A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
1
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
1.
You
install
File and Printer Sharing for Microsoft Networks. You
share a folder and leave the password option blank. Who can gain
access to the folder
A.
Anyone who can gain access to your network and has a
Microsoft redirector such as the Client for Microsof
t Networks
installed.
B.
Windows 98 will not allow a blank password in this field.
C.
Anyone with Internet Explorer installed.
D.
Only users that are members of the same workgroup as you.
2.
The figure below shows a typical Home Network Setup. Identify
the network com
ponents marked in red.
A: Cable/DSL Modem
B: CAT 5 Ethernet cable
C: Wireless Signal
E: Wirelss Router
3.
Some protocols are considered to be technically non
-
routable.
Which of the following statements best describes the most
common reason why a protocol would be considered non
-
routable
A.
It does not contain the appropriate Data Link layer information
required
by routers.
B.
It uses advanced
Transport
layer services to move across the
Internet and avoids the routing overhead required by the more
primitive networking protocols.
C.
It defines Physical layer network addresses for internal
routing.
D.
It does not specify the
Network layer addresses required by
routers.
4.
What is the binary network ID of the loop back IP address
A.
1
B.
10101010
C.
0
D.
1111111
5.
You are the LAN administrator for your company. You have
couple
Windows 2000
Professional clients that dial in via PPP to
the compa
ny network’s RAS server. You want the remote clients to
be assigned dynamic IP addresses. You reserve a pool of class B
addresses for these clients. Upon connecting, you find that
the
Windows 2000
computers are using a subnet mask of all
255s.What should y
ou do
A.
Run ipconfig with the /release and /renew switch on the client
B.
Run ipconfig with the /renew_all switch on the client
C.
Run winipcfg on the client
D.
Do nothing.This is normal
6.
You are
configuring
a router. According to the manual, you will
need a transceiv
er to
connect
to the LAN ports of the router. What
kind of physical interface does the router have
A.
MSAU
B.
RJ
-
11
C.
AUI
D.
BNC
7.
Which of the following are connectionless protocols.(Choose the
three best answers.)
A.
IP
B.
SPX
C.
IPX
D.
UDP
8.
How can Jim Herr, a client on an NT TC
P/IP network see which
remote hosts are currently connected using NBT
A.
Use NBTSTAT
B.
Use NETSTAT
C.
Use NSLOOKUP
D.
Use IPCONFIG
9.
You are setting up a new Windows 98 workstation on your
network, and your DHCP server provides all of the normal TCP/IP
configuration in
formation. What must you do
to configure
the IP
address on the workstation after you add the TCP/IP protocol
A.
The DHCP option is enabled automatically, and the server will
auto
-
configure everything.
B.
Find out what the subnet mask on your network is, and add
this information only.
C.
Manually
enter an IP address that is not in use on the
network.
D.
Put the address of the router in the default gateway, and put
all 0s in the IP field.
10.
Which of the following is considered a Network Attached Storage
device
A.
A 60 GB DAT
tape drive attached to the Network Server
B.
A file server with special software that is at a separate location
from the departmental file server
C.
In a Windows NT environment, it would be the Backup
Domain Controller
D.
A high speed specialized sub
-
network attach
ed to the
enterprise
11.
Credit card size, designed for notebooks, self
-
configuring, and
non
-
OS dependent describes which PC bus architecture
A.
PCI
B.
ISA
C.
EISA
D.
PCMCIA
12.
What protocol is used between E
-
Mail servers
A.
HTTP
B.
POP3
C.
SNMP
D.
SMTP
13.
When installing a
manually
config
ured adapter, what information
must you know to avoid resource conflicts
A.
IRQ
B.
Number of bits
C.
Base I/O port address
D.
Base Memory address
14.
Which of the following OSI layers is responsible for identifying
communications partners
A.
Application
B.
Session
C.
Network
D.
Prese
ntation
15.
A broadcast message is an example of which dialog control
method
A.
Half duplex
B.
Base band
C.
Broadband
D.
Simplex
16.
Which of the following are used to resolve Windows Net BIOS
names to IP addresses
A.
DNS
B.
WINS
C.
L M hosts file
D.
Hosts file
17.
What is a router
A.
A hardwar
e device that connects dissimilar networks, such as
Cat 5 cabling and FDDI
B.
A network host that reads the source and
destination
addresses
in the packet header and makes decisions about where to
forward the packet
C.
A network host that can forward LAN
-
based e
mail messages
onto the Internet, after repackaging them into the SMTP format
D.
A software system that can translate between dissimilar
networks such as Ethernet and Token Ring
18.
Which of the following is Class C IP address?
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
2
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
A.
10.10.14.118
B.
135.23.112.57
C.
191.200.1
99.199
D.
204.67.118.54
19.
A Windows 95 user complains that she cannot
connect
to any
other computers on her local subnet even when using the IP
address to communicate. However, she can ping 127.0.0.1 and
receive a reply. Other users on her subnet do not report
having
any trouble. All client computers on the network are WINS
-
enabled. What is the most probable cause of the problem?
A.
The TCP/IP stack is not installed properly
B.
The subnet mask is not correct, check whether the subnet
mask is configured correctly.
C.
The
default gateway
is not configured properly.
D.
The computer
is not configured to use LMHOSTS
20.
WINS or ___ may be used for Net BIOS name resolution?
A.
HOSTS
B.
DNS
C.
LMHOSTS
21.
You have
set up a server
that connects to an
Internet services
provider
(ISP) over ISDN line.
How should the
default
gateway
address be configured so that windows 95 users on the
local network can access
the Internet
through the RAS server. The
RAS server is located on the same subnet as that of the WIN95
machines.
A.
The
default Gateway
address on WI
NS95 must specify the IP
address of the remote ISP
B.
The
default Gateway
on WN95 must specify the IP address of
the RAS server on the local network.
C.
The HOSTS file in WIN95 machines must be configured with
the host name of the RAS Server.
D.
The HOSTS file in W
IN 95 machines must be configured with
the host name of the ISP
22.
Which of the following is the standard adopted for Ethernet
CSMA/CD by IEEE Committee?
A.
802.2
B.
802.1d
C.
802.3
D.
802.5
23.
