A. steady short beep B.no beep C.one long continuous beep tone D. All of the above
10. What voltage does a Pentium system use?
A.+12 volts B.+ 5 volts C.+ 8 volts D.+3.3 volts
11 . ___ help prevent power surges ?
A. Surge suppressor B. Spike protector C.UPS system D .High-grade multi-meter
12. What device prevents power interruptions, resulting in corrupted data?
A. Battery back-up unit B. Surge protector C. Multiple SIMMs strips D .Data guard system
13. To test for AC ripple on a PC power supply, you would set the volt/ohm meter for ?
A. DC voltage scale B.AC voltage C.OHM scale D. Farad scale
14. When measuring AC (Alternating Current) with a multimeter, it is important to maintain the proper
polarity.
A. True B. False
15. What device prevents power interruptions, resulting in corrupted data?
A. Battery back-up unit B. Surge protector C. Multiple SIMMs strips D. Data guard system
16. Static UPS requires __________ ?
a) only rectifier b) only inverter c) both inverter and rectifier d) none of the mentioned
17. _________ is used for critical loads where temporary power failure can cause a great deal of
inconvenience? a)SMPS c) MPS b)UPS d) RCCB
Answer:- UPS
1- B 2- C 3- C 4- C 5- A 6- B
7- A 8.A 9.D 10.C 11.A 12.A
13.B 14.B 15.A 16.C 17 B
MODEM
1. Which of the following represents the fastest data transmission speed?
a)Gbps b)Mbps c)Kbps d)Bps
2. Modem is used mostly for ?
a)Mostly for file system b) A modern empty memory modules
c) Connecting to internet d) None of above
3. One million bytes of information are ?
a)1 MB b) 1 GB c)1 KB d) None of above
4. A modem is classified as low speed if data rate handled is
a) up to 100 bps b) up to 250 bps c) up to 400 bps d) up to 600 bps
1- A 2- C 3- A 4- D 5- B 6- D
7- C 8-C 9-D 10-C 11-A 12-D
13-B 14-C 15-D 16-B 17-C
POST CODE
1. From what location are the 1st computer instructions available on boot up?
A. ROM BIOS B. CPU C. boot.ini D. CONFIG.SYS
2. What could cause a fixed disk error ?
A. No-CD installed B. bad ram C. slow processor D. Incorrect CMOS settings
3. When installing PCI NICS you can check the IRQ availability by looking at ?
A. dip switches B. CONFIG.SYS C. jumper settings D. motherboard BIOS
4. Most PCs give a single beep on boot up to indicate they are ok hardware wise. You boot your PC
and don't get a beep. What should you check first?
A. system board B. RAM C. speaker D. microprocessor
5. What beep codes could indicate a system board or power supply failure?
A. steady short beep B.no beep C. one long continuous beep tone D. All of the above
6. A numeric error code check: A 17xx indicates A problem with ?
A. CMOS B. ROM BIOS C.DMA controller D. hard drive or controller
7. During boot-up, the memory test ?
A. Is a superfluous step that should be ignored
B. Checks and verifies that contiguous memory is installed
C. Is an operational error
D. Displays what memory is installed, but nothing else
8. Which values are held in CMOS for the hard drive ?
A. size (heads, cylinders, sectors) B. IRQ C. Free space D. Virus alert
9. Which of the following would be a logical first step in troubleshooting a PC?
A. Check the computer CMOS C. Call the vendor
B. Define the circumstances of the problem D. Define what applications are being used
10 . During boot-up, the memory test ?
A. Is a superfluous step that should be ignored
B. Checks and verifies that contiguous memory is installed
C. Is an operational error
D. Displays what memory is installed, but nothing else
11. You get a CMOS checksum error during boot up. What is most likely the cause?
A. power supply is bad C.CMOS battery is nearing end of life
B. BIOS needs updating D. hard drive types are incorrectly defined
12 . Which program is run by BIOS to check hardware components are working properly while
computer is turned ON ?
A. DMOS B. POST C. CMOS D. RIP
13 . What is full form CMOS ?
A. Content Metal Oxide Semiconductor
B. Complementary Metal Oxide Semiconductor
C. Complementary Metal Oxygen Semiconductor
D. Complementary Metal Oscillator Semiconductor
14. Where BIOS is stored ?
A. Hard Disk B. RAM C. Flash Memory Chip D. Any of above
15. BIOS is used for ?
A. Updating system information on network B. Loading operating system
C. It helps in routing D. It take inputs from keywords and other devices
16 . BIOS is used for ?
A. Updating system information on network B. Loading operating system
C. It helps in routing D .It take inputs from keywords and other devices
ANSWER-POST CODE
1. A 2. D 3. D 4. C 5. D 6. D 7. B 8.A 9.B 10. B 11. C 12. B
13. B 14. C 15. B 16. B
COMPUTER SYSTEM MANTAINANCE & SMART DEVICE
5.A technician wishes to create a dynamic
1. A technician is troubleshooting a PC. The volume on a Windows 10 PC that has two
display shows an “Invalid Boot Disk” error physical hard drives. The technician
after the POST. What is a wants to achieve maximum write performance
probable cause? with data fault tolerance. What type of
a)The MBR is corrupted. dynamic volume should be created to achieve
b)A process is using most of the CPU this?
resources. a) RAID 5 volume
c)The date and time have been changed b) RAID 1 volume
in the BIOS and do not reflect the correct time c) RAID 2 volume
and date. d) RAID 6 volume
d)The PC does not have a floppy drive or
the floppy drive is broken. 6. A user has to shutdown several remote
computers one at a time. What is the best
2. A technician notices that a program that Windows command to select to do
is listed in the registry of a Windows the job?
computer is not found on that a) shutdown
computer. What is a possible solution to b) nslookup
the problem? c) ping
a)Run fdisk /mbr from the command d) netstat
prompt. 7. A user has just installed a new hard drive
b)Reinstall the application. Then, run the into the PC and needs to prepare it to store
uninstall program. Windows files. What is the best Windows
c)Restore the boot in file from the command to select to do the job?
installation media. a) format
d)Restore the ntdetect.com file from the b) bootrec
installation media. c) ipconfig
d) diskpart
3. Which question is an open ended
question that could be used when helping a 8. What is a good source for safely
customer troubleshoots a Windows downloading Android apps?
problem? a) iTunes
a) Can you boot the operating system? b) Google Play
b) Have you changed your password c) freeware sites
recently? d) the Apple App Store
c) Do you get a login prompt when the
computer boots? 9. What is a purpose of the boot manager
d) What programs have you installed program?
recently? a) It manages antivirus signature files,
encryption keys, and certificates when a
device boots.
4. A technician is attempting to diagnose and b) It automates the POST and checks the disk
rectify a common boot problem on a for bad sectors during a boot.
Windows 10 installation. Which Windows c) It checks the validity of hardware and
10 advanced recovery option should the software on the device after a factory reset.
technician use? d) It allows the user to select the OS to use to
a) System Restore boot the device.
b) System Image Recovery
c) Reset 10. Which navigation icon on the system bar
d) Startup Repair of an Android device is used to return to the
previous screen?
a) Back
b) Home even if the unallocated space is
c) Menu noncontiguous.
d) Recent Apps
17. What is a good source for safely downloading
Android apps?
11. Which statement describes the iOS app a) iTunes
icons on a mobile device screen? b) Google Play
a) Each icon is a shortcut of the app. c) freeware sites
b) Each icon represents the actual app. d) the Apple App Store
c) Each icon represents an instance of the
actual app. 18. What represents apps in the Windows Phone
d) Each icon links to multiple instances of the interface?
actual app. a) buttons
b) icons
12. Which cloud-based storage service does c) tiles
Microsoft provide for backups? d) widgets
a) iCloud
b) Dropbox 19. What technology enables a cell phone to be
c) OneDrive used as a hands-free device?
d) Google Sync a) Wi-Fi
b) Bluetooth
13. What is a possible situation when it might be c) 4G
necessary to boot Windows 7 from a USB d) Yosemite
device, a CD, or a DVD?
a) to disable background services 20. What is the result of doing a factory reset on
b) to delete registry keys a mobile device?
c) to partition the hard drive a) The operating system will be updated with
d) to repair the system the most recent updates and patches.
b) All user data and settings will be deleted.
14. What term is used to describe a logical drive c) The operating system will be deleted and
that can be formatted to store data? all user data is transferred to the Cloud.
a) track d) A complete backup of the device is done
b) sector and all viruses and malware are removed.
c) cluster
d) partition 21. What is used by an operating system to
communicate with hardware components?
