MTA Network Fundamentals review

Ace your homework & exams now with Quizwiz!

Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run un all of its supported frequencies? a) 802.11a b) 802.11b c) 802.11g d) 802.11n

802.11n

Which of the following represents a Media Access Control (MAC) address? a) GV:ZC:KK:DK:FZ:CA b) 255.255.255.0 c) 05:35:AB:6E:A1:25 d) 127.0.0.1

05:35:AB:6E:A1:25

You suspect that your Internet router's DHCP service is not functioning, so you check your computer's IP address. Which address would indicate that your router's DHCP service is NOT functioning? a) 169.258.1.15 b) 172.16.1.15 c) 192.168.1.15 d) 10.19.1.15

169.258.1.15

A cable that meets the 1000BaseT standard has a maximum length of: a) 100 m b) 250 m c) 500 m d) 1,000 m

100m

How many bits are there in an Internet Protocol version 6 (IPv6) address? a) 32 b) 64 c) 128 d) 256

128

When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the *10.0.0.0-10.0.0.255* range a) 127.0.0.0-127.0.0.255 b) 169.254.0.0-169.254.255.255 c) 192.168.100.0-192.168.100.255 d) No change is needed

169.254.0.0-169.254.255.255

To which IP configuration does the CIDR notation 192.168.1.1/25 refer? a) 192.168.1.1 255.255.255.64 b) 192.168.1.1 255.255.255.1 c) 192.168.1.1 255.255.255.32 d) 192.168.1.1 255.255.255.256 e) 192.168.1.1 255.255.255.128

192.168.1.1 255.255.255.128

Which of these is a public address space? a) 192.168.0.0/16 b) 197.16.0.0/12 c) 10.0.0.0/8 d) 172.16.0.0/12

197.16.0.0/12

What is the bit rate for a North American T3 circuit? a) 6.312 Mbits/s b) 44.736 Mbits/s c) 274.176 Mbits/s d) 400.352 Mbits/s

44.736 Mbits/s

Which network does the IP address 220.100.100.100 belong to? a) 220.100.100.0/24 b) 220.100.100.1/24 c) 255.255.255.0/24 d) 255.255.255.1/24

220.100.100.0/24

The multicast address for an IP network is *169.254.0.0 to 169.254.254* a) 127.0.0.0 to 127.255.255.255 b) 172.16.0.0 to 172.31.255.255 c) 224.0.0.0 to 239.255.255.255 d) No change is needed

224.0.0.0 to 239.255.255.255

Which of these addresses is a multicast address? a) 127.0.0.1 b) 169.254.0.1 c) 192.168.0.1 d) 224.0.0.1

224.0.0.1

The default port used for Telnet is: a) 23 b) 25 c) 80 d) 8080

23

The default port used for SMTP is: a) 23 b) 25 c) 80 d) 8080

25

The default subnet mask for a Class B network is: a) 0.0.0.255 b) 0.0.255.255 c) 255.0.0.0 d) 255.255.0.0

255.255.0.0

What is the default subnet mask for a Class C Internet network a) 255.255.255.252 b) 255.255.255.240 c) 255.255.255.192 d) 255.255.255.0

255.255.255.0

Which subnet mask is valid? a) 255.255.255.240 b) 255.255.255.228 c) 255.255.255.164 d) 255.255.255.245

255.255.255.240

What is the maximum cable length for a single Cat5 UTP cable run? a) 285 feet/86.87 meters b) 328 feet/99.97 meters c) 432 feet/131.67 meters d) 600 feet/182.88 meters

328 feet/99.97 meters

The maximum throughput of an 802.11g network is: a) 2.4 GHz b) 54 GHz c) 2.4 Mbps d) 54 Mbps

54 Mbps

Which two are published IEEE 802.11 wireless transmission standards? (Choose two.) A. 802.1 If B. 802.11g C. 802.11k D. 802.11m E. 802.11n

802.11g 802.11n

Which of the following is a public IP address? a) 10.156.89.1 b) 68.24.78.221 c) 172.16.152.48 d) 192.168.25.101

68.24.78.221

In a wireless network that requires an SSL certificate, *WEP* handles the SSL certificate. a) 802.1x b) WPA2-PSK c) WPA-PSK d) No change is needed