Disk Striping with Parity corresponds to which RAID level?
A.
RAID 0
B.
RAID 1
C.
RAID 3
D.
RAID 5
24.
Which of the following media types is most susceptible to EMI?
A.
Fiber Optic
B.
STP
C.
Co
-
axial
D.
UTP
25.
Which type of connector does a 10BaseT Ethernet cable use?
A.
BNC
B.
RJ
-
45
C.
RJ
-
11
D.
MSAU
26.
Which of the following is suitable for mission critical and time
sensitive
ap
plications
?
A.
10BaseT
B.
10Base2
C.
Token Ring
D.
Mesh
27.
What is the default subnet mask for Class C network?
A.
255.0.0.0
B.
255.255.0.0
C.
255.255.255.0
D.
255.0.255.0
28.
Which of the following network topologies have each computer
connected to a central point?
A.
Bus
B.
Ring
C.
Star
D.
Mesh
29.
W
hich of the following network topologies is the most fault
tolerant?
A.
Bus
B.
Mesh
C.
Star
D.
Ring
30.
A Bus network topology is best described as which of the
following?
A.
All computers are attached to a single cable in a chain style
B.
All computers are connected to a centr
al point
C.
All computers are connected to every other computer or
resource in the network
D.
Fault Tolerant
31.
A Ring network topology provides two links from each computer. A
link in and a link out.
A.
True
B.
False
32.
Which connector is often used with Thinnet cable?
A.
RJ
-
11
B.
AUI
C.
DIX
D.
BNC
33.
Which of the following media connectors are used in conjunction
with telephones?
A.
RJ
-
45
B.
RJ
-
11
C.
RJ
-
T
D.
None of the above are correct
34.
10BaseT Ethernet networks, most commonly use which of the
following types of cable?
A.
Fiber
B.
Coax
C.
STP
D.
UTP
35.
A Gateway
is able to connect network environments that are
dissimilar.
A.
True
B.
False
36.
AUI connectors are commonly associated with which of the
following items?
A.
A Vampire Tap
B.
Fiber Optic Cable
C.
10Base2
D.
Wireless Networks
37.
A hub works in conjunction with which of the followi
ng network
topologies?
A.
Ring
B.
Star
C.
Bus
D.
Mesh
38.
Which of the following is a correct MAC address?
A.
190.168.80.1
B.
www.certyourself.com
C.
08:34:FE:4C:F2:54
D.
G2:G3:23:87:GG
39.
A Hub operates at which of the following layers of the OSI model?
A.
Physical
B.
Session
C.
Transport
D.
Appli
cation
40.
Which of the following devices operate at the Data Link layer of the
OSI model?
A.
A Hub
B.
A NIC
C.
A Switch
D.
A Router
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
3
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
41.
A.
The
Physical
Layer
B.
The Data Link Layer
C.
The
Transport
Layer
D.
The
Network Layer
42.
A
Network Interface Card
operates at the
Network Layer
of
the
OSI model.
A.
True
B.
False
43.
Which of the following is the correct order of the
OSI model
from
bottom to top?
A.
Application
, Presentation, Session,
Transport, Network, Data
Link,
Physical
B.
Physical, Network, Data Link, Session,
Transport,
Application,
Presentat
ion
C.
Physical, Data Link, Network,
Transport, Session,
Presentation,
Application
D.
Application, Session, Presentation,
Transport, Network, Data
Link,
Physical
44.
What is the maximum speed of 10Base5 Ethernet cable?
A.
100 Mbps
B.
500 Mbps
C.
50 Mbps
D.
10 Mbps
45.
100Base
-
FX us
es which of the following types of cable?
A.
Fiber Optic
B.
Unshielded Twisted Pair
C.
Coax
D.
Shielded Twisted Pair
46.
Which of the following TCP/IP protocols is used to communicate
between a Web Browser and a Web Server?
A.
SMTP
B.
HTTP
C.
UDP
D.
POP3
47.
Which of the following layers
of the
OSI model
does a Bridge
operate in?
A.
The Data Link Layer
B.
The
Network Layer
C.
The
Transport
Layer
D.
The Session Layer
48.
While reviewing the security logs for your server, you notice that a
user on the Internet has attempted to access your internal mail
ser
ver. Although it appears that the user's attempts were
unsuccessful, you are still very concerned about the possibility that
your systems may be compromised. Which of the following
solutions are you most likely to implement?
A.
A firewall system at the connec
tion point to the Internet
B.
A more secure password policy
C.
File
-
level encryption
D.
Kerberos authentication
49.
A server has two NIC cards installed. The first one uses IRQ 10
and I/O range of B800
-
B81F.The second uses IRQ 10 and I/O
range of D700
-
D80A.What action,
if any, should be taken?
A.
No action is required.
B.
Locate any available IRQ to resolve the IRQ conflict.
C.
Locate any available I/O range to resolve the I/O conflict.
D.
Change the I/O of the second NIC to B800
-
B81F.
50.
Which of the following IEEE 802 standards pert
ain to token ring?
A.
IEEE 802.5
B.
IEEE 802.3
C.
IEEE 802.2
D.
IEEE 802.11
51.
Protocol that is often used to facilitate communications with an IBM
mainframe?
A.
NetBEUI
B.
RIP
C.
DLC
52.
Which of these protocols provide fast connectionless
communications that relies on upper layers
of the OSI model for
error correction?
A.
TCP (Transmission Control Protocol)
B.
UDP (User Datagram Protocol)
C.
SPX
53.
Can be used to reduce traffic bottlenecks in a NetBEUI network?
A.
bridge
B.
router
C.
gateway
54.
You have just finished the installation of two computers on a
28
computer network using Novell's IPX/SPX. Both computers
initialize with no error messages yet they cannot contact other
computers on the network. All other computers are functioning
normally. You probably have an ___?
A.
incorrect IRQ
B.
incorrect frame type
C.
invalid IP setting
55.
Uses amplifiers to regenerate analog signals?
A.
baseband
B.
broadband
C.
fiber
-
optic
56.
Uses single frequency digital signals?
A.
baseband
B.
broadband
C.
multiband
57.
You are hired to investigate a slow performing network server for a
client.Using the perform
ance monitor you obtain the following
readings: CPU usage= 25%, Disk time= 25%, Page faults/sec=
25.What one change will increase the performance of this network
server the most?
