Hardware Network Service COC Level III and IV
Hardware Network Service COC Level III and IV
1. How many digits of the DNIC (Data Network Identification Code) identify the country?
A. first three
B. first four
C. first five
D. first six
E. None of the above
Answer: Option A
2. A station in a network forwards incoming packets by placing them on its shortest output queue.
What routing algorithm is being used?
A. hot potato routing
B. flooding
C. static routing
D. delta routing
E. None of the above
Answer: Option A
3. The probability that a single bit will be in error on a typical public telephone line using 4800 bps
modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate
for a communication line using 9-bit frames is approximately equal to
A. 0.003
B. 0.009
C. 0.991
D. 0.999
E. None of the above
Answer: Option B
4. Frames from one LAN can be transmitted to another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem
Answer: Option B
5. Which of the following condition is used to transmit two packets over a medium at the same
time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
E. None of the above
Answer: Option B
1
Prepared by Chala T
Hardware Network Service COC Level III and IV
6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A. 255.240.0.0
B. 255.248.0.0
C. 255.252.0.0
D. 255.254.0.0
E. 255.255.255.255
Answer: Option D
7. What are the most commonly used transmission speeds in BPS used in data communication?
A. 300
B. 1200
C. 2400
D. 9600
E. None of the above
Answer: Option D
Answer: Option D
Answer: Option A
Answer: Option D
2
Prepared by Chala T
Hardware Network Service COC Level III and IV
B. provides communication between the Internet Protocol Software on one machine and
the Internet Protocol Software on another
C. reports error conditions to the original source, the source must relate errors to
individual application programs and take action to correct the problem
D. All of the above
E. None of the above
Answer: Option D
12. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing
plant in the suburbs. To enable everyone to share data and resources between the two LANs,
what type of device(s) are needed to connect them? Choose the most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
Answer: Option D
13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
A. cannot talk at once
B. can receive and send data simultaneously
C. can send or receive data one at a time
D. can do one way data transmission only
E. None of the above
Answer: Option B
14. How many hosts are attached to each of the local area networks at your site?
A. 128
B. 254
C. 256
D. 64
E. None of the above
Answer: Option B
Answer: Option C
3
Prepared by Chala T
Hardware Network Service COC Level III and IV
16. Contention is
A. One or more conductors that serve as a common connection for a related group of
devices
B. a continuous frequency capable of being modulated or impressed with a second signal
C. the condition when two or more stations attempt to use the same channel at the same
time
D. a collection of interconnected functional units that provides a data communications
service among stations attached to the network
E. None of the above
Answer: Option C
17. Avalanche photodiode receivers can detect hits of transmitted data by receiving
A. 100 photons
B. 200 photons
C. 300 photons
D. 400 photons
E. None of the above
Answer: Option B
Answer: Option C
19. When you ping the loopback address, a packet is sent where?
A. On the network
B. Down through the layers of the IP architecture and then up the layers again
C. Across the wire
D. through the loopback dongle
E. None of the above
Answer: Option B
20. Which of the following TCP/IP protocol is used for transferring electronic mail messages from
one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
4
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option C
21. Which of the following device is used to connect two systems, especially if the systems use
different protocols?
A. hub
B. bridge
C. gateway
D. repeater
E. None of the above
Answer: Option C
22. The synchronous modems are more costly than the asynchronous modems because
A. they produce large volume of data
B. they contain clock recovery circuits
C. they transmit the data with stop and start bits.
D. they operate with a larger bandwidth
E. None of the above
Answer: Option B
23. A distributed network configuration in which all data/information pass through a central
computer is
A. bus network
B. star network
C. ring network
D. Point-to-point network
E. None of the above
Answer: Option B
24. Which of the following TCP/IP protocol allows an application program on one machine to send a
datagram to an application program on another machine?
A. UDP
B. VMTP
C. X.25
D. SMTP
E. None of the above
Answer: Option A
25. A remote batch-processing operation in which data is solely input to a central computer would
require a:
A. telegraph line
B. simplex lines
C. mixedband channel
D. All the above
E. None of the above
5
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option B
Answer: Option D
27. If you get both local and remote echoes, every character you type will appear on the screen
A. once
B. twice
C. three times
D. never
E. None of the above
Answer: Option B
28. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
A. 192
B. 192.168.10
C. 0.0.0.5
D. 51
E. None of the above
Answer: Option B
Answer: Option A
30. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data
rate?
A. 3 Kbps
B. 6 Kbps
C. 12 Kbps
D. 24 Kbps.
Answer: Option B
31. Carrier is
6
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. One or more conductors that serve as a common connection for a related group of
devices
B. a continuous frequency capable of being modulated or impressed with a second signal
C. the condition when two or more sections attempt to use the same channel at the same
time
D. a collection of interconnected functional units that provides a data communications
service among stations attached to the network
E. None of the above
Answer: Option B
Answer: Option C
Answer: Option B
34. Which of the following statements is correct for the use of packet switching?
A. the subdivision of information into individually addressed packets in conjunction with
alternative routing arrangement enabled the transmission path to be altered in the
event of congestion or individual link failure
B. the employment of additional intelligence within the network enabled more
sophisticated error control and link control procedures to be applied
C. by employing wide bandwidth circuits for the trunk networks substantial economies
through extensive sharing of capacity could be achieved.
D. All of the above
E. None of the above
Answer: Option D
7
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option C
Answer: Option A
37. Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk
Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are
needed to resolve the contention?
A. 7 slots
B. 5 slots
C. 10 slots
D. 14 slots
Answer: Option A
38. Usually, it takes 10-bits to represent one character. How many characters can be transmitted at
a speed of 1200 BPS?
A. 10
B. 12
C. 120
D. 1200
E. None of the above
Answer: Option C
39. To connect a computer with a device in the same room, you might be likely to use
A. a coaxial cable
B. a dedicated line
C. a ground station
D. All of the above
E. None of the above
Answer: Option A
Answer: Option A
41. How many bits internet address is assigned to each host on a TCP/IP internet which is used in all
communications with the host?
8
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. 16 - bits
B. 32 - bits
C. 48 - bits
D. 64 - bits
E. None of the above
Answer: Option B
42. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to
maximize the number of available hosts?
A. 192
B. 224
C. 240
D. 248
E. 252
Answer: Option E
43. Which of the following types of channels moves data relatively slowly?
A. wideband channel
B. voiceband channel
C. narrowband channel
D. broadband channel
E. None of the above
Answer: Option C
Answer: Option E
45. Which of the following does not allow multiple users or devices to share one communications
line?
A. doubleplexer
B. multipplexer
C. concentrator
D. controller
E. None of the above
Answer: Option A
46. Telecommunication networks frequently interconnect an organization with its customers and
suppliers. Select the best fit for answer:
A. Bandwidth alternatives
9
Prepared by Chala T
Hardware Network Service COC Level III and IV
B. Switching alternating
C. Inter organizational networks
D. Extranets
Answer: Option C
Answer: Option B
Answer: Option C
49. What device separates a single network into two segments but lets the two segments appear as
one to higher protocols?
A. Switch
B. Bridge
C. Gateway
D. Router
Answer: Option B
50. Which of the following refers to the terms "residual error rate"?
A. the number of bit errors per twenty four hours of continuous operation on an
asynchronous line
B. The probability that one or more errors will be undetected when an error detection
scheme is used
C. the probability that one or more errors will be detected when an error detection
mechanism is used
D. signal to noise ratio divided by the ratio of energy per bit to noise per hertz
E. None of the above
Answer: Option B
51. 2. Which of the following summation operations is performed on the bits to check an error-
detecting code?