802.1x

Which of these represents the Internet Protocol version 6 (IPv6) loopback address? a) 127.0.0.1 b) 192.168.0.1 c) FEC0:A8C0::AA01 d) ::1

::1

What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two) a) Failure of a central connectivity device does not bring down the entire network b) A central connection point allows for flexibility and scalability c) Data travels on redundant paths, so one cable cannot stop its transmission d) A cable problem within the group affects two nodes, at most

A central connection point allows for flexibility and scalability A cable problem within the group affects two nodes, at most

What happens when an 80.11b node starts broadcasting within the range of an 802.11g access point? a) The access point will transmit, but the node will be unavailable to receive b) A connection will be established c) Both the node and the access point will be unable to transmit d) The node will transmit, but the access point will be unable to receive

A connection is established

VPN's are implemented to provide: a) A secure connection within a private network b) A secure connection through public networks c) Additional encryption by using IPSec d) Additional security for selected computers

A secure connection through public networks

The protocol that maps IP addresses to a Media Access Control (MAC) address is: a) Internet Message Access Protocol (IMAP) b) Dynamic Host Configuration Protocol (DHCP) c) Routing Information Protocol (RIP) d) User Datagram Protocol (UDP) e) Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP)

Which of the following are features of DHCP? (Choose two) a) IP address resolution to canonical names b) Secure Shell connections c) Address reservation d) Network file transfer e) IP address exclusion

Address reservation IP address exclusion

Teredo Tunneling is a protocol that: a) Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6) b) Allows IPv6 connectivity through IPv4 devices c) Provides VPN security d) Dynamically allocates IPv6 addresses

Allows IPv6 connectivity through IPv4 devices

When a client's DHCP-issued address expired, the client will: a) Select a new address and request approval from the DHCP server b) Require manual configuration with a static IP address c) Attempt to obtain a new address by broadcasting d) Continue to use the address until it is notified to stop

Attempt to obtain a new address by broadcasting

One advantage of dynamic routing is that it: a) Automatically maintains routing tables b) Limits traffic derived from routing protocols c) Reduces broadcast traffic d) Automatically enables DHCP

Automatically maintains routing tables

If a router is installed so that it separates DHCP server from its clients, the clients will: a) Immediately lose connectivity to all segments b) Be unable to obtain their leases from the server c) Immediately lose connectivity to the local segment d) Receive an immediate renewal of their lease

Be unable to obtain their leases from the server

What is a similarity between Layer 2 and Layer 3 switches? a) Both provide a high level of security to the network b) Both use logical addressing to forward transmissions c) Both forward packets onto the network d) Both allow the implementation of VLANs

Both forward packets onto the network

What is the DNS record type that specifies an alias name of another address record? a) MX b) CNAME c) NS d) SOA

CNAME

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement? a) Cat3 b) Cat5 c) Cat5e d) Cat6

Cat5e

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that the interference is reduced. Which cable type should you use? a) Cat5e STP b) Cat5e UTP c) Cat3 d) Cat6 UTP

Cat5e STP

What is the minimum cabling requirement for a 100BaseTX network? a) Category 3 UTP b) Category 5 UTP c) Category 6 UTP d) Multimode fiber cable

Category 5 UTP

Plan old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of Message Switching. a) Circuit switching b) Packet Switching c) FDDI Switching d) No change is needed

Circuit switching

In local area network (LAN) topologies, the primary media access methods are: (Choose two) a) Contention b) Negotiation c) Kerberos d) Token passing

Contention Token passing

To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a: a) Crossover cable b) Straight cable c) Rollover cable d) Coaxial cable

Crossover cable

A computer that has an IP address of 169.254.0.2 cannot access the network. Which of the following services should you confirm is available? a) WINS b) DNS c) DHCP d) TFTP

DHCP

Which protocol is responsible for automatically assigning IP addresses? a) HTTP b) DHCP c) DNS d) WINS

DHCP

Which of these uses pointer records and A records? a) IDS b) DNS Server c) NAT Server d) IPS

DNS Server

Which technology provides the highest bit rate? a) T1 b) E1 c) DS3 d) ISDN

DS3

At what layer in the OSI model are hardware addresses referenced? a) Network b) Application c) Data link d) Physical

