Network+ Final and Cert Study Guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What range of port numbers comprises the well-known port numbers? a. 0 to 64 b. 0 to 128 c. 0 to 1023 d. 0 to 8880

0 to 1023

What is the maximum speed at which Category 3 UTP can transmit data? a. 1 Mbps b. 10 Mbps c. 100 Mbps d. 1 Gbps

10 Mbps

Which of the following addresses could represent the SMTP service using its default port on a mail server? a. 188.65.79.80:25 b. 188.65.79.80...24 c. 188.65.79.80$24 d. 188.65.79.80;25

188.65.79.80:25

What is the minimum number of physical hard disks required for disk mirroring? a. 1 b. 2 c. 4 d. 5

2

What is the minimum size of an Ethernet frame? a. 56 bytes b. 64 bytes c. 128 bytes d. 256 bytes

64 bytes

What is the default port number for the HTTP service? a. 40 b. 44 c. 60 d. 80

80

Which of the following could serve as firewalls? (Choose all that apply.) a. A modem b. A Windows server c. A repeater d. A Linux server

A Windows server A Linux server

What is an organizational unit? a. A department or division within an organization b. A container used to group users with similar permissions and rights c. A container used to group similar objects such as users or groups d. An organization

A container used to group similar objects such as users or groups

What is the best defense against social engineering? a. A strong security policy and educating users b. Employing Kerberos authentication for all users c. Configuring a firewall to accept transmissions only from certain IP addresses d. Limiting the ports on a server through which client communication may take place

A strong security policy and educating users

What Boolean function is used to derive the network address by combining the IP address with the subnet mask? a. NAND b. AND c. OR d. NOT

AND

What two file types can you specify when transferring files via FTP? a. ASCII and binary b. Alphabetical and numeric c. Program and data d. Dynamic and static

ASCII and binary

What part of a data frame checks to make sure that the data arrived exactly as it was sent? a. CRC b. Start delimiter c. Payload d. Padding

CRC

What type of network access method is used on an Ethernet switch? a. CSMA/CA b. CSMA/CD c. Demand priority d. Token passing

CSMA/CD

In a very large company (for example, one with over 10,000 employees), which of the following staff is most likely to decide whether a project such as an entire network upgrade will be funded? a. Network administrator b. Personnel director c. Chief information officer d. Accountant

Chief information officer

Which of the following is the most popular type of modern network architecture for business? a. Client-server b. Terminal/mainframe c. Peer-to-peer d. Mainframe/dial-up

Client-server

Which of the following is commonly used to protect UTP cable from EMI? a. Conduit b. STP c. Crossover cable d. Lead shielding

Conduit

What is line conditioning? a. Regular testing of the integrity of electrical systems b. Periodic application of a large amount of voltage to electrical systems to clean the lines c. Continuous filtering of an electrical circuit to protect against noise d. Intermittent fluctuation of voltage on a circuit, which over time will cause power flaws for connected devices

Continuous filtering of an electrical circuit to protect against noise

The types of measurements recorded by Performance Monitor are called _____. a. Metrics b. Performance indicators c. Monitoring tools d. Counters

Counters

All of the following configuration information can be supplied by a DHCP server. Which of the following cannot be supplied by APIPA? (Choose all that apply.) a. IP address b. Subnet mask c. DNS servers d. Default gateway

DNS servers Default gateway

Which of the following problems could cause signal loss in fiber-optic cable? a. Cross-talk between strands of fiber in multimode fiber cables b. Cross-talk between cables in single-mode fiber cables c. Electromagnetic interference caused by power lines near the cables d. Dirty connectors

Dirty connectors

Which of the following elements is not required for a client to connect to a server on a client-server LAN? a. Protocols b. Media c. Email account d. Client software

Email account

WEP, WPA, and WPA2 are all forms of wireless_____________________ . a. Access b. Routers c. Services d. Encryption

Encryption

A rogue access point set up to look like a legitimate access point is called a(n) ____. a. Guest network b. Evil twin c. Remote bridge d. Password sniffer

Evil twin

Which of the following is not an advantage of fiber cables over UTP cables? a. Fiber is not susceptible to electric interference, whereas UTP cable is. b. Fiber is less fragile than UTP cable. c. Fiber is more expensive than UTP cable. d. Fiber can transmit data over longer distances than UTP cable.

Fiber is more expensive than UTP cable

What type of cable is required for 100Base-FX? a. Coaxial cable b. UTP c. STP d. Fiber-optic cable

Fiber-optic cable

Which information is not included in an Ethernet frame's 14-byte header? a. Frame check sequence b. Source address c. Destination address d. Ethernet type

Frame check sequence

Which of the following methods of accessing files over the Internet is the most secure? a. HTTP b. HTTPS c. TFTP d. FTP

HTTPS

A map of the Wi-Fi coverage and interference in an area is called a(n) ______ map. a. Signal b. Heat c. Zone d. Address

Heat

What protocol does the ping command use? a. TCP/IP b. UDP c. ICMP d. ARP

ICMP

Which of the following encryption methods is commonly used to secure transmissions over virtual private networks (VPNs)? a. Kerberos b. RAS c. PGP d. IPsec

IPsec

On a typical 100Base-T network, where would you find transceivers? In the NICs In the operating systems In the UPSs In the cabling

In the NICs

What type of address identifies the source of data in a frame? a. MAC b. Logical c. Network d. Host

MAC

You can limit access to certain computers with: a. Encryption b. MAC filtering c. Remote administration d. Using a strong password

MAC filtering

Which of the following could be shared as resources across a network? (Choose all that apply.) a. Microsoft Word and other Office software b. Printers c. Documents d. Network interface cards

Microsoft Word and other Office software Printers Documents

A(n) ______ firewall is placed between a private and public network. a. Host-based b. Network-based c. Content-based d. Interface-based

Network-based

You look up an IP address on arin.net and two organizations are listed. What does this mean? a. The two organizations share the IP address assignment. b. That IP address is currently involved in a network attack. c. The RIR made a mistake. d. One organization delegated the IP address to the second.

One organization delegated the IP address to the second.

What feature will eliminate the need for a separate electrical outlet for your WAP? a. PoE b. WPA c. WPA2 d. 802.11n

PoE

The task that must be completed before another task is begun is called a(n) ______________ . a. Successor b. Predecessor c. Antecedent d. Dependent

Predecessor

Which of the following types of software can be patched to improve their security? (Choose all that apply.) Router OS Web browser Email client Workstation OS

Router OS Web browser Email client Workstation OS

What does RIP stand for? a. Regulated Interaction Protocol b. Routing Information Protocol c. Response Interpretation Protocol d. Registered Installation Protocol

Routing Information Protocol

Wireless access points are assigned a unique name or _____. a. FHSS b. DSSS c. CSMA d. SSID

SSID

What organization is responsible for establishing structured wiring standards? a. TIA/EIA b. ANSI c. ITU d. FCC

TIA/EIA

What does the nslookup command reveal? a. A client's current connections b. A client's routing table entries c. The IP address of a given host name or vice versa d. The NetBIOS name based on a computer's IP address

The IP address of a given host name or vice versa

What would you ping to determine whether TCP/IP was functioning properly on your computer? a. The gateway address b. The near side of the router c. The loopback address d. The far side of the router

The loopback address

How does bend radius affect transmission? a. Transmission will not be successful until the bend radius has been reached. b. Transmission cannot occur at the bend radius. c. Transmission will be unreliable after the bend radius is exceeded. d. Transmission will be less secure after the bend radius is exceeded.

