-
1. You have just set up a network that will use TCP/IP protocol, and you want client computers to automatically obtain IP configuration information. What type of server do you need for this? A. DNS B. DHCP C. Domain Controller D. IP configuration server
B. A Dynamic Host Configuration Protocol server provides IP configuration to hosts when they join a network.
-
2. You have a computer with the IP address 171.226.18.1. What class is this address? a. Class A b. Class B c. Class C d. This is not a valid IP address
B. Class A addresses have a first octet between 1 and 126, Class B between 128 and 191, and class C between 192 and 223. With a first octet of 171, this is a class B address.
-
3. (blank) is immune to electromagnetic or radio frequency interference. a. twisted pair cablin b. CSMA/CD c. broadband coaxial cablin d. fiber optic cabling
D. Companies that want to ensure the safety and integrity of their data should use fiber-optic cable, because it cannot be affected by electromagnetic or radio frequency interference.
-
4. Which IEEE 802 standard defines a bus topology using coaxial baseband cable and is able to transmit at 10Mbps? a. 802.1 b. 802.2 c. 802.3 d. 802.4
C. The IEEE 802.3 standard specifies the use of a bus topology, typically using coaxial baseband cable, and can transmit data up to 10Mbps.
-
5. Which of the following wireless IEEE standards operate on the 2.4GHz radio frequency and are directly compatible with each other? (Choose all that apply.) a. 802.11a b. 802.11b c. 802.11d d. 802.11g
B,D. Both 802.11b and 802.11g operate in the 2.4GHz range and use similar transmission standards. Many devices on the market are listed as 802.11b/g, meaning they will work with either system.
-
6. Which OSI layer signals "all clear" by making sure the data segments are error free? a. Application layer b. Session layer c. Transport layer d. Network layer
C. It is the responsibility of the transport layer to signal an "all clear" by making sure the data segments are error free. It also controls the data flow and troubleshoots any problems with transmitting or receiving data frames.
-
7. Which TCP/IP protocol uses port 80? a. HTTP b HTTPS c. Telnet d. POP3
A. HTTP uses port 80. HTTPS uses 443, Telnet 23, and POP3 110.
-
8. (blank) is the type of media access method used by NICs that listen to or sense the cable to check for traffic and send only when they hear that no one else is transmitting. a. token passing b. CSMA/CD c. CSMA/CA d. Demand priority
B. CSMA/CD (Carrier Sense Multiple Access with Collison Detection) specifies that the NIC pause before transmitting a packet to ensure that the line is not being used.
-
9. What model is used to provide a common way to describe network protocols? a. OSI b. ISO c. CSMA/CA d. CSMA/CD
A. The Open System Interconnection model
-
10. What is the primary function of the SSID? a. secure communication between a web server and browser b. Secure communication between a server and remote host c. a type of password used to help secure a wireless connection d. a type of password used to secure an Ethernet 802.3 connection
C. a service- set identifier is the unique name given to a wireless network. All hardware that is to participate on the network must be configured to use the same SSID.
-
11. a physical star topology consists of several workstations that branch off a central device called a (blank). a. NIC b. Bridge c. Router d. Hub
D. At the center of a star topology is a hub or a switch. A NIC is a network card, which each computer must have to be on the network.
-
12. Of all network cabling options, (blank) offers the longest possible segment length. a. unshielded twisted pair b. coaxial c. fiber-optic d. Shielded twisted pair
C. Fiber-optic cable can span distances of several kilometers, because it has much lower crosstalk and interference in comparison to copper cables.
-
13. what device transfer packets across multiple networks and use tables to store network addresses to determine the best destination? a. routers b. bridges c. hubs d. switches
A. Routers are designed to route (transfer) packets across networks. They are able to do this routing, and determine the best path to take, based on internal routing talbes they maintain.
-
14. In which network design do users access resources from other workstations rather than from a central location? a. client server b. star c. ring d. peer-to-peer
D. A peer-to-peer network has no servers, so all of the resources are shared from the various workstations on which they reside. This is the opposite of a client-server network, in which the majority of resources are located on servers that are dedicated to responding to client requests.
-
15. Which of the following wireless communication standards is often described in terms of a wireless personal area network? a. bluetooth b. infrared c. cellular d. ethernet
A. Bluetooth networks are often called wireless personal area networks. (WPANs)
-
16. Which two of the following are standards for cellular communication? a. GSM b. SIG c. CDMA d. CCFL
A,C. The Global System for Mobile Communication(GSM) and Code Division Multiple Access(CDMA) are cellular standards. A SIG is a Special Interest Groupl, and cold cathode fluorescent lamp(CCFL) is a backlight on a laptop
-
17. Which of the following statements are not associated with a star network? (choose all that apply) a. a single cable break can cause complete network disruption b. all devices connect to a central device. c. it uses a single backbone computer to connect all network devices d. it uses a dual ring configuration
A,C,D. In a star network, all systems are connected using a central device such as a hub or a switch. The network is not dirupted for other users when more systems are added or removed.
-
18. A (blank) is a type of network where all of the computers appear to be on the local network even if they are physically located in a remote location. a. VPN b. WAN c. LAN d. Domain
A. A virtual private network(VPN) is one where all computers appear to be on the local LAN even if they are not. VPNs are useful for remote access as well as if you have networks in multiple locations
-
19. What is the most secure wireless encryption standard for 802.11x networks a. WEP b. WPA c. WPA2 d. SAFER+
C. WEP was the original encryption standard developed for WiFi networks, but it is easily hacked. WPA is an upgrade, but WPA2 is more secure and incorporates the entire 802.11i standard. SAFER+ is used to encrypt Bluetooth communications.
-
20. If you are going to ru n a network cable in the space above the drop ceiling in your office, which type of cable should you use? a. Plenum b. PVC c. Coaxial d. Fiber-optic
A. For areas where a cable must be fire retardant, such as in a drop ceiling, you must run plenum-grade cable. Plenum refers to the coating on the sleeve of the cable, not the media(copper or fiber) within the cable itself.
|
|