15. Which key, when pressed during the boot
process, will allow the user to choose to start a) device driver
Windows in safe mode? b) BIOS
a) F8 c) CMOS
b) F1 d) Application Program Interface
c) Esc
d) Windows 22. What is the purpose of a recovery partition?
a) to provide a backup copy of the BIOS
16. Which statement describes the active b) to return the system to an earlier state to
partition? recover from a failed update
a) It is used to boot an operating system by c) to restore the computer to the factory
default. state without deleting user files
b) It is a section of the disk, that is d) to restore the computer to its factory state
inaccessible to the user, containing an
23. Which Windows tool is used to determine if a
image that can be used to restore the
computer to its original configuration. dynamic disk is corrupted?
c)It is a process to create a file system in a a) Disk Management
partition or volume for file storage. b) Device Manager
d)It is a type of disk with the ability to create c) Microsoft System Preparation
volumes that span across more than one disk d) Bootmgr
24. Which Windows utility allows Windows 7 and 31. A technician is troubleshooting a 4-year-old
8 users to quickly and easily share files and computer that takes a long time to boot, and
folders? identifies that the BIOS rediscovers all the
hardware at every boot. What action would fix
a) Home Group this problem?
b) Action Center a) Replace the CMOS battery.
c) Services b) Launch Device Manager to discover new
d) Device Manager hardware.
25. What preventive maintenance action should c) Reset the BIOS using the CMOS jumper.
be taken to help improve system security? d) Start the computer with the last known
good configuration.
a) Automate any antivirus scanners.
b) Defragment the hard drive. 32. A technician uses the shrink volume feature
c) Perform backups regularly. of the disk management utility and splits the
d) Error check the hard drive partition. What must the technician do next in
order to make use of the new space?
26. A technician is trying to fix a Windows 7 a) Partition the unallocated space.
computer that displays an “Invalid Boot Disk” b) Format the existing partition.
error after POST. What is a possible cause of the c) Delete all partitions and reinitialize the disk.
error? d) Convert the unallocated space into a
dynamic disk.
a) The boot.ini file is corrupt.
b) The ntldr.exe file is corrupt.
33. Which component uses the greatest amount
c) The ntdetect.com file is corrupt.
of power on most mobile devices?
d) The boot order is not set correctly in the
a) camera
BIOS
b) CPU
c) media player
27. Computer user logs a problem stating that
d) LCD screen
the computer is emitting a loud clicking noise.
Which device should the technician check first?
34. What data is stored in the CMOS memory
a) hard drive
chip?
b) CPU
a) BIOS settings
c) power supply
b) Windows configuration settings
d) motherboard
c) user login information
d) device driver
28. Which laptop component makes use of
throttling to reduce power consumption and
35. A user reports that every morning when a
heat?
particular computer is turned on, the
a) CPU
configuration settings on that computer have to
b) motherboard
be reset. What action should be taken to remedy
c) optical drive
this situation?
d) hard drive
a) Replace the motherboard.
b) Replace the CMOS battery.
29. What motherboard chip controls high speed
c) Move the jumpers.
CPU communication to RAM and the video card?
d) Upgrade the BIOS.
a) Northbridge
b) Southbridge
36. An employee reports that each time a
c) BIOS
workstation is started it locks up after about 5
d) UEFI
minutes of use. What is the most likely cause of
the problem?
30. Which cleaning material should be used to
a) The hard disk is failing.
clean component contacts?
b) The RAM is malfunctioning.
a) isopropyl alcohol
c) The CPU is overheating.*
b) compressed air
d) The power supply fails to provide adequate
c) cotton swabs and cloths
voltage and current.
d) dishwashing liquid and water
for input voltage is set to 230 volts and attaches
37. What component is most suspect if a burning to an outlet in the United States?
electronics smell is evident? a) The power supply would explode.
a) CPU b) The PC would not turn on.*
b) hard drive c) The PC would display an error code.
c) RAM module d) The PC would emit a series of beeps.
d) power supply
44. which task should be part of a software
38. what is the best way to determine if a CPU maintenance routine?
fan is spinning properly? a) Check for and secure any loose cables.
a) Spin the blades of the fan quickly with a b) Remove dust from the power supply.
finger. c) Defragment the hard drive.*
b) Spray compressed air on the fan to make d) Back up the data, reformat the hard drive,
the blades spin. and reinstall the data
c) Visually inspect the fan when the power is
on to ensure it is spinning. 45. What is a recommended procedure to follow
d) Listen for the sound of the fan spinning when cleaning computer components?
when the power is on. a) Blow compressed air on cooling fans so
that they will spin when dust is being
removed.
39. What is a primary benefit of preventive b) Hold cans of compressed air upright while
maintenance on a PC? spraying.*
a) It extends the life of the components.* c) Use window cleaner on LCD screens.
b) It enhances the troubleshooting processes. d) Remove the CPU before cleaning.
c) It simplifies PC use for the end user.
d) It assists the user in software development. 46. Missing slot covers on a computer can
cause?
40. Which component can be easily damaged by A. over heat B. power surges
the direct spray of compressed air when cleaning C. EMI. D. incomplete path for
the inside of the computer case? ESD
a) fan
b) heat sink
c) power supply 47. With respect to a network interface card,
d) CPU the term 10/100 refers to ?
A. protocol speed B. a fiber
41. What is the preferred method to remove a speed
disc from an optical drive that fails to eject the C. megabits per seconds D. minimum
disc? and maximum server speed
a) Insert a pin into the small hole on the front
of the drive.*
b) Use a small screwdriver and pry the drive 48. A wrist grounding strap contains which of
door open. the following ?
c) Remove the top of the drive enclosure. A. Surge protector B.
d) Send the drive to an authorized repair Capacitor C. Voltmeter D.
depot. Resistor
68. What is the highest binary number that 74. Which type of system board is the MOST
can be referred to on a three position likely candidate for processor upgrading if
jumper block? you want maximum performance and
A. 4 B. 6 C. F future compatibility?
D. 1
69. What voltage does a Pentium system use? A. ML B. PCI C. ISA
A. +12 volts B. + 5 volts D. EISA E. None of the above
C. + 8 volts D. +3.3 volts
70. Suppose that you have a the maintenance 75. You just installed a new IDE hard drive, but
package identifies several possible field your system BIOS will not recognize the
replaceable units (FRUs) that will resolve new drive, what should you check first.
the problem. What should you do after
turning the power off? A. cable sequence
B. jumpers on the hard drive
A. Replace the indicated parts, one at C. drivers that need to be loaded
a time in the recommended sequence, until D. hard drive manufacturer web site
the problem is resolved; return unused information
FRUs to stock E. None of the above
B. Replace all of the indicated FRUs
at once and return the machine to the 76. During boot-up, the memory test:
customer if the problem is resolved A. Checks and verifies that contiguous
C. Follow the same procedure as in memory is installed
ays replace the system board first if it is on B. Is an operational error
the list of possible FRUs If multiple FRUs C. Displays what memory is installed, but
are indicated, then software is the most nothing else
likely source of the problem D. None of the above
D. None of the above 77. What is the best ground for a conductive
work bench?
71. Most PCs give a single beep on boot up to A. AC outlet
indicate they are ok hardware wise. You B. Ground to bend
boot your PC and don't get a beep. What C. To another device
should you check first? D. Chassis ground
A. system board E. None of the above
B. RAM
C. Microprocessor 78. Topically, how many type III PC cards can
D. power supply you insert in a laptop
E. Speaker
A. 1 B. 2 C. 3
D. 4 E. None of the above
79. What is the first thing you could do to 82. If the memory slots have 30 pins then the
check for damage to a printer after chip is a?
receiving it?
[A]. DIMM
A. Run MSD diagnostics [B]. SIMM
B. Attach it to a PC and print [C]. SDRAM
something [D]. All of the above
C. Check the cables [E]. None of the above
D. Unbox it and examine it for
physical damage 83. Missing slot covers on a computer can
E. None of the above cause?
A. over heat B. power surges
80. You have a system that periodically locks C. EMI. D. incomplete
up. You have ruled out software, and now path for ESD
suspect that it is hardware. What should E. None of the above
you do first that could help you narrow it
down to the component at fault? 84. With respect to a network interface card,
A. rotate the RAM the term 10/100 refers to
B. replace the RAM A. protocol speed B.
C. replace the level 2 cache SIMM a fiber speed C. megabits per
D. disable the CPU cache in CMOS seconds
E. replace the CPU D. minimum and maximum server
speed E. None of the above
81. What's the best way to protect your hard
drive data? 85. Which Motherboard form factor uses one
20 pin connector
A. regular backups A. ATX
B. periodically defrag it B. AT
C. run chkdsk at least once a week C. BABY AT
D. run scandisk at least once a week D. All of the above
E. run a regular diagnostic E. None of the above
1- A 2- B 3- D 4- D 5- B 6- A
7- A 8-B 9-D 10-A 11-B 12-C
13-D 14-D 15-A 16-A 17-B 18-C
19-B 20-B 21-A 22-C 23-A 24-A
25-D 26-C 27-A 28-A 29-A 30-A
31-A 32-A 33-D 34-A 35-B 36-C
37-D 38-C 39-A 40-A 41-A 42-D
43-B 44-C 45-B 46.A 47.B 48.A
49.A 50.A 51.C 52.C 53.D 54.A
55.C 56.A 57.C 58.A 59.C 60.D
61.A 62.C 63.B 64.A 65.B 66. D
67. C 68. C 69. C 70. A 71.B 72. C
73.C 74.A 75.A 76.B 77.D 78.D
79.D 80.C 81.D 82.B 83.D 84.B
85.C
INTERNET & WEB BROWSER
1. Which of the following is used to read a HTML page and render it?
a) Web browser b) Web server c) Web matrix d) Web network
1- A 2- A 3- B 4- A 5- A 6- B
7- A 8-C 9-B 10-D 11-C 12-A
13-A 14-C 15-B 16-C 17- B 18-A
19-C 20-A 21-A 22 C 23- C 24 B
COMPUTER NETWORK
1. What is the benefit of the Networking? 12. What is the minimum header size of an IP
A. File Sharing B. Easier packet?
access to Resources A. 16 bytes B. 10 bytes C. 20
C. Easier Backups D. All of the Above bytes D. 32 bytes
2. Which of the following is not the 13. Which of following provides reliable
Networking Devices? communication?