A.
buy another CPU
B.
add another hard drive
C.
increase RAM
58.
Which of the following sh
ould you check if you can connect using
the IP address but NOT with the host name?
A.
DNS
B.
WINS
C.
DHCP
59.
The fastest method of transporting data with a switch?
A.
store and forward
B.
cut through
C.
loop back
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
4
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
60.
Although NOT fault tolerant this RAID level is often used when o
ne
wants the highest level of performance?
A.
RAID 0
B.
RAID 1
C.
RAID 5
61.
Four _____ are used in the 5
-
4
-
3 rule of 10Base2 networking?
A.
repeaters
B.
segments
C.
routers
62.
You have just finished installing an Ethernet PCI NIC (
network
interface card
) in a client's computer.
T
he computer
initializes
successfully and has no apparent
hardware problems
. The
computer
however is not able to communicate with other
computers on this NetBEUI network. All other client computers are
able to communicate. What is the most likely cause of t
his
problem?
A.
IRQ conflict
B.
incorrect transceiver setting
C.
incorrect frame type
63.
The two key components of a digital signature include the secure
hash algorithm and a ___ ?
A.
blowfish value
B.
certificate authority
C.
IP Sec
64.
The Microsoft version of Novell's IPX/SPX p
rotocol?
A.
ODI
B.
NW Link
C.
DLC
65.
Utility used to run
applications
on a computer at a remote location?
A.
ODI
B.
Telnet
C.
ARP (Address Resolution Protocol)
66.
Topology that offers the highest level of redundancy, is easy to
troubleshoot but is expensive to
install
. It is the
topology of the
internet?
A.
star
B.
ring
C.
mesh
67.
Ordinary telephone wire has a thickness of AWG 22.Of the
following which is the thickest wire?
A.
AWG 14
B.
AWG 28
C.
AWG 32
68.
Backup method which clears the archive bit and is the shortest to
perform but takes the longest to
restore?
A.
full
B.
incremental
C.
differential
69.
Which of the following protocols map a logical address to a MAC
(Media Access Control) address?
A.
DNS
B.
WINS
C.
ARP
70.
The major limiting factor for how long a cable can be in a segment
is ___?
A.
collisions
B.
EMI
C.
attenuation
71.
A.
regis
try
B.
boot files
C.
all of the above
72.
Equipment that is designed to help identify breaks and shorts in
cables?
A.
TDR
B.
performance monitor
C.
SNMP
73.
Which company developed the Unix
Operating System
?
A.
Sun
B.
Microsoft
C.
ATT
74.
To start a Win 2000 Prof computer in the safe mode pr
ess ___ at
startup?
A.
F8
B.
Ctl and Esc
C.
F1
75.
A bridge filters traffic using which type of address?
A.
IP address
B.
MAC address
C.
TCP address
76.
A large network with 500 users notice that at specific times in the
morning and afternoon network congestion ties up their comput
ers.
What is the most likely cause?
A.
power fluctuations
B.
a terminator is not grounded
C.
many users are logging on or off
77.
A ___ is created when a unique IP address and port number are
used to
connect
two computers?
A.
SAP
B.
media
transfer
coefficient
C.
socket
78.
During d
isaster recovery of a Win 2000 Prof computer if you
"Enable Boot Logging" the file ___ is saved to the C:
\
winnt folder
for analysis?
A.
setuplog.txt
B.
bootlog.txt ntbtlog.txt
79.
Which of these WAN (Wide Area Network) protocols is the fastest?
A.
Frame Relay
B.
ATM
C.
X.25
80.
The only files on a Win 2000 Prof Emergency Repair Disk (ERD)
are autoexec.nt, config.nt, and setup.log?
A.
True
B.
False
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
5
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
81.
OSI layer responsible for mail and
file transfers
?
A.
transport
B.
data link
C.
application
82.
A protocol that functions at the network layer o
f the OSI model?
A.
TCP
B.
IP
C.
SPX
83.
A major advantage of ___ in an NT network is centralized security
and administration?
A.
user
-
level security
B.
share
-
level security
C.
RAID 5
84.
OC
-
1 has a transmission rate that is close to ___ ?
A.
T
-
1
B.
T
-
3
C.
ISDN
85.
The maximum number of populat
ed segments allowed in an
Ethernet network?
A.
3
B.
4
C.
5
86.
Using the TCP/IP protocol if the
destination
of the packet is outside
the subnet then the packet is sent to the ___?
A.
switch
B.
bridge
C.
default gateway
87.
Entry in DNS to identify your mail server?
A.
IDC
B.
TU
C.
MX
88.
Toplol
ogy which is the least expensive to
install
?
A.
ring
B.
star
C.
bus
89.
Utility which can be used to identify bottlenecks in the network?
A.
PING
B.
WINIPCFG
C.
TRACERT
90.
What is the first octet range for a class A IP address?
A.
1
-
126
B.
1
-
128
C.
1
-
191
91.
After you setup the
IP address
a
nd subnet mask your FIRST
test
should be
with ___?
A.
tracert to a known good server
B.
ping 127.0.0.1
C.
ping another computer on your
segment
92.
Net BIOS computer names can have up to ___ characters?
A.
256
B.
15
C.
20
93.
Refers to the part of the network that is separated by r
outers,
bridges, or switches?
A.
partition
B.
node
C.
segment
94.
Data is organized into FRAMES for transmission at this OSI level?
A.
physical
B.
data
-
link
C.
network
95.
10 Base 2 coaxial has a limit of ___ computers per
segment?
A.
2
B.
30
C.
100
96.
Cable used for ArcNet networks?
A.
RG
-
58
B.
RG
-
59
C.
RG
-
62
97.
A Class A
IP address
uses the last ___ octet(s) for the host ID.
The host ID is the unique part and identifies the individual user and
part of the reason 50% of all IP addresses are Class A?
A.
one
B.
two
C.
three
98.
Of the three (3) RAID levels used by a Win
2000 server choose the
one(s) that is/are fault tolerant?
A.
0, 1, and 5
B.
1 and 5
C.
5
99.
The best method to restore the latest copy of the registry in a Win
2000 Server is to select the ___?
A.
