A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

blackstartΔίκτυα και Επικοινωνίες

26 Οκτ 2013 (πριν από 4 χρόνια και 13 μέρες)

135 εμφανίσεις


A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
1

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh

1.

You

install

File and Printer Sharing for Microsoft Networks. You
share a folder and leave the password option blank. Who can gain
access to the folder

A.

Anyone who can gain access to your network and has a
Microsoft redirector such as the Client for Microsof
t Networks
installed.

B.

Windows 98 will not allow a blank password in this field.

C.

Anyone with Internet Explorer installed.

D.

Only users that are members of the same workgroup as you.

2.

The figure below shows a typical Home Network Setup. Identify
the network com
ponents marked in red.


A: Cable/DSL Modem

B: CAT 5 Ethernet cable

C: Wireless Signal

E: Wirelss Router

3.

Some protocols are considered to be technically non
-
routable.
Which of the following statements best describes the most
common reason why a protocol would be considered non
-
routable

A.

It does not contain the appropriate Data Link layer information
required
by routers.

B.

It uses advanced

Transport

layer services to move across the
Internet and avoids the routing overhead required by the more
primitive networking protocols.

C.

It defines Physical layer network addresses for internal
routing.

D.

It does not specify the

Network layer addresses required by
routers.

4.

What is the binary network ID of the loop back IP address

A.

1

B.

10101010

C.

0

D.

1111111

5.

You are the LAN administrator for your company. You have
couple

Windows 2000
Professional clients that dial in via PPP to
the compa
ny network’s RAS server. You want the remote clients to
be assigned dynamic IP addresses. You reserve a pool of class B
addresses for these clients. Upon connecting, you find that
the

Windows 2000

computers are using a subnet mask of all
255s.What should y
ou do

A.

Run ipconfig with the /release and /renew switch on the client

B.

Run ipconfig with the /renew_all switch on the client

C.

Run winipcfg on the client

D.

Do nothing.This is normal

6.

You are

configuring

a router. According to the manual, you will
need a transceiv
er to
connect

to the LAN ports of the router. What
kind of physical interface does the router have

A.

MSAU

B.

RJ
-
11

C.

AUI

D.

BNC

7.

Which of the following are connectionless protocols.(Choose the
three best answers.)

A.

IP

B.

SPX

C.

IPX

D.

UDP

8.

How can Jim Herr, a client on an NT TC
P/IP network see which
remote hosts are currently connected using NBT

A.

Use NBTSTAT

B.

Use NETSTAT

C.

Use NSLOOKUP

D.

Use IPCONFIG

9.

You are setting up a new Windows 98 workstation on your
network, and your DHCP server provides all of the normal TCP/IP
configuration in
formation. What must you do

to configure

the IP
address on the workstation after you add the TCP/IP protocol

A.

The DHCP option is enabled automatically, and the server will
auto
-
configure everything.

B.

Find out what the subnet mask on your network is, and add
this information only.

C.

Manually

enter an IP address that is not in use on the
network.

D.

Put the address of the router in the default gateway, and put
all 0s in the IP field.

10.

Which of the following is considered a Network Attached Storage
device

A.

A 60 GB DAT
tape drive attached to the Network Server

B.

A file server with special software that is at a separate location
from the departmental file server

C.

In a Windows NT environment, it would be the Backup
Domain Controller

D.

A high speed specialized sub
-
network attach
ed to the
enterprise

11.

Credit card size, designed for notebooks, self
-
configuring, and
non
-
OS dependent describes which PC bus architecture

A.

PCI

B.

ISA

C.

EISA

D.

PCMCIA

12.

What protocol is used between E
-
Mail servers

A.

HTTP

B.

POP3

C.

SNMP

D.

SMTP

13.

When installing a

manually

config
ured adapter, what information
must you know to avoid resource conflicts

A.

IRQ

B.

Number of bits

C.

Base I/O port address

D.

Base Memory address

14.

Which of the following OSI layers is responsible for identifying
communications partners

A.

Application

B.

Session

C.

Network

D.

Prese
ntation

15.

A broadcast message is an example of which dialog control
method

A.

Half duplex

B.

Base band

C.

Broadband

D.

Simplex

16.

Which of the following are used to resolve Windows Net BIOS
names to IP addresses

A.

DNS

B.

WINS

C.

L M hosts file

D.

Hosts file

17.

What is a router

A.

A hardwar
e device that connects dissimilar networks, such as
Cat 5 cabling and FDDI

B.

A network host that reads the source and

destination

addresses
in the packet header and makes decisions about where to
forward the packet

C.

A network host that can forward LAN
-
based e
mail messages
onto the Internet, after repackaging them into the SMTP format

D.

A software system that can translate between dissimilar
networks such as Ethernet and Token Ring

18.

Which of the following is Class C IP address?


A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
2

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh

A.

10.10.14.118

B.

135.23.112.57

C.

191.200.1
99.199

D.

204.67.118.54

19.

A Windows 95 user complains that she cannot

connect

to any
other computers on her local subnet even when using the IP
address to communicate. However, she can ping 127.0.0.1 and
receive a reply. Other users on her subnet do not report
having
any trouble. All client computers on the network are WINS
-
enabled. What is the most probable cause of the problem?

A.

The TCP/IP stack is not installed properly

B.

The subnet mask is not correct, check whether the subnet
mask is configured correctly.

C.

The

default gateway

is not configured properly.

D.

The computer

is not configured to use LMHOSTS

20.

WINS or ___ may be used for Net BIOS name resolution?

A.

HOSTS

B.

DNS

C.

LMHOSTS

21.

You have

set up a server

that connects to an

Internet services
provider

(ISP) over ISDN line.
How should the

default
gateway

address be configured so that windows 95 users on the
local network can access

the Internet

through the RAS server. The
RAS server is located on the same subnet as that of the WIN95
machines.

A.

The

default Gateway

address on WI
NS95 must specify the IP
address of the remote ISP

B.

The

default Gateway

on WN95 must specify the IP address of
the RAS server on the local network.

C.

The HOSTS file in WIN95 machines must be configured with
the host name of the RAS Server.

D.

The HOSTS file in W
IN 95 machines must be configured with
the host name of the ISP

22.