A. Gateways B. Linux A. TCP B. IP C.
C. Routers D. Firewalls UDP D. All of the above
3. What is the size of MAC Address? 14. What is the address size of IPv6 ?
A. 16-bits B. 32-bits A. 32 bit B. 64 bit C. 128 bit
C. 48-bits D. 64-bits D. 256 bit
4. Which of the following can be Software?
A. Routers B. Firewalls 15. What is the size of Network bits & Host
C. Gateway D. Modems bits of Class A of IP address?
5. What is the use of Ping command? A. Network bits 7, Host bits 24
A. To test a device on the network is B. Network bits 8, Host bits 24
reachable C. Network bits 7, Host bits 23
B. To test a hard disk fault D. Network bits 8, Host bits 23
C. To test a bug in a Application 16. What does Router do in a network?
D. To test a Pinter Quality A. Forwards a packet to all outgoing links
6. MAC Address is the example of B. Forwards a packet to the next free
A. Transport Layer B. Data Link Layer outgoing link
C. Application Layer D. Physical Layer C. Determines on which outing link a
7. Routing tables of a router keeps track of packet is to be forwarded
A. MAC Address Assignments D. Forwards a packet to all outgoing links
B. Port Assignments to network devices except the originated link
C. Distribute IP address to network 17. The Internet is an example of
devices A. Cell switched network
D. Routes to use for forwarding data to its B. circuit switched network
destination C. Packet switched network
8. Layer-2 Switch is also called D. All of above
A. Multiport Hub B. Multiport 18. What does protocol defines?
Switch A. Protocol defines what data is
C. Multiport Bridge D. Multiport communicated.
NIC B. Protocol defines how data is
9. Difference between T568A and T568B is communicated.
A. Difference in wire color B. C. Protocol defines when data is
Difference in number of wires communicated.
C. Just different length of wires D. D. All of above
Just different manufacturer standards 19. What is the uses of subnetting?
10. The meaning of Straight-through Cable is A. It divides one large network into
A. Four wire pairs connect to the same several smaller ones
pin on each end B. It divides network into network classes
B. The cable Which Directly connects C. It speeds up the speed of network
Computer to Computer D. None of above
C. Four wire pairs not twisted with each 20. Repeater operates in which layer of the
other OSI model?
D. The cable which is not twisted A. Physical layer B. Data link layer
11. Why IP Protocol is considered as C. Network layer D. Transport layer
unreliable? 21 . Which of the following is not the External
A. A packet may be lost Security Threats?
B. Packets may arrive out of order A. Front-door Threats B.
C. Duplicate packets may be generated Back-door Threats
D. All of the above
C. Underground Threats D. B. Subnets must be in same size
Denial of Service (DoS) C. No required of subnet
22 What is the Demilitarized Zone? D. All of above
A. The area between firewall & 33. What does the port number in a TCP
connection to an external network connection specify?
B. The area between ISP to Military area A. It specifies the communication process
on the two end systems
C. The area surrounded by secured B. It specifies the quality of the data &
servers connection
D. The area surrounded by the Military C. It specify the size of data
23 What is the full form of RAID ? D. All of the above
A. Redundant Array of Independent Disks 34. The class-based addressing is also
B. Redundant Array of Important Disks known as
C. Random Access of Independent Disks A. Modern Model B. Classful
D. Random Access of Important Disks Model
24 What is the maximum header size of an C. Classless Model D.
IP packet? Heterogeneous Model
A. 32 bytes B. 64 bytes C. 30 bytes 35. Which of the following is correct in CIDR?
D. 60 bytes A. Class A includes Class B network
25 What is the size of Host bits in Class B of B. There are only two networks
IP address? C. There are high & low class network D.
A. 04 B. 08 C. 16 D. 32 There is no concept of class A, B, C networks
26 What is the usable size of Network bits in 36. What is the size of Source and
Class B of IP address? Destination IP address in IP header?
A. 04 B. 08 C. 14 D. 16 A. 4 bits B. 8 bits C. 16 bits
27 In which type of RAID, data is mirrored D. 32 bits
between two disks. 37. Which of the following is reliable
A. RAID 0 B. RAID 1 C. RAID 2 communication?
D. RAID 3 A. TCP B. IP C. UPD
28. What do you mean by broadcasting in D. All of them
Networking? 38. What is the typical range of Ephemeral
A. It means addressing a packet to all ports?
machine A. 1 to 80 B. 1 to 1024 C. 80 to 8080
B. It means addressing a packet to some D. 1024 to 65535
machine 39. What is the purpose of the PSH flag in the
C. It means addressing a packet to a TCP header?
particular machine A. Typically used to indicate end of
D. It means addressing a packet to except message
a particular machine B. Typically used to indicate beginning of
message
29. Which of the following is/are Protocols of C. Typically used to push the message
Application? D. Typically used to indicate stop the
A. FTPB. DNS C. Telnet D. All message
of above 40. What is the natural mask for a class C
30. Which of the following protocol is/are Network?
defined in Transport layer? A. 255.255.255.1 B. 255.255.255.0
A. FTP B. TCP C. C. 255.255.255.254 D. 255.255.255.255
UDP D. B & C
41. DHCP Server provides _____ to the
31. What is the IP Address range of APIPA? client.
A. 169.254.0.1 to 169.254.0.254 B. A. Protocol B. IP Address C. MAC
169.254.0.1 to 169.254.0.255 Address D. Network Address
C. 169.254.0.1 to 169.254.255.254 D. 42. A set of rules that govern all aspects of
169.254.0.1 to 169.254.255.255 information communication is called
32. Which of the following is correct in VLSM? A. Server B. Internet C.
A. Can have subnets of different sizes Protocol D. OSI Model
43. The processes on each machine that 54. Data communication system within a
communicate at a given layer are called building or campus is________
A. UDP process B. Intranet a) LAN b) WAN c) MAN
process d) PAN
C. Server technology D. Peer-peer 55. WAN stands for __________
process a) World area network b) Wide area
44. The duration of time it takes to send a network
message from one end of a network to c) Web area network d) Web
the other and back is called access network
A. Round Trip Time (RTT) B. Full 56. ____ is the multiplexing technique that
Duplex Time (FDT) shifts each signal to a different carrier frequency.
C. Circle Trip Time (CTT) D. a) FDM b) TDM c) Both FDM
Data Travelling Time (DTT) & TDM d) PDM
45. Which of the following layer is not network 57. Communication between a computer and
support layer? a keyboard involves ______________
A. Transport Layer B. Network transmission.
Layers a) Automatic b) Half-duplex c) Full-
C. Data link Layer D. Physical duplex d) Simplex
Layer 58. The first Network was called ________
a) CNNET b) NSFNET c) ASAPNET
46. For error detection ________ is used by d) ARPANET
the higher layer protocols (TCP/IP). 59. Which of this is not a network edge
A. Bit-sum B. Checksum C. Data-sum device?
D. Error-bit a) PC b) Smartphones c) Servers
47. The amount of data that can be carried d) Switch
from one point to another in a given time 60. Three or more devices share a link in
period is called ________ connection.
