function CheckIt(action){var i=ans[count];if(!action){if(FORM1.Q1[i].checked){alert("Correct!");}else{alert("Incorrect.");answrong++;}}else{FORM1.Q1[i].checked ? ansright++ : answrong++;}}function CheckScore(){alert("CORRECT: " + ansright + "\nINCORRECT: " + answrong);}function GoBack(){var myEl = document.getElementsByTagName("p");var mySpans = document.getElementsByTagName("span");var qnum = 0;tmpstr="";count--;qnum = count + 1;if(count < 0){count=0;alert("This is the first question!");return;}tmpstr = " " + qnum + ". " + q[count];myEl[1].innerHTML=tmpstr;mySpans[0].innerHTML=a[count];mySpans[1].innerHTML=b[count];mySpans[2].innerHTML=c[count];mySpans[3].innerHTML=d[count];}function GoNext(){var myEl = document.getElementsByTagName("p");var mySpans = document.getElementsByTagName("span");var qnum=0;tmpstr="";CheckIt(1);count++;qnum=count+1;if(count > 99){TestOver();return;}tmpstr=" " + qnum + ". " + q[count];myEl[1].innerHTML=tmpstr;mySpans[0].innerHTML=a[count];mySpans[1].innerHTML=b[count];mySpans[2].innerHTML=c[count];mySpans[3].innerHTML=d[count];ClrRadios();}function TestOver(){var myEl = document.getElementsByTagName("div");var myP = document.getElementsByTagName("p");var endscores = 'Correct: ' + ansright + "
";endscores += "Incorrect: " + answrong + "
";endscores += "Percentage: " + Math.floor((ansright/(ansright + answrong))*100);endscores += "%
";myP[1].innerHTML="TEST OVER!";myEl[0].innerHTML=endscores;FORM1.B0.disabled=1;FORM1.B1.disabled=1;FORM1.B2.disabled=1;}function Choose(){navigate("main00.pl?Z=./test/index.html");}function GoStart(){history.go(0);ClrRadios();}function ClrRadios(){FORM1.Q1[0].checked=false;FORM1.Q1[1].checked=false;FORM1.Q1[2].checked=false;FORM1.Q1[3].checked=false;}FORM1.B0.onclick=GoBack;FORM1.B1.onclick=CheckIt;FORM1.B2.onclick=GoNext;FORM1.B4.onclick=GoStart;FORM1.B5.onclick=CheckScore;FORM1.B6.onclick=Choose;var count=0;var ansright=0;var answrong=0;var q=new Array();var ans=new Array();var a=new Array();var b=new Array();var c=new Array();var d=new Array();q[0]="Which of the following is not an example of a network?";a[0]="A. Two PC's connected to a printer AB switch";b[0]="B. Two PC's connected to a KVM switch";c[0]="C. Two PC's connected with a cross-over parallel port cable";d[0]="D. Both A and B";ans[0]="3";q[1]="Which of the following is a reason for installing a network?";a[1]="A. Sharing hardware";b[1]="B. Sharing Data";c[1]="C. Communications";d[1]="D. All of the above";ans[1]="3";q[2]="Which of the following is necessary to setup a network?";a[2]="A. Communications peripheral device";b[2]="B. Network protocols";c[2]="C. Network Operating System";d[2]="D. All of the above";ans[2]="3";q[3]="Which is the most common business environment network paradigm?";a[3]="A. Peer-to-Peer";b[3]="B. Client/Server";c[3]="C. Centralized Processing";d[3]="D. Distributed Centralized Processing";ans[3]="1";q[4]="Access Control in Peer-to-Peer networks:";a[4]="A. is easier to manage, but less precise";b[4]="B. is harder to manage, but more precise";c[4]="C. is easier to manage and more precise";d[4]="D. None of the above";ans[4]="3";q[5]="The primary advantage of installing a Peer-to-Peer network is:";a[5]="A. It is easier to manage";b[5]="B. It has higher performance";c[5]="C. It is less expensive to install";d[5]="D. None of the above";ans[5]="2";q[6]="A LAN by definition is generally said to be confined to:";a[6]="A. One room";b[6]="B. One building";c[6]="C. One group of buildings, or small geographical area";d[6]="D. One state or medium sized geographical area";ans[6]="1";q[7]="A MAN by