7 - Networking Fundamentals

¡Supera tus tareas y exámenes ahora con Quizwiz!

Gulliver is trying to determine why one of the computers at work cannot connect to the network. He thinks it might be DHCP related but wants to rule out the computer itself as being the problem. Gulliver manually configures the network settings that will allow the computer to connect to the network. What three values does he configure? Select three. a. IP address b. Subnet Mask c. Port number d. MAC address e. Default Gateway

a, b, e

You are a security professional tasked with preventing fraudulent emails. Which DNS records will you configure to help you realize this goal? Select three. a. DKIM b. CNAME c. SPF d. MX e. DMARC

a, c, e

Akello uses his computer to download a document from the internet. What role does his computer play as opposed to the computer from which he is downloading the document? Select two. a. His computer is a client b. His computer is a server c. The computer from which he downloads the document is a client d. The computer from which he downloads the document is a server

a, d

Jesenia read an article that said stored data, such as when you are downloading an app, is transmitted using TCP, but live-streaming events are transmitted using UDP. Why would this be true? Select two. a. TCP is reliable and ensures the delivery of data using a connection-oriented mechanism. b. UDP uses acknowledgements to ensure and guarantee the delivery of important data. c. UDP will retransmit data that has been lost during the transmission to guarantee delivery. d. UDP is fast and does not retransmit lost data so as not to disrupt the live video feed. e. Stored data is transmitted to a specific device, but live-stream data is sent to various devices.

a, d

Ramah is preparing a presentation on networking terminology. She wants to ensure everyone understands the difference between a node and a host. How should she define these terms? Select three. a. Every host is a node, but not every node is a host. b. A host can be either a client or a server, but not both. c. A host has an IP address a node has a MAC address. d. A node is not used to run a variety of applications. e. A smart thermostat is an example of a node.

a, d, e

Vishalini rented a small office to offer bookkeeping services. She needs DHCP, wired, wireless, and file sharing capabilities, as well as a switch to connect three computers. However, her technology budget is limited. How can she obtain access to all these capabilities at a modest cost? a. Buy a multifunction router. b. Lease a simple modem from the ISP. c. Buy used components online. d. Integrate the services into a server.

a. Buy a multifunction router.

You log in to a wireless router with administrative privileges and change the SSID. What exactly have you done? a. Changed the network name b. Changed the MAC address c. Changed the IP address d. Changed the subnet mask e. You cannot change the SSID

a. Changed the network name

Quintavius loves to tinker with computers so he sets off to see how many networking services he can install in one physical server. He sets up the system to support DCHP, DNS, HTTP, HTTPS, Telnet, SSH, and an email server. On what port will these services listen? a. DCHP 67, DNS 53, HTTP 80, HTTPS 443, Telnet 23, SSH 22, SMTP 25 b. DCHP 53, DNS 443, HTTP 80, HTTPS 23, Telnet 22, SSH 25, SMTP 67 c. DCHP 443, DNS 23, HTTP 80, HTTPS 22, Telnet 25, SSH 67, SMTP 53 d. DCHP 23, DNS 22, HTTP 80, HTTPS 25, Telnet 67, SSH 53, SMTP 443

a. DCHP 67, DNS 53, HTTP 80, HTTPS 443, Telnet 23, SSH 22, SMTP 25

What characteristics do the 10.0.0.1/24, 172.16.0.2/24, and 192.168.0.3/24 IP addresses have in common? Select three. a. They are public IP addresses. b. They are private IP addresses. c. They are not routable by the ISP. d. They all have the same subnet mask. e. They can be assigned to only one organization.

b, c, d

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.) a. Network interface card b. Cable modem c. Firewall d. DSL modem e. Dial-up modem

b, d

Makani is participating in an on-the-job training program at work. He is learning how to configure computers in a network. He is told to use private IP addresses because all organizations could use them without conflict since they are not routable. If the addresses are not routable, he wonders, how will the computers have internet access? a. It is private network so they will not have internet access b. A NAT router will translate a private address to a public one c. A proxy server will temporarily change the address on the host d. The DNS server will resolve the IP address to a public domain

b. A NAT router will translate a private address to a public one

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure? a. VPN tunnel b. Address reservation c. Subnet mask d. Default gateway

b. Address reservation

A technician is configuring a new SOHO multifunction router at a customer site to provide network access to several wireless devices. The technician is required to protect the internal network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement? a. Enable DHCP on the router and configure IP address reservations for the wireless clients. b. Change the default administrative password on the router. c. Disable the radio transmitter in the wireless router. d. Configure MAC filtering on the router and allow access to only the technician's computer.

b. Change the default administrative password on the router.

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host? a. To ensure a workstation receives the same IP address from the DHCP server each time the workstation is booted. b. In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet. c. When a workstation requires that more than two different DNS server IP addresses be configured for a specific network interface. d. To assign a secondary DNS server IP address to a specific network interface on the workstation.

b. In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

The owner of a small loan brokerage firm does not know much about computers but has always been concerned with security, so he buys a used enterprise grade router. Mango, a loan officer with a little bit of IT knowledge, configures FE80::1 as the only address on the internal interface of the router. What effect will this have? a. Nothing because the address is routable. b. Internet access will now be suppressed. c. NAT will translate it to a public address. d. Security will be dramatically improved.

b. Internet access will now be suppressed.

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings? a. Network Control Center b. Network and Sharing Center c. Administrative Tools d. Internet Options

b. Network and Sharing Center

You are running a performance test using three different browsers on the same computer to simultaneously access the same web site. What numeric identifier or address is used to keep the three connections separate at the application (browser) level? a. MAC Address b. Port number c. IP address d. FQDN

b. Port number

Kwan, a fifth-grade teacher, had been learning about computers but does not know much about networking. He found a hub in the supply closet and decided to create a small network in his classroom consisting of a file/application server, 10 relatively new computers, and a printer. The students often complain that the computers are slow, but one student blames it on the network. What can Kwan do to eliminate complaints? a. Upgrade to more powerful PCs b. Replace the hub with a switch c. Upgrade to a better router d. Use NICs that support 1 Gbps

b. Replace the hub with a switch

Torino receives a call from a SOHO client who says her computer is not working. He goes to her office and checks the network settings. He notices that the default gateway entry is blank, yet he can ping the router. Once he enters the default gateway, the problem is solved. What did the client mean when she said her computer is not working? a. The network interface card was disabled b. The computer had no internet access c. She could not print on the local printer d. The computer had an invalid IP address

b. The computer had no internet access

You recently bought a new router, modem, and switch to create a wired network at home containing six computers. Beginning with the computers, how would you connect the devices to ensure the computers have internet access? a. computers, router, modem, switch b. computers, switch, router, modem c. computers, modem, switch, router d. computers, switch, modem, router

b. computers, switch, router, modem

You run the ipconfig /all command on your Windows computer and see a hexadecimal value that looks like this: E0-70-EA-4E-AB-A5 What does it represent? Select two. a. IP address b. Port number c. MAC address d. Logical address e. Physical address

c, e

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients? a. Multi-port switch b. FTP server c. DHCP server d. Firewall e. Wireless access point

c. DHCP server

You want to setup a separate network at home that is accessible from the internet. You want it to be isolated from your personal network, so you lease an IPv6 address from the ISP. When you configure the interface IDs of the devices on the network, which bits in the IPv6 address will you be modifying? a. The first 48 bits of the IPv6 address b. The 16 bits following the first 48 c. The last 64 bits of the IPv6 address d. The last 32 bits of the IPv6 address

c. The last 64 bits of the IPv6 address

You are asked to add a resource record in the DNS namespace for a website your company wants to publish. Which of the following entries will you make? a. www.company.com IN A 209.165.200.5 14440 b. www.company.com 14440 209.165.200.5 A IN c. www.company.com A IN 14440 209.165.200.5 d. www.company.com 209.165.200.5 IN A 14440

c. www.company.com A IN 14440 209.165.200.5

A small company has a few users that are spending too much time on specific social media web sites; this is affecting their productivity at work. The manager asks if it is possible to limit access to those sites. Which of the following will satisfy the request while not limiting access to other websites? a. Implement MAC filtering on the router for the PCs that are accessing the sites. b. Configure a firewall and add the web sites the users are visiting to the whitelist. c. Configure a firewall with content filtering on the PCs of users who visit the sites. d. Configure a proxy server as an internet appliance to limit access to the web sites.

d. Configure a proxy server as an internet appliance to limit access to the web sites.

You are setting up your Windows computer to connect to the Internet. When you type www.microsoft.com, the issues an error message indicating the site cannot be reached. What network setting should you check to see the address of the server being used to resolve the domain name you entered in the browser? a. IP address b. Subnet mask c. Gateway d. DNS

d. DNS

Venus is a member of the IT department at a company that has a moderately-sized network. One of her performance review objectives is to help her department be more proactive relative to being notified, and responding to, certain events that occur in the network. What type of server will help her meet the objective? a. SMTP Server b. LDAP Server c. IMAP Server d. Syslog Server

d. Syslog Server

A restricted computer lab at a college has been set up with local authentication. Students are able to log in but do not have internet access. You check the network settings on one of the computers and it has an IP address of 169.254.1.10. What is the problem? a. The AAA server is not reachable b. The NAT server is not reachable c. The DNS server is not reachable d. The DHCP server is not reachable

d. The DHCP server is not reachable

Henry is using the command line to troubleshoot whether a Windows client is able to connect to the server on his network. What command should Henry use to check whether he has connectivity to the server? a. ipconfig b. ipconfig /displaydns c. ifconfig d. ping

d. ping

You buy a cable that has RJ-45 connectors. For what type of transmission will the cable be used? a. Cellular b. Cable c. Fiber d. DSL e. Ethernet

e. Ethernet


Conjuntos de estudio relacionados

02 Real Property Ownership | Chapter 4 Trust as Ownership Vehicles

View Set

Saunders NCLEX Infection Control w/ Rationales

View Set

General Report Writing and Case Studies

View Set

1945-Present Mexico,Cuba & Central America section 5&6

View Set

Burns Injuries/ Tissue Integrity

View Set

Chapter 10: Measuring a Nation's Income

View Set