Chapter 5 & 6 IT Essential
What is the proper CIDR prefix notation for a subnet mask of 255.0.0.0?
/8
How many bits are used to represent the host address of a computer with the IP address of 192.168.1.25 and a subnet mask of 255.255.255.0?
8
Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges?
802.11n
What is the correct compressed format of the IPv6 address 2001:0db8:eeff:000a:0000:0000:0000:0001?
2001:db8:eeff:a::1
A user needs to access the Internet from home. Which device is needed if a user connects to an ISP through the telephone network?
DSL modem
How many bits are used to represent the network address of a host with an IP address of 192.168.150.16 and a subnet mask of 255.255.0.0?
16
Which IPv6 address represents the most compressed form of the IPv6 address 2001:0db8:cafe:0000:0835:0000:0000:0aa0/80?
2001:db8:cafe:0:835::aa0/80
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
Which technology is most often used to connect devices to a PAN?
Bluetooth
A network technician is checking a computer to see if the DHCP client is working correctly. The technician issues the ipconfig /all command. Which two parameters should the technician review? (Choose two.)
Default gateway Subnet mask
A wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)
Disable DHCP. Assign static IP addresses to the authorized devices.
Which type of connection to the Internet is capable of the fastest transfer rates?
Fiber
What is a characteristic of a WAN?
It connects multiple networks that are geographically separated.
What security technique could provide secure access to a server located in a small office without the expense of implementing a DMZ or purchasing a hardware firewall?
Port forwarding
Which two types of signal interference are reduced more by STP than by UTP? (Choose two.) RFI
RFI EMI
Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?
Switch
A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)
Switch Router Wireless access point
A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?
The network cable is faulty.
Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)
There is interference from outside sources. The wireless signal is too weak.
Which two devices are commonly powered by PoE? (Choose two.)
access point IP phone
Which smart home wireless technology has an open standard that allows up to 232 devices to be connected?
Z-Wave
Which pairs of wires change termination order between the 568A and 568B standards?
green and orange
A technician troubleshooting a network problem has used CLI commands to determine that a computer has not been allocated a correct IP address from the DHCP server. Which command can the technician use to solve this problem?
ipconfig/renew
What is a common function of a proxy server?
to store frequently accessed web pages on the internal network