Tuesday, September 25, 2012

linux sample questions and answers


1. The term OSS stands for ____________.
A. Open and Secured Software
B. Open Source Software
C. Obfuscated Source Software
D. None of the above
2. The ‘var’ directory in linux file system is used to store ______________.
A. User data
B. Logs
C. Kernel
D. None of the above
3. ReiserFS is a type of _____________.
A. Directory
B. Command
C. File system
D. None of the above
4. The option used to install a given RPM file is ________.
A. -i
B. -install
C. -t
D. None of the above
5. The file /etc/passwd stores user password in _____________ form.
A. Encrypted
B. Plain text
C. Numeric
D. None of the above
Getting Started with Linux: Novell's Guide to CompTIA's Linux+ (Course 3060)  8-1
Getting Started with Linux: Novell's Guide to 
CompTIA's Linux+ (Course 3060)
1-4188-3730-x
Chapter 8 Answers
Review Questions 
1. Which of the following terms refers to a system service that does not run on a terminal? 
a. Program
b. User Process
c. Daemon Process
d. Child Process
ANSWER: c
2. What is the PID of init?  _____ 
ANSWER: 1
3. Which of the following statements are true? (Choose all that apply.)
a. A parent process may only have one child process
b. Each process is given a PPID that is used to uniquely identify it on the system
c. A child process may only have one parent process
d. All background processes have a PID and a job ID
ANSWER: c,d
4. Which of the following commands can quickly identify the child processes started by a
particular daemon?
a. top
b. lsof
c. ps
d. pstree
ANSWER: d
5. Which processes are regular users allowed to send kill signals to? _____ 
ANSWER: Their own processes only. Getting Started with Linux: Novell's Guide to CompTIA's Linux+ (Course 3060)  8-2
6. You have just run the ps aux command and notice that most daemons have an S in the
STAT column.  What does this mean? _____ 
ANSWER: It indicates that they are sleeping (waiting for an event to occur).
7. What key can you press in the top command to send the process a signal?
a. s
b. k
c. R
d. N
ANSWER: b
8. What can you type at a command prompt to run the updatedb command in the
background? _____ 
ANSWER: updatedb &
9. Which of the following key combinations can you use to pause a foreground process such
that it may be send to the background with the bg command?
a. Ctrl+c
b. Ctrl+p
c. Ctrl+z
d. Ctrl+r
ANSWER: c
10. Which of the following kill commands may be used to send the second background job a
SIGINT?
a. kill -2 %2
b. kill -1 –b 2
c. kill -9 %2
d. kill -15 2
ANSWER: a
11. If you do not specify the type of signal when using the kill or killall commands, which
signal is used by default?
a. SIGHUP
b. SIGINT
c. SIGKILL
d. SIGTERM
ANSWER: d
12. What command could you use change the priority of a process (PID=592) to run with the
highest priority? _____  Getting Started with Linux: Novell's Guide to CompTIA's Linux+ (Course 3060)  8-3
ANSWER: renice -20 592 or renice –n -20 592
13. Which action in the /etc/inittab file is used to determine the default runlevel at system
initialization? _____ 
ANSWER: initdefault
14. What is the default runlevel in SLES _____
ANSWER: 5
15. What runlevel loads all networking daemons (including NFS) but does not start a display
manager?
a. 1
b. 2
c. 3
d. 5
ANSWER: c
16. What command can you type to change your runlevel to Single User Mode? _____ 
ANSWER: init 1
17. Which of the following commands will force your system to reboot? (Choose all that
apply.)
a. init 0
b. reboot
c. powerwait
d. init 6
ANSWER: b,d
18. Which of the following commands may be used to stop the SSH daemon (sshd)? (Choose
all that apply.)
a. rcsshd stop
b. kstopsys sshd
c. /etc/init.d/sshd stop
d. /etc/rc/stopsshd
ANSWER: a,c 

networking sample questions and answers

https://www.youtube.com/channel/UCQECTKWf3phX5McZIyPM0Mw/videos


Following are some Network+ sample questions:
  1. You install File and Printer Sharing for Microsoft Networks.You share a folder and leave the password option blank.Who can gain access to the folder
    1. Anyone who can gain access to your network and has a Microsoft redirector such as the Client for Microsoft Networks installed.
