Data-Com
Data-Com
1. On a network, the extent of users capacity to use and modify directories, files, and programs located on other computers
in the network.
A. Access privileges (Correct Answer)
B. Access hole
C. Access aperture
D. Access capacity
2.Techniques for reducing the amount of DATA needed to convey some amount of INFORMATION.
A. Deduction
B. Compression (Correct Answer)
C. Elimination
D. Reduction
6. Which of the following is a search service in a Gopher that scans a database of Gopher directory titles and resources and
generates a new Gopher menu containing the result of the search?
A. Veronica (Correct Answer)
B. Eliza
C. Rebecca
D. Eudora
8. The TCP (Transmission Control Protocol) _____ tells you how many bit words are contained in the TCP header.
A. header length (Correct Answer)
B. header number
C. sequence number
D. acknowledgment number
9. In a serial communication, a bit is inserted into the data stream to inform the receiving computer that a byte is to follow.
A. initial bit
B. start bit (Correct Answer)
C. serial bit
D. delay bit
10. In an Internet electronic mail address, to the right side of the @ sign is the ___ of the computer that houses the
mailbox.
A. hosts name
B. domain name (Correct Answer)
C. login name
D. servers name
11. You want to connect a small Token Ring network with an Ethernet network, both of which use NetBEUI. You want to
implement filtering to control network traffic. Which device should you use to accomplish this?
A. A repeater
B. A bridge (Correct Answer)
C. A gateway
D. A router
13. Which layer functions is liaison between user support layer and network support layers?
A. network
B. physical
C. transport (Correct Answer)
D. session
14. A method of reducing cost of modems by having the PC's CPU handle the correction error and data compression,
rather than a modem's own processor.
A. Resource Reservation Protocol Interface
B. Rockwell Protocol Interface (Correct Answer)
C. Reservation Protocol Interface
D. Routing Table Maintenance Protocol Interface
15. The protocol used in TCP/IP networks for transferring electronic mail messages between the end user computers and
mail servers.
A. Simple Mail Transfer Protocol (Correct Answer)
B. Simple Mail Management Protocol
C. Sub-network Mail Access Protocol
D. Simple Mail Routing Protocol
16. A proprietary, router-to-router intradomain protocol that was developed by CISCO systems for routing TCP/IP and
OSI-CNLP
A. Interior gateway protocol
B. Internet Routing Protocol
C. Highway Routing Protocol
D. Interior gateway Routing Protocol (Correct Answer)
17. A network system in which the communication path between sender and receiver is maintained on a continuous basis
for the duration of the call.
A. packet switching
B. circuit switching (Correct Answer)
C. multiplexing
D. Hand-off
19. A term used in cellular networks for coverage that allows user to make and receive call indoors.
A. Full coverage
B. Indoor coverage
C. Full/Full coverage
D. In-building coverage (Correct Answer)
20. A very high speed (up to more than 1 G bit/s), low latency, full duplex data communication scheme that is optimized
to carry large block of data for both channel and LAN-type connections.
A. High Performance Parallel Interface
B. Fiber channel (Correct Answer)
C. Escon
D. TCP/IP
21. An interface between routers and CSU/DSUs that enables existing routers to support ATM-with a software upgrade
(DXI).
A. Data Electronic Interface
B. Data Encoding Interface
C. Dual Exchange Interface
D. Data Exchange Interface Correct Answer)
22. A local area network without a central file server in which all the computers in the network have access to the public
files located on all other workstations.
A. Door-to-peer network (Correct Answer)
B. Value added network
C. Bus network
D. Ring network
23. A ______ interconnects LAN having identical protocols at the physical and data link layers
A. router
B. bridge (Correct Answer)
C. gateway
D. all of these
24. The process of changing a digital message so that it can be read only by intended parties, or to verify the identity of the
sender, or to be assured that the sender really did send the message.
