Chapter 8 CTS
A business traveler connects to a wireless network with open authentication. What should the traveler do to secure confidential data when connecting to the business services? Connect with a VPN. Change the network location profile to public. Change the Windows firewall settings. Manually configure an IP address, subnet mask, and default gateway.
Connect with a VPN.
A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.) The Windows domain or workgroup name that is configured on the computer is incorrect. The target web server is down. The computer has been assigned a static IP address. DNS service is unavailable on the customer network. The HTTP protocol is not working properly on the target server.
DNS service is unavailable on the customer network.
A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used? cable DSL ISDN POTS
DSL
Which special character must be included at the end of a folder name to identify a folder as an administrative share?
$
A technician wishes to update the NIC driver for a computer. What is the best location for finding new drivers for the NIC?
*the website for the manufacturer of the NIC
A user notices that the data transfer rate for the gigabit NIC in the user computer is much slower than expected. What is a possible cause for the problem? -The NIC duplex settings have somehow been set to half-duplex. -The NIC wake-on-LAN setting is misconfigured. -Hibernation mode is causing the NIC to shutdown unexpectedly. -The NIC is configured to use both IPv4 and IPv6 at the same time.
-The NIC duplex settings have somehow been set to half-duplex.
A Windows 7 computer is unable to reach a mapped drive on a file server that is on another network within the organization. Further investigation shows that the user is able to use a printer that is connected to the same network as the computer. Which action should the technician perform next? Verify that DNS name resolution is operating properly. Inspect the network patch cable for wear or breaks. Check Network Connection Details in the Windows GUI for the appropriate network connection. Check the link LED on the NIC.
Check Network Connection Details in the Windows GUI for the appropriate network connection.
A technician is investigating a report that a computer is unable to access network resources. The technician discovers that the computer has an IP address of 169.254.27.168. What is a logical first step in diagnosing this problem? Attempt to ping the default gateway. Check the NIC LED lights. Test that DNS is operating correctly. Activate Network Discovery and File Sharing.
Check the NIC LED lights.
Which operation should a network technician perform as a part of regular preventive maintenance procedures on the network? Check the network cable connections in the wiring closet.
Check the network cable connections in the wiring closet.
What is the difference between a data center and cloud computing?
Cloud computing provides access to shared computing resources, while a data center is a facility that stores and processes data.
A network client in a corporate environment reboots. Which type of server would most likely be used first? DNS DHCP e-mail FTP Telnet web
DHCP
Which network service automatically assigns IP addresses to devices on the network?
DHCP
Which technology requires customers to be within a particular range of the service provider facility in order to be provided the maximum bandwidth for Internet access?
DSL
Fill in the blank. What is the acronym for the protocol that is used when securely communicating with a web server?
HTTPS
Which security technology is used to passively monitor network traffic with the objective of detecting a possible attack?
IDS
ABC Company requires preventive maintenance for all local network cabling once a year. Which task should be included in the preventive maintenance program? Disconnect and reconnect all patch cables. Inspect all patch cables for breaks. Replace all labeling on the cables. Replace all cable supports to prevent loose attachment points.
Inspect all patch cables for breaks.
Fill in the blank. The process that a wireless router uses to translate a private IP address on internal traffic to a routable address for the Internet is called
NAT
A user cannot access the network. While the technician is checking the computer, the other users on the same network report that they are having the same problem. Further investigation shows that the LED lights on each NIC are not lit. What should the technician do next? Check each computer to verify that they all have the same settings. Report the problem to the network administrator. Attempt to ping devices on other networks. Use nslookup to check network connectivity.
Report the problem to the network administrator.
Which Cloud computing service would be best for an organization that does not have the technical knowledge to host and maintain applications at their local site? SaaS IaaS PaaS ITaaS
SaaS
A technician has just installed a new NIC in a laptop. When the cable is plugged in, the technician notices that the LEDs on the NIC are green and one LED is flashing. What does this usually signify?
The NIC is functioning and there is network activity.
A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem? The PC default gateway address is missing or incorrect. The PC has an incorrect IP address. The network cable connected to the user PC is faulty. The NIC on the PC is faulty.
The PC default gateway address is missing or incorrect.