A. Codec
B. Coder-decoder
10
Prepared by Chala T
Hardware Network Service COC Level III and IV
C. Checksum
D. Attenuation
Answer: Option C
52. 3. The research and development department at your office has been experimenting with
different technologies to help improve the performance of the network. One group has been
examining the use of a broadband network versus a based band network. Select the correct
statement about broadband and baseband.
A. Broadband networks carry several channels on a single cable, whereas in a baseband
network several cables carry one channel
B. Baseband networks carry a single channel on a single cable, whereas broadband
networks carry several channels on a single cable
C. Baseband refers to local area networks, and broadband refers to wide area networks.
D. Baseband operates at a standard bit rate, whereas broadband may operate at different
rates as needed
E. Broadband and baseband refer to the different frequencies at which infrared operates
then transmitting signals in certain conditions
Answer: Option B
Answer: Option A
Answer: Option A
55. 6. Computers cannot communicate with each other directly over telephone lines because they
use digital pulses whereas telephone lines use analog sound frequencies. What is the name of
the device which permits digital to analog conversion at the start of a long distance
transmission?
A. Interface
B. Modem
C. Attenuation
D. Teleprocessor
E. None of the above
11
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option B
56. 7. What is the usual number of bits transmitted simultaneously in parallel data transmission
used by microcomputers?
A. 16
B. 9
C. 8
D. 4
E. None of the above
Answer: Option B
Answer: Option A
58. 9. Four routers have to be interconnected in a point-to-point Network. Each pair of root us may
connected by a high-speed line, a medium speed line or a low speed line. Find the total number
of topologies.
A. 12
B. 81
C. 48
D. 729
Answer: Option D
59. 10. A network consists of eight NT servers. You are planning to move servers to different
segments of your network, what utility should be used at each server to determine which server
generates the most traffic?
A. NBTSTAT
B. NETSTAT.EXE
C. Performance Monitor
D. Network Monitor
E. ARP.EXE
Answer: Option D
60. 11. Sending a file from your personal computer's primary memory or disk to another computer
is called
A. uploading
B. downloading
C. logging on
D. hang on
12
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
61. 12. What is the name of the software package that allows people to send electronic mail along a
network of computers and workstations?
A. Memory resident package
B. Project management package
C. Data communication package
D. Electronic mail package
E. None of the above
Answer: Option C
62. 13. The communication mode that supports two-way traffic but only one direction at a time is
A. simplex
B. duplex
C. half duplex
D. multiplex
E. None of the above
Answer: Option C
Answer: Option C
Answer: Option A
65. 16. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame
(assume header bits are negligible) that can be sent on this ring?
A. 8000 B frame
B. 80,000 B frame
C. 8 x 10 5 bit frame
D. 10,000 B frame
13
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option D
At 8 Mbps, a station can transmit 80,000 bits or 10,000 bytes in 10 msec. This is an upper bound on
frame length. From this amount, some overhead must be subtracted, giving a slightly lower limit for the
data portion. Therefore, 10,000 B frame is the correct answer.
66. 17. Data are sent over pin _____ of the EIA-232 interface.
A. 2
B. 3
C. 4
D. All of the above
Answer: Option A
67. 18. To connect a computer with a device in the same room, you might be likely to use
A. a coaxial cable
B. a dedicated line
C. a ground station
D. All of the above
Answer: Option A
Answer: Option A
69. 20. Internet-like networks between a company and its business partners. Select the best fit for
answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
Answer: Option D
Answer: Option D
14
Prepared by Chala T
Hardware Network Service COC Level III and IV
71. 22. Which of the following layer protocols are responsible for user and the application
programme support such as passwords, resource sharing, file transfer and network
management?
A. Layer 7 protocols
B. Layer 6 protocols
C. Layer 5 protocols
D. Layer 4 protocols
E. None of the above
Answer: Option A
Answer: Option D
73. 24. Transmission of computerised data from one location to another is called
A. data transfer
B. data flow
C. data communication
D. data management
E. None of the above
Answer: Option C
Answer: Option C
Answer: Option A
15
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option D
77. 28. A central computer surrounded by one or more satellite computers is called a
A. bus network
B. ring network
C. star network
D. All of the above
E. None of the above
Answer: Option C
78. 29. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are
exchanged twice a second, how much bandwidth per fill duplex line is occupied by the
distributed routing algorithm?
A. 500 bps
B. 1500 bps
C. 5 bps
D. 1000 bps
Answer: Option D
79. 30. HOSTS file entries are limited to how many characters?
A. 8
B. 255
C. 500
D. Unlimited
E. None of the above
Answer: Option B
Answer: Option B
16
Prepared by Chala T
Hardware Network Service COC Level III and IV
B. The sender's IP - to- physical address binding is included in every ARP broadcast;
receivers update the IP-to-Physical address binding information in their cache before
processing an ARP packet.
C. ARP is a low-level protocol that hides the underlying network physical addressing,
permitting us to assign IP-addresses of our choice to every machine.
D. All of the above
E. None of the above
Answer: Option D
82. 33. You are working with a network that has the network ID 192.168.10.0. What subnet should
you use that supports up to 25 hosts and a maximum number of subnets?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
Answer: Option B
83. 34. Which of the following best illustrates the default subnet mask for a class A,B, and C
Network?
A. 0.0.0.0, 0.0.0.1, 0.0.1.1
B. 255.255.255.0, 255.255.0.0, 255.0.0.0
C. 255.0.0.0, 255.255.0.0, 255.255.255.0
D. 255.255.0.0, 255.255.255.0, 255.255.255.255
E. None of the above
Answer: Option C
Answer: Option B
Answer: Option D
86. 37. What are the data transmission channels available for carrying data from one location to
another?
17
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. Narrowband
B. Voiceband
C. Broadband
D. All of the above
E. None of the above
Answer: Option D
87. 38. On a class B network, how many hosts are available at each site with a subnet mask of 248?
A. 16,382
B. 8,190
C. 4,094
D. 2,046
E. 1,022
Answer: Option D
Answer: Option B
89. 40. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0,
and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
A. 255.255.252.0
B. 225.255.254.0
C. 255.255.255.240
D. 255.255.255.252
Answer: Option A
90. 41. With an IP address set starting with 150, you currently have six offices that you are treating
as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet
mask should you use to satisfy the needed number of subnets and maximize the number of
hosts available at each site?
A. 192
B. 224
C. 240
D. 248
E. 252
Answer: Option D
18
Prepared by Chala T
Hardware Network Service COC Level III and IV
91. 42. A machine that connects to two or more electronic mail systems and transfers mail
messages among them is known as
A. Gateways
B. mail gateway
C. bridges
D. User Agent
E. None of the above
Answer: Option B
92. 43. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the
modulation rate is
A. 1200 bands
B. 3200 bands
C. 4800 bands
D. 9600 bands
E. None of the above
Answer: Option B
Answer: Option B
94. 45. When the computer provides the manager with a multiple choice of possible answers, the
prompting technique is
A. question and answer
B. form filling
C. open-ended question
D. menu selection
E. None of the above
Answer: Option D
Answer: Option E
96. 47. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they
would use a(n)
19
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. POS terminal
B. data collection terminal
C. batch processing terminal
D. intelligent terminal
E. None of the above
Answer: Option C
Answer: Option C
Answer: Option D
99. 50. Intranets and extranets can use their network fire walls and other security features to
establish secure Internet links within an enterprise or with its trading partners. Select the best fit
for answer:
A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI
Answer: Option B
100. Modem is used in data transmission. When was it invented and in which country?
A. 1963, USA
B. 1965, Germany
C. 1950, USA
D. 1950, Japan
E. None of the above
Answer: Option C
20
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
2. Communication network is
A. one or more conductors that serve as a common connection for a related group of
devices
B. a continuous frequency capable of being modulated or impressed with a second signal
C. the condition with two or more stations attempt to use the same channel at the same
time
D. a collection of interconnected functional units that provides a data communications
service among stations attached to the network
E. None of the above
Answer: Option D
Answer: Option E
Answer: Option D
5. Bandlimited signal is
A. transmission of signals without modulation
B. a signal all of whose energy is contained within a finite frequency range
C. simultaneous transmission of data to a number of stations
D. All of the above
E. None of the above
21
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option B
Answer: Option A
7. You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at
least 600 host IDs for each subnet are available. You desire to have the largest amount of
subnets available. Which subnet mask should you assign?
