CIT 1351: Chapter 14-Introduction to Networking – Flashcards

262 test answers

Unlock all answers in this set

Unlock answers 262
question
T/f 1) A Bluetooth network would be considered a type of LAN.
answer
false
question
t/f 2) An Ethernet network would be considered a type of LAN.
answer
true
question
t/f 3) A business that has six computers would most likely have a server-based network.
answer
false
question
t/f 4) A workgroup network is commonly found in a home or small business environment.
answer
true
question
t/f 5) The most common type of LAN found today is Ethernet.
answer
true
Unlock the answer
question
t/f 6) The hub is the most common centralized device used by businesses to connect multiple computers.
answer
false
Unlock the answer
question
t/f 7) A hub or switch is commonly mounted on a room wall or ceiling for optimum performance and connectivity to the computers.
answer
false
Unlock the answer
question
t/f 8) Ethernet networks normally use a star topology.
answer
true
Unlock the answer
question
t/f 9) A star topology takes more cabling than a bus topology.
answer
true
Unlock the answer
question
t/f 10) UTP is a type of copper media.
answer
true
Unlock the answer
question
t/f 11) Crosstalk is when a signal degrades due to distance or length.
answer
false
Unlock the answer
question
t/f 12) STP cabling has extra shielding to help with crosstalk.
answer
false
Unlock the answer
question
t/f 13) In a manufacturing plant, STP is a good choice for network cabling.
answer
true
Unlock the answer
question
t/f 14) Plenum cable has been treated with a fire retardant material.
answer
true
Unlock the answer
question
t/f 15) Ethernet UTP cabling normally uses six wires.
answer
false
Unlock the answer
question
t/f 16) Coaxial cabling is normally found in video networks.
answer
true
Unlock the answer
question
t/f 17) Fiber optic cabling is commonly found in multiple buildings for a particular company.
answer
true
Unlock the answer
question
t/f 18) Fiber optic cabling can carry signals farther than copper cabling.
answer
true
Unlock the answer
question
t/f 19) Fiber optic cabling comes in two types: STP and UTP.
answer
false
Unlock the answer
question
t/f 20) Full-duplex transmissions eliminate Ethernet collisions.
answer
true
Unlock the answer
question
t/f 21) The 802.11 IEEE standard is for Ethernet networks.
answer
false
Unlock the answer
question
t/f 22) The IEEE 802.3 standard defines CSMA/CD.
answer
true
Unlock the answer
question
t/f 23) The layer of the OSI model known as Layer 3 is the transport layer.
answer
false
Unlock the answer
question
t/f 24) The layer of the OSI model known as Layer 7 is the application layer.
answer
true
Unlock the answer
question
t/f 25) A switch works at OSI model Layer 2.
answer
true
Unlock the answer
question
t/f 26) An IP address is considered to be on OSI model Layer 4.
answer
false
Unlock the answer
question
t/f 27) If you access the Internet, you must use the TCP/IP protocol suite.
answer
true
Unlock the answer
question
t/f 28) If a computer connects to the Internet, it must have a MAC address and an IP address.
answer
true
Unlock the answer
question
t/f 29) A MAC address contains 32 digits.
answer
false
Unlock the answer
question
t/f 30) An IPv4 address contains 32 binary numbers.
answer
true
Unlock the answer
question
t/f 31) The IP address of 128.251.187.199 is a Class A IP address.
answer
false
Unlock the answer
question
t/f 32) With a Class C IP address, the last octet is considered the host portion of the IP address.
answer
true
Unlock the answer
question
t/f 33) If a Class A IP address is being used, the default mask assigned is 255.255.255.0.
answer
false
Unlock the answer
question
t/f 34) The broadcast address for a host that has the IP address of 193.14.151.8 and a mask of 255.255.255.0 is 193.255.255.255.
answer
false
Unlock the answer
question
t/f 35) The subnet mask is used to determine which part of the IP address represents the network number.
answer
true
Unlock the answer
question
t/f 36) PPP is a protocol used with DUN.
answer
true
Unlock the answer
question
t/f 37) A corporation would more likely use an ad hoc mode wireless network than any other type of wireless network.
answer
false
Unlock the answer
question
t/f 38) When using an infrastructure mode wireless network, a PCI or PCI-E wireless NIC is required.
answer
false
Unlock the answer
question
t/f 39) A wireless SSID uniquely identifies each wireless network.
answer
true
Unlock the answer
question
t/f 40) An access point and a wireless NIC must operate on two different channel frequencies for communication to occur between the two.
answer
false
Unlock the answer
question
t/f 41) APIPA is used by network servers or devices to assign IP addresses to host computers.
answer
false
Unlock the answer
question
t/f 42) A host computer?s default gateway is the IP address of the router that connects to the Internet.
answer
false
Unlock the answer
question
t/f 43) A host computer requires a default gateway to communicate with network devices on another network.
answer
true
Unlock the answer
question
t/f 44) DHCP translates domain names to IP addresses.
answer
false
Unlock the answer
question
t/f 45) The ping utility is used to check connectivity between two network devices.
answer
true
Unlock the answer
question
t/f 46) The IPCONFIG command shows the IP address assigned to a network host.
