Chapter 8 CTS

¡Supera tus tareas y exámenes ahora con Quizwiz!

A business traveler connects to a wireless network with open authentication. What should the traveler do to secure confidential data when connecting to the business services? Connect with a VPN. Change the network location profile to public. Change the Windows firewall settings. Manually configure an IP address, subnet mask, and default gateway.

Connect with a VPN.

A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.) The Windows domain or workgroup name that is configured on the computer is incorrect. The target web server is down. The computer has been assigned a static IP address. DNS service is unavailable on the customer network. The HTTP protocol is not working properly on the target server.

DNS service is unavailable on the customer network.

A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used? cable DSL ISDN POTS

DSL

Which special character must be included at the end of a folder name to identify a folder as an administrative share?

$

A technician wishes to update the NIC driver for a computer. What is the best location for finding new drivers for the NIC?

*the website for the manufacturer of the NIC

A user notices that the data transfer rate for the gigabit NIC in the user computer is much slower than expected. What is a possible cause for the problem? -The NIC duplex settings have somehow been set to half-duplex. -The NIC wake-on-LAN setting is misconfigured. -Hibernation mode is causing the NIC to shutdown unexpectedly. -The NIC is configured to use both IPv4 and IPv6 at the same time.

-The NIC duplex settings have somehow been set to half-duplex.

A Windows 7 computer is unable to reach a mapped drive on a file server that is on another network within the organization. Further investigation shows that the user is able to use a printer that is connected to the same network as the computer. Which action should the technician perform next? Verify that DNS name resolution is operating properly. Inspect the network patch cable for wear or breaks. Check Network Connection Details in the Windows GUI for the appropriate network connection. Check the link LED on the NIC.

Check Network Connection Details in the Windows GUI for the appropriate network connection.

A technician is investigating a report that a computer is unable to access network resources. The technician discovers that the computer has an IP address of 169.254.27.168. What is a logical first step in diagnosing this problem? Attempt to ping the default gateway. Check the NIC LED lights. Test that DNS is operating correctly. Activate Network Discovery and File Sharing.

Check the NIC LED lights.

Which operation should a network technician perform as a part of regular preventive maintenance procedures on the network? Check the network cable connections in the wiring closet.

Check the network cable connections in the wiring closet.

What is the difference between a data center and cloud computing?

Cloud computing provides access to shared computing resources, while a data center is a facility that stores and processes data.

A network client in a corporate environment reboots. Which type of server would most likely be used first? DNS DHCP e-mail FTP Telnet web

DHCP

Which network service automatically assigns IP addresses to devices on the network?

DHCP

Which technology requires customers to be within a particular range of the service provider facility in order to be provided the maximum bandwidth for Internet access?

DSL

Fill in the blank. What is the acronym for the protocol that is used when securely communicating with a web server?

HTTPS

Which security technology is used to passively monitor network traffic with the objective of detecting a possible attack?

IDS

ABC Company requires preventive maintenance for all local network cabling once a year. Which task should be included in the preventive maintenance program? Disconnect and reconnect all patch cables. Inspect all patch cables for breaks. Replace all labeling on the cables. Replace all cable supports to prevent loose attachment points.

Inspect all patch cables for breaks.

Fill in the blank. The process that a wireless router uses to translate a private IP address on internal traffic to a routable address for the Internet is called

NAT

A user cannot access the network. While the technician is checking the computer, the other users on the same network report that they are having the same problem. Further investigation shows that the LED lights on each NIC are not lit. What should the technician do next? Check each computer to verify that they all have the same settings. Report the problem to the network administrator. Attempt to ping devices on other networks. Use nslookup to check network connectivity.

Report the problem to the network administrator.

Which Cloud computing service would be best for an organization that does not have the technical knowledge to host and maintain applications at their local site? SaaS IaaS PaaS ITaaS

SaaS

A technician has just installed a new NIC in a laptop. When the cable is plugged in, the technician notices that the LEDs on the NIC are green and one LED is flashing. What does this usually signify?

The NIC is functioning and there is network activity.

A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem? The PC default gateway address is missing or incorrect. The PC has an incorrect IP address. The network cable connected to the user PC is faulty. The NIC on the PC is faulty.

The PC default gateway address is missing or incorrect.

A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.) The company only needs to pay for the amount of processing and storage capacity that it uses. Cloud services are billed at a fixed fee no matter how much processing and storage are used by the company. Cloud services enable the company to own and administer its own servers and storage devices. The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed. Single-tenant data centers can easily grow to accommodate increasing data storage requirements. As the amount of data that the company uses increases, it becomes impractical for the data to be stored and processed in a single-tenant data center.