A. 255.255.224.0
B. 255.255.240.0
C. 255.255.248.0
D. 255.255.255.0
E. 255.255.255.255
Answer: Option D
8. How many digits of the Network User Address are known as the DNIC (Data Network
Identification Code)?
A. first three
B. first four
C. first five
D. first seven
E. None of the above
Answer: Option B
Answer: Option D
10. Thorough planning must take place when setting up an 802.3 network. A maximum number of
segments can separate any two nodes on the network. What is the maximum number of
segments allowed between two nodes?
A. Five
B. Two
C. Four
D. Six
E. Three
22
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
Answer: Option B
Answer: Option D
13. Which of the following divides the high speed signal into frequency bands?
A. t-switch
B. modem
C. frequency-division multiplexer
D. time-division multiplexer
E. None of the above
Answer: Option C
Answer: Option B
15. Which utility is useful for finding the local host name?
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
E. None of the above
Answer: Option D
16. Which of the following conditions is used to transmit two packets over a medium at the same
time?
23
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
Answer: Option B
Answer: Option A
Answer: Option E
This standard is part of a family of standards for local area networks (LANs) and metropolitan area
networks (MANs) that deals with the physical and data link layers as defined by the ISO open systems
interconnection reference model. It defines a high-speed shared medium access protocol for use over a
dual, counterflowing, unidirectional bus subnetwork. The physical layer and distributed queue dual bus
(DQDB) layer are required to support a logical link control (LLC) sublayer by means of a connectionless
medium access control (MAC) sublayer service in a manner consistent with other IEEE 802 networks.
Additional DQDB layer functions are specified as a framework for other services. These additional
functions will support isochronous service users and connection-oriented data service users, but their
implementation is not required for conformance.
Answer: Option D
20. If the ASCII character G is sent and the character D is received, what type of error is this?
A. single-bit
B. multiple-bit
C. burst
24
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. recoverable
Answer: Option C
21. Which layer of OSI determines the interface of the system with the user?
A. Network
B. Application
C. Data-link
D. Session
E. None of the above
Answer: Option B
22. The transfer of data from a CPU to peripheral devices of a computer is achieved through
A. modems
B. computer ports
C. interfaces
D. buffer memory
E. None of the above
Answer: Option B
23. What is the number of separate protocol layers at the serial interface gateway specified by the
X.25 standard?
A. 4
B. 2
C. 6
D. 3
E. None of the above
Answer: Option D
24. Many data communication networks have been established which provide a wealth of on-
demand information services to people at home. What is the name of the system which
provides an interactive, graphics-rich service that permits user to select what they want?
A. Teletex system
B. Fax system
C. Videotex system
D. Microwave system
E. None of the above
Answer: Option C
25
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option C
26. Which of the following characteristic(s) is/are suited to the PSS applications?
A. bursty traffic and low communications intensity
B. widely dispersed terminals and access to international packets switched services
C. Multiple remote host or applications accessed by a single local access circuit terminal
and circuit
D. All of the above
E. None of the above
Answer: Option D
27. Because the configuration infor-mation for a DHCP client is received dynamically, you must use
which utility to read the current configuration to verify the settings?
A. PING
B. TRACERT
C. ARP
D. IPCONFIG
E. None of the above
Answer: Option D
Answer: Option B
29. The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1.
The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz
is
A. 6200 bps
B. 9600 bps
C. 34000 bps
D. 31000 bps
E. None of the above
Answer: Option D
Answer: Option C
26
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
Answer: Option C
Answer: Option B
34. You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the
largest amount of subnets available. Which subnet mask should you assign?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.255
Answer: Option B
Answer: Option B
36. Examples are packet switching using frame relay, and cell switching using ATM technologies.
Select the best fit for answer:
A. Bandwidth alternatives
B. Switching alternating
27
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option B
Answer: Option B
Answer: Option C
Answer: Option A
Answer: Option A
28
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
42. You are working with a network that has the network ID 192.168.10.0 and require nine subsets
for your company and the maximum number of hosts. What subnet mask should you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
Answer: Option C
43. Messages from one computer terminal can be sent to another by using data networks. The
message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone
or satellite and then converted back again at the receiving end. What is this system of sending
messages called?
A. Paperless office
B. Electronic mail
C. Global network
D. Electronic newspaper
E. None of the above
Answer: Option B
Answer: Option C
45. You are working with a network that has the network ID 192.168.10.0. What subnet should you
use that supports four subnets and a maximum number of hosts?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
Answer: Option B
29
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option C
47. The first step in troubleshooting many problems is to verify which of the following?
A. The subnet mask is valid
B. TCP/IP is installed correctly on the client
C. The WINS server is running
D. The BDC is operable
E. None of the above
Answer: Option B
48. You are working with a network that is 172.16.0.0 and would like to have the maximum number
of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
A. 255.255.192.0
B. 255.255.224.0
C. 255.255.240.0
D. 255.255.248.0
E. 255.255.255.0
Answer: Option C
49. Which of the following files is used for NetBIOS name resolution?
A. HOSTS
B. LMHOSTS
C. ARP
D. FQDN
E. None of the above
Answer: Option B
Answer: Option B
51. If you configure the TCP/IP address and other TCP/IP parameters manually, you can always
verify the configuration through which of the following? Select the best answer.
A. Network Properties dialog box
B. Server Services dialog box
C. DHCPINFO command-line utility
D. Advanced Properties tab of TCP/ IP Info.
E. None of the above
30
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
52. In a PC to telephone hookup for long distance communication, modem is connected between
the telephone line and
A. PC
B. synchronous port
C. crossover cable
D. asynchronous port
E. None of the above
Answer: Option D
53. Which of the following communications service provides message preparation and transmission
facilities?
A. Teletex
B. Teletext
C. x400
D. Fax
E. None of the above
Answer: Option A
54. Four bits are used for packet sequence numbering in a sliding window protocol used in a
computer network. What is the maximum window size?
A. 4
B. 8
C. 15
D. 16
E. None of the above
Answer: Option C
Answer: Option D
56. Which of the following device copies electrical signals from one Ethernet to another?
A. bridge
B. repeater
C. hub
D. passive hub
E. None of the above
Answer: Option B
31
Prepared by Chala T
Hardware Network Service COC Level III and IV
57. Stephanie is in charge of a small network and wants to make it simple but secure. The users
want to have full control over their data and still be able to share data with the rest of the office.
The networking knowledge of the office staff is basic. Which network(s) would be the best for
Stephanie to set up?