Emergency Repair Disk (ERD)
B.
Recovery Console
C.
Last Known Good Configuratio
n
100.
What
routing protocol
counts hops to the
destination
along multiple
paths to determine the most efficient route?
A.
ARP
B.
DLC
C.
RIP
101.
The source
and
destination
addresses are stored in the ___ of a
packet?
A.
data
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
6
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
B.
trailer
C.
header
102.
Most commonly used type of modem?
A.
syn
chronous
B.
asynchronous
C.
external
103.
Operates at the network layer of the OSI model?
A.
bridge
B.
gateway
C.
router
104.
Disk duplexing (RAID 1) requires a minimum of ___?
A.
2 hard drives and 1 controller
B.
3 hard drives and 2 controllers
C.
2 hard drives and 2 controllers
105.
Organizat
ion responsible for the OSI model?
A.
ANSI
B.
IEEE
C.
ISO
106.
Which
topology
uses the least amount of cabling?
A.
star
B.
bus
C.
ring
107.
According to RFC 1918 this range of Class A IP addresses are
reserved for private intranets and are not supposed to be used on
the internet (whe
re x is any number from 1 to 254)?
A.
10.x.x.x
B.
20.x.x.x
C.
30.x.x.x
108.
Cable classification for 10Base5 thicknet coaxial?
A.
RG
-
8
B.
RG
-
10
C.
RG
-
58
109.
Dial
-
up protocol that uses a virtual private network (VPN)?
A.
SLIP (Serial Line
Internet Protocol
)
B.
PPTP (Point
-
to
-
Point Tunnelin
g Protocol)
C.
PPP (Point to Point Protocol)
110.
Type 9 ___ rated
coaxial cable
should be installed in drop ceilings
to conform to fire code regulations?
A.
SPF
B.
PVC
C.
plenum
111.
The best
device
to use when monitoring a broadcast storm?
A.
TDR
B.
Digital Voltmeter
C.
Protocol Analy
zer
112.
Class A
IP addresses
can accomodate 16 million hosts while a
Class B can accomodate ___?
A.
254
B.
65,534
C.
4 million
113.
SNMP relies on the information found in ___ to chart and graph
components of the network for analysis and troubleshooting?
A.
SMPs
B.
MIBs
C.
SAPs
114.
Pres
cribes the greatest packet octet length that can be
transmitted?
A.
SAP
B.
subnet mask
C.
MTU
115.
The default protocol on NT4 or Win 2000 servers?
A.
IPX/SPX
B.
NWLink
C.
TCP/IP
116.
A standard security algorithm developed in 1975 that uses 56
-
bit
symmetric key encryption?
A.
DES
B.
EAP
C.
P
AP
117.
Win 2000 security service that maintains permissions
and
passwords
used to logon?
A.
MMPE
B.
CHAP
C.
SAM
118.
A voice
grade
demand priority standard developed by HP that is
capable of 100Mbps transmissions?
A.
100VG
-
AnyLAN
B.
100BaseT
C.
100BaseFX
119.
PPP is part of the ___ OSI l
ayer?
A.
physical
B.
data link
C.
network
120.
Network connection
device
that is capable of sending packets
along multiple paths depending on which path is the most
efficient?
A.
bridge
B.
router
C.
all of the above
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
7
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
121.
client
.Saving the
client
the extra hard drive space he
would need
for the
application
as well as the CPU processing time?
A.
file server
B.
print server
C.
application
server
122.
The static HOSTS text file used on UNIX systems that requires
manual entries by the administrator was the precursor of
___.Today the HOSTS file
system finds use mainly in maximum
security operations which don't want anything changed
automatically?
A.
WINS
B.
LMHOSTS
C.
DNS
123.
The minimum category of UTP cable that will meet the 10BaseT
standard?
A.
cat2
B.
cat3
C.
cat5
124.
The easiest protocol to setup?
A.
NetBEUI
B.
NWLink
C.
TCP
/IP
125.
Displays data on hardware components such as memory, CPU,
and the hard drive in a chart or graph which describes how these
devices are operating?
A.
protocol analyzer
B.
performance monitor
C.
network monitor
126.
The OSI layer responsible for name recognition, secu
rity logins,
and synchronization of the connection?
A.
presentation
B.
application
C.
session
127.
Has twenty
-
four 64 Kbps channels for a total of 1.544 Mbps
throughput?
A.
T3
B.
T1
C.
X.25
128.
Microsoft recommends that the %CPU usage should not be above
90% for a single CPU or abov
e __% for multiple processors for
any extended period?
A.
50
B.
70
C.
90
129.
Your customer's computer is loaded with peripherals and is using
COM1, COM2, LPT5, and LPT7.You
install
the NIC on IRQ3 and
have a conflict. Which of the following is the NIC conflicting with?
A.
the printer
B.
COM1
C.
COM2
130.
The most widely used protocol?
A.
NetBEUI
B.
NW Link
C.
TCP/IP
131.
Can be thought of as a "hop counter" determining how many hops
it takes along various paths to the destination and then telling the
router which is the one with the least number o
f hops which most
of the time is the quickest route?
A.
DLC
B.
SAP
C.
RIP
132.
Apple's Local Talk protocol has a ___ computer limit?
A.
8
B.
32
C.
128
133.
Ensures that one device is NOT overwhelmed by another with a
data transmission?
A.
SMB
B.
CRC
C.
flow control
134.
You are setting up a 10Base
2 Ethernet network for a client with
three segments. There are 20 computers in each segment. How
many terminators will you need for this network?
A.
1
B.
2
C.
6
135.
Used to connect different media types but cannot filter or segment
traffic?
A.
bridge
B.
hub
C.
router
136.
The most e
fficient way to control security in a client/ server
network is to assign permissions to ___?
A.
each shared resource
B.
directories
C.
groups
137.
Which of the following IRQs can you set your NIC to without
usually causing a conflict?
A.
4
B.
7
C.
10
138.
Arc Net is one of the oldes
t protocols used. What year was it
invented?
A.
1967
B.
1977
C.
1987
139.
OSI layer that determines whether the transmission is a full or half
-
duplex transfer?
A.
presentation
B.
session
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
8
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
C.
application
140.