Which of the following is the standard adopted for Ethernet
CSMA/CD by IEEE Committee?

A.

802.2

B.

802.1d

C.

802.3

D.

802.5

23.

Disk Striping with Parity corresponds to which RAID level?

A.

RAID 0

B.

RAID 1

C.

RAID 3

D.

RAID 5

24.

Which of the following media types is most susceptible to EMI?

A.

Fiber Optic

B.

STP

C.

Co
-
axial

D.

UTP

25.

Which type of connector does a 10BaseT Ethernet cable use?

A.

BNC

B.

RJ
-
45

C.

RJ
-
11

D.

MSAU

26.

Which of the following is suitable for mission critical and time
sensitive

ap
plications
?

A.

10BaseT

B.

10Base2

C.

Token Ring

D.

Mesh

27.

What is the default subnet mask for Class C network?

A.

255.0.0.0

B.

255.255.0.0

C.

255.255.255.0

D.

255.0.255.0

28.

Which of the following network topologies have each computer
connected to a central point?

A.

Bus

B.

Ring

C.

Star

D.

Mesh

29.

W
hich of the following network topologies is the most fault
tolerant?

A.

Bus

B.

Mesh

C.

Star

D.

Ring

30.

A Bus network topology is best described as which of the
following?

A.

All computers are attached to a single cable in a chain style

B.

All computers are connected to a centr
al point

C.

All computers are connected to every other computer or
resource in the network

D.

Fault Tolerant

31.

A Ring network topology provides two links from each computer. A
link in and a link out.

A.

True

B.

False

32.

Which connector is often used with Thinnet cable?

A.

RJ
-
11

B.

AUI

C.

DIX

D.

BNC

33.

Which of the following media connectors are used in conjunction
with telephones?

A.

RJ
-
45

B.

RJ
-
11

C.

RJ
-
T

D.

None of the above are correct

34.

10BaseT Ethernet networks, most commonly use which of the
following types of cable?

A.

Fiber

B.

Coax

C.

STP

D.

UTP

35.

A Gateway
is able to connect network environments that are
dissimilar.

A.

True

B.

False

36.

AUI connectors are commonly associated with which of the
following items?

A.

A Vampire Tap

B.

Fiber Optic Cable

C.

10Base2

D.

Wireless Networks

37.

A hub works in conjunction with which of the followi
ng network
topologies?

A.

Ring

B.

Star

C.

Bus

D.

Mesh

38.

Which of the following is a correct MAC address?

A.

190.168.80.1

B.

www.certyourself.com

C.

08:34:FE:4C:F2:54

D.

G2:G3:23:87:GG

39.

A Hub operates at which of the following layers of the OSI model?

A.

Physical

B.

Session

C.

Transport

D.

Appli
cation

40.

Which of the following devices operate at the Data Link layer of the
OSI model?

A.

A Hub

B.

A NIC

C.

A Switch

D.

A Router





A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
3

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh


41.


A.

The

Physical

Layer

B.

The Data Link Layer

C.

The

Transport

Layer

D.

The

Network Layer

42.

A

Network Interface Card

operates at the

Network Layer

of

the

OSI model.

A.

True

B.

False

43.

Which of the following is the correct order of the

OSI model

from
bottom to top?

A.

Application
, Presentation, Session,

Transport, Network, Data
Link,

Physical

B.

Physical, Network, Data Link, Session,

Transport,

Application,
Presentat
ion

C.

Physical, Data Link, Network,

Transport, Session,
Presentation,

Application

D.

Application, Session, Presentation,

Transport, Network, Data
Link,

Physical

44.

What is the maximum speed of 10Base5 Ethernet cable?

A.

100 Mbps

B.

500 Mbps

C.

50 Mbps

D.

10 Mbps

45.

100Base
-
FX us
es which of the following types of cable?

A.

Fiber Optic

B.

Unshielded Twisted Pair

C.

Coax

D.

Shielded Twisted Pair

46.

Which of the following TCP/IP protocols is used to communicate
between a Web Browser and a Web Server?

A.

SMTP

B.

HTTP

C.

UDP

D.

POP3

47.

Which of the following layers

of the

OSI model

does a Bridge
operate in?

A.

The Data Link Layer

B.

The

Network Layer

C.

The

Transport

Layer

D.

The Session Layer

48.

While reviewing the security logs for your server, you notice that a
user on the Internet has attempted to access your internal mail
ser
ver. Although it appears that the user's attempts were
unsuccessful, you are still very concerned about the possibility that
your systems may be compromised. Which of the following
solutions are you most likely to implement?

A.

A firewall system at the connec
tion point to the Internet

B.

A more secure password policy

C.

File
-
level encryption

D.

Kerberos authentication

49.

A server has two NIC cards installed. The first one uses IRQ 10
and I/O range of B800
-
B81F.The second uses IRQ 10 and I/O
range of D700
-
D80A.What action,

if any, should be taken?

A.

No action is required.

B.

Locate any available IRQ to resolve the IRQ conflict.

C.

Locate any available I/O range to resolve the I/O conflict.

D.

Change the I/O of the second NIC to B800
-
B81F.

50.

Which of the following IEEE 802 standards pert
ain to token ring?

A.

IEEE 802.5

B.

IEEE 802.3

C.

IEEE 802.2

D.

IEEE 802.11

51.

Protocol that is often used to facilitate communications with an IBM
mainframe?

A.

NetBEUI

B.

RIP

C.

DLC

52.

Which of these protocols provide fast connectionless
communications that relies on upper layers
of the OSI model for
error correction?

A.

TCP (Transmission Control Protocol)

B.

UDP (User Datagram Protocol)

C.

SPX

53.

Can be used to reduce traffic bottlenecks in a NetBEUI network?

A.

bridge

B.

router

C.

gateway

54.

You have just finished the installation of two computers on a
28
computer network using Novell's IPX/SPX. Both computers
initialize with no error messages yet they cannot contact other
computers on the network. All other computers are functioning
normally. You probably have an ___?

A.

incorrect IRQ

B.

incorrect frame type

C.

invalid IP setting

55.

Uses amplifiers to regenerate analog signals?

A.

baseband

B.

broadband

C.

fiber
-
optic

56.

Uses single frequency digital signals?