definition is generally said to be confined to:";a[7]="A. One room";b[7]="B. One building";c[7]="C. One group of buildings, or small geographical area";d[7]="D. One state or medium sized geographical area";ans[7]="2";q[8]="An intranet by definition is could be thought of as:";a[8]="A. A network with no geographical size limitations";b[8]="B. A private network acting like the Internet";c[8]="C. The Internet acting like a private network";d[8]="D. None of the above";ans[8]="1";q[9]="An extranet by definition is could be thought of as:";a[9]="A. A network with no geographical size limitations";b[9]="B. A private network acting like the Internet";c[9]="C. The Internet acting like a private network";d[9]="D. None of the above";ans[9]="2";q[10]="An WAN by definition is could be thought of as:";a[10]="A. A network with no geographical size limitations";b[10]="B. A private network acting like the Internet";c[10]="C. The Internet acting like a private network";d[10]="D. None of the above";ans[10]="0";q[11]="A network in which all nodes attach to the same wire has what physical topology?";a[11]="A. Star";b[11]="B. Ring";c[11]="C. Bus";d[11]="D. Mesh";ans[11]="2";q[12]="A network in which is each node is wired to one upstream and one downstream neighbor has what topology?";a[12]="A. Star";b[12]="B. Ring";c[12]="C. Bus";d[12]="D. Mesh";ans[12]="1";q[13]="A network in which is each node is wired to every other node has what topology?";a[13]="A. Star";b[13]="B. Ring";c[13]="C. Bus";d[13]="D. Mesh";ans[13]="3";q[14]="What OSI model layer is responsible to the "rules of contention"?";a[14]="A. Layer 1";b[14]="B. Layer 2";c[14]="C. Layer 3";d[14]="D. Layer 4";ans[14]="1";q[15]="What OSI model layer is responsible for flow control?";a[15]="A. Layer 1";b[15]="B. Layer 2";c[15]="C. Layer 3";d[15]="D. Layer 4";ans[15]="3";q[16]="What OSI model layer is responsible for the structure of the PMD frame?";a[16]="A. Layer 1";b[16]="B. Layer 2";c[16]="C. Layer 3";d[16]="D. Layer 4";ans[16]="1";q[17]="What OSI model layer is responsible for addressing a packet that can leave the physical network domain?";a[17]="A. Layer 1";b[17]="B. Layer 2";c[17]="C. Layer 3";d[17]="D. Layer 4";ans[17]="2";q[18]="Which of the following is used in 10Base5 networks?";a[18]="A. RG-8";b[18]="B. RG-58";c[18]="C. RG-59";d[18]="D. None of the above";ans[18]="0";q[19]="Which of the following is used in 10Base2 networks?";a[19]="A. RG-8";b[19]="B. RG-58";c[19]="C. RG-59";d[19]="D. None of the above";ans[19]="1";q[20]="Which of the following is used in 10BaseT networks?";a[20]="A. RG-8";b[20]="B. RG-58";c[20]="C. RG-59";d[20]="D. All of the above";ans[20]="3";q[21]="Which of the following is true regarding Category 3 UTP cable?";a[21]="A. Capable of carrying 10Mbps transmissions";b[21]="B. Has a 100M maximum length";c[21]="C. Has 4 pairs of wires twisted together 3 times per foot";d[21]="D. All of the above";ans[21]="3";q[22]="The Ethernet specification lists the smallest legal frame size as:";a[22]="A. 46 bytes";b[22]="B. 64 bits";c[22]="C. 64 bytes";d[22]="D. None of the above";ans[22]="2";q[23]="The Ethernet specification lists the largest legal data payload size as:";a[23]="A. 1500 bytes";b[23]="B. 1500 bits";c[23]="C. 1526 bytes";d[23]="D. None of the above";ans[23]="0";q[24]="The IEEE 802.2 specification defines:";a[24]="A. LLC";b[24]="B. MAC";c[24]="C. Ethernet";d[24]="D. Token Ring";ans[24]="0";q[25]="The IEEE 802.3 specification defines:";a[25]="A. LLC";b[25]="B. MAC";c[25]="C. Ethernet";d[25]="D. Token Ring";ans[25]="2";q[26]="The IEEE 802.5 specification