answer
true
Unlock the answer
question
t/f 47) HTTPS would more likely to be used for Internet banking than HTTP.
answer
true
Unlock the answer
question
t/f 48) FTP is the protocol used when a Fast Ethernet network connects to a WAN.
answer
false
Unlock the answer
question
t/f 49) A classroom has been having lots of printing problems lately. The technician responsible for this classroom replaces the printer to show that he is a proactive technician.
answer
false
Unlock the answer
question
t/f 50) An example of a proactive technician is one who configures each computer for automatic virus updates rather than waiting for a virus to occur before updating the software.
answer
true
Unlock the answer
question
t/f 51) A wireless network must connect to the wired network.
answer
false
Unlock the answer
question
t/f 53) 192.168.10.1 255.255.255.0 is an IP address shown in the prefix notation format.
answer
false
Unlock the answer
question
t/f 54) Bluetooth transmissions are secure.
answer
true
Unlock the answer
question
t/f 55) The 802.11n wireless standard is compatible with all previous standards except 802.11a.
answer
false
Unlock the answer
question
t/f 56) An 802.11 Windows 7 wireless NIC will attach to an 802.11g AP.
answer
true
Unlock the answer
question
Two or more computers that share files, printers, and other computer resources is called a(n) A) Organization B) Network C) System D) Group
answer
B) Network
Unlock the answer
question
LAN is an abbreviation for A) Local Administrative Netting B) Low Access Netting C) Link And Network D) Local Area Network
answer
D) Local Area Network
Unlock the answer
question
A business is located in two buildings in the same town. The accounting computers are connected to each other in the same office space; however, management is located in another building. Management can access the data on the accounting side through a connection installed between the two buildings. What type of network does this exemplify? A) MAN B) WON C) SAN D) PAN E) CAN
answer
A) MAN
Unlock the answer
question
Your small business has four computers. What type of network are you operating if each machine is responsible for its own security? A) WAN B) Server C) Workgroup D) Fiber optic
answer
C) Workgroup
Unlock the answer
question
What type of network is described when two or more computers are connected in the same room of a building? A) WAN B) LAN C) GAN D) SAM
answer
B) LAN
Unlock the answer
question
WAN is an abbreviation for A) World Area Network B) Web Accessed Network C) Wide Area Network D) World Accessed Network
answer
C) Wide Area Network
Unlock the answer
question
Sun Solaris, Red Hat Enterprise Linux, and Microsoft Server 2012 are examples of A) Network operating systems B) Application software C) Word processing software D) Peer-to-peer software
answer
A) Network operating systems
Unlock the answer
question
What are the benefits of a server-based network? A) Greater security than with a peer-to-peer network B) Individual access to assigned resources from any workstation C) Greater centralized control over what a user can access D) All these answers are true.
answer
D) All these answers are true.
Unlock the answer
question
The mapping of how the physical or logical paths of network devices connect is called A) Global Positioning System (GPS) B) Network topology C) Geographic mapping D) Network Neighborhood
answer
B) Network topology
Unlock the answer
question
Three examples of network topology are A) Star, ring, bus B) Peer, hub, server C) Geographic, topographic, demographic D) Global, urban, rural
answer
A) Star, ring, bus
Unlock the answer
question
The device in a star topology that enables multiple device connections is called a(n) A) Router B) Ring C) Switch D) Workstation
answer
C) Switch
Unlock the answer
question
Star topology is most closely associated with A) Novell networks B) Gateway networks C) Bus networks D) Ethernet networks
answer
D) Ethernet networks
Unlock the answer
question
Which statement about the star topology is true? A) Cost is a major consideration when wiring a star topology. B) The star topology is the most difficult to troubleshoot. C) More cable is used in wiring a star topology than other topologies. D) All devices are attached to one long trunk line that connects to the server.
answer
C) More cable is used in wiring a star topology than other topologies.
Unlock the answer
question
UTP cable that supports Gigabit Ethernet is . A) CAT 3 B) CAT 4 C) CAT 5 D) CAT 6 E) Single-mode fiber F) Multimode fiber
answer
D) CAT 6
Unlock the answer
question
How many wires are contained in an RJ-45 jack? A) Two B) Four C) Six D) Eight
answer
D) Eight
Unlock the answer
question
One of the oldest network topologies is the A) Bus B) Mesh C) Ring D) Star
answer
A) Bus
Unlock the answer
question
The network is said to be fault tolerant when A) The network can work even when a cable breaks. B) The network displays user-friendly prompts after a user error. C) The network activates backup safeguards when the hard disk crashes. D) None of these are true
answer
A) The network can work even when a cable breaks.
