B.3 Domain 2: Networking, All Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

- Automatic Private IP Addressing (APIPA) - The workstation was unable to contact the DHCP server Explanation If a Windows client is configured to receive an IP address from a DHCP server, but cannot contact a DHCP server, it will automatically assign itself an IP address within the range of 169.254.0.1 to 169.254.255.254 with the subnet mask 255.255.0.0. You can use APIPA instead of a DHCP server, but it should only be used on a small network that does not need default gateway or DNS server settings configured.

A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the Internet. Using the ipconfig command you see that the workstation has been assigned the following special IP configuration: • IP address: 169.254.0.1 • Subnet mask: 255.255.0.0 What is this special IP configuration called? - Static IP Addressing - Dynamic Host Configuration Protocol (DHCP) - Automatic Private IP Addressing (APIPA) - Alternate IP Configuration Why did the workstation receive this type of configuration? - The workstation was unable to contact the DNS server - The workstation was unable to contact the DHCP server - The workstation was unable to contact the default gateway - The workstation was unablet to contact the Internet service provider (typo preserved from Testout)

Satellite Explanation Satellite capability is available even in areas that do not have a local network infrastructure. Satellite requires a local portable transmitter with an antenna directed skywards to a satellite. Satellite service providers offer nearly 100% global network coverage by maintaining a series of satellites circling the earth in geosynchronous orbit. Dial-up, ISDN and cable modem, require a local network infrastructure provided by either the telephone company or cable television company.

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas? - DSL - Dial-up - Cable modem - Satellite - ISDN

ARP

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address? - DHCP - DNS - BOOTP - ARP

Multimode fiber optic Explanation Multimode fiber optic cable is the only option that meets all the requirements. It supports 10 Gigabit Ethernet speeds with maximum segment lengths up to 300 meters. Single-mode fiber optic cable can also support the 10 Gigabit Ethernet speeds and the segment lengths that are needed, but the cable and the connection equipment is more expensive than multimode fiber optic cable and connection equipment. Twisted pair Category 6 and 7 cable can support 10 Gigabit Ethernet speeds but the maximum segment length is 100 meters--not long enough for this scenario.

A medical center wants to upgrade their network backbone to 10 Gigabit Ethernet (10 Gbps) so they can perform daily backups of large amounts of data to the secure on-site storage area network (SAN) without bogging down the network. Some of the backbone segments will have to reach between buildings that are close to 300 meters apart. Which of the following cable types will support 10 Gigabit Ethernet at the necessary segments lengths while keeping costs as low as possible? - Multimode fiber optic - Twisted pair Category 7 - Twisted pair Category 6 - Single-mode fiber optic

- Block any direct and reflected sunlight from the pathway between the PC and the printer. - Move the printer closer to the computer. Explanation Infrared light is light that is near visible light in the electromagnetic spectrum. Therefore very bright lights and in particular sunlight may cause interference with infrared interfaces. The best way to manage this interference is to minimize the distance between the connected devices and minimize interfering sunlight.

A portable computer connected to a printer with an infrared interface works fine inside your office. However, when you go outside it works sporadically. How can you fix this? (Select two.) - Set the environment setting to outdoor mode in the BIOS. - Block any direct and reflected sunlight from the pathway between the PC and the printer. - Move the printer closer to the computer. - Install a Gamma Ray Spectrometer (GRS) to shield the interface.

Send the frame out ports 2-8. Explanation Because the switch does not know the port that is used to reach the destination device, it will send the frame out all ports except for the port on which the frame was received. After the switch learns the port that is used to reach the destination device, it will send the frame out only that port.

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do? - Send the frame out all 8 ports. - Send the frame out the destination port. - Drop the frame. - Send the frame out ports 2-8.

Up to 100 meters for Class 1 devices - Bluetooth Up to 30 meters in areas without interference - Infrared Up to 10 meters for Class 2 devices - Bluetooth Explanation Radio frequency wireless transmissions can reach up to 356 meters, depending upon the 802.11 standard used and interference present in the environment. Infrared wireless transmissions work best for devices within 1 meter, but can operate up to 30 meters in areas without ambient light interference.

Drag the wireless networking technology on the left to its associated transmission distance limitation on the right. Each technology can be used more than once. (Infrared, Bluetooth) Up to 100 meters for Class 1 devices Up to 30 meters in areas without interference Up to 10 meters for Class 2 devices

169.254.1.26 Explanation In the event that a DCHP server is not available, Windows workstations can use APIPA to automatically provide themselves with an IP address. The default address range used by APIPA is 169.254.0.1 to 169.254.255.254. Of the options presented, only 169.254.1.26 falls within this range.

Given that your Windows workstation has Automatic Private IP Addressing (APIPA) implemented using default settings, which of the following TCP/IP addresses could be automatically assigned to the system should your DHCP server go down or become inaccessible? - 169.198.1.23 - 172.16.1.26 - 192.168.1.22 - 10.0.0.65 - 168.254.10.25 - 169.254.1.26

When a frame enters a port, the source MAC address is copied from the frame header. Explanation Bridges and switches learn addresses by copying the MAC address of the source device and placing it into the MAC address table. The port number which the frame entered is also recorded in the table and associated with the source MAC address. The switch or the bridge cannot record the destination MAC address because it does not know the port that is used to reach the destination device. Bridges and switches operate at Layer 2 and do not use IP addresses (which exist at Layer 3).

How do switches and bridges learn where devices are located on a network? - When a frame enters a port, the destination MAC address is copied from frame header. - When a frame enters a port, the source IP address is copied from the frame header. - When a frame enters a port, the destination IP address is copied from the frame header. - When a frame enters a port, the source MAC address is copied from the frame header.

Data transfers through the core using more than one light rays - Multimode The core diameter is around 10 microns - Single mode Cable lengths can extend a great distance - Single mode Cable lengths are limited in distance - Multimode Explanation Single mode fiber optic cable has the following characteristics: • Data transfers through the core using a single light ray (the ray is also called a mode) • The core diameter is around 10 microns • Cable lengths can extend a great distance Multimode fiber optic cable has the following characteristics: • Data transfers through the core using multiple light rays • The core diameter is around 50 to 100 microns • Cable lengths are limited in distance Fiber optic cable does not have a "dual mode" type.

Match the fiber optic cable types on the left with the appropriate characteristics on the right. Each cable type may be used once, more than once, or not at all. (Single, Dual, Multi) Data transfers through the core using more than one light rays The core diameter is around 10 microns Cable lengths can extend a great distance Cable lengths are limited in distance

- Hit "okay" on the login dialog box - This lab takes place entirely in the "Trendnet" window. - On the left menu, click "wireless" to expand, then "Basic" - Change the "wireless name (SSID)" to "PoliceSurveillanceVan" - Under that, disable broadcasting - Change the frequency to Channel 11 - Scroll down and click 'apply' (I keep failing at this part of the lab. Youtube suggests 'enable all' but that does not make sense so I complained to support.) - "okay" on login - left menu -> Mac Filter - Enable to reject everything - "apply" - login = ok - copy and paste each of the 3 addresses; hit apply after each - left menu -> security - Security mode -> "WPA2-PSK" - Pass phrase "S3CuR31!" - apply - left menu -> expand by clicking "administrator" - "Management" - Account: "admin" -> "@dm1n" - Password: "p@SSw@Rd" - apply

Lab 1: Recently, you implemented a wireless network at your home. However, without additional configuration, the wireless access point will allow connections from any laptop or mobile device. You need to secure the wireless network from unauthorized connections. In addition, you suspect that wireless access points used by your neighbors are interfering with your access point. You've discovered that they are using channels 2 and 5 for their wireless networks. Your task in this lab is to secure the wireless network as follows: Use PoliceSurveillanceVan for the SSID. Note: The SSID name is case sensitive. Disable SSID broadcasts. Set the channel such that it doesn't conflict with access points in neighboring homes. Use WPA2-PSK authentication, with AES for encryption. Configure S3CuR31! as the security key. Note: The security key is case sensitive. Only allow devices with following hardware addresses to connect to the wireless network: 00:87:FC:E2:E5:D2 00:50:56:C0:00:08 00:87:FC:E2:E5:F2 Change the administrator authentication credentials on the wireless access point to: Username: @dm1n Password: p@SSw@Rd To view and configure the wireless access point, use Internet Explorer and go to 192.168.0.100. Enter username: admin and password: password.

