(IT) Quiz 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

While troubleshooting a network connection, you decide to use the ping command. Which switch allows for a continuous ping? 1. -a 2. -l 3. -c 4. -t

-t

What is the maximum range of the Bluetooth 2.0 specification for Class 1 devices? 1. 10 M 2. 50 M 3. 100 M 4. 300 M 5. 30 M

100 M

Your network follows the 1000Base-T specifications for Gigabit Ethernet. What is the maximum cable segment length allowed? 1. 1,000 meters 2. 100 meters 3. 2,000 meters 4. 412 meters 5. 500 meters

100 meters

Which data transmission rate is defined by the IEEE 802.11b wireless standard? 1. 10 Mbps 2. 54 Mbps 3. 150 Mbps 4. 11 Mbps 5. 2 Mbps

11 Mbps

Which of the following IP addresses belong to the Class A network 114.0.0.0? (Select three.) Tip: Assume the network is indicated by the default portion of the IP address. 1. 115.88.0.55 2. 115.0.0.66 3. 114.58.12.0 4. 115.77.89.4 5. 114.0.0.15 6. 114.122.66.12

114.58.12.0 114.0.0.15 114.122.66.12

Which of the following describes an IPv6 address? (Select two.) 1. 128-bit address 2. Four decimal octets 3. Eight hexadecimal quartets 4. 64-bit address 5. 32-bit address

128-bit address Eight hexadecimal quartets

Which of the following IP addresses are Class B addresses? (Select three.) 1. 224.15.55.2 2. 132.12.0.0 3. 129.0.0.0 4. 195.155.0.0 5. 190.65.2.0 6. 115.33.0.0 7. 64.2.2.64

132.12.0.0 129.0.0.0 190.65.2.0

Which of the following are valid IPv6 addresses? (Select two.) 1. 343F:1EEE:ACDD:2034:1FF3:5012 2. 165.15.78.53.100.1 3. 141:0:0:0:15:0:0:1 4. 6384:1319:7700:7631:446A:5511:8940:2552 5. A82:5B67:7700:AH0A:446A:779F:FFE3:0091

141:0:0:0:15:0:0:1 6384:1319:7700:7631:446A:5511:8940:2552

Which of the following IP address ranges is reserved for Automatic Private IP Addressing? 1. 169.168.0.1 - 169.168.255.255 2. 192.168.0.1 - 192.168.254.255 3. 169.254.0.1 - 169.254.255.254 4. 169.192.0.0 - 169.192.254.255 5. 192.168.0.0 - 192.168.255.254

169.254.0.1 - 169.254.255.254

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? 1. 192.168.0.1 - 192.168.255.254 2. 169.254.0.1 - 169.254.255.254 3. 172.16.0.1 - 172.31.255.254 4. 10.0.0.1 - 10.255.255.254

169.254.0.1 - 169.254.255.254

Which of the following is a valid IP address? (Select two.) 1. 254.7.1.417 2. 192.168.1.512 3. 172.16.1.26 4. 1.254.1.1024 5. 256.0.0.1 6. 10.384.0.3 7. 2.2.2.2

172.16.1.26 2.2.2.2

Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select three.) 1. 1.6.45.254 2. 191.168.2.15 3. 168.16.5.1 4. 129.0.0.1 5. 228.62.18.6 6. 123.254.19.6

191.168.2.15 168.16.5.1 129.0.0.1

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select three.) 1. 192.168.12.253 2. 127.0.0.1 3. 32.188.99.10 4. 240.12.188.1 5. 224.15.166.12 6. 10.0.12.15 7. 172.18.188.67

192.168.12.253 10.0.12.15 172.18.188.67

Which of the following IP addresses are Class C addresses? (Select three.) 1. 189.189.5.2 2. 223.16.5.0 3. 240.0.0.0 4. 222.55.0.0 5. 125.166.11.0 6. 192.15.5.55

223.16.5.0 222.55.0.0 192.15.5.55

What is the default subnet mask for the IP address 203.111.3.3? 1. 255.255.0.0 2. 255.255.255.255 3. 255.255.255.0 4. 255.0.0.0