Data Link

For which two reasons should you use IPsec between computers? (Choose two) a) Data compression b) Data integrity c) Data redundancy d) Data confidentiality

Data integrity Data confidentiality

The default gateway address identifies the: a) Device that will connect the computer to the local network b) Device that will connect the computer to a remote network c) Server that will provide name services for the computer d) Server that will authenticate the user of a computer

Device that will connect the computer to a remote network

Which to of the following are connectivity options for wide area networks (WANs)? (Choose two) a) Token ring b) Ethernet c) Dial-up d) Leased line

Dial-up Leased Line

Which Microsoft network service can you use to establish a connection to a corporate LAN without any user action? a) VPN b) Remote Desktop c) DirectAccess d) NAP

Direct access

The IPCONFIG command will: a) Configure routers b) Display a client's address c) Display a client's broadcast mode d) Configure DHCP clients

Display a client's address

Attenuation in a wireless network signal is a result of: a) Number of wireless nodes connected b) Distance from the access point c) Interference from cellular phones d) Encryption of the signal

Distance from the access point

The service that resolves fully qualified domain names (FQDN) to IP addresses is: a) Windows Internet Name Service (WI b) Doman Name Service (DNS) c) Internet Service Provider (ISP) d) Address Resolution Protocol (ARP)

Domain Name Service (DNS)

You are trying to access a music sharing service on the Internet. The service is located at the IP address 173.194.75.105. You are experiencing problems connecting. You run a trace route to the server and receive the output shown in the following image: Each hop in the trace route is a The trace route completed

Each hop in the trace route is a router. The trace route completed unsuccessfully.

If an 802.11g Internet connection has connectivity problems, what may be the cause? a) A cordless phone b) A cellular phone c) Incandescent lights d) Electromagnetic interference (EMI)

Electromagnetic interference (EMI)

A VPN is a/an: a) Encrypted connection across the Internet b) Virtual network within your local area network (LAN) c) Communication tunnel between VLANs d) Personal network for your use only

Encrypted connection across the Internet

Two companies want to share data by using the Internet. Which type of network provides the solution? a) Ethernet b) Intranet c) Extranet d) Perimeter

Extranet

Which of these is an application layer protocol? a) TCP b) FTP c) IP d) UDP

FTP

A/an *virtual private network (VPN)* protects a network's perimeter by monitoring traffic as it enters and leaves a) Extranet b) Firewall c) Intranet d) No change needed

Firewall

To protect a network when it is connected to the Internet, you should use a: a) Bridge b) Firewall c) Switch d) Router

Firewall

If a router cannot determine the next hop for a packet, the router will: a) Forward the packet to the default route b) Send the packet back to the packet's source c) Broadcast the packet d) Store the packet in the memory buffer

Forward the packet to the default route

The function of a router is to: a) Provide IP subnet masks for hosts b) Forward traffic to other networks c) Broadcast routing tables to clients d) Store tables for name resolution

Forward traffic to other networks

Which protocol can be used to encrypt packets in the Internet? a) SNMP b) HTTPS c) TFTP d) HTTP

HTTPS

Which metric does Routing Information Protocol (RIP) use to determine the least costly route? a) Delay b) Host ID c) Hop count d) Interface

Hop count

What type of DNS record maps host names to addresses? a) Mail Exchanger (MX) DNS record b) Service (SRV) DNS record c) Host (A) DNS record d) Canonical (CNAME) DNS record

Host (A) DNS record

A node within a local area network (LAN) must have a network interface device and a: a) Network account b) Table of all network nodes c) Host address d) Resource to share

Host Address

In a physical star topology, the central device is referred to as a: a) Bridge b) Server c) Segmenter d) Hub

Hub

Which wireless communication problem is caused by electromagnetic waves? a) Fading b) Attenuation c) Interference d) Diffraction

Interference

A private network that allows members of an organization to exchange data is an: a) Extranet b) Ethernet c) Intranet d) Internet

Intranet

What are two characteristics of the CSMA/CD access method? (Choose two) a) It checks to see if a collision has been detected b) It does a round robin search for requests to transmit from all nodes on the network c) It signals its intent to transmit on the network d) It waits until the transmission medium is idle

It checks to see if a collision has been detected It waits until the transmission medium is idle