Transmission will be unreliable after the bend radius is exceeded.

At what layer of the OSI model does TCP work? a. Physical layer b. Data Link layer c. Network layer d. Transport layer

Transport layer

Which of the following is a potential advantage of being able to manage computers remotely? a. You will not need to log on to each individual computer. b. It eliminates the need for authentications. c. It uses less CPU time. d. It prevents security problems.

You will not need to log on to each individual computer.

What is the term for the group of devices that a name server manages? a. Hierarchy b. Tree c. Zone d. Directory

Zone

What is the administrator's default account called in Linux? a. Admin b. Administrator c. default d. root

root

Which of the following RAID levels provides fault tolerance, while also making a large amount of disk space available? a. 0 b. 1 c. 3 d. 5

5

Which of the following Wi-Fi standards has the highest effective throughput? a. 802.11g b. 802.11a c. 802.11b d. 802.11n

802.11n

Which of the following commands can reveal the number of hops a packet takes between a source and target node? a. ipconfig b. ping c. tracert d. ifconfig

tracert

Which of the following commands would you use to determine the relative location of network congestion between your Windows workstation and an Internet host? a. netstat b. nbtstat c. tracert d. ipconfig

tracert

How many times is a checksum calculated when a frame of data is sent from a source computer to a destination computer that resides on the same segment? a. 1 b. 2 c. 3 d. 4

1

Which of the following levels of RAID offers disk mirroring? a. 0 b. 1 c. 3 d. 5

1

In the default ping command on a computer running Windows, how many replies will you receive if the test is successful? a. 1 b. 2 c. 3 d. 4

4

What would you type at the ftp> prompt to view a list of available FTP commands? (Choose all that apply.) a. list b. ? c. help d. commands

? help

You are a network administrator managing a network backbone upgrade. Your supervisor has scheduled a meeting to discuss the project's status with you. What is the advantage of taking a Gantt chart to the meeting? a. A Gantt chart will help the supervisor better understand the project's costs. b. A Gantt chart will determine the maximum possible amount of each employee's time to be spent on each task. c. A Gantt chart will allow the supervisor to see timelines of each task in addition to the project as a whole. d. A Gantt chart will demonstrate why some tasks have taken longer to complete than first anticipated.

A Gantt chart will allow the supervisor to see timelines of each task in addition to the project as a whole.

If you receive an infected file as an executable program attached to an email message, which of the following is this program likely to be? a. A macro virus b. A Trojan c. A worm d. A boot sector virus

A Trojan

What is the difference between a Trojan and a true virus? a. A Trojan does not automatically replicate itself, whereas a true virus does. b. A Trojan causes harm by simply being on the computer's hard disk, whereas a true virus file must be executed by the user. c. A Trojan often can't be detected by a virus-scanning program, whereas a true virus can almost always be detected by such a program. d. A Trojan changes its binary characteristics to avoid detection, whereas a true virus's binary characteristics remain static.

A Trojan does not automatically replicate itself, whereas a true virus does.

Which of the following most fully describes what a successful response from the ping command indicates? a. A node is powered on. b. A node is physically connected to the network. c. A node is running the Windows Server operating system. d. A node is connected to the network and is running TCP/IP successfully.

A node is connected to the network and is running TCP/IP successfully.

In Microsoft terminology, what is a hot fix? a. A patch that replaces all or a portion of the NOS b. A patch that requires that the server be connected to the Microsoft Web site as it is installed c. A patch that updates a specific type of software, often the operating system d. A patch that can be installed while users are logged on without causing adverse effects

A patch that updates a specific type of software, often the operating system

Which of the following is a difference between a router and a hub? a. A router is less sophisticated than a hub. b. A router operates at the Transport layer of the OSI model, whereas a hub operates at the Data Link layer of the OSI model. c. A router operates at the Network layer of the OSI model, whereas a hub operates at the Physical layer of the OSI model. d. A router regenerates signals, whereas a hub interprets addressing information to ensure that data is directed to the proper destination.

A router operates at the Network layer of the OSI model, whereas a hub operates at the Physical layer of the OSI model.

How can you tell whether a printer is shared in Windows 7 or 8.1? a. The word shared is written on the Printer icon. b. There is no way to tell. c. A small icon appears at the bottom of the Printer icon. d. Each shared printer appears in the Shared Printers folder.

A small icon appears at the bottom of the Printer icon.

What is a socket? a. A virtual connector that associates a URL with its IP address b. A method of identifying the IP addresses belonging to clients as they connect to servers c. A logical address assigned to a specific process running on a computer d. A discrete unit of data

A virtual connector that associates a URL with its IP address

In which of the following ways does a wireless LAN differ from an Ethernet LAN? a. A wireless LAN requires additional protocols in the TCP/IP suite. b. A wireless LAN uses completely different protocols than an Ethernet LAN. c. A wireless LAN uses different techniques at the Physical layer to transmit data. d. A wireless LAN uses different techniques at the Data Link layer to transmit frames.

A wireless LAN uses different techniques at the Physical layer to transmit data.

Where would you find a plenum cable? a. Above the ceiling tiles in an office b. In an outdoor cable trench that leads to a building c. Between a hub and a punch-down panel d. Between a workstation and a wall jack

Above the ceiling tiles in an office

Which of the following network enhancements can introduce new security risks? (Choose all that apply.) a. Adding remote access for users who travel b. Adding time-of-day restrictions for logons c. Modifying a tape backup rotation scheme d. Providing Web access to a server's data files

Adding remote access for users who travel Providing Web access to a server's data files

What is the term for an FTP site that allows any user to access its directories? a. Anonymous b. Restricted c. Private d. Unlimited

Anonymous

The packet inside a frame contains which of the following? a. Source destination address b. Source MAC address c. FCS d. Source IP address

Source IP address

Why do most remote clients (for example, those that dial in to an RRAS server) use DHCP and not static IP addressing? a. Because using DHCP allows more efficient use of a limited number of IP addresses b. Because using DHCP ensures that the client is authorized to access the network c. Because using DHCP ensures that the client is assigned a valid IP address d. Because using DHCP allows the client to use the same IP address each time he or she dials in to the LAN

Because using DHCP ensures that the client is assigned a valid IP address

Which of the following power conditions equates to a power failure? Sag Line noise Surge Blackout

Blackout

How is subnetting accomplished? a. By changing the subnet mask on the host computers b. By changing the IP address on the host computers c. By installing the subnet protocol d. By installing a router running DHCP

By changing the subnet mask on the host computers

Which of the following tools will issue a simple pass/fail indication for a Cat 5 UTP cable? a. Cable checker b. Time domain reflectometer c. Multimeter d. Tone generator

Cable checker

The 1000Base-TX standard requires _____ cabling or better. a. Cat 3 b. Cat 5 c. Cat 5e d. Cat 6

Cat 6

In a significant network upgrade project, which of the following tasks takes place first? a. Identify which tasks are dependent on other tasks. b. Complete a needs assessment survey. c. Test the proposed solution on a pilot network. d. Assign tasks to the most qualified or appropriate people on the project team.