defines:";a[26]="A. LLC";b[26]="B. MAC";c[26]="C. Ethernet";d[26]="D. Token Ring";ans[26]="3";q[27]="The maximum length of a single segment of RG-8 according to the IEEE 802.3 specification is:";a[27]="A. 100M";b[27]="B. 185M";c[27]="C. 500M";d[27]="D. 2500M";ans[27]="2";q[28]="The maximum length of a single segment of RG-58 according to the IEEE 802.3 specification is:";a[28]="A. 100M";b[28]="B. 185M";c[28]="C. 500M";d[28]="D. 2500M";ans[28]="1";q[29]="The maximum length of a single segment of Category 3 UTP according to the IEEE 802.3 specification is:";a[29]="A. 100M";b[29]="B. 185M";c[29]="C. 500M";d[29]="D. 2500M";ans[29]="0";q[30]="The Ethernet 5-4-3 Rule requires:";a[30]="A. No more than 3 physical segments of cable between any two nodes";b[30]="B. No more than 3 signal repeaters between any two nodes";c[30]="C. No more than 3 nodes on any physical segment";d[30]="D. None of the above";ans[30]="3";q[31]="CSMA/CD describes:";a[31]="A. IBM Token Ring LLC layer";b[31]="B. Novell networking OSI Layer 2";c[31]="C. Ethernet MAC layer";d[31]="D. None of the above";ans[31]="2";q[32]="LWT describes:";a[32]="A. The CS portion of CSMA/CD";b[32]="B. The MA portion of CSMA/CD";c[32]="C. The CD portion of CSMA/CD";d[32]="D. None of the above";ans[32]="2";q[33]="Bus topology describes:";a[33]="A. The CS portion of CSMA/CD";b[33]="B. The MA portion of CSMA/CD";c[33]="C. The CD portion of CSMA/CD";d[33]="D. None of the above";ans[33]="1";q[34]="The Receive pins in the standard RJ-45 connector:";a[34]="A. Are the first pair";b[34]="B. Are next to each other";c[34]="C. Are separated";d[34]="D. Both A and B";ans[34]="2";q[35]="The Transmit pins in the standard RJ-45 connector:";a[35]="A. Are the first pair";b[35]="B. Are next to each other";c[35]="C. Are separated";d[35]="D. Both A and B";ans[35]="3";q[36]="TWA is found in what OSI model layer?";a[36]="A. Layer 4";b[36]="B. Layer 5";c[36]="C. Layer 6";d[36]="D. Layer 7";ans[36]="1";q[37]="Encryption is found in what OSI model layer?";a[37]="A. Layer 4";b[37]="B. Layer 5";c[37]="C. Layer 6";d[37]="D. Layer 7";ans[37]="2";q[38]="Packet sequencing is found in what OSI model layer?";a[38]="A. Layer 4";b[38]="B. Layer 5";c[38]="C. Layer 6";d[38]="D. Layer 7";ans[38]="0";q[39]="Service Access Points describe:";a[39]="A. Layer communication";b[39]="B. Ports where technicians can gain entry";c[39]="C. Points where diagnostic programs gain entry";d[39]="D. None of the above";ans[39]="0";q[40]="The SFD of an Ethernet frame is best described as:";a[40]="A. The first meaningful byte of data within the frame";b[40]="B. Is followed by the first meaningful byte of data within the frame";c[40]="C. Has no fixed location relative to any meaningful data within the frame";d[40]="D. Is not a part of the Ethernet frame";ans[40]="1";q[41]="The FCS os an Ethernet frame is best described as:";a[41]="A. The error correction code of the frame";b[41]="B. The error detection code of the frame";c[41]="C. The frame control sequence number";d[41]="D. None of the above";ans[41]="1";q[42]="The minimum legal data field size of an Ethernet frame is:";a[42]="A. 46 bits";b[42]="B. 46 bytes";c[42]="C. 64 bytes";d[42]="D. 0 bytes";ans[42]="1";q[43]="Which field within an Ethernet frame could be zero bytes in size?";a[43]="A. Preamble";b[43]="B. SFD";c[43]="C. Pad";d[43]="D. FCS";ans[43]="2";q[44]="Not counting the preamble and SFD what is the largest possible Ethernet frame size?";a[44]="A. 1500 bits";b[44]="B. 1500 bytes";c[44]="C. 1518 bytes";d[44]="D. 1526 bytes";ans[44]="2";q[45]="An IP address is divided:";a[45]="A. into Network