Unlock the answer
question
Three types of network media are A) Radio, television, telephone B) Fiber optic, twisted-pair, coaxial C) Ring, bus, star D) NBC, ABC, CBS
answer
B) Fiber optic, twisted-pair, coaxial
Unlock the answer
question
The disruption that occurs when a signal on one wire interferes with the signal on an adjacent wire is called A) Fault tolerance B) System crash C) Interruption D) Crosstalk
answer
D) Crosstalk
Unlock the answer
question
Which unshielded wiring standard supports 10Gbps Ethernet? A) Single-mode B) Cat 6a C) STP D) Cat 5
answer
B) Cat 6a
Unlock the answer
question
STP is an acronym for A) Standard Technology Protocol B) Start Terminate Procedure C) Shielded Twisted Pair D) Satellite Telecommunication Protocol
answer
C) Shielded Twisted Pair
Unlock the answer
question
UTP, STP, and coax are associated with A) Light transmission media B) Cable C) Wireless networking D) Radio frequency
answer
B) Cable
Unlock the answer
question
Which one of the following statements is true about fiber optic cable? A) It is used for wireless transmissions. B) It offers the lowest security compared to other networking media. C) It is used to connect individual workstations to each other. D) It is the most expensive cable type.
answer
D) It is the most expensive cable type.
Unlock the answer
question
The two major classifications of fiber optic cable are A) Single and multimode B) Plastic and glass C) Flexible and inflexible D) Colored and monochrome
answer
A) Single and multimode
Unlock the answer
question
What type of fiber optic cable enables only one light signal to be sent along the cable? A) Mono-filament B) Single-mode C) Multimode D) Single line
answer
B) Single-mode
Unlock the answer
question
What type of fiber optic cable enables multiple light signals to be sent along the same cable? A) Plastic B) Glass C) Crystal D) None of these answers are true.
answer
D) None of these answers are true.
Unlock the answer
question
Which one of the following statements about fiber optic cable is true? A) Multimode fiber can transmit a signal farther than single-mode. B) It is susceptible to interference from EMI- or RFI-producing devices. C) It is more expensive than other cable media. D) Security is the poorest using fiber optic cable.
answer
C) It is more expensive than other cable media.
Unlock the answer
question
The access method used by wireless networks is . A) Token passing B) CSMA/CA C) CSMA/CD D) mesh
answer
B) CSMA/CA
Unlock the answer
question
What type of network uses CSMA/CD access method? A) ARCnet B) Ring C) Ethernet D) Crosstalk
answer
C) Ethernet
Unlock the answer
question
The access method that listens for a busy signal before transmitting data is A) CSMA/CD B) Token passing C) Closed D) Restrictive
answer
A) CSMA/CD
Unlock the answer
question
In CSMA/CD the CD stands for A) Carrier Detect B) Compact Disc C) Complete Digital D) Collision Detect
answer
D) Collision Detect
Unlock the answer
question
In the term 1000BaseT, the ?1000? means A) 1000 computers per network max B) 1000Mbps C) 1000 meters between central connectivity devices such as a switch D) 1000 ohm terminators are used on the Ethernet
answer
B) 1000Mbps
Unlock the answer
question
The terms 10Base2, 10BaseT, 100BaseT, and 1000BaseT are typically associated with networks. A) Ethernet B) Ring C) ARCnet D) RF
answer
A) Ethernet
Unlock the answer
question
The ?T? in 1000BaseT stands for A) Ten B) Twisted-pair C) Time D) Technology
answer
B) Twisted-pair
Unlock the answer
question
The access method used when a workstation sends out a jam signal before transmitting data is A) Collision detection B) Token passing C) Collision avoidance D) DQDB
answer
C) Collision avoidance
Unlock the answer
question
In an Ethernet network, a(n) data transmission is one that transmits data in both directions but not at the same time. A) Full duplex B) Serial C) Parallel D) Half-duplex
answer
D) Half-duplex
Unlock the answer
question
In an Ethernet network, a(n) data transmission is one that can transmit data in both directions at the same time. A) Half-duplex B) Full duplex C) Serial D) Parallel
answer
B) Full duplex
Unlock the answer
question
What is the speed of a 1000BaseT network? A) 100Gbps B) 1000Ghz C) 100Mbps D) 1000Mbps
answer
D) 1000Mbps
Unlock the answer
question
What is the maximum cable length in a 100BaseT Ethernet network? A) 10 meters B) 2 meters C) 100 meters D) 200 meters
answer
C) 100 meters
Unlock the answer
question
What service provides a user access to the Internet and an e mail account? A) STP B) TCP C) ISP D) IPX
answer
C) ISP
Unlock the answer
question
How many layers are defined in the OSI model? A) 1 B) 5 C) 7 D) 9
answer
C) 7
Unlock the answer
question
OSI is an acronym for A) Open System Interconnect B) Operating System Interface C) Ongoing Standard Integrity D) Output System Input
answer
A) Open System Interconnect
Unlock the answer
question
The top layer of the OSI model is A) Presentation B) Session C) Transport D) Application
answer
D) Application
Unlock the answer
question
The bottom layer of the OSI model is A) Data link B) Physical C) Network D) Transport
answer
B) Physical
Unlock the answer
question
What layer of the OSI model encapsulates data into frames? A) Data link B) Physical C) Session D) Application
answer
A) Data link
Unlock the answer
question
Connectors, cables, and voltage levels are defined at which level in the OSI model? A) Data link B) Network C) Transport D) Physical
answer
D) Physical
Unlock the answer
question
Which layer provides network services to any software application running on the network? A) Physical B) Network C) Application D) Presentation
answer
C) Application
Unlock the answer
question
The protocol suite used for Internet connectivity is A) TCP/IP B) NetBEUI C) IPX/SPX D) All these protocol suites are used
answer
A) TCP/IP
Unlock the answer
question
Each network interface card has a unique 48 bit number burned into ROM called a(n): A) Token B) MAC address C) IP address D) Host address
answer
B) MAC address
Unlock the answer
question
The function of the router is found at which level in the OSI model? A) Transport B) Data link C) Network D) Session
answer
C) Network
Unlock the answer
question
Which type of address uses 128 bits? A) LC B) IPv6 C) MAC D) IPv4
answer
B) IPv6
Unlock the answer
question
The analogy of a post office return receipt is used to describe what OSI model layer? A) Session B) Network C) Data link D) Transport
answer
D) Transport
Unlock the answer
question
A technology that can transmit data over a traditional voice line is A) Frame relay B) Cable modem C) ATM D) DSL
answer
D) DSL
Unlock the answer
question
Which safety tip is appropriate for network cabling? A) Ensure the newly installed network cabling does not run near fluorescent lights. B) Ensure the newly installed network cabling is not installed in a ceiling conduit. C) Ensure the newly installed network cabling is not installed on vertical ladder racks. D) Ensure the newly installed network cabling is not a trip hazard.