Compensates for a hard drive failure on an NT server?
A.
RAID
B.
WINS
C.
DHCP
141.
Active D
irectory
to boot from an RIS server in Win 2000
requires
a
___ compliant NIC?
A.
RAS
B.
PXE
C.
SAP
142.
The most popular dial
-
up protocol?
A.
SLIP
B.
UDP
C.
PPP
143.
The standard for several hubs connected in a linear fashion
(token
-
bus)?
A.
802.3
B.
802.4
C.
802.5
144.
The minimum number of disks
required to implement a fault
tolerant RAID system?
A.
1
B.
2
C.
3
145.
For increased security Win 2000 enables encryption of files or
folders on ___ volumes?
A.
FAT32
B.
NTFS
C.
either FAT32 or NTFS
146.
Characteristic of the TCP protocol?
A.
fast but unreliable delivery
B.
best effort d
elivery
C.
assurance
of packet delivery
147.
Cable type that offers the least resistance to EMI ?
A.
coaxial
B.
fiber
-
optic
C.
UTP
148.
Novell introduced TCP/IP as its default protocol in NetWare ___ ?
A.
3.x
B.
4.x
C.
5.x
149.
This OSI layer packages bits into frames?
A.
physical
B.
data
-
link
C.
net
work
150.
Protocol used in Win 2000 to print to a URL on the internet.
It
requires
either Peer Web Services or a IIS server to be installed?
A.
IPP
B.
SAP
C.
IPSec
151.
Novell added ___ which could bind many protocols to a
NIC
starting
with NetWare 4.0?
A.
NDIS
B.
TSM
C.
ODI
152.
Port ___
is assigned to the SMTP?
A.
21
B.
25
C.
80
153.
You are setting up a local peer
-
to
-
peer network that will have
seven Win 98 computers. Internet access is not needed. Which
protocol should you use?
(NetBEUI is the best one but if its not listed then pick the one with
t
he lowest overhead)
A.
X.25
B.
NW Link
C.
TCP/IP
154.
Used for installing Win NT4?
A.
setup.exe
B.
winnt.exe
C.
win.com
155.
OSI layer responsible for error
checking
frames and adding MAC
addresses to its tables?
A.
presentation
B.
transport
C.
data
-
link
156.
The
initial
formation of the packet he
ader is started at this OSI
level?
A.
Application
B.
Session
C.
Physical
157.
For a Class C IP address the first ___ octet(s) are reserved for the
network ID?
A.
1
B.
2
C.
3
158.
Utility used
to check
SMTP connectivity?
A.
SNMP
B.
LMHOSTS
C.
Telnet
159.
Prevents bounce
-
back of signals in a 10Base2
network?
A.
T
-
connector
B.
BNC
C.
terminator
160.
A set of "rules" for network transmissions?
A.
topologies
B.
protocols
C.
gateways
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
9
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
161.
between two
or more network
segments
?
A.
The Spanning Tree Protocol
B.
The Inverted Tree Protocol
C.
The Transparent Tree Protocol
D.
The Domain Name
Tree
Protocol
E.
The Looping Bridge Protocol
162.
What are the two methods switching hubs use to
transport
data
between devices?
A.
Routing
B.
Forwarding
C.
Cut
-
through
D.
Active
E.
Store
-
and
-
forward
163.
What happens when a device is disconnected from the middle of a
BUS network?
A.
The hub
will propagate error messages to the rest of the
network
B.
All devices on the network will fail
C.
The Server will stop responding to that device
D.
Data will not be able to get to devices on
the other side
of this
device
E.
If a bridge is on the network, only that
segment will be
effected
164.
What are some advantages of a Client/Server network over a
Peer
-
to
-
Peer network?
A.
Performance is better on a Peer
-
to
-
Peer
B.
Security is better on a Client/Server
C.
Performance is better on a Client/Server
D.
Security is better on a Peer
-
to
-
Peer
E.
Client/Server is easier to administrate
165.
Name two protocols in the TCP/IP suite that function at
the
Transport
layer of the OSI model.
A.
TCP
B.
IP
C.
UDP
D.
SNMP
E.
ARP
166.
IP is responsible for sorting and _________________ of packets.
A.
Addressing
B.
Holding
C.
Organizing
D.
De
livery
E.
Verifying
167.
What is the first octet range for a class B IP address?
A.
127
-
191
B.
128
-
191
C.
192
-
223
D.
1
-
127
E.
128
-
255
168.
What is the first octet range for a class C IP address?
A.
1
-
126
B.
128
-
191
C.
192
-
225
D.
192
-
223
E.
192
-
255
169.
What method of transporting data with a switch is f
astest?
A.
Store
-
and
-
forward
B.
Cut
-
through
C.
Routing
D.
Spanning Tree
E.
Pass
-
Through
171.
The inner core of a coaxial cable that carries the signals is made of
___?
A.
aluminum
B.
copper
C.
zinc
172.
Active hubs can ___?
A.
route the signal using the most efficient path
B.
send an acknowledge
ment once the packet is received
C.
regenerate the signal like repeaters
173.
RAID 5 requires a minimum of __ hard drives?
A.
3
B.
4
C.
5
174.
What is an advantage of Cat 3 UTP cable instead of RG
-
58 A/U
coaxial?
A.
UTP supports longer cable segments
B.
UTP is less susceptible to EMI
C.
UTP is easier to
install
and less expensive
175.
A packet in a TCP/IP network whose
destination
is outside the
local network goes to the ___?
A.
TCP transceiver
B.
default gateway
C.
IP subnet
176.
One important difference between routers and bridges is that when
a bridge c
an't locate thedestination
address in its table it ___?
A.
sends the transmission to the
default gateway
B.
dumps the packet
C.
broadcasts
the transmission to all ports
177.
Novell's NetWare 5.0 was developed in part from the ___
standard?
A.
ATM
B.
NDIS
C.
X.500
178.
The freely dist
ributed open source Unix based
operating
system
that has gained in popularity recently?
A.
XP
B.
Linux
C.
DLC
179.
The term used to describe the physical layout of a network?
A.
protocol
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
10
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
B.
server
C.
topology
180.
Is the interface between the NIC drivers and MAC sublayer?
A.