number and Node number";b[45]="B. into 4 dotted decimal octets";c[45]="C. by the subnet mask";d[45]="D. All of the above";ans[45]="3";q[46]="A router would determine that an IP address belongs to Class "A" by:";a[46]="A. Looking the complete IP address up in its routing tables";b[46]="B. Looking up the network number portion of the IP address in its routing tables";c[46]="C. Detecting that the first, topmost, bit of the IP address is a zero";d[46]="D. None of the above";ans[46]="2";q[47]="There are how many Class "A" IP networks on the Internet?";a[47]="A. 1";b[47]="B. 126";c[47]="C. Over 16000";d[47]="D. Over 2 million";ans[47]="1";q[48]="There are how many Class "B" IP networks on the Internet?";a[48]="A. 1";b[48]="B. 126";c[48]="C. Over 16000";d[48]="D. Over 2 million";ans[48]="2";q[49]="There are how many Class "C" IP networks possible on the Internet?";a[49]="A. 1";b[49]="B. 126";c[49]="C. Over 16000";d[49]="D. Over 2 million";ans[49]="3";q[50]="The maximum number of nodes in a Class "A" network is";a[50]="A. Unlimited";b[50]="B. 254";c[50]="C. Over 65000";d[50]="D. Over 16 million";ans[50]="3";q[51]="The maximum number of nodes in a Class "B" network is";a[51]="A. Unlimited";b[51]="B. 254";c[51]="C. Over 65000";d[51]="D. Over 16 million";ans[51]="2";q[52]="The maximum number of nodes in a Class "C" network is";a[52]="A. Unlimited";b[52]="B. 254";c[52]="C. Over 65000";d[52]="D. Over 16 million";ans[52]="1";q[53]="The IP address 192.168.0.1 is:";a[53]="A. A Class "C" IP address";b[53]="B. A nonroutable IP address";c[53]="C. An APIPA address";d[53]="D. Both A and B";ans[53]="3";q[54]="The IP address 169.254.0.127 is:";a[54]="A. A Class "B" IP address";b[54]="B. A nonroutable IP address";c[54]="C. An APIPA address";d[54]="D. Both A and C";ans[54]="3";q[55]="A system using the IP address 100.100.100.100 would need which subnet mask?";a[55]="A. 255.0.0.0";b[55]="B. 255.255.0.0";c[55]="C. 255.255.255.0";d[55]="D. 255.255.255.192";ans[55]="0";q[56]="Name three basic functions of the network layer. Logical addressing ...";a[56]="A. allows packets to exit a fixed size physical network";b[56]="B. allows routers to forward packets until they arrive at the destination network";c[56]="C. allows a user to quickly and easily change a node's address";d[56]="D. All of the above";ans[56]="3";q[57]="The Novell native OSI Layer 3 protocol is:";a[57]="A. IP";b[57]="B. IPX";c[57]="C. ARP";d[57]="D. CIDR";ans[57]="1";q[58]="The Unix native OSI Layer 3 protocol is:";a[58]="A. IP";b[58]="B. IPX";c[58]="C. ARP";d[58]="D. CIDR";ans[58]="0";q[59]="A Novell IPX address is created from:";a[59]="A. The node MAC address and a random number";b[59]="B. The Novell network number and a random number";c[59]="C. The Novell network number and the node MAC address";d[59]="D. The Novell network number, the node MAC address and a random number";ans[59]="2";q[60]="Novell networks using IPX do not require which type of support protocol?";a[60]="A. Transport packet sequencing";b[60]="B. Address to MAC resolution";c[60]="C. Name to Address resolution";d[60]="D. Automatic address configuration";ans[60]="1";q[61]="Which of the following is not needed by the user to manually configure IP on a network node?";a[61]="A. Default gateway";b[61]="B. Subnet Mask";c[61]="C. This node's IP address";d[61]="D. This node's MAC address";ans[61]="3";q[62]="A node needs to transmit to an IP address that resides on a different IP network...";a[62]="A. This cannot be done";b[62]="B. This can only be done if the node is a server";c[62]="C. The packet will be sent to the default