answer
D) Ensure the newly installed network cabling is not a trip hazard.
Unlock the answer
question
Sometimes, when logging on to a network, you must provide a userid and password or authenticate yourself. What OSI layer handles authentication? A) Session B) Presentation C) Application D) Transport
answer
C) Application
Unlock the answer
question
Which statement best describes an SSID? A) Uniquely identifies a wireless network B) Encrypts data sent between the access point and wireless client C) The frequency used to transmit data wirelessly between client and access point D) Identifies whether someone is authorized to access the wireless network
answer
A) Uniquely identifies a wireless network
Unlock the answer
question
How many nonoverlapping frequencies does an 802.11b or g wireless network have? A) 2 B) 3 C) 5 D) 6 E) 9 F) 11
answer
B) 3
Unlock the answer
question
Which statement is true about an omnidirectional antenna? A) It would commonly be used in a school hallway that has extended length. B) It is a fictitious antenna used for comparison with real antennas for strength measurement. C) It can pick up signals from all around it. D) It would be used as an antenna between two buildings.
answer
C) It can pick up signals from all around it.
Unlock the answer
question
Before installing a wireless network, you should prepare by performing what task? A) Site survey B) Calibrate the antenna C) Response test by the wireless clients D) Authentication test on the access point
answer
A) Site survey
Unlock the answer
question
Antenna gain is normally shown using what two measurements? A) cps and Hz B) Mbps and Gbps C) MHz and GHz D) dBi and dBd
answer
D) dBi and dBd
Unlock the answer
question
A parabolic antenna would most likely be used in what situation? A) Inside a classroom B) Inside a gymnasium C) Between buildings D) Including and between two rooms
answer
C) Between buildings
Unlock the answer
question
A dipole antenna A) Is an imaginary antenna used as a reference for other antennas B) Commonly connects to access points and NICs C) Is commonly used between buildings or outdoor sites D) Is commonly mounted to walls, ceilings, and columns
answer
B) Commonly connects to access points and NICs
Unlock the answer
question
A Windows computer is configured for DHCP. The computer is getting an IP address of 169.254.11.77, but it cannot communicate with other computers on the network, nor the email server. What is the most likely problem? A) The computer has a faulty NIC. B) The computer did not get an IP address from the DHCP server. C) The computer has an incorrect default gateway. D) The computer has an incorrect subnet mask.
answer
B) The computer did not get an IP address from the DHCP server.
Unlock the answer
question
What type of server translates domain names to IP addresses? A) Web B) DNS C) DHCP D) FTP
answer
B) DNS
Unlock the answer
question
What type of server would be used to store files for accessibility across the network? A) Web B) DNS C) DHCP D) FTP
answer
D) FTP
Unlock the answer
question
What command would be used to check the TCP/IP stack on a networked computer? A) ping 127.0.0.1 B) tracert C) ipconfig D) nslookup
answer
A) ping 127.0.0.1
Unlock the answer
question
What command would be used to check connectivity across a network? A) ping 127.0.0.1 B) tracert C) ipconfig D) nslookup
answer
B) tracert
Unlock the answer
question
What command would be used to check the time a packet takes for each hop along its destination path? A) ping 127.0.0.1 B) tracert C) ipconfig D) nslookup
answer
B) tracert
Unlock the answer
question
What command would be used to determine the IP address assigned to a computer? A) ping 127.0.0.1 B) tracert C) ipconfig D) nslookup
answer
C) ipconfig
Unlock the answer
question
What command is used to help with DNS server problems? A) ping 127.0.0.1 B) tracert C) ipconfig D) nslookup
answer
D) nslookup
Unlock the answer
question
What network term is used to describe how much data a communications channel can carry? A) Bandwidth B) Capacity C) Channel ID D) Backbone
answer
A) Bandwidth
Unlock the answer
question
What is a UNC? A) A receiver that reads barcodes B) A standard for referring to network shares C) A protocol that translates between domain names and IP addresses D) An access method used with wireless networks
answer
B) A standard for referring to network shares
Unlock the answer
question
A computer named Cheryl_Computer has a network share called 2008_Edition. What would the UNC be for this share? A) Cheryl_Computer2008_Edition B) 2008_EditionCheryl_Computer C) UNC2008_EditionCheryl_Computer D) UNCCheryl_Computer2008_Edition
answer
A) Cheryl_Computer2008_Edition
Unlock the answer
question
What network technician trait is used in the following situation: The network technician asks the faculty member what hardware upgrades she may need for her labs in the upcoming year? A) Responsiveness B) Dedication C) Proactive D) Mentoring E) Positive attitude
answer
C) Proactive
Unlock the answer
question
When would a technician use the Alternate Configuration tab? A) When there is a resource conflict B) To configure a laptop for a work and home network environment C) To troubleshoot a hardware problem D) To troubleshoot a DHCP problem