WINS
B.
NDIS
C.
D
LC
181.
Which
topology
provides for equal access to the network for
all
computers
?
A.
star
B.
bus
C.
ring
182.
Using the TCP/IP protocol when is a subnet mask
required
?
A.
only when connecting outside the LAN
B.
only when using TCP/IP
C.
for both intranet and internet usage
183.
OSI level
that ensures error
-
free delivery of packets?
A.
data
-
link
B.
network
C.
transport
184.
The IEEE specification for a token ring network?
A.
802.3
B.
802.5
C.
802.6
185.
RIP counts hops (or routers it encounters) as the packet travels to
its
destination
. Another name for a hop is a __
_?
A.
interval
B.
sequence
C.
metric
186.
A protocol that functions at the
transport
layer of the OSI model?
A.
IP
B.
IPX
C.
SPX
187.
How many bits are there in an IP address?
A.
64
B.
32
C.
128
188.
An easy to configure, fast, and efficient protocol recommended for
small non
-
routable networks?
A.
Ne
tBEUI
B.
TCP/IP
C.
X.25
189.
What type of troubleshooting device examines the network at the
packet level?
A.
TDR
B.
VOM
C.
protocol analyzer
190.
Resolves
domain names
into IP addresses?
A.
DHCP
B.
DNS
C.
WINIPCFG
191.
A.
DLC
B.
SSL
C.
ARP
192.
Device
drivers
can be disabled in Win 2000 Prof in
Device
Man
ager
or by using the ___?
A.
ERD
B.
Recovery Console
C.
RDISK
193.
Smart Cards in Win 2000 use the ___ RAS authentication protocol
for security?
A.
PAP
B.
MSCHAP
C.
EAP
194.
Because of its low overhead this is the fastest of these protocols?
A.
TCP/IP
B.
NW Link
C.
NetBEUI
195.
The ERD made in the
Win 2000
Server Backup
utility contains the
files needed to boot
the computer
?
A.
True
B.
False
196.
Your client has a 10Base2 Ehternet network which is using 160m
of RG
-
58A/U cable and two 50 ohm terminators that are both
grounded. What is wrong with his network?
A.
t
he terminators should be 93 ohms
B.
he should be using RG
-
59/U cable
C.
only one terminator should be grounded
197.
Of the following the one that is NOT an alogorithm that determines
the shortest path for routers?
A.
SAP
B.
RIP
C.
OSPF
198.
The most common topology in use today am
ong corporate users?
A.
bus
B.
ring
C.
star
-
bus
199.
Uses a 93 ohm resistor?
A.
RG62
B.
RG58
C.
RG59
200.
OSI level responsible for compression and encryption of data?
A.
session
B.
application
C.
presentation
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
11
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
201.
Analog transmissions with multiple frequencies such as cable
television signa
ls use ___?
A.
baseband
B.
broadband
C.
multiband
202.
Network device which cannot be used to filter traffic
by
segmenting
a network?
A.
bridge
B.
hub
C.
switch
203.
RAID can be used in these network operating systems?
A.
NT
B.
Netware
C.
all of the above
204.
When multiple protocols are used in a
network ___ should
always
be
placed at the top of the binding order?
A.
TCP/IP
B.
IPX/SPX
C.
the one most frequently used
205.
The standard cabling type used in AppleTalk and Token Ring?
A.
UTP
B.
STP
C.
RG
-
58A/U
206.
Arrange these WAN technologies in chronological order beginning
w
ith the oldest?
A.
X.25, ISDN, ATM
B.
ISDN, X.25, ATM
C.
ATM, ISDN, X,25
207.
A crossover cable can be used to
connect
?
A.
a hub to a hub
B.
a computer to a computer
C.
all of the above
208.
The RJ
-
45
connector
used in UTP networks has ___ wires?
A.
2 pairs or 4
B.
4 pairs or 8
C.
6 pairs or
12
209.
Displays the IP configuration information on a Win NT computer?
A.
IPCONFIG
B.
WINIPCFG
C.
ARP
210.
Displays the IP configuration information on a Win 98 computer?
A.
IPCONFIG
B.
WINIPCFG
C.
WINS
211.
The IEEE 802 standards operate at these layers of the OSI
model?
A.
network and
tra
nsport
B.
session and presentation
C.
physical and data link
212.
Can be used to show only one
IP address
for multiple users on the
subnet?
A.
proxy server
B.
DHCP server
C.
DNS server
213.
What must be configured in TCP/IP for two computers on the
same segment to communicate with
each other?
A.
IP address
and subnet mask
B.
default gateway
C.
all of the above
214.
The Windows Net BIOS name resolution protocol?
A.
DNS
B.
WINS
C.
NDIS
215.
The IEEE standard for
wireless networks
?
A.
802.2
B.
802.11
C.
802.8
216.
SLIP supports ___?
A.
TCP/IP
B.
NetBEUI
C.
all of the above
217.
The propose
d IPv6 standard is designed to dramatically extend the
present limit of 4 billion IP addresses by using ___ bits instead of
the present 32 bit IP addresses in use today?
A.
64 bit
B.
128 bit
C.
256 bit
218.
You are installing cables for an Ethernet network in an office.
The
office manager doesn't want the media hanging in the crawl
spaces and drop ceiling and wants you to share an existing
conduit that already has telephone cables to hide the network
cables you are installing. The cable segments will not be over 100
m. W
hich type of media should you choose?
A.
coaxial
B.
UTP
C.
fiber optic
219.
Arc Net was originally setup to operate at ___ Mbps?
A.
10 Mbps
B.
2.5 Mbps
C.
100 Mbps
220.
Besides Token Ring ___ also uses tokens?
A.
Arc Net
B.
FDDI
C.
all of the above
221.
Running performance monitor your CPU usage a
verages 45%
except when you load an
application
and it surges to 100%.Is
there a problem?
A.
yes, your CPU needs an upgrade or multiple CPUs may have
to be installed
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
12
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
B.
yes, but it is not the CPU, you need more RAM
C.
no, its normal for the %usage to surge when lo
ading
an
application
222.
Interface between
the computer
and POTS?
A.
ATAPI
B.
SONET
C.
TAPI
223.
The following protocols are supported by RAS?