    2. Windows 98 will not allow a blank password in this field.
    3. Anyone with Internet Explorer installed.
    4. Only users that are members of the same workgroup as you.
Answer: A
  1. The figure below shows a typical Home Network Setup.Identify the network components marked in red.
Answer:
A: Cable/DSL Modem
B: CAT 5 Ethernet cable
C: Wireless Signal
E: Wirelss Router
  1. Some protocols are considered to be technically non-routable.Which of the following statements best describes the most common reason why a protocol would be considered non-routable
    1. It does not contain the appropriate Data Link layer information required by routers.
    2. It uses advanced Transport layer services to move across the Internet and avoids the routing overhead required by the more primitive networking protocols.
    3. It defines Physical layer network addresses for internal routing.
    4. It does not specify the Network layer addresses required by routers.
Answer: D
  1. What is the binary network ID of the loopback IP address
    1. 1
    2. 10101010
    3. 0
    4. 1111111
Answer: D
  1. You are the LAN administrator for your company.You have couple Windows 2000 Professional clients that dial in via PPP to the company network’s RAS server.You want the remote clients to be assigned dynamic IP addresses.You reserve a pool of class B addresses for these clients.Upon connecting, you find that the Windows 2000 computers are using a subnet mask of all 255s.What should you do
    1. Run ipconfig with the /release and /renew switch on the client
    2. Run ipconfig with the /renew_all switch on the client
    3. Run winipcfg on the client
    4. Do nothing.This is normal
Answer: D
  1. You are configuring a router.According to the manual, you will need a transceiver to connect to the LAN ports of the router.What kind of physical interface does the router have
    1. MSAU
    2. RJ-11
    3. AUI
    4. BNC
Answer: C
  1. Which of the following are connectionless protocols.(Choose the three best answers.)
    1. IP
    2. SPX
    3. IPX
    4. UDP
Answer: A, C, D
  1. How can Jim Herr, a client on an NT TCP/IP network see which remote hosts are currently connected using NBT
    1. Use NBTSTAT
    2. Use NETSTAT
    3. Use NSLOOKUP
    4. Use IPCONFIG
Answer: A
  1. You are setting up a new Windows 98 workstation on your network, and your DHCP server provides all of the normal TCP/IP configuration information.What must you do to configure the IP address on the workstation after you add the TCP/IP protocol
    1. The DHCP option is enabled automatically, and the server will auto-configure everything.
    2. Find out what the subnet mask on your network is, and add this information only.
    3. Manually enter an IP address that is not in use on the network.
    4. Put the address of the router in the default gateway, and put all 0s in the IP field.
Answer: A
  1. Which of the following is considered a Network Attached Storage device
    1. A 60 GB DAT tape drive attached to the Network Server
    2. A file server with special software that is at a separate location from the departmental file server
    3. In a Windows NT environment, it would be the Backup Domain Controller
    4. A high speed specialized sub-network attached to the enterprise
Answer: B
11.   Credit card size, designed for notebooks, self-configuring, and non-OS dependent describes which PC bus architecture.
    1. PCI
    2. ISA
    3. EISA
    4. PCMCIA
Answer: D
  1. What protocol is used between E-Mail servers
    1. HTTP
    2. POP3
    3. SNMP
    4. SMTP
Answer: D
  1. When installing a manually configured adapter, what information must you know to avoid resource conflicts
    1. IRQ
    2. Number of bits
    3. Base I/O port address
    4. Base Memory address
Answer: A, C & D
  1. Which of the following OSI layers is responsible for identifying communications partners
    1. Application
    2. Session
    3. Network
    4. Presentation
Answer: A
  1. A broadcast message is an example of which dialog control method
    1. Half duplex
    2. Baseband
    3. Broadband
    4. Simplex
Answer: D
  1. Which of the following are used to resolve Windows NetBIOS names to IP addresses
    1. DNS
    2. WINS
    3. LMhosts file
    4. Hosts file
Answer: B,C
  1. What is a router
    1. A hardware device that connects dissimilar networks, such as Cat 5 cabling and FDDI
    2. A network host that reads the source and destination addresses in the packet header and makes decisions about where to forward the packet
    3. A network host that can forward LAN-based email messages onto the Internet, after repackaging them into the SMTP format
    4. A software system that can translate between dissimilar networks such as Ethernet and Token Ring
Answer: B
  1. Which of the following is Class C IP address?
    1. 10.10.14.118
    2. 135.23.112.57
    3. 191.200.199.199
    4. 204.67.118.54
Answer: D
  1. A Windows 95 user complains that she cannot connect to any other computers on her local subnet even when using the IP address to communicate.However, she can ping 127.0.0.1 and receive a reply.Other users on her subnet do not report having any trouble.All client computers on the network are WINS-enabled.What is the most probable cause of the problem?