answer
B) To configure a laptop for a work and home network environment
Unlock the answer
question
What is the maximum range for a Bluetooth class 2 device? A) ~3 feet B) ~15 feet C) ~27 feet D) ~72 feet E) ~100 feet
answer
D) ~72 feet
Unlock the answer
question
What tool would be most likely used to troubleshoot an IP phone that will not attach to a network? A) Cable tester B) OTDR C) Loopback plug D) Multimeter E) NIC
answer
A) Cable tester
Unlock the answer
question
An 802.11n wireless access point is installed at a college. A student notices that the highest connectivity speed for her laptop is 11Mbps. What is the issue? A) The AP is faulty. B) The wireless NIC is incompatible with the AP. C) The wireless NIC is 802.11b. D) The AP is using only one antenna.
answer
C) The wireless NIC is 802.11b.
Unlock the answer
question
What command would a technician use to see all the connections including port numbers being used by a computer? A) ping B) ipconfig C) net share D) netstat E) nslookup
answer
D) netstat
Unlock the answer
question
A Windows 7 computer can no longer print to a network printer. Others in the area cannot print either. What option was most likely changed? A) Print driver B) Printer IP address C) DHCP server scope of IP addresses D) Printer MAC address E) Printer time of day availability option
answer
B) Printer IP address
Unlock the answer
question
A Windows 7 laptop needed a wireless mini-PCI adapter replaced. Now the laptop cannot get more than one bar of wireless signal strength with only one access point in the area. The three other laptops attach. What is the most likely problem? A) The antenna connectors were not reattached. B) The adapter is bad. C) The wrong security settings were applied to the wireless NIC. D) The BIOS needs to be flashed.
answer
A) The antenna connectors were not reattached.
Unlock the answer
question
Which network problem is most likely to have caused a problem with a single wired Windows 7 computer that has an intermittent Internet connectivity issue? A) Cabling B) Failed router C) Failed switch D) Windows 7 firewall E) NTFS permissions
answer
A) Cabling
Unlock the answer
question
Which command is used to map a network drive? A) ipconfig B) nslookup C) netstat D) connect E) map F) net use
answer
F) net use
Unlock the answer
question
What is the name of the transport layer protocol that is used with VoIP? A) IP B) TCP C) DHCP D) UDP
answer
D) UDP
Unlock the answer
question
What protocol is used to retrieve email using an email client application but leaves the email on the server? A) POP3 B) IMAP C) SMTP D) SNMP E) HTTP
answer
B) IMAP
Unlock the answer
question
Which ping command option would be used to resolve the hostname when testing connectivity to a remote host's IP address? A) ping -a B) ping -dns C) ping -d D) ping -r
answer
A) ping -a
Unlock the answer
question
Which desktop app would be used on an Android to configure the device for an 802.11 wireless network? A) Network and Sharing Center B) Network C) Settings D) Wireless and Network(s)
answer
C) Settings
Unlock the answer
question
Which desktop app would be used on an iOS device to configure the device for an 802.11 wireless network? A) Network and Sharing Center B) Network C) Settings D) Wireless and Network(s)
answer
C) Settings
Unlock the answer
question
Which setting would be used on an Android or iOS device to disable all networking? A) Network and Sharing Center B) Network C) Cellular Data D) Airplane Mode
answer
D) Airplane Mode
Unlock the answer
question
What is a QR code? A) A link to more information or deliver an app to another device B) A security feature on mobile storage C) A pattern or code to gain entry to the device D) A Quality Reporting app
answer
A) A link to more information or deliver an app to another device
Unlock the answer
question
What application is used to synchronize data between iOS devices? A) Play B) iTunes C) Market D) App Store
answer
B) iTunes
Unlock the answer
question
Which technology is used to back up data from an iOS device? A) iStorage B) WideSync C) iCloud D) AirPlay
answer
C) iCloud
Unlock the answer
question
Which tool is best to use to determine which port contains a cable that connects to a PC that has an intermittent connectivity problem? A) AC tester B) Multimeter C) Crimper D) Toner probe
answer
D) Toner probe
Unlock the answer
question
What two commands could be used to determine the DNS server being used by a Windows 7 computer? A) IPCONFIG /ALL B) IPCONFIG C) NSLOOKUP D) IPCONFIG /FLUSHDNS E) NETSTAT F) MSCONFIG
answer
A, C
Unlock the answer
question
What are three ways to network a printer? A) Connect a printer to a computer that is attached to the network. Share the printer. B) Connect the printer to a print server. Connect the print server to the network. C) Connect the printer to a USB port of any computer connected to the Internet. D) Connect the printer to a IEEE 1394 port, and extend a cable from that port to a network switch or hub. E) Connect a network cable between the printer with a NIC installed and a network switch or hub.