A.
TCP/IP
B.
NetBEUI
C.
all of the above
224.
Which architecture is recommended under high network utilization
of up to 70% or 80%?
A.
Ethernet bus
B.
Token Ring
C.
DLC
225.
A token
-
ring network has a maximum limit of ___ computers?
A.
1024
B.
260
C.
512
226.
Dial
-
up protocol used when a secure connection is desired?
A.
PPP
B.
SLIP
C.
PPTP
227.
Your
IP address
is 135.72.14.43.What portion of this
IP
address
identifies your network ID?
A.
135
B.
135.72
C.
135.72.14
228.
Allows users to
connect
to a remote network with a PPP dial
-
up
connection?
A.
RAS
B.
SAP
C.
SONET
229.
Which of the following protocols need to be installed on your
client's NT system before DHCP and DNS can be enabled?
A.
TCP/IP
B.
IPX/SPX
C.
NetBEUI
230.
A router u
ses ___ addressing to choose its path?
A.
physical
B.
logical
C.
system
231.
A ___ is used to
connect
two pieces of 10Base2
coaxial
cable
together?
A.
T
-
connector
B.
barrel
connector
C.
patch cable
232.
One reason the ATM WAN protocol is faster than Frame Relay is
because its packets
are a ___ size which allows them to be
switched and routed more easily?
A.
variable
B.
fixed
C.
compressed
233.
SQL is used to ___?
A.
access databases
B.
setup the
default gateway
C.
identify a defective NIC
234.
Which of the following is a routable protocol?
A.
LAT
B.
NWLink
C.
DLC
235.
Uses to
ken passing?
A.
Frame Relay
B.
ArcNet
C.
ATM
236.
For Cat 5 UTP, patch cables from the wall outlet to
the
computer
can be a maximum of ___ m?
A.
1
B.
3
C.
10
237.
The static text file ___ and DNS contain similar names and IP
addresses?
A.
LMHOSTS
B.
HOSTS
C.
WINS
238.
Increases the data rate of mo
dems?
A.
encryption
B.
compression
C.
synchronization
239.
Wireless technology commonly used to
connect
workstations that
are all located in a single room?
A.
IrDA
B.
microwave
C.
SONET
240.
Your customer has a client/ server Ethernet network consisting of
a server and 225 computers
running Win NT4.What kind
of
security
would you recommend to him for centralized control of
access to files and directories on the network?
A.
use a password for each file and groups for each directory
B.
use a password for each file and directory shared
C.
setup g
roups of shared resources and users who have access
to these groups
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
13
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
241.
Characteristic of an IEEE 802.3 10BaseT Ethernet
network
?
A.
BNC T
-
connectors
B.
RJ
-
11
C.
UTP
242.
You suspect a faulty NIC is causing a broadcast storm in
a
network. What troubleshooting tool w
ould you use to locate
which computer has the defective NIC?
A.
VOM
B.
protocol analyzer
C.
TDR
243.
A dial
-
up protocol that does not support automatic IP addressing
using DHCP?
A.
PPP
B.
DLC
C.
SLIP
244.
Of the two
types of
routers the one that uses the discovery process
to create i
ts routing table?
A.
static
B.
dynamic
C.
multiplexed
245.
Your client's NT server has been having trouble booting.Where
should you look first for some answers?
A.
performance monitor
B.
event viewer
C.
SNMP
246.
Another fast non
-
routable protocol with low overhead developed by
DEC?
A.
ATM
B.
LAT
C.
SPX
247.
You are hired to setup a 100Mbps Ethernet
network
for a client in
an office that already has cat 3 UTP installed. Your client wants to
keep the costs to a minimum but needs the 100Mbps throughput.
What should you recommend?
A.
keep the existing ca
ble but purchase 100Mbps hubs
B.
keep the existing cable but use 100Mbps patch cable from
the
wall
outlet
C.
new cat 5 UTP and if not already installed 100 Mbps hubs and
100 Mbps NICs
248.
Your client's 10BaseT Ethernet
network
using NetBEUI wants to
access data on a
n IBM mainframe. What device will allow this
connection?
A.
bridge
B.
gateway
C.
router
249.
Of the following protocols which is the fastest?
A.
TCP/IP
B.
IPX/SPX
C.
UDP/IP
250.
Access
to files
and folders in Win 2000 is accomplished using
___?
A.
compression
B.
tunneling
C.
permissions
251.
What
happens when a device is disconnected from the middle of a
BUS network?
A.
The hub will propagate error messages to
the rest
of the
network
B.
All devices on the network will fail
C.
The Server will stop responding to that device
D.
Data will not be able to get to dev
ices on
the other side
of this
device
E.
If a bridge is on the network, only that segment will be
effected
252.
Why is there a limit to the number of MAUs that can be connected
together in a standard Token
-
ring network?
A.
Too many
MAUs would exceed the cable limits
imposed by
the Token Ring specification
B.
Too many
MAUs would create to large of a collision domain
for communications to take place
C.
Too many
MAUs require more electricity than the devices can
support
D.
Too many
devices connected through MAUs requires more
tim
e to get control of the token that communications becomes
unacceptable
E.
There is no limit to the number of MAUs a token ring network
can support
253.
How many devices can communicate simultaneously within a
Token
-
ring LAN?
A.
One for each MAU on the LAN
B.
One
C.
Two
D.
As
many devices as the administrator defines within the NOS
E.
Between 1 and 5 if the ring speed is 16mbp/s
254.
What are three common items that must be configured correctly
when installing a
Network Interface Card
(NIC)?
A.
PCI or ISA slot
B.
IRQ setting
C.
DMA Address
D.
Driv
er
E.
I/O Address
255.
When troubleshooting connection problems you can confirm that
physical layer devices are communicating by visually inspecting
_______________ on the NIC and hub.
A.
Cross over cable
B.
The Link
-
Lights
C.
The electrical connection
D.
The Patch cable
E.
The
power light
256.
What is the name of a common test performed on a NIC with
vendor supplied diagnostic software?
A.
NIC Test
B.
Diagnostic Test
C.
PING
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
14
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
D.
Loopback
E.
NICBack
257.
Name two driver interfaces that allow a NIC to communicate
on
more than one
protocol.