255.255.255.0

What is the maximum transmission speed for Bluetooth devices? 1. 1 Mbps 2. 3 Mbps 3. 54 Mbps 4. 11 Mbps

3 Mbps

You've enabled Remote Desktop on a Windows workstation. Which port must be opened in the server's firewall to allow remote clients to access the desktop? 1. 3389 2. 123 3. 110 4. 389

3389

Which of the following are not valid IP addresses? (Select three.) 1. 122.0.0.0 2. 45.22.156.256 3. 1.55.254.3 4. 257.0.122.55 5. 145.8.260.7 6. 116.0.0.116 7. 132.64.32.8

45.22.156.256 257.0.122.55 145.8.260.7

You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service? 1. 123 2. 143 3. 110 4. 53

53

Which wireless standard operates at up to 54 Mbps to a maximum of 150 feet? 1. 802.11b 2. 802.11n 3. 802.11g 4. 802.11a

802.11a

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) 1. 802.1x 2. 802.11g 3. Bluetooth 4. 802.11a 5. 802.11b

802.11g 802.11a

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? 1. 802.11g 2. 802.11b 3. 802.11a 4. 802.11n

802.11n

Which of the following is the best definition for a LAN? 1. A network in a small geographic area, like in an office. 2. An extension of a private network over a shared or public network such as the Internet. 3. A network whose computers and servers are separated geographically, but still connected. 4. The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meters or less).

A network in a small geographic area, like an office

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection? 1. Infrastructure 2. WEP 3. WAP 4. Ad hoc

Ad hoc

Which of the following are characteristics of Bluetooth? (Select two.) 1. Line-of-sight transmission 2. Ad hoc connections 3. 5.75 GHz radio wireless 4. 2.4 GHz radio wireless 5. Red spectrum light waves

Ad hoc connections 2.4 GHz radio wireless

Which of the following is a rating of the amount of data that can be sent over a network in a period of time? 1. Broadband 2. Latency 3. Jitter 4. Bandwidth

Bandwidth

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which would be the best choice? 1. Cellular WAN 2. Wireless Ethernet 3. Infrared 4. Bluetooth

Bluetooth

You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose? 1. Bluetooth 2. PS/2 3. USB 4. IEEE 1394 5. 802.11g wireless

Bluetooth

You want to use a wireless printer at home. The printer will be used by two computers in two different rooms. Which interfaces could be used to do this? (Select two.) 1. USB 2. IEEE 1284 3. Bluetooth 4. Wireless Ethernet 5. Infrared (IrDA) 6. IEEE 1394

Bluetooth Wireless Ethernet

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is attempting to access the report through a share with the Full Control permission assigned to the Everyone group. Which of the following statements correctly describes Bob's ability to access the WeeklyReport.xls file? 1. Bob cannot search for or open the file. 2. Bob can open, read, and write changes to the file 3. Bob can find the file in a search, but cannot open the file. 4. Bob has Full Access to the file, and can open, read, write changes, delete, and change permissions on the file. 5. Bob can open and read the file, but cannot write changes to the file.

Bob can open, read, and write changes to the file

Which of the following topologies connects all devices to a trunk cable? 1. Ad-hoc 2. Ring 3. Star 4. Bus

Bus

Which of the following statements are true regarding administrative shares? (Select two.) 1. If you are a member of the Administrators group, the administrative shares are visible when browsing the network. 2. Default administrative shares are accessed by members of the Administrators or Power Users group. 3. By default, Windows automatically creates an administrative share for every volume. 4. To connect to an administrative share, you must use the UNC path.

By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path.

You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized configuration settings? 1. Disabling DHCP 2. Disabling SSID broadcast 3. Implementing MAC address filtering 4. Changing the administrative password

Changing the administrative password

Which tool in Windows would you use to browse all networks and shared folders to which a user has access? (Select three.) 1. Device Manager 2. Computer Management 3. Computer 4. Windows Explorer 5. Network Neighborhood 6. Network

Computer Windows Explorer Network

Which tool in Windows would you use to browse all networks and shared folders to which a user has access? (Select three.) 1. Device Manager 2. Network Neighborhood 3. Computer 4. Windows Explorer 5. Computer Management 6. Network

Computer Windows Explorer Network

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. What should you do? (Select two.) 1. Configure share permissions. 2. Configure both share and NTFS permissions. 3. Place the files on an NTFS partition. 4. Place the files on a FAT32 partition. 5. Configure NTFS permissions.