A.

baseband

B.

broadband

C.

multiband

57.

You are hired to investigate a slow performing network server for a
client.Using the perform
ance monitor you obtain the following
readings: CPU usage= 25%, Disk time= 25%, Page faults/sec=
25.What one change will increase the performance of this network
server the most?

A.

buy another CPU

B.

add another hard drive

C.

increase RAM

58.

Which of the following sh
ould you check if you can connect using
the IP address but NOT with the host name?

A.

DNS

B.

WINS

C.

DHCP

59.

The fastest method of transporting data with a switch?

A.

store and forward

B.

cut through

C.

loop back


A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
4

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh

60.

Although NOT fault tolerant this RAID level is often used when o
ne
wants the highest level of performance?

A.

RAID 0

B.

RAID 1

C.

RAID 5

61.

Four _____ are used in the 5
-
4
-
3 rule of 10Base2 networking?

A.

repeaters

B.

segments

C.

routers

62.

You have just finished installing an Ethernet PCI NIC (
network
interface card
) in a client's computer.
T
he computer

initializes
successfully and has no apparent

hardware problems
. The
computer

however is not able to communicate with other
computers on this NetBEUI network. All other client computers are
able to communicate. What is the most likely cause of t
his
problem?

A.

IRQ conflict

B.

incorrect transceiver setting

C.

incorrect frame type

63.

The two key components of a digital signature include the secure
hash algorithm and a ___ ?

A.

blowfish value

B.

certificate authority

C.

IP Sec

64.

The Microsoft version of Novell's IPX/SPX p
rotocol?

A.

ODI

B.

NW Link

C.

DLC

65.

Utility used to run

applications

on a computer at a remote location?

A.

ODI

B.

Telnet

C.

ARP (Address Resolution Protocol)

66.

Topology that offers the highest level of redundancy, is easy to
troubleshoot but is expensive to

install
. It is the
topology of the
internet?

A.

star

B.

ring

C.

mesh

67.

Ordinary telephone wire has a thickness of AWG 22.Of the
following which is the thickest wire?

A.

AWG 14

B.

AWG 28

C.

AWG 32

68.

Backup method which clears the archive bit and is the shortest to
perform but takes the longest to
restore?

A.

full

B.

incremental

C.

differential

69.

Which of the following protocols map a logical address to a MAC
(Media Access Control) address?

A.

DNS

B.

WINS

C.

ARP

70.

The major limiting factor for how long a cable can be in a segment
is ___?

A.

collisions

B.

EMI

C.

attenuation

71.


A.

regis
try

B.

boot files

C.

all of the above

72.

Equipment that is designed to help identify breaks and shorts in
cables?

A.

TDR

B.

performance monitor

C.

SNMP

73.

Which company developed the Unix

Operating System
?

A.

Sun

B.

Microsoft

C.

ATT

74.

To start a Win 2000 Prof computer in the safe mode pr
ess ___ at
startup?

A.

F8

B.

Ctl and Esc

C.

F1

75.

A bridge filters traffic using which type of address?

A.

IP address

B.

MAC address

C.

TCP address

76.

A large network with 500 users notice that at specific times in the
morning and afternoon network congestion ties up their comput
ers.
What is the most likely cause?

A.

power fluctuations

B.

a terminator is not grounded

C.

many users are logging on or off

77.

A ___ is created when a unique IP address and port number are
used to

connect

two computers?

A.

SAP

B.

media

transfer

coefficient

C.

socket

78.

During d
isaster recovery of a Win 2000 Prof computer if you
"Enable Boot Logging" the file ___ is saved to the C:
\
winnt folder
for analysis?

A.

setuplog.txt

B.

bootlog.txt ntbtlog.txt

79.

Which of these WAN (Wide Area Network) protocols is the fastest?

A.

Frame Relay

B.

ATM

C.

X.25

80.

The only files on a Win 2000 Prof Emergency Repair Disk (ERD)
are autoexec.nt, config.nt, and setup.log?

A.

True

B.

False









A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
5

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh



81.

OSI layer responsible for mail and

file transfers
?

A.

transport

B.

data link

C.

application

82.

A protocol that functions at the network layer o
f the OSI model?

A.

TCP

B.

IP

C.

SPX

83.

A major advantage of ___ in an NT network is centralized security
and administration?

A.

user
-
level security

B.

share
-
level security

C.

RAID 5

84.

OC
-
1 has a transmission rate that is close to ___ ?

A.

T
-
1

B.

T
-
3

C.

ISDN

85.

The maximum number of populat
ed segments allowed in an
Ethernet network?

A.

3

B.

4

C.

5

86.

Using the TCP/IP protocol if the

destination

of the packet is outside
the subnet then the packet is sent to the ___?

A.

switch

B.

bridge

C.

default gateway

87.

Entry in DNS to identify your mail server?

A.

IDC

B.

TU

C.

MX

88.

Toplol
ogy which is the least expensive to

install
?

A.

ring

B.

star

C.

bus

89.

Utility which can be used to identify bottlenecks in the network?

A.

PING

B.

WINIPCFG

C.

TRACERT

90.

What is the first octet range for a class A IP address?

A.

1
-

126

B.

1
-

128

C.

1
-

191

91.

After you setup the

IP address

a
nd subnet mask your FIRST
test

should be

with ___?

A.

tracert to a known good server

B.

ping 127.0.0.1

C.

ping another computer on your

segment

92.

Net BIOS computer names can have up to ___ characters?

A.

256

B.

15

C.

20

93.

Refers to the part of the network that is separated by r
outers,
bridges, or switches?

A.

partition

B.

node

C.

segment

94.

Data is organized into FRAMES for transmission at this OSI level?

A.

physical

B.

data
-
link

C.

network

95.

10 Base 2 coaxial has a limit of ___ computers per

segment?

A.

2

B.

30

C.

100

96.

Cable used for ArcNet networks?

A.

RG
-
58

B.

RG
-
59

C.

RG
-
62

97.

A Class A

IP address

uses the last ___ octet(s) for the host ID.
The host ID is the unique part and identifies the individual user and
part of the reason 50% of all IP addresses are Class A?

A.

one

B.

two

C.

three

98.

Of the three (3) RAID levels used by a Win

2000 server choose the
one(s) that is/are fault tolerant?