answer
A, B, E
Unlock the answer
question
What are three ways for a host device to receive an IP address? A) From a DNS server B) From a DHCP server C) Statically assign one D) Assigned by a IPCONFIG server E) APIPA
answer
B, C, E
Unlock the answer
question
802.11a A. Up to 54Mbps; became standard after 802.11b but is incompatible B. Security rules C. Up to 54Mbps in the 2.4GHz range
answer
A
Unlock the answer
question
802.11b D. Uses multiple antennas to achieve higher speeds E. Up to 11Mbps
answer
E
Unlock the answer
question
802.11g A. Up to 54Mbps; became standard after 802.11b but is incompatible B. Security rules C. Up to 54Mbps in the 2.4GHz range
answer
C
Unlock the answer
question
802.11i A. Up to 54Mbps; became standard after 802.11b but is incompatible B. Security rules C. Up to 54Mbps in the 2.4GHz range
answer
B
Unlock the answer
question
802.11n D. Uses multiple antennas to achieve higher speeds E. Up to 11Mbps
answer
D
Unlock the answer
question
Layer 1 A. Router B. Switch C. Gateway D. Cable
answer
D
Unlock the answer
question
Layer 2 A. Router B. Switch C. Gateway D. Cable
answer
B
Unlock the answer
question
Layer 3 A. Router B. Switch C. Gateway D. Cable
answer
A
Unlock the answer
question
Layer 7 A. Router B. Switch C. Gateway D. Cable
answer
C
Unlock the answer
question
Layer 1 D. Physical E. Data link F. Transport G. Presentation
answer
D
Unlock the answer
question
Layer 2 D. Physical E. Data link F. Transport G. Presentation
answer
E
Unlock the answer
question
Layer 3 A. Network B. Application C. Session
answer
A
Unlock the answer
question
Layer 4 D. Physical E. Data link F. Transport G. Presentation
answer
F
Unlock the answer
question
Layer 5 A. Network B. Application C. Session
answer
C
Unlock the answer
question
Layer 6 D. Physical E. Data link F. Transport G. Presentation
answer
G
Unlock the answer
question
Layer 7 A. Network B. Application C. Session
answer
B
Unlock the answer
question
191.56.72.188 A. Class A B. Class B C. Class C
answer
B
Unlock the answer
question
109.255.255.7 A. Class A B. Class B C. Class C
answer
A
Unlock the answer
question
223.18.200.49 A. Class A B. Class B C. Class C
answer
C
Unlock the answer
question
88.172.218.27 A. Class A B. Class B C. Class C
answer
A
Unlock the answer
question
130.2.2.2 A. Class A B. Class B C. Class C
answer
B
Unlock the answer
question
162.239.246.88 A. Class A B. Class B C. Class C
answer
B
Unlock the answer
question
195.7.19.123 A. Class A B. Class B C. Class C
answer
C
Unlock the answer
question
SNMP A. Part of the network that connects buildings B. Used before a URL to designate protocol being used C. Used with network monitoring tools
answer
C
Unlock the answer
question
HTML D. Human voice over a traditional data network E. Used to create web pages
answer
E
Unlock the answer
question
Backbone A. Part of the network that connects buildings B. Used before a URL to designate protocol being used C. Used with network monitoring tools
answer
A
Unlock the answer
question
HTTP A. Part of the network that connects buildings B. Used before a URL to designate protocol being used C. Used with network monitoring tools
answer
B
Unlock the answer
question
VoIP D. Human voice over a traditional data network E. Used to create web pages
answer
D
Unlock the answer
question
10BaseT D. Can use CAT3 cable E. 1Gbps over multimode fiber F. Can use CAT6 cable
answer
D
Unlock the answer
question
100BaseT D. Can use CAT3 cable E. 1Gbps over multimode fiber F. Can use CAT6 cable
answer
F
Unlock the answer
question
1000BaseT A. 10,000Mbps over fiber B. Known as Gigabit Ethernet C. 1Gbps over single-mode fiber
answer
B
Unlock the answer
question
1000BaseLX A. 10,000Mbps over fiber B. Known as Gigabit Ethernet C. 1Gbps over single-mode fiber
answer
C
Unlock the answer
question
1000BaseSX D. Can use CAT3 cable E. 1Gbps over multimode fiber F. Can use CAT6 cable
answer
E
Unlock the answer
question
10GBaseSR A. 10,000Mbps over fiber B. Known as Gigabit Ethernet C. 1Gbps over single-mode fiber
answer
A
Unlock the answer
question
Transport A. Data B. Segment C. Packet D. Frame
answer
B
Unlock the answer
question
Internet A. Data B. Segment C. Packet D. Frame
answer
C
Unlock the answer
question
Application A. Data B. Segment C. Packet D. Frame
answer
A
Unlock the answer
question
Network access A. Data B. Segment C. Packet D. Frame
answer
D
Unlock the answer
question
HTTP A. Transport B. Network access C. Application D. Internet
answer
C
Unlock the answer
question
UDP A. Transport B. Network access C. Application D. Internet
answer
A
Unlock the answer
question
MAC address A. Transport B. Network access C. Application D. Internet
answer
B
Unlock the answer
question
IP address A. Transport B. Network access C. Application D. Internet
answer
D
Unlock the answer
question
DNS A. Transport B. Network access C. Application D. Internet
answer
C
Unlock the answer
question
RJ45 connector A. Transport B. Network access C. Application D. Internet
answer
B
Unlock the answer
question
Fiber cable A. Transport B. Network access C. Application D. Internet
answer
B