Complete a needs assessment survey.

Which of the following are potential disadvantages of wireless LANs as compared with cabled LANs? (Choose all that apply.) a. Controlling access to a wireless LAN is more difficult. b. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN. c. The additional protocols required by wireless LANs create additional overhead. d. Signal strength can be affected by many sources of electronic noise.

Controlling access to a wireless LAN is more difficult. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN. Signal strength can be affected by many sources of electronic noise.

Which of the following tools would be useful in creating a patch cable for a 100Base-T network? a. Screwdriver b. Crimper c. Soldering iron d. Pliers

Crimper

Increasing the twist ratio makes twisted-pair cabling more resistant to ______. a. Stretching b. Fire c. Cross-talk d. Attenuation

Cross-talk

If someone floods your gateway with so much traffic that it cannot respond to or accept valid traffic, what type of security breach has she caused? a. IP spoofing b. Social engineering c. Denial of service d. Trojan horse

Denial of service

Of the following troubleshooting actions, which one would come first in a logical troubleshooting methodology? a. Replace a faulty memory chip on a server. b. Determine whether a problem is limited to a segment or affects the whole network. c. Summarize your solution in a troubleshooting database. d. Determine whether your solution will result in any other problems.

Determine whether a problem is limited to a segment or affects the whole network.

What problem could be caused by laying cable in the ceiling tiles six inches above a bank of fluorescent lights? a. Increased latency b. EMI c. Fire hazard d. Decreased bend radius

EMI

What is the most common Ethernet frame type used on modern networks? a. Ethernet II b. Ethernet 802.3 c. Ethernet 802.2 d. Ethernet SNAP

Ethernet II

True or False? Only the domain administrator can manage remote computers.

False

True or False? Encrypted protocols such as SSH do not send passwords over the network.

False

True or False? On a client-server network, clients may have only one protocol installed at any time.

False

True or False? Three 2-GB virtual machines could all run simultaneously on a physical machine with 4 GB of RAM.

False

Which of the following WAN topologies gives the most redundancy? a. Bus b. Partial-mesh c. Full-mesh d. Star

Full-mesh

In which of the following situations would it be most beneficial for a network administrator to restrict the time of day during which the users can log on to the network to improve security? a. A salesperson accesses a company's network via a dial-up connection to upload sales data every night. b. Groups of customer service representatives access customer financial data during regular business hours. c. A corporate executive frequently travels to a company's various locations and requires access to confidential information on the server. d. A group of engineers is establishing an international office in a country several time zones away from the server's location.

Groups of customer service representatives access customer financial data during regular business hours.

Which of the following comes first in the series of steps recommended for a logical approach to network troubleshooting? a. Establish what has changed on the network. b. Implement a solution. c. Establish the symptoms. d. Identify the affected area.

Identify the affected area.

What is unique about a time-dependent virus? a. It changes its binary characteristics at regularly scheduled intervals. b. It can only be eradicated by applying a virus fix at certain times of the day. c. It is alternately detectable, then undetectable, by virus-scanning software, depending on the date. d. It remains dormant until a particular date or time.

It remains dormant until a particular date or time.

A host has been overloading your Web server with a flood of requests and you want to investigate whether this is some kind of network attack. You look up the IP address on arin.net to determine its owner, but ARIN's Web site tells you that LACNIC owns the IP address. What should you do? a. Complain to the owner of the lacnic.net Web site. b. Look up LACNIC in the Regional Internet Registry. c. Look up the owner of the IP address on the LACNIC Web site. d. Look up the owner of the IP address on the APNIC Web site.

Look up the owner of the IP address on the LACNIC Web site.

Which of the following are valid methods of assigning IP addresses to workstations, servers, and network devices? (Choose all that apply.) a. Manual configuration b. DHCP c. BOOTP d. POST

Manual configuration DHCP BOOTP

The most common cause of a security issue with a firewall is _________. a. Overheating b. Network delay c. Misconfiguration d. Traffic jam

Misconfiguration

Which two of the following can typically be accomplished by applying a patch to an NOS? a. Replacing all the NOS's program files b. Modifying an existing feature c. Removing an old feature d. Fixing a known bug

Modifying an existing feature Fixing a known bug

Which of the following is not an advantage of subnetting? a. Enhanced network security b. More hosts per network c. Improved network performance d. Simplified network troubleshooting

More hosts per network

At what layer of the OSI model does IP work? a. Physical layer b. Data Link layer c. Network layer d. Transport layer

Network layer

Which of the following are examples of stakeholders of a project whose purpose is to upgrade an entire network from 100 Mbps to 1000 Mbps? (Choose all that apply.) a. Network users b. Software vendors of applications running on the client machines c. High-level managers who approved the project d. IT staff who helped implement the change e. Network cabling vendors

Network users High-level managers who approved the project IT staff who helped implement the change Network cabling vendors

What might happen if no organization were responsible for IP addressing on the Internet? (Choose all that apply.) a. Organizations might try to use the same ranges of IP addresses. b. Anyone could host their own Web server. c. Nothing would happen. d. The Internet would use another protocol besides IP.

Organizations might try to use the same ranges of IP addresses

Before installing a major NOS patch, you should______________________ . a. Remove all protocols installed on the server. b. Prevent users from logging on. c. Disable Internet services. d. Disable network connectivity.

Prevent users from logging on.

What type of connector does a 100Base-T network require? a. RJ-11 b. BNC c. AUI d. RJ-45

RJ-45

By default, what permissions do users in the Everyone group have to a newly shared Windows Server folder? a. Read and Execute only b. List Folder Contents only c. Full Access d. By default, users have no rights to newly shared folders

Read and Execute only

What term is used to describe when a mobile user moves out of one access point's range and into the range of another? a. Reassociation b. Deassociation c. Reallocation d. Extending the service set

Reassociation

If you attempted the tracert command on an Internet host and that host was not connected to the network, which of the following would the tracert command's response contain? a. Destination host unreachable b. Unknown host c. Host not responding d. Request timed out

Request timed out

Which system tool provides a quick summary of overall CPU, disk, network, and memory utilization? a. Performance Monitor b. Resource Monitor c. Task Manager d. Computer Management

Resource Monitor

This kind of cable can be used to connect a computer to the console port of a router. a. Straight-through b. Patch c. Crossover d. Rollover

Rollover

Which of the following is most likely to act as a default gateway? a. Modem b. Hub c. Switch d. Router

Router

Which of the following protocols is used to send email? a. POP3 b. SMTP c. IMAP d. SNMP

SMTP

What is the difference between the SSH protocol and the Telnet protocol? a. The Telnet protocol is encrypted. b. The Telnet protocol is faster than the SSH protocol. c. SSH is encrypted. d. SSH can only be used between Linux or UNIX servers.

SSH is encrypted.

Which of the following power conditions would not necessarily cause a power failure, but might adversely affect computer equipment? (Choose all that apply.) a. Sag b. Line noise c. Brownout d. Blackout

Sag Line noise Brownout

When connectivity devices are connected in a daisy-chain fashion, what type of backbone do they create? a. Parallel b. Serial c. Collapsed d. Distributed

Serial

What does SSID stand for? a. Service set identifier b. Security service Internet domain c. Security station identification d. Simple security Internet device

Service set identifier

Which of the following types of virus checking requires frequent database updates to remain effective? a. Signature scanning b. Heuristic scanning c. Rotation checking d. Integrity checking

Signature scanning

Why is it a good idea to change your wireless router's password? a. So other people cannot change the router's settings b. So you won't forget it c. To make it the same as your logon password d. The default password is most likely too complex

So other people cannot change the router's settings

The practice of falsifying an IP address is known as ___________________________ a. Spoofing b. Faking c. Impersonating d. Configuring a secondary IP address

Spoofing

On what Transport layer protocol does FTP rely? a. TCP b. UDP c. ICMP d. NTP

TCP

What protocol is used by Remote Desktop Connection? a. ICMP b. TCP c. UDP d. IP

TCP

Which of the following information is included in the results of the ping command? (Choose all that apply.) a. The operating system used by the remote computer b. The IP address or name of the remote computer c. The number of packets that were lost d. The time it took for the reply to be received

The IP address or name of the remote computer The number of packets that were lost The time it took for the reply to be received

What is the most common public network used with VPNs? a. ARPANET b. The Internet c. NetBEUI d. AppleTalk

The Internet

In the scenario described in Question 4, as part of a logical troubleshooting methodology, what address would you ping second? a. The workstation's loopback address b. The workstation's default gateway c. The private LAN's Internet name server d. The Internet server

The Internet server

If a client does not have the correct DNS server address specified in its TCP/IP properties, which of the following will occur? a. The client cannot log on to or exchange data with the network. b. The client can exchange data with nodes on its local network, but not with nodes on other networks. c. The client can exchange data with nodes on local and external networks, but not by name. d. The client can exchange data with most, but not all, nodes on both its local and external networks by name.

The client can exchange data with nodes on local and external networks, but not by name.

In twisted-pair wire, how does the twist ratio affect transmission? (Choose all that apply.) a. The more twists per inch, the less cross-talk transmission will suffer. b. The more twists per inch, the slower the transmission. c. The more twists per inch, the more attenuation transmission will suffer. d. The more twists per inch, the faster the transmission.

The more twists per inch, the less cross-talk transmission will suffer. The more twists per inch, the more attenuation transmission will suffer

What does the tracert command show? a. The path taken by packets to the destination address b. The MAC address of the destination address c. Whether the remote host supports TCP/IP d. The operating system run by the host at the destination address

The path taken by packets to the destination address

Which of the following could be a symptom of a damaged patch cable between a workstation and the wall jack on a UTP network? (Choose all that apply.) a. The workstation cannot send or receive data to or from the network. b. The workstation and other workstations in the same office cannot send or receive data to or from the network. c. The workstation can send data to the network, but cannot receive data from the network. d. All workstations on the same segment can send data to the network, but cannot receive data from the network.

The workstation cannot send or receive data to or from the network.

What is the purpose of identifying milestones in a project plan? a. They indicate when project staff changes must occur. b. They mark significant events of the project's progress. c. They offer a quick assessment of how successfully the project is staying within budget. d. They help predict the result of a project.

They mark significant events of the project's progress

How is a wireless router's configuration utility usually accessed? a. By flashing the RAM BIOS b. Through a Web browser c. With the Windows Cfgrtr utility d. From the command line

Through a Web browser

What is risky about daisy-chaining switches on a network? (Choose all that apply.) a. Too many switches will cause errors in addressing data for its proper destination. b. Too many switches can cause increased network latency. c. Too many switches can result in reduced throughput. d. Too many switches will increase the possibility for errors in data encryption and decryption.

Too many switches can cause increased network latency. Too many switches can result in reduced throughput.

True or False? A firewall can run a routing protocol like a router.

True

True or False? In a client-server network, it is possible to share documents between individual users' computers as you can in a peer-to-peer network.

True

True or False? Network asset management can include device locations, serial numbers, and technical support contact information.

True

True or False? On a peer-to-peer network consisting of four Windows 7 or 8.1 workstations, each user can individually control which of her local data files she wants to share with other users.

True

True or False? One way of predicting how long a task might take is by examining the time taken to complete previous similar tasks.

True

What specification is necessary for you to determine the amount of electrical power that your computer devices require? a. Capacitance b. Impedance c. Resistance d. Wattage

Wattage

Which of the following components are not necessary to create a peer-to-peer network from a group of workstations? (Choose all that apply.) a. Client operating system b. NIC or motherboard with onboard NIC c. Network media d. Web browser e. Network operating system

Web browser Network operating system

Which of the following operating systems will allow you to create a peer-to-peer network from a group of workstations? (Choose all that apply.) a. MS-DOS b. Windows 8.1 c. Linux d. Windows 7

Windows 8.1 Linux Windows 7

Which of the following are capable of acting as a network server? (Choose all that apply.) a. Windows XP b. Windows Server 2012 R2 c. Windows 7 d. Linux/UNIX

Windows Server 2012 R2 Linux/UNIX

You have been hired as a network consultant by the East Coast Savings bank. East Coast Savings would like to implement a wireless LAN, but with high standards of security. What sort of restrictions would you recommend placing on the wireless LAN? a. Wireless LAN users have the same access as users attached to the Ethernet network. b. Wireless LAN users may surf the Web, but may not access the rest of the bank's network. c. Wireless LAN users may surf the Web, but may not access the rest of the bank's network without special security software. d. Wireless LAN users must use their own wireless ISP

Wireless LAN users may surf the Web, but may not access the rest of the bank's network without special security software.

A very large organization might have thousands of servers. Do the benefits of client-server networks still apply to such an organization? a. No, because managing so many servers is difficult. b. No, because the organization can rely on a large peer-to-peer network to share files instead. c. Yes, because it is easier to manage thousands of servers than it is to manage the hundreds of thousands of workstations that such an organization might have. d. Yes, because managing thousands of servers is no more difficult than managing a few servers.

Yes, because it is easier to manage thousands of servers than it is to manage the hundreds of thousands of workstations that such an organization might have.

Which of the following commands could you use to display a Linux computer's IP address? a. ipconfig b. ssh c. ipdisplay d. ifconfig

ifconfig

What command allows you to list the contents of a directory on an FTP server? a. list b. lf c. ls d. la

ls

Which of the following commands can you use in Windows to display information about the subnet mask configured for a particular NIC? a. ipconfig b. ping c. cmd d. netstat

ipconfig

Which of the following commands can you use to print information about a computer's Network layer configuration? a. netstat b. ipconfig c. arp d. ping

ipconfig

Which of the following are examples of top-level domains? (Choose all that apply.) a. .net b. .com c. .uk d. .aut

net .com .uk

As a network administrator, what should you do if you notice that a user account has experienced multiple failed logon attempts? a. Revoke the user's logon privileges. b. Change the user's password. c. Contact the user to find out whether she is having trouble logging on. d. Limit the times of day during which that user account may log on.

Revoke the user's logon privileges

What symbol is used to separate the computer name from the port number in a URL (assuming that IP version 4 is in use)? a. ; b. : c. # d. .

:

Which routing protocol is commonly used for Internet backbones? a. OSPF b. RIP for IP c. EIGRP d. BGP

BGP

Which of the following is a valid MAC address? a. 01-ba-cd83-21 b. 01-ba-cd-de-83-21-42 c. 01-ba-cd-de-83-21-42-a0 d. 01-ba-cd-de-83-21

01-ba-cd-de-83-21

What is the maximum throughput of a 100Base-TX network? a. 5 Mbps b. 10 Mbps c. 50 Mbps d. 100 Mbps

100 Mbps

Which of the following is the loopback address in IP version 4 addressing? a. 127.0.0.1 b. 1.1.1.1 c. 127.0.0.0 d. 10.0.0.0

127.0.0.1

How much power does standard PoE provide? a. 15.4 watts b. 25.5 watts c. 45 watts d. Unlimited

15.4 watts

One disk file is created for every _____ of virtual disk capacity. a. 2 MB b. 2 GB c. 20 MB d. 20 GB

2 GB

A gateway connects two different types of networks, two different types of communications protocols, or two different computer architectures. Which of the following is not considered a gateway? a. A router connecting a Token Ring b. A computer translating application data from TCP/IP to IPX/SPX c. A computer translating voice signals into data and transmitting it over a TCP/IP network d. A file and print server communicating with clients using both TCP/IP and IPX/SPX

A file and print server communicating with clients using both TCP/IP and IPX/SPX

In which of the following situations would it be useful to contact the owner of an IP address? (Choose all that apply.) a. A host outside your network has been attempting to log on to your servers without your permission. b. A host inside your network has been attempting to log on to your servers without your permission. c. A host outside your network has been attempting to send large amounts of unsolicited commercial email or spam. d. A host outside your network has been accessing your Web site once an hour.

A host outside your network has been attempting to log on to your servers without your permission. A host outside your network has been attempting to send large amounts of unsolicited commercial email or spam. A host outside your network has been accessing your Web site once an hour.

Which of the following obstacles could halt or seriously impair the progress of a project whose purpose is to upgrade the NICs in all workstations on a network from 100 Mbps to 1000 Mbps? a. The use of two different NIC models b. The use of different installation personnel on different shifts c. Management's requirement that the cost of each NIC remain under $75 d. A large group of defective NICs

A large group of defective NICs

What is the primary difference between a software upgrade and a patch? a. The software manufacturer issues a patch, whereas an upgrade may be issued by any organization that has the software's source code. b. A patch fixes a specific part of a software program, whereas an upgrade typically replaces much or all of a software program. c. A patch typically does not require that the network administrator test its changes before applying it to a server; an upgrade does. d. A patch typically is not supported by the software manufacturer; an upgrade is.

A patch fixes a specific part of a software program, whereas an upgrade typically replaces much or all of a software program.

What does a hop represent in the context of a tracert command? a. An Internet client b. A modem, hub, switch, or router c. A router d. A carrier's POP

A router

The FTP protocol functions at which layer? a. Application b. Transport c. Internetwork d. Network Interface

Application

What is the highest level of the OSI model in which a firewall can operate? a. Data Link b. Network c. Transport d. Application

Application

File and Print Services operate on which level of the OSI model? a. Data Link layer b. Physical layer c. Application layer d. Network layer

Application layer

When should changes be made to the asset management database? a. Monthly b. Weekly c. Daily d. As changes to hardware and software occur

As changes to hardware and software occur

What is a Regional Internet Registry responsible for? a. Maintaining Internet connectivity b. Replacing IP with TCP c. Assigning IP addresses d. Signing up users with ISP accounts

Assigning IP addresses

In the context of Windows networking, why must failed logon attempts be recorded by a domain controller instead of by any random server on the network? a. Only a domain controller will have the resources necessary to record and hold the volume of information that auditing requires. b. Domain controllers contain a complete set of Windows Server 2012 R2 computer administrative tools, whereas other servers do not. c. Domain controllers typically provide Web and remote access, enabling a network administrator to remotely audit events on a network. d. Domain controllers authenticate users

Domain controllers authenticate users.

Which of the following is true about the major types of Ethernet frames? a. Each frame operates at the Network layer. b. Each frame contains the destination and source MAC addresses. c. Each frame has a different maximum size. d. Each frame uses a preamble at the end of the frame to signal the end of the frame.

Each frame contains the destination and source MAC addresses

Which Windows Server utility would you use to find events that have happened on a particular server? a. Device Manager b. Disk Defragmenter c. Command Prompt d. Event Viewer

Event Viewer

The Windows Server 2012 R2 firewall cannot be configured using the ________. a. Event viewer b. Control Panel c. Windows Firewall with Advanced Security interface d. Netsh command

Event viewer

Which protocol is used by ping and traceroute? a. SMB b. FTP c. ICMP d. IMAP

ICMP

Which of the following projects is most likely to be driven by a company's security needs? a. Doubling the RAM in a key file server b. Installing a firewall on a connection to the Internet c. Upgrading the version of client software on each workstation d. Changing from the use of static IP addressing to DHCP on an entire network

Installing a firewall on a connection to the Internet

You have configured a device that runs the OSPF routing protocol, but whose primary purpose is to prevent unwanted Internet traffic from reaching your company's LAN. Which of the following is true about this device? a. It is a router because it runs a routing protocol. b. It is a router because its primary purpose is to control traffic. c. It is a firewall because it runs a routing protocol. d. It is a firewall because its primary purpose is to control traffic.

It is a firewall because its primary purpose is to control traffic.

A macro virus is most apt to affect which of the following programs? a. Microsoft Client for Networks b. Microsoft Outlook c. Microsoft Excel d. Microsoft SQL Server

Microsoft Excel

Which of the following are examples of resources related to a project plan that proposes to upgrade the network cards inside each workstation on a network from 100 Mbps to 1000 Mbps? (Choose all that apply.) a. NIC device drivers b. A team member's time c. IP addresses d. NICs e. Switches

NIC device drivers A team member's time NICs Switches

What type of address does a router interpret? a. Physical address b. MAC address c. Block ID d. Network address

Network address

Determining the frequencies of nearby WLANs can be useful for avoiding _____. a. Client saturation b. The near-far effect c. Simultaneous connections d. Overlapping channels

Overlapping channels

Which of the following responses to a ping command issued on a Windows-based computer indicates that the ping test was successful? a. Packets: Sent = 4, Received = 4, Lost = 0 (0%) b. Packets: Sent = 0, Received = 0, Lost = 0 (0%) c. Packets: Sent = 0, Received = 0, Lost = 4 (100%) d. Packets: Sent = 4, Received = 4, Lost = 4 (100%)

Packets: Sent = 4, Received = 4, Lost = 0 (0%)

Which of the following best describes project management? a. Recording and analyzing the time and resources required for each task in a project b. Assessing network statistics before and after a project is completed c. Monitoring the needs of users prior to the beginning of a project, then later assessing how the project's completion met their needs d. Planning for and handling the steps required to accomplish a goal in a systematic way

Planning for and handling the steps required to accomplish a goal in a systematic way

When a DNS server retrieves the host name associated with an IP address, what type of lookup is it accomplishing? a. Forward b. Adjacent c. Backward d. Reverse

Reverse

You are the network administrator for a small company. When users take vacations, they would like to allow other users to update the files stored on their computers. Additionally, several users have complained that they have accidentally deleted important files on their local computer, and would like some way to recover them. How would you recommend that they store their files? a. Make multiple copies on their local hard drive. b. Store the files on the server, which is backed up nightly. c. Make copies of the file on a USB thumb drive. d. Burn the files onto a CD.

