1 Which of the following is a public IP address?
192.168.200.14
2 Which of the following refers to a device that is logically addressed on an IP network?
Host
3 Which of the following are Network Devices?
HUB
Bridge
Router
Switch
4 Which physical network topology is the LEAST fault tolerant? (Choose all that apply)
The ring topology
The bus topology
5 A client on a Windows 2000 network cannot access resources on a Windows 2000 server because the DHCP server is down. The
client obtained an IP address. What IP address is the Client using?
169.254.X.X with a subnet mask of 255.255.0.0
6 There are several Broadcast storms in the network which is affecting the performance of it. Which devices would you
implement to reduce the traffic in the network ?
Switch
7 For which IP class range is 255.0.0.0 the default subnet mask?
Class A
8 What are the different tools you can use to troubleshoot -" No Dial Tone " issues when you are using a Dialup Modem?
Hyper Terminal
System Information
Device Manager
Query Modem
9 Which of the following is a valid Public IP address for an internet host?
56.144.226.123
172.192.4.254
239.168.11.21
12.24.12.0
10 Which of the following is the protocol used for transferring Web pages?
HTTP
11 Which of the following IP addresses have a default subnet mask of 255.255.0.0?.Select all that apply.
129.0.0.1
12 Which of the following can be carried out if the DNS Server is not available when you are trying to connect to a website?
Type the IP Address of the Server to contact the Website
13 You're talking with a few of the programmers in your department about an application they are working on. They tell you it is designed to use a connection oriented protocol to communicate over the network. Which protocol in the TCP/IP protocol suite provides connection-oriented communications?
Transmission Control Protocol
14 There are two computers with IP Addresses 192.168.0.2 and 192.168.0.3 . But they still do not communicate with each other. What would you check?
Check for a Firewall blocking access
Check for the subnet mask in both systems.
15 You work as a network technician at New.com. The New.com network user reports that when he pings the computers loopback address he receives no response. The New.com user wants to know what could cause this problem. What would your reply be?
The TCP/IP protocol is not functioning
16 When you map a drive over a network, the mapped drive acts as though it is another drive that is physically in your system.
True
17 Where can one find the option to Block Popups in IE 6?
Right click Internet Explorer icon -> Properties -> Privacy tab
Section : Threats
18 What does Virus stand for?
Vital Information Resource Under Siege
Section : Threats
19 What is TRUE for a WORM?
WORMS can self-replicate
It is a malicious program which enters a computer by travelling through security & network loopholes
Section : Threats
20 __________ is the term for when criminal hackers redirect Internet traffic from one website to a different. Identical-looking site in order to trick you into entering your username and password into the database on their fakesite.
Pharming
Section : Networking
21 Which of the following are Network Devices?
Router
Switch
HUB
Bridge
Section : Networking
22 Which of the following is a valid Public IP address for an Internet host?
56.144.226.123
Section : Networking
23 Wireless Zero Configuration is included from which Windows Operating system?
XP
Section : Networking
24 Which one of the following is required to connect an 11 Mbps wireless network that uses the 2.4 GHz frequency band based on the Wi-Fi certification standard?
802.11 b
Section : Threats
25 Which of the following would you use to access win.ini and system.ini in a notepad?
sysedit
Section : Threats
26 Many pieces of Adware can be uninstalled via Add/remove program.
False
Section : Threats
27 Why are Trojans hard to detect?
Because Anti Viruses cannot detect Trojans
Section : Threats
28 My Yahoo messenger application is blocked from communicating . Where do I go to enable the application?
Start--> ControlPanel--> Windows Firewall --> Exceptions
Section : Threats
29 __________ is the term for when criminal hackers redirect Internet traffic from one website to a different. Identical-looking site in order to trick you into entering your username and password into the database on their fakesite.
Pharming
Section : Threats
30 Where can one find the option to Block Popups in IE 6?
Right click Internet Explorer icon -> Properties -> Privacy tab
Section : Threats
31 What is TRUE for a WORM?
WORMS can self-replicate
It is a malicious program which enters a computer by travelling through security & network loopholes
Section : Networking
32 A system with IP Address 10.0.0.1 is trying to connect to a system with IP Address 192.168.0.1. In which scenarios would they connect to each other?