- right-click the internet icon in the bottom right - "Network and Sharing" - click the text link near the top to the current ethernet connection - properties - IPv4, properties - change to 'default' on top and bottom - switch to 'alternate' tab - 192.168.002.13 - 255.255.255.0 (should show up on its own) - 192.168.002.254 (enter for gateway and dns) - "okay/apply"

Lab 2 You work as the IT Administrator for a small corporate network. The network uses a DHCP server for IP address configuration for most clients. While in the Executive Office, the manager asked you to configure her laptop for use in both her small office/home office (SOHO) and at work. The laptop is currently configured with a static wireless connection for her SOHO, but the laptop is not connecting to the network while at the office. You need to configure the TCP/IP properties on the laptop to work on both networks. Your task in this lab is to do the following: Record the laptop's static IP and DNS configuration settings. Configure the laptop to obtain IP and DNS addresses automatically. Create an alternate TCP/IP connection with the static settings.- - - -

Explanation The default ports match with the following protocols: • Port 22: Secure Shell (SSH) • Port 80: Hypertext Transfer Protocol (HTTP) • Port 443: HTTP over SSL (HTTPS) • Port 445: Server Message Block (SMB/CIFS) directly over TCP • Port 143: Internet Message Access Protocol (IMAP) • Port 427: Service Location Protocol (SLP) • Port 548: Apple Filing Protocol (AFP)

Match the port numbers on the left with the protocols associated with them on the right. Secure Shell (SSH) Apple Filing Protocol (AFP) HTTP over SSL (HTTPS) Hypertext Transfer Protocol (HTTP) Server Message Block (SMB/CIFS) directly over TCP Service Location Protocol (SLP) Internet Message Access Protocol (IMAP)

Connects segments on the same subnet. Forwards signals to only the port connected to the destination device - Switch Can be used to connect wireless clients to wired clients on the same network - Bridge Connects two network segments that have different subnet addresses - Router Connects segments on the same subnet. Repeats signals out to all other ports - Hub Operate in full-duplex mode, meaning devices can both send and receive data at the same time - Switch Operates in half-duplex mode, meaning devices can either send or receive data at any given time - Hub Uses the IP address within a packet to move packets between networks - Router Explanation Ethernet uses a variety of connectivity devices, including the following: A hub provides a central connection for multiple media segments on the same subnet. When a hub receives a signal, it is repeated out to all other ports. Hubs operate in half-duplex mode, meaning devices can either send or receive data at any given time. A switch provides a central connection for multiple media segments on the same subnet. When a switch receives a signal, it forwards that signal only to the port where the destination device is connected. Switches operate in full-duplex mode, meaning devices can send and receive data at the same time because transmission paths are dedicated to only the communicating devices. A router connects two network segments that have different subnet addresses. Routers use the IP address within a packet to move packets between networks. A bridge connects two segments within the same subnet that use different media types. For example, use a bridge to connect wireless clients to wired clients on the same network.

Match the types of Ethernet connectivity devices on the left with the corresponding descriptions on the right. Each type of Ethernet connectivity device may be used once, more than once, or not at all. (Hub, Switch, Bridge, Router) Connects segments on the same subnet. Forwards signals to only the port connected to the destination device Can be used to connect wireless clients to wired clients on the same network Connects two network segments that have different subnet addresses Connects segments on the same subnet. Repeats signals out to all other ports Operate in full-duplex mode, meaning devices can both send and receive data at the same time Operates in half-duplex mode, meaning devices can either send or receive data at any given time Uses the IP address within a packet to move packets between networks

- FEC0:1319:7700:F631 - F631 - 446A:5511:CC40:25AB Explanation In this example of an IPv6 address, FEC0:1319:7700:F631:446A:5511:CC40:25AB • The prefix is FEC0:1319:7700:F631 • The quartet used to identify the subnet is F631 (the last quartet in the prefix) • The interface ID is 446A:5511:CC40:25AB

The following is an example of an IPv6 address: FEC0:1319:7700:F631:446A:5511:CC40:25AB Which part of the example IPv6 address is the prefix? - FEC0 - 446A:5511:CC40:25AB - FEC0:1319:7700:F631 - F631 Which quartet in the example IPv6 prefix is used to identify the subnet? - FEC0 - 1319 - 7700 - F631 - 446A - 5511 - CC40 - 25AB Which part of the example IPv6 address is the interface ID? - 446A:5511:CC40:25AB - FEC0:1319:7700:F631 - 25AB - 446A

Greater resistance to interference Explanation Shielded Twisted Pair (STP) has a grounded outer copper shield around the bundle of twisted pairs or around each pair. This provides added protection against EMI. Unshielded Twisted Pair (UTP) does not have a grounded outer copper shield.

What is a major benefit of STP over UTP? - Greater resistance to interference - Lower cost - Ability to install longer cable lengths - Safer for installations in overhead ceiling spaces

Modem Explanation To establish a connection to the Internet through the PSTN/POTS you must use a modem (modulator/demodulator) which converts digital PC data into analog signals that can be transmitted through standard telephone lines. A CSU/DSU (Channel Service Unit/Data Service Unit) is a digital-interface device used to connect a router to a digital circuit such as a T1 or T3 line. Data terminal equipment (DTE) is an end instrument that converts user information into signals for transmission or reconverts received signals into user information. Time-Division Multiplexing (TDM) is a type of digital or (rarely) analog multiplexing in which two or more signals or bit streams are transferred apparently simultaneously as sub-channels in one communication channel, but physically are taking turns on the channel. A switch is a device for changing the course (or flow) of a circuit.

To access the Internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use? - TDM - Switch - Modem - CSU/DSU - DTE

Switch Explanation A physical star topology uses a switch or a hub. Routers are used to connect multiple subnets together. A repeater regenerates a network signal so that it can be transmitted for longer distances.

What device is used to create a physical star topology? - Router - Bridge - Switch - Repeater

100 M Explanation Bluetooth version 2.0 class 1 devices have a maximum range of about 100 meters. Earlier versions had a maximum range of only about 10 meters.

What is the maximum range of the Bluetooth 2.0 specification for Class 1 devices? - 100 M - 300 M - 10 M - 50 M - 30 M

24 Mbps Explanation Bluetooth v3 and v4 devices have a maximum transmission speed of up to 24 Mbps. Bluetooth v1.2 devices have a maximum transmission speed of up to 1 Mbps. Bluetooth v2 devices have a maximum transmission speed of up to 3 Mbps. The wireless standard 802.11b transmits data at a rate of up to 11 Mbps.