What are two characteristics of a mesh network topology? (Choose two) a) It is fault tolerant because of redundant connections b) Every node connects to every other node on the network c) It works best for networks with a large number of nodes d) It requires less cabling than either a start or ring topology

It is fault tolerant because of redundant connections Every node connects to every other node on the network

What are three characteristics of a ring network topology? (Choose three) a) It uses token to avoid collisions on the network b) It can use coaxial, twisted pair, or fiber optic media c) It comprises the largest share of the networks in place today d) It is a non-switching protocol e) It can negotiate different transmission speeds

It uses token to avoid collisions on the network It can use coaxial, twisted pair, or fiber optic media It can negotiate different transmission speeds

The query protocol used to locate resources on a network is: a) User Datagram Protocol (UDP) b) Lightweight Directory Access Protocol (LDAP) c) TRACERT d) Telnet

Lightweight Directory Access Protocol (LDAP)

An Address Resolution Protocol (ARP) table is used to associate IP addresses with host names. a) MAC addresses b) HomeGroup membership c) Preferred routers d) No change is needed

MAC addresses

What type of record does DNS use to find a mail service? a) Service (SRV) DNS Record b) Canonical (CNAME) DNS record c) Mail Exchanger (MX) DNS record d) Host (A) DNS record

Mail Exchanger (MX) DNS record

A university has a network links between various locations. Where would a T3 connection be appropriate? a) Server to network in the main campus server room b) Main campus to a large satellite campus c) Computer lab PC to lab printer d) Library laptop PC to Internet

Main campus to a large satellite campus

One purpose of a perimeter network is to: a) Make resources available to the intranet b) Link campus area networks (CANs) c) Link local area networks (LANs) d) Make resources available to the Internet

Make resources available to the Internet

Match each IP address to its corresponding IPv4 class. a) 133.234.23.2 b) 224.100.20.3 c) 201.111.22.3 d) 64.123.12.1 Class A IP Address Class B IP Address Class C IP Address Class D IP Address

Match each IP address to its corresponding IPv4 class. a) 133.234.23.2 Class B IP Address b) 224.100.20.3 Class D IP Address c) 201.111.22.3 Class C IP Address d) 64.123.12.1 Class A IP Address

Match each protocol to its description. a) TCP b) ICMP c) ARP d) UDP e) IGMP non-matched connectionless, message-based protocol with best-effort service connection-oriented protocol with guaranteed service resolves IP addresses to MAC addresses not-matched

Match each protocol to its description. a) TCP: connection-oriented protocol with guaranteed service b) ICMP: non-matched c) ARP: resolves IP addresses to MAC addresses d) UDP: connectionless, message-based protocol with best-effort service e) IGMP: not-matched

Which of the following services masks internal IP addresses from outside the network? a) DHCP b) WINS c) NAT d) DNS

NAT

You are setting up a network computer game. You need to open up the ports on your firewall so your friends can join the network. Which command displays the ports that your computer is listening for? a) NSLOOKUP b) NBTSTAT c) PING d) NETSTAT

NETSTAT

A node within a local area network (LAN) must have which two of the following? a) Username and password b) Share name c) NIC d) IP address e) Table of all network nodes

NIC IP address

Which DNS record type specifies the host that is the authority for a given domain? a) NS b) MX c) CNAME d) SOA

NS

Which setting is used to determine the Domain Name System (DNS) settings on a client computer? a) Telnet b) NSLookup c) Pathping d) Netstat

NSLookup

Internet Key Exchange (IKE) is responsible for which two functions? (Choose two) a) Establishing network speed parameters b) Verifying the client's patch level c) Negotiating algorithms to use d) Exchange key information

Negotiating algorithms to use Exchange key information

The command-line tool used to list a host's active incoming connection is: a) Netstat b) Ipconfig c) Nslookup d) Ping

Netstat

In which OSI layer does routing occur? a) Transport b) Network c) Data Link d) Physical

Network

Each IPv4 address consists of a *MAC address and data-link layer address.* a) Network ID and host ID b) DNS record and a default route c) 64-bit binary number divided into octets d) No change is needed

Network ID and host ID

Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two) a) Network Policy and Access Services b) Routing and Remote Access Services c) Remote Administration d) DirectAccess