The company only needs to pay for the amount of processing and storage capacity that it uses. The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed. As the amount of data that the company uses increases, it becomes impractical for the data to be stored and processed in a single-tenant data center.

A user has taken a personal laptop to work. The laptop is unable to discover the name of the office wireless network. What are two potential causes of this problem? (Choose two.) The wireless router is not broadcasting the SSID. The laptop has not received an IP address from the wireless router. The wireless router is set to mixed mode. The network does not support the wireless protocol in use by the laptop. The laptop must be configured with the office workgroup name.

The wireless router is not broadcasting the SSID. The network does not support the wireless protocol in use by the laptop.

A wireless router is displaying the IP address of 192.168.0.1. What could this mean? The NAT function is not working on the wireless router. The wireless router still has the factory default IP address. Dynamic IP address allocation has been configured on the router and is functioning correctly. The wireless router has been configured to use the frequencies on channel 1.

The wireless router still has the factory default IP address.

Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)

The wireless signal is too weak. There is interference from outside sources.

A technician is troubleshooting a computer that has lost connectivity to the network. After data is gathered from the customer, which two tasks should the technician complete next? (Choose two.)

Verify that the computer has a valid IP address. Check that the NIC link light is lit.

A technician needs to check the system settings on a remote computer to make sure it will be compatible with a new software update that will be sent out. The technician will use an administrator account to log in and start a user session on the remote PC. Which Windows tool will the technician use to accomplish this?

Windows Remote Desktop

Which combination of user account and network location profile allows a user to become a member of a homegroup? an admin account with a network location profile of Work a guest account with a network location profile of Home an admin user account with a network location of Public a standard user account with a network location profile of Home

a standard user account with a network location profile of Home

Fill in the blank. ____________ technology uses different frequencies to transmit multiple signals simultaneously over the same cable.

broadband

Which technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations? ADSL cellular ISDN VPN

cellular

Built to meet a specific need? Community cloud Puplic cloud hybrid cloud private cloud

community cloud

A technician uses the nbtstat -A 192.168.0.3 command. What does the technician expect to view in the command output? current connections and statistics network adapter configuration information a list of routers within the traffic path computer accounts and domain specific information

current connections and statistics

Which type of connection to the Internet is capable of the fastest transfer rates? ISDN POTS satellite cable fiber

fiber

Made up of two or more clouds connected via a single architecture? Community cloud Puplic cloud hybrid cloud private cloud

hybrid cloud

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

infrastructure as a service (IaaS)

Which command is used to manually query a DNS server to resolve a specific host name?

nslookup

Which command is used to manually query a DNS server to resolve a specific host name? tracert ipconfig /displaydns nslookup net

nslookup

Intended for a specific organization or entity, such as the government

private cloud

Services made available to the general population? Community cloud Puplic cloud hybrid cloud private cloud

puplic cloud

What is a benefit of performing preventative maintenance at regular intervals? reduction in network downtime reduction in connectivity reduction in security threats reduction in EMI and RFI

reduction in network downtime

A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel? to disable broadcasting of the SSID to enable different 802.11 standards to provide stronger security modes to avoid interference from nearby wireless devices

to avoid interference from nearby wireless devices

Two LEDs are usually present on a NIC. What are the two primary uses for these LEDs? (Choose two.) to indicate the presence of a connection to indicate interference from another nearby wireless or electronic device to indicate that the NIC has connected to a DHCP server to indicate that the NIC is connected to a homegroup or workgroup to indicate that data transfer activity is present

to indicate that data transfer activity is present

What is the purpose of the network profiles that are used to establish a new network connection on a Windows PC? to configure NIC settings for the fastest network available to remove the need for IP addresses when connecting to a network to provide a list of ISPs that may be used for Internet access to provide an easy way to configure or apply network functions based on the type of network to be joined

to provide an easy way to configure or apply network functions based on the type of network to be joined

What is a common function of a proxy server? to store frequently accessed web pages on the internal network to control who is permitted to access the internal network to detect malicious signatures by monitoring traffic that is entering the internal network to provide access to a shared pool of configurable computing resources

to store frequently accessed web pages on the internal network


Conjuntos de estudio relacionados

Genetics Exam 2 Human Genome Project

View Set

Botany AVASCULAR/EARLY VASCULAR PLANTS

View Set

History study guide doesnt have 16-17 or 20

View Set

Lesson 6 Estructura 6.2 - Respuestas - answer these questions negatively. Use indirect object pronouns in the answer.

View Set

A&P 1 - Saladin 6; Chapter 5 Review

View Set

Macbeth - COURAGE + BRAVERY quotes

View Set