What is the maximum transmission speed for Bluetooth v3 and v4 devices? - 1 Mbps - 11 Mbps - 24 Mbps - 3 Mbps

SMTP Explanation SMTP sends e-mail from a mail client to a mail server. FTP provides a generic method of transferring files. SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. POP3 and IMAP are both e-mail protocols used by mail clients to retrieve e-mail from a mail server; however they can't be used to send mail from the client to the server. The Trivial File Transfer Protocol (TFTP) is used for network file transfers.

What protocol is used to send e-mail messages from a mail client to a mail server? - SMTP - SNMP - IMAP - POP3 - FTP

- Category 5e UTP - Category 5 UTP Explanation Ethernet 100Base-T uses category 5 and 5e cabling. Cat 3 is designed for use with 10 megabit Ethernet or 16 megabit token ring. Coaxial cabling is used with 10Base2 or 10Base5 Ethernet.

What type of cabling can be used for an Ethernet 100Base-T (100 Mbps) network? (Select two.) - Category 3 UTP - RG-8 coaxial cable - RG-58 coaxial cable - Category 5e UTP - Category 5 UTP

Default Gateway Explanation The default gateway identifies the router to which packets for remote networks are sent. The subnet mask identifies which portion of the IP address is the network address. The WINS server address identifies the WINS server that is used to resolve NetBIOS host names to IP addresses. The DNS server address identifies the DNS server that is used to resolve host names to IP addresses. The alternate IP address identifies IP addressing information to be used in the event the DHCP server can't be reached. The host name identifies the logical name of the local system.

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks? - Subnet mask - Host name - Alternate IP address - WINS server address - DNS server address - Default gateway

Install a cellular USB adapter in a open port on the laptop. Explanation To access content on your computer (laptop): • Install a cellular adapter in a PCMCIA, ExpressCard, or USB slot. • Install and configure the software to use the card. An RJ-11 connection is typically for analog phones, and is used for DSL, ISDN, and Dialup Internet connections. Dialup Internet connections use two ports on the modem: • The LINE port connects the modem to the wall jack. • The PHONE port connects the modem to the analog phone. You can't typically connect a USB device, such as a cellular adapter, to a wireless access point.

Which actions allow you to access the Internet on your laptop via a cellular network? - Connect the cell phone to the PHONE port on the dialup modem in your office, and connect the laptop to the LINE port on the modem. - Connect your wireless access point to the cellular network with a USB dongle, then connect the laptop to the access point using an 802.11b/g/n connection. - Connect the laptop to the RJ-11 jack in your office. - Install a cellular USB adapter in a open port on the laptop.

RJ-45 Explanation An RJ-45 connector is used with unshielded twisted pair (UTP) cable. BNC and AUI are used with coaxial cables. DIX is an Ethernet protocol.

Which connector is used with unshielded twisted pair (UTP) cable? - DIX - AUI - BNC - RJ-45

RJ-11 Explanation A standard telephone line connector is an RJ-11. RJ-45 jacks are used for Ethernet twisted pair cables. Video cards and monitors with a built-in TV tuner have an F-type video connector. RG-58 is used for 10Base2 Ethernet networking (also called Thinnet).

Which kind of connector do you use to connect a modem to a standard telephone line? - RG-58 - F-type - RJ-45 - RJ-11

- DNS - hosts file Explanation You can use the Domain Name System (DNS) to get the IP address from a given host name. You can also use the local hosts file to map host names into IP addresses. On Windows systems, this file is located in C:\Windows\system32\drivers\etc\. You can use either the DHCP protocol or the BOOTP protocol to assign IP address and other configuration information to hosts automatically. Use FTP to transfer files.

Which mechanisms could you use to resolve a hostname into its associated IP address? (Select two.) - FTP - BOOTP - DNS - DHCP - hosts file

Network interface card

Which network component connects a device to the transmission media and allows it to send and receive messages? - Network interface card - Protocol - Bridge - Switch

Fiber optic Explanation Fiber optic networks transmit light pulses rather than electricity to communicate. Satellite networks use radio signals sent and received from a satellite. Cable networks use a cable TV connection and electric signals to send data. Wireless networks use radio waves for sending network data within a local area network.

Which network type uses light pulses to transmit data? - Wireless - Satellite - Cable - Fiber optic

169.254.0.1 - 169.254.255.254 Explanation The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.1 through 169.254.255.254 for Automatic Private IP Addressing (APIPA). APIPA also sets the subnet mask on the network to 255.255.0.0.

Which of the following IP address ranges is reserved for Automatic Private IP Addressing? 192.168.0.0 - 192.168.255.254 169.168.0.1 - 169.168.255.255 169.192.0.0 - 169.192.254.255 169.254.0.1 - 169.254.255.254 192.168.0.1 - 192.168.254.255

- 129.0.0.0 - 190.65.2.0 - 132.12.0.0 Explanation The following are Class B addresses: 129.0.0.0, 132.12.0.0, and 190.65.2.0. The first octet of Class B addresses is in the range of 128 to 191. The first octet of Class C addresses is in the range of 192 to 223. The first octet of Class A addresses range from 1-126.

Which of the following IP addresses are Class B addresses? (Select three.) - 129.0.0.0 - 195.155.0.0 - 115.33.0.0 - 224.15.55.2 - 190.65.2.0 - 64.2.2.64 - 132.12.0.0

- 222.55.0.0 - 223.16.5.0 - 192.15.5.55 Explanation The following are Class C addresses: 192.15.5.55, 222.55.0.0, and 223.16.5.0. The first octet of Class C addresses is in the range of 192 to 223. The first octet of Class A addresses range from 1-126. The first octet of Class B addresses range from 128-191.

Which of the following IP addresses are Class C addresses? (Select three.) - 125.166.11.0 - 222.55.0.0 - 240.0.0.0 - 223.16.5.0 - 189.189.5.2 - 192.15.5.55

- 114.122.66.12 - 114.58.12.0 - 114.0.0.15 Explanation With a Class A network, the first octet indicates the network address. All hosts on the network must have the same value in the first octet (114).

Which of the following IP addresses belong to the Class A network 114.0.0.0? (Select three.) (Tip: Assume the network is indicated by the default Class A portion of the IP address.) - 114.122.66.12 - 115.77.89.4 - 115.88.0.55 - 114.58.12.0 - 115.0.0.66 - 114.0.0.15

- 191.168.2.15 - 129.0.0.1 - 168.16.5.1 Explanation IP addresses are divided into classes. The most common of these are classes A, B, and C. Each address class has a different default subnet mask. To identify the class of an IP address, look at its first octet. Class A networks use a default subnet mask of 255.0.0.0 and have 0-126 as their first octet. Class B networks use a default subnet mask of 255.255.0.0 and have 128-191 as their first octet. Class C networks use a default subnet mask of 255.255.255.0 and have 192-223 as their first octet. In this question, the IP addresses that fall in the Class B IP address range are 191.168.2.15, 129.0.0.1, and 168.16.5.1.

Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select three.) - 191.168.2.15 - 1.6.45.254 - 123.254.19.6 - 129.0.0.1 - 168.16.5.1 - 228.62.18.6

Switch Explanation A switch offers guaranteed bandwidth to each port; unlike a hub which shares bandwidth among all the network ports.