gateway";d[62]="D. This can only be done on Microsoft APIPA networks";ans[62]="2";q[63]="All nodes within an IP network must use:";a[63]="A. the same subnet mask";b[63]="B. different IP addresses";c[63]="C. unique subnet masks";d[63]="D. Both A and B";ans[63]="3";q[64]="No node may have the host number portion of its IP address consisting of:";a[64]="A. all zeros";b[64]="B. all ones";c[64]="C. any number different from the one chosen for them all";d[64]="D. Both A and B";ans[64]="3";q[65]="Given the IP subnet mask 255.255.0.0, the IP address 169.254.255.255 is:";a[65]="A. invalid";b[65]="B. an APIPA address";c[65]="C. a broadcast address";d[65]="D. both B and C";ans[65]="3";q[66]="Within the IP packet header which field value is decreased by one every time it passes through a router?";a[66]="A. Header Length";b[66]="B. QoS Setting";c[66]="C. Fragment Offset";d[66]="D. TTL";ans[66]="3";q[67]="Which of the following addresses is routable?";a[67]="A. 10.10.10.10";b[67]="B. 172.127.172.127";c[67]="C. 169.254.64.128";d[67]="D. 127.172.127.172";ans[67]="1";q[68]="Which of the following addresses is not routable?";a[68]="A. 192.0.0.1";b[68]="B. 192.168.192.168";c[68]="C. 128.128.128.128";d[68]="D. 1.0.0.1";ans[68]="1";q[69]="A typical DSL router issues the IP address of 192.168.0.2 to a PC. This ability to issue the address is called:";a[69]="A. Proxy services";b[69]="B. APIPA services";c[69]="C. Routing services";d[69]="D. DHCP services";ans[69]="3";q[70]="The DSL router in the previous question issues this address to the PC because:";a[70]="A. it is a universally valid address on the Internet";b[70]="B. it is a nonroutable address and protects the PC from attacks";c[70]="C. it is the standard address for DSL IP automatic configuration";d[70]="D. it is the standard starting address for APIPA ";ans[70]="1";q[71]="The transport layer is primarily responsible for:";a[71]="A. packet sequencing";b[71]="B. detection of lost packets";c[71]="C. flow control";d[71]="D. all of the above";ans[71]="3";q[72]="What OSI model layer allows the node to participate in multiple simultaneous communications between the same two nodes?";a[72]="A. Datalink";b[72]="B. Network";c[72]="C. Transport";d[72]="D. Session";ans[72]="2";q[73]="Two different applications on the same PC are communicating with the same server using unique:";a[73]="A. IP addresses";b[73]="B. MAC addresses";c[73]="C. LLC types";d[73]="D. TCP ports";ans[73]="3";q[74]="The primary function of the transport layer is:";a[74]="A. Error detection";b[74]="B. Error correction";c[74]="C. Establishment of sockets";d[74]="D. Reliability";ans[74]="3";q[75]="The transport layer makes it possible for:";a[75]="A. packets to traverse different physical networks";b[75]="B. packets to be routed across the Internet to their target";c[75]="C. easily changing the local host's network address";d[75]="D. multiple applications transferring different data between the same two nodes";ans[75]="3";q[76]="A socket consists of what information?";a[76]="A. Local host IP and transport layer port number";b[76]="B. Remote host IP and transport layer port number";c[76]="C. Local host IP, remote host IP and transport layer port number";d[76]="D. Both A and B";ans[76]="3";q[77]="What TCP datagram field is used for this layer's "flow control"?";a[77]="A. 16-bit destination port number";b[77]="B. 32-bit sequence number";c[77]="C. 6 x 1-bit flags";d[77]="D. 16-bit advertized window";ans[77]="3";q[78]="What TCP datagram field is used by the transport layer to reconstruct out-of-order arrival of packets?";a[78]="A. 16-bit destination