A. Scope B. Capacity C. Bandwidth a) Unipoint b) Multipoint c) Point to
D. Limitation point d) Simplex
61. Two devices are in network if
48. Controlling access to a network by __________
analyzing the incoming and outgoing packets is a) a process in one device is able to
called exchange information with a process in another
A. IP Filtering B. Data Filtering device
C. Packet Filtering D. Firewall Filtering b) a process is running on both devices
49. The management of data flow between c) PIDs of the processes running of
computers or devices or between nodes different devices are same
in a network is called d) a process is active and another is
A. Flow control B. Data Control C. inactive
Data Management D. Flow Management 62. In computer network nodes are
50. Which of the following is not the possible _________
ways of data exchange? a) the computer that originates the data
A. Simplex B. Multiplex C. Half- b) the computer that routes the data
duplex D. Full-duplex c) the computer that terminates the data
51. Which network topology requires a central d) all of the mentioned
controller or hub? 63. Bluetooth is an example of __________
a) Star b) Mesh c) Ring a) personal area network b) local area
d) Bus network
52. ______ topology requires a multipoint c) virtual private network d) wide area
connection. network
a) Star b) Mesh c) Ring 64. A list of protocols used by a system, one
d) Bus protocol per layer, is called ________
53. Data communication system spanning a) protocol architecture b) protocol
states, countries, or the whole world is ________ stack
a) LAN b) WAN c) MAN c) protocol suite d) protocol
d) PAN system
65. Network congestion occurs _________ a) application layer b) session layer
a) in case of traffic overloading c) presentation layer d) physical layer
b) when a system terminates 76. Transmission data rate is decided by
c) when connection between two nodes ____________
terminates a) network layer b) physical layer
d) in case of transfer failure c) data link layer d) transport layer
77. Which transmission media provides the
highest transmission speed in a network?
66. Which of this is not a constituent of a) coaxial cable b) twisted
residential telephone line? pair cable
a) A high-speed downstream channel c) optical fiber d) electrical cable
b) A medium-speed downstream channel 78. A single channel is shared by multiple
c) A low-speed downstream channel signals by ____________
d) An ultra-high speed downstream a) analog modulation b) digital modulation
channel c) multiplexing d) phase
67. DSL telcos provide which of the following modulation
services? 79. Wireless transmission of signals can be
a) Wired phone access b) ISP done via ___________
c) Wired phone access and ISP d) a) radio waves b)
Network routing and ISP microwaves
68. HFC contains _______ c) infrared d) all of the
a) Fiber cable mentioned
b) Coaxial cable 80. Multiplexing is used in _______
c) A combination of Fiber cable and a) Packet switching b) Circuit switching
Coaxial cable c) Data switching d) Packet & Circuit
d) Twisted Pair Cable switching
69. Home Access is provided by __________ 81. What is full form of HTTP ?
a) DSL b) FTTP A. Hyper Transfer Text Protocol
c) Cable d) All of the mentioned B. Hyper Text Transfer Protocol
70. Application layer is implemented in C. Hexagonal Text Transfer Protocol
____________ D. Hexagonal Text Transfer Prototype
a) End system b) NIC
c) Ethernet d) Packet transport 82. Communication between a computer and
71. The functionalities of the presentation keyboard involves _________transmission
layer include ____________ A automatic B. half-duplex C.
a) Data compression b) Data Full-duplex D. simplex
encryption 83. How many layers are present in the
c) Data description d) All of the Internet protocol stack (TCP/IP model)?
mentioned a) 5 b) 7 c) 6 d) 10
72. Delimiting and synchronization of data 84. The number of layers in ISO OSI
exchange is provided by __________ reference model is __________
a) Application layer b) Session layer a) 5 b) 7 c) 6 d) 10
c) Transport layer d) Link layer 85. TCP/IP model does not have ______
73. OSI stands for __________ layer but OSI model have this layer ?
a) open system interconnection b) a) Session layer b) transport layer c)
operating system interface application layer d) network layer
c) optical service implementation d) 86. The physical layer is concerned with
open service Internet ___________
74. Which layer is used to link the network a) bit-by-bit delivery
support layers and user support layers? c) application to application delivery
a) session layer b) data link b) process to process delivery d) port
layer to port delivery
c) transport layer d) network layer 87. The physical layer is responsible for
75. Which layer provides the services to __________
user? a) line coding b) channel coding c)
modulation d) all of the mentioned
88. Wireless transmission of signals can be 95. Which of this is not a guided media?
done via ___________ a) Fiber optical cable b) Coaxial cable
a) radio waves b) microwaves c) c) Wireless LAN d) Copper wire
infrared d) all of the mentioned 96. Coaxial cable consists of _______
89. The data link layer takes the packets from concentric copper conductors ?
_________ and encapsulates them into frames a) 1 b) 2 c) 3 d) 4
for transmission ? 97. Which is not a application layer protocol?
a) network layer b) physical layer a) HTTP b) SMTP c) FTP
c) transport layer d) application layer d) TCP
90. The network layer is concerned with 98. The packet of information at the
__________ of data. application layer is called __________
a) bits b) frames c) packets a) Packet b) Message c) Segment
d) bytes d) Frame
91. Which one of the following is not a 99. Which one of the following is an
function of network layer? architecture paradigm?
a) routing b) inter-networking c) a) Peer to peer b) Client-server c)
congestion control d) error control HTTP d) Both Peer-to-Peer & Client-Server
92. 4 byte IP address consists of __________ 100. UTP stands for…………
a) only network address c) network a) Uniform transport cable b)
address & host address united transport cable
b) only host address d) c) Unshielded twisted pair d)
network address & MAC address uniformly twisted pair
93. The network layer protocol for internet is 101. A _______ regenerates a signal,
__________ connects segments of a LAN, and has no
a) Ethernet b) internet protocol c) filtering capability.
hypertext transfer protocol d) file transfer a. repeater b. bridge c.
protocol router d. none of the above
94. Physical or logical arrangement of 102. In a client server network the resource are
network is __________ provided by…..
a) Topology b) Routing c)
Networking d) Control a)client b)server
c)administrator d)hub
ANSWER-COMPUTER NETWORK
1 – D / 2 – C / 3 – D / 4 – B / 5 – C / 6 – C / 7 – A / 8 – D / 9 – A / 10 – B 11– D / 12 – C
/1 3 – A / 14 – C / 15 – A / 16 – C / 17 – C /1 8 – D /1 9 – A / 20 – A
21 – C / 22 – A / 23 – A /2 4 – D / 25 – C /2 6 – C / 27 – B / 28 – A /2 9 – D / 30 – D
31 – C / 32 – A / 33 – A /3 4 – B /3 5 – D / 36 – D /3 7 – A /3 8 – D /3 9 – A / 40 – B
41 – B / 42 – C / 43 – D /4 4 – A /4 5 – A /4 6 – B / 47 – C / 48 – C / 49 – A / 50 – B
51-A /52-D/53-B/54-A/55-B/56-A/57-D/58-D/59-D/60-B/61-A/62-D/63-A/64-B/65-A/66-C/67-C/68-C/69-
D/70-A/71-D/72-B/73-A/74-C/75-A/76-B/77-C/78-C/79-D/80-B/81-B/82-D/83-A/84-B
85-A/86-A/87-D/88-D/89-A/90-C/91-D/92-C/93-B/94-A/95-C/96-B/97-D/98-B/99-D/100-C/101-A
102-C
IP ROUTING & CRYPTOGRAPHY
1. Which type of Ethernet framing is used for 9. What is data encryption standard (DES)?
TCP/IP and DEC net? a) block cipher b) stream cipher
a) Ethernet 802.3 c) bit cipher d) byte cipher
b) Ethernet 802.2 10. Which one of the following is a
c) Ethernet II cryptographic protocol used to secure HTTP
d) Ethernet SNAP connection?
2. Novell’s implementation of RIP updates a) stream control transmission protocol
routing tables every _________ seconds. (SCTP)
a) 60 b) 90 c) 10 d) 30 b) transport layer security (TLS)
3. How often does a RIPv1 router broadcast c) explicit congestion notification (ECN)
its routing table by default? d) resource reservation protocol
a) Every 30 seconds
b) Every 60 seconds 11. Which type of Ethernet framing is used for
c) Every 90 seconds TCP/IP and DEC net?
d) RIPv1 does not broadcast periodically a) Ethernet 802.3
4. Which protocol gives a full route table b) Ethernet 802.2
update every 30 seconds? c) Ethernet II
a) IEGRP d) Ethernet SNAP
b) RIP 12. Consider a situation in which you are a
c) ICMP system administrator on a NetWare
d) IP network, you are running NetWare 4.11
5. Which statement is true regarding and you cannot communicate with your
classless routing protocol? router. What is the likely problem?
a) The use of discontinuous networks is a) NetWare 4.11 defaults to 802.2
not allowed encapsulation
b) Use of variable length subnet masks is b) NetWare 4.11 defaults to 802.3
permitted encapsulation
c) RIPv1 is a classless routing protocol c) Cisco routers only work with NetWare
d) IGRP supports classes routing within 3.11
the same autonomous system d) NetWare 3.11 defaults to 802.2
6. Where should we use default routing? encapsulation
a) On stub networks- which have only one 13. NetWare IPX addressing uses a network
exit path out of the network number and a node number. Which
b) Which have more than one exit path statement is not true?
out of the network a) The network address is administratively
c) Minimum five exit paths out of the assigned and can be up to 16
network hexadecimal digits long
d) Maximum five exit paths out of the b) The node address is always
network administratively assigned
7. Which of the following is true regarding c) The node address is usually the MAC
RIPv2? address
a) It has a lower administrative distance d) If the MAC address is used as the node
than RIPv1 address, then IPX eliminates the use of
b) It converges faster than RIPv1 ARP
c) It has the same timers as RIPv1 14. Which NetWare protocol works on layer
d) It is harder to configure than RIPv1 3–network layer—of the OSI model?