Which of the following LAN devices receives a signal on one port, and forwards that signal only to the port where the destination device is connected? - Switch - Hub - Network adapter - Router

- Immunity to electromagnetic interference - Greater cable distances without a repeater Explanation Compared to other types of cabling, fiber optic cabling allows greater cable distances without a repeater and is immune to electromagnetic interference. However, installation costs more and takes longer. In addition, fiber optic cabling is much less flexible than other cabling.

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.) - Lower installation cost - Immunity to electromagnetic interference - Greater cable distances without a repeater - Increased flexibility - Faster installation

- 2.4 GHz radio wireless - Ad hoc connections Explanation Bluetooth is a wireless networking standard that uses 2.4 GHz radio waves. These are the same type of radio waves used with 802.11 wireless networking, so radio transmission can go through walls (not limited to line-of-sight connections). Bluetooth uses ad hoc connections between devices. Infrared uses red spectrum light waves and is limited to line-of-sight transmissions.

Which of the following are characteristics of Bluetooth? (Select two.) - Red spectrum light waves - Line-of-sight transmission - 2.4 GHz radio wireless - Ad hoc connections - 5.75 GHz radio wireless

- It uses two concentric metallic conductors. - It has a conductor made from copper in the center of the cable. Explanation Coaxial cable is composed of a central copper conductor surrounded by an insulator which is then surrounded by a second metallic mesh conductor. The name coaxial is derived from the fact that both of these conductors share a common axis. Twisted-pair cables are twisted around each other to reduce the effects of Electromagnetic Interference (EMI) and crosstalk. Fiber optic cables have a plastic or glass center, known as the core. Only fiber optic cables are totally immune to Electromagnetic Interference (EMI), because light pulses, instead of electrical signals, represent the data.

Which of the following are characteristics of coaxial network cable? (Choose two.) - The conductors within the cable are twisted around each other to eliminate crosstalk. - It is made of plastic or glass in the center of the cable. - It is totally immune to Electromagnetic Interference (EMI). - It uses two concentric metallic conductors. - It has a conductor made from copper in the center of the cable.

- Two data Channels - Dial-up connection - One control channel Explanation Basic Rate ISDN service is a dial-up service consisting of two 64 Kbps data (bearer) channels and a single control (delta) channel. The two data channels can be used independently of each other or bonded together to provide a total bandwidth of 128 Kbps. Primary Rate ISDN (PRI) shares many of the features of BRI, but includes up to 24 data channels.

Which of the following are features of Basic Rate ISDN (BRI)? (Select three.) - Two data Channels - Dial-up connection - Three control channels - Up to 24 data channels - One control channel - Always-on connection

- 257.0.122.55 - 45.22.156.256 - 145.8.260.7 Explanation IP addresses have a value between 0 and 255 within each octet. In this list, 45.22.156.256, 145.8.260.7, and 257.0.122.55 are not valid IP addresses.

Which of the following are not valid IP addresses? (Select three.) - 1.55.254.3 - 132.64.32.8 - 116.0.0.116 - 257.0.122.55 - 45.22.156.256 - 145.8.260.7 - 122.0.0.0

- Use an integrated cellular antennae to connect the device directly to the cellular network - Use a USB cable to connect the device to the network through a smartphone - Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot - Use a USB cellular antennae to connect the device directly to the cellular network Explanation You can connect a computing device, such as a notebook computer or a tablet, to a cellular network by using any of these four options: • Use a USB cable to connect the device to the network through a smartphone • Use the device's wi-fi to connect to the network through a cellular wi-fi hot spot • Use a USB cellular antennae to connect the device directly to the cellular network • Use an integrated cellular antennae to connect the device directly to the cellular network A transmitter antennae, or a dish, to communicate with a satellite will connect you to a satellite network, not a cellular network. Connecting to the cable service will also not connect you to a cellular network. Cable is a separate type of networking service.

Which of the following are options for connecting a computing device, such as a notebook computer or a tablet, to a cellular network? (Select all that apply.) - Use an integrated cellular antennae to connect the device directly to the cellular network - Use the device's Wi-Fi to connect to the cellular network through a cable modem's Wi-Fi antenna. - Use a USB transmitter to connect the device directly to the cellular network through a satellite - Use a USB cable to connect the device to the network through a smartphone - Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot - Use an integrated transmitter to connect the device directly to the cellular network through a satellite - Use a USB cellular antennae to connect the device directly to the cellular network - Use a USB cable to connect the device to the cellular network through a cable modem

- 141:0:0:0:15:0:0:1 - 6384:1319:7700:7631:446A:5511:8940:2552 Explanation An IPv6 IP address is a 128-bit address listed as eight 16-bit hexadecimal sections. Leading zeros can be omitted in each section. Therefore, 6384:1319:7700:7631:446A:5511:8940:2552 and 141:0:0:0:15:0:0:1 are both valid IPv6 IP addresses. A single set of all-zero sections can be abbreviated with two colons (::). Therefore, 141::15:0:0:1 would also be a valid way of writing that address. Digits in a hexadecimal system range from 0-9 and A-F. H is not a valid hexadecimal number. 343F:1EEE:ACDD:2034:1FF3:5012 is too short, having only six sections instead of eight.

Which of the following are valid IPv6 addresses? (Select two.) - 141:0:0:0:15:0:0:1 - 6384:1319:7700:7631:446A:5511:8940:2552 - A82:5B67:7700:AH0A:446A:779F:FFE3:0091 - 343F:1EEE:ACDD:2034:1FF3:5012 - 165.15.78.53.100.1

The class defines the default network address portion of the IP address. Explanation The address class defines the default network address portion of the IP address. For example, a class A address uses the first octet as the network address, and the remaining octets as the available host addresses.

Which of the following best describes an IP address class? - The class is the version of IP addressing standard used by the address. - The class defines the type of device that the address is assigned to (i.e. server, printer, workstation). - The class refers to the range of IP addresses that a DHCP server has been authorized to assign. - The class defines the default network address portion of the IP address.

It connects multiple cable segments (or devices), and forwards frames to the appropriate segment. Explanation Switches have multiple ports and can connect multiple segments or devices. The switch forwards frames to the appropriate port. They function similarly to a hub, except instead of sending packets to all ports, switches send packets only to the destination computer's port.

Which of the following best describes how a switch functions? - It connects multiple segments of different architectures. It translates frames, and forwards them to the appropriate segment. - It connects multiple cable segments (or devices), and broadcasts frames to all of its ports. - It connects multiple segments of different architectures. It translates frames, and broadcasts them to all of its ports. - It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.

- 32 numbers, grouped using colons - Hexadecimal numbers Explanation IP version 6 addresses are made up of 32 hexadecimal numbers, organized into 8 quartets. The quartets are separated by colons. An IPv6 address is a 128-bit number (128 binary digits). IP version 4 addresses use decimal numbers, organized into 4 octets and separated by periods.

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.) - Decimal numbers - Binary numbers - 128 numbers, grouped using colons - 32 numbers, grouped using colons - Hexadecimal numbers

- 128-bit address - Eight hexadecimal quartets Explanation IP version 6 addresses are 128-bit addresses. They are commonly written using 32 hexadecimal numbers, organized into 8 quartets. Each quartet is represented as a hexadecimal number between 0 and FFFF. The quartets are separated by colons. IP version 4 addresses are 32-bit addresses. They have four octets, each octet being a binary number of 8 digits. Each octet has a decimal value between 0 and 255.