Configure both share and NTFS permissions. Place the files on an NTFS partition.

Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter? 1. Fiber-optic cable 2. Infrared light waves 3. Wireless radio waves 4. Cable TV coaxial cable 5. Copper telephone wire

Copper telephone wire

Which service can you use on your network to automatically assign IP addresses to hosts and to help prevent the same address from being assigned to two different hosts? 1. IGMP 2. DHCP 3. TCP 4. ICMP

DHCP

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this? 1. DNS 2. WINS 3. LMHOSTS file 4. NTP 5. SMTP

DNS

Which of the following is not an example of wireless networking communications? 1. Infrared 2. 802.11n 3. DSL 4. Bluetooth

DSL

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks? 1. DNS server address 2. Host name 3. Alternate IP address 4. Default gateway 5. Subnet mask 6. WINS server address

Default gateway

Which of the following are features of Basic Rate ISDN (BRI)? (Select three.) 1. Dial-up connection 2. Two data Channels 3. Up to 24 data channels 4. One control channel 5. Always-on connection 6. Three control channels

Dial-up connection Two data channels One control channel

Which of the following terms describes a group of computers and users that utilize centralized resources, administration, and security settings? (Select two.) 1. Peer-to-peer 2. Workgroup 3. Directory 4. Local area network 5. Domain

Directory Domain

You've just installed a wireless access point (AP) for your organization's network. You know that the radio signals used by the AP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (Select two.) 1. Install a radio signal jammer at the perimeter of your organization's property. 2. Use the AP configuration utility to reduce the radio signal strength. 3. Disable the spread-spectrum radio signal feature on the AP. 4. Disable DHCP on the AP. 5. Implement an AP with a shorter range. 6. Configure the AP to filter out unauthorized MAC addresses.

Disable DHCP on the AP. Configure the AP to filter out unauthorized MAC addresses.

Which of the following measures will make your wireless network less visible to the casual attacker performing war driving? 1. Disable SSID broadcast 2. Implement WPA2 Personal 3. Implement MAC address filtering 4. Change the default SSID 5. Use a form of authentication other than Open authentication

Disable SSID broadcast

A customer has called and indicated that he thinks his neighbor is connecting to his wireless access point (AP) to use his high-speed Internet connection. Which of the following will help resolve this issue? (Select two.) 1. Install radio signal jamming equipment between his house and the neighbor's house. 2. Upgrade to an 802.11g access point. 3. Disable SSID broadcast on the AP. 4. Use the access point configuration utility to change the signal channel. 5. Implement WPA2

Disable SSID broadcast on the AP. Implement WPA2

Which of the following features is supplied by WPA2 on a wireless network? 1. Refusal of client connections based on MAC address 2. Encryption 3. Filtering of traffic based on packet characteristics 4. Centralized access point for clients 5. Identification of the network

Encryption

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network? 1. Token Ring 2. Bluetooth 3. 802.11n 4. ArcNet 5. Ethernet

Ethernet

Which of the following are used to connect a cable modem to the Internet connection? (Select two.) 1. F-type connectors 2. Cat6 UTP cable 3. RG-6 coaxial cable 4. RJ-11 connectors 5. RJ-45 connectors 6. Cat5 UTP cable

F-type connectors RG-6 coaxial cable

Which of the following is a valid IPv6 address? 1. FEC0::AB:9007 2. FEC0:AB04:899A 3. FEC0:AB98::A7::9845:4567 4. FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A 5. 199.12.254.11

FECO::AB:9007

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? 1. SNMP 2. LDAP 3. SSH 4. FTP 5. TFTP 6. SMTP

FTP

You are working on a Windows XP system and want to synchronize the offline files on your computer with the versions on the network. Which tool would you use? 1. C:\Windows\Offline Files 2. Sync Center 3. Folder Options 4. Mapped drive properties