A. Peer-to-peer
B. Master domain
C. Server-based
D. WAN
E. Share-level
Answer: Option C
Answer: Option D
59. Error control is needed at the transport layer because of potential errors occurring _____.
A. from transmission line noise
B. in routers
C. from out-of-sequence delivery
D. from packet losses.
Answer: Option B
Answer: Option D
Answer: Option D
32
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. serial
B. parallel
C. series parallel
D. direct
E. None of the above
Answer: Option A
Answer: Option E
64. Data link layer retransmits the damaged frames in most networks. If the probability of a frame's
being damaged is p, what is the mean number of transmissions required to send a frame if
acknowledgements are never lost.
A. P I (K + 1)
B. KIK (1 + F)
C. 1/ (1 - F)
D. K I (K - P)
E. None of the above
Answer: Option C
Answer: Option B
Answer: Option A
33
Prepared by Chala T
Hardware Network Service COC Level III and IV
67. You are trying to decide which type of network you will use at your office, and you want the
type that will provide communication and avoid collisions on the cable. Which of the following is
the best choice?
A. Token-Ring
B. CSMA/CD
C. Ethernet
D. CSMA/CA
E. ARCnet
Answer: Option A
68. Which of the following network access standard is used for connecting stations to a packet-
switched network?
A. X.3
B. X.21
C. X.25
D. X.75
E. None of the above
Answer: Option C
69. Interconnected networks need communication processors such as switches, routers, hubs, and
gateways. Select the best fit for answer:
A. TCP/IP
B. Protocol
C. Open Systems
D. Internetwork processor
Answer: Option D
70. A decrease in magnitude of current, voltage, a power of a signal in transmission between points,
is known as
A. Attenuation
B. Amplitude
C. Aloha
D. Carrier
E. None of the above
Answer: Option A
Answer: Option A
34
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option D
Answer: Option A
Answer: Option A
Answer: Option B
76. When using the loopback address, if TCP/IP is installed correctly, when should you receive a
response?
A. Immediately
B. Only if the address fails
C. After the next host comes online
D. Within two minutes
E. None of the above
35
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
Answer: Option A
78. The modern enterprise is interconnected internally and externally by the Internet, intranets, and
other networks. Select the best fit for answer:
A. Internetworked enterprise
B. Information super highway
C. Business applications of telecommunications
D. Client/Server networks
E. None of the above
Answer: Option A
79. The data communication support should include, but is not restricted to
A. file transfer and transaction processing
B. file and database access
C. terminal support, electronic mail and voice grams.
D. All of the above
Answer: Option D
80. MAC is
A. a method of determining which device has access to the transmission medium at any
time
B. a method access control technique or multiple-access transmission media
C. a very common bit-oriented data link protocol issued to ISO.
D. network access standard for connecting stations to a circuit-switched network
E. None of the above
Answer: Option A
81. What is the name of the device that converts computer output into a form that can be
transmitted over a telephone line?
A. Teleport
B. Modem
C. Multiplexer
36
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. Concentrator
E. None of the above
Answer: Option B
82. You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets
for your company and an additional 30 for the company that will merge with you within a
month. Each network will contain approximately 600 nodes. What subnet mask should you
assign?
A. 255.255.192.0
B. 255.255.224.0
C. 255.255.240.0
D. 255,255.248.0
E. 255.255.252.0
Answer: Option E
83. Which application allows a user to access and change remote files without actual transfer?
A. TELNET
B. NFS
C. FTP
D. DNS
E. None of the above
Answer: Option B
Answer: Option B
Answer: Option A
37
Prepared by Chala T
Hardware Network Service COC Level III and IV
B. C
C. B
D. A
E. None of the above
Answer: Option B
87. Microprogramming is
A. assembly language programming
B. programming of minicomputers
C. control unit programming
D. macro programming of microcomputers
E. None of the above
Answer: Option C
88. You are working with a network that has the network ID 192.168.10.0. What subnet should you
use that supports up to 12 hosts and a maximum number of subnets?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255. 240
D. 255.255.255.248
E. 255.255.255.252
Answer: Option C
Answer: Option D
90. If communication software can be called the "traffic cop" of a micro communication system,
then what should the modem be called?
A. Park
B. Bridge
C. Interface
D. Link
E. None of the above
Answer: Option B
91. Which of the following specifies the network address and host address of the computer?
A. The IP address
38
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
92. For connecting modem, a computer must be equipped with a port that conforms to the RS-232
standard of the Electronic Industries Association of America. What do the letters 'RS' stand for?
A. Recognised standard
B. Random sequence
C. Recommended standard
D. Registered source
E. None of the above
Answer: Option C
Answer: Option D
Answer: Option A
95. Which of the following provides a storage mechanism for incoming mail but does not allow a
user to download messages selectively?
A. SMTP
B. DHCP
C. IMAP
D. POP3
Answer: Option D
96. On a class C network with a subnet mask of 192, how many subnets are available?
A. 254
B. 62
C. 30
D. 14
E. 2
39
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option E
97. Ethernet and Token-Ring are the two most commonly used network architectures in the world.
Jim has heard of the different topologies for networks and wants to choose the architecture that
will provide him with the most options. Which of the following would that be? Choose the most
correct answer.
A. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it
can be used in any topology
B. Ethernet, because it is cabled using fiber-optic cable
C. Token-Ring, because it uses a MAU
D. Ethernet, because it can be set up with most topologies and can use multiple transfer
speeds
E. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all
topologies
Answer: Option D
98. A 4 KHz noiseless channel with one sample every 125 per sec, is used to transmit digital signals.
Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is used.
A. 500 Kbps
B. 32 Kbps
C. 8 Kbps
D. 64 Kbps.
Answer: Option D
99. How can you see the address of the DHCP server from which a client received its IP address?
A. By using Advanced Properties of TCP/IP
B. By using IPCONFIG/ALL
C. By using DHCPINFO
D. By pinging DHCP
E. None of the above
Answer: Option B
Answer: Option A
1. Alex is required to provide information on how many people are using the network at any one
time. Which network will enable him to do so?
A. Server-based
B. Token-Ring
40
Prepared by Chala T
Hardware Network Service COC Level III and IV
C. Ethernet
D. Star
E. Peer-to-peer
Answer: Option A
2. Now-a-days computers all over the world can talk to each other. Which is one of the special
accessories essential for this purpose?
A. Keyboard
B. Modem
C. Scanner
D. Fax
E. None of the above
Answer: Option B
3. To make possible the efficient on-line servicing of many teleprocessing system users on large
computer systems, designers are developing
A. communication systems
B. multiprogramming systems
C. virtual storage systems
D. All of the above
E. None of the above
Answer: Option D
4. Which of the following best describes the scopes on each DHCP server, in the absence of
configuration problems with DHCP addresses, if you use multiple DHCP servers in your
environment?
A. Unique to that subnet only
B. For different subnets
C. For no more than two subnets
D. For no subnets
E. None of the above
Answer: Option B
Answer: Option C
41
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. Router
E. None of the above
Answer: Option C
7. What is the name of the computer based EMMS that provides a common forum where users
can check in at their convenience, post messages, actively exchange ideas and participate in
ongoing discussions?
A. E-mail
B. Bulletin board system (BBS)
C. Teleconferencing
D. Videoconferencing
E. None of the above
Answer: Option B
Answer: Option D
9. Devices on one network can communicate with devices on another network via a
A. file server
B. utility server
C. printer server
D. gateway
E. None of the above
Answer: Option D
10. After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the
receiver where the signal is decoded and an exact copy of the original document is made. What
is it called?
A. Telex
B. Word processor
C. Facsimile
D. Electronic mail
E. None of the above
Answer: Option C
42
Prepared by Chala T
Hardware Network Service COC Level III and IV
C. TFTP
D. FTP
E. None of the above
Answer: Option C
12. You are working with a class C network. You are required to configure it for five subnets, each of
which will support 25 nodes. What subnet should you use?