Which of the following describes an IPv6 address? (Select two.) - 128-bit address - 64-bit address - 32-bit address - Four decimal octets - Eight hexadecimal quartets

The last quartet in the IPv6 address prefix Explanation The part of the IPv6 address that identifies the subnet address is the last quartet in the prefix. For example in the following address, FEC0:1319:7700:F631:446A:5511:CC40:25AB, the quartet used to identify the subnet is F631.

Which of the following describes the part of the IPv6 address that identifies the subnet address? - The last quartet in the IPv6 address interface ID - The first quartet in the IPv6 address interface ID - The first quartet in the IPv6 address prefix - The last quartet in the IPv6 address prefix

Ethernet over Power Explanation An Ethernet over Power device allows for network communications to be transmitted over existing AC power lines. An Ethernet over Power device is plugged in to one AC power outlet, and a second Ethernet over Power device is connected to the same AC circuit. These devices multiplex the AC copper power lines to transmit digital network signals at a frequency higher than the AC electrical power already on the circuit.

Which of the following devices allows network communications to be transmitted over existing AC power lines? - AC Circuit Switch - Ethernet multiplexer - Ethernet over Power - AC-enabled switch - Power over Ethernet

Power over Ethernet Explanation Power over Ethernet (PoE) technology can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher). Power is usually supplied by a PoE-enabled Ethernet switch. PoE is commonly used to power network devices that are located where physical access to a power outlet may not be available. For example, a PoE-enabled surveillance camera mounted on a tall pole can be powered via its Ethernet cabling.

Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)? - AC-enabled switch - Power over Ethernet - AC Circuit Router - Ethernet multiplexer - Ethernet over Power

Hub Explanation A hub and a repeater send received signals out all other ports. These devices do not examine the frame or the packet contents. A switch or a bridge use the MAC address in a frame for forwarding decisions. A router uses the IP address in a packet for forwarding decisions.

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? - Switch - Bridge - Router - Gateway - Hub

- The last 64 bits of an IPv6 address - The last 4 quartets of an IPv6 address Explanation An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into 8 quartets. The last 4 quartets correspond with the last 64 bits of the IPv6 address.

Which of the following identifies the Interface ID component of an IPv6 address? (Select two.) - The fourth quartet of an IPv6 address - The last 64 bits of an IPv6 address - The last 4 quartets of an IPv6 address - The last quartet of an IPv6 address - The first quartet of an IPv6 address - The first 4 quartets of an IPv6 address

- The first 64 bits of an IPv6 address - The first 4 quartets of an IPv6 address Explanation An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into 8 quartets. The first 4 quartets correspond with the first 64 bits of the IPv6 address.

Which of the following identifies the prefix component of an IPv6 address? (Select two.) - The first 64 bits of an IPv6 address - The last 64 bits of an IPv6 address - The first quartet of an IPv6 address - The last quartet of an IPv6 address - The first 4 quartets of an IPv6 address - The last 4 quartets of an IPv6 address

- 2.2.2.2 - 172.16.1.26 Explanation A valid IPv4 address consists of 4 8-bit (1 byte) numbers separated by periods. For example, 10.0.0.65. Because they are 8 bits long, these numbers are frequently called octets. Even though we typically express these numbers using decimal notation, it's important to remember that these numbers are binary numbers. The lowest value one of these numbers can have is 00000000. The decimal equivalent for this number is simply 0. The highest value one these numbers can take is 11111111. The decimal equivalent of this number is 255. Therefore, in decimal notation, each octet must contain a number between 0 and 255 inclusively.

Which of the following is a valid IP address? (Select two.) - 192.168.1.512 - 256.0.0.1 - 10.384.0.3 - 254.7.1.417 - 2.2.2.2 - 1.254.1.1024 - 172.16.1.26

FEC0::AB:9007 Explanation FEC0::AB:9007 is a valid IPv6 address. The :: in the address replaces blocks of consecutive 0's. The longer form of this address would be FEC0:0000:0000:0000:0000:0000:00AB:9007. Leading 0's within a quartet can also be omitted. You can only omit one block of 0's using the double colon. Each number in the IPv6 address must be between 0-9 or A-F; G is not a valid number for the IPv6 address. An address without double colons should have a total of 32 hexadecimal numbers in 8 blocks.

Which of the following is a valid IPv6 address? - FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A - FEC0::AB:9007 - FEC0:AB98::A7::9845:4567 - 199.12.254.11 - FEC0:AB04:899A

C0-34-FF-15-01-8E Explanation A MAC or hardware address is a unique identifier hard coded on every network adapter card. A valid MAC address has a total of 12 hexadecimal numbers. Hexadecimal numbers contain the numbers 0 to 9 and the letters A to F. Valid values in a MAC address range anywhere from 00 to FF. Note that one of the answers would be a valid MAC address except it uses a G value, which is beyond the range of a hexadecimal number.

Which of the following is a valid MAC address? - 192.168.12.15 - C0-34-FF-15-01-8E - 83-5A-5B-0B-31-55-F1 - 73-99-12-61-15 - 255.255.255.0 - 34-9A-86-1G-B3-24

Ethernet Explanation Ethernet is a wired, local area network (LAN) standard. Most laptops and desktop computers have built-in Ethernet network ports. Bluetooth is a wireless standard that allows the creation of short-range Personal Area Networks (PANs). Token Ring and ArcNet are older wired network standards that are nearly obsolete and not commonly used in a modern LAN. 802.11n is a wireless standard used in local area networks.

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network? - Token Ring - ArcNet - Ethernet - Bluetooth - 802.11n

A network in a small geographic area, like in an office. Explanation A LAN is a network in a small geographic area, like in an office. A WAN is a network whose computers and servers are geographically far apart but still connected. A PAN (personal area network) is the interconnection of components, such as laptops, mobile devices, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters or less). A VPN is the extension of a private network over a shared or public network such as the Internet.

Which of the following is the best definition for a LAN? - An extension of a private network over a shared or public network such as the Internet. - The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meters or less). - A network whose computers and servers are separated geographically, but still connected. - A network in a small geographic area, like in an office.

- The network operates at one gigabit per second - The network uses copper UTP cables Explanation The 1000Base-T standard for Ethernet uses copper UTP cables (Cat5e or higher) and operates at 1000 Mbps (or 1 Gbps). With the exception of 10GBase designations, the number in Ethernet standards is based on megabits per second. Ethernet specifications with F, L, S, or E use fiber optic cables.

Which of the following is true of a network using the 1000Base-T standard? (Select two.) - The network uses fiber optic cables - The network operates at one gigabit per second - The network operates at ten gigabits per second - The network uses copper UTP cables - The network operates at one kilobit per second

ISDN Explanation ISDN is a digital service operating over standard telephone company copper wiring offered in a variety of configurations. ISDN consists of multiple 64 Kbps channels. Basic Rate Interface (BRI) is a standard ISDN offering for household service.