Folder Options

Which IP protocol is used by Web browsers and Web servers to exchange files? 1. SMTP 2. SSL 3. HTTP 4. HTML

HTTP

Which protocols are used on the Internet to transmit Web pages from Web servers to Web browsers running on client workstations? (Select two.) 1. HTTPS 2. HTTP 3. XML 4. NNTP 5. HTML 6. SMTP

HTTPS HTTP

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.) 1. Decimal numbers 2. Hexadecimal numbers 3. 32 numbers, grouped using colons 4. 128 numbers, grouped using colons 5. Binary numbers

Hexadecimal numbers 32 numbers, grouped using colons

You have a Windows 7 computer connected to a small network that is not part of a domain. You want to see the computers and printers on the network. Which feature would you use? 1. My Network Places 2. Device Manager 3. HomeGroup 4. Devices and Printers

HomeGroup

Which of the following protocols is used by an e-mail client to retrieve messages from an e- mail server and gives users the option to keep mail messages on the server? 1. SMTP 2. NTP 3. POP3 4. IMAP

IMAP

You want to use your Windows workstation to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this? 1. IPX/SPX 2. NetBIOS 3. IP 4. SLIP 5. PPP

IP

Which of the following network technologies is packaged as part of a BRI plan? 1. DSL 2. ISDN 3. Cable modem 4. Dial-up

ISDN

You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point? 1. In the kitchen area 2. In the basement 3. Near the backup generators 4. In the top floor

In the top floor

Which actions allow you to access the Internet on your laptop via a cellular network? 1. Connect the laptop to the RJ-11 jack in your office. 2. Connect the cell phone to the PHONE port on the dialup modem in your office, and connect the laptop to the LINE port on the modem. 3. Install a cellular USB adapter in a open port on the laptop. 4. Connect your wireless access point to the cellular network with a USB dongle, then

Install a cellular USB adapter in a open port on the laptop.

You are setting up a small network in your office with one Windows server and 50 Windows workstations. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do? 1. Install the DHCP service on your server. 2. Install the DHCP service on each workstation. 3. Assign each user an IP address and instruct the user to enter the IP address in his or her computer. 4. Install the WINS service on your server.

Install the DHCP service on your server

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem? 1. Interference is affecting the wireless signal. 2. The user has not yet rebooted her laptop computer while at her new location. 3. The client computer is using the wrong channel number. 4. SSID broadcast has been disabled. 5. MAC filtering is preventing the computer from connecting.

Interference is affecting the wireless signal.

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? (Select two.) 1. It can only deliver IP addresses to hosts. 2. It can deliver a DNS server address in addition to the host IP address. 3. It cannot be configured to assign the same IP address to the same host each time it boots. 4. A workstation must request addressing information from a DHCP server. 5. The DHCP server detects workstations when they attach to the network and automatically delivers IP addressing information to them.

It can deliver a DNS server address in addition to the host IP address. A workstation must request addressing information from a DHCP server.

You have a small network. All computers are running Windows 7. You have created a HomeGroup for your network. You have a laptop that you use at work that runs Windows 7 Professional. You connect the laptop to the network. You are unable to see shared files on other computers. What should you do? 1. Join the laptop to the HomeGroup. 2. Set the profile for the network connection to Home. 3. Reconfigure NTFS permissions on all shared resources. 4. Create a HomeGroup on the laptop; add other computers to that HomeGroup. Explanation

Join the laptop to the HomeGroup.

Which of the following features on a wireless network allows or rejects client connections based on the hardware address? 1. WPA2 2. DHCP 3. SSID 4. MAC address filtering 5. WEP

MAC address filtering

Which of the following are characteristics of the 802.11g wireless standard? (Select three.) 1. Backwards compatible with 802.11a devices 2. Maximum bandwidth of 54 Mbps 3. Operates in the 5.75 GHz range 4. Maximum bandwidth of 11 Mbps 5. Operates in the 2.4 GHz range 6. Backwards compatible with 802.11b devices

Maximum bandwidth of 54 Mbps Operates in the 2.4 GHz range Backwards compatible with 802.11b devices

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? 1. Mesh 2. Star 3. Ring 4. Bus

Mesh

You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network? 1. Star 2. Bus 3. Mesh 4. Ring 5. Tree

Mesh

You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs? 1. Bus 2. Star 3. Mesh 4. Ring

Mesh

You have a network that uses a logical bus topology. How do messages travel through the network? 1. Messages are broadcast to all devices connected to the network. 2. Messages are sent directly to the correct destination device. 3. Messages travel from one device to the next until they reached the destination device. 4. Messages are sent to a central device which then forwards the message to the destination device.

