Network and Computer Basics
1. Advantages of Buying a Personal Computer
What are two advantages of buying a personal computer? (Choose two.)
- The user can specify higher performance components.
- Supports higher-level graphics and gaming applications.
2. Data Transfer Speed
What measure is commonly used to describe the communication speed when transferring data?
bps
3. Wireless DHCP Client Troubleshooting
A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, you do not see an IP address, subnet mask, and default gateway. What are two of the first items to be verified? (Choose two.)
- SSID
- If the wireless client is configured to DHCP
4. Network Layer Design for End User Connection
What network layer design provides a connection point for end-user devices to the network?
Access
5. Client-ISP Contract for Uptime and Service Response
What is the name of the contract between a client and an ISP that specifies requirements for uptime and service response time?
SLA
6. DNS Server Role
What is the DNS server role?
Translates a computer name or domain to the corresponding IP address.
7. Private IP Addresses
What addresses belong to the category of private IP addresses? (Choose three.)
- 10.0.0.1
- 172.16.0.1
- 192.168.31.19
8. Purpose of a Router
What is the purpose of a router?
Select the best way to reach remote networks.
9. TCP/IP Encapsulation Steps
What is the correct sequence of steps in the encapsulation of TCP/IP data to move from a source host to a destination host?
A. Converts data into bits for transmission
B. Packages the data for end-to-end transport
C. Adds the header and trailer data link
D. Adds the IP address of the network packet header
B, D, C, A
10. Binary Representation of Confidential Data
A network engineer wants to represent confidential data in binary format. What are the possible values you can use? (Choose two.)
- 0
- 1
11. WEP Encryption
The security mode WEP encrypts network traffic for transmission between the AP and wireless client.
12. Interacting with an Operating System
A new student wants to interact with a computer operating system. What methods can be used to do this? (Choose two.)
- CLI
- GUI
13. Purpose of ipconfig Command
What is the purpose of the ipconfig command?
Show current IP settings to the client.
14. Application and Internetwork Layer Protocols for File Loading
See the picture. After establishing connectivity, an Internet user needs to load a text file. You need a protocol at the application layer and another in the internetwork layer using the TCP/IP. What protocols are used in these two layers for the load? (Choose two.)
- FTP
- TCP
15. Information Provided by DHCP Server
What types of information are provided to a DHCP client from a DHCP server? (Choose three.)
- Default Gateway
- DNS server IP addresses
- Subnet Mask
16. Operating System Installation Option for Damaged Systems
Which installation option should be chosen when the operating system is too damaged to function properly?
Clean install
17. Host Bits in an IP Address
What specifies the host bits in an IP address?
The identity of the computer on the network.
18. Crossover Cable Requirement
What connection requires a crossover cable for devices that do not have auto-detect?
Hub port to router port
19. WLAN Network Coverage Area
What name is given to the area covered by an appropriate network in a WLAN?
Basic Service Set (BSS)
20. Wiring Fault Identification
See the picture. What wiring fault represents the image?
Short
21. Statements about Local Applications
Which statements are true about local applications? (Choose two.)
- They are stored on the local hard disk.
- They run on the computer they are installed on.
22. Definition of a Service Pack
What is a service pack?
A collection of patches and updates released by a vendor.
23. Wireless Authentication with Backend Server
Which wireless authentication method allows the use of a backend authentication server?
EAP
24. How ISPs Obtain Public IP Addresses
How do ISPs get public IP addresses?
They are obtained through the registration of Internet addresses.
25. When to Use a Dial-up Connection
When do you use a dial-up connection to connect to an ISP?
When using a regular phone line.
26. Network Devices in the Distribution Layer
Which statement accurately describes what network devices do in the distribution layer of the three-layer design model?
They interconnect local network segments.
27. IP Settings for Network Identification
What components of the IP settings does a computer use to identify its network? (Choose two.)
- IP Address
- Subnet Mask
28. Causes of Physical Layer Network Problems
Identify two causes for physical layer network problems. (Choose two.)
- Cable ends terminated incorrectly
- Cables plugged into the wrong ports
29. Packet Forwarding by a Router
What part of the packet does a router use to forward the packet to the destination?
The destination IP address
30. Examples of Output Peripheral Devices
What are examples of output peripheral devices? (Choose two.)
- Headphones
- Printer
31. Advantage of a Commercially Licensed Operating System
What is the advantage of selecting an operating system that has a commercial license instead of a general public license?
The commercially licensed operating system provides structured support.
32. Connecting Systems with Private IP Addresses to the Internet
See the picture. An educational institution needs to connect computer systems that use private IP addresses to the Internet. They have multiple systems that need access to the Internet but could only buy one public IP address. What should be activated on the integrated Linksys router to accomplish this?
NAT
33. Computer Type Likely to Use a Docking Station
What kind of computer is more likely to use a docking station?
Laptop
34. Transport Layer Protocols for Message Transfer
What protocols of the transport layer are used to transfer messages between hosts? (Choose two.)
- TCP
- UDP
35. Meaning of Crosstalk
What is the meaning of crosstalk?
Signal interference between pairs of cables.
36. Purpose of Assigning a Network Name
See the picture. What is the purpose of assigning a network name of “college”?
Identifies the wireless LAN.
37. Wireless Technology for Multiple Devices with Low Speed and Short Range
What wireless technology has the ability to communicate with many devices at the same time, using a 2.4-GHz band, and communication is limited to low speed and short range?
Bluetooth
38. Stateful Packet Inspection
Which statement describes the filtering of traffic through the use of stateful packet inspection?
Allows incoming packets that are legitimate answers to requests from internal hosts.
39. Importance of Pushing Wires to the End of UTP Connector
Why is it important to push the wires all the way to the end of the connector at the end of a UTP cable?
To minimize crosstalk.
40. Link Status LED on a Router
The link status LED on the front of the router indicates the status of the connection.
41. Connecting Routers with a Crossover Cable
How do you connect two routers with a crossover cable?
Pins connecting the transmitters of one router connect to the receiver pins of the other router.
42. Type of Domain with Broadcast Frames
All hosts within a domain receive the same frame that originates from one of the devices. The domain also connects through routers. What kind of domain is it?
Broadcast
43. Troubleshooting Method After Checking Physical Connectivity
A user cannot send emails. While performing troubleshooting, the network technician first checks the physical connectivity of the wires. What troubleshooting method is next?
Ascending
44. Providing Internet Access for a Large Company
A network technician is asked to provide Internet access for a large company. What is needed to accomplish this?
ISP
45. Wireless Connection Status
The wireless connection is functional.
46. Electromagnetic Spectrum for PDA-Computer Data Exchange
What part of the electromagnetic spectrum is commonly used to exchange data between a personal digital assistant (PDA) and a computer?
Infrared
47. Determining Host ID Bits in an IP Address
What component decides the number of bits used to represent the host ID in an IP address?
Subnet Mask
48. Default Subnet Mask for an IP Address
What is the default subnet mask for an IP address of 198.133.219.4?
255.255.255.0
49. Unicast Communication
Unicast communication involves sending data from one source to a single destination.
50. Type of Security Policy for Password Changes
See the picture. The security policy of an organization requires that users change their passwords every week. What kind of security policy is that?
Password policy