A. 255.255.255.0
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
Answer: Option B
13. A network designer wants to connect 5 routers as point-to-point simplex line. Then the total
number of lines required would be
A. 5
B. 10
C. 20
D. 32
E. None of the above
Answer: Option B
14. Which of the following medium access control technique is used for bus/tree?
A. token ring
B. token bus
C. CSMA
D. MAC
E. None of the above
Answer: Option B
15. A distributed data processing configuration in which all activities must pass through a centrally
located computer is called a:
A. ring network
B. spider network
C. hierarchical network
D. data control network
E. None of the above
Answer: Option B
43
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. Attenuation
E. None of the above
Answer: Option A
17. Which of the following network access standard is used for connecting stations to a circuit-
switched network?
A. X.3
B. X.21
C. X.25
D. X.75
E. None of the above
Answer: Option B
Answer: Option C
Answer: Option D
Answer: Option A
44
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option B
Answer: Option A
23. Which of the following allows devices on one network to communicate with devices on another
network?
A. multiplexer
B. gateway
C. t-switch
D. modern
E. None of the above
Answer: Option B
24. An error detecting code is which code is the remainder resulting from dividing the bits to be
checked by a predetermined binary number, is known as
A. Cyclic redundancy check
B. Checksum
C. Error detecting code
D. Error rate
E. None of the above
Answer: Option A
Answer: Option A
26. In OSI model, which of the following layer provides error-free delivery of data?
A. Data link
B. Network
C. transport
D. Session
E. None of the above
45
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option C
Answer: Option C
Answer: Option A
29. Which of the following data transmission media has the largest terrestrial range without the use
of repeaters or other devices?
A. Hardwiring
B. Microwave
C. Satellite
D. Laser
E. None of the above
Answer: Option C
30. What is the minimum number of wires needed to send data over a serial communication link
layer?
A. 1
B. 2
C. 4
D. 6
E. none of the above
Answer: Option B
31. The _____ layer is the layer closest to the transmission medium.
A. transport
B. network
C. data link
D. physical
E. None of the above
Answer: Option D
46
Prepared by Chala T
Hardware Network Service COC Level III and IV
32. What is the name of the device that connects two computers by means of a telephone line?
A. Tape
B. modem
C. bus
D. cable
E. None of the above
Answer: Option B
Answer: Option A
34. On a class B network, how many subnets are available with a subnet mask of 248?
A. 2
B. 6
C. 30
D. 62
E. 126
Answer: Option C
35. Ethernet networks can be cabled in a number of topologies, depending on what works best in
each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the
best answer as to why Ethernet becomes less efficient as size increases.
A. Network collisions occur
B. Repeaters cannot increase the signal strength sufficiently
C. Cable terminators do not reflect the signal properly
D. Cable terminators do not absorb the signal properly
E. "Line echo" occurs due to the impedance of the cable
Answer: Option A
36. In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables.
A. ring
B. bus
C. star
D. mesh
E. None of the above
Answer: Option D
47
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option B
Answer: Option C
Answer: Option A
Answer: Option D
Answer: Option C
48
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
43. Which of the following communications lines is best suited to interactive processing
applications?
A. narrowband channels
B. simplex lines
C. full-duplex lines
D. mixed band channels
E. None of the above
Answer: Option C
Answer: Option D
45. The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted
decimal notation as
A. 148.20.2.30
B. 164.100.9.61
C. 210.20.2.64
D. 128.10.2.30
E. None of the above
Answer: Option D
46. Which of the following items is not used in Local Area Networks (LANs)?
A. Computer
B. Modem
C. Printer
D. Cable
E. None of the above
Answer: Option B
49
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option B
48. RS-232-G
A. is an interface between two data circuit terminating equipment as examplified by a local
and remote modem
B. is an interface standard between Data terminal Equipment and Data Circuit Terminating
Equipment
C. specifies only the mechanical characteristics of an interface by providing a 25-pin
connector
D. requires only 7 pin out of 25 in order to transmit digital data over public telephone lines
E. None of the above
Answer: Option B
Answer: Option D
50. RS-449/442-A/423-A is
A. a set of physical layer standards developed by EIA and intended to replace RS-232-C.
B. a check bit appended to an array of binary digits to make the sum of the all the binary
digits
C. a code in which each expression conforms to specific rules of construction, so that if
certain errors occur in an expression the resulting expression will not conform to the
rules of construction and thus the presence of the errors is detected
D. the ratio of the number of data units in error to the total number of data units
E. None of the above
Answer: Option A
51. Which of the following digits are known as the area code of the Network User Address (NUA)?
A. 5-7
B. 1-4
C. 8-12
D. 13-14
E. None of the above
Answer: Option A
50
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. Transport layer
E. None of the above
Answer: Option D
53. A form of modulation In which the amplitude of a carrier wave is varied in accordance with
some characteristic of the modulating signal, is known as
A. Aloha
B. Angle modulation
C. Amplitude modulation
D. modem
E. None of the above
Answer: Option C
Answer: Option B
55. Which of the following summation operation is performed on the bits to check an error-
detecting code?
A. Codec
B. Coder-decoder
C. Checksum
D. Attenuation
E. None of the above
Answer: Option C
56. The standard suit of protocols used by the Internet, intranets, extranets, and some other
networks.
A. TCP/IP
B. Protocol
C. Open Systems
D. Internetwork processor
Answer: Option A
57. Networks that follow the 802.5 standard appear to be in a star topology but are actually
operating in what type of topology?
A. Linear bus
B. Modified star
C. Modified ring
51
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. Ring
E. Hybrid hub
Answer: Option D
58. A communications device that combines transmissions from several 1/ O devices into one line is
a:
A. concentrator
B. modifier
C. multiplexer
D. full-duplex line
E. None of the above
Answer: Option C
Answer: Option A
Answer: Option A
Answer: Option B
52
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option C
63. The most important part of a multiple DHCP configurations is to make sure you don't have which
of the following in the different scopes? Select the best answer.
A. Duplicate addresses
B. Duplicate pools
C. Duplicate subnets
D. Duplicate default gateways
E. None of the above
Answer: Option A
64. When a group of computers is connected together in a small area without the help of telephone
lines, it is called
A. Remote communication network (RCN)
B. Local area network(LAN)
C. Wide area network (WAN)
D. Value added network (VAN)
E. None of the above
Answer: Option B
65. The 802.5 standard implements a way for preventing collisions on the network. How are
collisions prevented when using this standard?
A. CSMA/CD
B. Token passing
C. Collision detection
D. Time sharing
E. Switched repeaters
Answer: Option B
66. A communication network which is used by large organizations over regional, national or global
area is called
A. LAN
B. WAN
C. MAN
D. Intranet
E. None of the above
Answer: Option B
67. Information systems with common hardware, software, and network standards that provide
easy access for end users and their networked computer systems. Select the best fit for answer:
A. TCP/IP
B. Protocol
C. Open Systems
D. Internetwork processor
53
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option C
68. Which of the following TCP/IP protocol is used for file transfer with minimal capability and
minimal overhead?
A. RARP
B. FTP
C. TFTP
D. TELNET
E. None of the above
Answer: Option C
Answer: Option D
70. Sending a file from your personal computer's primary memory or disk to another computer is
called
A. uploading
B. downloading
C. logging on
D. hang on
Answer: Option A
71. Business meeting and conferences can be held by linking distantly located people through a
computer network. Not only the participants exchange information but are able to see each
other. What is it called?