Messages are broadcast to all devices connected to the network

You have a network that uses a logical ring topology. How do messages travel through the network? 1. Messages are sent directly to the destination device only. 2. Messages are sent to a central device which then forwards the message to the destination device. 3. Messages are sent to all devices connected to the network. 4. Messages travel from one device to the next until they reached the destination device.

Messages travel from one device to the next until they reached the destination device.

To access the Internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use? 1. TDM 2. CSU/DSU 3. DTE 4. Modem 5. Switch

Modem

Which of the following permissions are not available when sharing a folder on a Windows 7 workstation? (Select two.) 1. Modify 2. Read 3. Read/write 4. Write

Modify Write

You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do? 1. Modify the NTFS permissions on the folder. 2. Create new user accounts for each user and assign the necessary folder permissions. 3. Create a group and make all user accounts members of the group. Grant Full Control share permissions to the group. 4. Install Samba on your workstation, then configure permissions using Samba.

Modify the NTFS permissions on the folder.

A portable computer connected to a printer with an infrared interface works fine inside your office. However, when you go outside it works sporadically. How can you fix this? (Select two.) 1. Install a Gamma Ray Spectrometer (GRS) to shield the interface. 2. Set the environment setting to outdoor mode in the BIOS. 3. Move the printer closer to the computer. 4. Block any direct and reflected sunlight from the pathway between the PC and the printer.

Move the printer closer to the computer. Block any direct and reflected sunlight from the pathway between the PC and the printer.

What is the least secure place to locate the access point when creating a wireless network? 1. Near a window 2. Above the 3rd floor 3. In common or community work areas 4. In the center of the building

Near a window

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.) 1. In the top floor of a two-story building 2. Near cordless phones 3. Near DCHP servers 4. Near backup generators 5. Near exterior walls

Near cordless phones Near backup generators

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications? 1. AppleTalk over IP 2. IP 3. IPX 4. NetBIOS

NetBIOS

Which tool would you use in Windows Vista/7 to manage network connections? 1. Internet Options 2. Network and Sharing Center 3. My Network Places 4. Network Neighborhood

Network and Sharing Center

When configuring an ADSL installation, where should you to install the DSL filters? 1. On connections leading to an analog phone 2. On all F-type connectors 3. After the DSL router but before any computers 4. On the connection leading to the DSL router

On connections leading to an analog phone

Which of the following protocols do e-mail clients use to download messages from a remote mail server? 1. SMTP 2. POP3 3. SNMP 4. FTP

POP3

What type of network describes a workgroup? 1. Server-based network 2. Client-based network 3. Peer-to-peer network 4. Ad-hock network

Peer-To-Peer network

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building? 1. Place access points above where most clients are. 2. Place access points in the basement. 3. Place access points near outside walls. 4. Place multiple access points in the same area.

Place access points above where most clients are.

You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select two.) 1. RJ-11 connectors 2. RG-6 cable 3. F-type connectors 4. Filters or splitters 5. Analog modem

RJ-11 connectors Filters or splitters

In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device? 1. Ring 2. Tree 3. Star 4. Bus

Ring

Which of the following topologies connects each device to a neighboring device? 1. Tree 2. Star 3. Ring 4. Bus

Ring

What protocol is used to send e-mail messages from a mail client to a mail server? 1. POP3 2. SMTP 3. IMAP 4. SNMP 5. FTP

SMTP

Which of the following tools allow for remote management of servers? (Select two.) 1. LDAP 2. SSH 3. FTP 4. Telnet 5. POP3

SSH Telnet

Which of the following is used on a wireless network to identify the network name? 1. MAC address 2. SSID 3. WPA2 passphrase 4. WEP key

SSID

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas? 1. DSL 2. ISDN 3. Cable modem 4. Dial-up 5. Satellite

Satellite

Which of the following are advantages of using a domain to manage a network? (Select two.) 1. Little or no configuration 2. Decentralized administration 3. Scalability 4. Peer-to-peer sharing of network resources 5. Centralized administration

Scalability Centralized administration

Which of the following topologies connects each network device to a central hub? 1. Ring 2. Bus 3. Star 4. Mesh

Star

You have a small network that uses a hub to connect multiple devices. What physical topology is used? 1. Bus 2. Star 3. Ring 4. Mesh

Star

What device is used to create a physical star topology? 1. Switch 2. Repeater 3. Router 4. Bridge

Switch

You are working on a Windows 7 system and want to synchronize the offline files on your computer with the versions on the network. Which tool would you use? (Select two.) 1. C:\Windows\Offline Files 2. Folder Options 3. Sync Center 4. Synchronize 5. Mapped drive properties

Sync Center Mapped drive properties

Which of the following best describes an IP address class? 1. The class is the version of IP addressing standard used by the address. 2. The class refers to the range of IP addresses that a DHCP server has been authorized to assign. 3. The class defines the default network address portion of the IP address. 4. The class defines the type of device that the address is assigned to (i.e. server, printer, workstation).

The class defines the default network address portion of the IP address.

A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem? 1. The encryption level has been erroneously set back to the default setting. 2. An SSID mismatch between the client and the server. 3. An SSID mismatch between the client and the WAP. 4. The client has incorrect WPA2 settings. 5. The client system has moved too far away from the access point.

The client system has moved too far away from the access point.

Which of the following is true of a network using the 10Base-T standard? (Select two.) 1. The maximum cable distance is 10 meters 2. The network operates at ten kilobits per second 3. The maximum cable distance is 100 meters 4. The network operates at ten megabits per second 5. The network operates at ten gigabits per second

The maximum cable distance is 100 meters The network operates at ten megabits per second

Which of the following is true of a network using the 1000Base-T standard? (Select two.) 1. The network uses copper UTP cables 2. The network operates at one gigabit per second 3. The network uses fiber optic cables 4. The network operates at one kilobit per second 5. The network operates at ten gigabits per second

The network uses copper UTP cables The network operates at one gigabit per second

You have an Ethernet network using the 10Base-T standard. Network devices are connected together using hubs. Which of the following is true? 1. The maximum cable length is 10 meters. 2. The maximum speed is 10 Gbps. 3. Devices use RG-6 cables. 4. The network uses half-duplex communications.

The network uses half-duplex communications

You are installing a satellite connection so your home office can connect to the Internet. Which of the following statements is true? 1. The connection between the satellite modem and dish uses a USB cable and connector. 2. You must have at the least one available phone line for data uploads. 3. The connection to your computer from the satellite modem may be RJ-11 or F-type. 4. The satellite dish must be pointed in the correct direction for communicating with the satellite.

The satellite dish must be pointed in the correct direction for communicating with the satellite.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem? 1. The wireless network access point on the user's normal floor has failed. 2. The user needs a new IP address because she is working on a different floor. 3. The user is out of the effective range of the wireless access point on her floor. 4. The user has not yet logged off and back on to the network while at her new location. 5. The user has not yet rebooted her laptop computer while at her new location.

The user is out of the effective range of the wireless access point on her floor.