A. Non-repudiation
B. Encryption (Correct Answer)
C. Encyphering
D. Authentication
26. Which type of network media-access do IBM LANs with Multistation Access Units employ?
A. Token passing (Correct Answer)
B. CSMA/CA
C. CSMA/CD
D. Beaconing
27. The capacity to permit users to share access of all kinds, including servers and peripherals such as printers or plotters.
A. Group sharing
B. Device sharing (Correct Answer)
C. Shareware
D. Access sharing
28. A full duplex (on four-wire leased lines) or half-duplex (on a two-wire dial-up lines) synchronous 4800- and 2400-
bits/s modem modulation standard
A. V.25
B. V.29 (Correct Answer)
C. V.10
D. V.30
30. A modem modulation standard (still under development) providing full duplex, 32000-(or maybe 33600-)bits/s data
transfer over a standard one-pair dial-up telephone line.
A. V.40
B. V.34
C. V.34 bis (Correct Answer)
D. V.25
31. Which of the following is not true as an advantage of a large-scale server based network?
A. Inexpensive to implement (Correct Answer)
B. Centralized backups of network data
C. Ease of administration
D. Increased performance
32. A technically straightforward form of conference call in which many callers can converse simultaneously and are
charge premium prices fordoing so.
A. surfing
B. chat line (Correct Answer)
C. satphone
D. internet
33. The practice of using alternative network to that of the normal OPERATOR to gain access to the network.
A. Selection
B. Router
C. Polling
D. Bypass (Correct Answer)
34. On the Internet electronic mail address, the part to the left of the (@) specifies the name of the person's ___.
A. mail package
B. mailing list
C. mailbox name (Correct Answer)
D. mail server
35. A local area network that transmits data at 10 M bit/s over copper cabling.
A. 10 BASE-E
B. 10 BASE-G
C. 10 BASE-T (Correct Answer)
D. 10 BASE-FX
36. Which of the following is the most likely culprit when a computer's operating system is unable to detect a network
card?
A. Wrong IRQ is set on the IDE controller card
B. Wrong IRQ is set on the network card (Correct Answer)
C. Wrong frame type is set on the network card
D. Wrong protocol is bound to the network adapter
37. Which layer of the OSI Reference Model translates data formats?
A. Application
B. Network
C. Data Link
D. Presentation (Correct Answer)
40. A device (or software on a router) that links an organization internal TCP/IP network to an internet and restricts the
type of traffic that it will pass to provide security.
A. Firewall (Correct Answer)
B. Gopher
C. Router
D. Web Browser
41. The computer that responds to request for services or resources from network clients
A. User
B. Controller
C. Client
D. Server (Correct Answer)
42. In a local area network, it is a garbled transmission that results when two or more workstation transmit to the same
network cable at exactly the same time.
A. handshake
B. fusion
C. interlink
D. collision (Correct Answer)
43. Which of the following is a TCP/IP suite connectionless-mode layer of transport protocol?
A. UDP (Correct Answer)
B. IP
C. TCP
D. SNMP
44. The ATM application class that requires timing relationship, a variable bit rate, and a connection-oriented type of
connection is
A. Class B (Correct Answer)
B. Class C
C. Class D
D. Class A
45. Which of these hardware devices can be used to boost broadband signal strength across a long cable?
A. Multiplexers
B. Repeaters
C. Amplifiers (Correct Answer)
D. Time domain reflectometers
46. A corporate network using facilities in the PSTN to replace the older private network based on a leased line.
A. Network Information Center
B. Private Branch Exchange
C. Interexchange Carrier
D. Virtual Private Network (Correct Answer)
47. Which of the following networks performs both a routing and bridging functions?
A. Gateway
B. Hub
C. Brouter (Correct Answer)
D. Router
48. A privately selected string of letters, numbers and other characters used to identify a particular user and to control
access to protected resources.
A. Password (Correct Answer)
B. Code
C. Security
D. Screen
49. A term used to refer to instances when a service or network element is unavailable owing to a fault.
A. Outage (Correct Answer)
B. Off-air
C. Downtime
D. Fault
50. A router to router protocol serving as a replacement for IP's exterior gateway protocol that provides policy base routing