Network Policy and Access Services Routing and Remote Access Services

connecting to a private network address from a public network requires: a) Network address translation (NAT) b) Dynamic Host Configuration Protocol (DHCP) c) Network Access Protection (NAP) d) Dynamic domain name system (DDNS)

Network address translation(NAT)

A router's static route is set by the: a) Adjacent network b) Next upstream router c) Network administrator d) Routing protocol

Network administrator

A Media Access Control (MAC) address identified a/an: a) UPnP device b) Local broadcast domain c) Network interface card (NIC) d) Local area network (LAN)

Network interface card (NIC)

*Dynamic routing* is fault tolerant. a) Static routing b) Default routing c) Least cost routing d) No change is needed

No change is needed

Every router today is *TCP/IP* enables, which is an industry-standard protocol that you use on the Internet and for local addressing. a) HTTP b) FTP c) SNMP d) No change is needed

No change is needed

The loopback address of your computer is *127.0.0.1* a) 10.0.1.1 b) 169.254.0.5 c) 192.168.1.1 d) No change is needed

No change is needed

WEP wireless encryption is the most susceptible to interception and decryption. a) WPA-AES b) WPA2 c) WPA-PSK d) No change is needed

No change is needed

All session data is *encrypted between all machines* while using telnet. a) Not encrypted b) Encrypted between any Windows machines c) Encrypted only to any non-Windows machines d) No change needed

Not encrypted

Order the layer of the OSI model: Data Link Layer Network Layer Session Layer Application Layer Presentation Layer Physical Layer Transport Layer

Order the layer of the OSI model: 1. Physical Layer 2. Data Link Layer 3. Network Layer 4. Transport Layer 5. Session Layer 6. Presentation Layer 7. Application Layer

Which command is used to verify that a server is connected to the network? a) IPCONFIG b) ROUTE c) PING d) CHECK

PING

A network that separates an organization's private network is a/an: a) Firewall b) Extranet c) Perimeter d) Internet

Perimeter

The ping tool is used to: (Choose two) a) Determine the network portion of a host address b) Self-test a host's own network interface c) Determine whether a host is reachable d) Manage a host's session when UDP is used

Self-test a host's own network interface Determine whether a host is reachable

The topology of a local area network (LAN) is defined by the: a) Number of physical devices to connect b) Physical and logical characteristics c) Distance between workstations d) Type of cable being used

Physical and logical characteristics

Which of the following is a Layer 2 WAN protocol: a) Point-to-Point Protocol (PPP) b) Simple Network Management Protocol (SNMP) c) Transmission Control Protocol (TCP) d) Internet Protocol (IP)

Point-to-Point Protocol (PPP)

An Action Center alert recommends that you enable Windows Firewall. After enabling the firewall, you can no longer access websites. Which two TCP ports should you add exceptions for on the firewall? (Choose two) a) Port 21 b) Port 23 c) Port 25 d) Port 80 e) Port 443

Port 80 Port 443

According to the OSI model, encryption takes place on the *transport* layer. a) Presentation b) Network c) Application d) No change is needed

Presentation

A *secondary zone* is the first DNS zone to which all updates for the records that belong to that zone are written a) Primary zone b) Stub zone c) Conditional forwarding zone d) No change needed

Primary zone

In addition to switching, multilayer switches also: a) Provide Layer 3 routing functions b) Interface with CAT3, CAT5, CAT5e, and fiber optics c) Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports d) Operate by using only Layer 1 and 2 protocols

Provide Layer 3 routing functions

The type of connector used on a 1000BaseT Ethernet cable is: a) RJ-11 b) RJ-45 c) TNC d) BNC

RJ-45

One reason to incorporate VLANs in a network is to: a) Increase the number of available IP addresses b) Increase the number of available Media Access Control (MAC) addresses c) Reduce the number of broadcast domains d) Reduce the number of nodes in a broadcast domain

Reduce the number of nodes in a broadcast domain

TRACERT is used to: a) Manage routing tables dynamically b) Manage session-oriented connections between nodes c) Report the route taken by packets across an IP network d) Report the shortest route between different networks

Report the route taken by packets across an IP network

What is an example of a Layer 3 device that connects multiple computers and networks? a) Packet b) Repeater c) Switch d) Router

Router

What is an example of a network device that associates a network address with a port? a) Switch b) Router c) Hub d) DSL modem