Which of the following are good reasons to enable NAT? 1. To prevent hackers from accessing your network 2. To translate between Internet IP addresses and the IP addresses on your private network 3. To limit public access to just your DHCP server instead of your whole network 4. To cache web pages

To translate between Internet IP addresses and the IP addresses on your private network

You are a software developer and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server? 1. ICMP 2. UDP 3. SNMP 4. TCP

UDP

You recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the router? 1. Configure the DHCP service 2. Update the firmware 3. Configure port triggering 4. Enable NAT

Update the firmware

On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points? 1. Only users that know the correct SSID 2. Users with the correct WEP key 3. Users with the correct WPA2 Personal passphrase 4. Users within the 80% strength radius

Users with the correct WEP key

Which of the following protocols carry phone calls over an IP-based network? 1. HTTP 2. VoIP 3. TCP 4. RTSP

VoIP

Which of the following are security protocols for wireless networks? (Select two.) 1. BitLocker 2. VPN 3. WEP 4. WPA 5. 802.11n

WEP WPA

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? 1. WEP 2. WPA2 3. Kerberos 4. WPA

WPA2

Which of the following is true when the DHCP setting is disabled in a wireless network? 1. Wireless clients must use the correct wireless access point identifier (i.e., SSID) to connect to the network. 2. Wireless clients must use a static IP address within the correct IP address range to connect to the network. 3. Wireless clients with specific MAC addresses are denied access to the network. 4. Wireless clients must use the correct encryption key with its packets.

Wireless clients must use a static IP address within the correct IP address range to connect to the network.

You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from Internet. When you try to connect to the Internet using your modem, you can't. What is the problem? 1. You need to disable call waiting. 2. The ISP access number is incorrect. 3. You need to install and configure TCP/IP. 4. You need to hang up.

You need to hang up.

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which format would you use? 1. Home1:Pictures 2. .Home1:Pictures 3. Home1:\\Pictures 4. \\Home1\Pictures

\\Home1\Pictures

Which mechanisms could you use to resolve a hostname into its associated IP address? (Select two.) 1. hosts file 2. BOOTP 3. DNS 4. DHCP 5. FTP

hosts file DNS

You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the MAC address of the network adapter? 1. netstat 2. ping 3. nslookup 4. ipconfig /all 5. ipconfig

ipconfig /all

Which command would you use to have a workstation stop using an IP address that it obtained from a DHCP server? 1. ipconfig /release 2. net logoff 3. ipconfig /renew 4. net stop

ipconfig /release

You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server? 1. net use 2. ipconfig /renew 3. ipconfig /all 4. net config

ipconfig /renew

How can you see a list of valid command parameters for the net command? 1. net /? 2. net help 3. help net 4. net -h

net /?

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will confirm your suspicions? 1. tracert 2. nslookup 3. ipconfig 4. net use

net use

Which utility would you use to view current connections and active sessions and ports on a computer? 1. netstat 2. ping 3. nslookup 4. ipconfig

netstat

A user is having problems connecting to other computers using host names. Which of the following commands will help you troubleshoot this problem? 1. nbtstat 2. arp 3. nslookup 4. netstat

nslookup

Examine the following output: Server: helicuplar.xct.takro.net Address: 209.53.4.130 Name: westsim.com Address: 64.78.193.84 Which command produced this output? 1. ipconfig 2. tracers 3. netstat 4. nslookup

nslookup

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? (Select two.) 1. Domain 2. Peer-to-peer 3. Directory 4. Client/server 5. Workgroup

peer-to-peer workgroup

Examine the following output: Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 Reply from 64.78.193.84: bytes=32 time=43ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Which utility produced this output? 1. tracert 2. ping 3. nslookup 4. ifconfig

ping

You suspect large packets are being dropped on your network because of their large size. Which utility can you use to confirm your suspicion? 1. tracert 2. ping -t 3. netstat 4. ping -l 5. nslookup

ping -1

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation and an application you are using is unable to connect to a Windows server named FileSrv2. Which commands can you use to test network connectivity between your workstation and the server? (Select two.) 1. arp 2. nslookup 3. dig 4. traceroute 5. ping

trace route ping

Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core 01.inet.ispxy.net [205.171.142.1] Which command produced this output? 1. ping 2. netstat 3. tracert 4. nslookup

tracert

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly? 1. tracert 2. nbtstat 3. nslookup 4. netstat

tracert


संबंधित स्टडी सेट्स

Unit 2: Common Real Estate Transaction Documents

View Set

Chapter 4-Critical Thinking in Nursing-Final Exam Adaptive Quiz

View Set

Smartbook Recharge Chapter 14 ACCT 405

View Set

Reden, informieren, fragen, antworten

View Set