A. Telemeeting
B. Telemailing
C. Teleconferencing
D. Teletalking
E. None of the above
Answer: Option C
72. What frequency range is used for microwave communications, satellite and radar?
A. Low Frequency : 30 kHz to 300 kHz
B. Medium Frequency : 300 kHz to 3 MHz
C. Super High Frequency : 3000 MHz to 30000 MHz
D. Extremely High Frequency :30,000 MHz
E. None of the above
Answer: Option D
54
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option D
74. If the ASCII character H is sent and the character I is received, what type of error is this?
A. single-bit
B. multiple-bit
C. burst
D. recoverable
Answer: Option A
75. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. If
Delta modulation is selected, then how many bits per second are actually sent?
A. 32 kbps
B. 8 kbps
C. 128 kbps
D. 64 kbps.
Answer: Option B
Answer: Option D
77. The interactive transmission of data within a time sharing system may be best suited to
A. simplex lines
B. half-duplex lines
C. full-duplex lines
D. biflex-line
E. None of the above
Answer: Option B
78. What OSI layer handles logical address to logical name resolution?
A. Transport
B. Physical
C. Presentation
55
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. Data Link
Answer: Option A
79. The MAC (Media Access Control) address of the network card is used in both Ethernet and
Token-Ring networks and is essential for communication. What does MAC provide?
A. A logical address that identifies the workstation
B. A physical address that is randomly assigned each time the computer is started
C. A physical address that is assigned by the manufacturer
D. The logical domain address for the workstation
E. An alias for the compute
Answer C
80. Which of the following is an example of a client-server model?
A. TELNET
B. FTP
C. DNS
D. All of the above
E. None of the above
Answer: Option D
Answer: Option A
Answer: Option B
56
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option D
84. A global network of millions of business, government, educational, and research networks;
computer systems; database; and end users. Select the best fit for answer:
A. Internet works
B. The Internet
C. Internet revolution
D. Internet technologies
E. None of the above
Answer: Option B
85. Alice is setting up a small network in her home so that she can study for her MCSE exams. She
doesn't have a lot of money to spend on hardware, so she wants to use a network topology that
requires the least amount of hardware possible. Which topology should she select?
A. Star
B. Right
C. Token-Ring
D. Ethernet
E. Bus
Answer: Option E
Answer: Option C
87. Which of the following technique is used for allocating capacity on a satellite channel using
fixed-assignment FDM?
A. Amplitude modulation
B. Frequency-division multiple access
C. Frequency modulation
D. Frequency-shift keying
E. None of the above
Answer: Option B
Answer: Option B
57
Prepared by Chala T
Hardware Network Service COC Level III and IV
89. Which of the following allows a simple email service and is responsible for moving messages
from one mail server to another?
A. IMAP
B. DHCP
C. SMTP
D. FTP
E. POP3
Answer: Option C
Answer: Option A
Answer: Option D
Answer: Option D
93. Many large organizations with their offices in different countries of the world connect their
computers through telecommunication satellites and telephone lines. Such a communication
network is called
A. LAN
B. WAN
C. ECONET
D. EITHERNET
E. None of the above
Answer: Option B
58
Prepared by Chala T
Hardware Network Service COC Level III and IV
94. A network which is used for sharing data, software and hardware among several users owning
microcomputers is called
A. WAN
B. MAN
C. LAN
D. VAN
E. None of the above
Answer: Option C
Answer: Option A
96. A proposed network infrastructure of interconnected local, regional, and global networks that
would support universal interactive multimedia communications. Select the best fit for answer:
A. Internetworked enterprise
B. Information super highway
C. Business applications of telecommunications
D. Client/Server networks
Answer: Option B
Answer: Option A
98. You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In
the next year, you will be adding an additional 27 branch offices to your company. For simplified
management, you want to keep the most possible hosts per subnet. Which subnet mask should
you management, you want to keep the most possible hosts per subnet. Which subnet mask
should you use?
A. 255.224.0.0
B. 255.240.0.0
C. 255.248.0.0
D. 255.252.0.0
E. 255.254.0.0
59
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option E
99. A group of 2 m - 1 routers are interconnected in a centralized binary tree, with router at each
tree node. Router I communicate with router J by sending a message to the root of the tree. The
root then sends the message back down to J. Then find the mean router-router path length.
A. 2 (m - 2)
B. 2 (2 m - 1)
C. m - 1
D. (2m - l)/mJ
Answer: Option A
100. Most networks are connected to other local area or wide area networks. Select the best
fit for answer:
A. Internet works
B. The Internet
C. Internet revolution
D. Internet technologies
Answer: Option A
1. You are working with a network that is 172.16.0.0 and would like to support 600 hosts per
subnet. What subnet mask should you use?
A. 255.255.192.0
B. 255.255.224.0
C. 255.255.240.0
D. 255.255.248.0
E. 255.255.252.0
Answer: Option E
2. A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the
maximum possible transmission rate?
A. 1.5 Mbaud/sec
B. 6 Mband/sec
C. 12 Mbaud/sec
D. 24 Mbaud/sec
E. None of the above
Answer: Option C
3. Which of the following digits are known as the sub-address digits (for use by the user) of the
Network User Address (NUA)?
A. 5-7
B. 1-4
C. 8-12
D. 13-14
E. None of the above
60
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option D
Answer: Option C
Answer: Option D
Answer: Option B
7. You have purchased a MAU (Multistation Access Unit) from your computer supplier and now
must decide what type of network card you should install in the workstations. Which of the
following would be the most appropriate?
A. Fast SCSI Wide
B. Token-Ring
C. ArcServe
D. Ethernet
E. None of the above
Answer: Option B
61
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
Answer: Option A
Answer: Option A
11. The systematic access of small computers in a distributed data processing system is referred to
as:
A. dialed service
B. multiplexing
C. polling
D. conversational mode
E. None of the above
Answer: Option C
12. The process of converting analog signals into digital signals so they can be processed by a
receiving computer is referred to as:
A. modulation
B. demodulation
C. synchronizing
D. synchronizing
E. None of the above
Answer: Option B
Answer: Option B
62
Prepared by Chala T
Hardware Network Service COC Level III and IV
14. How many OSI layers are covered in the X.25 standard?
A. two
B. three
C. seven
D. six
E. None of the above
Answer: Option B
Answer: Option E
Answer: Option C
17. The most flexibility in how devices are wired together is provided by
A. bus networks
B. ring networks
C. star networks
D. T-switched networks
E. None of the above
Answer: Option A
Answer: Option A
19. When you connect to an online information service, you are asked to provide some kind of
identification such as your name, an account number and a password. What is the name given
to this brief dialogue between you and the information system?
63
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. Security procedure
B. Safeguard procedure
C. Identification procedure
D. Log-on procedure
E. None of the above
Answer: Option D
20. Bus is
A. one or more conductors that some as a common connection for a related group of
devices
B. a continuous frequency capable of being modulated or impressed with a second signal
C. the condition when two or more stations attempt to use the same channel at the same
time
D. a collection of interconnected functional units that provides a data communications
service among stations attached to the network
E. None of the above
Answer: Option A
21. Which of the following medium is used for broadband local networks?
A. Coaxial cable
B. optic fiber
C. CATV
D. UTP
E. None of the above
Answer: Option C
Answer: Option D
Answer: Option D
24. The communication mode that supports data in both directions at the same time is
A. simplex
B. half-duplex
64
Prepared by Chala T
Hardware Network Service COC Level III and IV
C. full-duplex
D. multiplex
E. None of the above
Answer: Option C
25. Which of the following program is used to copy files to or from another UNIX timesharing
system over a single link?
A. VMTP
B. TFTP
C. UUCP
D. UART
E. None of the above
Answer: Option C
Answer: Option A
Answer: Option C
28. Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels.
