Upwork NETWORKING CONCEPTS TEST 2016

Hello Freelancer, Welcome to allupworktestanswers.com Here to get the NETWORKING CONCEPTS TEST of Latest version 2016. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website. 


1. Which of the following ranges are reserved as private addresses?
Answers:
  1. 192.168.0.0 – 192.255.255.255
  2. 172.16.0.0 – 172.255.255.255
  3. 10.0.0.0 – 10.255.255.255
  4. 172.16.0.0 – 172.31.255.255
2. What is a checksum?
Answers:
  1. An error detection technique
  2. A network troubleshooting device
  3. Another name for protocol header
  4. Another name for protocol trailer
3. What is multiplexing?
Answers:
  1. Allowing multiple senders and receivers to share a single channel
  2. Allowing multiple senders and receivers to share a single media
  3. Allowing bi-directional communication
4. According to the OSI model, at which layer are network addresses assigned?
Answers:
  1. Session
  2. Data Link
  3. Presentation
  4. Network
5. According to the OSI model, which layer addresses the issue of network topologies (star, ring, bus etc)?
Answers:
  1. Network
  2. Data Link
  3. Transport
  4. Physical
6. What is the IEEE 802.3 standard related to?
Answers:
  1. Definition of the Logical Link Control (LLC) sublayer
  2. Token Ring
  3. Token Bus
  4. Ethernet
7. What is the maximum transmission speed of CAT 5 cable?
Answers:
  1. 10 Mbps
  2. 16 Mbps
  3. 100 Mbps
  4. 1000 Mbps
8. Which of the following is an ‘end-to-end’ layer?
Answers:
  1. Physical
  2. Data Link
  3. Network
  4. Transport
9. What is attenuation?
Answers:
  1. Distortion of the signal due to noise
  2. Distortion of the signal due to Electro Magnetic Interference
  3. Weakening of the signal in a cable over a distance
  4. Cross Talk
10. Old mainframe computers were an example of ______?
Answers:
  1. Distributed computing
  2. Client server computing
  3. Peer to peer computing
  4. Centralized computing
11. At which layer of the OSI model, does HTTP operate?
Answers:
  1. Application
  2. Transport
  3. Session
  4. Presentation
12. Which of the following is a disadvantage of Client Server networks?
Answers:
  1. They have poor security
  2. Data is not centrally organized
  3. Centralized administration is not possible
  4. They require high investment in the form of purchase of a server
13. Which cable used for RJ11 connectors?
Answers:
  1. Thin Coaxial Cable
  2. Thick Coaxial Cable
  3. Unshielded Twisted Pair Cable
  4. Telephone Cable
14. What is the speed of a E1 line?
Answers:
  1. 128 kbps
  2. 144 kbps
  3. 2.048 Mbps
  4. 1.544 Mbps
15. How many bits of the MAC address are used by OUI portion?
Answers:
  1. 32 bits
  2. 48 bits
  3. 24 bits
  4. 16 bits
16. What do you call a communication system in which data can be sent in both directions at the same time?
Answers:
  1. Half Duplex
  2. Full Duplex
  3. Asynchronous
  4. Synchronous
17. At which layer of the OSI model, does a World Wide Web browser operate?
Answers:
  1. Application
  2. Transport
  3. Session
  4. Presentation
18. Which of the following services is feasible using standard ISDN?
Answers:
  1. Fax
  2. Voice Telephony
  3. Data Transfer
  4. Video Conferencing
  5. All of the above
19. What is ATM (Asynchronous Transfer Mode)?
Answers:
  1. It is a WAN technology based on frequency division multiplexing that uses fixed size packets known as cells
  2. It is a WAN technology based on time division multiplexing that uses variable size packets
  3. It is a WAN technology based on time division multiplexing that uses fixed size packets known as cells
  4. It is a virtual circuit based WAN technology
20. What is the maximum speed supported by a standard ISDN BRI?
Answers:
  1. 64 kbps
  2. 128 kbps
  3. 256 kbps
  4. 1.544 mbps
21. Which media access technique does Ethernet use?
Answers:
  1. CSMA/CA
  2. CSMA/CD
  3. Tokens
22. What are PPP and SLIP most commonly used for?
Answers:
  1. Connecting to the Internet through DSL lines
  2. Connecting to the Internet through telephone lines
  3. Connecting to the Internet through fibre optic lines
  4. Connecting to the Internet using wireless modems
23. How is a unique MAC address assigned to a Network Card?
Answers:
  1. It is built into the card when the card is manufactured
  2. The network administrator must assign the address
  3. A unique address is automatically assigned when the card drivers are installed
  4. A unique address is automatically assigned whenver you boot up the computer
24. According to the OSI model, which layer performs compression and decompression?
Answers:
  1. Application
  2. Presentation
  3. Session
  4. Data Link
25. What is the full form of PPPoE?
Answers:
  1. Point to Point Protocol over Exchange
  2. Point to Point Password over Ethernet
  3. Point to Point Protocol over Ethernet
  4. None of the above
26. In a TCP/IP network, which of the following must be unique for each computer in the network?
Answers:
  1. IP address
  2. Subnet mask
  3. Default Gateway
27. For which layer of the OSI model has the Ethernet standard been defined?
Answers:
  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Both a and b
  6. both b and c
28. In a TCP/IP network, which layers are basically absent?
Answers:
  1. Session, Presentation
  2. Transport, Session
  3. Session, Application
  4. Presentation, Application
29. What is the maximum number of valid IP addresses in a class B network?
Answers:
  1. 65536
  2. 65534
  3. 256
  4. 254
30. According to the OSI model, which layer performs parity checking and error checking?
Answers:
  1. Session
  2. Data Link
  3. Presentation
  4. Physical
31. What is the IEEE 802.5 standard related to?
Answers:
  1. Definition of the Logical Link Control (LLC) sublayer
  2. Token Ring
  3. Token Bus
  4. Ethernet
32. According to the OSI model, which layer performs encryption and decryption?
Answers:
  1. Application
  2. Presentation
  3. Session
  4. Data Link
33. What do you call a fibre optic cable in which the light signals follow a single path?
Answers:
  1. Multi mode
  2. Single mode
  3. Broadband
  4. Baseband
34. Which of the following protocols does not support Routing?
Answers:
  1. IPX/SPX
  2. TCP/IP
  3. NetBEUI
35. What is the full form of DSL?
Answers:
  1. Digital Subscription Line
  2. Digital Super Link
  3. Digital Speed Line
  4. Digital Subscriber Line
36. Which type of network uses dual fibre-optic rings?
Answers:
  1. Ethernet
  2. FDDI
  3. Token Ring
  4. ATM
37. Which protocol uses port number 23?
Answers:
  1. FTP
  2. SMTP
  3. Telnet
  4. HTTP
38. At which layer does a Bridge operate?
Answers:
  1. Network
  2. Physical
  3. Session
  4. Data Link
39. What do you call a fibre optic cable in which the light signals follow multiple paths?
Answers:
  1. Multi mode
  2. Single mode
  3. Broadband
  4. Baseband
40. According to the OSI model, which layer performs the function of transforming bits of data into electrical signals and sending those signals across the media?
Answers:
  1. Network
  2. Data Link
  3. Transport
  4. Physical
41. What do you call a communication system which uses start and stop bits to synchronize the sender and receiver?
Answers:
  1. Half Duplex
  2. Full Duplex
  3. Asynchronous
  4. Synchronous
42. Which of the following is mentioned in the correct sequence (from lowest layer to highest)?
Answers:
  1. Physical, Network, Data Link, Session, Transport, Presentation, Application
  2. Physical, Data Link, Network, Transport, Session, Presentation, Application
  3. Transport, Session, Data Link, Application, Presentation, Network, Physical
  4. Physical, Data Link, Network, Transport, Presentation, Session, Application
43. Which cabling media does not suffer from Electro-Magnetic Interference(EMI)?
Answers:
  1. Thin Coaxial Cable
  2. Thick Coaxial Cable
  3. Unshielded Twisted Pair Cable
  4. Fibre Optic Cable
44. What do you call a communication system which uses a clocking mechanism to synchronize the sender and receiver?
Answers:
  1. Half Duplex
  2. Full Duplex
  3. Asynchronous
  4. Synchronous
45. What is the binary value of hex BF?
Answers:
  1. 10100000
  2. 10111111
  3. 11111000
  4. 00111011
46. Which layer of the OSI model corresponds to IP?
Answers:
  1. Network
  2. Physical
  3. Session
  4. Data Link
47. How many bearer (B) and data (D) channels are there in a standard ISDN BRI service?
Answers:
  1. 2B + 1D channel
  2. 16B + 1D channel
  3. 23B + 1D channel
  4. 24B + 2D channels
48. According to the OSI model, which layer is responsible for routing?
Answers:
  1. Session
  2. Data Link
  3. Presentation
  4. Network
49. At which layer of the OSI model, does FTP operate?
Answers:
  1. Application
  2. Transport
  3. Session
  4. Presentation
50. What is the purpose of twisting the pairs of cables together in a UTP cable?
Answers:
  1. To reduce attenuation
  2. To reduce cross talk
  3. To reduce Electro-Magnetic Interference
  4. To reduce noise
51. What is the IEEE 802.2 standard related to?
Answers:
  1. Definition of the Logical Link Control (LLC) sublayer
  2. Token Ring
  3. Token Bus
  4. Ethernet
52. Which layer is broken down into the MAC and LLC sublayers?
Answers:
  1. Network
  2. Data Link
  3. Session
  4. Physical
53. According to the OSI model, which layer addresses the issues of communication media and cable connectors etc?
Answers:
  1. Network
  2. Data Link
  3. Transport
  4. Physical
54. At which layer of the OSI model, does SMTP (Simple Mail Transfer Protocol) operate?
Answers:
  1. Application
  2. Transport
  3. Session
  4. Presentation
55. What do you call a medium which only allows a single channel?
Answers:
  1. Multi mode
  2. Single mode
  3. Broadband
  4. Baseband
56. Which layer of the OSI model corresponds to TCP?
Answers:
  1. Network
  2. Transport
  3. Session
  4. Data Link
57. What is the X.25 protocol?
Answers:
  1. It is a packet switching WAN protocol based on public data networks
  2. It is a packet switching WAN protocol based on public telephone networks
  3. It is a packet switching wireless LAN protocol
  4. It is a packet switching wireless WAN protocol
58. What is the purpose of the shielding in a Shielded Twisted Pair (STP) cable?
Answers:
  1. To reduce attenuation
  2. To reduce cross talk
  3. To reduce Electro-Magnetic Interference
59. What does CSMA/CA stand for?
Answers:
  1. Collision Sense Multiple Access/ Collision Avoidance
  2. Carrier Sense Multiple Access/ Collision Avoidance
  3. Carrier Sense Multiple Access/ Collision Arbitration
  4. Collision Sense Multiple Access/ Carrier Avoidance
60. What is the recommended maximum length(approx) for a segment of UTP cable?
Answers:
  1. 500m
  2. 1km
  3. 100m
  4. 180m
61. Which of the following is a Fiber Optic Connector?
Answers:
  1. RJ-11
  2. RJ-45
  3. MT-RJ
  4. None of the above
62. Which network topology does FDDI use?
Answers:
  1. Star
  2. Ring
  3. Bus
  4. Mesh
63. Which of the following is a disadvantage of Peer Networks?
Answers:
  1. They require high investment in the form of purchase of a server
  2. They require high investment in the form of purchase of a specialized network operating system
  3. They usually require a network administrator
  4. They have poor network security
64. According to the OSI model, which layer is responsible for sending acknowledgements?
Answers:
  1. Session
  2. Transport
  3. Data Link
  4. Presentation
65. At which layer of the OSI model, does a Proxy Server operate?
Answers:
  1. Application
  2. Transport
  3. Session
  4. Presentation
66. Which of the following is used as a high speed network backbone media?
Answers:
  1. Thin Coaxial Cable
  2. Thick Coaxial Cable
  3. Unshielded Twisted Pair Cable
  4. Fibre Optic Cable
67. According to the OSI model, which layer provides services such as file transfer, database access and email?
Answers:
  1. Application
  2. Presentation
  3. Session
  4. Data Link
68. Which of the following is false with regard to assymetric DSL?
Answers:
  1. It uses standard copper telephone cables
  2. It delivers much higher speeds than a serial modem
  3. It uses more channels for downloading data and fewer for uploading
  4. It employs analog modulation to deliver data from your PC to the telephone service provider
69. What is the binary value of hex 9F?
Answers:
  1. 10011111
  2. 10111000
  3. 11110001
  4. 10001111
70. What does CSMA/CD stand for?
Answers:
  1. Collision Sense Multiple Access/ Collision Detection
  2. Carrier Sense Multiple Access/ Collision Deterence
  3. Carrier Sense Multiple Access/ Collision Detection
  4. Collision Sense Multiple Access/ Carrier Detection
71. Which media suffers least from attenuation?
Answers:
  1. Thin Coaxial Cable
  2. Thick Coaxial Cable
  3. Unshielded Twisted Pair Cable
  4. Fibre Optic Cable
72. At which layer does a Hub operate?
Answers:
  1. Network
  2. Physical
  3. Session
  4. Data Link
73. According to the OSI model, which layer addresses the issue of connections (connection-oriented/ connection-less communication)?
Answers:
  1. Physical
  2. Data Link
  3. Network
  4. Transport
74. What is the speed of a T1 line?
Answers:
  1. 128 kbps
  2. 144 kbps
  3. 2.048 Mbps
  4. 1.544 Mbps
75. What do you call a medium which allows multiple channels?
Answers:
  1. Multi mode
  2. Single mode
  3. Broadband
  4. Baseband
76. Which protocol is connection oriented?
Answers:
  1. TCP
  2. IP
  3. UDP
  4. ICMP
77. Which of the following is a Class A network?
Answers:
  1. 172.0.0.0
  2. 126.0.0.0
  3. 192.0.0.0
  4. 225.0.0.0
78. Which cable uses RJ45 connectors?
Answers:
  1. Thin Coaxial Cable
  2. Thick Coaxial Cable
  3. Unshielded Twisted Pair Cable
  4. Shielded Twisted Pair Cable
79. At which layer does a Router operate?
Answers:
  1. Network
  2. Physical
  3. Transport
  4. Data Link
80. What is a token?
Answers:
  1. A part of the packet trailer in a token ring network
  2. A part of the packet header in a token ring network
  3. A special packet which travels from computer to computer in a token ring network
81. What are V.42, V.22, V.42bis?
Answers:
  1. IEEE standards
  2. Modem standards
  3. CCITT standards
  4. MAC addressing formats
  5. Digital Certificate formats
82. According to the OSI model, which layer breaks down the data into frames?
Answers:
  1. Network
  2. Data Link
  3. Transport
  4. Physical
83. Which network topology does Ethernet use?
Answers:
  1. Star
  2. Ring
  3. Bus
  4. Mesh
84. What is the speed of ISDN PRI service with 30B + 1D channel?
Answers:
  1. 2.048 Mbps
  2. 1.544 Mbps
  3. 144 Kbps
  4. 128 Kbps
85. Which type of connector is mostly used these days for connectivity with the network card?
Answers:
  1. RJ-11
  2. BNC
  3. RJ-45
  4. RJ-33
86. What is the purpose of the MAC sublayer?
Answers:
  1. Sending acknowledgements whenever packets are received
  2. Performing data compression
  3. Performing encryption and decryption
  4. Controlliing the way multiple devices share the same media
87. Which of the following cables can be used to connect a PC and a Hub?
Answers:
  1. Straight cable
  2. Cross cable
  3. Rollover cable
  4. Any of the above
88. What is the binary value of 157?
Answers:
  1. 11000111
  2. 10111001
  3. 11100011
  4. 10011101
89. Which one of the following devices breaks up a Broadcast Domain by default?
Answers:
  1. Hub
  2. Repeater
  3. Router
  4. Switch
90. What do you call a communication system in which data cannot be sent in both directions at the same time?
Answers:
  1. Half Duplex
  2. Full Duplex
  3. Asynchronous
  4. Synchronous
91. What does ISDN stand for?
Answers:
  1. Information Systems Digital Network
  2. Integrated Services Digital Network
  3. Internet Services Digital Network
  4. Internet Systems Data Network
92. How many twisted pairs does a UTP Cat 5 cable have?
Answers:
  1. 2
  2. 4
  3. 6
  4. 8
93. According to the OSI model, which layer addresses the issue of switching (packet switching, message switching etc)?
Answers:
  1. Session
  2. Data Link
  3. Presentation
  4. Network
Finally no more words require about the NETWORKING CONCEPTS TEST  information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box.  Thank you very mutch for being with us.

0 comments: