Exercise_16_A+

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the recommended maximum size of a peer to peer network? A. 10 computers B. 15 computers C. 20 computers D. 5 computers

A. 10 computers

You need to allow the SNMP protocol through the firewall. What port should you open? A. 3389 B. 22 C. 123 D. 161

D. 161

Which of the following is a multicast IP address? A. 172.69.5.4 B. 10.6.9.1 C. 192.168.5.6 D. 224.5.6.6

D. 224.5.6.6

Which wireless standard operates only in the 2.4GHz frequency up to 54Mbps? A. 802.11n B. 802.11a C. 802.11b D. 802.11g

D. 802.11g

Which of the following switches used with the ipconfig command unbinds a dynamically obtained IP address? A. /release B. /registerdns C. /flushdns D. /renew

A. /release

Which of the following could be a functional default gateway for a computer with an IP address of 19.168.5.5/16? (all that apply) A. 19.15.6.6 B. 191.200.6.39 C. 19.168.5.20 D. 19.168.6.15

A. 19.15.6.6 C. 19.168.5.20 D. 19.168.6.15

You need to block HTTP traffic on the firewall. What port should you block? A. 80 B. 110 C. 53 D. 143

A. 80

Which wireless standard uses MIMO? A. 802.11n B. 802.11g C. 802.11b D. 802.11a

A. 802.11n

Which of the following security components uses a RADIUS server to authenticate each user? A. 802.1x B. WEP C. MAC filtering D. SSID broadcast

A. 802.1x

When troubleshooting a SOHO network, which of the following commands displays TCP/IP statistics along with current connections? A. NETSTAT B. NBTSTAT C. IPCONFIG D. PING

A. NETSTAT

Which of the following supports a maximum transmission speed of 100 Mbps? A. CAT5 B. CAT4 C. CAT3 D. CAT6

A. CAT5

You have deployed a SOHO WLAN. Which of the following actions should you take if you discover than someone has gained unauthorized access to the settings page of the web interface? A. Change the admin password to the wireless router. B. Change the SSID of the wireless router. C. Change the encryption type of the wireless router. D. Change the channel of the wireless router.

A. Change the admin password to the wireless router.

Which cable type uses either a thicknet or thinnet cable? A. Coaxial B. Fiber C. STP D. UTP

A. Coaxial

A user who made changes to his wireless settings cannot connect to the WLAN. Which of the following is the most likely cause? A. Encryption settings on the station. B. driver for the wireless adaptor. C. Check the laptop switch that enables WiFi. D. Microwave

A. Encryption settings on the station.

Which of the following is strictly a wireless adaptor characteristic? A. Frequency B. DPI C. Mbps D. Baud rate

A. Frequency

Which of the following devices serves as an unintelligent connection point for devices? A. Hub B. Repeater C. Router D. Switch

A. Hub

When several topologies are used in a network, it is said to be a ____network. A. Hybrid B. Static C. Pass through D. Combo

A. Hybrid

Which of the following communications devices uses light to connect to a peripheral? A. Infared B. Bluetooth C. Cellular WLAN D. IEEE 1394

A. Infared

A user has problems connecting to the WLAN in the break room. Which of the following is the most likely cause? A. Microwave B. Check the laptop switch that enables Wi-Fi C. Driver for the wireless adaptor D. Encryption settings on the station

A. Microwave

Which of the following can use an RJ-11 connector? A. Modem B. NIC C. Printer D. External hard drive

A. Modem

Which of the following is defined as a radio transmission that goes in all directions? A. Omnidirectional B. Half duplex C. Simplex D. Full duplex

A. Omnidirectional

When troubleshooting a SOHO network, which of the following commands test connectivity between two machines? A. PING B. IPCONFIG C. NBTSTAT D. NETSTAT

A. PING

Which of the following is a cable type that does not emit toxic fumes when burned? A. Plenum B. Crossover C. Straight through D. Console

A. Plenum

Which of the following connectors uses a glass or plastic tube rather than a wire? A. SC B. RJ-11 C. RJ-45 D. BNC

A. SC

With which type of security does the user give a password for every resource they want to access? A. Share-level B. OU-level C. System-level D. User-level

A. Share-level

Which of the following is defined as a transmission method that can go in one direction only? A. Simplex B. Full Duplex C. Omnidirectional D. Half Duplex

A. Simplex

Which of the following wireless issues can result in consistent slow performance? A. Too many wireless users in the area B. Incorrect security parameters C. Interference in the area D. Hidden SSID

A. Too many wireless users in the area

With which type of security does the user log on once and not again to access resources? A. User level B. System level C. OU level D. Share level

A. User level

Which of the following network types offers a signal radius of 30 miles? A. WiMAX B. Cellular C. ISDN D. Fiber

A. WiMAX

Which of the following is a default Class A IP address? A. 172.69.5.4 B. 10.6.9.1 C. 192.168.5.6 D. 224.5.6.6

B. 10.6.9.1

What is the default port number for IMAP? A. 53 B. 143 C. 80 D. 110

B. 143

Which of the following IP addresses is an APIPA address? A. 10.6.8.4 B. 169.254.6.10 C. 172.16.5.3 D. 192.168.5.5

B. 169.254.6.10

Which of the following IP addresses is a Class C address? A. 172.16.5.3 B. 192.168.5.5 C. 10.6.8.4 D. 169.254.6.10

B. 192.168.5.5

What is the maximum speed of 802.11? A. 600MB B. 2Mb C. 11MB D. 54MB

B. 2Mb

What is the default port number for DNS? A. 110 B. 53 C. 143 D. 80

B. 53

Which of the following is an Intranet connection method that supplies a rate that is affected by other users in the neighborhood? A. Satellite B. Cable C. DSL D. Dial up

B. Cable

You cannot connect to a wireless network that has SSID broadcasting disabled. What must be done on the laptop to connect? A. Release and renew your IP address. B. Create a profile that includes the SSID. C. Disable and enable the adaptor. D. Move closer to the AP

B. Create a profile that includes the SSID.

Which of the following network services supplies IP configurations to hosts automatically? A. Proxy Server B. DHCP C. DNS D. RAS

B. DHCP

Which of the following topologies uses two network paths for redundancy? A. Token Ring B. FDDI Ring C. Star D. Bus

B. FDDI Ring

Which of the following protocols uses port number 443 by default? A. FTP B. HTTPS C. Telnet D. SMTP

B. HTTPS

Which DSL types is a hybrid DSL/ ISDN technology? A. VDSL B. IDSL C. ADSL D. SDSL

B. IDSL

Which of the following wireless issues can result in intermittent or occasional slow performance? A. Incorrect security parameters B. Interference in the area C. Hidden SSID D. Too many wireless users in the area

B. Interference in the area

Which of the following is a network that spans a part of or an entire city? A. LAN B. MAN C. PAN D. WAN

B. MAN

In which network topology does each system have a connection to every other system? A. Ring B. Mesh C. Bus D. Star

B. Mesh

Which of the following commands can be used to test the function of DNS? A. ipconfig /all B. Nslookup C. net D. tracert

B. Nslookup

Which of the following is a network type created by using Bluetooth? A. MAN B. PAN C. WAN D. LAN

B. PAN

Which DSL type has the same upstream and downstream bandwidth? A. ADSL B. SDSL C. VDSL D. IDSL

B. SDSL

Which of the following protocols uses port number 25 by default? A. Telnet B. SMTP C. FTP D. HTTPS

B. SMTP

In which network topology are all systems connected to a central connecting device? A. Bus B. Star C. Ring D. Mesh

B. Star

In which topology or topologies will a break in the cable NOT bring the entire network down? (all that apply) A. Bus B. Star C. Ring D. Mesh

B. Star D. Mesh

Which of the following is a cable type used to connect a computer to a hub or switch? A. Crossover B. Straight through C. Console D. Plenum

B. Straight through

Which of the following can result in slow data transfers? A. UTP cables and power cables too close together. B. Too many stations connected to the WLAN. C. WLAN AP too close to a microwave oven. D. Cables with no twist in the inner wires.

B. Too many stations connected to the WLAN.

Which protocol does not require acknowledgment of receipt from the destination? A. TCP B. UDP C. ICMP D. IP

B. UDP

Which of the following security measures has a well known crack and is not safe for an Enterprise WLAN? A. Disabled SSID broadcast B. WEP C. WPA2 D. 802.1x

B. WEP

Which of the following is NOT a potential cause of failure to connect with Wi-Fi automatically? A. Adaptor disabled. B. Wired NIC is enabled at the same time. C. Loose Wi-Fi card connection. D. The network requires a manual connection.

B. Wired NIC is enabled at the same time.

Which of the following commands discards all names to IP address resolution mappings? A. Tracert B. ipconfig/flushdns C. msconfig D. ping 127.0.0.1

B. ipconfig/flushdns

Which of the following commands can be used to make network configuration changes? A. Nslookup B. net C. tracert D. ipconfig /all

B. net

What command is used to map a networks drive? A. net file B. net use C. net share D. net session

B. net use

Which of the following commands displays TCP/IP statistics for the device? A. ipconfig B. netstat C. Ping D. tracert

B. netstat

Which of the following is defined as a transmission method that can go in both directions but only one direction at a time? A. Full Duplex B. Omnidirectional C. Half Duplex D. Simplex

C. Half Duplex

Which of the following switches used with the ipconfig command clears the DNS resolver cache on the device? A. /release B. /registerdns C. /flushdns D. /renew

C. /flushdns

Which of the following switches used with the ipconfig command requests an IP address from a DHCP server? A. /registerdns B. /flushdns C. /renew D. /release

C. /renew

What type of cabling is used in a bus network? (all that apply) A. 10 Base T B. 100 Base T C. 10 Base 2 D. 10 Base 5

C. 10 Base 2 D. 10 Base 5

What is the default port number for POP3? A. 143 B. 53 C. 110 D. 80

C. 110

Which of the following IP addresses is a Class B address? A. 10.6.8.4 B. 169.254.6.10 C. 172.16.5.3 D. 192.168.5.5

C. 172.16.5.3

What encryption type is used with WPA2? A. WEP B. TKIP C. AES D. Triple DES

C. AES

Which of the following is a device that supplies a wireless connection point to the network? A. ACL B. VPN C. AP D. NAT

C. AP

Which of the following is a modem card quality? A. DPI B. Frequency C. Baud rate D. Mbps

C. Baud rate

Which Network Connections option would you choose to create a VPN connection? A. Set Up a Wireless Ad Hoc B. Connect to the Internet C. Connect to a Workplace D. Set Up a Dial Up Connection

C. Connect to a Workplace

Which of the following tools is used to attach connectors to cables? A. Toner probe B. Loopback plug C. Crimper D. Multimeter

C. Crimper

Which of the following is an Intranet connection method that supplies a rate that is unaffected by other users in the neighborhood? A. Satellite B. Dial-up C. DSL D. Cable

C. DSL

Which of the following protocols uses port number 21 by default? A. Telnet B. SMTP C. FTP D. HTTPS

C. FTP

You are not sure if the power cable from the power supply to one of the drives is working. Which tool would you use to determine this? A. Crimper B. Toner probe C. Multimeter D. Loopback plug

C. Multimeter

Which of the following tools is used to attach a cable to the switch block? A. Toner probe B. Cable tester C. Punchdown tool D. Wire stripper

C. Punchdown tool

What protocol is used for email traffic? A. HTTPS B. FTP C. SMTP D. SNMP

C. SMTP

Which of the following topologies is physically a Star but logically a Ring? A. Bus B. Mesh C. Token Ring D. FDDI Ring

C. Token Ring

Which of the following is a network that connects multiple LANs? A. MAN B. PAN C. WAN D. LAN

C. WAN

Which of the following tools is used to remove the outer plastic coating of a cable? A. Cable tester B. Toner probe C. Wire stripper D. Punchdown tool

C. Wire stripper

Which of the following commands displays NetBIOS information? A. net B. nslookup C. nbstat D. fdisk

C. nbstat

Which of the following troubleshooting commands is used to display NetBIOS statistics? A. ipconfig B. ping C. nbstat D. netstat

C. nbstat

Which of the following troubleshooting commands is used to display TCP statistics and all connections? A. ping B. nbtstat C. netstat D. ipconfig

C. netstat

Which of the following commands displays the route taken from one device to another? A. netstat B. ipconfig C. tracert D. ping

C. tracert

Which of the following switches used with the ipconfig command sends a hostname to IP address mapping to a DHCP server? A. /flushdns B. /renew C. /release D. /registerdns

D. /registerdns

Which of the following is NOT a setting available for Remote Desktop in Windows 7? A. Allow Connections from Computers Running Any Version of Remote Desktop (Less secure) B. Dont Allow Connections to this Computer C. Allow Connections Only from Computers Running Remote Desktop with Network Level Authentication (more secure) D. Allow All Connections

D. Allow All Connections

With which of the following network types is the latest version called 4g LTE? A. WiMAX B. Fiber C. ISDN D. Cellular

D. Cellular

A user who formally had no problem connecting to the WLAN now cannot connect to or even see any WLANs. Which of the following is most likely the cause? A. Microwave B. Encryption settings on the station. C. Driver for the wireless adaptor. D. Check the laptop switch that enables Wi-Fi.

D. Check the laptop switch that enables Wi-Fi.

Which of the following is an Intranet connection method that operates at a maximum of 56K? A. DSL B. Cable C. Satellite D. Dial up

D. Dial up

Which of the following cable types would afford the best physical security? A. UTP B. Coaxial C. STP D. Fiber

D. Fiber

Which of the following wireless issues can result in an inability to locate the network when scanning? A. Too many wireless users in the area B. Incorrect security parameters C. Interference in the area D. Hidden SSID

D. Hidden SSID

Which of the following wireless issues can result in an inability to make a connection to a wireless network when the SSID has been configured correctly on the client? A. Interference in the area. B. Hidden SSID. C. Too many wireless users in the area. D. Incorrect security parameters.

D. Incorrect security parameters.

Which of the following security components is used to control access to the SOHO WLAN using the Layer 2 address of each wireless station? A. WEP B. 802.1x C. SSID broadcast D. MAC filtering

D. MAC filtering

Which of the following tools is used ti determine the voltage supplied by a wire? A. Toner probe B. Loopback plug C. Crimper D. Multimeter

D. Multimeter

When troubleshooting a SOHO network, which of the following commands displays NetBIOS related information? A. NETSTAT B. PING C. IPCONFIG D. NBTSTAT

D. NBTSTAT

In which network topology are all systems daisy chained in a circle? A. Star B. Bus C. Mesh D. Ring

D. Ring

Which of the following devices directs traffic based on IP addresses? A. Repeater B. Hub C. Switch D. Router

D. Router

Which of the following cable types is most susceptible to EMI, RFI? A. Fiber B. STP C. Coaxial D. UTP

D. UTP

Which of the following security measures was developed to mitigate the deficiency of WEP? A. EAP B. Disabled SSID broadcast C. 802.1x D. WPA

D. WPA

Which of the following commands is used to update, fix, or view the network or network settings? A. fdisk B. nbtstat C. nslookup D. net

D. net

What command displays all open file shares on the computer? A. net session B. net share C. net use D. net file

D. net file

What command displays all open sessions on the computer? A. net share B. net use C. net file D. net session

D. net session


Kaugnay na mga set ng pag-aaral

Modern U.S. History Chapter 6 Section 3

View Set

ОСНОВИ НАУКОВИХ ДОСЛІДЖЕНЬ

View Set

Lecture Chapter 8 True-False Exercise 8.05

View Set

Mastering Biology Chapter 29- Energy flow and Nutrient Cycling in Ecosystems

View Set

Control of secretion of calcitonin and parathyroid hormone

View Set

Self-Care B3 Session 13: Insect Bites, Stings, and Pediculosis

View Set