1Which of the following is considered an 'unguided' transmission medium?
A.Co-axial cable
B.Fiber-optic cable
C.Unshielded Twisted Pair (UTP)
D.Radio waves
Correct Answer: Radio waves
Explanation:
Unguided media, also known as wireless media, transmit data without a physical conductor. Radio waves, microwaves, and infrared are unguided, whereas cables are guided media.
Incorrect! Try again.
2What is a primary advantage of using wired network media over wireless media?
A.Higher user mobility
B.Lower susceptibility to eavesdropping and interference
C.Easier physical installation in large open spaces
D.Unlimited transmission distance without signal degradation
Correct Answer: Lower susceptibility to eavesdropping and interference
Explanation:
Wired networks confine signals within a physical cable, making them inherently more secure and less vulnerable to external electromagnetic interference compared to wireless signals.
Incorrect! Try again.
3Which IEEE standard specifically defines the protocols for Wireless Local Area Networks (WLANs), commonly known as Wi-Fi?
A.IEEE $802.5$
B.IEEE $802.11$
C.IEEE $802.15$
D.IEEE $802.3$
Correct Answer: IEEE $802.11$
Explanation:
The IEEE $802.11$ family of standards specifies the media access control (MAC) and physical layer requirements for wireless local area networks.
Incorrect! Try again.
4Which wireless transmission medium requires strict line-of-sight between the transmitter and receiver?
A.Infrared
B.Wi-Fi ($802.11$)
C.Bluetooth
D.Radio waves
Correct Answer: Infrared
Explanation:
Infrared communication relies on light waves that cannot easily penetrate walls or obstacles, thus requiring a direct, unobstructed line-of-sight.
Incorrect! Try again.
5Which of the following physical network devices operates primarily at the Data Link Layer (Layer 2) of the OSI model and uses MAC addresses to forward frames?
A.Hub
B.Router
C.Repeater
D.Switch
Correct Answer: Switch
Explanation:
A network switch operates at Layer 2 and builds a table of MAC addresses to efficiently forward data frames only to the port where the destination device is connected.
Incorrect! Try again.
6What is the primary function of a Network Interface Card (NIC) in a computer?
A.To provide a physical and logical connection between a computer and a network
B.To route packets between entirely different networks
C.To store MAC address tables for the entire LAN
D.To boost wireless signals in a dead zone
Correct Answer: To provide a physical and logical connection between a computer and a network
Explanation:
A NIC allows a computer to connect to a network. It handles the physical layer signaling and the data link layer formatting (such as Ethernet frames).
Incorrect! Try again.
7Which network component is considered a Layer 1 device that simply broadcasts all incoming data out to all other connected ports, essentially creating a single collision domain?
A.Router
B.Gateway
C.Hub
D.Switch
Correct Answer: Hub
Explanation:
A hub operates at the Physical layer (Layer 1). It has no intelligence for routing or switching; it merely regenerates and broadcasts incoming electrical signals out to all other ports.
Incorrect! Try again.
8A router primarily relies on which type of address to forward data packets across different networks?
A.MAC Address
B.Port Number
C.Logical (IP) Address
D.Hardware Address
Correct Answer: Logical (IP) Address
Explanation:
Routers operate at the Network layer (Layer 3) of the OSI model and use logical IP addresses to determine the best path to forward packets between different networks.
Incorrect! Try again.
9Which network device is designed to amplify and regenerate digital signals to extend the maximum transmission distance?
A.NIC
B.Gateway
C.Repeater
D.Modem
Correct Answer: Repeater
Explanation:
A repeater operates at the Physical layer and restores degraded signals (attenuation) to their original strength, allowing data to travel over longer distances.
Incorrect! Try again.
10What does a modem do?
A.Modulates digital signals into analog signals and demodulates analog signals into digital signals
B.Creates a wireless local area network
C.Blocks unauthorized network access
D.Assigns IP addresses to client machines dynamically
Correct Answer: Modulates digital signals into analog signals and demodulates analog signals into digital signals
Explanation:
The term 'modem' stands for Modulator-Demodulator. It translates digital data from a computer into analog signals for telephone or cable lines, and vice versa.
Incorrect! Try again.
11What connects a wired Ethernet network to wireless devices?