Find the line signaling speed (i.e., modulation rate)
A. 2400 bands
B. 1200 bands
C. 4800 bands
D. 9600 bands.
Answer: Option A
29. You are in the process of analyzing a problem that requires you to collect and store TCP/IP
Packets. Which of the following utilities is best suited for this purpose?
A. NBTSTAT
B. Performance Monitor
C. NETSTAT
D. Network Monitor
65
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option D
Answer: Option A
31. What is the name of the network topology in which there are bi-directional links between each
possible node?
A. Ring
B. Star
C. Tree
D. Mesh
E. None of the above
Answer: Option D
Answer: Option A
Answer: Option B
Answer: Option D
66
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. television
B. communication
C. computer technology
D. All of the above
E. None of the above
Answer: Option D
36. Which of the following frequency ranges is used for AM radio transmission?
A. Very Low Frequency : 3 kHz to 30 kHz
B. Medium Frequency : 300 kHz to 3 MHz
C. High Frequency : 3 MHz to 30 MHz
D. Very High Frequency : 30 MHz to 300 MHz
E. None of the above
Answer: Option B
37. Baseband is
A. transmission of signals without modulation
B. a signal all of whose energy is contained within a finite frequency range
C. the simultaneous transmission of data to a number of stations
D. All of the above
E. None of the above
Answer: Option A
38. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals.
Differential PCM with 4 bit relative signal value is used. Then how many bits per second are
actually sent?
A. 32 Kbps
B. 64 Kbps
C. 8 Kbps
D. 128 Kbps.
Answer: Option A
39. X.21 is
A. a method of determining which device has access to the transmission medium at any
time
B. a method access control technique for multiple-access transmission media
C. a very common bit-oriented data link protocol issued by ISO
D. network access standard for connecting stations to a circuit-switched network
E. None of the above
Answer: Option D
40. What is the minimum number of wires required for sending data over a serial communications
links?
A. 2
67
Prepared by Chala T
Hardware Network Service COC Level III and IV
B. 1
C. 4
D. 3
E. None of the above
Answer: Option A
Answer: Option C
42. Which command-line tool is included with every Microsoft TCP/IP client?
A. DHCP
B. WINS
C. PING
D. WINIPCFG
E. None of the above
Answer: Option C
43. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.
A. even
B. odd
C. indeterminate
D. 42
Answer: Option B
Answer: Option A
Answer: Option B
68
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. telephone lines
B. microwaves
C. satellites
D. All of the above
E. None of the above
Answer: Option D
Answer: Option B
Answer: Option C
Answer: Option C
Answer: Option C
51. A computer that handles resource sharing and network management in a local area network.
Select the best fit for answer:
A. Network Server
B. Virtual Private Network
C. Network operating system
69
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. OSI
Answer: Option A
52. Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted.
As with the length of segments and the number of segments, a limit exists as to how many
repeaters can be used between any two nodes. What is the maximum number of repeaters that
can be used?
A. Five
B. Two
C. Four
D. Six
E. Three
Answer: Option C
53. How much power (roughly) a light-emitting diode can couple into an optical fiber?
A. 100 microwatts
B. 440 microwatts
C. 100 picowatts
D. 10 milliwatts
E. None of the above
Answer: Option A
54. A modem that is attached to the telephone system by jamming the phone's handset into two
flexible receptacles in the coupler?
A. gateway
B. bridge
C. acoustic coupler
D. time-division multiplexer
E. None of the above
Answer: Option C
Answer: Option D
70
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option D
Answer: Option D
58. What can cause a problem with communication with a client by name but not by IP address?
A. The IP address
B. Static files such as an LMHOSTS file or a DNS database
C. Subnet mask
D. The default gateway
E. None of the above
Answer: Option B
Answer: Option A
60. What is the term used to describe addresses available on a DHCP server?
A. Pools
B. Scopes
C. Ranges
D. Notes
E. None of the above
Answer: Option B
Answer: Option A
71
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. 127.0.01
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
E. None of the above
Answer: Option C
63. Which of the following files is used for NetBIOS name resolution?
A. HOSTS
B. LMHOSTS
C. ARP
D. FQDN
E. None of the above
Answer: Option B
Answer: Option C
65. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A. 1
B. 2
C. 3
D. multiple
E. None of the above
Answer: Option A
Answer: Option B
67. A protocol is a set of rules governing a time sequence of events that must take place
A. between peers
B. between modems
C. between an interface
D. across an interface
E. None of the above
72
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
68. The coming together of three technologies i.e. microelectronics, computing and
communications has ushered in
A. information explosion
B. information technology
C. business revolution
D. educational upgradation
E. None of the above
Answer: Option B
Answer: Option D
70. Sales persons and other employees of the company who spend much of their time away from
their offices but keep in touch with their company's microcomputers or main frame computers
over telephone lines are called
A. field workers
B. telecommuters
C. teleprocessors
D. company directors
E. None of the above
Answer: Option B
Answer: Option C
Answer: Option C
73
Prepared by Chala T
Hardware Network Service COC Level III and IV
73. Brad is in charge of a small network and wants to make it simple but secure. The users want to
have full control over their data and still be able to share data with the rest of the office. The
networking knowledge of the office staff is excellent. Which network(s) would be the best to set
up?
A. Peer-to-peer
B. Master domain
C. Server-based
D. Ethernet
E. Share-level
Answer: Option A
Answer: Option A
Answer: Option C
76. You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible
number of host IDs per subnet. Which subnet mask should you assign?
A. 255.255.224.0
B. 255.255.240.0
C. 255.255.248.0
D. 255.255.252.0
E. 255.255.255.255
Answer: Option B
Answer: Option B
74
Prepared by Chala T
Hardware Network Service COC Level III and IV
78. Which multiplexing technique shifts each signal to a different carrier frequency?
A. FDM
B. synchronous TDM
C. asynchronous TDM
D. All of the above
Answer: Option A
Answer: Option D
80. The loss in signal power as light travels down the fiber is called
A. attenuation
B. propagation
C. scattering
D. interruption
E. None of the above
Answer: Option A
Answer: Option D
82. Which layer of international standard organization's OSI model is responsible for creating and
recognizing frame boundaries?
A. physical layer
B. data link layer
C. transport layer
D. network layer
E. None of the above
Answer: Option B
83. Which of the following might be used by a company to satisfy its growing communications
needs?
A. front-end processor
B. multiplexer
C. controller
75
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. concentrator
E. All of the above
Answer: Option E
Answer: Option B
85. The Token-Ring architecture was developed for a more efficient way to determine who should
be transmitting at any one time. With Ethernet, collisions may take place, causing the
transmitting computers to have to retransmit their data. The use of token guarantees that only
one computer can transmit at a time. What happens as the network increases in size? Choose
the best answer
A. An additional token is added for every 1,000 nodes
B. The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater
then 500
C. The network becomes less efficient
D. After the number of nodes exceeds 550, the Multistation Access Unit must be replaced
by the more powerful Hyperstation Unified Bandwidth device
E. The network becomes more efficient
Answer: Option E
Answer: Option B
87. When a host knows its physical address but not its IP address, it can use _____.
A. RARP
B. ARP
C. IGMP
D. ICMP
E. None of the above
Answer: Option A
76
Prepared by Chala T
Hardware Network Service COC Level III and IV
88. What is the name given to the exchange of control signals which is necessary for establishing a
connection between a modem and a computer at one end of a line and another modem and
computer at the other end?