    1. The TCP/IP stack is not installed properly
    2. The subnet mask is not correct, check whether the subnet mask is configured correctly.
    3. The default gateway is not configured properly.
    4. The computer is not configured to use LMHOSTS
Answer: B
  1. WINS or ___ may be used for NetBIOS name resolution?
    1. HOSTS
    2. DNS
    3. LMHOSTS
Answer: C
  1. You have set up a server that connects to an Internet services provider ( ISP) over ISDNline.How should the default gateway address be configured so that windows 95 users on the local network can access the Internet through the RAS server.The RAS server is located on the same subnet as that of the WIN95 machines.
    1. The default Gateway address on WINS95 must specify the IP address of the remote ISP
    2. The default Gateway on WN95 must specify the IP address of the RAS server on the local network.
    3. The HOSTS file in WIN95 machines must be configured with the host name of the RAS Server.
    4. The HOSTS file in WIN 95 machines must be configured with the host name of the ISP
Answer: B
  1. Which of the following is the standard adopted for Ethernet CSMA/CD by IEEE Committee?
    1. 802.2
    2. 802.1d
    3. 802.3
    4. 802.5
Answer: C
  1. Disk Striping with Parity corresponds to which RAID level?
    1. RAID 0
    2. RAID 1
    3. RAID 3
    4. RAID 5
Answer: D.
  1. Which of the following media types is most susceptible to EMI?
    1. Fiber Optic
    2. STP
    3. Co-axial
    4. UTP
Answer: D
  1. Which type of connector does a 10BaseT Ethernet cable use?
    1. BNC
    2. RJ-45
    3. RJ-11
    4. MSAU
Answer: B
  1. Which of the following is suitable for mission critical and time sensitive applications?
    1. 10BaseT
    2. 10Base2
    3. Token Ring
    4. Mesh
Answer: C
  1. What is the default subnet mask for Class C network?
    1. 255.0.0.0
    2. 255.255.0.0
    3. 255.255.255.0
    4. 255.0.255.0
Answer: C
  1. Which of the following network topologies have each computer connected to a central point?
    1. Bus
    2. Ring
    3. Star
    4. Mesh
Answer: C
  1. Which of the following network topologies is the most fault tolerant?
    1. Bus
    2. Mesh
    3. Star
    4. Ring
Answer: B
  1. A Bus network topology is best described as which of the following?
    1. All computers are attached to a single cable in a chain style
    2. All computers are connected to a central point
    3. All computers are connected to every other computer or resource in the network
    4. Fault Tolerant
Answer: A

  1. Which connector is often used with Thinnet cable?
    1. RJ-11
    2. AUI
    3. DIX
    4. BNC
Answer:D
  1. Which of the following media connectors are used in conjunction with telephones?
    1. RJ-45
    2. RJ-11
    3. RJ-T
    4. None of the above are correct
Answer:B
  1. 10BaseT Ethernet networks, most commonly use which of the following types of cable?
    1. Fiber
    2. Coax
    3. STP
    4. UTP
Answer:D
  1. A Gateway is able to connect network environments that are dissimilar.
    1. True
    2. False
Answer:A
  1. AUI connectors are commonly associated with which of the following items?
    1. A Vampire Tap
    2. Fiber Optic Cable
    3. 10Base2
    4. Wireless Networks
Answer:A
  1. A hub works in conjunction with which of the following network topologies?
    1. Ring
    2. Star
    3. Bus
    4. Mesh
Answer:B
  1. Which of the following is a correct MAC address?
    1. 190.168.80.1
    2. www.certyourself.com
    3. 08:34:FE:4C:F2:54
    4. G2:G3:23:87:GG
Answer:C
  1. A Hub operates at which of the following layers of the OSI model?
    1. Physical
    2. Session
    3. Transport
    4. Application
Answer:A
  1. Which of the following devices operate at the Data Link layer of the OSI model?
    1. A Hub
    2. A NIC
    3. A Switch
    4. A Router
Answer:C

  1. A Router operates in which layer of the OSI model?
    1. The Physical Layer
    2. The Data Link Layer
    3. The Transport Layer
    4. The Network Layer
Answer:D
  1. A Network Interface Card operates at the Network Layer of the OSI model.
    1. True
    2. False
Answer:B
  1. Which of the following is the correct order of the OSI model from bottom to top?
    1. Application, Presentation, Session, Transport, Network, Data Link, Physical
    2. Physical, Network, Data Link, Session, Transport, Application, Presentation
    3. Physical, Data Link, Network, Transport, Session, Presentation, Application
    4. Application, Session, Presentation, Transport, Network, Data Link, Physical
Answer:C
  1. What is the maximum speed of 10Base5 Ethernet cable?
    1. 100 Mbps
    2. 500 Mbps
    3. 50 Mbps
    4. 10 Mbps
Answer:D
  1. 100Base-FX uses which of the following types of cable?