A.Modem
B.Bridge
C.Wireless Access Point (WAP)
D.Media Converter
Correct Answer: Wireless Access Point (WAP)
Explanation:
A Wireless Access Point (WAP) acts as a bridge between a wired local area network (LAN) and wireless devices (WLAN), allowing wireless devices to connect to the wired network.
Incorrect! Try again.
12Which of the following correctly identifies the three primary physical components of a standard coaxial cable, moving from the inside out?
Coaxial cable consists of a central copper conductor, surrounded by an insulating dielectric material, which is then encased in a braided metallic shield to prevent EMI, all covered by an outer jacket.
Incorrect! Try again.
13What type of connector is most traditionally associated with coaxial cables used in early networking (like 10Base2) and video equipment?
A.BNC Connector
B.DB9
C.RJ45
D.LC Connector
Correct Answer: BNC Connector
Explanation:
The Bayonet Neill-Concelman (BNC) connector is a common type of RF connector used for terminating coaxial cables in older networks and video applications.
Incorrect! Try again.
14What is the characteristic impedance of a standard RG-6 coaxial cable commonly used in modern cable television and broadband internet installations?
A.
B.
C.
D.
Correct Answer:
Explanation:
RG-6 coaxial cable, widely used for routing cable television and broadband signals, has a standard characteristic impedance of .
Incorrect! Try again.
15What does UTP stand for in networking cables?
A.Unified Telephone Protocol
B.Uniform Transmission Protocol
C.Unshielded Twisted Pair
D.Universal Twisted Pair
Correct Answer: Unshielded Twisted Pair
Explanation:
UTP stands for Unshielded Twisted Pair. It is the most common type of copper cable used in modern Ethernet LANs.
Incorrect! Try again.
16What physical principle allows fiber-optic cables to transmit data over long distances without light escaping the core?
A.Refractive dispersion
B.Total internal reflection
C.Capacitive coupling
D.Electromagnetic induction
Correct Answer: Total internal reflection
Explanation:
Fiber-optic cables rely on total internal reflection. The light hitting the boundary between the core and the cladding at a shallow angle is entirely reflected back into the core.
A.SMF has a much smaller core and typically uses a laser light source.
B.MMF is used for intercontinental underwater cables.
C.SMF has a larger core and uses LEDs for light transmission.
D.MMF is completely immune to physical breaking.
Correct Answer: SMF has a much smaller core and typically uses a laser light source.
Explanation:
Single-mode fiber features a narrow core (e.g., ) allowing only a single mode of light (usually from a laser) to propagate, making it ideal for very long distances.
Incorrect! Try again.
18Which of the following is a common fiber-optic connector?
A.F-Type
B.SC Connector
C.RJ11
D.BNC
Correct Answer: SC Connector
Explanation:
Standard Connector (SC), Local Connector (LC), and Straight Tip (ST) are widely used fiber-optic connectors. RJ11 is for telephones, and BNC/F-Type are for coaxial.
Incorrect! Try again.
19Which type of network cable is completely immune to Electromagnetic Interference (EMI) and Radio Frequency Interference (RFI)?
A.Coaxial cable
B.Fiber-optic cable
C.Cat 6 STP
D.Cat 5e UTP
Correct Answer: Fiber-optic cable
Explanation:
Since fiber-optic cables use light to transmit data through glass or plastic cores rather than electrical signals, they are entirely immune to EMI and RFI.
Incorrect! Try again.
20According to standard Ethernet specifications, what is the maximum recommended length for a UTP cable segment before a repeater or switch is required to prevent signal attenuation?
A.
B.
C.
D.
Correct Answer:
Explanation:
The maximum standard length for a UTP Ethernet segment (from device to switch) is ().
Incorrect! Try again.
21During cable installation in a commercial building with drop ceilings that return air to the HVAC system, which type of cable jacket is required by fire codes?
A.Armored
B.Outdoor-rated
C.Plenum-rated
D.PVC
Correct Answer: Plenum-rated
Explanation:
Plenum-rated cable is coated with a fire-retardant jacket (often Teflon) that produces less smoke and toxic fumes when burned, which is required in air-handling spaces.
Incorrect! Try again.
22Why are the internal copper wires in a UTP cable twisted around each other?
A.To increase the cable's physical tensile strength
B.To allow color-coding to be visible from any angle
C.To reduce the physical diameter of the outer cable jacket
D.To reduce crosstalk and cancel out electromagnetic interference
Correct Answer: To reduce crosstalk and cancel out electromagnetic interference
Explanation:
Twisting the wire pairs in a UTP cable alters the electromagnetic fields generated by the signal, allowing the fields to cancel each other out, thereby reducing crosstalk and EMI.
