Exercise_16_A+
What is the recommended maximum size of a peer to peer network? A. 10 computers B. 15 computers C. 20 computers D. 5 computers
A. 10 computers
You need to allow the SNMP protocol through the firewall. What port should you open? A. 3389 B. 22 C. 123 D. 161
D. 161
Which of the following is a multicast IP address? A. 172.69.5.4 B. 10.6.9.1 C. 192.168.5.6 D. 224.5.6.6
D. 224.5.6.6
Which wireless standard operates only in the 2.4GHz frequency up to 54Mbps? A. 802.11n B. 802.11a C. 802.11b D. 802.11g
D. 802.11g
Which of the following switches used with the ipconfig command unbinds a dynamically obtained IP address? A. /release B. /registerdns C. /flushdns D. /renew
A. /release
Which of the following could be a functional default gateway for a computer with an IP address of 19.168.5.5/16? (all that apply) A. 19.15.6.6 B. 191.200.6.39 C. 19.168.5.20 D. 19.168.6.15
A. 19.15.6.6 C. 19.168.5.20 D. 19.168.6.15
You need to block HTTP traffic on the firewall. What port should you block? A. 80 B. 110 C. 53 D. 143
A. 80
Which wireless standard uses MIMO? A. 802.11n B. 802.11g C. 802.11b D. 802.11a
A. 802.11n
Which of the following security components uses a RADIUS server to authenticate each user? A. 802.1x B. WEP C. MAC filtering D. SSID broadcast
A. 802.1x
When troubleshooting a SOHO network, which of the following commands displays TCP/IP statistics along with current connections? A. NETSTAT B. NBTSTAT C. IPCONFIG D. PING
A. NETSTAT
Which of the following supports a maximum transmission speed of 100 Mbps? A. CAT5 B. CAT4 C. CAT3 D. CAT6
A. CAT5
You have deployed a SOHO WLAN. Which of the following actions should you take if you discover than someone has gained unauthorized access to the settings page of the web interface? A. Change the admin password to the wireless router. B. Change the SSID of the wireless router. C. Change the encryption type of the wireless router. D. Change the channel of the wireless router.
A. Change the admin password to the wireless router.
Which cable type uses either a thicknet or thinnet cable? A. Coaxial B. Fiber C. STP D. UTP
A. Coaxial
A user who made changes to his wireless settings cannot connect to the WLAN. Which of the following is the most likely cause? A. Encryption settings on the station. B. driver for the wireless adaptor. C. Check the laptop switch that enables WiFi. D. Microwave
A. Encryption settings on the station.
Which of the following is strictly a wireless adaptor characteristic? A. Frequency B. DPI C. Mbps D. Baud rate
A. Frequency
Which of the following devices serves as an unintelligent connection point for devices? A. Hub B. Repeater C. Router D. Switch
A. Hub
When several topologies are used in a network, it is said to be a ____network. A. Hybrid B. Static C. Pass through D. Combo
A. Hybrid
Which of the following communications devices uses light to connect to a peripheral? A. Infared B. Bluetooth C. Cellular WLAN D. IEEE 1394
A. Infared
A user has problems connecting to the WLAN in the break room. Which of the following is the most likely cause? A. Microwave B. Check the laptop switch that enables Wi-Fi C. Driver for the wireless adaptor D. Encryption settings on the station
A. Microwave
Which of the following can use an RJ-11 connector? A. Modem B. NIC C. Printer D. External hard drive
A. Modem
Which of the following is defined as a radio transmission that goes in all directions? A. Omnidirectional B. Half duplex C. Simplex D. Full duplex
A. Omnidirectional
When troubleshooting a SOHO network, which of the following commands test connectivity between two machines? A. PING B. IPCONFIG C. NBTSTAT D. NETSTAT
A. PING
Which of the following is a cable type that does not emit toxic fumes when burned? A. Plenum B. Crossover C. Straight through D. Console
A. Plenum
Which of the following connectors uses a glass or plastic tube rather than a wire? A. SC B. RJ-11 C. RJ-45 D. BNC
A. SC