8. In cryptography, what is cipher? a) IPX
a) Algorithm for performing encryption b) NCP
and decryption c) SPX
b) encrypted message d) NetBIOS
c) both algorithm for performing 15. Which NetWare protocol provides link-
encryption and decryption and encrypted state routing?
message a) NLSP
d) decrypted message b) RIP
c) SAP 20. What does the “IPX maximum-paths 2”
d) NCP command accomplish?
16. As a system administrator, you want to a) It enables load sharing on 2 paths if the
debug IGRP but are worried that the paths are equal metric paths
“debug IP IGRP transaction” command b) It sets up routing to go to network 2
will flood the console. What is the c) It is the default for Cisco IPX load
command that you should use? sharing
a) Debug IP IGRP event d) It enables load sharing on 2 paths if the
b) Debug IP IGRP-events paths are unequal metric paths
c) Debug IP IGRP summary 21. You want to enable both arpa and snap
d) Debug IP IGRP events encapsulation on one router interface. How do
17. What does the following series of you do
commands “Router IGRP 71 network” this?
accomplish? a) The interface can handle multiple
10.0.0.0 router IGRP 109 network encapsulation types with no extra
172.68.7.0 configuration
a) It isolates networks 10.0.0.0 and b) Assign two network numbers, one for
172.68.7.0 each encapsulation type
b) It loads IGRP for networks 109 and 71 c) Enable Novell-ether to run multiple
c) It disables RIP encapsulation types
d) It disables all routing protocols d) Both arpa and snap are enabled by
18. The “IPX delay number” command will default so you don’t have to configure
allow an administrator to change the anything
default settings. What are the default 22. By default, Cisco routers forward GNS
settings? SAPs to remote networks.
a) For LAN interfaces, one tick; for WAN a) False
interfaces, six ticks b) True
b) For LAN interfaces, six ticks; for WAN 23. To prevent Service Advertisements
interfaces, one tick (SAPs) from flooding a network, Cisco
c) For LAN interfaces, zero ticks; for WAN routers do not forward them. How are
interfaces, five ticks services advertised to other networks?
d) For LAN interfaces, five ticks; for WAN a) Each router builds its own SAP table
interfaces, zero Ticks and forwards that every 60 seconds
b) Each router assigns a service number
and broadcasts that
19. As a system administrator, you need to c) SAPs aren’t necessary with Cisco
set up one Ethernet interface on the Cisco routers
router to allow for both sap and Novell- d) Cisco routers filter out all SAPs
ether encapsulations. Which set of 24. Novell’s implementation of RIP updates
commands will accomplish this? routing tables every _________ seconds.
a) Interface Ethernet 0.1 IPX a) 60
encapsulation Novell-ether IPX network b) 90
9e interface c) 10
Ethernet 0.2 IPX network 6c d) 30
b) Interface Ethernet 0 IPX encapsulation 25. In Novell’s use of RIP, there are two
Novell-ether IPX network 9e interface metrics used to make routing decisions.
Ethernet 0 IPX encapsulation sap IPX Select the correct metrics.
network 6c a) Ticks & Hops
c) Interface Ethernet 0.1 IPX b) Hops & Loops
encapsulation Novell-ether interface c) Loops & Counts
Ethernet 0.2 IPX d) Counts & Ticks
encapsulation sap 26. Which command displays RIP routing
d) Interface Ethernet 0.1ipx encapsulation updates?
Novell-ether IPX network 9e interface a) Show IP route
Ethernet 0.2 IPX encapsulation sap IPX b) Debug IP RIP
network 6c
c) Show protocols d) It prevents regular update messages
d) Debug IP Route from reinstating a route that has gone
27. Which statement is true regarding down.
classless routing protocols? 29. Two connected routers are configured
with RIP routing. What will be the result
1. The command is used to establish a
when a router receives a routing update
static route.
that contains a higher-cost path to a
2. The default administrative distance is network already in its routing table?
used.
a) The updated information will be added
3. The command is used to configure the
to the existing routing table.
default route.
b) The update will be ignored and no
4. The subnet mask for the source
further action will occur.
address is 255.255.255.0.
c) The updated information will replace
a) 1 & 2
the existing routing table entry.
b) 2 & 4
d) The existing routing table entry will be
c) 3 & 4
deleted from the routing table and all
d) All of the above
routers will exchange routing updates to
28. What is split horizon?
reach convergence.
a) Information about a route should not be
30. If your routing table has a static, a RIP,
sent back in the direction from which the
and an IGRP route to the same network,
original update came.
which route will be used to route packets
b) It splits the traffic when you have a
by default?
large bus (horizon) physical network.
a) Any available route
c) It holds the regular updates from
b) RIP route
broadcasting to a downed link.
c) Static route
d) IGRP route
ANSWER-IP ROUTING
1– C/2-A/3-A/4-B/5-B/6-A/7-C/8-A/9-A/10-B/11-C/12-A/13-B/14-A/15-A/16-D/17-A/18-A/19-D/20-A/21-
B/22-A/23-A/24-A/25-A/26-B/27-A/28-A/29-B/30-C
IP SECURITY
ANSWER-IP SECURITY
1– B/2-A/3-B/4-C/5-A/6-B/7-D/8-B/9-A/10-C/11-A/12-B/13-A/14-B/15-A
VIRTUAL LOCAL AREA NETWORK (VLAN)
1. You want to improve network performance by increasing the bandwidth available to hosts and limit
the size of the broadcast domains. Which of the following options will achieve this goal?
a) Managed hubs b) Bridges c) Switches d) Switches configured with VLANs
2. Which switching technology reduces the size of a broadcast domain?
a) 802.1Q b) ISL c) VLANs d) STP
3. When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the
link?
a) By default, all VLANs are allowed on the trunk.
b) No VLAN's are allowed, you must configure each VLAN by hand.
c) Only configured VLAN's are allowed on the link.
d) Only extended VLAN's are allowed by default.
4. A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has
been added to provide communication between the VLANs. What type of interface is necessary on
the router if only one connection is to be made between the router and the switch?
A)10Mbps Ethernet B) 56Kbps Serial C) 100Mbps Ethernet D) 1Gbps Ethernet
5. Which of the following are benefits of VLANs?
A) They increase the size of collision domains.
B) They allow logical grouping of users by function.
C) They increase the size of broadcast domains while decreasing the number of collision domains.
D) They simplify switch administration.
6. What VTP mode allows you to change VLAN information on the switch?
a) Client b) Transparent c) Server d) STP
7. You connect a host to a switch port, but the new host cannot log into the server that is plugged into
the same switch. What could the problem be?
a) The router is not configured for the new host.
b) The VTP configuration on the switch is not updated for the new host.
c) The host has an invalid MAC address.
d) The switch port the host is connected to is not configured to the correct VLAN membership.
8. Which of the following is an IEEE standard for frame tagging?
a) 802.1Q b) ISL c) 802.3Z d) 802.3U
9. Which protocol reduces administrative overhead in a switched network by allowing the
configuration of a new VLAN to be distributed to all the switches in a domain?
a) VTP b) ISL c) DHCP d) STP
10. Which of the following commands sets a trunk port on a 2960 switch?
A) trunk on B) trunk all
C) switchport trunk on D) switchport mode trunk
11. Which of the following true regarding VLANs?
a) You must have at least two VLANs defined in every Cisco switched network.
b) All VLANs are configured at the fastest switch and, by default, propagate this information to all
other switches.
c) You should not have more than 10 switches in the same VTP domain.
d) VTP is used to send VLAN information to switches in a configured VTP domain.
12. Which of the following true regarding VTP?
a) All switches are VTP servers by default
b) All switches are VTP transparent by default.
c) VTP is on by default with a domain name of Cisco on all Cisco switches.
d) All switches are VTP clients by default.
