Quiz-summary
0 of 40 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
Information
Intenet and Email QUESTIONS & ANSWERS
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 40 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- Answered
- Review
-
Question 1 of 40
1. Question
1 pointsA header in CGI script can specify
Correct
Incorrect
A header in CGI script can specify- Format of the document & New location
of the document. -
Question 2 of 40
2. Question
1 pointsHow long is an IPv6 address?
Correct
Incorrect
An IPv6 address is 128 bits long.
-
Question 3 of 40
3. Question
1 pointsAll exceptions in Java are subclasses of built in class called
Correct
Incorrect
All exception in Java are subclasses of built in class called Throwable.
-
Question 4 of 40
4. Question
1 pointsWhat flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?
Correct
Incorrect
Port Address Translation (PAT) allows a one-to-many approach to network address translation.
-
Question 5 of 40
5. Question
1 pointsIn 32bit IP Addressing scheme all 1’s represent
Correct
Incorrect
In 32 bit IP Addressing scheme all 1’s represent limited broadcast
-
Question 6 of 40
6. Question
1 pointsWhat are the two main types of access control lists (ACLs)?
- Standard
- IEEE
- Extended
- Specialized
Correct
Incorrect
Standard and extended access control lists (ACLs) are used to configure security on a router.
-
Question 7 of 40
7. Question
1 pointsDMSP stands for
Correct
Incorrect
DMSP stands for – Distributed Mail system Protocol.
-
Question 8 of 40
8. Question
1 pointsWhat command is used to create a backup configuration?
Correct
Incorrect
The command to back up the configuration on a router is copy running-config startup-config.
-
Question 9 of 40
9. Question
1 pointsWhich Layer is not present in TCP/IP model?
Correct
Incorrect
Presentation layer is not present in TCP/IP Model
-
Question 10 of 40
10. Question
1 pointsYou have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?
Correct
Incorrect
Each device has 10 Mbps to the server.
-
Question 11 of 40
11. Question
1 pointsLet most segment of a name inn DNS represents
Correct
Incorrect
Left Most segment of a name in DNS represents- Individual computer
-
Question 12 of 40
12. Question
1 pointsWhich WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
Correct
Incorrect
IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the 2.4GHz range, with a top speed of 54Mbps.
-
Question 13 of 40
13. Question
1 pointsAddress 192.5.48.3 belongs to
Correct
Incorrect
Address 192.5.48.3 belongs to class C.
-
Question 14 of 40
14. Question
1 pointsWhich of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?
Correct
Incorrect
256 - 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129-190.
-
Question 15 of 40
15. Question
1 pointsUnlike Ipv4, Ipv6 does not include the following field in thee base header
Correct
Incorrect
Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information
in the base header. -
Question 16 of 40
16. Question
1 pointsTo back up an IOS, what command will you use?
Correct
Incorrect
The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host.
-
Question 17 of 40
17. Question
1 pointsThe term byte stuffing refers to:
Correct
Incorrect
The term byte stuffing refers to data stuffing used with character-oriented
hardware. -
Question 18 of 40
18. Question
1 pointsWhat protocol does PPP use to identify the Network layer protocol?
Correct
Incorrect
Network Control Protocol is used to help identify the Network layer protocol used in the packet.
-
Question 19 of 40
19. Question
1 pointsFDDI (Fiber Distributed Data Interconnect) is an example of
Correct
Incorrect
FDDI is an example of token ring
-
Question 20 of 40
20. Question
1 pointsWhich of the following commands will allow you to set your Telnet password on a Cisco router?
Correct
Incorrect
The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password.
-
Question 21 of 40
21. Question
1 pointsThe command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password.
Correct
Incorrect
Hardware that calculates CRC uses shift register and Xor unit.
-
Question 22 of 40
22. Question
1 pointsWhich protocol does DHCP use at the Transport layer?
Correct
Incorrect
User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service.
-
Question 23 of 40
23. Question
1 pointsIn TCP protocol header “checksum” is of___________
Correct
Incorrect
In TCP protocol header checksum is of 16 bits.
-
Question 24 of 40
24. Question
1 pointsWhich command is used to determine if an IP access list is enabled on a particular interface?
Correct
Incorrect
The show ip interface command will show you if any outbound or inbound interfaces have an access list set.
-
Question 25 of 40
25. Question
1 pointsIn IP addressing scheme, class used for multicasting is:
Correct
Incorrect
In IP addressing scheme, class used for multicasting is class D.
-
Question 26 of 40
26. Question
1 pointsWhere is a hub specified in the OSI model?
Correct
Incorrect
Hubs regenerate electrical signals, which are specified at the Physical layer.
-
Question 27 of 40
27. Question
1 pointsCIDR stands for
Correct
Incorrect
CIDR stands for Classless Inter Domain Routing
-
Question 28 of 40
28. Question
1 pointsWhat does the passive command provide to dynamic routing protocols?
Correct
Incorrect
The passive command, short for passive-interface, stops regular updates from being sent out an interface. However, the interface can still receive updates.
-
Question 29 of 40
29. Question
1 pointsThe total number of class of IP address are
Correct
Incorrect
The total number of class of IP addresses are 5.
-
Question 30 of 40
30. Question
1 pointsWhich protocol is used to send a destination network unknown message back to originating hosts?
Correct
Incorrect
ICMP is the protocol at the Network layer that is used to send messages back to an originating router.
-
Question 31 of 40
31. Question
1 pointsParent class of all Java classes is
Correct
Incorrect
Parent class of all Java classes is java.lang.object.
-
Question 32 of 40
32. Question
1 pointsHow often are BPDUs sent from a layer 2 device?
Correct
Incorrect
Every 2 seconds, BPDUs are sent out from all active bridge ports by default.
-
Question 33 of 40
33. Question
1 pointsExceptions of type error inn JAVA are handled by
Correct
Incorrect
Exceptions of type error in JAVA are handled by JAVA run time
environment. -
Question 34 of 40
34. Question
1 pointsHow many broadcast domains are created when you segment a network with a 12-port switch?
Correct
Incorrect
By default, switches break up collision domains but are one large broadcast domain.
-
Question 35 of 40
35. Question
1 pointsError detecting method that can detect more errors without increasing additional information in each packet is
Correct
Incorrect
Error detecting method that can detect more errors without increasing additional information in each packet is CRC.
-
Question 36 of 40
36. Question
1 pointsWhat does the command routerA(config)#line cons 0 allow you to perform next?
Correct
Incorrect
The command line console 0 places you at a prompt where you can then set your console user-mode password.
-
Question 37 of 40
37. Question
1 pointsA Network uses a star topology if
Correct
Incorrect
A Network uses a star topology if all computers attach to a central point
-
Question 38 of 40
38. Question
1 pointsWhich router command allows you to view the entire contents of all access lists?
Correct
Incorrect
To see the contents of all access lists, use the show access-lists command.
-
Question 39 of 40
39. Question
1 pointsMTU is specified by
Correct
Incorrect
MTU is specified by hardware technology.
-
Question 40 of 40
40. Question
1 pointsWhich class of IP address has the most host addresses available by default?
Correct
Incorrect
Class A addressing provides 24 bits for host addressing.
0 Comments