Which of the following network technologies is packaged as part of a BRI plan? - Cable modem - DSL - ISDN - Dial-up

VoIP Explanation Voice over IP (VoIP) is a method for carrying phone calls over an IP-based network. RTSP is used to stream multimedia content over IP networks. HyperText Transfer Protocol (HTTP) is used by Web browsers and Web servers to exchange files (such as Web pages) through the World Wide Web and intranets. Transmission Control Protocol (TCP) is a protocol which guarantees that data arrives at a destination without errors. VoIP is usually implemented on top of UDP instead of TCP to reduce latency.

Which of the following protocols carry phone calls over an IP-based network? - VoIP - RTSP - HTTP - TCP

POP3 Explanation The POP3 protocol is part of the IP protocol suite and used to retrieve e-mail from a remote server to a local client over a network connection. SNMP is a protocol used to monitor network traffic. SMTP is an IP protocol used to send e-mail. FTP is used to transfer files.

Which of the following protocols do e-mail clients use to download messages from a remote mail server? - POP3 - SNMP - FTP - SMTP

NetBIOS Explanation NetBIOS is a non-routable protocol. It is often combined with IPX or IP to enable internetwork communications. NetBIOS was used in earlier versions of Windows. NetBIOS is rarely used today because nearly every operating system supports IP. IP is the protocol suite used on the Internet and is supported by all major operating systems. IPX is the protocol suite used by legacy NetWare servers. AppleTalk over IP is the protocol used to allow older AppleTalk computers to use IP for internetwork communication.

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications? - AppleTalk over IP - IPX - NetBIOS - IP

IMAP Explanation IMAP allows a mail server to keep a copy of a user's messages on the server after they are downloaded to the mail client. A POP3 server is also used by a mail client to retrieve messages from a mail server, but it requires that the messages be deleted from the server after they have been downloaded. SMTP allows a user to send e-mail to a server, but it can't be used to retrieve messages from the server. The NTP protocol synchronizes the clocks of all computers on a network.

Which of the following protocols is used by an e-mail client to retrieve messages from an e-mail server and gives users the option to keep mail messages on the server? - NTP - POP3 - IMAP - SMTP

The work area has a lot of electromagnetic interference (EMI). Explanation Category 6e cable is designed to be less susceptible to electromagnetic interference (EMI) than Category 6. Network performance can be greatly diminished by higher than average EMI. When cable is run under the floor, it must be Plenum insulated to be fire resistant and non-toxic, but doesn't need to be Cat6. Streaming video doesn't justify the extra cost of Category 6e cable when Category 6 can handle the same bandwidth.

Which of the following situations is more likely to justify the investment in Category 6e cable instead of Category 6? - The work area has a lot of electromagnetic interference (EMI). - The cable needs to be run though under the floor. - Users will be doing a lot of high resolution printing. - Users will be streaming a lot of video.

- It can deliver a DNS server address in addition to the host IP address. - A workstation must request addressing information from a DHCP server. Explanation DHCP servers deliver IP addresses as well as other host configuration information to network hosts. DHCP can be configured to assign any available address to a host, or it can assign a specific address to a specific host. DHCP clients, typically workstations, must send a request to a DHCP server before it will send IP addressing information to them.

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? (Select two.) - The DHCP server detects workstations when they attach to the network and automatically delivers IP addressing information to them. - It cannot be configured to assign the same IP address to the same host each time it boots. - It can deliver a DNS server address in addition to the host IP address. - It can only deliver IP addresses to hosts. - A workstation must request addressing information from a DHCP server.

- It demodulates analog data from a telephone network into digital PC data. - It modulates digital data from the PC into analog data and transmits it on a telephone network. Explanation Modem is shorthand for modulator/demodulator. Its job is to convert (or modulate) digital data from a PC into analog telephone signals and transmit them through a telephone network. It also receives analog data from the telephone network and converts (or demodulates) it into digital PC data.

Which of the following statements accurately describes how a modem works? (Select two.) - It transmits digital signals over ordinary telephone copper wiring at a rate up to 128 Kbps. - It demodulates analog PC data into digital data that can be transmitted through a telephone network. - It demodulates analog data from a telephone network into digital PC data. - It communicates over a telephone network using digital signals. - It modulates digital data from the PC into analog data and transmits it on a telephone network. - It modulates digital data from a telephone network into analog data that a PC can use.

Peer-to-peer Explanation Access to shared resources are controlled separately on each computer in the peer-to-peer model (a Windows peer-to-peer network is called a workgroup). For example, each computer in a peer-to-peer network maintains its own set of user accounts. An intranet is a private network that uses Internet technologies. Services on an intranet are only available to hosts that are connected to the private network. An extranet is a private network that uses Internet technologies, but its resources are made available to external (but trusted) users. The client/server model places shared resources on a server. Resources are accessed by clients.

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? - Client/server - Intranet - Peer-to-peer - Extranet

Star

Which of the following topologies connects each network device to a central hub? - Ring - Bus - Star - Mesh

Cellular Explanation Cellular networking uses the cellular phone infrastructure for Internet access. The computing device, such as a notebook or tablet, must have a cellular antennae to connect directly to the cellular network. You can travel anywhere and stay connected to the network, as long you are within the coverage area of the cellular service provider. You can also connect a computing device to a cellular network by tethering it to a smartphone or by using a smartphone as a wi-fi hot-spot. Mobile hot-spots are devices that can be used to connect to a cellular network. Wi-fi is a technology that provides wireless access to a computer network but is limited to the range of the wireless access point. Satellite networking requires a satellite dish, which is not truly mobile. ISDN is a land line based technology.

Which of the following types of Internet connection services can allow you to be truly mobile while maintaining your Internet connection? - Wi-Fi - Cellular - ISDN BRI - Satellite - Mobile hot spot

NFC Explanation Near Field Communication, or NFC, uses the 13.56 MHz frequency and has a very short range—in order for devices to communicate, they have to be within two inches of each other. NFC chips are being used for such applications as passports and credit cards to contain all the information about the passport holder or the credit card account. NFC chips use encryption algorithms to secure the connection but are constantly emitting a signal and use a much slower transmission speed than other wireless technologies.

Which of the following wireless communication technologies can be described as follows? • Has a very limited transmission range, of less than two inches • Used with credit cards and passports • Slower than other wireless technologies • Constantly emitting a signal - Infrared in diffuse mode - Bluetooth - Infrared in line-of-sight mode - IEEE 1394 - NFC

- HTTPS - HTTP Explanation The HyperText Transfer Protocol (HTTP) is used by Web servers and browsers to transmit Web pages over the Internet. This is often confused with HTML or HyperText Markup Language, which is the markup language used to create Web content. XML is also a markup language. SMTP is used to route electronic mail through the internetwork. E-mail applications provide the interface to communicate with SMTP or mail servers. The Network News Transfer Protocol or NNTP is an Internet application protocol used primarily for reading and posting Usenet articles.

Which protocols are used on the Internet to transmit Web pages from Web servers to Web browsers running on client workstations? (Select two.) - HTTPS - NNTP - HTTP - SMTP - XML - HTML

DHCP Explanation You can use the Dynamic Host Configuration Protocol (DHCP) to set up a DHCP server that will assign IP addresses automatically to network hosts. DHCP servers will not assign the same IP address to two different hosts. ICMP is chiefly used by networked computers' operating systems to send error messages. The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. The Internet Group Management Protocol (IGMP) is a communications protocol used to manage the membership of Internet Protocol multicast groups.