13. Which of the following modes are valid when a switch port is used as a VLAN trunk?
1) Blocking 2) Dynamic Auto 3) Dynamic desirable 4) Nonegotiate 5) Access 6) Learning
a) 1, 2, 6 b) 2, 3, 4 c) 4 ,5, 6 d) 2 , 4, 5
1. When the mail server sends mail to other 9. A session may include ________
mail servers it becomes ____________ a) Zero or more SMTP transactions
a) SMTP server b) Exactly one SMTP transactions
b) SMTP client c) Always more than one SMTP
c) Peer transactions
d) Master d) Number of SMTP transactions can’t be
2. If you have to send multimedia data over determined
SMTP it has to be encoded into _______
a) Binary
b) Signal 10. Which of the following is an example of
c) ASCII user agents for e-mail?
d) Hash a) Microsoft Outlook
3. Expansion of SMTP is ________ b) Facebook
a)Simple Mail Transfer Protocol c) Google
b) Simple Message Transfer Protocol d) Tumblr
c) Simple Mail Transmission Protocol 11. When the sender and the receiver of an
d) Simple Message Transmission email are on different systems, we need
Protocol only _________
4. In SMTP, the command to write receiver’s a) One MTA
mail address is written with the command b) Two UAs
_______ c) Two UAs and one MTA
a) SEND TO d) Two UAs and two MTAs
b) RCPT TO 12. User agent does not support this
c) MAIL TO ___________
d) RCVR TO a) Composing messages
5. The underlying Transport layer protocol b) Reading messages
used by SMTP is ________ c) Replying messages
a) TCP d) Routing messages
b) UDP 13. SMTP connections secured by SSL are
c) Either TCP or UDP known as _____________
d) IMAP a) SMTPS
6. Choose the statement which is wrong in b) SSMTP
case of SMTP? c) SNMP
a) It requires message to be in 7bit ASCII d) STARTTLS
format 14. Which one of the following protocol is
b) It is a pull protocol used to receive mail messages?
c) It transfers files from one mail server to a) SMTP
another mail server b) Post Office Protocol (POP)
d) SMTP is responsible for the c) Internet Message Access Protocol
transmission of the mail through the (IMAP)
internet d) FTP
7. Internet mail places each object in 15. An email client needs to know the
_________ _________ of its initial SMTP server.
a) Separate messages for each object a) IP address
b) One message b) MAC address
c) Varies with number of objects c) URL
d) Multiple messages for each object d) Name
8. Typically the TCP port used by SMTP is 16. SMTP defines _______
_________ a) message transport
a) 25 b) message encryption
b) 35 c) message content
c) 50 d) message password
d) 15
17. SMTP is not used to deliver messages to c) more than one SMTP transaction
______ d) one HTTP transaction
a) user’s terminal 26. SMTP defines _______
b) user’s mailbox a) message transport
c) user’s word processor b) message encryption
d) user’s email client c) message content
d) message password
18. Which one of the following is an SMTP 27. Which one of the following is an SMTP
server configured in such a way that server configured in such a way that
anyone on the internet can send e-mail anyone on the internet can send e-mail
through it? through it?
a) open mail relay a) open mail relay
b) wide mail reception b) wide mail reception
c) open mail reception c) open mail reception
d) short mail reception d) short mail reception
19. Simple mail transfer protocol (SMTP) 28. SMTP is not used to deliver messages to
utilizes _________ as the transport layer ______
protocol for electronic mail transfer. a) user’s terminal
a) TCP b) user’s mailbox
b) UDP c) user’s word processor
c) DCCP d) user’s email client
d) SCTP 29. When the mail server sends mail to other
20. SMTP connections secured by SSL are mail servers it becomes ____________
known as _____________ a) SMTP server
a) SMTPS b) SMTP client
b) SSMTP c) Peer
c) SNMP d) Master
d) STARTTLS 30. If you have to send multimedia data over
21. SMTP uses which of the following TCP SMTP it has to be encoded into _______
port? a) Binary
a) 22 b) Signal
b) 23 c) ASCII
c) 21 d) Hash
d) 25 31. Expansion of SMTP is ________
22. Which one of the following protocol is b) Simple Message Transfer Protocol
used to receive mail messages? c) Simple Mail Transmission Protocol
a) SMTP d) Simple Message Transmission
b) Post Office Protocol (POP) Protocol
c) Internet Message Access Protocol 32. In SMTP, the command to write
(IMAP) receiver’s mail address is written with the
d) FTP command _______
23. What is on-demand mail relay (ODMR)? a) SEND TO
a) protocol for SMTP security b) RCPT TO
b) an SMTP extension c) MAIL TO
c) protocol for web pages d) RCVR TO
d) protocol for faster mail transfer 33. The underlying Transport layer protocol
24. An email client needs to know the used by SMTP is ________
_________ of its initial SMTP server. a) TCP
a) IP address b) UDP
b) MAC address c) Either TCP or UDP
c) URL d) IMAP
d) Name 34. Choose the statement which is wrong in
25. An SMTP session may not include case of SMTP?
_______ a) It requires message to be in 7bit ASCII
a) zero SMTP transaction format
b) one SMTP transaction b) It is a pull protocol
c) It transfers files from one mail server to d) Number of SMTP transactions can’t be
another mail server determined
d) SMTP is responsible for the 38. Which of the following is an example of
transmission of the mail through the user agents for e-mail?
internet a) Microsoft Outlook
35. Internet mail places each object in b) Facebook
_________ c) Google
a) Separate messages for each object d) Tumblr
b) One message 39. When the sender and the receiver of an
c) Varies with number of objects email are on different systems, we need
d) Multiple messages for each object only _________
36. Typically the TCP port used by SMTP is a) One MTA
_________ b) Two UAs
a) 25 c) Two UAs and one MTA
b) 35 d) Two UAs and two MTAs
c) 50 40. User agent does not support this
d) 15 ___________
37. A session may include ________ a) composing messages
a) Zero or more SMTP transactions b) Reading messages
b) Exactly one SMTP transactions c) Replying messages
c) Always more than one SMTP d) Routing messages
transactions
ANSWER-SMTP
1– B/2-C/3-A/4-B/5-A/6-B/7-B/8-A/9-A/10-A/11-D/12-D/13-A/14-D/15-A/16-A/17-C/18-A/19-A/20-A/21-
D/22-8/23-B/24-A/25-D/26-A/27-A/28-C/29-B/30-C/31-A/32-B/33-A/34-B/35-B/ 36-A/37-A/38-A/39-
D/40-D
DOMAIN NAME SYSTEM (DNS)
ANSWER-DNS
1– A/2-B/3-B/4-D/5-A/6-A/7-B/8-D/9-A/10-C/11-A/12-B/13-C/14-B/15-C/16-C/17-C/18-B/19-A/20-C
DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)
1. What is the purpose of the DHCP server? network.
A – to provide storage for email B. Perform host discovery used
B – to translate URLs to IP addresses DHCPDISCOVER message.
C – to translate IPv4 addresses to MAC C. Configure IP address parameters from
addresses DHCP server to a host.
D – to provide an IP configuration D. Provide an easy management of layer
information to hosts 3 devices.
2. How is the message sent from a PC2 7. Which statement is correct regarding the
when is first powers on and attempts to operation of DHCP?
contact the DHCP Server? A. A DHCP client uses a ping to detect
A – Layer 3 unicast address conflicts.
B – Layer 3 broadcast B. A DHCP server uses a gratuitous ARP
C – Layer 3 multicast to detect DHCP clients.
D – Without any Layer 3 encapsulation C. A DHCP client uses a gratuitous ARP
3. What is the default behavior of R1 when to detect a DHCP server.
PC1 requests service from DHCP server? D. If an address conflict is detected, the
A – Drop the request address is removed from the pool and an
B – Broadcast the request to R2 and R3 administrator must resolve the conflict.
C – Forward the request to R2 8. Which statements are true about the
D – Broadcast the request to R2, R3 and DHCP quarantine method? (Select two.)
ISP A. The DNS server for a quarantine
4. Refer to the exhibit. Which rule does the subnet is assigned by the enterprise
DHCP server use when there is an IP DHCP server.
address conflict? B. A quarantine subnet consists of a set
A. The address is removed from the pool of IP addresses dynamically assigned to
until the conflict is resolved. endpoints.
B. The address remains in the pool until C. Endpoint Integrity can be managed for
the conflict is resolved. endpoints with static IP addresses by
C. Only the IP detected by Gratuitous defining exceptions.
ARP is removed from the pool. D. A non-quarantine IP address is
D. Only the IP detected by Ping is assigned by the NAC 800 after an
removed from the pool. endpoint passes integrity testing.