Incorrect! Try again.
23When installing fiber-optic cable, why is adhering strictly to the 'minimum bend radius' critical?
A.Bending it too sharply increases electrical resistance.
B.It ensures the cable fits neatly inside a standard conduit.
C.Bending it too sharply can cause total internal reflection to fail (light escapes) or snap the glass core.
D.It prevents the outer jacket from melting due to laser heat.
Correct Answer: Bending it too sharply can cause total internal reflection to fail (light escapes) or snap the glass core.
Explanation:
If a fiber-optic cable is bent beyond its minimum bend radius, micro-bends or macro-bends occur, causing light to leak out of the cladding and potentially breaking the fragile glass core.
Incorrect! Try again.
24In twisted-pair cabling installation, maintaining the physical twist of the pairs as close to the termination point as possible is crucial to prevent which issue?
A.Jitter
B.Attenuation
C.Near-End Crosstalk (NEXT)
D.Impedance mismatch
Correct Answer: Near-End Crosstalk (NEXT)
Explanation:
Untwisting the pairs too much at the connector exposes the wires to electromagnetic interference from adjacent wires, leading to Near-End Crosstalk (NEXT).
Incorrect! Try again.
25How many individual copper pins (contacts) are present in a standard RJ45 connector used for Ethernet cabling?
A.4 pins
B.8 pins
C.6 pins
D.10 pins
Correct Answer: 8 pins
Explanation:
An RJ45 (Registered Jack 45) connector supports 4 pairs of wires, which means it has a total of 8 individual pins.
Incorrect! Try again.
26What specific hand tool is used to attach an RJ45 connector permanently to the end of a UTP cable?
A.Crimping tool
B.Multimeter
C.Wire stripper
D.Punch-down tool
Correct Answer: Crimping tool
Explanation:
A crimping tool applies pressure to the RJ45 connector, pushing its metal pins into the copper wires of the UTP cable and locking the connector in place.
Incorrect! Try again.
27In the TIA/EIA T568B wiring standard, what is the color of the wire connected to Pin 1?
A.White/Orange
B.Blue
C.White/Green
D.Brown
Correct Answer: White/Orange
Explanation:
In the T568B standard, the pinout from Pin 1 to 8 starts with White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown.
Incorrect! Try again.
28In the TIA/EIA T568A wiring standard, what is the color of the wire connected to Pin 1?
A.White/Green
B.White/Blue
C.White/Orange
D.Green
Correct Answer: White/Green
Explanation:
In the T568A standard, the pinout from Pin 1 to 8 starts with White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown.
Incorrect! Try again.
29When terminating twisted-pair cable into a keystone jack or a network patch panel, which tool must be used to seat the wires securely?
A.Cable tester
B.Needle-nose pliers
C.Punch-down tool
D.Crimping tool
Correct Answer: Punch-down tool
Explanation:
A punch-down tool forces the wire into a V-shaped slotted contact on a block (like a patch panel), slicing the insulation and making a secure electrical connection.
Incorrect! Try again.
30To connect a standard desktop computer's NIC directly to a standard switch port, which type of Ethernet cable configuration is used?
A.Straight-through cable
B.Crossover cable
C.Rollover cable
D.Coaxial cable
Correct Answer: Straight-through cable
Explanation:
A straight-through cable (where both ends follow the same wiring standard, e.g., both T568B) is used to connect unlike devices, such as a PC to a switch.
Incorrect! Try again.
31If you need to connect two identical devices directly together, such as a PC to a PC or a Switch to a Switch (without Auto-MDIX), what kind of cable is required?
A.Straight-through cable
B.Crossover cable
C.Fiber-optic cable
D.Console cable
Correct Answer: Crossover cable
Explanation:
A crossover cable swaps the transmit and receive pin pairs so that the transmit pins on one device connect directly to the receive pins on the other device.
Incorrect! Try again.
32How is a traditional Ethernet crossover cable wired?
A.Both ends are wired using T568B.
B.Pins 1 through 8 are completely reversed on the second end.
C.Both ends are wired using T568A.
D.One end is wired T568A and the other end is wired T568B.
Correct Answer: One end is wired T568A and the other end is wired T568B.