Which service can you use on your network to automatically assign IP addresses to hosts and to help prevent the same address from being assigned to two different hosts? - ICMP - TCP - DHCP - IGMP

10GBaseER single-mode Explanation 10GBaseER ("extended reach") is a port type for single-mode fiber optic cable that supports 10 Gigabit Ethernet with segment lengths up to 40 km. 10GBaseLR ("long reach") is a port type for single-mode fiber optic cable that supports 10 Gigabit Ethernet with segment lengths up to 10 km. 10GBaseSR ("short range") is a port type for multimode fiber optic cable that supports 10 Gigabit Ethernet with segment lengths up to 300 meters. 10GBaseT twisted pair Category 7 is a copper cable that supports 10 Gigabit Ethernet with segment lengths up to 100 meters.

Which type of fiber optic cable supports 10 Gigabit Ethernet with a maximum segment length of up to 40 km? - 10GBaseT twisted pair Category 7 - 10GBaseER single-mode - 10GBaseSR multimode - 10GBaseLR single-mode

Copper telephone wire Explanation ISDN is a set of standards that allow digital data to be sent and received over copper wiring.

Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter? - Cable TV coaxial cable - Copper telephone wire - Infrared light waves - Wireless radio waves - Fiber-optic cable

UDP Explanation The User Datagram Protocol (UDP) protocol can be used with the IP protocol to create unacknowledged connections between the server application and its clients. Because the packets are sent unacknowledged, latency will be dramatically reduced, providing better streaming performance. The Transmission Control Protocol (TCP) uses acknowledged connections, which would introduce considerable latency and reduce streaming performance. The Simple Network Management Protocol (SNMP) is used to monitor and manage network devices. The Internet Control Message Protocol is used to send and receive error messages on an IP network.

You are a software developer and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server? - SNMP - UDP - ICMP - TCP

- RJ-11 connectors - Filters or splitters Explanation To connect to the Internet through a DSL connection: • Install an internal DSL card in a single computer, or connect a DSL router to the phone line. • Use a phone cable with an RJ-11 connector to connect the DSL card or router to the phone line. For ADSL, place filters (splitters) on the line everywhere that an analog phone is used. • Do not install a filter on the line connected to the DSL router. Analog modems are used for dial-up Internet access. F-type connectors and RG-6 cable are used for cable Internet access.

You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select two.) - RJ-11 connectors - F-type connectors - Analog modem - Filters or splitters - RG-6 cable

The satellite dish must be pointed in the correct direction for communicating with the satellite. Explanation During installation, the satellite dish must be pointed in the correct direction for communicating with the satellite. With a single line satellite installation, the satellite connection is used for downloads, and a phone line with a modem is used for uploads. Connect a satellite modem/router to the satellite disk using coaxial cable (RG-6) and an F-type connector. Connect the modem/router to your computer using a USB or Ethernet connection.

You are installing a satellite connection so your home office can connect to the Internet. Which of the following statements is true? - The satellite dish must be pointed in the correct direction for communicating with the satellite. - The connection to your computer from the satellite modem may be RJ-11 or F-type. - The connection between the satellite modem and dish uses a USB cable and connector. - You must have at the least one available phone line for data uploads.

Plenum Explanation Plenum cable is fire resistant and non-toxic, making it optimal for wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned. Both STP and fiber optic cables can be rated for plenum areas, but are not in themselves fire resistant.

You are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use? - PVC - Plenum - Multi-mode fiber - STP

Add a network card using a PCI slot. Explanation In this case, you should install a network adapter in a PCI slot. Your computer would then use the new network adapter instead of the one integrated on the motherboard. While installing the new card, you should disable the onboard LAN adapter to prevent it from showing in Device Manager. Replacing the motherboard is too expensive when compared to installing a new expansion card. AGP slots are used for video cards, not network cards. Clearing the CMOS settings erases the configuration information but does not fix the LAN adapter that is not functioning.

You have a computer with an onboard LAN adapter. The LAN adapter has failed and you are unable to connect the computer to the network. What should you do? - Add a network card using an AGP slot. - Clear the CMOS settings. - Replace the motherboard. - Add a network card using a PCI slot.

Install and configure the DHCP service on your server. Explanation The DHCP protocol allows you to assign IP addresses automatically. In this scenario, you should configure the DHCP service to run on the network server. The DHCP client on each workstation can then contact the DHCP server when the workstations connect to the network to be automatically assigned IP addressing information. You could instruct each user to manually enter IP addressing information but there is a higher chance of error and will likely require more administrative overhead.

You are setting up a small network in your office with one Windows server and 50 Windows workstations. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do? - Assign each user an IP address and instruct the user to enter the IP address in his or her computer. - Install the WINS service on your server. - Install and configure the DHCP service on your server. - Install the DHCP service on each workstation.

You need to hang up. Explanation You cannot talk on the telephone over the same line that the modem needs to use. When you try to connect with the modem, the line will be in use and the connection will fail because the modem can't dial the destination device. When troubleshooting a modem connection: Verify that the modem gets a dial tone. Verify that the modem dials the correct number. Verify that the receiving device answers the call. Verify network connection parameters (such as TCP/IP settings or connection settings). Verify any authentication or logon parameters.

You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from Internet. When you try to connect to the Internet using your dial-up modem, you can't. What is the problem? - You need to hang up. - The ISP access number is incorrect. - You need to disable call waiting. - You need to install and configure TCP/IP.

ipconfig /flushdns Explanation Workstations maintain a cache of recently-resolved DNS names. When you use a DNS name, the computer first checks its cache. If the name is in the cache, the corresponding IP address will be used. This can sometimes cause problems if the IP address of a host has changed. Old values in the cache might continue to be used for a time, making communication using the DNS name impossible. To correct this problem on a Windows computer, run ipconfig /flushdns to delete the local DNS name cache.

You are the computer specialist in a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server has started to experience intermittent failures, so you transferred the shares on the server to a spare server and took the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company's DNS server and redirect the hostname to the spare server's IP address of 10.0.0.3. After doing so, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating the FS1 server could not be found. Enter the command you can run from the command prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.

Green with white

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1? - Green with white - Green - Orange with white - Blue

Static IP Addressing Explanation With static IP addressing, you manually assign all configuration values. Static addressing is prone to error and should only be used under the following conditions: • The network has a small number of hosts. • The network will not change or grow. • You have some hosts that must always use the same IP address.

You have a host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address? - Alternate IP Configuration - APIPA IP Addressing - Link-local Addressing - Static IP Addressing - Dynamic IP Addressing

Messages are broadcast to all devices connected to the network. Explanation Messages sent using a physical bus topology are broadcast to all devices in the network. The device in the middle of the star (typically a hub), receives the message and forwards it on to all other devices.

You have a network that uses a logical bus topology. How do messages travel through the network? - Messages are sent directly to the correct destination device. - Messages are sent to a central device which then forwards the message to the destination device. - Messages are broadcast to all devices connected to the network. - Messages travel from one device to the next until they reach the destination device.

Messages travel from one device to the next until they reach the destination device.

You have a network that uses a logical ring topology. How do messages travel through the network? - Messages are sent directly to the destination device only. - Messages are sent to all devices connected to the network. - Messages travel from one device to the next until they reach the destination device. - Messages are sent to a central device which then forwards the message to the destination device.