Router

You need to divide a network into three subnets. Which device should you use? a) Hub b) Bridge c) Router d) Segmenter

Router

You are heling a friend set up a public-facing web server for a home office. Your friend wants to protect the internal network from intrusion. What should you do? a) Set the web server in a perimeter network b) Set the web server to block access on ports 80 and 443 c) Configure the firewall to block access on ports 80 and 443 d) Set the IP address of the web server to be within the LAN

Set the web server in a perimeter network

Which feature of Category 5e STP cable reduces external interference? a) Crosstalk b) Shielding c) Length d) Twisting

Shielding

Which of these cable types transmits data the greatest distance? a) Multi-mode fiber b) Single-mode fiber c) Cat5e d) Cat6

Single-mode fiber

In which physical network topology is each computer connected to a central point? a) Star b) Mesh c) Ring d) Bus

Star

One reason to replace an unmanaged switch with a managed switch is to: a) Manage the routing tables b) Support multiple VLANs c) Reduce collision domains d) Route between networks

Support multiple VLANs

What are two characteristics of a fiber optic cable? (Choose two) a) Conducts electricity b) Requires metal conduit c) Supports splicing d) Requires a polish for end connectors

Supports splicing Requires a polish for end connectors

A Layer 2 device that connect multiple computers within a network is a: a) Repeater b) Switch c) Router d) Packet

Switch

A network device that associates a Media Access Control (MAC) address with a port is a: a) DSL modem b) Hub c) Router d) Switch

Switch

What are two differences between switches and hubs? (Choose two) a) Switches are slower than hubs because of the extra addressing functions that switches perform b) Switches send data to all of the computers that are connected to them for efficiency c) Switches are capable of sending and receiving data at the same time d) Switches identify the intended destination of the data that they receive

Switches are capable of sending and receiving data at the same time Switches identify the intended destination of the data that they receive

The NTP value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it. a) TTL b) GPS c) SOA RR d) No change is needed.

TTL

You ping a server by using a fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt? a) PING is improperly configured b) The DNS is not resolving c) The DHCP serve is offline d) NSLookup is stopped

The DNS is not resolving

What happens when an 802.11a node broadcasts withing the range of an 802.11g access point? a) The access point transmits, but the node is unable to receive b) A connection occurs c) Both the node and the access point are unable to transmit d) The node transmits, but the access point is unable to receive

The node transmits, but the access point is unable to receive

Security is a concern on wireless network due to: a) The radio broadcast access method b) Spread spectrum issues c) Frequency modulation issues d) The potential for cross-talk

The radio broadcast access method

Which of these factors has the biggest impact on data transmission spend in a wireless network? a) The access method used for the network b) The transmission standard of the equipment used c) The use of strong encryption for transmissions d) The transmission wattage rating used on the NIC

The transmission standard of the equipment used

What are three advantages of VLANs? (Choose three) a) They can logically address packets by using IP b) They require a router to connect to VLANs on another switch c) They compartmentalize a network and isolate traffic d) They are efficient because a single switch can implement multiple VLANs e) They act as though they are on the same LAN regardless of physical location

They compartmentalize a network and isolate traffic They are efficient because a single switch can implement multiple VLANs They act as though they are on the same LAN regardless of physical location

Which of the following determines the media access method that is used in a network? a) Number of hosts connected to the network b) Number of domain servers on the segment c) Maximum speed of the media d) Topology and protocols

Topology and protocols

Which type of port is used to support VLAN traffic between two switches? a) Virtual port b) WAN port c) Trunk port d) LAN port

Trunk Port

To set lower security settings in Internet Explorer for an extranet site, add the site's URL to the *Local Intranet zone*. a) Intranet b) Trusted sites c) Extranet sites d) No change is needed

Trusted sites

Which protocol is a transport layer protocol? a) FTP b) IP c) UDP d) ASCII

UDP

Which network device interconnects computers in a workgroup, is able to be remotely configured, and provides the best throughput? a) Unmanaged switch b) Hub c) Router d) Managed switch

Unmanaged switch

The characteristic of the mesh topology is that it: a) Uses a central hub b) Cannot use wired connections c) Uses redundant paths d) Cannot use wireless connections

Uses redundant paths

Which of the following uses a tunneling protocol? a) Internet b) VPN c) Extranet d) VLAN