Store the files on the server, which is backed up nightly.

What type of cable would connect a workstation to the wall jack in the work area of a 100Base-T network? a. Straight-through cable b. Crossover cable c. Coaxial cable d. Punch-down cable

Straight-through cable

Which of the following is not a network type option for virtual computers in VMware Workstation 10? a. Bridged b. NAT c. Structured d. Host-only

Structured

You are researching a new Internet access router for your company's network. You have also noticed a trend toward greater use of your company's network resources from home. Given this, which of the following features would you expect to be most valuable in a new Internet access router? a. Support for additional routing protocols b. Support for virtual private networks c. Support for additional security features d. Support for multiple protocols

Support for virtual private networks

The accuracy of your baseline predictions is determined most by what factor? (Choose all that apply.) a. The accuracy of your assumptions b. How much data you gathered c. The number of different applications gathering data d. The relevance of the gathered data

The accuracy of your assumptions How much data you gathered The relevance of the gathered data

What do the first six characters of a MAC address indicate? a. The device ID assigned by the vendor b. The block ID assigned by IEEE c. The logical address assigned by DHCP d. The logical address assigned by DNS

The block ID assigned by IEEE

If the link light on a switch port is not lit, what can you assume about the client connected to that switch's port? a. There are no connectivity problems with the client. b. The client cannot exchange data with the network. c. The client can exchange data only with other nodes on its segment. d. The client can exchange Network layer data, but not Transport layer data.

The client cannot exchange data with the network.

Assuming that it has the default subnet mask, why can't you assign the IP address 192.168.54.255 to a host? a. This address is reserved for multicast. b. This address is reserved for experimental uses. c. This address describes the network. d. This address is the broadcast address.

This address is the broadcast address.

What is the purpose of the default gateway? a. To assign IP addresses to clients as soon as they log on to the network b. To ensure that no two nodes on the same subnet have identical TCP/IP addresses c. To accept and relay packets from nodes on one network destined for nodes on another network d. To advertise the best, current routing paths between networks from one router to another

To accept and relay packets from nodes on one network destined for nodes on another network

What is the purpose of a routing table on a TCP/IP-based network? a. To associate the NetBIOS names of nodes with their IP addresses b. To associate the IP addresses of nodes with their host names c. To associate the IP addresses of nodes with their locations on the network d. To associate the host names of nodes with their MAC addresses

To associate the IP addresses of nodes with their locations on the network

What is one use for a crossover cable? a. To connect a hub and a workstation b. To connect a workstation to a wall jack c. To connect two workstations directly d. To connect a workstation to a modem

To connect two workstations directly

What does the "T" in PPTP stand for? a. Tunneling b. Transmission c. Transport d. Telecommunications

Tunneling

What does the "T" in 10Base-T and 100Base-T stand for? a. Transmission b. Transport layer c. Twisted-pair d. Transparent

Twisted-pair

For which of the following network devices is redundancy least important? a. The network backbone cabling b. Server c. User workstations d. A central switch

User workstations

Which is not emulated by virtualization? a. Hardware b. Applications c. Operating system d. Users

Users

Some wireless access points can associate a client's MAC address with a port on a switch allowing a client to stay connected to a ____ as it moves throughout an area. a. DSSS b. FHSS c. RTS/CTS d. VLAN

VLAN

Which of the following devices, when used in conjunction with one or more UPSs, will allow other devices to continue running indefinitely after a power outage? a. Surge protector b. Circuit breaker c. Venerator d. Circuit mirror

Venerator

A network has a subnet mask of 255.255.255.0. How many usable IP addresses are available for network hosts? a. 65,535 b. 65,534 c. 256 d. 254

254

The largest possible data field in an Ethernet frame is: a. 500 bytes b. 1000 bytes c. 1500 bytes d. 2000 bytes

1500 bytes

What is the default port number for the Telnet service? a. 20 b. 21 c. 22 d. 23

23

What is the default subnet mask for a Class C network? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

255.255.255.0

Simple packet-filtering firewalls operate at layer ___ of the OSI model. a. 2 b. 4 c. 6 d. 3

3

What is the signal rate for Cat 5e cable? a. 16 MHz b. 100 MHz c. 350 MHz d. 500 MHz

350 MHz

How many wire pairs are in a typical Category 5 cable? a. 2 b. 3 c. 4 d. 6

4

In which of the following networking scenarios would a router be the optimal connectivity device? a. A home network with five users who want to share documents that are stored on one of the five workstations b. A WAN that connects a college physics department with a classroom in a high school on the other side of town c. A LAN that connects 10 users, a server, and a printer at a small business d. A peer-to-peer LAN that connects eight users to provide a shared database

A WAN that connects a college physics department with a classroom in a high school on the other side of town

In which of the following situations would it be most beneficial for a network administrator to employ network address restrictions on a TCP/IP-based network (that does not use DHCP) to improve security? a. A salesperson accesses a company's network via a dial-up connection to upload sales data every night. b. A corporate executive frequently travels to a company's various locations and requires access to confidential information on the server. c. A new employee is working on tutorials in temporary quarters until her office can be completely furnished. d. A contractor works on a project from a cubicle specially designated and furnished for use by consultants

A contractor works on a project from a cubicle specially designated and furnished for use by consultants.

How is a wireless NIC different from a NIC that requires a cable? a. A wireless NIC contains an antenna. b. A wireless NIC contains a chip, which does additional processing at higher levels of the OSI model. c. A wireless NIC requires an external power source. d. A wireless NIC requires an external antenna.

A wireless NIC contains an antenna.

Who is protected by documenting hardware and software changes? a. Users b. Managers c. The organization d. All of the above

All of the above

Asset management records should be available to ______. a. All personnel involved in maintaining the network b. Only the system administrator c. Everyone in the organization d. Anyone

All personnel involved in maintaining the network

Which two of the following issues make peer-to-peer networks less scalable than client-server networks? a. Each time a new user is added, the peer-to-peer network cabling must be reinstalled between nodes. b. Adding nodes to a peer-to-peer network results in diminished overall network performance. c. Adding nodes to a peer-to-peer network increases the risk that an intruder can compromise a shared data folder. d. Adding new resource-sharing locations and ensuring that all authorized users have access to new resources becomes less manageable as the peer-to-peer network grows.

Adding nodes to a peer-to-peer network results in diminished overall network performance. Adding new resource-sharing locations and ensuring that all authorized users have access to new resources becomes less manageable as the peer-to-peer network grows.

Which of the following information could not be given out by a DHCP server? a. WINS server address b. DNS server address c. Default gateway d. Additional network protocols to be used

Additional network protocols to be used

Why might a virtual NIC be configured on a Linux computer? a. Because an additional IP address is needed for a Web server b. For the computer to act as a router between two networks c. For redundancy d. For load balancing

Because an additional IP address is needed for a Web server

What is one good technique for assessing the feasibility of a suggested project deadline before the project begins? a. Begin calculating task timelines from the deadline, working back to the start of a project. b. Issue a survey to key staff asking their opinion of the suggested deadline. c. Use the Web to research similar projects completed by other companies. d. Calculate the ratio of the number of project milestones to the proposed project duration, in months, to check that it does not exceed 2:1.

Begin calculating task timelines from the deadline, working back to the start of a project.

A user is unable to reach your company's Web site. From the user's workstation, you can ping the remote Web server. How might you use Network Monitor or another network protocol analyzer to troubleshoot the problem? (Choose all that apply.) a. By checking to see if the workstation is sending packets to the Web server b. By checking to see if the server is sending packets to the workstation c. By checking the workstation's IP configuration d. By checking the workstation's ARP configuration

By checking to see if the workstation is sending packets to the Web server By checking to see if the server is sending packets to the workstation

If a virus is polymorphic, what is it able to do? a. Replicate itself over a network connection b. Change its binary characteristics each time it's transferred to a new system c. Modify the network properties of a client or server d. Remain inactive until a particular date

Change its binary characteristics each time it's transferred to a new system

A TIA/EIA 568A pinout on one side and a 568B pinout on the other will make a _____ cable. a. Straight-through b. Patch c. Crossover d. Rollover

Crossover

Which of the following is a function of the Data Link layer? a. Arranging data in proper sequence at the destination b. Encrypting data prior to transmission c. Dividing data into distinct frames d. Issuing electrical signals onto a wire

Dividing data into distinct frames

A significant difference between the peer-to-peer and client-server network types is that a peer-to-peer network: a. Is more difficult to set up b. Does not allow for resource sharing between workstations c. Does not usually provide centralized management for shared resources d. Is more secure

Does not usually provide centralized management for shared resources

How can you verify that two hosts are connected and communicating properly? a. From one host, run the ping command to the other host. b. From a third host, run the ping command to both hosts. c. Run the arp command on both hosts. d. Run the ipconfig command on both hosts.

From one host, run the ping command to the other host.

Why doesn't the netstat command display any information about ICMP connections? a. ICMP does not function at the Transport layer. b. ICMP is not a true protocol. c. ICMP is a connectionless protocol. d. ICMP is considered unimportant.

ICMP is a connectionless protocol.

Which of the following best describes contingency planning? a. Obtaining support from high-level project sponsors before committing resources to the project b. Installing identical software and hardware, on a smaller scale, as the project's proposed solution will require, to test the feasibility of the solution c. Identifying a team and assigning roles to that team in case of disaster d. Identifying steps that will minimize the impact of unforeseen obstacles

Identifying steps that will minimize the impact of unforeseen obstacles

Under what circumstances is it possible for a computer to have more than one MAC address? a. Never b. If a computer has more than one NIC c. If a computer has more than one NIC, but only if it is acting as a router d. If a computer is a router

If a computer has more than one NIC

Why is RAID level 0 not considered fully fault tolerant? a. If a hard disk fails, its data will be inaccessible. b. It cannot stripe files whose size exceeds 64 MB. c. It is incompatible with modern NOSs. d. It cannot verify whether its fault-tolerance activities are successful.

If a hard disk fails, its data will be inaccessible.

Which of the following best describes the function of a CSU? It transmits several signals over a single channel. It separates a single channel into multiple channels. It terminates a digital signal and ensures connection integrity. It converts the digital signal used by connectivity devices into the digital signal sent through the cabling.

It terminates a digital signal and ensures connection integrity.

On many networks, DHCP is used to assign workstations their IP addresses. However, DHCP is rarely used to assign addresses for servers. Why? a. DHCP is too expensive. b. DHCP is not scalable enough. c. Servers don't have the option to use DHCP. d. It would be more difficult for a client to find a server if its IP address changes.

It would be more difficult for a client to find a server if its IP address changes.

Why do network administrators prefer not to back up every file on their servers every day? (Choose all that apply.) a. It would take too much time. b. It would be less accurate than periodic backups. c. It would be more costly. d. It's hard to configure backup software to perform daily backups.

It would take too much time

Which of the following tools might you use to assess the success of a project whose purpose is to upgrade an entire network from 100 Mbps to 1000 Mbps? a. Network Monitor b. Sniffer or packet analyzer c. Microsoft SQL Server d. System Monitor

Network Monitor

Which of the following is a potential weakness in using restrictions on either Network layer addresses or Data Link layer addresses to control access to a network or server? a. For a machine on the same network, both Network and Data Link layer addresses may be configured manually. b. For a machine on an external network, both Network and Data Link layer addresses may be configured manually. c. Network address restrictions typically require more maintenance. d. Network layer addresses may be configured manually, whereas Data Link layer addresses may not.

Network address restrictions typically require more maintenance.

The hardware devices attached to a network such as computers and printers are also called ______. a. Communication endpoints b. Nodes c. Connection points d. Contacts

Nodes

A major security weakness of WEP is the fact that it uses a _____ network key. a. 48-bit b. Shared c. Dynamic d. Single-use

Shared

When implementing a network solution, why is it important to anticipate future trends as much as possible? a. So that the solutions you implement meet the future needs of your users b. So that the solutions you implement meet the current needs of your users c. So that the solutions you implement are more scalable d. So that you can justify the purchase of the solution to management

So that the solutions you implement meet the future needs of your users

A user is having difficulty connecting to a remote Web site. After the user attempts to connect, the netstat command tells you that the connection state is established. Where in the OSI model is the problem probably located? a. At the Data Link layer b. At the Network layer c. At the Transport layer d. Somewhere above the Transport layer

Somewhere above the Transport layer

What physical topology would you use to create your peer-to-peer network where all the workstations are connected to a single switch? a. Bus b. Tree c. Star d. Cube

Star

If a client workstation has been assigned the wrong IP address, which of the following will be true? a. The client will be able to connect to other nodes on the LAN, but will not be able to connect through its default gateway to the Internet. b. The client will be able to ping the loopback address successfully, but will not be able to connect to other nodes on the LAN. c. The client will not be able to ping the loopback address successfully, nor will it be able to connect to other nodes on the LAN. d. The client will be able to connect to other nodes on its LAN segment, but will not be able to connect to nodes on other segments.

The client will be able to ping the loopback address successfully, but will not be able to connect to other nodes on the LAN.

Which of the following situations might necessitate changing all the IP addresses on a company's networked workstations? a. The company has divided its network into several smaller subnets. b. The company has hired 50 new employees. c. The company has decided to use Network Address Translation (NAT) for all connections to public networks. d. The company has decided to establish a Web server with e-commerce capability.

The company has divided its network into several smaller subnets

What does the baseline measure? a. The current state of the network b. The minimal network traffic c. The maximum utilization the network can support d. The average amount of future downtime

The current state of the network

How does knowing about failed logon attempts help a network administrator's security efforts? a. The information could help her determine whether stricter password requirements should be implemented. b. The information could help her refine the NOS schema. c. The information could help her determine whether an unauthorized user is attempting to log on with that username. d. The information could help her predict the likelihood of future security breaches.

The information could help her determine whether an unauthorized user is attempting to log on with that username.

Which of the following is a potential advantage of delegating user administration to another user? (Choose all that apply.) a. The network administrator can concentrate on more important network maintenance issues. b. One or more users in each department can handle user administration for their department. c. Large network administration departments can delegate tasks. d. Each user in a department can handle the administration of his own account.

The network administrator can concentrate on more important network maintenance issues. One or more users in each department can handle user administration for their department. Large network administration departments can delegate tasks.

