Which of the following best illustrates the default subnet mask for a class A,B, and C Network? 255.0.0.0, 255.255.0.0, 255.255.255.0 None of these 0.0.0.0, 0.0.0.1, 0.0.1.1 255.255.255.0, 255.255.0.0, 255.0.0.0 255.255.0.0, 255.255.255.0, 255.255.255.255 TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following is an example of a client-server model? All of these FTP TELNET DNS None of these TRUE ANSWER : ? YOUR ANSWER : ?
IGRP uses which of the following as default parameters for finding the best path to a remote network?1. Hop count2. MTU3. Cumulative interface delay4. STP5. Path bandwidth value All of these 2, 3 and 5 3 and 5 1 and 3 TRUE ANSWER : ? YOUR ANSWER : ?
Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called? Teleconferencing Telemailing Teletalking None of these Telemeeting TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?1. Half-duplex Ethernet operates in a shared collision domain.2. Half-duplex Ethernet operates in a private collision domain.3. Half-duplex Ethernet has higher effective throughput.4. Half-duplex Ethernet has lower effective throughput. 4 only 2 only 1,2 and 3 1 and 4 TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following file retrieval methods use hypermedia? HTTP Archie None of these WAIS Veronica TRUE ANSWER : ? YOUR ANSWER : ?
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 TRUE ANSWER : ? YOUR ANSWER : ?
What is the maximum number of entries in the HOSTS file? 500 Unlimited None of these 8 255 TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 2, 3 and 4 4, 5 and 6 1, 2 and 6 2, 4, and 5 TRUE ANSWER : ? YOUR ANSWER : ?
You have been contracted to install a windows NT network in an office that is located in a strip mall. The office is located next to the power plant of the building, so a UPS (uninterruptible power supply) has already been installed. What type of cable should you use for the network cabling? Choose the best answer. UTP TI Fiber-optic PSTN STP TRUE ANSWER : ? YOUR ANSWER : ?