Unlock the answer
question
192.168.10.5/24 A. A network number B. A broadcast address C. A device on a Class C network D. The last valid IP address in a subnetwork
answer
C
Unlock the answer
question
192.168.10.192/26 A. A network number B. A broadcast address C. A device on a Class C network D. The last valid IP address in a subnetwork
answer
A
Unlock the answer
question
192.168.10.127/27 A. A network number B. A broadcast address C. A device on a Class C network D. The last valid IP address in a subnetwork
answer
B
Unlock the answer
question
192.168.10.30/28 A. A network number B. A broadcast address C. A device on a Class C network D. The last valid IP address in a subnetwork
answer
D
Unlock the answer
question
1) A/An _______ is a group of devices connected together for the purpose of sharing resources.
answer
network
Unlock the answer
question
2) A home user has three computers connected together. Both computers have folders that are shared and accessible by the other computer. One computer has a printer attached that the other computer can also use. This is an example of a/an ______ network.
answer
workgroup
Unlock the answer
question
3) Of the two basic types of networks, the ______ network is more secure.
answer
domain
Unlock the answer
question
4) A/An ______ network should consist of no more than 10 computers.
answer
workgroup
Unlock the answer
question
5) The term used to describe how a network is wired is _______.
answer
topology
Unlock the answer
question
6) The _______ network topology is the most common, used with Ethernet networks, and has a direct connection between a network device and a centrally located hub or switch.
answer
start
Unlock the answer
question
7) Data from one cable interferes with another cable. This is known as _______.
answer
crosstalk
Unlock the answer
question
8) _______ cable carries light pulses.
answer
fiber optic
Unlock the answer
question
9) The type of fiber used for the longest distances is _______.
answer
single mode
Unlock the answer
question
10) With a fiber-optic cable installation _______ strands are normally used, one for each direction.
answer
two
Unlock the answer
question
11) A network accessory used in wiring closets to take multiple cables from the wall to a network cabinet is a _______ rack.
answer
ladder
Unlock the answer
question
12) _______ is the access method or set of rules for how workstations begin transmission on an Ethernet network.
answer
CSMA/CD
Unlock the answer
question
13) _______-duplex transmission is when data is transmitted in both directions simultaneously.
answer
full
Unlock the answer
question
14) The _______ in 1000BaseT means that twisted-pair cable is used.
answer
T
Unlock the answer
question
15) A/An _______ is better than a hub in Ethernet networks because this device is a Layer 2 device, and it keeps a table of addresses of the network devices attached.
answer
switch
Unlock the answer
question
16) Fiber-optic networks are defined in the IEEE _______ standard.
answer
802.8
Unlock the answer
question
17) The term given for encapsulated Layer 2 data is _______.
answer
frame
Unlock the answer
question
18) A UTP cable resides at Layer _______ of the OSI model.
answer
one
Unlock the answer
question
19) The _______ OSI model layer provides best path selection through the network and the Internet.
answer
network
Unlock the answer
question
20) The _______ OSI model layer can provide reliable connectivity and flow control.
answer
transport
Unlock the answer
question
21) A mainframe terminal has data in one format and a workstation has data in another format. Both devices can communicate across a network with the help of the _______ OSI model layer because this layer translates from one language to another.
answer
presentation
Unlock the answer
question
22) A switch resides at Layer _______ of the OSI model.
answer
two
Unlock the answer
question
23) Data found at Layer 3 of the OSI model is called a/an _______.
answer
packet
Unlock the answer
question
24) The MAC address is considered an OSI model Layer _______ address.
answer
two
Unlock the answer
question
25) MAC addresses are represented in _______ numerical format.
answer
hexadecimal
Unlock the answer
question
26) Each number in an IP address octet (one portion of the IP address) can be a number as low as _______.
answer
zero
Unlock the answer
question
27) Each number in an IP address octet (one portion of the IP address) can be a number as high as _______.
answer
255
Unlock the answer
question
28) 153.12.250.14 is a Class _______ IP address.
answer
B
Unlock the answer
question
29) The term associated with sending a packet to all devices on a single network is a/an _______.
answer
broadcast
Unlock the answer
question
30) The _______ is used to determine which part of an IP address is the network part.
answer
mask
Unlock the answer
question
31) The standard mask used with a Class C IP address is _______.
answer
255.255.255.0
Unlock the answer
question
32) A technician configures a workstation to automatically receive an IP address. The IP address comes from a/an _______ server.
