Network and Computer Basics

1. Advantages of Buying a Personal Computer

What are two advantages of buying a personal computer? (Choose two.)

  • The user can specify higher performance components.
  • Supports higher-level graphics and gaming applications.

2. Data Transfer Speed

What measure is commonly used to describe the communication speed when transferring data?

bps

3. Wireless DHCP Client Troubleshooting

A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, you do not see an IP address, subnet mask, and default gateway. What are two of the first items to be verified? (Choose two.)

  • SSID
  • If the wireless client is configured to DHCP

4. Network Layer Design for End User Connection

What network layer design provides a connection point for end-user devices to the network?

Access

5. Client-ISP Contract for Uptime and Service Response

What is the name of the contract between a client and an ISP that specifies requirements for uptime and service response time?

SLA

6. DNS Server Role

What is the DNS server role?

Translates a computer name or domain to the corresponding IP address.

7. Private IP Addresses

What addresses belong to the category of private IP addresses? (Choose three.)

  • 10.0.0.1
  • 172.16.0.1
  • 192.168.31.19

8. Purpose of a Router

What is the purpose of a router?

Select the best way to reach remote networks.

9. TCP/IP Encapsulation Steps

What is the correct sequence of steps in the encapsulation of TCP/IP data to move from a source host to a destination host?

A. Converts data into bits for transmission
B. Packages the data for end-to-end transport
C. Adds the header and trailer data link
D. Adds the IP address of the network packet header

B, D, C, A

10. Binary Representation of Confidential Data

A network engineer wants to represent confidential data in binary format. What are the possible values you can use? (Choose two.)

  • 0
  • 1

11. WEP Encryption

The security mode WEP encrypts network traffic for transmission between the AP and wireless client.

12. Interacting with an Operating System

A new student wants to interact with a computer operating system. What methods can be used to do this? (Choose two.)

  • CLI
  • GUI

13. Purpose of ipconfig Command

What is the purpose of the ipconfig command?

Show current IP settings to the client.

14. Application and Internetwork Layer Protocols for File Loading

See the picture. After establishing connectivity, an Internet user needs to load a text file. You need a protocol at the application layer and another in the internetwork layer using the TCP/IP. What protocols are used in these two layers for the load? (Choose two.)

  • FTP
  • TCP

15. Information Provided by DHCP Server

What types of information are provided to a DHCP client from a DHCP server? (Choose three.)

  • Default Gateway
  • DNS server IP addresses
  • Subnet Mask

16. Operating System Installation Option for Damaged Systems

Which installation option should be chosen when the operating system is too damaged to function properly?

Clean install

17. Host Bits in an IP Address

What specifies the host bits in an IP address?

The identity of the computer on the network.

18. Crossover Cable Requirement

What connection requires a crossover cable for devices that do not have auto-detect?

Hub port to router port

19. WLAN Network Coverage Area

What name is given to the area covered by an appropriate network in a WLAN?

Basic Service Set (BSS)

20. Wiring Fault Identification

See the picture. What wiring fault represents the image?

Short

21. Statements about Local Applications

Which statements are true about local applications? (Choose two.)

  • They are stored on the local hard disk.
  • They run on the computer they are installed on.

22. Definition of a Service Pack

What is a service pack?

A collection of patches and updates released by a vendor.

23. Wireless Authentication with Backend Server

Which wireless authentication method allows the use of a backend authentication server?

EAP

24. How ISPs Obtain Public IP Addresses

How do ISPs get public IP addresses?

They are obtained through the registration of Internet addresses.

25. When to Use a Dial-up Connection

When do you use a dial-up connection to connect to an ISP?

When using a regular phone line.

26. Network Devices in the Distribution Layer

Which statement accurately describes what network devices do in the distribution layer of the three-layer design model?

They interconnect local network segments.

27. IP Settings for Network Identification

What components of the IP settings does a computer use to identify its network? (Choose two.)

  • IP Address
  • Subnet Mask

28. Causes of Physical Layer Network Problems

Identify two causes for physical layer network problems. (Choose two.)

  • Cable ends terminated incorrectly
  • Cables plugged into the wrong ports

29. Packet Forwarding by a Router

What part of the packet does a router use to forward the packet to the destination?

The destination IP address

30. Examples of Output Peripheral Devices

What are examples of output peripheral devices? (Choose two.)

  • Headphones
  • Printer

31. Advantage of a Commercially Licensed Operating System

What is the advantage of selecting an operating system that has a commercial license instead of a general public license?

The commercially licensed operating system provides structured support.

32. Connecting Systems with Private IP Addresses to the Internet

See the picture. An educational institution needs to connect computer systems that use private IP addresses to the Internet. They have multiple systems that need access to the Internet but could only buy one public IP address. What should be activated on the integrated Linksys router to accomplish this?

NAT

33. Computer Type Likely to Use a Docking Station

What kind of computer is more likely to use a docking station?

Laptop

34. Transport Layer Protocols for Message Transfer

What protocols of the transport layer are used to transfer messages between hosts? (Choose two.)

  • TCP
  • UDP

35. Meaning of Crosstalk

What is the meaning of crosstalk?

Signal interference between pairs of cables.

36. Purpose of Assigning a Network Name

See the picture. What is the purpose of assigning a network name of “college”?

Identifies the wireless LAN.

37. Wireless Technology for Multiple Devices with Low Speed and Short Range

What wireless technology has the ability to communicate with many devices at the same time, using a 2.4-GHz band, and communication is limited to low speed and short range?

Bluetooth

38. Stateful Packet Inspection

Which statement describes the filtering of traffic through the use of stateful packet inspection?

Allows incoming packets that are legitimate answers to requests from internal hosts.

39. Importance of Pushing Wires to the End of UTP Connector

Why is it important to push the wires all the way to the end of the connector at the end of a UTP cable?

To minimize crosstalk.

40. Link Status LED on a Router

The link status LED on the front of the router indicates the status of the connection.

41. Connecting Routers with a Crossover Cable

How do you connect two routers with a crossover cable?

Pins connecting the transmitters of one router connect to the receiver pins of the other router.

42. Type of Domain with Broadcast Frames

All hosts within a domain receive the same frame that originates from one of the devices. The domain also connects through routers. What kind of domain is it?

Broadcast

43. Troubleshooting Method After Checking Physical Connectivity

A user cannot send emails. While performing troubleshooting, the network technician first checks the physical connectivity of the wires. What troubleshooting method is next?

Ascending

44. Providing Internet Access for a Large Company

A network technician is asked to provide Internet access for a large company. What is needed to accomplish this?

ISP

45. Wireless Connection Status

The wireless connection is functional.

46. Electromagnetic Spectrum for PDA-Computer Data Exchange

What part of the electromagnetic spectrum is commonly used to exchange data between a personal digital assistant (PDA) and a computer?

Infrared

47. Determining Host ID Bits in an IP Address

What component decides the number of bits used to represent the host ID in an IP address?

Subnet Mask

48. Default Subnet Mask for an IP Address

What is the default subnet mask for an IP address of 198.133.219.4?

255.255.255.0

49. Unicast Communication

Unicast communication involves sending data from one source to a single destination.

50. Type of Security Policy for Password Changes

See the picture. The security policy of an organization requires that users change their passwords every week. What kind of security policy is that?

Password policy