127.0.0.1 Explanation 127.0.0.1 is the loopback address for any device. This special address means "this host." If you ping the loopback address, the TCP/IP configuration will be tested. A successful test means that TCP/IP is correctly configured on the host. 192.168.1.55 is the current IP address assigned to the host. You can ping this address, but the address is not considered the loopback address. Also, to ping the host's IP address, you must first know the address. Pinging the loopback address always tests the current host regardless of its current IP address. 192.168.1.255 is the broadcast address for the network meaning "any host" on the network.

You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 192.168.1.55. Which of the following is considered the loopback address for the Wrk2 computer? - 192.168.1.55 - 127.0.0.1 - 192.168.1.0 - 192.168.1.254 - 192.168.1.255

Alternate IP Configuration Explanation With an Alternate IP Configuration, the system's IPv4 Properties are configured on the General tab to use DHCP to automatically obtain TCP/IP configuration information. If a DHCP server cannot be contacted, the static IP configuration information on the IPv4 Properties' Alternate Configuration tab is used.

You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which IP addressing method can you use to make sure he gets a network connection at home? - Link-local Addressing - Dynamic IP Addressing - APIPA IP Addressing - Alternate IP Configuration - Static IP Addressing

Mesh Explanation This type of network uses a physical mesh topology. There's no central connecting point. Any host can communicate directly with any other host on the network. A mesh network, such as this one, is usually impractical on a wired network. Each host would have to have a separate, dedicated network interface and cable for each host on the network. However, a mesh topology can be implemented with relative ease on a wireless network due to the lack of wires.

You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network? - Bus - Star - Mesh - Ring - Tree

F-type Explanation Use an F-type connector for broadband cable connections that use coaxial cable. Use a BNC connector for 10Base-2 Ethernet networks. Use an RJ-11 connector for modem connections to a phone line. Use an RJ-45 connector for an Ethernet network that uses twisted pair cable. Use ST and SC connectors for fiber optic cables.

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use? - F-type - BNC - RJ-11 - RJ-45 - ST

Bluetooth Explanation A Bluetooth connection would be the best choice because it automatically detects Bluetooth-enabled devices and creates a wireless PAN between them. It can be used for both voice and data signals, and it also provides 128-bit encryption to protect sensitive information in transit. Infrared is a line-of-sight medium so it may be difficult to maintain connectivity, it also doesn't provide encryption. Cellular WAN provides very little security for information in transit and requires a cellular connection for each device. Wireless Ethernet is used for transferring data, not connecting devices.

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which would be the best choice? - Wireless Ethernet - Bluetooth - Infrared - Cellular WAN

FTP Explanation You should implement the File Transfer Protocol (FTP). It enables file transfers and supports user authentication. The Trivial File Transfer Protocol (TFTP) also enables file transfer, but does not support user authentication. The Simple Mail Transfer Protocol (SMTP) is used to transfer email message from email clients to email servers. The Lightweight Directory Access Protocol is used to access information about network resources stored in a directory server. The Secure SHell protocol (SSH) is used to securely access the console prompt of a remote computer system. The Simple Network Management Protocol (SNMP) is used to remotely monitor and manage network devices and hosts.

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? - SSH - SNMP - TFTP - SMTP - LDAP - FTP

DNS Explanation You can use DNS name resolution for Linux workstations (as well as for most other operating systems). NetBIOS name resolution (LMHOSTS files or WINS) is typically used on Windows-based networks. The Lmhosts file is a local text file that maps Internet Protocol (IP) addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. A WINS server address is only needed if you have older Windows clients on multiple networks. Network Time Protocol (NTP) is a means of transmitting time signals over a computer network. Simple Mail Transfer Protocol (SMTP) is used to route electronic mail through the internetwork. E-mail applications provide the interface to communicate with SMTP or mail servers.

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this? - SMTP - DNS - WINS - LMHOSTS file - NTP

Bluetooth Explanation Bluetooth would be the best choice because it has a high transfer rate and because it automatically detects other Bluetooth devices in the area and creates an encrypted PAN between them. 802.11g is a wireless networking standard for communicating between computers, not for connecting wireless devices to a computer. PS/2, IEEE 1394 (Firewire), and USB are all wired connection standards.

You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose? - Bluetooth - PS/2 - USB - IEEE 1394 - 802.11g wireless

IP Explanation The IP is the protocol of the Internet. If you want to use the Internet, your computer must have the IP protocol installed and configured. The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulation of the Internet Protocol designed to work over serial ports and modem connections. The Point-to-Point Protocol (PPP) is also commonly used with modem connections. IPX/SPX is the protocol suite used on legacy NetWare networks. NetBIOS is the term used to describe the combination of two protocols: NetBEUI and NetBIOS. NetBIOS was used in early Windows networks. Because NetBIOS is a non-routable protocol, it was often combined with TCP/IP or IPX/SPX to enable internetwork communications.

You want to use your Windows workstation to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this? - NetBIOS - IPX/SPX - PPP - SLIP - IP

3389 Explanation The RDP protocol runs on port 3389 by default. Port 110 is used by the POP3 protocol. Port 389 is used by the LDAP protocol. Port 123 is used by the NTP protocol.

You've enabled Remote Desktop on a Windows workstation. Which port must be opened in the server's firewall to allow remote clients to access the desktop? - 389 - 123 - 110 - 3389

53 Explanation The DNS service runs on port 53 by default. Port 110 is used by the POP3 protocol. Port 143 is used by the IMAP protocol. Port 123 is used by the NTP protocol.

You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service? - 123 - 110 - 143 - 53

SMB Explanation The Server Message Block (SMB) protocol is used by Windows systems to access shared resources over the network. The Lightweight Directory Access Protocol (LDAP) is used to access information stored in the directory service on a server. The Remote Desktop Protocol is used to access the desktop of remote systems. The Secure File Transfer protocol is used to securely transfer files between hosts.

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share? - LDAP - RDP - SFTP - SMB

100 meters Explanation Gigabit Ethernet using twisted pair cables (either Cat 5e or Cat 6) has a maximum cable segment length of 100 meters. Tip: All Ethernet networks that use twisted pair cable (Ethernet, Fast Ethernet, and Gigabit Ethernet) have a distance limitation of 100 meters.

Your network follows the 1000Base-T specifications for Gigabit Ethernet. What is the maximum cable segment length allowed? - 500 meters - 412 meters - 100 meters - 1,000 meters - 2,000 meters

Crossover cable configuration. Used to connect computers directly to one another for networking. Explanation This is a crossover cable configuration. Using this, computers can connect directly to one another. The easiest way to create a crossover cable is to arrange the wires in the first connector using the T568A standard and arrange the wires in the second connector using the T568B standard.

https://imgur.com/UZXJPWJ What type of cable configuration is shown here and what is it used for? - RJ-11 configuration. Used to connect wireless routers to phone line connections. - Rollover cable configuration. Used to connect computers to routers for console management. - Crossover cable configuration. Used to connect computers directly to one another for networking. - Patch (or straight-though) cable configuration. Used the connect computers to network devices, such as switches and hubs.


संबंधित स्टडी सेट्स

Astronomy: Ch7 The Jovian Planets

View Set

Chapter 6: Resistance Exercise for Impaired Muscle Performance

View Set

(7th) TCI Chp 3 - QUIZ - The Roman Catholic Church in Medieval Europe

View Set

Chapter 1: Personal Finance Planning

View Set

Drivers ed learners permit study cards

View Set

Spanish American War Historiography 2

View Set