With which type of security does the user give a password for every resource they want to access? A. Share-level B. OU-level C. System-level D. User-level
A. Share-level
Which of the following is defined as a transmission method that can go in one direction only? A. Simplex B. Full Duplex C. Omnidirectional D. Half Duplex
A. Simplex
Which of the following wireless issues can result in consistent slow performance? A. Too many wireless users in the area B. Incorrect security parameters C. Interference in the area D. Hidden SSID
A. Too many wireless users in the area
With which type of security does the user log on once and not again to access resources? A. User level B. System level C. OU level D. Share level
A. User level
Which of the following network types offers a signal radius of 30 miles? A. WiMAX B. Cellular C. ISDN D. Fiber
A. WiMAX
Which of the following is a default Class A IP address? A. 172.69.5.4 B. 10.6.9.1 C. 192.168.5.6 D. 224.5.6.6
B. 10.6.9.1
What is the default port number for IMAP? A. 53 B. 143 C. 80 D. 110
B. 143
Which of the following IP addresses is an APIPA address? A. 10.6.8.4 B. 169.254.6.10 C. 172.16.5.3 D. 192.168.5.5
B. 169.254.6.10
Which of the following IP addresses is a Class C address? A. 172.16.5.3 B. 192.168.5.5 C. 10.6.8.4 D. 169.254.6.10
B. 192.168.5.5
What is the maximum speed of 802.11? A. 600MB B. 2Mb C. 11MB D. 54MB
B. 2Mb
What is the default port number for DNS? A. 110 B. 53 C. 143 D. 80
B. 53
Which of the following is an Intranet connection method that supplies a rate that is affected by other users in the neighborhood? A. Satellite B. Cable C. DSL D. Dial up
B. Cable
You cannot connect to a wireless network that has SSID broadcasting disabled. What must be done on the laptop to connect? A. Release and renew your IP address. B. Create a profile that includes the SSID. C. Disable and enable the adaptor. D. Move closer to the AP
B. Create a profile that includes the SSID.
Which of the following network services supplies IP configurations to hosts automatically? A. Proxy Server B. DHCP C. DNS D. RAS
B. DHCP
Which of the following topologies uses two network paths for redundancy? A. Token Ring B. FDDI Ring C. Star D. Bus
B. FDDI Ring
Which of the following protocols uses port number 443 by default? A. FTP B. HTTPS C. Telnet D. SMTP
B. HTTPS
Which DSL types is a hybrid DSL/ ISDN technology? A. VDSL B. IDSL C. ADSL D. SDSL
B. IDSL
Which of the following wireless issues can result in intermittent or occasional slow performance? A. Incorrect security parameters B. Interference in the area C. Hidden SSID D. Too many wireless users in the area
B. Interference in the area
Which of the following is a network that spans a part of or an entire city? A. LAN B. MAN C. PAN D. WAN
B. MAN
In which network topology does each system have a connection to every other system? A. Ring B. Mesh C. Bus D. Star
B. Mesh
Which of the following commands can be used to test the function of DNS? A. ipconfig /all B. Nslookup C. net D. tracert
B. Nslookup
Which of the following is a network type created by using Bluetooth? A. MAN B. PAN C. WAN D. LAN
B. PAN
Which DSL type has the same upstream and downstream bandwidth? A. ADSL B. SDSL C. VDSL D. IDSL
B. SDSL
Which of the following protocols uses port number 25 by default? A. Telnet B. SMTP C. FTP D. HTTPS
B. SMTP
In which network topology are all systems connected to a central connecting device? A. Bus B. Star C. Ring D. Mesh
B. Star
In which topology or topologies will a break in the cable NOT bring the entire network down? (all that apply) A. Bus B. Star C. Ring D. Mesh
B. Star D. Mesh
Which of the following is a cable type used to connect a computer to a hub or switch? A. Crossover B. Straight through C. Console D. Plenum
B. Straight through
Which of the following can result in slow data transfers? A. UTP cables and power cables too close together. B. Too many stations connected to the WLAN. C. WLAN AP too close to a microwave oven. D. Cables with no twist in the inner wires.