A. Handshaking
B. Modem options
C. Protocol
D. Duplexing
E. None of the above
Answer: Option A
89. A communications medium that uses pulses of laser light in glass fibers. Select the best fit for
answer:
A. Fiber optic cables
B. Cellular phone systems
C. Telecommunications processors
D. Telecommunications software
Answer: Option A
90. After you have verified that TCP/IP is installed correctly, what is the next step in verifying the
TCP/IP configuration?
A. Ping the broadcast address
B. Ping the Microsoft Web site
C. Ping a distant router.
D. Ping the address of the local host
E. None of the above
Answer: Option D
91. Which utility is useful for troubleshooting NetBIOS name resolution problems?
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
E. None of the above
Answer: Option A
Answer: Option C
93. In OSI model, which of the following layer transforms information from machine format into
that understandable by user
77
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. application
B. presentation
C. session
D. physical
E. None of the above
Answer: Option B
Answer: Option D
Answer: Option A
Answer: Option D
97. A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell how
long will it take?
A. 2 seconds
B. 20 seconds
C. 120 seconds
D. 12 seconds
E. None of the above
Answer: Option B
98. Telecommunications networks come in a wide range of speed and capacity capabilities. Select
the best fit for answer:
A. Bandwidth alternatives
B. Switching alternating
78
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
Answer: Option D
Answer: Option C
1. What frequency range is used for TV transmission and low power microwave applications?
A. Very Low Frequency : 3 kHz to 30 kHz
B. Medium Frequency : 300 kHz to 3 MHz
C. Ultra High Frequency : 300 MHz to 3000 MHz
D. Super High Frequency : 3000 MHz to 30000 MHz
E. None of the above
Answer: Option C
Answer: Option A
3. We can receive data either through our television aerial or down our telephone lines and display
this data on our television screen. What is the general name given to this process?
A. Viewdata
B. Teletext
79
Prepared by Chala T
Hardware Network Service COC Level III and IV
C. Telesoftware
D. Videotex
E. None of the above
Answer: Option D
Answer: Option B
Answer: Option A
Answer: Option C
7. You need to determine whether IP information has been assigned to your Windows NT. Which
utility should you use?
A. NBTSTAT
B. NETSTAT
C. IPCONFIG
D. WINIPCFG
E. PING
Answer: Option C
8. Eight stations are competing for the use of the shared channel using the modified Adaptive free
walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once, how many
bit slots are needed to resolve the contention?
A. 1 slots
B. 5 slots
C. 10 slots
80
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. 14 slots
Answer: Option B
9. When two computers communicate with each other, they send information back and forth. If
they are separated by a reasonable distance, they can send and receive the information through
a direct cable connection which is called a null-modem connection. Presently what is the
maximum distance in metres permitted in this null-modem connection?
A. 80
B. 100
C. 30
D. 150
E. None of the above
Answer: Option C
10. Modulation in which the two binary values are represented by two different amplitudes of the
carrier frequency is known as
A. Amplitude-shift keying
B. Amplitude
C. Amplitude modulation
D. Aloha
E. None of the above
Answer: Option A
11. You have been contracted to install a windows NT network in an office that is located in a strip
mall. The office is located next to the power plant of the building, so a UPS (uninterruptible
power supply) has already been installed. What type of cable should you use for the network
cabling? Choose the best answer.
A. TI
B. UTP
C. Fiber-optic
D. PSTN
E. STP
Answer: Option E
12. Communication circuits that transmit data in both directions but not at the same time are
operating in
A. a simplex mode
B. a half-duplex mode
C. a full-duplex mode
D. an asynchronous mode
E. None of the above
Answer: Option B
81
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. equalizer
B. modulator
C. demodulator
D. terminal
E. None of the above
Answer: Option A
14. If the client receives an address from a DHCP server, what is the only information available in
the Network Properties dialog box?
A. The IP address
B. The subnet address
C. That the client is receiving its address from DHCP
D. The default gateway
E. None of the above
Answer: Option C
15. An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is
A. X.75
B. X.25
C. X.400
D. X.21
E. None of the above
Answer: Option A
16. Which of the following TCP/IP protocol is used for transferring files from one machine to
another?
A. RARP
B. ARP
C. TCP
D. FTP
E. None of the above
Answer: Option D
Answer: Option D
18. Which transmission mode is used for data communication along telephone lines?
A. Parallel
B. Serial
C. Synchronous
82
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. Asynchronous
E. None of the above
Answer: Option B
Answer: Option B
20. With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you
use to maximize the number of available hosts?
A. 192
B. 224
C. 240
D. 248
E. 252
Answer: Option C
21. Which of the following communications modes support two-way traffic but in only one direction
of a time?
A. simplex
B. half-duplex
C. three-quarters duplex
D. full-of the above
E. None of the above
Answer: Option B
22. Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address
from a server?
A. RDP
B. RARP
C. RIP
D. X.25
E. None of the above
Answer: Option B
23. In OSI network architecture, the dialogue control and token management are responsibilities of
A. session layer
B. network layer
C. transport layer
D. data link layer
83
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option A
24. Which of the following transmission systems provides the highest data rate to an individual
device
A. Computer bus
B. Telephone lines
C. Voice band modem
D. leased lines
E. None of the above
Answer: Option A
25. Which of the following connectivity devices is used to extend a network on a purely mechanical
basis?
A. Gateway
B. Switch
C. Router
D. Active hub
Answer: Option D
26. The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI
model. A number of standards were agreed upon during that time. Which of the following is the
standard for Ethernet?
A. 802.2
B. 802.3
C. 802.4
D. 802.5
E. 802.6
Answer: Option B
27. Which of the following digits are known as the terminal number of the Network User Address
(NUA)?
A. 5-7
B. 1-4
C. 8-12
D. 13-14
E. None of the above
Answer: Option C
28. Which of the following device is used with an X.25 network to provide service to asynchronous
terminals
A. repeater
B. bridges
C. gateway
84
Prepared by Chala T
Hardware Network Service COC Level III and IV
D. Packet assembler/disassemble
E. None of the above
Answer: Option D
29. A medium access control technique for multiple access transmission media is
A. Aloha
B. Amplitude
C. Angle modulation
D. Attenuation
E. None of the above
Answer: Option A
Answer: Option A
31. Which of the following TCP/IP protocol is used for remote terminal connection service?
A. TELNET
B. FTP
C. RARP
D. UDP
E. None of the above
Answer: Option A
32. Networks where end user workstations are tied to LAN servers to share resources and
application processing.
A. Internetworked enterprise
B. Information super highway
C. Business applications of telecommunications
D. Client/Server networks
Answer: Option D
Answer: Option A
85
Prepared by Chala T
Hardware Network Service COC Level III and IV
Answer: Option D
35. A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who
provides the appropriate instruction to the modem for this purpose?
A. Communications software
B. Error detecting protocols
C. Link access procedure (LAP)
D. Telecommunications
E. None of the above
Answer: Option A
36. IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____
sublayer.
A. HDLC, PDU
B. PDU, HDLC
C. MAC, LLC
D. LLC, MAC
E. None of the above
Answer: Option D
37. Two computers that communicate with each other use a simple parity check to detect errors for
ASCII transmissions. Which of the following events will always lead to an undeleted error?
A. one bit or any odd number of bits inverted in a block of data during transmission
B. two bits or any even number of bits inverted in a block during transmission
C. one bit or any odd number of bits inverted in a byte during transmission
D. two bits or any even number of bits inverted in a byte during transmission
E. None of the above
Answer: Option D
Answer: Option C
86
Prepared by Chala T
Hardware Network Service COC Level III and IV
A. detector
B. modulator
C. stations
D. transponders
E. None of the above
Answer: Option D
87
Prepared by Chala T