MODEL Answer Sheet
MODEL Answer Sheet
1 which one of the following protocol used for secured interaction/access with remote device?
3 which one of the following is different A ) HTTP B) SMT, C) MAC address D) SSH E) Telnet
4 5 which address does an NIC use when deciding whether to accept a frame?
A) Source IP address B) source MAC address C) destination IP address D) destination MAC address
E) source Ethernet address
5 Which device accepts a message on one port and always forwards the message to all other ports?
A) modem B) switch C) router D)hub
6 Which two networking devices are used to connect hosts to the access layer? (Choose two.)
A) router B) hub C)switch D) server E )computer F) B and C
7 What is the term for the group of high-speed data links that interconnect ISPs?
A)Internet LAN B)ISP backbone C)Internet gateways D) Internet providers E) Internet backbone
8 Which three elements are not required to successfully connect to the Internet?
A) an IP address B) file sharing enabled C)a network connection E) server services enabled
F) access to an Internet service provider G) A and B H) B and E
9 . What does the tracert command test? A) NIC functionality B) the ISP bandwidth
C) the network path to a destination D the destination application functionality
11 Given a host with the IP address 172.32.65.13 and a default subnet mask, to which network does the
host belong? A)172.32.65.0 B) 172.32.65.32 C)172.32.0.0 D)172.32.32.0
12. Which default subnet mask provides the most host bits?
A ) 255.0.0.0 B)255.255.0.0 C255.255.255.0 255.255.255.252
13 How many bits are available for Class B host IP addresses using a default subnet mask?
A)4 B)8 C )16 D)24
19 What is the correct order of the layers of the OSI reference model, starting at the lowest layer and
working up the model?
A)data link, physical, transport, network, presentation, session, application
B)physical, data link, network, session, transport, presentation, application
C) physical, data link, network, transport, presentation, session, application
D) physical, data link, network, transport, session, presentation, application
E)application, session, presentation, transport, data link, network, physical
20 What are two benefits of wireless networking over wired networking? (Choose two.)
A) speed B) security C)mobility D) reduced installation time E)allows users to share more resources
F) not susceptible to interference from other devices
21 The computer that provides resources for other computer on the network is ? A) Workstation B )
Server C)Standalone D)Client
21 Which network design layer provides hosts with initial connectivity to the network?
A) Access B) core C ) distribution D) network
23 Which protocol is used to transfer files among network devices and perform file-management
functions? A) DNS B) FTP C) HTML D) HTTP
24
The help desk at a large packaging company receives a call from a user who is concerned about
lost data files on the local PC. The help desk technician learns that the user clicked on an icon
that appeared to be a program update, but no updates were scheduled for that program. What
type of attack has likely occurred? A)worm B) brute force C) Trojan horse D) DDoS
25 Which Windows command is used to display the configured IP address, subnet mask, and
default gateway? A) Ipconfig B) Netstat C) Nslookup D) Tracert
26 One of the following is different from the others
A. The MAC Address
B. The physical address
C The IP address
D The Ethernet address