A.

0, 1, and 5

B.

1 and 5

C.

5

99.

The best method to restore the latest copy of the registry in a Win
2000 Server is to select the ___?

A.

Emergency Repair Disk (ERD)

B.

Recovery Console

C.

Last Known Good Configuratio
n

100.

What

routing protocol

counts hops to the

destination

along multiple
paths to determine the most efficient route?

A.

ARP

B.

DLC

C.

RIP

101.

The source

and

destination

addresses are stored in the ___ of a
packet?

A.

data


A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
6

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh

B.

trailer

C.

header

102.

Most commonly used type of modem?

A.

syn
chronous

B.

asynchronous

C.

external

103.

Operates at the network layer of the OSI model?

A.

bridge

B.

gateway

C.

router

104.

Disk duplexing (RAID 1) requires a minimum of ___?

A.

2 hard drives and 1 controller

B.

3 hard drives and 2 controllers

C.

2 hard drives and 2 controllers

105.

Organizat
ion responsible for the OSI model?

A.

ANSI

B.

IEEE

C.

ISO

106.

Which

topology

uses the least amount of cabling?

A.

star

B.

bus

C.

ring

107.

According to RFC 1918 this range of Class A IP addresses are
reserved for private intranets and are not supposed to be used on
the internet (whe
re x is any number from 1 to 254)?

A.

10.x.x.x

B.

20.x.x.x

C.

30.x.x.x

108.

Cable classification for 10Base5 thicknet coaxial?

A.

RG
-
8

B.

RG
-
10

C.

RG
-
58

109.

Dial
-
up protocol that uses a virtual private network (VPN)?

A.

SLIP (Serial Line

Internet Protocol
)

B.

PPTP (Point
-
to
-
Point Tunnelin
g Protocol)

C.

PPP (Point to Point Protocol)

110.

Type 9 ___ rated

coaxial cable

should be installed in drop ceilings
to conform to fire code regulations?

A.

SPF

B.

PVC

C.

plenum

111.

The best

device

to use when monitoring a broadcast storm?

A.

TDR

B.

Digital Voltmeter

C.

Protocol Analy
zer

112.

Class A

IP addresses

can accomodate 16 million hosts while a
Class B can accomodate ___?

A.

254

B.

65,534

C.

4 million

113.

SNMP relies on the information found in ___ to chart and graph
components of the network for analysis and troubleshooting?

A.

SMPs

B.

MIBs

C.

SAPs

114.

Pres
cribes the greatest packet octet length that can be
transmitted?

A.

SAP

B.

subnet mask

C.

MTU

115.

The default protocol on NT4 or Win 2000 servers?

A.

IPX/SPX

B.

NWLink

C.

TCP/IP

116.

A standard security algorithm developed in 1975 that uses 56
-
bit
symmetric key encryption?

A.

DES

B.

EAP

C.

P
AP

117.

Win 2000 security service that maintains permissions
and

passwords

used to logon?

A.

MMPE

B.

CHAP

C.

SAM

118.

A voice

grade

demand priority standard developed by HP that is
capable of 100Mbps transmissions?

A.

100VG
-
AnyLAN

B.

100BaseT

C.

100BaseFX

119.

PPP is part of the ___ OSI l
ayer?

A.

physical

B.

data link

C.

network

120.

Network connection

device

that is capable of sending packets
along multiple paths depending on which path is the most
efficient?

A.

bridge

B.

router

C.

all of the above








A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
7

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh




121.

client
.Saving the

client

the extra hard drive space he

would need
for the

application

as well as the CPU processing time?

A.

file server

B.

print server

C.

application

server

122.

The static HOSTS text file used on UNIX systems that requires
manual entries by the administrator was the precursor of
___.Today the HOSTS file
system finds use mainly in maximum
security operations which don't want anything changed
automatically?

A.

WINS

B.

LMHOSTS

C.

DNS

123.

The minimum category of UTP cable that will meet the 10BaseT
standard?

A.

cat2

B.

cat3

C.

cat5

124.

The easiest protocol to setup?

A.

NetBEUI

B.

NWLink

C.

TCP
/IP

125.

Displays data on hardware components such as memory, CPU,
and the hard drive in a chart or graph which describes how these
devices are operating?

A.

protocol analyzer

B.

performance monitor

C.

network monitor

126.

The OSI layer responsible for name recognition, secu
rity logins,
and synchronization of the connection?

A.

presentation

B.

application

C.

session

127.

Has twenty
-
four 64 Kbps channels for a total of 1.544 Mbps
throughput?

A.

T3

B.

T1

C.

X.25

128.

Microsoft recommends that the %CPU usage should not be above
90% for a single CPU or abov
e __% for multiple processors for
any extended period?

A.

50

B.

70

C.

90

129.

Your customer's computer is loaded with peripherals and is using
COM1, COM2, LPT5, and LPT7.You

install

the NIC on IRQ3 and
have a conflict. Which of the following is the NIC conflicting with?

A.

the printer

B.

COM1

C.

COM2

130.

The most widely used protocol?

A.

NetBEUI

B.

NW Link

C.

TCP/IP

131.

Can be thought of as a "hop counter" determining how many hops
it takes along various paths to the destination and then telling the
router which is the one with the least number o
f hops which most
of the time is the quickest route?

A.

DLC

B.

SAP

C.

RIP

132.

Apple's Local Talk protocol has a ___ computer limit?

A.

8

B.

32

C.

128

133.

Ensures that one device is NOT overwhelmed by another with a
data transmission?

A.

SMB

B.

CRC

C.

flow control

134.

You are setting up a 10Base
2 Ethernet network for a client with
three segments. There are 20 computers in each segment. How
many terminators will you need for this network?

A.

1

B.

2

C.

6

135.

Used to connect different media types but cannot filter or segment
traffic?

A.

bridge

B.

hub

C.

router

136.

The most e
fficient way to control security in a client/ server
network is to assign permissions to ___?

A.

each shared resource

B.

directories

C.

groups

137.

Which of the following IRQs can you set your NIC to without
usually causing a conflict?

A.

4

B.

7

C.

10

138.

Arc Net is one of the oldes
t protocols used. What year was it
invented?

A.

1967

B.

1977

C.

1987

139.