A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.) The company only needs to pay for the amount of processing and storage capacity that it uses. Cloud services are billed at a fixed fee no matter how much processing and storage are used by the company. Cloud services enable the company to own and administer its own servers and storage devices. The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed. Single-tenant data centers can easily grow to accommodate increasing data storage requirements. As the amount of data that the company uses increases, it becomes impractical for the data to be stored and processed in a single-tenant data center.
The company only needs to pay for the amount of processing and storage capacity that it uses. The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed. As the amount of data that the company uses increases, it becomes impractical for the data to be stored and processed in a single-tenant data center.
A user has taken a personal laptop to work. The laptop is unable to discover the name of the office wireless network. What are two potential causes of this problem? (Choose two.) The wireless router is not broadcasting the SSID. The laptop has not received an IP address from the wireless router. The wireless router is set to mixed mode. The network does not support the wireless protocol in use by the laptop. The laptop must be configured with the office workgroup name.
The wireless router is not broadcasting the SSID. The network does not support the wireless protocol in use by the laptop.
A wireless router is displaying the IP address of 192.168.0.1. What could this mean? The NAT function is not working on the wireless router. The wireless router still has the factory default IP address. Dynamic IP address allocation has been configured on the router and is functioning correctly. The wireless router has been configured to use the frequencies on channel 1.
The wireless router still has the factory default IP address.
Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)
The wireless signal is too weak. There is interference from outside sources.
A technician is troubleshooting a computer that has lost connectivity to the network. After data is gathered from the customer, which two tasks should the technician complete next? (Choose two.)
Verify that the computer has a valid IP address. Check that the NIC link light is lit.
A technician needs to check the system settings on a remote computer to make sure it will be compatible with a new software update that will be sent out. The technician will use an administrator account to log in and start a user session on the remote PC. Which Windows tool will the technician use to accomplish this?
Windows Remote Desktop
Which combination of user account and network location profile allows a user to become a member of a homegroup? an admin account with a network location profile of Work a guest account with a network location profile of Home an admin user account with a network location of Public a standard user account with a network location profile of Home
a standard user account with a network location profile of Home
Fill in the blank. ____________ technology uses different frequencies to transmit multiple signals simultaneously over the same cable.
broadband
Which technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations? ADSL cellular ISDN VPN
cellular
Built to meet a specific need? Community cloud Puplic cloud hybrid cloud private cloud
community cloud
A technician uses the nbtstat -A 192.168.0.3 command. What does the technician expect to view in the command output? current connections and statistics network adapter configuration information a list of routers within the traffic path computer accounts and domain specific information
current connections and statistics
Which type of connection to the Internet is capable of the fastest transfer rates? ISDN POTS satellite cable fiber
fiber
Made up of two or more clouds connected via a single architecture? Community cloud Puplic cloud hybrid cloud private cloud
hybrid cloud
Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?
infrastructure as a service (IaaS)
Which command is used to manually query a DNS server to resolve a specific host name?
nslookup
Which command is used to manually query a DNS server to resolve a specific host name? tracert ipconfig /displaydns nslookup net
nslookup
Intended for a specific organization or entity, such as the government
private cloud
Services made available to the general population? Community cloud Puplic cloud hybrid cloud private cloud
puplic cloud
What is a benefit of performing preventative maintenance at regular intervals? reduction in network downtime reduction in connectivity reduction in security threats reduction in EMI and RFI
reduction in network downtime
A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel? to disable broadcasting of the SSID to enable different 802.11 standards to provide stronger security modes to avoid interference from nearby wireless devices
to avoid interference from nearby wireless devices
Two LEDs are usually present on a NIC. What are the two primary uses for these LEDs? (Choose two.) to indicate the presence of a connection to indicate interference from another nearby wireless or electronic device to indicate that the NIC has connected to a DHCP server to indicate that the NIC is connected to a homegroup or workgroup to indicate that data transfer activity is present
to indicate that data transfer activity is present
What is the purpose of the network profiles that are used to establish a new network connection on a Windows PC? to configure NIC settings for the fastest network available to remove the need for IP addresses when connecting to a network to provide a list of ISPs that may be used for Internet access to provide an easy way to configure or apply network functions based on the type of network to be joined
to provide an easy way to configure or apply network functions based on the type of network to be joined
What is a common function of a proxy server? to store frequently accessed web pages on the internal network to control who is permitted to access the internal network to detect malicious signatures by monitoring traffic that is entering the internal network to provide access to a shared pool of configurable computing resources
to store frequently accessed web pages on the internal network