None of the mentioned answers
By deploying a Switch
By deploying a Bridge
By deploying a Hub
Section : Networking
33 You're talking with a few of the programmers in your department about an application they are working on. They tell you it is designed to use a connection oriented protocol to communicate over the network. Which protocol in the TCP/IP protocol suite provides connection-oriented communications?
Transmission Control Protocol
Section : Networking
34 There are two computers with IP Addresses 192.168.0.2 and 192.168.0.3 . But they still do not communicate with each other. What would you check?
Check for the Default Gateway
Check for a Firewall blocking access
Section : Networking
35 You work as a network technician at New.com. The New.com network user reports that when he pings the computers loopback address he receives no response. The New.com user wants to know what could cause this problem. What would your reply be?
The TCP/IP protocol is not functioning
Section : Networking
36 Which of the following can be carried out if the DNS Server is not available when you are trying to connect to a website?
Type the IP Address of the Server to contact the Website
Section : Networking
37 Wireless Zero Configuration is included from which Windows Operating system?
XP
Section : Networking
38 Which of the following statements is TRUE regarding the command line utility which should be run to check for any open Simple Mail Transfer Protocol (SMTP) sockets if you suspect a virus exists on the computer and e-mail no longer functions?
Wrong You should run the nslookup command line utility.
You should run the mode command line utility.
You should run the ipconfig command line utility.
You should run the netstat command line utility.
Section : Networking
39 You have a DSL Connection at home. Suddenly there is no Internet service on your PC. What would you do as a first few troubleshooting steps to connect to the Internet?
Wrong
Reset the Modem
Right Perform Ipconfig /release and then Ipconfig /renew
Section : Networking
40 Which of the following are points of failure for a DSL connection?
IP settings
DSL modem
NIC
Section : Networking
41 _____ is a logical address, used to identify computers in a network.
Subnet Mask
Default Gateway
IP address
Section : Threats
42 Which of the following best describes Rootkits?
A rootkit is a collection of tools (programs) that enable only remote desktop level access to a computer or computer network.
Section : Threats
43 The following are characteristics of AV(Anti-Virus) software EXCEPT that it will:
Delete an Infected File
Update a Definition automatically
Quarantine
Section : Threats
44 Which of the following are symptoms of Virus?
You cannot start Windows Task Manager.
Strange dialog boxes or message boxes appear onscreen
None of the mentioned answers
An antivirus program is disabled for no reason and it cannot be restarted.
Section : Threats
45 What is a adware?
Adware is a type of program that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.
Wrong Adware is neither a Hardware not Software that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.
None of the mentioned answers
Adware is a type of Hardware that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.
Section : Threats
46 What are the types of Firewall?
Software
Hardware
47 Section : Threats
Which of the following are manual threat removal?
Program Removal
Wrong Enable Firewall
Right File removal
48 Which of the following is the path for startup registry in win XP?
HKEY_CURRENT_USER\SYSTEM\Microsoft\Windows NT\CurrentVersion\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
This is sometimes referred to as "the Blue Screen of Death" or a "hard stop error".
Blue Screen Of Death
This is sometimes referred to as "the Blue Screen of Death" or a "hard stop error".
Blue Screen Of Death or BSOD
Yup. That is the technical name of the Blue Screen of Death.
the blue screen of death
Stop Error
another name for mesh screen is a sieve
You think probable to percent error.
Well, first of all the Blue Screen of Death is not a disease for your computer. It itself is actually a symptom of a disease on your computer. Just like the human body can raise its temperature to fight a cold, the Blue Screen of Death activates to protect your computer from any harm to its more vital information. The Blue Screen of Death really doesn't cause death (It's official name is "Stop Screen"). It is a tool to protect your computer from harm and to provide an explanation for the disease or error that the computer encountered.
Typo.
Another name for a PC screen is a monitor.
Standby