    1. Fiber Optic
    2. Unshielded Twisted Pair
    3. Coax
    4. Shielded Twisted Pair
Answer:A
  1. Which of the following TCP/IP protocols is used to communicate between a Web Browser and a Web Server?
    1. SMTP
    2. HTTP
    3. UDP
    4. POP3
Answer:B
  1. Which of the following layers of the OSI model does a Bridge operate in?
    1. The Data Link Layer
    2. The Network Layer
    3. The Transport Layer
    4. The Session Layer
Answer:A
  1. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server.Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised.Which of the following solutions are you most likely to implement?
    1. A firewall system at the connection point to the Internet
    2. A more secure password policy
    3. File-level encryption
    4. Kerberos authentication
Answer: A
  1. A server has two NIC cards installed.The first one uses IRQ 10 and I/O range of B800-B81F.The second uses IRQ 10 and I/O range of D700-D80A.What action, if any, should be taken?
    1. No action is required.
    2. Locate any available IRQ to resolve the IRQ conflict.
    3. Locate any available I/O range to resolve the I/O conflict.
    4. Change the I/O of the second NIC to B800-B81F.
Answer: B
  1. Which of the following IEEE 802 standards pertain to token ring?
    1. IEEE 802.5
    2. IEEE 802.3
    3. IEEE 802.2
    4. IEEE 802.11
Answer: A
  1. Protocol that is often used to facilitate communications with an IBM mainframe?
    1. NetBEUI
    2. RIP
    3. DLC
Answer: C
  1. Which of these protocols provide fast connectionless communications that relies on upper layers of the OSI model for error correction?
    1. TCP (Transmission Control Protocol)
    2. UDP (User Datagram Protocol)
    3. SPX
Answer: B
  1. Can be used to reduce traffic bottlenecks in a NetBEUI network?
    1. bridge
    2. router
    3. gateway
Answer: A
  1. You have just finished the installation of two computers on a 28 computer network using Novell's IPX/SPX.Both computers initialize with no error messages yet they cannot contact other computers on the network.All other computers are functioning normally.You probably have an ___?
    1. incorrect IRQ
    2. incorrect frame type
    3. invalid IP setting
Answer: B
  1. Uses amplifiers to regenerate analog signals?
    1. baseband
    2. broadband
    3. fiber-optic
Answer: B
  1. Uses single frequency digital signals?
    1. baseband
    2. broadband
    3. multiband
Answer: A
  1. You are hired to investigate a slow performing network server for a client.Using the performance monitor you obtain the following readings: CPU usage= 25%, Disk time= 25%, Page faults/sec= 25.What one change will increase the performance of this network server the most?
    1. buy another CPU
    2. add another hard drive
    3. increase RAM
Answer: C
  1. Which of the following should you check if you can connect using the IP address but NOT with the host name?
    1. DNS
    2. WINS
    3. DHCP
Answer: A
  1. The fastest method of transporting data with a switch?
    1. store and forward
    2. cut through
    3. loop back
Answer: B
  1. Although NOT fault tolerant this RAID level is often used when one wants the highest level of performance?
    1. RAID 0
    2. RAID 1
    3. RAID 5
Answer: A
  1. Four _____ are used in the 5-4-3 rule of 10Base2 networking?
    1. repeaters
    2. segments
    3. routers
Answer: A
  1. You have just finished installing an Ethernet PCI NIC (network interface card) in a client's computer.The computer initializes successfully and has no apparent hardware problems.The computer however is not able to communicate with other computers on this NetBEUI network.All other client computers are able to communicate.What is the most likely cause of this problem?
    1. IRQ conflict
    2. incorrect transceiver setting
    3. incorrect frame type
Answer: B
  1. The two key components of a digital signature include the secure hash algorithm and a ___ ?
    1. blowfish value
    2. certificate authority
    3. IPSec
Answer: B
  1. The Microsoft version of Novell's IPX/SPX protocol?
    1. ODI
    2. NWLink
    3. DLC
Answer: B
  1. Utility used to run applications on a computer at a remote location?
    1. ODI
    2. Telnet
    3. ARP (Address Resolution Protocol)
Answer: B
  1. Topology that offers the highest level of redundancy, is easy to troubleshoot but is expensive to install.It is the topology of the internet?
