Domain 2: Networking 141 question review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Match each port number on the left with its associated protocols on the right. Drag 80 443 143 22 445 427 548 Drop 1.Secure Shell (SSH) 2.Apple Filing Protocol (AFP) 3.HTTP over SSL (HTTPS) 4.Hypertext Transfer Protocol (HTTP) 5.Server Message Block (SMB/CIFS) directly over TCP 6.Service Location Protocol (SLP) 7.Internet Message Access Protocol (IMAP)

1.22 2.548 3.443 4.80 5.445 6.427 7.143

Drag the wireless networking technology on the left to its associated transmission distance limitation on the right. Each technology may be used more than once. Drag Infrared Bluetooth Drop 1.Up to 100 meters for Class 1 devices. 2.Up to 30 meters in areas without interference. 3.Up to 10 meters for Class 2 devices.

1.Bluetooth 2.Infrared 3.Bluetooth

Match each smart device with its description. Drag Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real-time, and adjusts itself depending on ambient conditions. Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. Easy solution for making small appliances, such as lamps, coffee makers, and toasters, smart. Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. Uses voice recognition software and activates through a Wake Word or Hot Word. Drop 1.Thermostat 2.Switch 3.Bulb 4.Plug 5.Security camera 6.Door lock 7.Speaker/digital assistant

1.Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real-time, and adjusts itself depending on ambient conditions. 2.Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. 3.Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. 4.Easy solution for making small appliances, such as lamps, coffee makers, and toasters, smart. 5.Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. 6.Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device 7.Uses voice recognition software and activates through a Wake Word or Hot Word

A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the internet. Using the ipconfig command, you see that the workstation has been assigned the following special IP configuration: IP address: 169.254.0.1 Subnet mask: 255.255.0.0 1.What is this special IP configuration called? a.Static IP Addressing b.Dynamic Host Configuration Protocol (DHCP) c.Automatic Private IP Addressing (APIPA) d.Alternate IP Configuration 2.Why did the workstation receive this type of configuration? a.The workstation was unable to contact the DNS server. b.The workstation was unable to contact the DHCP server. c.The workstation was unable to contact the default gateway. d.The workstation was unable to contact the Internet service provider.

1.c.Automatic Private IP Addressing (APIPA) 2.b.The workstation was unable to contact the DHCP server.

The following is an example of an IPv6 address: FEC0:1319:7700:F631:446A:5511:CC40:25AB 1.Which part of the example IPv6 address is the prefix? a.FEC0 b.446A:5511:CC40:25AB c.FEC0:1319:7700:F631 d.F631 2.Which quartet in the example IPv6 prefix is used to identify the subnet? a.FEC0 b.1319 c.7700 d.F631 e.446A f.5511 g.CC40 h.25AB 3.Which part of the example IPv6 address is the interface ID? a.446A:5511:CC40:25AB b.FEC0:1319:7700:F631 c.25AB d.446A

1.c.FEC0:1319:7700:F631 2.d.F631 3.a.446A:5511:CC40:25AB

Which of the following IP address ranges is reserved for Automatic Private IP Addressing? a.169.254.0.1 - 169.254.255.254 b.192.168.0.1 - 192.168.254.255 c.169.168.0.1 - 169.168.255.255 d.192.168.0.0 - 192.168.255.254 e.169.192.0.0 - 169.192.254.255

a.169.254.0.1 - 169.254.255.254

An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly? (Select TWO). a.20 b.21 c.53 d.80 e.110

a.20 b.21

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established? a.3389 b.22 c.23 d.123

a.3389

While working on a Windows workstation, you've enabled Remote Desktop. Which of the following ports MUST be opened in the server's firewall to allow remote clients to access the desktop? a.3389 b.123 c.389 d.110

a.3389

Which of the following are valid IPv6 addresses? (Select TWO.) a.6384:1319:7700:7631:446A:5511:8940:2552 b.165.15.78.53.100.1 c.141:0:0:0:15:0:0:1 d.A82:5B67:7700:AH0A:446A:779F:FFE3:0091 e.343F:1EEE:ACDD:2034:1FF3:5012

a.6384:1319:7700:7631:446A:5511:8940:2552 c.141:0:0:0:15:0:0:1

Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz? a.802.11a b.802.11b c.802.11n d.802.11g

a.802.11a

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs? a.802.11ac b.802.11a c.802.11b d.802.11g

a.802.11ac

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend? a.802.11n b.802.11a c.802.11g d.802.11b

a.802.11n

A technician is tasked with installing a network-enabled camera that runs on power that is supplied through its network connection. The network device that connects to the camera does not have the capability to supply this power. There is a power outlet close to the camera. Which of the following devices can be used to supply power? a.A Power over Ethernet injector b.A repeater c.An Ethernet over Power adapter d.A modem

a.A Power over Ethernet injector

Which of the following are characteristics of the 802.11g wireless standard? (Select THREE.) a.Backwards compatible with 802.11b devices b.Maximum bandwidth of 54 Mbps c.Maximum bandwidth of 11 Mbps d.Operates in the 2.4 GHz range e.Operates in the 5.75 GHz range f.Backwards compatible with 802.11a devices

a.Backwards compatible with 802.11b devices b.Maximum bandwidth of 54 Mbps d.Operates in the 2.4 GHz range

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this? a.DNS b.WINS c.SMTP d.LMHOSTS file e.NTP

a.DNS

A homeowner's connection to the internet is through an always-on modem that connects to existing telephone wiring and has a download speed of over 3 Mbps. The homeowner is able to make analog phone calls over the same wiring at the same time. Which of the following internet connection types is being used? a.DSL b.Dial-up c.ISDN d.Cable

a.DSL

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do? a.Establish a Remote Desktop connection and update the driver. b.Tell the user to wait until you are scheduled to be in that location. c.Drive to the other location as soon as possible and update the driver. d.Escalate the call to another technician or your supervisor.

a.Establish a Remote Desktop connection and update the driver.

Which of the following devices allows network communications to be transmitted over existing AC power lines? a.Ethernet over Power b.AC-enabled switch c.Ethernet multiplexer d.AC Circuit Switch e.Power over Ethernet

a.Ethernet over Power

Which of the following is a valid IPv6 address? a.FEC0::AB:9007 b.FEC0:AB04:899A c.FEC0:AB98::A7::9845:4567 d.FEC0:9087:AB04:9900:7GA2:7788:e.CEDF:349A f.199.12.254.11

a.FEC0::AB:9007

A customer is upgrading the routers and switches in their network. The signal source in these network devices is a light-pulse. Which of the following network cabling options is MOST likely being used in this upgrade? a.Fiber optic b.Twisted pair c.Copper d.Wireless

a.Fiber optic

What are two major concerns regarding IoT devices? (Select TWO.) a.Hacking b.Availability c.Accessibility d.Short lifespan e.Privacy

a.Hacking e.Privacy

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? a.Hub b.Switch c.Bridge d.Gateway e.Router

a.Hub

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server? a.IMAP b.POP3 c.SMTP e.NTP

a.IMAP

You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this? a.IP b.SLIP c.IPX/SPX dNetBIOS e.PPP

a.IP

Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available wall jack, hoping to get internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. Which of the following would BEST protect you from guest malware infection? (Select TWO). a.Implement MAC address filtering. b.Implement SNMP traps on your network switch. c.Implement static IP addressing. d.Implement private IP addressing with a Network Address Translation (NAT) router facing the internet. e.Enable port analysis on your network switch.

a.Implement MAC address filtering. c.Implement static IP addressing.

Which of the following statements accurately describes how a modem works? (Select TWO.) a.It demodulates analog data from a telephone network into digital PC data. b.It transmits digital signals over ordinary telephone copper wiring at a rate up to 128 Kbps. c.It modulates digital data from the PC into analog data and transmits it on a telephone network. d.It modulates digital data from a telephone network into analog data that a PC can use. e.It communicates over a telephone network using digital signals. f.It demodulates analog PC data into digital data that can be transmitted through a telephone network.

a.It demodulates analog data from a telephone network into digital PC data. c.It modulates digital data from the PC into analog data and transmits it on a telephone network.

The 802.11ac wireless networking standard provides increased bandwidth and communication speeds by using which of the following technologies? (Select TWO). a.MU-MIMO to allow multiple users to use the same channel. b.Channel bonding to combine more channels in the 5 GHz band to allow for up to 160-MHz-wide channels. c.Dual band transmission to allow data to be transmitted at two frequencies at the same time. d.OFDM modulation to allow several parallel data channels to stream data. e.Peer-to-peer mode to allow each host to communicate directly with other hosts.

a.MU-MIMO to allow multiple users to use the same channel. b.Channel bonding to combine more channels in the 5 GHz band to allow for up to 160-MHz-wide channels.

Which network component connects a device to the transmission media and allows it to send and receive messages? a.Network interface card b.Bridge c.Protocol d.Switch

a.Network interface card

Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)? a.Power over Ethernet b.AC-enabled switch c.Ethernet multiplexer d.AC Circuit Router e.Ethernet over Power

a.Power over Ethernet

Which of the following can be used to create a secure connection to a remote server? a.SSH b.Telnet c.ICMP d.FTP e.SMTP

a.SSH

Which of the following network services or protocols uses TCP/IP port 22? a.SSH b.IMAP4 c.NNTP d.TFTP

a.SSH

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement? a.Switch b.Patch panel c.Bridge d.Router

a.Switch

Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected? a.Switch b.Router c.Hub d.Network adapter

a.Switch

Which of the following identifies the prefix component of an IPv6 address? (Select TWO.) a.The first four quartets of an IPv6 address. b.The last 64 bits of an IPv6 address. c.The first 64 bits of an IPv6 address. d.The last quartet of an IPv6 address. e.The last four quartets of an IPv6 address. f.The first quartet of an IPv6 address.

a.The first four quartets of an IPv6 address. c.The first 64 bits of an IPv6 address.

Which of the following identifies the Interface ID component of an IPv6 address? (Select TWO.) a.The last 64 bits of an IPv6 address. b.The first four quartets of an IPv6 address. c.The last four quartets of an IPv6 address. d.The last quartet of an IPv6 address. e.The fourth quartet of an IPv6 address. f.The first quartet of an IPv6 address.

a.The last 64 bits of an IPv6 address. c.The last four quartets of an IPv6 address.

What are the two protocols used most often with IoT devices? (Select TWO.) a.Z-Wave b.Zbot c.Zerg d.Zensys e.Zigbee

a.Z-Wave e.Zigbee

Which of the following describes an IPv6 address? (Select TWO.) a.64-bit address b.128-bit address c.32-bit address d.Four decimal octets e.Eight hexadecimal quartets

b.128-bit address e.Eight hexadecimal quartets

Which of the following are valid IP addresses? (Select TWO.) a.10.384.0.3 b.2.2.2.2 c.192.168.1.512 d.1.254.1.1024 e.172.16.1.26 f.254.7.1.417 g.256.0.0.1

b.2.2.2.2 e.172.16.1.26

You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall? (Select TWO). a.21 b.25 c.443 d.143 e.110

b.25 e.110

Which of the following wireless networking standards uses a frequency of 5 GHz and supports transmission speeds up to 1.3 Gbps? a.802.11n b.802.11ac c.802.11g d.802.11b e.802.11a

b.802.11ac

A technician is tasked with preparing a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity? a.Firewall b.Access point c.Router d.Switch

b.Access point

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following would be the BEST choice? a.Wireless Ethernet b.Bluetooth c.Infrared d.Cellular WAN

b.Bluetooth

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is MOST likely to improve VoIP performance? a.Forward UDP ports 5060 to 5065 to the VoIP phone. b.Change QoS settings to give VoIP traffic more priority. c.Create a DMZ and add the VoIP phone to it. d.Change DHCP to give the VoIP phone a static IP address.

b.Change QoS settings to give VoIP traffic more priority.

A technician has configured a client computer's network interface with addresses of servers where the client will send requests for translating Fully Qualified Domain Names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to these requests? a.Secure Shell (SSH) b.Domain Name System (DNS) protocol c.Dynamic Host Configuration Protocol (DHCP) d.Server Message Block (SMB)

b.Domain Name System (DNS) protocol

A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client use to perform the request and a server use to offer an IP address? a.Domain Name System (DNS) Protocol b.Dynamic Host Configuration Protocol (DHCP) c.Lightweight Directory Access Protocol (LDAP) d.Simple Network Management Protocol (SNMP)

b.Dynamic Host Configuration Protocol (DHCP)

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select TWO.) a.128 numbers, grouped using colons b.Hexadecimal numbers c.Binary numbers d.32 numbers, grouped using colons e.Decimal numbers

b.Hexadecimal numbers d.32 numbers, grouped using colons

You would like to control internet access based on users, time of day, and websites visited. Which of the following actions would BEST meet your criteria? a.Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. b.Install a proxy server. Allow internet access only through the proxy server. c.Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content. d.Configure the Local Security Policy of each system to add access restrictions based on time of day and content. e.Configure internet zones using Internet Options.

b.Install a proxy server. Allow internet access only through the proxy server.

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address? a.DHCP b.MAC address filtering c.SSID d.WEP

b.MAC address filtering

A technician is installing a network-enabled smart home control system in a SOHO. To access the system from the internet, which of the following configurations is MOST likely required on the SOHO router? a.NAT b.Port forwarding c.QoS d.DHCP

b.Port forwarding

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service? a.DHCP server b.Proxy server c.Web server d.Print server

b.Proxy server

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share? a.SFTP b.SMB c.LDAP d.RDP

b.SMB

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC? a.Telnet b.Screen Sharing c.Remote Desktop Protocal d.SSH

b.Screen Sharing

A host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address? a.APIPA IP addressing b.Static IP addressing c.Dynamic IP addressing d.Link-local addressing e.Alternate IP configuration

b.Static IP addressing

You are a software developer, and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server? a.ICMP b.UDP c.SNMP d.TCP

b.UDP

Which of the following are not valid IP addresses? (Select THREE.) a.116.0.0.116 b.1.55.254.3 c.145.8.260.7 d.257.0.122.55 e.132.64.32.8 f.122.0.0.0 g.45.22.156.256

c.145.8.260.7 d.257.0.122.55 g.45.22.156.256

You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service? a.110 b.143 c.53 d.123

c.53

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select TWO.) a.802.11b b.Bluetooth c.802.11g d.802.11a e.802.1x

c.802.11g d.802.11a

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? a.802.11a b.802.11g c.802.11n d.802.11b

c.802.11n

You connect your computer to a wireless network available at the local library. You find that you can't access several websites you need to on the internet. Which of the following is the MOST likely cause of this problem? a.Port triggering is redirecting traffic to the wrong IP address. b.The router has not been configured to perform port forwarding. c.A proxy server is filtering access to websites. d.A firewall is blocking ports 80 and 443.

c.A proxy server is filtering access to websites.

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection? a.Infrastructure b.WEP c.Ad hoc d.WAP

c.Ad hoc

Which of the following functions are performed by proxy servers? (Select TWO). a.Filter unwanted email b.Store client files c.Cache web pages d.Block unwanted packets from entering your private network e.Block employees from accessing certain websites

c.Cache web pages e.Block employees from accessing certain websites

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is MOST likely to restore internet connectivity? a.Remove any QoS settings that give low priority to HTTP traffic. b.Update the firmware on the SOHO router. c.Configure the SOHO router for NAT. d.Disable DHCP and configure the hosts with static IP addresses.

c.Configure the SOHO router for NAT.

Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses are difficult to remember, you want to implement a protocol on your network that allows computers to automatically find another host's IP address using a logical name. Which of the following protocols would be the BEST to implement? a.Telnet b.ARP c.DNS d.DHCP

c.DNS

You are the IT technician for your company. Which of the following mechanisms would BEST allow you to resolve a hostname into its associated IP address? (Select TWO). a.FTP b.DHCP c.DNS d.BOOTP e.hosts file

c.DNS e.hosts file

A company has chosen a UTM instead of an IDS or IPS appliance to protect their network. Which of the following UTM security features is not available with an IDS or IPS? a.Intrusion prevention b.Anomaly logs and alerts c.Email and antispam filtering d.Intrusion detection

c.Email and antispam filtering

A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect. Which of the following router settings should the technician change? a.Disable DHCP b.Enable port forwarding c.Enable MAC filtering d.Disable SSID broadcast

c.Enable MAC filtering

Which protocols are used on the internet to transmit webpages from web servers to web browsers running on client workstations? (Select TWO.) a.XML b.SMTP c.HTTP d.NNTP e.HTML f.HTTPS

c.HTTP f.HTTPS

Which of the following best describes how a switch functions? a.It connects multiple segments of different architectures. It translates frames and forwards them to the appropriate segment. b.It connects multiple cable segments or devices and broadcasts frames to all of its ports. c.It connects multiple cable segments or devices and forwards frames to the appropriate segment. d.It connects multiple segments of different architectures. It translates frames and broadcasts them to all of its ports.

c.It connects multiple cable segments or devices and forwards frames to the appropriate segment.

Which printer management components would you use to view the port a printer uses? (Select TWO.) a.Print spooling service b.Print queue c.Print server properties d.Printer properties e.Print queue properties

c.Print server properties d.Printer properties

You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select TWO.) a.An RG6 cable b.Analog modem c.RJ11 connectors d.F-type connectors e.Filters or splitters

c.RJ11 connectors e.Filters or splitters

Which protocol is used to send email messages from a mail client to a mail server? a.SNMP b.FTP c.SMTP d.POP3 e.IMAP

c.SMTP

Which of the following protocols carry phone calls over an IP-based network? a.HTTP b.RTSP c.VoIP d.TCP

c.VoIP

A user is configuring an email client application and decides to use the TCP/IP suite protocol that will store all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. This protocol will store the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically use while using this protocol to contact the email server? a.21 b.80 c.110 d.143

d.143

Which frequencies does Zigbee operate on? a.2.4 GHz, 500 MHz, and 818 MHz b.1.4 GHz, 90 MHz, and 500 MHz c.2.7 GHz, 400 MHz, and 865 MHz d.2.4 GHz, 900 MHz, and 868 MHz

d.2.4 GHz, 900 MHz, and 868 MHz

To access your company's internal network from home, you use Secure Shell (SSH). The administrator has recently implemented a new firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home? a.23 b.21 c.80 d.22 e.443

d.22

Which port does Telnet use? a.80 b.25 c.34 d.23

d.23

What is the maximum number of nodes Z-Wave allows on its mesh network? a.322 b.231 c.223 d.232

d.232

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol? a.80 b.143 c.443 d.3389

d.3389

While making an online bank transaction, a customer checks to see that the web browser is displaying a lock icon that indicates that an encrypted TCP/IP suite protocol is being used. Which of the following TCP/IP port numbers does this protocol typically use when the browser encrypts its communications with the bank's web server? a.25 b.80 c.143 d.443

d.443

You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which IP addressing method can you use to make sure he gets a network connection at home? a.Dynamic IP addressing b.APIPA IP addressing c.Static IP addressing d.Alternate IP configuration e.Link-local addressing

d.Alternate IP configuration

An administrator is asked to configure all network file sharing devices so that both Windows and Mac OS computers can access files. Which of the following network protocols should the administrator enable? (Select THREE). a.Simple Mail Transfer Protocol (SMTP) b.Lightweight Directory Access Protocol (LDAP) c.Dynamic Host Configuration Protocol (DHCP) d.Apple File Protocol (AFP) e.Simple Network Management Protocol (SNMP) f.Common Internet File System (CIFS) g.Server Message Block (SMB) e.Simple Network Management Protocol (SNMP) f.Common Internet File System (CIFS) g.Server Message Block (SMB)

d.Apple File Protocol (AFP) f.Common Internet File System (CIFS) g.Server Message Block (SMB)

You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose? a.PS/2 b.IEEE 1394 c.USB d.Bluetooth e.802.11g wireless

d.Bluetooth

One of your customers wants to configure a small network in his home. The home has three floors, and there are computers on each floor. This customer needs to share files between computers, print to a centrally located printer, and have access to the internet. Which of the following print solutions would BEST meet this client's needs? a.Configure a Wi-Fi ad hoc network. b.Configure a Wi-Fi global area network. c.Configure a Wi-Fi space network. d.Configure a Wi-Fi infrastructure network.

d.Configure a Wi-Fi infrastructure network.

Which of the following is not an example of wireless networking communications? a.802.11n b.Bluetooth c.Infrared d.DSL

d.DSL

A technician is configuring the static TCP/IP settings on a client computer. Which of the following configurations are needed for internet communications? (Select THREE.) a.WINS address b.Alternate IP address c.DHCP server address d.Default gateway address e.APIPA address f.DNS server address g.IP address including a subnet mask (IPv4) or subnet prefix length (IPv6)

d.Default gateway address f.DNS server address g.IP address including a subnet mask (IPv4) or subnet prefix length (IPv6

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria: *No one from the internet should be able to access her internal network. *Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. *Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. *A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria? a.Implement a content filter. b.Implement an intrusion prevention system (IPS). c.Implement an email security appliance. d.Implement an all-in-one security appliance. e.Implement a firewall.

d.Implement an all-in-one security appliance.

A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select TWO). a.Lightweight Directory Access Protocol (LDAP) b.Simple Network Management Protocol (SNMP) c.Simple Mail Transfer Protocol (SMTP) d.Internet Message Access Protocol (IMAP) e.Post Office Protocol (POP3)

d.Internet Message Access Protocol (IMAP) e.Post Office Protocol (POP3)

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications? a.AppleTalk over IP b.IPX c.IP d.NetBIOS

d.NetBIOS

Which of the following protocols do email clients use to download messages from a remote mail server? a.SNMP b.FTP c.SMTP d.POP3

d.POP3

While setting up a home office, a technician disables the DHCP service on the office router, but does not want to rely on link-local addressing. Which of the following IP addressing methods should be used? a.APIPA b.Dynamic c.Alternate d.Static

d.Static

What device is used to create a physical star topology? a.Repeater b.Bridge c.Router d.Switch

d.Switch

Which of the following describes the part of the IPv6 address that identifies the subnet address? a.The first quartet in the IPv6 address prefix. b.The last quartet in the IPv6 address interface ID. c.The first quartet in the IPv6 address interface ID. d.The last quartet in the IPv6 address prefix.

d.The last quartet in the IPv6 address prefix.

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following transport layer TCP/IP suite protocols is MOST likely used for this service? a.File Transfer Protocol (FTP) b.Internet Control Message Protocol (ICMP) c.Transport Layer Protocol (TCP) d.User Datagram Protocol (UDP)

d.User Datagram Protocol (UDP)

You are configuring a firewall to allow access to a server hosted in the demilitarized zone of your network. You open IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server? a.Email server, Newsgroup server, or DNS server b.Web server, DNS server, or email server c.Web server, DNS server, or DHCP server d.Web server and email server

d.Web server and email server

Which of the following is true when the DHCP setting is disabled in a wireless network? a.Wireless clients must use the correct encryption key with its packets. b.Wireless clients with specific MAC addresses are denied access to the network. c.Wireless clients must use the correct wireless access point identifier (SSID) to connect to the network. d.Wireless clients must use a static IP address within the correct IP address range to connect to the network.

d.Wireless clients must use a static IP address within the correct IP address range to connect to the network.

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the internet, but you are unable to perform secure credit card transactions when making purchases from e-commerce websites. Which port needs to be enabled to allow secure transactions? a.23 b.80 c.21 d.69 e.443

e.443

Which data transmission rate is defined by the IEEE 802.11b wireless standard? a.54 Mbps c.2 Mbps d.150 Mbps e.10 Mbps f.11 Mbps

f.11 Mbps

Given that your Windows workstation has Automatic Private IP Addressing (APIPA) implemented using default settings, which of the following TCP/IP addresses could be automatically assigned to the system should your DHCP server go down or become inaccessible? a.172.16.1.26 b.192.168.1.22 c.169.198.1.23 d.168.254.10.25 e.10.0.0.65 f.169.254.1.26

f.169.254.1.26

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? a.SSH b.SMTP c.SNMP d.TFTP e.LDAP f.FTP

f.FTP


Set pelajaran terkait

Lección 2 | En la universidad 2.1 Present tense of -ar verbs 1 - Tabla (Chart) de verbos

View Set

A sound that does not use the vocal cords is called

View Set

Bio-Medical Study Guide: Unit 4 The Heart

View Set

Section 10: Unit 1: Introduction to Contracts and Michigan Contract Law

View Set

ATI ASSESSMENT B MED/SURG II (YAMILE)

View Set

Praxis 2 - Art Content Knowledge - Art Styles, Periods, and Specific Art, Printmaking, Photography, Color Theory, Ceramics - Study Guide Summer 2017

View Set