Information Technology > QUESTIONS & ANSWERS > MTA Networking Fundamentals Certification Practice Exam. All Questions with accurate answers. Rated  (All)

MTA Networking Fundamentals Certification Practice Exam. All Questions with accurate answers. Rated A+.

Document Content and Description Below

MTA Networking Fundamentals Certification Practice Exam What is an example of a Layer 3 device that connects multiple computers and networks? A. Packet B. Repeater C. Switch D. Router - ✔✔R... outer If a router cannot determine the next hop for a packet, the router will: A. Forward the packet to the default route. B. Send the packet back to the packet's source. C. Broadcast the packet. D. Store the packet in the memory buffer. - ✔✔Forward the packet to the default route. You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use? A. STP Cat5e B. UTPCat5e C. Cat3 D. UTPCat6 - ✔✔STP Cat5e One purpose of a perimeter network is to: A. Make resources available to the intranet. B. Link campus area networks (CANs). C. Link local area networks (LANs). D. Make resources available to the Internet. - ✔✔Make resources available to the Internet. The protocol that maps IP addresses to a Media Access Control (MAC) address is: A. Internet Message Access Protocol (IMAP). B. Dynamic Host Configuration Protocol (DHCP). C. Routing Information Protocol (RIP). D. User Datagram Protocol (UDP).E. Address Resolution Protocol (ARP). - ✔✔Address Resolution Protocol (ARP). You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement? A. Cat3 B. CAT5 C. Cat5e D. Cat6 - ✔✔Cat5e You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: ✑ A public facing web server ✑ A Wi-Fi network for customers ✑ A private network for the point of sale terminals ✑ An office PC ✑ A file/print server ✑ A network printer You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (Choose two.) A. Network printer B. Web server C. File server D. Wi-Fi network E. Point of sale terminals - ✔✔Network printer Web server What are three advantages of VLANs? (Choose three.) A. They can logically address packets by using IP. B. They require a router to connect to VLANs on another switch. C. They compartmentalize a network and isolate traffic. D. They are efficient because a single switch can implement only a single VLAN. E. They act as though they are on the same LAN regardless of physical location. - ✔✔They compartmentalize a network and isolate traffic. They require a router to connect to VLANs on another switch. They act as though they are on the same LAN regardless of physical location. Which of the following uses pointer records and A records? A. IDSB. DNS Server C. NAT Server D. IPS - ✔✔DNS Server Which of these addresses is a multicast address? A. 127.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1 - ✔✔224.0.0.1 What is the bit rate for a North American T3 circuit? A. 6.312 Mbit/s B. 44.736 Mbit/s C. 274.176 Mbit/s D. 400.352 Mbit/s - ✔✔44.736 Mbit/s Which of the following is a public IP address? A. 10.156.89.1 B. 68.24.78.221 C. 172.16.152.48 D. 192.168.25.101 - ✔✔68.24.78.221 Which metric does Routing Information Protocol (RIP) use to determine the least costly route? A. Delay B. Host ID C. Hop count D. Interface - ✔✔Hop count What is a similarity between Layer 2 and Layer 3 switches? A. Both provide a high level of security to the network. B. Both use logical addressing to forward transmissions. C. Both forward packets onto the network. D. Both allow the implementation of VLANs. - ✔✔Both allow the implementation of VLANs. What are two characteristics of fiber optic cable? (Choose two.) A. Conducts electricity B. Requires metal conduit C. Supports splicingD. Requires a polish for end connectors - ✔✔Conducts electricity Supports splicing The unit of measurement on a data link layer is _________________ A. Frames B. Bits C. Packets D. Segments - ✔✔Frames _______________ is a unique identifier assigned by the manufacturer to a network adapter. This is written in hexadecimal and is of 6 octets. A. Gateway Address B. IP address C. MAC Address D. None of the above - ✔✔MAC address The 802.3an Ethernet network runs at a speed of ____________ A. 10Mbps B. 100 Mbps C. 10 Gbps D. 1 Gbps - ✔✔10 Gbps The IEEE standard 802.3j is used for ___________________ A. Thin Coaxial B. Fiber Optic C. Thick Coaxial D. Twisted Pair - ✔✔Fiber Optic Switches store the MAC to port translation mapping in a table know as MAC table. It is also known as CAM table. What does CAM stand for? A. Content Addressable Memory B. Control Access Media C. Converged Address Memory D. Control Address Memory - ✔✔Content Addressable Memory After you configure an IP address and subnet mask on a Windows 7 PC, you want to check the configuration and confirm that the IP and subnet is configured, which of the below