Read this whole guide offline with no ads, for a very low price!
Click Here!
Use coupon code "SAVE50" to get it half price!

Custom Search







Table Of Contents  CertiGuide to A+ (Core Hardware)
 9  Chapter 1011:  Networking

Previous Topic/Section
XI  Chapter 1011: Test for Success Questions
Previous Page
Pages in Current Topic/Section
1
Next Page
Chapter 1100:  Troubleshooting
Next Topic/Section

XII  Chapter 1011: Test for Success Answers

1. Which technology eliminates the need for having to use NDIS?

A. Plug ‘n Pray

B. Plug ‘n Play

C. PCI

D. ISA

Explanation: We sometimes refer to Plug ‘n Play technology as Plug ‘n Play because it doesn’t always work as planned. This technology basically allows you to use PCI compatible components where the O/S finds the device driver all by itself. The old way was with ISA slots and you had to supply the drivers yourself.

 

2. What two flavors does Ethernet come in, and what are the respective data speeds? [Choose two]

A. Real Ethernet, 10Mbps

B. Fast Ethernet, 100Mbps

C. Ethernet, 10Mbps

D. Ethernet, 100Mbps

Explanation: The two types are simply referred to as Ethernet, which operates at 10Mbps; and Fast Ethernet, which operates at 100Mbps.

 

3. Duplex data transmission is the most efficient method for sending and receiving information.

A. True

B. False

Explanation: The most efficient method for sending and receiving data is Duplex, and the least efficient is Simplex.

 

4. What is the maximum distance data can be transmitted over Thick Ethernet network cabling without signal attenuation?

A. 500 feet

B. 5000 feet

C. 500 meters

D. 5000 meters

Explanation: Thick Ethernet, or what was more commonly referred to as “Frozen Garden Hose”, has a maximum distance of 500 meters before the signal strength begins to drop off, and a repeater becomes necessary.

 

5. What is the maximum distance data can be transmitted over Thinnet cabling without signal attenuation?

A. 185 feet

B. 185 meters

C. 500 feet

D. 500 meters

Explanation: Technically, the maximum distance is 185 meters, but most technicians refer to the limit as 200 meters.

 

6. What is IBM’s Type 1 cabling more commonly referred to as?

A. STP

B. Frozen Garden Hose

C. UTP

D. Thinnet

Explanation: STP (Shielded Twisted Pair) uses a braided metal shield avoid interference.

 

7. What data speed does Category 3 cabling support?

A. 100 Mbps

B. 10 Kbps

C. 100 Kbps

D. 10 Mbps

Explanation: The introduction of Category 3 (Cat 3 in geek speak) meant greatly reduced cabling costs and increased data speeds and higher distance limitations.

 

8. What data speed does Category 5 cabling support?

A. 100 Mbps

B. 10 Kbps

C. 100 Kbps

D. 10 Mbps

Explanation: Cat 5 cabling is probably the most common type of cabling used in today’s networks. It’s fast, cheap, and proven.

 

9. Fiber Optic and Cat 5 cabling are prone to the 3 demons?

A. True

B. False

Explanation: Cat 5 is susceptible, but Fiber is not.

 

10. It is possible to transmit data between two or more PCs without being physically connected.

A. True

B. False

Explanation: Wireless technology basically consists of using a wireless modem on a PC, which bounces signals off of a fixed position in the sky, like a satellite.

 

11. What is the approximate maximum data speed for two PCs using serial port connections on a network?

A. 100 Mbps

B. 100 Kbps

C. 115 Kbps

D. 115 Mbps

Explanation: It may not be pretty, but it is reliable.

 

12. What best describes how a bus network topology is configured?

A. Two or more PCs linked together off of a single backbone

B. Two or more PCs linked together in a spoke-and-wheel configuration

C. Two or more PCs linked together with wireless connections

D. Two or more PCs linked together with a token passing scheme

Explanation: The cheapest, and easiest network type to put together is the Bus. The downside is that if any one link is broken the entire system will not work, not just the one incurring the break.

 

13. Which of the following network topologies offers the most reliability in terms of redundancy?

A. Star

B. Mesh

C. Bus

D. Token Ring

Explanation: With a mesh topology, a company could have multiple breaks in the system and still be able to communicate with every other PC on the network. These are somewhat expensive to make, and are usually found in institutions like banks where everything is mission critical.

 

14. Which of the following network protocols, or suite of protocols, is the most commonly used on The Internet?

A. TCP/IP

B. IPX/SPX

C. Banyan Vines

D. UDP/STP

Explanation: TCP/IP is a suite of protocols that almost completely dominates all Internet traffic

 

15. What is it that allows you to break network IDs into multiple networks?

A. TCP/IP

B. Octet

C. FQDN Identifier

D. Subnet Mask

Explanation: Depending on your subnet mask, you can sub-divide your network into multiple sub-networks.

 

16. What is it that allows data to exit from your LAN, or PC, onto The Internet?

A. Default GUI

B. Default gateway

C. LAN segments

D. Hub

Explanation: The default gateway is what identifies the far side of the router that allows you access to The Internet.

 

17. If you were the owner of a thriving ISP (Internet Service Provider) and wanted to make the most efficient usage of your IP addresses, what tool or service would you use?

A. DNS

B. WINS

C. UDP

D. DHCP

Explanation: DHCP (Dynamic Host Configuration Protocol) allows you to pool your IP addresses and dole them out on an as-needed basis.

 

18. What type of server or protocol is responsible for matching domain names to IP addresses?

A. UDP

B. WINS

C. DNS

D. ISP

Explanation: Domain Name Servers (DNS) hold databases of IP addresses and domain names, much like your telephone

 

19. What peripheral device uniquely identifies your PC on The 'Net?

A. AGP

B. Modem

C. PNP

D. NIC

Explanation: Your NIC (Network Interface Card) is what ultimately uniquely identifies you from all the other surfers out there in cyberspace. Each NIC is assigned a MAC address, which distinguishes it from all other NICs, and the IP address your computer is assigned is bound to the MAC address

 

20. What is the primary difference between a hub and a switch?

A. A hub sends data to all PCs; a switch only sends data to the intended recipient

B. There is no difference between a hub and a switch

C. A hub is used in small networks; a switch is used in medium to large networks

D. A hub only sends data to the intended recipient; a switch sends data to all PCs

Explanation: A hub takes in all network traffic and re-transmits it to all devices attached to it. This creates a lot of traffic and, as you might suspect, causes congestion. A switch directs network traffic just to the intended recipient. Until recently, it was cost-prohibitive to the average small business owner to install a switch.


Previous Topic/Section
XI  Chapter 1011: Test for Success Questions
Previous Page
Pages in Current Topic/Section
1
Next Page
Chapter 1100:  Troubleshooting
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to A+ (Core Hardware) from StudyExam4Less.com. (Use coupon code "SAVE50" to save a full 50% off the already low price!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide to A+ (Core Hardware) (http://www.CertiGuide.com/aplush/) on CertiGuide.com
Version 1.0 - Version Date: December 6, 2004

Adapted with permission from a work created by Tcat Houser.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.