answer
DHCP
Unlock the answer
question
33) A/An _______ is used when a network device wants to communicate with another network device located on a remote network. This address is the router IP address.
answer
default gateway
Unlock the answer
question
34) A subnet mask shown as /27 instead of 255.255.255.224 is in _______ format.
answer
prefix notation
Unlock the answer
question
35) The broadcast address for 172.16.120.200 255.255.192.0 is _______.
answer
172.16.127.255
Unlock the answer
question
36) The broadcast address for 192.168.10.157 255.255.255.0 is _______.
answer
192.168.10.255
Unlock the answer
question
37) The network address for 192.168.1.157 255.255.255.0 is _______.
answer
192.168.1.0
Unlock the answer
question
38) A Bluetooth network consisting of up to eight devices is called a/an _______.
answer
personal area network
Unlock the answer
question
39) The _______ uniquely identifies a particular wireless network.
answer
SSID
Unlock the answer
question
40) The part of the wireless network that is responsible for sending and receiving radio waves is the _______.
answer
antenna
Unlock the answer
question
41) The main part of the wireless network that coordinates the activity of all wireless clients is a/an _______.
answer
access point
Unlock the answer
question
42) Another name for a wireless propagation pattern is a/an _______ pattern.
answer
radiation
Unlock the answer
question
43) _______ can be defined as the amount of radio wave signal loss.
answer
attenuation
Unlock the answer
question
44) The comparison measurement between an antenna's radiation pattern and an isotropic antenna's radiation pattern is called antenna _______.
answer
gain
Unlock the answer
question
45) 2.14dBi equals _______ dBd.
answer
zero
Unlock the answer
question
46) An appropriate type of antenna to be used in a room that has a column in it or in a long hallway would be a _______antenna.
answer
patch
Unlock the answer
question
47) Another name for a rubber ducky antenna is a/an_______ antenna.
answer
dipole
Unlock the answer
question
48) _______ translates a URL into an IP address.
answer
DNS
Unlock the answer
question
49) _______ servers provide the computer name to the IP address translation.
answer
DNS
Unlock the answer
question
50) Where an access point is to be mounted is determined by doing a/an _______.
answer
site survey
Unlock the answer
question
51) The command used to test the TCP/IP protocol suite for a particular NIC is _______.
answer
pint 127.0.0.1
Unlock the answer
question
52) The _______ command is used to troubleshoot a remote network fault and to see the path a packet takes through several networks.
answer
tracert
Unlock the answer
question
53) A Layer 4 connection-oriented protocol is _______.
answer
TCP
Unlock the answer
question
54) The most popular Layer 3 protocol is _______.
answer
IP
Unlock the answer
question
55) When you _______ a drive letter, you give a single drive letter such as Z: to a network share.
answer
map
Unlock the answer
question
56) A technician that is _______ tries to prevent problems before they occur.
answer
proactive
Unlock the answer
question
1) Using good grammar, describe a benefit of using a layered model approach to networking.
answer
By using a layered model approach to networking, technologies emerge faster, a manufacturer can focus on one area of network development and not worry about the other factors, and networking is easier to explain to students how networks operate.
Unlock the answer
question
2) Using good grammar, list three guidelines provided by the OSI model.
answer
• It outlines how data is sent to the correct device. • It provides a structure for how data is verified. • It explains how different transmission media can interconnect
Unlock the answer
question
3) Using good grammar, list three characteristics of wireless networks.
answer
Wireless networks can have the following characteristics: transmit over air instead of wires, operate at OSI model Layers 1 and 2, use infrared or radio frequencies to transmit data, and provide connectivity between buildings, inside home networks, remote locations, and locations that might not be easy to wire.
Unlock the answer
question
4) Using good grammar describe two major types of antenna classification.
answer
Two categories of wireless antennas are directional and omnidirectional. The directional antenna focuses its signal reception and transmission in a particular direction. In contrast, the omnidirectional antenna radiates and receives signals in all directions
Unlock the answer
question
5) Using good grammar describe the purpose of a site survey and how it relates to a wireless network.
answer
A site survey is a test of an area to see how the wireless network will be installed and configured. It enables you to determine the best placement of the access point and antenna as well as the coverage area. Furthermore, a site survey determines black holes or spots where coverage is inadequate, weak, or inconsistent
Unlock the answer
question
6) Using good grammar, give two examples of how a technician might be proactive at work.
answer
(1) A technician uses a software program that "freezes" the computer. A user who uses a different user ID than the technician is allowed to change applications and the operating system, but after the computer reboots, the computer is back the way it was originally. A technician needs to install Windows updates, antivirus updates, and plug-in updates. The technician logs in, makes the changes, and freezes the computer state. A proactive technician would log in with a normal user ID to ensure the computer works properly. (2) A technician has a part-time assistant. A computer user requests that a certain part be installed on a particular day. The technician delegates this request to the assistant. The assistant is out sick the day of the installation. A proactive technician would either call to let the computer user know the installation will not occur, or better yet, the proactive technician will go to perform the installation. Note that a reactive technician would just let this go and when the user calls, then talk with the customer.
Unlock the answer
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New