command is used. A. ifconfig B. tracerouteC. ping D. ipconfig - ✔✔ipconfig Port number 88 is used for which of the below protocols? A. NetBIOS B. Kerberos C. IMAP D. POP3 - ✔✔Kerberos The ___________ command is used to check the connection status to and from your computer. A. netstat -an B. ping -t C. arp -a D. tcpdump - ✔✔netstat -an Ping is used to check network connectivity and it makes use of the _____________ protocol. A. IGMP B. RARP C. Proxy ARP D. ICMP - ✔✔ICMP ________________ is a device that regenerates the signal and every time data is sent via broadcast to other connected devices. A. Hub B. Router C. Firewall D. Switch - ✔✔Hub Which of the below is a standard for Wireless devices? A. IEEE 802.1 q B. IEEE 802.3 C. IEEE 802.11 D. IEEE 802.3ab - ✔✔IEEE 802.11 Which of the below two tools can be used to capture and analyze traffic? A. Wireshark B. Kiwi syslog C. dumpster divingD. tcpdump - ✔✔Wireshark tcpdump Which of these protocols is not a Network Layer Protocol? A. IP B. ICMP C. HTTP D. ARP - ✔✔HTTP ____________________ Layer of the OSI takes care of the compression and encryption. A. Physical B. Session C. Presentation D. Transport - ✔✔Presentation In a twisted pair cable, the wires are in pairs and something of BOGB is referred. What does this BOGB in reference to the cable represent? A. Blue, Orange, Green, Black B. Black, Orange, Green, Brown C. Blue, Orange, Green, Brown D. Brown, Orange, Green, Black - ✔✔Blue, Orange, Green, Brown What is the frame that is smaller than 64 bytes called? A. JUMBO B. RUNT C. TINY D. MICRO - ✔✔RUNT To connect similar devices like, switch to switch, what type of cable is used ? A. Console B. Crossover Cable C. Straight through D. Rolled Cable - ✔✔Crossover Cable Which of the below modes are related to Fiber Optic Cable? (Choose two) A. Single Mode B. Multi Mode C. Fiber ModeD. RJ Mode - ✔✔Single Mode Multi Mode You are required to find the MAC address of you own computer. Which of the below command is used? A. ipconfig /all B. ipconfig -an C. netstat -an D. ipconfig - ✔✔ipconfig /all Which of the below is a 64 bit Wireless Encryption Protocol? A. AES B. TKIP C. WPA 2 D. WEP - ✔✔WEP An IPv6 address is __________ in length A. 32 bit B. 64 byte C. 128 bit D. 128 bytes - ✔✔128 bit Which of the below is a valid Private IP address in the B class? Choose all that Apply A. 172.33.20. 20 B. 172.26.20.20 C. 172. 16.20.20 D. 192.168.0.0 - ✔✔172.26.20.20 172. 16.20.20 The subnet mask 255.255.255.240 can be written in slash notation as _______________ A. /30 B. /26 C. /28 D. /24 - ✔✔/28 Which if the below are loopback addresses. Choose all that apply. A. 128.0.0.1 B. 127.0.0.1 C. 127.31.0.1D. 192.127.0.0 - ✔✔127.0.0.1 127.31.0.1 The three main types of IPv6 addresses are _________________ A. Unicast B. Anycast C. Multicast D. Broadcast - ✔✔Unicast Anycast Multicast The ______________ command in Windows CLI will remove the IP address learnt from DHCP. A. ipconfig /renew B. ipconfig / release C. netstat / release D. ping -a - ✔✔ipconfig / release In IP address v4 the 1st octet in the range of 224-239 indicates which Class IP address? A. A B. C C. E D. D - ✔✔D To install IPv6 on your windows computer you need to _____________ A. LAN connection Properties-> Check IPv6 B. using CLI : enable ipv6 C. From Web Browser Properties D. using CLI: ipv6 enable - ✔✔LAN connection Properties-> Check IPv6 Which of the below command will help remove IP address from CLI? A. ipconfig B. removeIP C. netdom D. netsh - ✔✔netdom Once the DHC server is installed in Windows Server, we activate it and one more step needs to be done. What is that important step? A. Get scope registeredB. Authorized the server C. Get clients registered D. Get DNS IP registered - ✔✔Authorized the server Which of the below is a Link state routing protocol? Choose the best fit A. RIP B. IGRP C. EIGRP D. OSPF - ✔✔OSPF The ________________ protocol is used to encrypt data in L2TP. A. PAP B. MS-CHAP C. IPSec D. DHCP - ✔✔IPSec In some scenarios when you check the IP address of your PC you see an IP of range: 169. 254. 24.24. Where does this IP come from? A. APIPA B. DHCP C. WINS D. NetBIOS - ✔✔APIPA To configure a DHCP server in Windows which of the below is a correct step. A. On Server Manager --> Roles --> Add Roles --> Select DHCP Server and Click Next B. ipconfig /dhcp C. On control Panel --> DHCP Server D. None of the above - ✔✔On Server Manager --> Roles --> Add Roles --> Select DHCP Server and Click Next In the IP Sec the __________ generates encryption and authentication keys. A. SA B. AH C. ARP D. ESP - ✔✔SA _________________ is a feature in Windows that can used when want to make a server act like a router. A. RDP B. IP SecC. DNS D. IP forwarding - ✔✔IP forwarding The below protocol is used to automatically assign or configure