    1. star
    2. ring
    3. mesh
Answer: C
  1. Ordinary telephone wire has a thickness of AWG 22.Of the following which is the thickest wire?
    1. AWG 14
    2. AWG 28
    3. AWG 32
Answer: A
  1. Backup method which clears the archive bit and is the shortest to perform but takes the longest to restore?
    1. full
    2. incremental
    3. differential
Answer: B
  1. Which of the following protocols map a logical address to a MAC (Media Access Control) address?
    1. DNS
    2. WINS
    3. ARP
Answer: C
  1. The major limiting factor for how long a cable can be in a segment is ___?
    1. collisions
    2. EMI
    3. attenuation
Answer: C
  1. Backing up the system state in Win 2000 Prof will backup the ___?
    1. registry
    2. boot files
    3. all of the above
Answer: C
  1. Equipment that is designed to help identify breaks and shorts in cables?
    1. TDR
    2. performance monitor
    3. SNMP
Answer: A
  1. Which company developed the Unix Operating System?
    1. Sun
    2. Microsoft
    3. ATT
Answer: C
  1. To start a Win 2000 Prof computer in the safe mode press ___ at startup?
    1. F8
    2. Ctl and Esc
    3. F1
Answer: A
  1. A bridge filters traffic using which type of address?
    1. IP address
    2. MAC address
    3. TCP address
Answer: B
  1. A large network with 500 users notice that at specific times in the morning and afternoon network congestion ties up their computers.What is the most likely cause?
    1. power fluctuations
    2. a terminator is not grounded
    3. many users are logging on or off
Answer: C
  1. A ___ is created when a unique IP address and port number are used to connect two computers?
    1. SAP
    2. media transfer coefficient
    3. socket
Answer: C
  1. During disaster recovery of a Win 2000 Prof computer if you "Enable Boot Logging" the file ___ is saved to the C:\winnt folder for analysis?
    1. setuplog.txt
    2. bootlog.txt ntbtlog.txt
Answer: C
  1. Which of these WAN (Wide Area Network) protocols is the fastest?
    1. Frame Relay
    2. ATM
    3. X.25
Answer: B
  1. The only files on a Win 2000 Prof Emergency Repair Disk (ERD) are autoexec.nt, config.nt, and setup.log?
    1. True
    2. False
Answer: A
  1. OSI layer responsible for mail and file transfers?
    1. transport
    2. data link
    3. application
Answer: C
  1. A protocol that functions at the network layer of the OSI model?
    1. TCP
    2. IP
    3. SPX
Answer: B
  1. A major advantage of ___ in an NT network is centralized security and administration?
    1. user-level security
    2. share-level security
    3. RAID 5
Answer: A
  1. OC-1 has a transmission rate that is close to ___ ?
    1. T-1
    2. T-3
    3. ISDN
Answer: B
  1. The maximum number of populated segments allowed in an Ethernet network?
    1. 3
    2. 4
    3. 5
Answer: A
  1. Using the TCP/IP protocol if the destination of the packet is outside the subnet then the packet is sent to the ___?
    1. switch
    2. bridge
    3. default gateway
Answer: C
  1. Entry in DNS to identify your mail server?
    1. IDC
    2. TU
    3. MX
Answer: C
  1. Toplology which is the least expensive to install?
    1. ring
    2. star
    3. bus
Answer: C
  1. Utility which can be used to identify bottlenecks in the network?
    1. PING
    2. WINIPCFG
    3. TRACERT
Answer: C
  1. What is the first octet range for a class A IP address?
    1. 1- 126
    2. 1- 128
    3. 1- 191
Answer: A
  1. After you setup the IP address and subnet mask your FIRST test should be with ___?
    1. tracert to a known good server
    2. ping 127.0.0.1
    3. ping another computer on your segment
Answer: B
  1. NetBIOS computer names can have up to ___ characters?
    1. 256
    2. 15
    3. 20
Answer: B
  1. Refers to the part of the network that is separated by routers, bridges, or switches?
    1. partition
    2. node
    3. segment
Answer: C
  1. Data is organized into FRAMES for transmission at this OSI level?
    1. physical
    2. data-link
    3. network
Answer: B
  1. 10Base2 coaxial has a limit of ___ computers per segment?