OSI layer that determines whether the transmission is a full or half
-
duplex transfer?

A.

presentation

B.

session


A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
8

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh

C.

application

140.

Compensates for a hard drive failure on an NT server?

A.

RAID

B.

WINS

C.

DHCP

141.

Active D
irectory

to boot from an RIS server in Win 2000

requires
a
___ compliant NIC?

A.

RAS

B.

PXE

C.

SAP

142.

The most popular dial
-
up protocol?

A.

SLIP

B.

UDP

C.

PPP

143.

The standard for several hubs connected in a linear fashion
(token
-
bus)?

A.

802.3

B.

802.4

C.

802.5

144.

The minimum number of disks

required to implement a fault
tolerant RAID system?

A.

1

B.

2

C.

3

145.

For increased security Win 2000 enables encryption of files or
folders on ___ volumes?

A.

FAT32

B.

NTFS

C.

either FAT32 or NTFS

146.

Characteristic of the TCP protocol?

A.

fast but unreliable delivery

B.

best effort d
elivery

C.

assurance

of packet delivery

147.

Cable type that offers the least resistance to EMI ?

A.

coaxial

B.

fiber
-
optic

C.

UTP

148.

Novell introduced TCP/IP as its default protocol in NetWare ___ ?

A.

3.x

B.

4.x

C.

5.x

149.

This OSI layer packages bits into frames?

A.

physical

B.

data
-
link

C.

net
work

150.

Protocol used in Win 2000 to print to a URL on the internet.
It

requires

either Peer Web Services or a IIS server to be installed?

A.

IPP

B.

SAP

C.

IPSec

151.

Novell added ___ which could bind many protocols to a
NIC

starting

with NetWare 4.0?

A.

NDIS

B.

TSM

C.

ODI

152.

Port ___

is assigned to the SMTP?

A.

21

B.

25

C.

80

153.

You are setting up a local peer
-
to
-
peer network that will have
seven Win 98 computers. Internet access is not needed. Which
protocol should you use?


(NetBEUI is the best one but if its not listed then pick the one with
t
he lowest overhead)

A.

X.25

B.

NW Link

C.

TCP/IP

154.

Used for installing Win NT4?

A.

setup.exe

B.

winnt.exe

C.

win.com

155.

OSI layer responsible for error

checking

frames and adding MAC
addresses to its tables?

A.

presentation

B.

transport

C.

data
-
link

156.

The

initial

formation of the packet he
ader is started at this OSI
level?

A.

Application

B.

Session

C.

Physical

157.

For a Class C IP address the first ___ octet(s) are reserved for the
network ID?

A.

1

B.

2

C.

3

158.

Utility used

to check

SMTP connectivity?

A.

SNMP

B.

LMHOSTS

C.

Telnet

159.

Prevents bounce
-
back of signals in a 10Base2

network?

A.

T
-
connector

B.

BNC

C.

terminator

160.

A set of "rules" for network transmissions?

A.

topologies

B.

protocols

C.

gateways



A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
9

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh


161.

between two

or more network

segments
?

A.

The Spanning Tree Protocol

B.

The Inverted Tree Protocol

C.

The Transparent Tree Protocol

D.

The Domain Name

Tree
Protocol

E.

The Looping Bridge Protocol

162.

What are the two methods switching hubs use to

transport

data
between devices?

A.

Routing

B.

Forwarding

C.

Cut
-
through

D.

Active

E.

Store
-
and
-
forward

163.

What happens when a device is disconnected from the middle of a
BUS network?

A.

The hub

will propagate error messages to the rest of the
network

B.

All devices on the network will fail

C.

The Server will stop responding to that device

D.

Data will not be able to get to devices on

the other side

of this
device

E.

If a bridge is on the network, only that
segment will be
effected

164.

What are some advantages of a Client/Server network over a
Peer
-
to
-
Peer network?

A.

Performance is better on a Peer
-
to
-
Peer

B.

Security is better on a Client/Server

C.

Performance is better on a Client/Server

D.

Security is better on a Peer
-
to
-
Peer

E.

Client/Server is easier to administrate

165.

Name two protocols in the TCP/IP suite that function at
the

Transport

layer of the OSI model.

A.

TCP

B.

IP

C.

UDP

D.

SNMP

E.

ARP

166.

IP is responsible for sorting and _________________ of packets.

A.

Addressing

B.

Holding

C.

Organizing

D.

De
livery

E.

Verifying

167.

What is the first octet range for a class B IP address?

A.

127
-
191

B.

128
-
191

C.

192
-
223

D.

1
-
127

E.

128
-
255

168.

What is the first octet range for a class C IP address?

A.

1
-
126

B.

128
-
191

C.

192
-
225

D.

192
-
223

E.

192
-
255

169.

What method of transporting data with a switch is f
astest?

A.

Store
-
and
-
forward

B.

Cut
-
through

C.

Routing

D.

Spanning Tree

E.

Pass
-
Through

171.

The inner core of a coaxial cable that carries the signals is made of
___?

A.

aluminum

B.

copper

C.

zinc

172.

Active hubs can ___?

A.

route the signal using the most efficient path

B.

send an acknowledge
ment once the packet is received

C.

regenerate the signal like repeaters

173.

RAID 5 requires a minimum of __ hard drives?

A.

3

B.

4

C.

5

174.

What is an advantage of Cat 3 UTP cable instead of RG
-
58 A/U
coaxial?

A.

UTP supports longer cable segments

B.

UTP is less susceptible to EMI

C.

UTP is easier to

install

and less expensive

175.

A packet in a TCP/IP network whose

destination

is outside the
local network goes to the ___?

A.

TCP transceiver

B.

default gateway

C.

IP subnet

176.

One important difference between routers and bridges is that when
a bridge c
an't locate thedestination

address in its table it ___?

A.

sends the transmission to the

default gateway

B.

dumps the packet

C.

broadcasts

the transmission to all ports

177.

Novell's NetWare 5.0 was developed in part from the ___
standard?

A.

ATM

B.

NDIS

C.

X.500

178.

The freely dist
ributed open source Unix based

operating
system

that has gained in popularity recently?

A.

XP

B.

Linux

C.

DLC

179.

The term used to describe the physical layout of a network?