B. Too many stations connected to the WLAN.
Which protocol does not require acknowledgment of receipt from the destination? A. TCP B. UDP C. ICMP D. IP
B. UDP
Which of the following security measures has a well known crack and is not safe for an Enterprise WLAN? A. Disabled SSID broadcast B. WEP C. WPA2 D. 802.1x
B. WEP
Which of the following is NOT a potential cause of failure to connect with Wi-Fi automatically? A. Adaptor disabled. B. Wired NIC is enabled at the same time. C. Loose Wi-Fi card connection. D. The network requires a manual connection.
B. Wired NIC is enabled at the same time.
Which of the following commands discards all names to IP address resolution mappings? A. Tracert B. ipconfig/flushdns C. msconfig D. ping 127.0.0.1
B. ipconfig/flushdns
Which of the following commands can be used to make network configuration changes? A. Nslookup B. net C. tracert D. ipconfig /all
B. net
What command is used to map a networks drive? A. net file B. net use C. net share D. net session
B. net use
Which of the following commands displays TCP/IP statistics for the device? A. ipconfig B. netstat C. Ping D. tracert
B. netstat
Which of the following is defined as a transmission method that can go in both directions but only one direction at a time? A. Full Duplex B. Omnidirectional C. Half Duplex D. Simplex
C. Half Duplex
Which of the following switches used with the ipconfig command clears the DNS resolver cache on the device? A. /release B. /registerdns C. /flushdns D. /renew
C. /flushdns
Which of the following switches used with the ipconfig command requests an IP address from a DHCP server? A. /registerdns B. /flushdns C. /renew D. /release
C. /renew
What type of cabling is used in a bus network? (all that apply) A. 10 Base T B. 100 Base T C. 10 Base 2 D. 10 Base 5
C. 10 Base 2 D. 10 Base 5
What is the default port number for POP3? A. 143 B. 53 C. 110 D. 80
C. 110
Which of the following IP addresses is a Class B address? A. 10.6.8.4 B. 169.254.6.10 C. 172.16.5.3 D. 192.168.5.5
C. 172.16.5.3
What encryption type is used with WPA2? A. WEP B. TKIP C. AES D. Triple DES
C. AES
Which of the following is a device that supplies a wireless connection point to the network? A. ACL B. VPN C. AP D. NAT
C. AP
Which of the following is a modem card quality? A. DPI B. Frequency C. Baud rate D. Mbps
C. Baud rate
Which Network Connections option would you choose to create a VPN connection? A. Set Up a Wireless Ad Hoc B. Connect to the Internet C. Connect to a Workplace D. Set Up a Dial Up Connection
C. Connect to a Workplace
Which of the following tools is used to attach connectors to cables? A. Toner probe B. Loopback plug C. Crimper D. Multimeter
C. Crimper
Which of the following is an Intranet connection method that supplies a rate that is unaffected by other users in the neighborhood? A. Satellite B. Dial-up C. DSL D. Cable
C. DSL
Which of the following protocols uses port number 21 by default? A. Telnet B. SMTP C. FTP D. HTTPS
C. FTP
You are not sure if the power cable from the power supply to one of the drives is working. Which tool would you use to determine this? A. Crimper B. Toner probe C. Multimeter D. Loopback plug
C. Multimeter
Which of the following tools is used to attach a cable to the switch block? A. Toner probe B. Cable tester C. Punchdown tool D. Wire stripper
C. Punchdown tool
What protocol is used for email traffic? A. HTTPS B. FTP C. SMTP D. SNMP
C. SMTP
Which of the following topologies is physically a Star but logically a Ring? A. Bus B. Mesh C. Token Ring D. FDDI Ring
C. Token Ring
Which of the following is a network that connects multiple LANs? A. MAN B. PAN C. WAN D. LAN
C. WAN
Which of the following tools is used to remove the outer plastic coating of a cable? A. Cable tester B. Toner probe C. Wire stripper D. Punchdown tool