A.
NDIS
B.
NetBEUI
C.
Net
BIOS
D.
ODI
E.
UNIX
258.
Bridges operate at the _____________ OSI level.
A.
The Data
-
Link Layer
B.
Top Layer
C.
The Transport Layer
D.
The Session Layer
E.
The Network Layer
259.
What bridging method is commonly used in Ethernet with only one
bridge.
A.
Collision
B.
Routing
C.
Transparent
D.
Spanni
ng Tree
E.
Open Shortest Path First (OSPF)
260.
Where are bridging address tables maintained when using source
-
route bridging?
A.
In routing tables on the hard drive
B.
In routing tables in RAM
C.
In routing tables in ROM
D.
At each PC on the network
E.
On special routing device
s
261.
Can switching hubs propagate broadcast packets on the network?
A.
Yes
B.
No
262.
How many
physical
addresses can be assigned to a NIC?
A.
One
B.
Two
C.
Three; One by the IEEE, one by the NIC vendor, and one by
the
Network Administrator
D.
Depends on the NOS
E.
Depends on the NIC
driver
263.
What are the two types of routing connections?
A.
Token passing
B.
Connectionless
C.
Reliable
D.
Connection Orientated
E.
Unreliable
264.
What type of routing connection would typically fragment data
packets?
A.
Connection Orientated
B.
Cut
-
Through
C.
Reliable
D.
Connectionless
E.
St
atic
265.
What name is given to Novell's client software loaded on the
workstation, and what feature does it provide that earlier versions
of the Generic Windows client do not offer?
A.
NETX
B.
Client for NetWare Networks
C.
Client32
D.
Support for NetWare Print Queues
E.
Sup
port for NetWare
Directory Services
266.
If two computers are assigned the same IP address then ___?
A.
neither computer will be able to
connect
B.
the first
computer to sign on will be able to
connect
the other
will not
C.
both computers will be able to
connect
to the
local network but
not to the internet
267.
The
physical
address assigned by the NIC manufacturer?
A.
subnet mask
B.
IP address
C.
MAC address
268.
Similar to WINS in that it resolves Net BIOS names into IP address
but stores this information in a text file?
A.
LMHOSTS
B.
DLC
C.
DNS
269.
A
small peer to peer network uses ___ security?
A.
user
-
level
B.
share
-
level
C.
permissions for
270.
The TCP/IP protocol used on the internet allows for approximately
___ billion unique IP addresses?
A.
1
B.
4
C.
10
271.
A.
IPCONFIG
B.
TRACERT
C.
PING
272.
NDIS operates at which layer of the OSI
model?
A.
presentation
B.
data
-
link
C.
network
273.
When
checking
the TCP/IP protocol you have just finished
installing for connectivity the proper first step it to ___?
A.
PING another computer on that segment
B.
PING 127.0.0.1
C.
PING the default gateway
274.
As data travels down t
he OSI layers it reaches the ___ layer which
is responsible for its bit conversion and actual transmission to
other computers?
A.
network
A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance
6, Utsav Complex, Shivaji Road Meerut
(O) 4003132 (M) 9837464507,
9837253111
15
I.T. SPECIAL
Networking
E:/ Gupta Classes work /edited By
Sunil Singh
ANSWER SHEET
B.
application
C.
physical
1
A
26
C
51
C
76
C
101
C
126
C
2
27
C
52
B
77
C
102
B
127
B
3
D
28
C
53
A
78
C
103
C
128
A
4
D
29
B
54
B
79
B
104
C
129
C
5
D
30
A
55
B
80
A
105
C
130
C
6
A
31
A
56
A
81
C
106
B
131
C
7
A,C,D
32
D
57
C
82
B
107
A
132
B
8
A
33
B
58
A
83
A
108
A
133
C
9
A
34
D
59
B
84
B
109
B
134
C
10
B
35
A
60
A
85
A
110
C
135
B
11
D
36
A
61
A
86
C
111
C
136
C
12
D
37
B
62
B
87
C
112
B
137
C
13
A,C,D
38
C
63
B
88
C
113
B
138
B
14
A
39
A
64
B
89
C
114
C
139
B
15
D
40
C
65
B
90
A
115
C
140
A
16
B,C
41
**
66
C
91
B
116
A
141
B
17
B
42
B
67
A
92
B
117
C
142
C
18
D
43
C
68
B
93
C
118
A
143
B
19
B
44
D
69
C
94
B
119
B
144
20
C
45
A
70
C
95
B
120
B
145
B
21
B
46
B
71
**
96
C
121
C
146
B
22
C
47
A
72
A
97
C
122
C
147
C
23
D
48
A
73
C
98
B
123
B
148
C
24
D
49
B
74
A
99
C
124
A
149
B
25
B
50
A
75
B
100
C
125
B
150
A
151
C
176
C
201
B
226
C
251
B
152
B
177
C
202
B
227
B
252
D
153
B
178
B
203
C
228
A
253
B
154
B
179
C
204
C
229
A
254
B,C,D,E
155
C
180
B
205
B
230
B
255
B
156
A
181
C
206
A
231
B
256
D
157
C
182
C
207
C
232
B
257
D,A
158
C
183
C
208
B
233
A
258
A
159
C
184
B
209
A
234
B
259
C
160
B
185
C
210
B
235
B
260
A
161
A
186
C
211
C
236
B
261
A
162
E,C
187
B
212
A
237
B
262
A
163
A
188
A
213
A
238
B
263
D,B
164
E,B
189
C
214
B
239
A
264
D
165
C,A
190
B
215
B
240
C
265
C,E
166
D
191
***
216
A
241
C
266
B
167
B
192
B
217
B
242
B
267
C
168
D
193
C
218
C
243
C
268
A
169
B
194
C
219
B
244
B
269
B
170
195
B
220
C
245
B
270
B
171
B
196
C
221
C
246
B
271
****
172
C
197
A
222
C
247
C
272
B
173
A
198
C
223
C
248
B
273
B
174
C
199
A
224
B
249
C
274
C
175
B
200
C
225
B
250
C
275
Enter the password to open this PDF file:
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Preparing document for printing…
0%
Σχόλια 0
Συνδεθείτε για να κοινοποιήσετε σχόλιο