A.

protocol


A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
10

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh

B.

server

C.

topology

180.

Is the interface between the NIC drivers and MAC sublayer?

A.

WINS

B.

NDIS

C.

D
LC

181.

Which

topology

provides for equal access to the network for
all

computers
?

A.

star

B.

bus

C.

ring

182.

Using the TCP/IP protocol when is a subnet mask

required
?

A.

only when connecting outside the LAN

B.

only when using TCP/IP

C.

for both intranet and internet usage

183.

OSI level

that ensures error
-
free delivery of packets?

A.

data
-
link

B.

network

C.

transport

184.

The IEEE specification for a token ring network?

A.

802.3

B.

802.5

C.

802.6

185.

RIP counts hops (or routers it encounters) as the packet travels to
its

destination
. Another name for a hop is a __
_?

A.

interval

B.

sequence

C.

metric

186.

A protocol that functions at the

transport

layer of the OSI model?

A.

IP

B.

IPX

C.

SPX

187.

How many bits are there in an IP address?

A.

64

B.

32

C.

128

188.

An easy to configure, fast, and efficient protocol recommended for
small non
-
routable networks?

A.

Ne
tBEUI

B.

TCP/IP

C.

X.25

189.

What type of troubleshooting device examines the network at the
packet level?

A.

TDR

B.

VOM

C.

protocol analyzer

190.

Resolves

domain names

into IP addresses?

A.

DHCP

B.

DNS

C.

WINIPCFG

191.


A.


DLC

B.

SSL

C.

ARP

192.

Device

drivers

can be disabled in Win 2000 Prof in

Device
Man
ager

or by using the ___?

A.

ERD

B.

Recovery Console

C.

RDISK

193.

Smart Cards in Win 2000 use the ___ RAS authentication protocol
for security?

A.

PAP

B.

MSCHAP

C.

EAP

194.

Because of its low overhead this is the fastest of these protocols?

A.

TCP/IP

B.

NW Link

C.

NetBEUI

195.

The ERD made in the

Win 2000

Server Backup

utility contains the
files needed to boot

the computer
?

A.

True

B.

False

196.

Your client has a 10Base2 Ehternet network which is using 160m
of RG
-
58A/U cable and two 50 ohm terminators that are both
grounded. What is wrong with his network?

A.

t
he terminators should be 93 ohms

B.

he should be using RG
-
59/U cable

C.

only one terminator should be grounded

197.

Of the following the one that is NOT an alogorithm that determines
the shortest path for routers?

A.

SAP

B.

RIP

C.

OSPF

198.

The most common topology in use today am
ong corporate users?

A.

bus

B.

ring

C.

star
-
bus

199.

Uses a 93 ohm resistor?

A.

RG62

B.

RG58

C.

RG59

200.

OSI level responsible for compression and encryption of data?

A.

session

B.

application

C.

presentation







A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
11

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh


201.

Analog transmissions with multiple frequencies such as cable
television signa
ls use ___?

A.

baseband

B.

broadband

C.

multiband

202.

Network device which cannot be used to filter traffic
by

segmenting

a network?

A.

bridge

B.

hub

C.

switch

203.

RAID can be used in these network operating systems?

A.

NT

B.

Netware

C.

all of the above

204.

When multiple protocols are used in a

network ___ should

always
be

placed at the top of the binding order?

A.

TCP/IP

B.

IPX/SPX

C.

the one most frequently used

205.

The standard cabling type used in AppleTalk and Token Ring?

A.

UTP

B.

STP

C.

RG
-
58A/U

206.

Arrange these WAN technologies in chronological order beginning
w
ith the oldest?

A.

X.25, ISDN, ATM

B.

ISDN, X.25, ATM

C.

ATM, ISDN, X,25

207.

A crossover cable can be used to

connect
?

A.

a hub to a hub

B.

a computer to a computer

C.

all of the above

208.

The RJ
-
45

connector

used in UTP networks has ___ wires?

A.

2 pairs or 4

B.

4 pairs or 8

C.

6 pairs or
12

209.

Displays the IP configuration information on a Win NT computer?

A.

IPCONFIG

B.

WINIPCFG

C.

ARP

210.

Displays the IP configuration information on a Win 98 computer?

A.

IPCONFIG

B.

WINIPCFG

C.

WINS

211.

The IEEE 802 standards operate at these layers of the OSI
model?

A.

network and

tra
nsport

B.

session and presentation

C.

physical and data link

212.

Can be used to show only one

IP address

for multiple users on the
subnet?

A.

proxy server

B.

DHCP server

C.

DNS server

213.

What must be configured in TCP/IP for two computers on the
same segment to communicate with

each other?

A.

IP address

and subnet mask

B.

default gateway

C.

all of the above

214.

The Windows Net BIOS name resolution protocol?

A.

DNS

B.

WINS

C.

NDIS

215.

The IEEE standard for

wireless networks
?

A.

802.2

B.

802.11

C.

802.8

216.

SLIP supports ___?

A.

TCP/IP

B.

NetBEUI

C.

all of the above

217.

The propose
d IPv6 standard is designed to dramatically extend the
present limit of 4 billion IP addresses by using ___ bits instead of
the present 32 bit IP addresses in use today?

A.

64 bit

B.

128 bit

C.

256 bit

218.

You are installing cables for an Ethernet network in an office.

The
office manager doesn't want the media hanging in the crawl
spaces and drop ceiling and wants you to share an existing
conduit that already has telephone cables to hide the network
cables you are installing. The cable segments will not be over 100
m. W
hich type of media should you choose?

A.

coaxial

B.

UTP

C.

fiber optic

219.

Arc Net was originally setup to operate at ___ Mbps?

A.

10 Mbps

B.

2.5 Mbps

C.

100 Mbps

220.

Besides Token Ring ___ also uses tokens?

A.

Arc Net

B.

FDDI

C.

all of the above

221.

Running performance monitor your CPU usage a
verages 45%
except when you load an
application

and it surges to 100%.Is
there a problem?

A.

yes, your CPU needs an upgrade or multiple CPUs may have
to be installed


A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
12

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh

B.

yes, but it is not the CPU, you need more RAM

C.

no, its normal for the %usage to surge when lo
ading
an

application

222.

Interface between

the computer

and POTS?

A.

ATAPI

B.

SONET

C.

TAPI

223.

The following protocols are supported by RAS?

A.

TCP/IP

B.

NetBEUI

C.

all of the above

224.

Which architecture is recommended under high network utilization
of up to 70% or 80%?

A.

Ethernet bus

B.

Token Ring

C.

DLC

225.

A token
-
ring network has a maximum limit of ___ computers?

A.

1024

B.

260

C.

512

226.

Dial
-
up protocol used when a secure connection is desired?

A.

PPP

B.

SLIP

C.

PPTP

227.

Your

IP address

is 135.72.14.43.What portion of this

IP
address

identifies your network ID?

A.

135

B.

135.72

C.

135.72.14

228.

Allows users to

connect

to a remote network with a PPP dial
-
up
connection?

A.

RAS

B.

SAP

C.

SONET

229.

Which of the following protocols need to be installed on your
client's NT system before DHCP and DNS can be enabled?

A.

TCP/IP

B.

IPX/SPX

C.

NetBEUI

230.

A router u
ses ___ addressing to choose its path?

A.

physical

B.

logical

C.

system

231.

A ___ is used to

connect

two pieces of 10Base2

coaxial
cable

together?

A.

T
-
connector

B.

barrel

connector

C.

patch cable

232.

One reason the ATM WAN protocol is faster than Frame Relay is
because its packets

are a ___ size which allows them to be
switched and routed more easily?

A.

variable

B.

fixed

C.

compressed

233.

SQL is used to ___?

A.

access databases

B.

setup the

default gateway

C.

identify a defective NIC

234.

Which of the following is a routable protocol?

A.

LAT

B.

NWLink

C.

DLC

235.

Uses to
ken passing?

A.

Frame Relay

B.

ArcNet

C.

ATM

236.

For Cat 5 UTP, patch cables from the wall outlet to

the
computer

can be a maximum of ___ m?

A.

1

B.

3

C.

10

237.

The static text file ___ and DNS contain similar names and IP
addresses?

A.

LMHOSTS

B.

HOSTS

C.

WINS

238.

Increases the data rate of mo
dems?

A.

encryption

B.

compression

C.

synchronization

239.

Wireless technology commonly used to

connect

workstations that
are all located in a single room?

A.

IrDA

B.

microwave

C.

SONET

240.

Your customer has a client/ server Ethernet network consisting of
a server and 225 computers
running Win NT4.What kind

of
security

would you recommend to him for centralized control of
access to files and directories on the network?

A.

use a password for each file and groups for each directory

B.

use a password for each file and directory shared

C.

setup g
roups of shared resources and users who have access
to these groups







A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
13

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh




241.

Characteristic of an IEEE 802.3 10BaseT Ethernet

network
?

A.

BNC T
-
connectors

B.

RJ
-
11

C.

UTP

242.

You suspect a faulty NIC is causing a broadcast storm in
a

network. What troubleshooting tool w
ould you use to locate
which computer has the defective NIC?

A.

VOM

B.

protocol analyzer

C.

TDR

243.

A dial
-
up protocol that does not support automatic IP addressing
using DHCP?

A.

PPP

B.

DLC

C.

SLIP

244.

Of the two

types of

routers the one that uses the discovery process
to create i
ts routing table?

A.

static

B.

dynamic

C.

multiplexed

245.

Your client's NT server has been having trouble booting.Where
should you look first for some answers?

A.

performance monitor

B.

event viewer

C.

SNMP

246.

Another fast non
-
routable protocol with low overhead developed by
DEC?

A.

ATM

B.

LAT

C.

SPX

247.

You are hired to setup a 100Mbps Ethernet

network

for a client in
an office that already has cat 3 UTP installed. Your client wants to
keep the costs to a minimum but needs the 100Mbps throughput.
What should you recommend?

A.

keep the existing ca
ble but purchase 100Mbps hubs

B.

keep the existing cable but use 100Mbps patch cable from

the
wall

outlet

C.

new cat 5 UTP and if not already installed 100 Mbps hubs and
100 Mbps NICs

248.

Your client's 10BaseT Ethernet

network

using NetBEUI wants to
access data on a
n IBM mainframe. What device will allow this
connection?

A.

bridge

B.

gateway

C.

router

249.

Of the following protocols which is the fastest?

A.

TCP/IP

B.

IPX/SPX

C.

UDP/IP

250.

Access

to files

and folders in Win 2000 is accomplished using
___?

A.

compression

B.

tunneling

C.

permissions

251.

What
happens when a device is disconnected from the middle of a
BUS network?

A.

The hub will propagate error messages to

the rest

of the
network

B.

All devices on the network will fail

C.

The Server will stop responding to that device

D.

Data will not be able to get to dev
ices on

the other side

of this
device

E.

If a bridge is on the network, only that segment will be
effected

252.

Why is there a limit to the number of MAUs that can be connected
together in a standard Token
-
ring network?

A.

Too many

MAUs would exceed the cable limits
imposed by
the Token Ring specification

B.

Too many

MAUs would create to large of a collision domain
for communications to take place

C.

Too many

MAUs require more electricity than the devices can
support

D.

Too many

devices connected through MAUs requires more
tim
e to get control of the token that communications becomes
unacceptable

E.

There is no limit to the number of MAUs a token ring network
can support

253.

How many devices can communicate simultaneously within a
Token
-
ring LAN?

A.

One for each MAU on the LAN

B.

One

C.

Two

D.

As
many devices as the administrator defines within the NOS

E.

Between 1 and 5 if the ring speed is 16mbp/s

254.

What are three common items that must be configured correctly
when installing a

Network Interface Card

(NIC)?

A.

PCI or ISA slot

B.

IRQ setting

C.

DMA Address

D.

Driv
er

E.

I/O Address

255.

When troubleshooting connection problems you can confirm that
physical layer devices are communicating by visually inspecting
_______________ on the NIC and hub.

A.

Cross over cable

B.

The Link
-
Lights

C.

The electrical connection

D.

The Patch cable

E.

The
power light

256.

What is the name of a common test performed on a NIC with
vendor supplied diagnostic software?

A.

NIC Test

B.

Diagnostic Test

C.

PING


A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
14

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh

D.

Loopback

E.