    1. 2
    2. 30
    3. 100
Answer: B
  1. Cable used for ArcNet networks?
    1. RG-58
    2. RG-59
    3. RG-62
Answer: C
  1. A Class A IP address uses the last ___ octet(s) for the host ID.The host ID is the unique part and identifies the individual user and part of the reason 50% of all IP addresses are Class A?
    1. one
    2. two
    3. three
Answer: C
  1. Of the three (3) RAID levels used by a Win 2000 server choose the one(s) that is/are fault tolerant?
    1. 0, 1, and 5
    2. 1 and 5
    3. 5
Answer: B
  1. The best method to restore the latest copy of the registry in a Win 2000 Server is to select the ___?
    1. Emergency Repair Disk (ERD)
    2. Recovery Console
    3. Last Known Good Configuration
Answer: C
  1. What routing protocol counts hops to the destination along multiple paths to determine the most efficient route?
    1. ARP
    2. DLC
    3. RIP
Answer: C
  1. The source and destination addresses are stored in the ___ of a packet?
    1. data
    2. trailer
    3. header
Answer: C
  1. Most commonly used type of modem?
    1. synchronous
    2. asynchronous
    3. external
Answer: B
  1. Operates at the network layer of the OSI model?
    1. bridge
    2. gateway
    3. router
Answer: C
  1. Disk duplexing (RAID 1) requires a minimum of ___?
    1. 2 hard drives and 1 controller
    2. 3 hard drives and 2 controllers
    3. 2 hard drives and 2 controllers
Answer: C
  1. Organization responsible for the OSI model?
    1. ANSI
    2. IEEE
    3. ISO
Answer: C
  1. Which topology uses the least amount of cabling?
    1. star
    2. bus
    3. ring
Answer: B
  1. According to RFC 1918 this range of Class A IP addresses are reserved for private intranetsand are not supposed to be used on the internet (where x is any number from 1 to 254)?
    1. 10.x.x.x
    2. 20.x.x.x
    3. 30.x.x.x
Answer: A
  1. Cable classification for 10Base5 thicknet coaxial?
    1. RG-8
    2. RG-10
    3. RG-58
Answer: A
  1. Dial-up protocol that uses a virtual private network (VPN)?
    1. SLIP (Serial Line Internet Protocol)
    2. PPTP (Point-to-Point Tunneling Protocol)
    3. PPP (Point to Point Protocol)
Answer: B
  1. Type 9 ___ rated coaxial cable should be installed in drop ceilings to conform to fire code regulations?
    1. SPF
    2. PVC
    3. plenum
Answer: C
  1. Processes data using applications stored on its hard drive and sends the results back to the client.Saving the client the extra hard drive space he would need for the application as well as the CPU processing time?
    1. file server
    2. print server
    3. application server
Answer: C
  1. The static HOSTS text file used on UNIX systems that requires manual entries by the administrator was the precursor of ___.Today the HOSTS file system finds use mainly in maximum security operations which don't want anything changed automatically?
    1. WINS
    2. LMHOSTS
    3. DNS
Answer: C
  1. The minimum category of UTP cable that will meet the 10BaseT standard?
    1. cat2
    2. cat3
    3. cat5
Answer: B
  1. The easiest protocol to setup?
    1. NetBEUI
    2. NWLink
    3. TCP/IP
Answer: A
  1. Displays data on hardware components such as memory, CPU, and the hard drive in a chart or graph which describes how these devices are operating?
    1. protocol analyzer
    2. performance monitor
    3. network monitor
Answer: B
  1. The OSI layer responsible for name recognition, security logins, and synchronization of the connection?
    1. presentation
    2. application
    3. session
Answer: C
  1. Has twenty-four 64 Kbps channels for a total of 1.544 Mbps throughput?
    1. T3
    2. T1
    3. X.25
Answer: B
  1. Microsoft recommends that the %CPU usage should not be above 90% for a single CPU or above __% for multiple processors for any extended period?
    1. 50
    2. 70
    3. 90
Answer: A
  1. Your customer's computer is loaded with peripherals and is using COM1, COM2, LPT5, and LPT7.You install the NIC on IRQ3 and have a conflict.Which of the following is the NIC conflicting with?
    1. the printer
    2. COM1
    3. COM2
Answer: C
  1. The most widely used protocol?
    1. NetBEUI
    2. NWLink
    3. TCP/IP
Answer: C