Encircle The Letter of The Best Answer
Encircle The Letter of The Best Answer
25. Which of the following commands is used to display shared drive, files and resources by a
local computer?
A. VIEW NET C. NET SHARE
B. NET VIEW D. SHARE NET
26. Which of the following program can be used in typing commands for configurations?
A. MS Word C. Command prompt
B. Notepad D. MS PowerPoint
27. Which of the following commands can access the shared drive or folder in a computer
network?
A. \\pc1\d\folder C. /pc1/d/folder
B. //pc1/d/folder D. \pc1\d\folder
28. What materials are connected at both ends of a cable?
A. Integrator C. Aggregator
B. Connector D. Reflector
29. This command will display the status of connection, Physical and IP address and default gateway
A. IPCONFIG C. IPDISPLAY
B. CONFIGIP D. DISPLAYIP
30. What type of connector is used for a twisted-pair cable?
A. RJ43 C. RJ44
B. RJ46 D. RJ45
31. What type of connection can be used for a very small area?
A. Wired C. Wireless
B. Hybrid D. Dial-up
32. What type of network must be used when a very large number of connection is needed?
A. Hybrid C. Wireless
B. Wired D. Dial-up
33. What type of network configuration makes all computer systems equal?
A. Peer-and-pair C. Peer-to-peer
B. Pair-to-pair D. Server-client
34. What type of configuration is established when a central database is needed?
A. Client-central C. Client-resource
B. Client-server D. Client-surfer
35. Which of the following equipment is needed to establish a peer-to-peer configuration?
A. Central Access Point C. Service Central Points
B. Middle Access Point D. Configuration Acquired Point
36. What type of network equipment sends a transmission to all the computer systems attached
to it?
A. Hub C. Switch
B. Server D. Router
37. Which of the following network equipment sends transmission only to the dedicated
recipient?
A. Router C. Server
B. Hub D. Switch
38. What network equipment has the ability to transmit data from one segment to another?
A. Hub C. Router
B. Repeater D. Switch
39. What type of password is recommended when using wireless connectivity?
A. WEP C. WAP
B. WPA D. WPE
40. Which of the following statements is true about wireless networks?
A. It is the most susceptible to breach D. It is the most secured type of
B. Its password can never be cracked connection
C. It needs no firewall
41. If the DHCP is enabled, the IP address _____________________.
A. is static C. has conflict
B. is dynamic D. is invalid
42. All of the following can be used by a router to block a device except:
A. MAC address C. Subnet
B. Physical address D. IP address
43. This is dotted-decimal number that identifies the IP address belong to.
A. MAC address C. Subnet Mask
B. Physical address D. IP address
44. This is used to identify a network device on a network and it must be unique, either dynamic or
static.
A. MAC address
B. Physical address
C. Subnet Mask
D. IP address
45. Which of the following subnet mask belongs to Class B group?
A. 255.255.255.255 C. 255.255.0.0
B. 255.255.255.0 D. 255.255.0.0
46. Which of the following IP address is reserved for loop back adapter?
A. 223.0.0.1 C. 192.168.0.1
B. 126.0.1 D. 127.0.0.1
48. In order to connect to the Internet, what device must be connected to a router?
A. Modem C. Gateway
B. Antenna D. Satellite
49. To what port of a router must an Internet modem be connected in order to broadcast its
signal to the computer systems?
A. MAN Port C. PAN Port
B. WAN Port D. LAN Port
50. To what port must the clients be connected in order to connect to the Internet via a router?
A. WAN Port
B. PAN Port
C. MAN Port
D. LAN Port