1
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
The distance a signal can travel through the cable.
The number of twists in the wires inside the cable.
The number of wires inside the cable.
The type of shielding used inside the cable.
The type of connectors required to terminate the cable.
2
Which suite of protocols is used to transmit data across the Internet?
Appletalk
ARP
DNS
IPX/SPX
TCP/IP
3
Which Windows XP command displays the route taken by packets crossing an IP network?
iproute
netview
nslookup
ping
tracert
4
What is the most commonly used DSL technology?
ADSL
HDSL
IDSL
SDSL
VDSL
5
Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN?
ADSL
ISDN
VPN
WAN
6
The Internet is an example of which type of network?
LAN
SAN
WAN
WLAN
7
Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion?
default gateway
MAC address
physical address
subnet mask
8
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
3280 ft (1000 m)
1640 ft (500 m)
984 ft (300 m)
607 ft (185 m)
328 ft (100 m)
9
Why should network cables always be labeled?
to prevent cable wear
to improve appearance
to reduce network clutter
to save troubleshooting time
10
Which method is recommended in order to avoid problems with counterfeit network equipment?
Buy extra parts in case one fails.
Only install equipment that comes with a user manual.
Purchase equipment only through manufacturer-authorized partners.
Use items of uncertain authenticity only in non-mission critical applications.
11
A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.)
faulty NIC
bad IP address
faulty patch cord
unavailable DHCP server
incorrect protocol configuration
12
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
the laptop battery level
the IP address that is assigned to the laptop
the power level of the wireless antenna
the available wireless networks within range
the distance from the school-owned wireless device
13
Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
Manually assign an IP address.
Configure the NIC for a MAC address.
Attach a cable that has an RJ-45 connector.
Configure the NIC for a specific network protocol.
14
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
The network is small with less than eight users.
The company network requires secure access to confidential information.
The users need a central database to store inventory and sales information.
Each user understands how to safely share files across a network.
The data gathered by the employees is critical and should be backed up on a regular basis.
All employees passed a strict background check as part of the corporate hiring practices.
15
Which two statements are true of network computing in contrast to non-network computing? (Choose two.)
File duplication is more likely.
Fewer peripherals are needed.
Resource conservation is decreased.
Application licensing costs are higher.
Centralized administration capabilities are enhanced.
16
What is true about the TIA/EIA?
It develops and maintains the 802 standards for LANs.
It establishes consensus processes among qualified groups.
It defined the Open Systems Interconnection networking model.
It developed standards to replace proprietary standards after U.S. telephone industry deregulation.
17
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?
a bad network cable
interference from surrounding devices
reduced computer power supply output
static IP addressing with incomplete information
18
Which two characteristics describe Ethernet technology? (Choose two.)
supported by IEEE 802.3 standards
supported by IEEE 802.5 standards
typically uses an average of 16 Mb/s for data transfer rates
uses a bus logical topology
uses a ring topology
19
Which device enables computers to be attached to a network without segmenting the network?
bridge
hub
router
switch
20
Which networking protocol translates a network name such as www.cisco.com to a unique IP address?
APIPA
ARP
DHCP
DNS
Proxy ARP
No comments:
Post a Comment