an IP address to a client. A. DNS B. ARP C. RIP D. DHCP - ✔✔DHCP Windows used the RDP or Remote desktop service to connect to a remote machine. This Remote Desktop services runs on which port? A. 500 B. 3389 C. 443 D. 289 - ✔✔3389 Which of the below is not a process in the DHCP DORA? A. Discover B. Offer C. Response D. Acknowledge - ✔✔Response Frame Relay and X.25 are a type of ___________________ WAN technology? A. Packet Switching B. Circuit Switching C. Network Switching D. Console switching - ✔✔Packet Switching Which of the below are tunneling protocol used by VPN? (Choose two) A. PPTP B. L2TP C. SFTP D. NNTP - ✔✔PPTP L2TP Frame Relay is associated with FECN / BECN, what does FECN stand for________________ A. Frame Elastic Check Notification B. Forward Explicit Congestion NotificationC. Frame Explict Compression Notification D. Forward Explict Compression Notification - ✔✔Forward Explicit Congestion Notification L2TP uses port ________________ A. 443 B. 500 C. 89 D. 1723 - ✔✔1723 In Windows to configure VPN which options do you need to go to? A. CLI command -> start vpn B. Control Panel --> VPN C. From Administrative Tools --> Routing and Remote Access D. None of the above - ✔✔From Administrative Tools --> Routing and Remote Access The transmission rate of an Optical Carrier OC-24 is _________________ A. 51.84 Mbps B. 1.244 Gbps C. 9.953 Gbps D. 2.488Gbps - ✔✔2.488Gbps The _________________ technology is used to mask and Private IP address from the outside world. We can use this and have multiple computers with Private IP address browse the Internet. A. WINS B. DHCP C. Network Address Translation D. FTP - ✔✔Network Address Translation Basic Rate Interface( BRI) and Primary Rate Interface(PRI) in Digital technology is associated with _______________ A. IPSec B. ISDN C. PSTN D. Frame Relay - ✔✔ISDN _________________ Service in Windows resolves NetBIOS names to IP addresses. A. WINS B. DHCPC. DNS D. ARP - ✔✔WINS PVCs are associated with Frame Relay, what does PVC stand for _________________________ A. Permanent Virtual Circuit B. Permanent Virtual Class C. Preferable Volunteer Circuit D. Passive Virtual Circuit - ✔✔Permanent Virtual Circuit A client has requested a network setup for his home. The network has to be cost effective, and easy to extend and implement. Further more, the client wants his workstations connected by a single cable. Which of the following network topologies should you use? A. A star network topology. B. A bus network topology. C. A mesh network topology. D. A ring network topology. - ✔✔A bus network topology. You have recently designed a home office network for a client that includes a switch. Which of the following are TRUE with regards to network switches? A. It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which is attached. B. It keeps track of the IP addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which it is attached C. It operates at the Physical layer of the OSI model. D. It operates at the Data-Link layer of the OSI model. - ✔✔It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which is attached. It operates at the Data-Link layer of the OSI model. As part of a training exercise, you have been asked to identify the layer that allows applications and a number of user functions access to the network Which of the following options represents your response? A. The document layer. B. The application layer. C. The system layer. D. The Data-link layer. - ✔✔The application layer. You have been tasked with making sure that a clients network includes a server that converts NetBIOS names to IP addresses. Which of the following actions should you take?A. You should consider adding a DHCP server to the clients network B. You should consider adding a DNS server to the clients network C. You should consider adding a Web server to the clients network D. You should consider adding a WINS server to the clients network - ✔✔You should consider adding a WINS server to the clients network A clients network is made up of two network segments, named Subnet A and Subnet B. DHCP clients are located on Subnet A. A DHCP server on Subnet B. You need to make sure that DHCP clients are able to connect to the server. Which of the following actions should you take? A. You should make sure that the RRAS service is configured. B. You should make sure that WEb service is configured. C. You should make sure that the DNS service is configured. D. You should make sure that the DHCP relay agent service is configured. - ✔✔You should make sure that the DHCP relay agent service is configured. You are in the process of designing a FDDI network for a clients enviroment. Which of the following is TRUE with regards to a FDDI network? A. An FDDI network cannot contain rings that are longer than 100 kilometers