Which of the following best describes a network's physical topology? a. The method by which multiple nodes transmit signals over a shared communications channel b. The physical layout of a network c. The distance spanned by a network's cable and wireless infrastructure d. The software used to ensure reliable connections between nodes on a network

The physical layout of a network

Many printers come with network cards so that they do not need to be attached to a computer. How would the process of sharing such a printer differ from sharing a printer attached to a computer? (Choose all that apply.) a. The printer would need a network address so that other computers can find it. b. The process would not differ. c. You would have to add the printer to the domain. d. You would not need to connect the printer to another computer via a cable.

The printer would need a network address so that other computers can find it. You would not need to connect the printer to another computer via a cable

Which of the following best describes authentication? a. The process of verifying the precise spelling of a username b. The process of accepting and matching a username with unique account information, such as a password c. The process of replicating user logon information from one domain controller to the others on a network d. The process of tracking a user's logon habits and collecting that information in an audit log

The process of accepting and matching a username with unique account information, such as a password

You have just replaced the NIC on a server, making no other changes. It can communicate with all the computers on its network but one. What is the most likely explanation for this? a. The new NIC is not working properly. b. Both computers have the same MAC address. c. The remote computer has the old MAC address entry in its ARP cache. d. The remote computer has a bad NIC.

The remote computer has the old MAC address entry in its ARP cache.

Your colleague placed a second DHCP server on the network by mistake. What might happen as a result? (Choose all that apply.) a. The second DHCP server might lease duplicate addresses to some hosts. b. The second DHCP server might give out incorrect settings to its clients. c. DHCP might stop working on the first DHCP server. d. You might need to configure IP addresses on some hosts manually.

The second DHCP server might lease duplicate addresses to some hosts. The second DHCP server might give out incorrect settings to its clients.

If the LED on a workstation's NIC is blinking green, which of the following is true? a. The workstation is connected to the network and successfully exchanging data over its connection. b. The workstation is connected to the network, but is not currently exchanging data over its connection. c. The workstation is connected to the network, but is experiencing errors when attempting to exchange data over the network. d. The workstation is not successfully connected to the network.

The workstation is connected to the network and successfully exchanging data over its connection.

Which of the following best describes a modem's function? a. To encapsulate Data Link layer protocols as Network layer protocols before transmitting data over the PSTN b. To separate data into frames as it is transmitted from the computer to the PSTN, and then strip data from frames as it is received from the PSTN c. To encrypt data as it is transmitted from the computer to the PSTN, and then decrypt data as it is received from the PSTN d. To convert a source computer's digital pulses into analog signals for the PSTN, and then convert analog signals back into digital pulses for the destination computer

To convert a source computer's digital pulses into analog signals for the PSTN, and then convert analog signals back into digital pulses for the destination computer

Network protocols are used to do which of the following? (Choose all that apply.) a. To ensure reliable delivery of data b. To determine the nearest printer for a print job c. To interpret keyboard commands d. To indicate the source and destination addresses for data packets

To ensure reliable delivery of data To indicate the source and destination addresses for data packets

What is the purpose of the checksum? a. To ensure that data arrives in the proper sequence b. To ensure that data is properly encrypted and decrypted c. To ensure that data arrives at its intended destination d. To ensure that data arrives whole and intact

To ensure that data arrives whole and intact

What is the purpose of padding in an Ethernet frame? a. To ensure that the data in the frame is exactly 1500 bytes long b. To ensure that the data in the frame is no more than 46 bytes long c. To signal that the frame has ended d. To ensure that the data in the frame is at least 46 bytes long

To ensure that the data in the frame is at least 46 bytes long

What is the purpose of a subnet mask? a. To indicate which protocols a particular network uses b. To further subdivide a network c. To mask, or prevent access to the whole network d. To limit the protocols used in a particular network

To further subdivide a network

What is the purpose of a name server? a. To maintain the MAC address database for an entire zone b. To supply clients with IP address resolution for requested hosts c. To track and record all TCP/IP host name information for a network d. To track and record all NetBIOS naming information for a network

To supply clients with IP address resolution for requested hosts

What is one reason an organization might employ a VPN rather than simply allow users to dial directly in to their remote access server? a. VPNs always provide better performance than direct-dial connections. b. VPNs allow more users to connect to the LAN simultaneously. c. VPNs are less expensive for connecting a large number of remote users. d. VPNs prevent the need for firewalls between access servers and the Internet.

VPNs are less expensive for connecting a large number of remote users.

If a user is assigned Modify permissions to a folder, what may she do with the folder's contents? (Choose all that apply.) a. View the list of files in the folder. b. Launch executable files in the folder. c. Delete files in the folder. d. View the contents of files in the folder.

View the list of files in the folder. Launch executable files in the folder. Delete files in the folder. View the contents of files in the folder.

If a user is assigned Read permissions to a folder, what may he do with the folder's contents? (Choose all that apply.) a. View the listing of files in the folder. b. Launch executable files in the folder. c. Delete files in the folder. d. View the contents of files in the folder

View the listing of files in the folder View the contents of files in the folder.

When might the best path not equal the shortest distance between two nodes? (Choose all that apply.) a. When a communications link has been recently added to the network b. When a communications link is suffering congestion c. When a router experiences routing protocol errors d. When the media on the shortest path is slower than the media on the best path

When a communications link is suffering congestion When the media on the shortest path is slower than the media on the best path

Why is a wireless signal susceptible to noise? a. Wireless NICs are usually poorly made. b. Wireless transmissions cannot be shielded like transmissions along an Ethernet cable. c. Wireless NICs do not support the network protocols necessary for error correction. d. Wireless NICs rely on the upper levels of the OSI model for error correction.

Wireless transmissions cannot be shielded like transmissions along an Ethernet cable.

In which of the following situations would it be wise to backlevel? a. You have just performed a complete backup of your server's data directories, and you cannot confirm that the backup was successful. b. You have just applied a fix to your network operating system (NOS) and have discovered that the fix resulted in a lack of network access for half of your users. c. You have just installed a database program on one of your servers and have discovered that you neglected to install an optional component that your users will need. d. You have just installed Windows Server 2012 R2 on a new computer and you cannot get the operating system to recognize the NIC.

You have just applied a fix to your network operating system (NOS) and have discovered that the fix resulted in a lack of network access for half of your users.

Which of the following commands will reveal TCP/IP addressing information on a Windows Server 2012 R2 computer? a. ipconfig b. winipcfg c. ifconfig d. netipcfg

ipconfig

Which of the following commands can indicate whether a host is unreachable? a. ping b. ipconfig c. ifconfig d. winipcfg

ping

Which of the following commands would you type at the ftp> prompt to copy a file named textfile.doc from your C:\ directory to an FTP server? a. copy "textfile.doc" b. put C:\textfile.doc c. get C:\textfile.doc d. move C:\textfile.doc

put C:\textfile.doc

What command would you use to add a node's IP address, subnet mask, and network location interface to a routing table? a. route add b. add host c. add node d. route open

route add


संबंधित स्टडी सेट्स

Breathing Patterns - Case Study - Fundamentals

View Set

Review for Final Exam (All 14 Chapters)

View Set

Art 1301 Chapters 7 - 9 Vocabulary

View Set

Molecular and Cellular Biology: Enzymes

View Set

[TOTALQM] Finals Reviewer Alvarez

View Set

Loan Process, Products and Programs

View Set