Explanation:
Wiring one end as T568A and the other as T568B effectively crosses the transmit pair (Pins 1/2) with the receive pair (Pins 3/6), creating a crossover cable.
Incorrect! Try again.
33Which feature on modern network switches eliminates the strict requirement for crossover cables by automatically detecting the required pinout?
A.Auto-MDIX
B.Spanning Tree Protocol
C.PoE (Power over Ethernet)
D.VLAN Tagging
Correct Answer: Auto-MDIX
Explanation:
Auto-MDIX (Automatic Medium-Dependent Interface Crossover) allows the network interface to detect the cable connection type and configure the port's transmit and receive pins accordingly.
Incorrect! Try again.
34What is the primary purpose of a 'rollover' cable in networking hardware?
A.To connect two switches together to form a trunk
B.To connect a PC's serial/USB port to the console port of a router or switch for configuration
C.To extend the maximum length of an Ethernet segment
D.To connect a PC to another PC for file sharing
Correct Answer: To connect a PC's serial/USB port to the console port of a router or switch for configuration
Explanation:
A rollover cable (where pins 1-8 are completely reversed on the other end) is typically used for out-of-band management to connect a terminal to a network device's console port.
Incorrect! Try again.
35In which network topology do all client devices connect individually to a central hub or switch?
A.Ring topology
B.Mesh topology
C.Bus topology
D.Star topology
Correct Answer: Star topology
Explanation:
In a star topology, every node connects to a central network device. If one cable fails, only that node is affected, but if the central device fails, the whole network goes down.
Incorrect! Try again.
36Which network topology uses a single contiguous backbone cable to connect all nodes, requiring 'terminators' at both ends to prevent signal reflection?
A.Mesh topology
B.Bus topology
C.Star topology
D.Ring topology
Correct Answer: Bus topology
Explanation:
A bus topology uses a common backbone trunk cable to which all nodes tap in. Terminators absorb the signals at the ends so they do not bounce back and cause collisions.
Incorrect! Try again.
37In a fully connected mesh network with nodes, what is the mathematical formula to calculate the total number of physical links required?
A.
B.
C.
D.
Correct Answer:
Explanation:
In a full mesh topology, every node connects directly to every other node. The total number of links represents the mathematical combination of items taken 2 at a time, which is .
Incorrect! Try again.
38Which network topology passes a 'token' sequentially from one node to the next in a closed loop to manage who has the right to transmit data?
A.Ring topology
B.Star topology
C.Mesh topology
D.Bus topology
Correct Answer: Ring topology
Explanation:
In a ring topology, nodes are connected in a circular closed loop. A logical token circulates, and a node can only transmit data when it possesses the token, preventing collisions.
Incorrect! Try again.
39Which topology is considered a hybrid, primarily formed by integrating multiple Star topologies onto a central Bus backbone?
A.Ring topology
B.Partial Mesh topology
C.Full Mesh topology
D.Tree topology
Correct Answer: Tree topology
Explanation:
A tree topology (or hierarchical star) combines characteristics of linear bus and star topologies. It consists of groups of star-configured networks connected to a linear bus backbone.
Incorrect! Try again.
40What is a major characteristic of a Client-Server network architecture?
A.Every computer provides and consumes resources equally.
B.A centralized host stores data and manages security while remote nodes request services.
C.There is no centralized security management.
D.It is highly impractical for networks with more than 10 users.
Correct Answer: A centralized host stores data and manages security while remote nodes request services.
Explanation:
In a Client-Server architecture, specific servers are dedicated to providing resources and centralized security, while clients consume those resources, making it highly scalable.
Incorrect! Try again.
41Which of the following is an inherent disadvantage of a Peer-to-Peer (P2P) network architecture?
A.It requires expensive dedicated server hardware.
B.It suffers from decentralized security and becomes difficult to manage as the network grows.
C.It requires a complex active directory setup to function.
D.If one PC goes offline, the entire network fails.
Correct Answer: It suffers from decentralized security and becomes difficult to manage as the network grows.
Explanation:
P2P networks lack centralized administration. Each user controls their own resources, making security enforcement and data backup highly complicated as the user count increases.
Incorrect! Try again.
42Which command-line tool relies on Internet Control Message Protocol (ICMP) Echo Request and Echo Reply packets to test basic network connectivity?