respectively. B. An FDDI network can contain rings that exceed 100 kilometers respectively. C. Each ring in a FDDI network can support a maximum of 500 nodes. D. Each ring in a FDDI network can support a maximum of 50 nodes. - ✔✔An FDDI network cannot contain rings that are longer than 100 kilometers respectively. You are in the proceed of designing a home network for a client. You have decided to make use of 10BaseT cabling. Which of the following options are TRUE with regards to 10 BaseT cabling?! (Choose two.) A. 10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length. B. 10BaseT cables are made up of twisted pair cables that are a maximum of 10 meters in length. C. 10BaseT cables allows for the system to operate at 10Mbps. D. 10BaseT cables allows for the system to operate at 100 Mbps. - ✔✔10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length. 10BaseT cables allows for the system to operate at 10Mbps. A client has a small office network. The customer would like to create a virtual LAN on their network. Which of the following components should the customer have to proceed? A. The customer should have a switch.B. The cusotmer should have a modem. C. The customer should have a server. D. The customer should have a router. - ✔✔The customer should have a switch. You have executed the NBTSTAT command with the -S parameter from the commandline on your workstation. Which of the following describes the reason for executing this command? A. For the purpose of viewing the names registered locally by NetBIOS applications. B. For the purpose of viewing the current NetBIOS sessions and their status, with the IP address. C. For the purpose of purging the name cache. D. For the purpose of viewing the NetBIOS sessions table converting destination IP addresses to computer NetBIOS names. - ✔✔For the purpose of viewing the current NetBIOS sessions and their status, with the IP address. Users have reported that they are experiencing network connectivity problems. You decide to run the ping -I command from the command-line. Which of the following describes the purpose of using the ping -I command? A. It allows you to specify a Time To Live for outgoing packets. B. It allows you to specify the type of service. C. It allows you to specify the amount of data to include int he ping. D. It allows you to resolve addresses to host names. - ✔✔It allows you to specify the amount of data to include int he ping. A client would like to connect his two home computers, You need to solve the problem without the use of unnecessary hardware. Which of the following actions should you take? A. You should make use of a hub and a UTP crossover cable with RJ-45 connectors. B. You should make use of a hub and a UTP crossover cable with RJ-11 connectors. C. You should make use of a UTP crossover cable with RJ-45 connectors. D. You should make use of a UTP crossover cable with RJ-11 connectors. - ✔✔You should make use of a UTP crossover cable with RJ-45 connectors A client has requested the installation of a T3 internet connection for their offices. Which of the following is TRUE with regards to T3 internet connections? A. T3 internet connections have a minimum transmission rate of 64 Mbps. B. T3 internet connections have a minimum transmission rate of 56 Kbps. C. T3 internet connections have a minimum transmission rate of 10 Mbps. D. T3 internet connections have a minimum transmission rate of 128 Mbps. - ✔✔T3 internet connections have a minimum transmission rate of 10 Mbps.The clients network consists of a single domain named ABC.com. The clients network connects to the internet via an ISDN connection. Which of the following is TRUE with regards to the ISDN connection? A. ISDN operates at a minimum speed of 128 Kbps. B. ISDN operates at a maximum speed of 128 Mbps. C. ISDN operates at a maximum speed of 128 Kbps. D. ISDN operates at a minimum speed of 128 Mbps. - ✔✔ISDN operates at a maximum speed of 128 Kbps. You have been tasked with resolving an Internet name resolution problem. After pinging the DNS server address of the clients ISP, you find that the ISP server is down. You then decide to run the ping-t command from the command line. Which of the following describes the purpose of this command? A. It allows the ping command to keep sending Echo Requests messages to the ISP server until interrupted. B. It performs reverse name resolution on the ISP's DNs server IP address. C. It sends Echo Request messages with the Don't Fragment flag in the IP header set to 1. D. It sends Echo Request messages a specified amount of times. - ✔✔It allows the ping command to keep sending Echo Requests messages to the ISP server until interrupted. You are responsible for running training exercises for trainee administrators. You are currently covering the layers of the Open systems interconnect (OSI) model. You are explaining the Data-link layer. Which of the following best describes the Data-link layer of the OSI model? A. The Data-link layer deals with the transmission and reception of the unstructured raw bit steam over a physical medium. B. The Data-link layer controls the operation of the subnet. C. The Data-link layer deals with error-free transfer of data frames from one node to another over the physical layer. D. The Data-link layer makes sure that messages are conveyed error-free, sequentially, and with no losses or duplications. - ✔✔The Data-link layer deals with error-free transfer of data frames from one node to another over the physical layer. You have been instructed to design a TCP/Ip-based network. you need to configure the use of a suitable name resolution strategy that makes provision for Windows and Unix computer on the network. Which of the following actions should you take? A. You should make use of DNS as the name resolution strategy. B. You should make use of NetBIOS as the name resolution strategy. C. You should make use of DHCP as the name resolution strategy.D. You should make use of Peer Name Resolution Protocol as the name resolution strategy. - ✔✔You should make use of DNS as the name resolution strategy. A client is planning to replace their existing network cabling. They have requested that the replacement cabling meet the following requirements: It must be unaffected by electromagnetic interference. It must be able to transmit data over vast distances. wich of he following actions should you take? A. You should make use of Coaxial cable. B. You should make use of fiber-optic cable. C. You should make use of Shielded Twisted-Pair cable. D. You should make use of Unshielded Twisted-Pair cable. - ✔✔You should make use of fiber-optic cable. A client has configured their network to support both IPv4 and IPv6. You are explaining the differences between IPv4 and IPv6 to a class of the clients trainee technicians. Which of the following statements are TRUE with regards to these differences? (Choose two) A. IPv4 addresses are represented in a dotted-decimal format, while IPv6 addresses are represented in a colon-hexadecimal format. B. IPv4 addresses are represented in a colon-hexadecimal format, while IPv6 addresses are represented in a dotted-decimal format. C. IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability. D. IPv4 addresses make use of the first 32 bits of IPv6 addresses for interoperability. - ✔✔IPv4 addresses are represented in a dotted-decimal format, while IPv6 addresses are represented in a colon-hexadecimal format. IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability. You are designing a network that will have two subnets, named Subnet A and Subnet B, connected to a router. To save cost, ABC.com wants you to make use of an existing router that cannot be configured to support BOOTP. Subnet A will host a DHCP server, while Subnet B will have a DHCP relay agent configured. Which of the following is TRUE with regards to DHCP Relay Agent ? (Choose Two) A. It is used to prevent broadcast traffic across the two subnets. B. It is used to pass broadcast traffic across the two subnets. C. It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, whether it is configured on the VPN server or not. D. It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, if it is configured on the VPN server. - ✔✔It is used to pass broadcast traffic across the two subnets. It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, if it is configured on the VPN server.You are in the process of connecting a 100BASE-SX gigabit Ehternet in a clients office block. Which of the following statements are TRUE with regards to 1000BASE-SX? A. It requires multi-mode fiber optic cable. B. It requires single-mode fiber optic cable. C. It can work over distances in excess of 70 Km. D. The maximum length of a cable segment is 10 Km. - ✔✔It requires multi-mode fiber optic cable. You are in the process of designing a Ring network for a client. Which of the following is an advantage of a Ring network? A. A Ring network manages the connectivity between workstations without the need of a central node. B. When you connect or remove devices on the Ring network, there are no interruptions. C. A Ring network prevents the passing of data packets through an excessive number of nodes. D. The number of nodes in a Ring network has no impact on communication delays. - ✔✔A Ring network manages the connectivity between workstations without the need of a central node. You are in the process of designing a Star network for a client. Which of the following is an advantage of a Star network? A. A star network manages the connectivity between workstations without the need of a central node. B. When you connect or remove devices on the Star network, there are no interruptions. C. A Star network allows the passing of data packets through an excessive number of nodes. D. Failure of the central hub has no impact on a Star network. - ✔✔When you connect or remove devices on the Star network, there are no interruptions. You are explaining the purpose of a dual stack node on the network. Which of the following suitably represents this explanation? A. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the transport layer of the OSI model. B. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the physical layer of the OSI model. C. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the data-link layer of the OSI model. D. It allows an IPv6 asocket to communicate with an IPv4, and IPv6 peer at the session layer of the OSI model. - ✔✔It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the transport layer of the OSI model.You have recently designed a network for a client, using the fully connected mesh topology. Which of the following is TRUE with regards to this kind of topology? A. It's the connectivity between workstations without the need of a central node. B. It does not require the use of switching or broadcasting. C. It prevents the number of data packets through an excessive number of nodes. D. The number of nodes in a fully connected mesh network has no impact on communication delays. - ✔✔It does not require the use of switching or broadcasting. You are responsible for running training exercises for trainee administrators. You are currently covering the layers of the Open Systems Interconnect model. You are explaining the Transport layer. Which of the following best describes the Transport layer of the OSI model? A. The Transport layer deals with the transmission and reception of the unstructured raw bit stream over a physical medium. B. The Transport layer controls the operation of the subnet. C. The Transport layer deals with error-free trasfer of data frames from one node to another over the physical layer. D. The Transport layer makes sure that messages are conveyed error-free, srquentially, and with no losses or duplications. - ✔✔The Transport layer makes sure that messages are conveyed error-free, srquentially, and with no losses or duplications. A client has requested the configuration of a new internet connection. The client would like her connection to support high-definiation television, as well as voice over IP and general Internet access, over a single connection. Which of the following options should you use? A. ADSL B. IDSL C. HDSL D. VDSL - ✔✔VDSL You are in the process of expanding a clients current LAN setup. You have been instructed to make sure that the cable used is fire safe, and that it emits less toxic fumes. Which of the following options should you use? (Choose two) A. PVC cable. B. Plenum rated cable. C. Fiber-optic cable. D. Carpet Cable. - ✔✔Plenum rated cable. Fiber-optic cable. What is the most common central device used today to connect computers to a network?A. hub B. switch C. SOHO router D. VPN router - ✔✔Switch What is the most common adapter or connector used to connect a computer to a wired network? A. RG6 B. RG58 C. RJ45 D. RJ8 - ✔✔RJ45 Which of the following does a switch use for increased performance? A. simplex B. half duplex C. full duplex D. sliding duplex - ✔✔full duplex What do you use to isolate a group of computers within your organization? A. WLAN B. WAN C. VLAN D. Internet - ✔✔VLAN What do you use to create VLANs? A. router B. switch C. firewall D. proxy server - ✔✔Switch What zone is used to publish external websites for an organization? A. intranet B. exanet C. internetwork D. DMZ - ✔✔DMZ Which topology is the most redundant and the most expensive? A. star B. ringC. mesh D. bus - ✔✔Mesh What standard describes CSMA/CD? A. 801.2 B. 802.3 C. 802.5 D. 802.11 - ✔✔802.3 What mechanism do wireless networks use to access the network? A. CSMA/CD B. CSMA/CA C. token passing D. polling - ✔✔CSMA/CA What model promises the most processing power? A. centralized computing B. distributive computing C. switching computing D. dumb computing - ✔✔Distributive computing Which model users a central database for authentication? A. peer-to-peer B. workgroup C. client/server D. distributive - ✔✔Client/Server What type of server does Active Directory run on? A. file server B. print server C. database server D. network controller - ✔✔network controller Which model has each host have their own security database? A. peer-to-peer B. client/server C. distributive D. sliding - ✔✔peer-to-peerWhat type of communication is sent to a single designated host? A. unicast B. broadcast C. multicast D. anycast - ✔✔unicast What is used to uniquely identify a host on a TCP/IP network? A. IP address B. MAC address C. bit pattern D. router name - ✔✔IP address A _________ is a single computer or device that connects to a TCP/IP network. A. Host B. Node C. Access Point D. Laptop - ✔✔Host (It can also be Node) What is the central device used in wireless LANs? A. Wireless Access Point B. CSA/CDM Connector C. Wireless Switch D. MDU - ✔✔Wireless Access Point What command do you use to test the TCP/IP stack on a computer? (Select three) A. Ping localhost B. Ping 127.0.0.1 C. Ping loopback D. ipconfig /renew - ✔✔Ping localhost Ping 127.0.0.1 Ping loopback You need to divide a network into three subnets. Which Device should you use? A. Router B. Hub C. Segmenter D. Bridge - ✔✔Router Connecting to a private Network address from a public network requires:A. Dynamic Host Configuration Protocol (DHCP). B. Network Access Protection (NAP). C. Dynamic domain name system (DDNS). D. Network address translation (NAT). - ✔✔NAT What model is used to describe how data communication occurs between hosts? A. server-centric model B. workgroup model C. peer-to-peer model D. OSI reference model - ✔✔OSI reference model Which layer in the OSI model do MAC addresses and switches use? A. Physical B. Data Link C. Network D. Transport - ✔✔Data Link Which layer in the OSI model covers routing between networks? A. Physical B. Data Link C. Network D. Transport - ✔✔Network Which layer in the OSI model is used to verify that data was delivered without error? A. Physical B. Data Link C. Network D. Transport - ✔✔Network Which layer in the OSI model covers HTTP, FTP, and RDC? A. Physical B. Session C. Application D. Presentation - ✔✔Application Which layer of the OSI model includes VLANs? A. Physical B. Data Link C. NetworkD. Transport - ✔✔Data-Link Which protocol do you use as the transport protocol for a video application? A. TCP B. UDP C. FTP D. RDC - ✔✔UDP Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS? A. well-known ports B. registered ports C. dynamic ports D. private ports - ✔✔Well-known ports What layer in the OSI model is responsible for logging on and off? A. Physical B. Session C. Application D. Presentation - ✔✔Session What layer in the OSI model is used to encrypt data? A. Physical B. Session C. Application D. Presentation - ✔✔Presentation Which layer in the OSI model includes the cable and network adapters? A. Physical B. Session C. Application D. Presentation - ✔✔Physical How many layers does the TCP/IP model have? A. 3 B. 4 C. 6 D. 7 - ✔✔4 Which layer in the OSI model is included in the TCP/IP model?A. Physical B. Data Link C. Transport D. Application - ✔✔Transport Which protocol is used to translate IP addresses to MAC addresses? A. RARP B. ARP C. DNS D. WINS - ✔✔ARP What ports are defined above 49,152? A. well-known ports B. registered ports C. dynamic ports D. sliding ports - ✔✔dynamic ports A layer 3 switch is similar to a __________. A. Router B. Repeater C. Hub D. Patch Panel - ✔✔Router TCP/IP and IPX/SPX are known as _________ stacks. A. Protocols B. Services C. Layers D. Lenses - ✔✔Protocols What is the advantage of UDP over TCP? A. Less Overhead - Faster Performance B. Older - Larger pool of compatible hardware C. TCP is not IPv6 compatible UDP is D. UDP can operate at Layer 1 - ✔✔Less Overhead - Faster Performance What are the seven layers found in the OSI model, in order? A. Physical - Data Link - Network - Transport - Session - Presentation - Application B. Physical - Data Link - Network - Transport - Session - Application - Presentation C. Physical - Data Link - Transport - Network - Session - Application - PresentationD. Physical - Data Link - Transport - Session - Network - Presentation - Application - ✔✔Physical - Data Link - Network - Transport - Session - Presentation - Application What is the maximum speed supported by 802.11b? A. 1 Mbps B. 10 Mbps C. 11 Mbps D. 54 Mbps - ✔✔11 Mbps One reason to incorporate VLANs in a network is to: A. Reduce the number of broadcast domains. B. Increase the number of available Media Access Control (MAC) addresses. C. Increase the number of available IP addresses. D. Reduce the number of nodes in a broadcast domain. - ✔✔Reduce the number of nodes in a broadcast domain. What is the minimum cabling requirement for a 100BaseTx network? A. Category 3 UTP cable B. Category 5 UTP cable C. Category 6 UTP cable D. Multimode fiber cable - ✔✔Category 5 UTP cable A router's static route is set by the: A. Next upstream router. B. Routing protocol. C. Adjacent network. D. Network administrator. - ✔✔Network administrator. What type of record does DNS use to find a mail service? A. Host (A) DNS record B. Canonical (CNAME) DNS record C. Service (SRV) DNS record D. Mail Exchanger (MX) DNS record - ✔✔Mail Exchanger (MX) DNS record How many bits are there in an Internet Protocol version 6 (IPv6) address? A. 32 B. 64 C. 128 D. 256 - ✔✔128In which OSI layer does routing occur? A. Physical B. Network C. Data Link D. Transport - ✔✔Network The query protocol used to locate resources on a network is: A. Tracert B. Telnet. C. Lightweight Directory Access Protocol (LDAP). D. User Datagram Protocol (UDP). - ✔✔Lightweight Directory Access Protocol (LDAP). What is the most common cable used today? A. UTP B. STP C. Coaxial D. Fiber - ✔✔UTP If you are making a crossover cable and one end is 568A, what should the other end be? A. 568A B. 568B C. 568C D. BOGB - ✔✔568B If you want to connect a computer directly to another computer without using a switch, you use a __________. A. straight-through cable B. crossover cable C. laplink cable D. rollover cable - ✔✔crossover cable You need to connect a twisted-pair cable to the back of a patch panel. What tool should you use? A. punch-down tool B. zip tool C. wire wedge D. soldering iron - ✔✔punch-down toolWhat is the minimum category of twisted-pair cable you need to support 100 Mbps? A. Category 3 B. Category 5 C. Category 5e D. Category 6 - ✔✔Category 5 When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem? A. EMI B. RFI C. network adapter failure D. cable failure - ✔✔RFI You are setting up a network within a warehouse using Category 6 UTP. However, parts of the network are down because of the heavy machinery used. What cable type should you use? A. STP B. coaxial C. fiber D. plenum-rated - ✔✔Fiber What do you call it when electrical signals jump to another set of wires? A. EMI B. RFI C. crosstalk D. jump it is - ✔✔crosstalk What type of cable should be used as part of a fire code for a building? A. STP B. PVC C. heat protected D. plenum-rated - ✔✔plenum-rated Which of the following is not a fiber connector? A. FC B. LC C. RJ-45 D. MT-RJ - ✔✔RJ-45Which of the following is a characteristic of single-mode fiber? A. Single-mode fiber supports longer distances than multimode fiber. B. Single-mode fiber has increased bandwidth than multimode fiber. C. Single-mode supports only a ring topology. D. Single mode allows multiplexing of electrical and light signals - ✔✔Single-mode fiber supports longer distances than multimode fiber. Which protocol can be used to encrypt packets on the Internet? A. HTTP B. SNMP C. HTTPS D. TFTP - ✔✔HTTPS What is the maximum speed supported by 802.11g? A. 1 Mbps B. 10 Mbps C. 11 Mbps D. 54 Mbps - ✔✔54 Mbps What of the following is not a characteristic of 802.11n? A. frame aggregation B. channel bonding C. RFI protection D. MIMO - ✔✔RFI protection Which is the most secure encryption used in wireless networks? A. WEP B. WPA C. WPA2 D. 802.1x - ✔✔WPA2 What is used to identify a wireless network? A. network ID B. frequency identifier C. wireless password D. SSID - ✔✔SSID To test a cable, you would use a _____________. A. Continuity testerB. Patch Tester C. Loopback Plug D. Tone & Probe - ✔✔Continuity tester For organizations, using ___________ authentication for wireless networks is recommended. A. 802.1d B. 802.1x C. 802.11g D. 802.11x - ✔✔802.1x When a signal degrades as it runs through a wire, you have ________. A. Degradation B. Attenuation C. Cross Over D. Resistance - ✔✔Degradation What mode users a wireless access point? A. Infrastructure Mode B. Ad Hop Mode C. Bridge Mode D. Forward Tunneling Mode - ✔✔Infrastructure Mode What command do you use to connect to a FTP server to download a file? A. nslookup B. ssh C. telnet D. ftp - ✔✔ftp What is the default subnet mask for a Class B network? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255 - ✔✔255.255.0.0 You have a host with the address of 180.24.45.120. To what class would this be address be assigned? A. Class A B. Class B C. Class CD. Class D - ✔✔Class B For IPv4, what class is used for multicasting? A. Class A B. Class B C. Class C D. Class D - ✔✔Class D What is the maximum number of hosts you can use for each subnet that belongs to a class C address? A. 128 B. 254 C. 256 D. 65,534 - ✔✔254 What type of address is 202.23.2.255? A. multicast address B. broadcast address C. unicast address D. anycast address - ✔✔broadcast address What type of address is used to send a singl [Show More]

Last updated: 2 years ago

Preview 1 out of 105 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

163
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 10, 2022

Number of pages

105

Written in

Seller


seller-icon
bundleHub Solution guider

Member since 3 years

353 Documents Sold

Reviews Received
27
21
9
0
9
Additional information

This document has been written for:

Uploaded

Sep 10, 2022

Downloads

 0

Views

 163

Document Keyword Tags

More From bundleHub Solution guider

View all bundleHub Solution guider's documents »

$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·