port number";b[78]="B. 32-bit sequence number";c[78]="C. 6 x 1-bit flags";d[78]="D. 16-bit advertized window";ans[78]="1";q[79]="What TCP datagram field is used by the transport layer to identify the service being requested of the remote host?";a[79]="A. 16-bit destination port number";b[79]="B. 32-bit sequence number";c[79]="C. 6 x 1-bit flags";d[79]="D. 16-bit advertized window";ans[79]="0";q[80]="What TCP datagram field is used to control the creation, maintenance, and destruction of the socket?";a[80]="A. 16-bit destination port number";b[80]="B. 32-bit sequence number";c[80]="C. 6 x 1-bit flags";d[80]="D. 16-bit advertized window";ans[80]="2";q[81]="Which well know TCP port is associated with FTP?";a[81]="A. 21";b[81]="B. 22";c[81]="C. 23";d[81]="D. 25";ans[81]="0";q[82]="Which well know TCP port is associated with SMTP?";a[82]="A. 21";b[82]="B. 22";c[82]="C. 23";d[82]="D. 25";ans[82]="3";q[83]="Which well know TCP port is associated with SSH?";a[83]="A. 21";b[83]="B. 22";c[83]="C. 23";d[83]="D. 25";ans[83]="1";q[84]="Which well know TCP port is associated with telnet?";a[84]="A. 21";b[84]="B. 22";c[84]="C. 23";d[84]="D. 25";ans[84]="2";q[85]="The well known TCP port 53 is associated with which protocol or service?";a[85]="A. ICMP";b[85]="B. DNS";c[85]="C. NTP";d[85]="D. BGP";ans[85]="1";q[86]="The well known TCP port 179 is associated with which protocol or service?";a[86]="A. ICMP";b[86]="B. DNS";c[86]="C. NTP";d[86]="D. BGP";ans[86]="1";q[87]="The well known TCP port 123 is associated with which protocol or service?";a[87]="A. ICMP";b[87]="B. DNS";c[87]="C. NTP";d[87]="D. BGP";ans[87]="1";q[88]="Which well known TCP port is associated with DHCP?";a[88]="A. 68";b[88]="B. 69";c[88]="C. 70";d[88]="D. 80";ans[88]="0";q[89]="Which well known TCP port is associated with TFTP?";a[89]="A. 68";b[89]="B. 69";c[89]="C. 70";d[89]="D. 80";ans[89]="1";q[90]="Which well known TCP port is associated with HTTP?";a[90]="A. 68";b[90]="B. 69";c[90]="C. 70";d[90]="D. 80";ans[90]="3";q[91]="The well known TCP port 110 is associated with which protocol or service?";a[91]="A. POP3";b[91]="B. IMAP";c[91]="C. NNTP";d[91]="D. NBT";ans[91]="0";q[92]="The well known TCP port 119 is associated with which protocol or service?";a[92]="A. POP3";b[92]="B. IMAP";c[92]="C. NNTP";d[92]="D. NBT";ans[92]="2";q[93]="The well known TCP port 143 is associated with which protocol or service?";a[93]="A. POP3";b[93]="B. IMAP";c[93]="C. NNTP";d[93]="D. NBT";ans[93]="1";q[94]="The well known TCP port 137 is associated with which protocol or service?";a[94]="A. POP3";b[94]="B. IMAP";c[94]="C. NNTP";d[94]="D. NBT";ans[94]="3";q[95]="Users may not be able to login to secure websites if which of the following ports are being blocked by the router?";a[95]="A. 1293";b[95]="B. 4500";c[95]="C. 443";d[95]="D. All of the above";ans[95]="3";q[96]="UDP can be described as:";a[96]="A. Connectionless";b[96]="B. Faster than TCP";c[96]="C. Unreliable";d[96]="D. All of the above";ans[96]="3";q[97]="Which OSI model layer is essentially implemented within the transport layer by TCP?";a[97]="A. Application";b[97]="B. Presentation";c[97]="C. Session";d[97]="D. All of the above";ans[97]="2";q[98]="Users can send email but they cannot retrieve it. Which port is being blocked by the router?";a[98]="A. 25";b[98]="B. 53";c[98]="C. 110";d[98]="D. Both A and C";ans[98]="2";q[99]="Users can browse to websites that they have already visited but not to new ones. What port has just been closed at the router?";a[99]="A. 25";b[99]="B. 53";c[99]="C. 110";d[99]="D. Both A and C";ans[99]="1";