VPN

Which technology can you use to extend an internal network across shared or public networks? a) VLAN b) Microsoft ASP-NET c) Microsoft .NET Framework d) VPN

VPN

A user reports that she cannot connect to a network resource from a computer on the company network. The user was able to connect to the network resource yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to the network resources. What should you do next? a) Flush the cache on the DNS server b) Reset the user's password on the server c) Check your router's current routing tables d) Verify that the DHCP service is available

Verify that the DHCP service is available

Which type of network covers the broadcast area? a) WAN b) CAN c) LAN d) PAN

WAN

Which wireless authentication method provides the highest level of security? a) Wired Equivalency Privacy (WEP) b) IEEE 802.11n c) WI-FI Protected Access (WPA) d) IEEE 802.11a

WI-FI Protected Access (WPA)

You work at a coffee shop. You supervisor asks you to help set up a computer network. The network needs to have the following items: a public facing web server, a wi-fi network for customers, a private network for the point of sale terminals, an office PC, a file/print server, a network printer. You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? a) Network printer b) Web server c) File server d) Wi-fi network e) Point of sale terminals

Web server Wi-fi network

The four IEEE standards, 802.11a,b,g, and n are collectively known as *mobile ad hoc* networks a) WiMAX b) Bluetooth c) WiFi d) No change is needed

WiFi

IPSec policies for two machines on a LAN can be modified by using the *IPSec policy snap-in* on Windows 7. a) Windows Firewall with Advanced Security snap-in b) LAN adapter properties c) Remote Access snap-in d) No change needed

Windows Firewall with Advanced Security snap-in

A service that resolves NetBIOS names to IP addresses is: a) Domain Name Service (DNS) b) Internet Service Provider (ISP) c) Address Resolution Protocol (ARP) d) Windows Internet Name Service (WINS)

Windows Internet Name Service (WINS)

Which type of network is most vulnerable to intrusion? a) Dial-up b) Wireless c) Broadband d) Leased line

Wireless

For each of the following statements, select Yes if the statement is true. Otherwise, select No. a) The TCP/IP model has four layers, which correspond with the OSI model's seven layers b) The TCP/IP application layer corresponds with the top four layers of the OSI model c) The TCP/IP transport and Internet layers correspond with Layers 3 and 4 of the OSI

YES NO YES

For each of the following statements, select Yes if the statement is true. Otherwise, select No. a) 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A is a valid IPv6 unicast address b) FE80::2AA:FF:FE28:9C5A is a valid IPv6 address c) 21DA::02AA:::FF:FE28:9C5A is a valid IPv6 address

YES YES NO

For each of the following statements, select Yes if the statement is true. Otherwise, select No. a) IPsec can be used to secure network communications between two machines b) IPsec can be used to secure network communications between two networks c) IPsec network traffic is always encrypted

YES YES NO

The process of replicating a zone file to multiple DNS servers is called *zone replication* a) Zone transfer b) Zone synchronization c) Start of authority d) No change needed

Zone transfer

The top-level domain if www.adventureworks.com is: a) www b) adventureworks c) adventureworks.com d) com

com

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is: a) corp b) com c) nwtraders d) exchange e) mail

mail


Related study sets

CR29 S.A.F.E Act - Mortgage Licensing

View Set

PSY-317 MIDTERM Review Spring 2023

View Set

Unit 2: Describing the customer experience

View Set

NHA NOW EKG Technician Practice Test

View Set

CompTIA Linux+ Guide to Linux Certification Ch. 5 Review Questions

View Set

Vand, Vandetskredsløb -Anne,Claire og Signe, Vand og energi produktion, Vandets kredsløb - Jeppe, Ida og Louie, Grundvand - Riber, Sarah og Emma, Vand - Bahne, Carlo, Oliver, Renseanlæg/Max, Louise, Moses og Phillip, Vand og tilstandsformer/lea, caro...

View Set

COMBINED Cell & Molec Chapter 15, Molecular Biology Chapter 15 Practice Questions, SmartWork5 Chapter 10, Quiz 15.2: Protein Sorting + Vesicular Transport, Chapter 15, Chapter 15 Quiz (Cell Biology), Chapter 15: Endomembrane system, chegg questions

View Set