Ch. 7 Computer Systems Management

Ace your homework & exams now with Quizwiz!

Internet Protocol version 6 (IPv6) uses a _________ bit address to identify a network connection. (enter number)

128

An IPV4 address octet can have numbers 0 (zero) to _____.

255

Internet Protocol version 4 (IPv4) uses a _________ bit address to identify a network connection. (enter number)

32

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA?

AES

If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?

APIPA

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?

Address reservation

If the computer you are using is a laptop that moves from one network to another, what tab from TCP/IPv4 Properties box can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached?

Alternate Configuration

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Change the router's default administrative password.

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?

DHCP server

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?

DNS

Which of the following will use an RJ-11 connector for connectivity?

DSL

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?

Demilitarized zone

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps? ​

Fourth-generation cellular

What cell phone technology is the most popular in the World?

GSM

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

Implement a blacklist on the firewall and add the site the users are visiting.

What statement regarding satellite connections is accurate?

It requires line of sight connectivity

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router?

MAC filtering

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?

Mobile hotspot

A student wants to connect to her wireless LAN at home but is not sure where to change the setting so that they can connect. Where in the Windows Control Panel will the student find thier computer's network connection settings?

Network and Sharing Center

The ______________________ command (known simply as ping) tests connectivity by sending an echo request to a remote computer.

Packet InterNet Groper

What DSL technology provides equal bandwidth in both directions?

SDSL

What functions as the name of a wireless network?

SSID

Bob is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to Bob?

Use Parental Controls.

A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?

WMN

Three current security standards for 802.11 wireless networks are:

WPA WP2 WP3

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-PSK, AES

A response to network activity when the computer is in sleep mode. It's accessed via the Power Management tab of the network adapter's Properties box

Wake on LAN

Which of the following are functions that a SOHO router might perform besides the normal duty of routing packets between networks? (Choose all that apply).

Wireless access point firewall

_______________ is the theoretical number of bits that can be transmitted over a network at one time.

bandwidth

802.11ac Wi-Fi standard supports up to eight antennas and supports ___________________, which detects the locations of connected devices and increases signal strength in those directions.

beamforming

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?

cable

What device handles access to another network for a client computer if it does not have a better option?

default gateway

What type of IP address is configured by a server when a device first initiates a connection to the network?

dynamic

A WLAN covers a large geographical area and is made up of many smaller networks. (true or false)

false

A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure. (true or false)

false

When using static IP addressing, software automatically configures the network connection on each device. (true or false)

false

Using port ______________, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.

forwarding

The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?

full duplex

What two commands are used to display TCP/IP configuration on Windows and Unix / Linux / Mac OS X operating systems, respectively?

ipconfig ifconfig

What command can be used to flush the local DNS cache on a Windows computer?

ipconfig /flushdns

A ____________________ covers a small area, such as a home, office, or small group of buildings. (three word answer)

local area network

A ____________________ covers a large campus or city? (three word answer)

metropolitan area network

What command connects or disconnects a computer from a shared resource or can display information about connections?

net use

What command manages user accounts on the local system in Windows?

net user

The _____________________ command lets you read information from the Internet name-space by requesting information about domain name resolutions from the DNS server's zone data.

nslookup

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. ​ Which Microsoft command-line command should Henry use to check whether he can connect to the server?

ping

Each client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer. This address is a number and is called a __________ number.

port

Use ping to test for connectivity or to verify name _______________ is working.

resolution

Cellular devices that use GSM or LTE require a __________________________________________ be installed in the device, which contains the information that identifies your device to the carrier.

subscriber identification module

If you are experiencing issues reaching a target destination network, and you need to to display each hop to the destination, what command should you use?

tracert

VPN Data is encrypted using a technique called ____________.

tunneling

A ________________________________ is often used by employees when they work away from the corporate network to connect to that network by way of the Internet.

virtual private network

A ____________________ covers a large geographical area and is made up of many smaller networks. (three word answer)

wide area network

The acronym Wi-Fi is short for ___________________. It's technical name is IEEE 802.11

wireless fidelity

Which of the following is true about cable Internet?

you share the cable infrastructure with your neighbors


Related study sets

english 9A - unit 1; lesson 4: parts of speech & patterns of word change

View Set

International Business Connect Chapter 1

View Set

NUR 114 exam 2 practice questions

View Set

Mod 1, Chapter 1 Review and apply

View Set

In Cold Blood - Part 3 Vocabulary Words

View Set