E. The IP will be shown, even after the
conflict is resolved. 9. A ProCurve 3500yl switch is connected to
5. How does a DHCP server dynamically port 1 of a ProCurve NAC 800 and a
assign IP address to host? DHCP server is connected to port 2. The
A. Addresses are allocated after a DHCP server IP address is 10.1.10.10/24.
negotiation between the server and the The NAC 800 IP address is
host to determine the length of the 10.1.10.20/24. The IP address
agreement. 10.1.24.1/24 is assigned to VLAN 24 on
B. Addresses are assigned for a fixed the switch.
period of time. At the end of period, a new Which additional configuration settings
quest for an address must be made, and would be appropriate for supporting a
another address is then assigned. 10.1.24.0/24 non-quarantine subnet and a
C. Addresses are leased to host. A host 10.1.25.0/24 quarantine subnet? (Select
will usually keep the same address by two.)
periodically contacting the DHCP sever to A. on the switch, a multinetted IP address
renew the lease. of 10.1.25.1/24 assigned to VLAN 24
D. Addresses are permanently assigned B. on the NAC 800, the IP address of the
so that the host uses the same address at DHCP server specified as 10.1.10.10/24
all times. C. on the NAC 800, IP addresses
6. Which two tasks does the Dynamic Host 10.1.24.51 through 10.1.24.100 defined
Configuration Protocol perform? (Choose as exceptions
two) D. on the switch, the IP helper addresses
A. Set the IP gateway to be used by the
10.1.10.10 and 10.1.10.20 defined for B. If the NAC 800 receives a DHCP
VLAN 24 request addressed to the DHCP server,
10. Which configuration task is applicable to the request is blocked by the NAC 800.
the ProCurve NAC 800 inline quarantine C. The DHCP server checks the
method? endpoint’s integrity state passed to it by
A. Enable the internal firewall. the NAC 800 before responding with an
B. Specify one or more quarantine IP address.
subnets. D. The DHCP server responds with a
C. Add IP address entries to the quarantine IP address initially and waits
Accessible Services List. for the NAC 800 to indicate the endpoint
D. Select the port to be used for has passed integrity testing.
connection to the external network. 14. A ProCurve 5406zl switch is connected to
11. What is an important factor to consider port 1 of a ProCurve NAC 800 and a
when deploying the ProCurve NAC 800 DHCP server is connected to port 2 of the
using the DHCP quarantine method? NAC 800. You are planning to deploy the
A. The IP address lease duration must be ProCurve NAC 800 with the DHCP
set to five minutes or less on the DHCP quarantine method using a shared subnet
server. approach. Which configuration
B. The DHCP server requires one requirement must be satisfied?
additional, non-overlapping scope for A. The quarantine and non-quarantine
every existing DHCP scope. subnets defined on the NAC 800 must be
C. A switch must support traffic mirroring the same.
for each DHCP server protected by the B. The switch requires that separate
NAC 800. VLANs be defined for the quarantine and
D. Endpoint Integrity cannot be enforced non-quarantine subnets.
for devices using static IP addresses. C. Each switch VLAN supporting the
12. A network is configured to support a endpoints must use a single IP helper set
ProCurve NAC 800 operating with the to the IP address of the NAC 800.
DHCP quarantine method. How does an D. The scope on the DHCP server and
endpoint transition from a quarantine IP the quarantine subnet on the NAC 800
address to a non-quarantine IP address must use non-overlapping IP addresses.
after passing integrity testing? 15. You are configuring a ProCurve NAC 800
A. The NAC 800 triggers the switch to re- to operate using the DHCP quarantine
authenticate the endpoint causing a new method. Which parameters are specified
DHCP request to be issued. when adding a quarantine area? (Select
B. The NAC 800 sends a DHCP release three.)
to the endpoint followed by a DHCP A. IP address of the DHCP server
assignment message with the IP address. B. IP address of a RADIUS server
C. The switch stops forwarding DHCP C. IP address of a default gateway
requests from the endpoint to the NAC D. range of quarantine IP addresses
800 and instead sends them to the DHCP 16. _____ Sets an alias for a host name
server. A. DNS Event Logging tab
D. Any subsequent DHCP request from B. DNS Debug Logging tab
the endpoint is allowed by the NAC 800 to C. DNS CNAME (canonical name)
pass to the DHCP server. D. None of the above
13. A network is configured to support a 17. 10.0.0.0 255.0.0.0 (Assignable IP
ProCurve NAC 800 operating with the range - 10.0.0.1-10.255.255.254) is
DHCP quarantine method. The NAC 800 A. Class C
is located between a ProCurve 3500yl B. Class D
switch and a DHCP server. How is DHCP C. Class A
traffic processed when an endpoint, that D. Class B
is currently unknown to the NAC 800, 18. _______ : Declares the host that's
sends a DHCP request for an IP address? the most authoritative for the zone and, as
A. The switch requests the endpoint’s such, is the best source of DNS
integrity state from the NAC 800 before information for the zone.
forwarding to the DHCP server. A. DNS PTR Record
B. DNS Start of Authority C. DNS PTR Record
C. DNS Monitoring tab D. A & PTR Records
D. DNS A Record 28. ________ DNS tab for detailed
19. which is the type of DNS Scopes troubleshooting
A. Normal DHCP Scope A. DNS PTR Record
B. Normal, Multicast, Super B. Scavenging
C. Multicast Scope C. DNS Event Logging tab
D. Forward Lookup Zone D. DNS Debug Logging tab
20. _____. Is the process of placing 29. ______ interval is the period after the
timestamps on dynamically registered no-refresh interval during which the
records timestamp can be refreshed.
A. Aging A. Refresh Interval
B. IP B. Class A
C. AIPAA C. No-refresh Interval
D. TCP D. DNS A Record
21. which IP range is 69.254.0.1 to 30. ______ interval is the period after the
169.254.255.254 / 255.255.0.0 timestamp is set that must elapse before
A. Aging refresh can occur.
B. TCP A. Nonsecure Method
C. AIPAA B. Refresh Interval
22. _________ indicates that the DHCP C. Forwarder
server is authorized and active D. No-refresh Interval
A. DHCP Server Migration 31. _____ - on server, server is not
B. DHCP white circle with green up arrow authrozied in Active Directory
C. DHCP white circle with red down arrow A. DHCP white circle with green up arrow
D. DHCP red circle with X B. DHCP white circle with red down arrow
23. _______ DNS tab to perform basic C. DHCP red circle with X
tests of name resolution D. DHCP Server Migration
A. DNS PTR Record 32. Internetworking protocol for routing
B. DNS Monitoring tab packets over a network is
C. DNS Debug Logging tab called_________.
D. DNS A Record A. IP
24. Connection Oriented Protocol for end- B. AIPAA
to-end communication is called C. TCP
A. Aging D. Aging
B. CORRECT: TCP 33. ____________ scope is needed for
C. IP Assigning Class A, B, C IP addresses and
D. None of the above related network settings
A. Multicast Scope
25. DHCP audit logs are stored in B. Forward Lookup Zone
________ C. Super Scope
A. Multicast Scope D. Normal DHCP Scope
B. DNS PTR Record 34. ______ Maps an IP address to a host
C. Super Scope name for reverse lookups
D. %systemroot%\system32\dchp A. DNS A Record
26. DHCP ____ _______ occur every 60 B. A & PTR Records
minutes C. Super Scope
A. Multicast Scope D. DNS PTR Record
B. Super Scope 35. Dynamic DNS clients register their A
C. Subnet Mask records using a ______ method
D. Automatic Backups A. DNS PTR Record
27. DHCP servers dynamically update B. Scavenging
____________ on behalf of clients using C. DNS A Record
secure updates D. Nonsecure Method
A. DNS A Record 36. _____ is used to determine the IP
B. Automatic Backups address of a computer from its FQDN
A. Forward Lookup Zone C. Multicast Scope
B. Forwarder D. Subnet Mask
C. Reverse Lookup Zone 46. _____ Maps a host name to an IP
D. Normal DHCP Scope address.
37. Name server designated as the A. DNS A Record
recipient of forwarded queries is known as B. Forwarder
_______ C. Super Scope
A. Class B D. DNS PTR Record
B. Class C 47. which Identifies with parts of the IP
C. Forwarder address belong to the network ID and
D. None of the above which parts belong to the host ID.
38. what is A. Class A
%systemroot%\System32\DHCP B. Subnet Mask
A. DHCP Server Migration C. Super Scope
B. DHCP red circle with X D. Scavenging
C. DHCP Lease 4 part process 48. what is DHCP 044?
D. DHCP Database location A. DHCP options for IPv6
39. _______ is used for assigning Class B. DHCP options DNS Servers
D IP addresses and related network C. DHCP options WINS node type
settings D. DHCP options WINS Servers
A. Normal DHCP Scope 49. what is DHCP 003?
B. Super Scope A. DHCP options
C. Class C B. DHCP options for IPv6
D. Multicast Scope C. DHCP options DNS Servers
40. Every DHCP server must have at D. DHCP options Router
least one active scope to grant leases to 50. ___________netsh dhcp server
clients scope 192.168.1.0 add exclude range
A. True 192.168.1.1 192.168.1.25
B. False A. Server core, create DHCP reservations
41. which Displays entries in DNS cache B. Server core, create DHCP exclusions
A. ipconfig /displaydns C. Server core start the DHCP service.
B. ipconfig /flushdns D. Server core, create DHCP scope.
C. Normal DHCP Scope
D. ipconfig /registerdns 51. DHCP (dynamic host configuration
42. _____is the process of deleting protocol) provides __________ to the
outdated (stale) resource records. client.
