Chapter 6
While troubleshooting a network connection, you decide to use the ping command. which switch allows for a continuous ping?
-t
What is the maximum range of the Bluetooth 2.0 specification for Class 1 devices?
100 M
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
11 Mbps
Which of the following is not one of the ranges of IP addresses defines in RFC 1918 that are commonly used behind a NAT server?
169.254.0.1 - 169.254.255.254
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select Three)
192.168.12.253 172.18.188.67 10.0.12.15
Which of the following are characteristics of Bluetooth? (Select Two)
2.4 GHZ radio wireless Ad hoc connections
What is the maximum transmission speed for Bluetooth devices?
3 Mbps
You've enabled Remote Desktop on a Windows workstation. Which port must be opened in the server's firewall to allow remote clients to access the desktop?
3389
You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service?
53
Which wireless standard operates at up to 54 Mbps to a maximum of 150 feet?
802.11a
Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select Two)
802.11g 802.11a
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in the situation?
802.11n
Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?
Ad Hoc
You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which would be the best choice?
Bluetooth
You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose?
Bluetooth
You've just finished installing a wireless access point from a client. Which action best protects the access point from unauthorized configuration settings?
Changing the administrative password
You've just installed a wireless access point (AP) for your organization's network. You know that the radio signals used by the AP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (Select Two)
Configure the AP to filter out unauthorized MAC addresses. Disable DHCP on the AP.
Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?
Copper telephone wire
You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?
DNS
Which of the following is not an example of wireless networking communications?
DSL
Which of the following measures will make your wireless network less visible to the casual attacker performing war driving?
Disable SSID broadcast
Which of the following features is supplied by WPA2 on a wireless network?
Encryption
Which of the following are used to connect a cable modem to the Internet connection? (Select Two)
F-Type connectors RG-6 coaxial cable
You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?
FTP
Which IP protocol is used by Web browsers and Web servers to exchange files?
HTTP
Which protocols are used on the Internet to transmit Web pages from Web browsers running on client workstations? (Select Two)
HTTP HTTPS
You have a Windows 7 computer connected to a small network that is not part of a domain. You want to see the computers and printers on the network. Which feature would you use?
HomeGroup
Which of the following protocols is used by an e-mail client to retrieve messages from an e-mail server and gives users the option to keep mail messages on the server?
IMAP
You want to use your Windows workstation to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this?
IP
Which of the following network technologies is packaged as part of a BRI plan?
ISDN
A customer has called an indicated that he thinks his neighbor is connecting to his wireless access point (AP) to use his high-speed Internet connection. Which of the following will help resolve this issue? (Select Two)
Implement WPA2 Disable SSID broadcast on the AP
You need to place a wireless access point in your two-story building? While trying to avoid interference, which of the following is the best location for the access point?
In the top floor
Which actions allow you to access the Internet on your laptop via a cellular network?
Install a cellular USB adapter in a open port on the laptop.
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem?
Interference is affecting the wireless signal.
You have a small network. All computers are running Windows 7. You have created a HomeGroup for your network. You have a laptop that you use at work that runs Windows 7 Professional. You connect the laptop to the network. You are unable to see shared files on other computers. What should you do?
Join the laptop to the HomeGroup
Which of the following features on a wireless network allows or rejects client connections based on the hardware address?
MAC address filtering
Which of the following are characteristics of the 802.11g wireless standard? (Select Three)
Maximum bandwidth of 54 Mbps Operates in the 2.4 GHz range Backwards compatible with 802.11b devices
To access the Internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use?
Modem
A portable computer connected to a printer with an infrared interface works fine inside your office. However, when you go outside it works sporadically. How can you fix this? (select two)
Move the printer closer to the computer. Block any direct and reflected sunlight from the pathway between the PC and printer.
What is the least secure place to locate the access point when creating a wireless network?
Near a window
Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select Two)
Near cordless phones Near backup generators
Which of the following protocols is non-routable and requires another protocol to enable internetwork communications?
NetBios
When configuring an ADSL installation, where should you to install the DSL filters?
On connections leading to an analog phone
Which of the following are features of Basic Rate ISDN (BRI)? (Select Three)
One control channel Dial-up connection Two data Channels
Which of the following protocols do e-mail clients use to download messages from a remote mail server?
POP3
Examine the following output: Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 Reply from 64.78.193.84: bytes=32 time=43ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Which utility produced this output?
Ping
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?
Place access points above where most clients are .
You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select Two)
RJ-11 connectors Filters or splitters
What protocol is used to send e-mail messages from a mail client to a mail server?
SMTP
Which of the following tools allow for remote management of servers? (Select Two)
SSH Telnet
Which of the following is used on a wireless network to identify the network name?
SSID
A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
Sattelite
A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the case of the problem?
The client system has moved too far away from the access point.
You are installing a satellite connection so your home office can connect to the Internet. Which of the following statement is true?
The satellite dish must be pointed in the correct direction for communicating with the satellite.
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?
The user is out of the effective range of the wireless access point on her floor.
Which of the following are good reasons to enable NAT?
To translate between Internet IP addresses and the IP addresses on your private network
You are a software developer and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server?
UDP
You recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the route?
Update the firmware
On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?
Users with the correct WEP key
Which of the following protocols carry phone calls over an IP-based network?
VoIP
Which of the following are security protocols for wireless networks? (Select Two)
WPA WEP
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
WPA2
You want to use a wireless printer at home. The printer will be used by two computers in two different rooms. Which interfaces could be used to do this? (Select Two)
Wireless Ethernet Bluetooth
Which of the following is true when the DHCP setting is disabled in a wireless network?
Wireless clients must use a static IP address within the correct IP address range to connect to the network.
You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from Internet. When you try to connect to the Internet using your modem, you can't. What is the problem?
You need to hang up.
You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the MAC address of the network adapter?
ipconfig /all
Which command would you use to have a workstation stop using an IP address that it obtained from a DHCP server?
ipconfig /release
You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server?
ipconfig /renew
which utility would you use to view current connections and active sessions and ports on a computer?
netstat
A user is having problems connecting to other computers using host names. Which of the following commands will help you troubleshoot this problem?
nslookup
Examine the following output: Server: helicuplar.xct.takro.net Address: 209.53.4.130 Name: westsim.com Address: 64.78.193.84 Which command produced this output?
nslookup
You suspect large packets are being dropped on your network because of their large size. Which utility can you use to confirm your suspicion?
ping -l
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation and an application you are using is unable to connect to a Windows server named FileSrv2. Which commands can you use to test network connectivity between your workstation and the server? (Select Two)
traceroute ping
Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.isxy.com [54.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] Which command produced this output?
tracert
You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly?
tracert