C. Wire stripper
Which of the following commands displays NetBIOS information? A. net B. nslookup C. nbstat D. fdisk
C. nbstat
Which of the following troubleshooting commands is used to display NetBIOS statistics? A. ipconfig B. ping C. nbstat D. netstat
C. nbstat
Which of the following troubleshooting commands is used to display TCP statistics and all connections? A. ping B. nbtstat C. netstat D. ipconfig
C. netstat
Which of the following commands displays the route taken from one device to another? A. netstat B. ipconfig C. tracert D. ping
C. tracert
Which of the following switches used with the ipconfig command sends a hostname to IP address mapping to a DHCP server? A. /flushdns B. /renew C. /release D. /registerdns
D. /registerdns
Which of the following is NOT a setting available for Remote Desktop in Windows 7? A. Allow Connections from Computers Running Any Version of Remote Desktop (Less secure) B. Dont Allow Connections to this Computer C. Allow Connections Only from Computers Running Remote Desktop with Network Level Authentication (more secure) D. Allow All Connections
D. Allow All Connections
With which of the following network types is the latest version called 4g LTE? A. WiMAX B. Fiber C. ISDN D. Cellular
D. Cellular
A user who formally had no problem connecting to the WLAN now cannot connect to or even see any WLANs. Which of the following is most likely the cause? A. Microwave B. Encryption settings on the station. C. Driver for the wireless adaptor. D. Check the laptop switch that enables Wi-Fi.
D. Check the laptop switch that enables Wi-Fi.
Which of the following is an Intranet connection method that operates at a maximum of 56K? A. DSL B. Cable C. Satellite D. Dial up
D. Dial up
Which of the following cable types would afford the best physical security? A. UTP B. Coaxial C. STP D. Fiber
D. Fiber
Which of the following wireless issues can result in an inability to locate the network when scanning? A. Too many wireless users in the area B. Incorrect security parameters C. Interference in the area D. Hidden SSID
D. Hidden SSID
Which of the following wireless issues can result in an inability to make a connection to a wireless network when the SSID has been configured correctly on the client? A. Interference in the area. B. Hidden SSID. C. Too many wireless users in the area. D. Incorrect security parameters.
D. Incorrect security parameters.
Which of the following security components is used to control access to the SOHO WLAN using the Layer 2 address of each wireless station? A. WEP B. 802.1x C. SSID broadcast D. MAC filtering
D. MAC filtering
Which of the following tools is used ti determine the voltage supplied by a wire? A. Toner probe B. Loopback plug C. Crimper D. Multimeter
D. Multimeter
When troubleshooting a SOHO network, which of the following commands displays NetBIOS related information? A. NETSTAT B. PING C. IPCONFIG D. NBTSTAT
D. NBTSTAT
In which network topology are all systems daisy chained in a circle? A. Star B. Bus C. Mesh D. Ring
D. Ring
Which of the following devices directs traffic based on IP addresses? A. Repeater B. Hub C. Switch D. Router
D. Router
Which of the following cable types is most susceptible to EMI, RFI? A. Fiber B. STP C. Coaxial D. UTP
D. UTP
Which of the following security measures was developed to mitigate the deficiency of WEP? A. EAP B. Disabled SSID broadcast C. 802.1x D. WPA
D. WPA
Which of the following commands is used to update, fix, or view the network or network settings? A. fdisk B. nbtstat C. nslookup D. net
D. net
What command displays all open file shares on the computer? A. net session B. net share C. net use D. net file
D. net file
What command displays all open sessions on the computer? A. net share B. net use C. net file D. net session
D. net session