NICBack

257.

Name two driver interfaces that allow a NIC to communicate
on

more than one

protocol.

A.

NDIS

B.

NetBEUI

C.

Net
BIOS

D.

ODI

E.

UNIX

258.

Bridges operate at the _____________ OSI level.

A.

The Data
-
Link Layer

B.

Top Layer

C.

The Transport Layer

D.

The Session Layer

E.

The Network Layer

259.

What bridging method is commonly used in Ethernet with only one
bridge.

A.

Collision

B.

Routing

C.

Transparent

D.

Spanni
ng Tree

E.

Open Shortest Path First (OSPF)

260.

Where are bridging address tables maintained when using source
-
route bridging?

A.

In routing tables on the hard drive

B.

In routing tables in RAM

C.

In routing tables in ROM

D.

At each PC on the network

E.

On special routing device
s

261.

Can switching hubs propagate broadcast packets on the network?

A.

Yes

B.

No

262.

How many

physical

addresses can be assigned to a NIC?

A.

One

B.

Two

C.

Three; One by the IEEE, one by the NIC vendor, and one by
the

Network Administrator

D.

Depends on the NOS

E.

Depends on the NIC
driver

263.

What are the two types of routing connections?

A.

Token passing

B.

Connectionless

C.

Reliable

D.

Connection Orientated

E.

Unreliable

264.

What type of routing connection would typically fragment data
packets?

A.

Connection Orientated

B.

Cut
-
Through

C.

Reliable

D.

Connectionless

E.

St
atic

265.

What name is given to Novell's client software loaded on the
workstation, and what feature does it provide that earlier versions
of the Generic Windows client do not offer?

A.

NETX

B.

Client for NetWare Networks

C.

Client32

D.

Support for NetWare Print Queues

E.

Sup
port for NetWare

Directory Services

266.

If two computers are assigned the same IP address then ___?

A.

neither computer will be able to

connect

B.

the first

computer to sign on will be able to

connect

the other
will not

C.

both computers will be able to

connect

to the
local network but
not to the internet

267.

The

physical

address assigned by the NIC manufacturer?

A.

subnet mask

B.

IP address

C.

MAC address

268.

Similar to WINS in that it resolves Net BIOS names into IP address
but stores this information in a text file?

A.

LMHOSTS

B.

DLC

C.

DNS

269.

A

small peer to peer network uses ___ security?

A.

user
-
level

B.

share
-
level

C.

permissions for

270.

The TCP/IP protocol used on the internet allows for approximately
___ billion unique IP addresses?

A.

1

B.

4

C.

10

271.


A.


IPCONFIG

B.

TRACERT

C.

PING

272.

NDIS operates at which layer of the OSI
model?

A.

presentation

B.

data
-
link

C.

network

273.

When

checking

the TCP/IP protocol you have just finished
installing for connectivity the proper first step it to ___?

A.

PING another computer on that segment

B.

PING 127.0.0.1

C.

PING the default gateway

274.

As data travels down t
he OSI layers it reaches the ___ layer which
is responsible for its bit conversion and actual transmission to
other computers?

A.

network


A Premier Institute for MCA/MBA/BANK P.O. & CLERK Entrance

6, Utsav Complex, Shivaji Road Meerut


(O) 4003132 (M) 9837464507,
9837253111
15

I.T. SPECIAL

Networking


E:/ Gupta Classes work /edited By
Sunil Singh

ANSWER SHEET

B.

application

C.

physical







1

A

26

C

51

C

76

C

101

C

126

C

2


27

C

52

B

77

C

102

B

127

B

3

D

28

C

53

A

78

C

103

C

128

A

4

D

29

B

54

B

79

B

104

C

129

C

5

D

30

A

55

B

80

A

105

C

130

C

6

A

31

A

56

A

81

C

106

B

131

C

7

A,C,D

32

D

57

C

82

B

107

A

132

B

8

A

33

B

58

A

83

A

108

A

133

C

9

A

34

D

59

B

84

B

109

B

134

C

10

B

35

A

60

A

85

A

110

C

135

B

11

D

36

A

61

A

86

C

111

C

136

C

12

D

37

B

62

B

87

C

112

B

137

C

13

A,C,D

38

C

63

B

88

C

113

B

138

B

14

A

39

A

64

B

89

C

114

C

139

B

15

D

40

C

65

B

90

A

115

C

140

A

16

B,C

41

**

66

C

91

B

116

A

141

B

17

B

42

B

67

A

92

B

117

C

142

C

18

D

43

C

68

B

93

C

118

A

143

B

19

B

44

D

69

C

94

B

119

B

144


20

C

45

A

70

C

95

B

120

B

145

B

21

B

46

B

71

**

96

C

121

C

146

B

22

C

47

A

72

A

97

C

122

C

147

C

23

D

48

A

73

C

98

B

123

B

148

C

24

D

49

B

74

A

99

C

124

A

149

B

25

B

50

A

75

B

100

C

125

B

150

A































151

C

176

C

201

B

226

C

251

B

152

B

177

C

202

B

227

B

252

D

153

B

178

B

203

C

228

A

253

B

154

B

179

C

204

C

229

A

254

B,C,D,E

155

C

180

B

205

B

230

B

255

B

156

A

181

C

206

A

231

B

256

D

157

C

182

C

207

C

232

B

257

D,A

158

C

183

C

208

B

233

A

258

A

159

C

184

B

209

A

234

B

259

C

160

B

185

C

210

B

235

B

260

A

161

A

186

C

211

C

236

B

261

A

162

E,C

187

B

212

A

237

B

262

A

163

A

188

A

213

A

238

B

263

D,B

164

E,B

189

C

214

B

239

A

264

D

165

C,A

190

B

215

B

240

C

265

C,E

166

D

191

***

216

A

241

C

266

B

167

B

192

B

217

B

242

B

267

C

168

D

193

C

218

C

243

C

268

A

169

B

194

C

219

B

244

B

269

B

170


195

B

220

C

245

B

270

B

171

B

196

C

221

C

246

B

271

****

172

C

197

A

222

C

247

C

272

B

173

A

198

C

223

C

248

B

273

B

174

C

199

A

224

B

249

C

274

C

175

B

200

C

225

B

250

C

275