A.ipconfig
B.ping
C.netstat
D.nslookup
Correct Answer: ping
Explanation:
ping is the fundamental network troubleshooting tool used to verify connectivity. It sends ICMP Echo Requests to a target and waits for Echo Replies.
Incorrect! Try again.
43If you suspect a hardware failure with a computer's local Network Interface Card (NIC), which special IP address can you ping to test the local TCP/IP stack?
A.127.0.0.1
B.0.0.0.0
C.255.255.255.255
D.192.168.1.1
Correct Answer: 127.0.0.1
Explanation:
127.0.0.1 is the IPv4 loopback address. Pinging it verifies that the host's TCP/IP protocol stack is properly installed and functioning.
Incorrect! Try again.
44Which command-line utility is used in Windows to display the sequence of network hops a packet takes to reach its destination?
A.tracert
B.ping -t
C.route print
D.ifconfig
Correct Answer: tracert
Explanation:
tracert (traceroute) identifies the routers (hops) between the source and destination, and measures the transit delays of packets across the network.
Incorrect! Try again.
45In a Windows command prompt, which command displays the physical (MAC) address, IP address, Subnet Mask, and Default Gateway of the machine?
A.arp -a
B.netstat -a
C.ipconfig /release
D.ipconfig /all
Correct Answer: ipconfig /all
Explanation:
While ipconfig shows basic IP information, adding the /all switch displays extensive networking details, including the NIC's MAC (physical) address.
Incorrect! Try again.
46A user's computer cannot connect to the internet. Upon checking ipconfig, you notice the IP address is 169.254.45.10. What does this indicate?
A.The computer is directly under a Denial of Service attack.
B.The computer failed to obtain an IP address from a DHCP server and assigned itself an APIPA address.
C.The NIC is physically broken and not detected by the OS.
D.The computer successfully connected to the ISP's DNS server.
Correct Answer: The computer failed to obtain an IP address from a DHCP server and assigned itself an APIPA address.
Explanation:
Addresses in the range 169.254.x.x are APIPA (Automatic Private IP Addressing) addresses, generated by Windows when it cannot reach a DHCP server.
Incorrect! Try again.
47When diagnosing a newly punched RJ45 UTP cable, which hardware tool is used to verify that pins 1-8 on one end correctly correspond to pins 1-8 on the other end without any shorts or open pairs?
A.Multimeter
B.Tone generator and probe
C.Loopback plug
D.Cable tester
Correct Answer: Cable tester
Explanation:
A basic cable tester explicitly checks for electrical continuity, shorts, crossed wires, and correct pin mapping (straight or crossover) on twisted-pair cables.
Incorrect! Try again.
48If you are troubleshooting a desktop computer that states 'Network Cable Unplugged', what is the most logical first step?
A.Reinstall the Windows operating system.
B.Change the computer's IP address to a static IP.
C.Verify that the physical link lights on the NIC and the switch are illuminated.
D.Run a tracert command to a public DNS server.
Correct Answer: Verify that the physical link lights on the NIC and the switch are illuminated.
Explanation:
In network troubleshooting, always check Layer 1 (Physical Layer) first. Link lights indicate whether a physical connection is successfully established.
Incorrect! Try again.
49On the back of a standard network interface card, what does a blinking activity LED typically indicate?
A.The NIC is actively transmitting and/or receiving data frames.
B.The physical connection to the switch has failed.
C.The computer is infected with a network worm.
D.The network cable is wired incorrectly (crossover instead of straight-through).
Correct Answer: The NIC is actively transmitting and/or receiving data frames.
Explanation:
Most NICs feature two LEDs: a solid 'link' light indicating physical connectivity, and an 'activity' light that flashes green or amber to indicate active data transfer.
Incorrect! Try again.
50During a ping command execution, you notice a value labeled 'TTL'. What is the purpose of the Time To Live (TTL) field in an IP packet?
A.It dictates how long the destination computer has to reply to the ping.
B.It indicates the speed of the physical connection in milliseconds.
C.It sets the encryption lifespan of the packet.
D.It ensures packets do not loop endlessly in the network by decrementing at each router hop.
Correct Answer: It ensures packets do not loop endlessly in the network by decrementing at each router hop.
Explanation:
TTL (Time to Live) is a value set in the IP packet header. Every time the packet passes through a router, the TTL is reduced by one. If it reaches zero, the packet is discarded, preventing infinite routing loops.