A. Class A a) IP address
B. False b) MAC address
C. Scavenging c) Url
D. Aging d) None of the mentioned
43. _________Refreshes leased IP 52. DHCP is used for ________
addresses and re-registers DNS a) IPv6
A. ipconfig /flushdns b) IPv4
B. ipconfig /registerdns c) Both IPv6 and IPv4
C. DNS A Record d) None of the mentioned
D. ipconfig /displaydns 53. The DHCP server _________
44. _____ is used to determine a a) maintains a database of available IP
computer's FQDN from it's IP address addresses
A. Forward Lookup Zone b) maintains the information about client
B. Normal DHCP Scope configuration parameters
C. Super Scope c) grants a IP address when receives a
D. Reverse Lookup Zone request from a client
45. _______ is used as containers for d) all of the mentioned
scopes 54. IP assigned for a client by DHCP server is
A. Super Scope a) for a limited period
B. DNS PTR Record b) for an unlimited period
c) not time dependent _________
d) none of the mentioned a) internet relay chat
55. DHCP uses UDP port _________ for b) broader gateway protocol
sending data to the server. c) address resolution protocol
a) 66 b) 67 c) 68 d) none of the mentioned
d) 69 59. What is DHCP snooping?
56. The DHCP server can provide the a) techniques applied to ensure the
_______ of the IP addresses. security of an existing DHCP
a) dynamic allocation infrastructure
b) automatic allocation b) encryption of the DHCP server
c) static allocation requests
d) all of the mentioned c) algorithm for DHCP
57. DHCP client and servers on the same d) none of the mentioned
subnet communicate via _________ 60. If DHCP snooping is configured on a LAN
a) UDP broadcast switch, then clients having specific
b) UDP unicast ______ can access the network.
c) TCP broadcast a) MAC address
d) TCP unicast b) IP address
58. After obtaining the IP address, to prevent c) Both MAC address and IP address
the IP conflict the client may use d) None of the mentioned
ANSWER-DHCP
1-D/2-B/3-A/4-A/5-C/6-C/7-D/8-B/9-A/10-C/11-D/12-D/13-B/14-D/15-C/16-C/17-C/18-B/19-B/
20-A/21-C/22-B/23-B/24-B/25-D/26-D/27-D/28-D/29-A/30-D/31-B/32-A/33-D/34-D/35-D/
36-A/37-C/38-D/39-D/40-A/41-A/42-C/43-B/44-D/45-A/46-A/47-B/48-D/49-D/50-B/51– A/52-C/
53-D/54-A/55-B/56-D/57-A/58-C/59-A/60-C
VIRTUAL PRIVATE NETWORK (VPN)
ANSWER-VPN
1– B/2-D/3-C/4-D/5-C/6-C/7-D/8-A/9-B/10-B/11-C/12-D/13-C/14-A/15-A/16-B/17-D/18-A/19-B/20-C/21-
D/22-A/23-D/24-C/25-D/26-A
TELNET
B). only for the safety of the operating A). heavy storage media B). F drive
personnel C). D drive D). H drive
C). for the safety of the equipment and for 64. How many pins are there on a VGA
the safety of the operating personnel both A). 15 B). 9 C). 25 D). 32
D). none of these 65. What is modified when changing the
53. SMPS is used for system start-up boot sequence
A). obtaining controlled ac power supply A). BIOS/CMOS B).
B). obtaining controlled dc power supply CONFIG.SYS
C). autoexec.bat D).
C). storage of dc power COMMAND.COM
D). switch from one source to another
54. Choose the incorrect statement 66. You suspect a virus has entered your
A). SMPS is less sensitive to input voltage computer. What will not be affected by the virus?/
variations A). CMOS B). Boot sector C).
B). SMPS is smaller as compared to Floppy disks D). Program files
rectifiers
C). SMPS has low input ripple 67. In which of the following Piggybacking
D). SMPS is a source of radio protocol technique is used?
interference A). ACKs B). NAKs C). ACKs and
55. Sulphation in a lead acid battery occurs NAKs both D). None of these
due to 68. Checksum is used in Internet by several
A). trickle charging B). heavy charging C). protocols although not at the
Overcharging D). incomplete charging A). session layer B). transport layer
56. Computer device which detects each spot C). network layer D). data link layer
of image on a paper is
69. Which of the following are the Addresses A). scan disk B). disc cleanup C).
of classes A, B and C? / check disk D). All of these
A). Multicast B). Reserved C). Unicast
D). All of these 80. What should be the first step while OS
70. The design of the Internet protocol suites upgrading?
adhere to the ________ principle A). Delete old Operating System B).
A). Data corruption B). Connection Backup old Operating System
oriented C). End to End principle D). Reliability C). Backup Critical Data D).
Format Hard Disks
71. Which of the following is not a web server 81. Most common HP 12A (Q2612A) Toner
A). Apache tomcat B). Blue Griffon Cartridge for HP DeskJet, Office jet and
C). Jetty D). Tornado Photosmart series
72. Which type of Ethernet framing is used for A). HP 21 C9351 Cartridge
TCP/IP and DEC net B). HP 12A (Q2612A) Toner
A). Ethernet 802.3 B). Ethernet 802.2 Cartridge
C). Ethernet IID). Ethernet SNAP C). HP #28 (C8728A) Compatible Ink
73. In wireless ad-hoc network Cartridge D). none of these
A). access point is not required
B). access point is must 82. Maintenance related to the modification in
C). nodes are not required D). the software due to changing atmosphere is
None of these A). perfective maintenance B). adaptive
74. Message authentication is a service maintenance
beyond C). corrective maintenance D).
A). Message Confidentiality B). Message preventive maintenance
Integrity
C). Message Splashing D). 83. What is safe inside temperature of a
Message Sending computer?
75. An object acting as a gateway for the A). 25 0 F B). 50 0 F C). 100 0 F
client side is called _______. D). none of these
A). skeleton B). stub C). remote
D). server 84. Multiple sheets of paper feed into a printer
76. What does that machine generally called or copier because
which places the request A). separation roller or pad becomes
to access the data glazed B). Wrong print command
A). Server Machine B). Client Machine C). poor quality of paper
C). Request Machine D). None of D). none of these
these
77. Server manager is a great tool for 85. When configuring a new interface card for
managing most of your server settings installation, Valid I/O address will
configuration all in one central place. A). 378 B). 2F8 C). 360 D).
Which one of the following Server 3F8
manager Features is used for
Storage management, replication and 86. Network that allows authorized access
searching? from outside users
A). Internet B). Extranet C). Intranet
A). Dynamic Host Configuration Server D). none of these
B). Terminal Services
C). Domain Name Service 87. Group scopes in active directory
D). File Services A). zero B). 5 C). 3 D). none of
78. Device should not be direct plug in to these
UPS is 88. Not a LAN hardware
A). monitor B). Laser Printer C). A). gateway B). memory access unit
external modem D). none of these C). network interface card D). none of these
89. Router and bridge is same in term of
79. Name of disk used for preventive A). Encapsulation & filtering
maintenance of software B). self learning
C). Encapsulation & filtering and self
learning both D). none of these 98. Monitor design ensures that
90. Which phase of hacking performs actual A). only one process can be active at a
attack on a network or system? time within the monitor
A). Reconnaissance B). Gaining Access B). number of processes can be active at
C). Scanning D). Maintaining Access a time
C). the queue has only one process in it
91. What type of error is indicated when you at a time
can successfully PING a local PC by IP address D). particular processes can be active at a
but not by name? time
A). DNS B). CAT5 C). DHCP
D). none of these
92. Technology of Active directory is created 99. Parity is
by _________ that provides variety of network A). a byte stored in the FAT to indicate
services. remaining slots
A). Microsoft B). Internet explorer B). the optimal transmission speed of data
C). Microsoft office D). Microsoft window over a CAT 5 cable
93. For response message of size of more C).an extra bit stored with data in RAM
than 512 bytes, Connection is that is used to check for errors when the data is
A). DNS B). STMP C). ICMP read back
D). TCP D). none of these
94. This fig. Shows
100. A ___________________ monitor looks
like a television and are normally used with non-
portable computer systems. /
A). CRT B). LCD
C). LED D). Flat Panel
Monitors
101. The socket that supplies the power from
the computer system to the computer monitor
1- B/2 –D/ 3- B/4- D/5- B/6 –C/7 –B/8 –C/9- C /1 0- A /1 1 -D /1 2- C/1 3- B/1 4 –D/1 5 –C/1 6 –B/1 7 –A/
1 8- B/1 9- B/2 0-D/21- B/22-C/23- C/24-A/25-A /26- A /27 A /28- C/29-B/30-D/31-D/32-A/33-B/34-C/35-D
36-C/ 37-B /38-D/39-C/40-A/41-A/42-B/43-A/44-B/45-A/46-C/47-C/48-B/49-A/50-C/51-B/52-C/53-B/54-C
/55-D /56- C/57- A/58- A/59-C/60-A/61-A/62-C/63-C/64-A/65-A/66-A/67-C/68-D/69-C/70-C/71-B/72-C/
73- A/74-B/75-B/76-B/77-D/78-B/79-D/80-C/81-A/82-B/83-C/84-A/85-C/86-B/87-C/88-B/89-C /90- B/
9 1- A/9 2- A/93- D/94- B/95-A/96-D/97-A/98-A/99-C/100-A/101-A/102-C/103-D/104-A/105-A/106-B/
107-D/108-A/109-D/110-D/111-A/112-A/113-A/114-C