Thursday, March 15, 2012

my study notes




use at your own risk....  double check answers....

·         Question 1

What is a PDU?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
It is the name given to the unit of information used by each layer.
·         Question 2

Which of the following is not a true statement regarding the function of a switch?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
It determines the path used based on the destination IP address.
·         Question 3

Which of the following is not a function that would be found in a managed switch?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
the ability to stop switching loops using STP
·         Question 4

Which layer is responsible for the encoding of signals?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
3
·         Question 5

The Transport layer deals with which unit of information?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
segment
·         Question 6

In wireless networks, what type of media access control is used?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
CSMA/CD
·         Question 7

The Physical layer has been divided into two sublayers, called the LLC sublayer and the MAC sublayer.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 8

Which of the following is not an Application layer protocol?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
DHCP
·         Question 9

What command would you issue from a command prompt to see a listing of the computers in your workgroup?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
net view
·         Question 10

What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
backbone cabling
·         Question 11

What component of the computer provides it with a MAC address?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
BIOS
·         Question 12

What type of routing protocol are RIP and RIPv2?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
link-state protocol
·         Question 13

What is the maximum cable length for both category 5e and category 6 UTP cable?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
100 m
·         Question 14

What is the best way to eliminate the possibility of collisions in a network?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
Both a and c
·         Question 15

Each interface on a router must have an IP address and what else to be able to communicate on the network?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
MAC address
·         Question 16

How can you find out what your MAC address is? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
Open a command prompt and type the command ipconfig /all.

 
·         Question 17

Match each item with a statement below:
Answer
Question
Selected Match
device that uses MAC addresses to determine the destination of frame
Description: https://ctc.blackboard.com/images/spacer.gif b.  
router
device that connects LANs
Description: https://ctc.blackboard.com/images/spacer.gif f.  
dedicated bandwidth
device that connects a computer with the network medium
Description: https://ctc.blackboard.com/images/spacer.gif e.  
repeater
device that only regenerates incoming signals
Description: https://ctc.blackboard.com/images/spacer.gif g.  
bandwidth sharing
communication in which a device can send and receive signals but not at the same time
Description: https://ctc.blackboard.com/images/spacer.gif i.  
network bandwidth
device that connects wireless computers
Description: https://ctc.blackboard.com/images/spacer.gif a.  
hub
device that connects multiple computers but regenerates signals out all ports
Description: https://ctc.blackboard.com/images/spacer.gif c.  
half-duplex mode
amount of data that can be transferred on a network
Description: https://ctc.blackboard.com/images/spacer.gif h.  
access point
how devices connected to a hub use network bandwidth
Description: https://ctc.blackboard.com/images/spacer.gif j.  
network interface card
how devices connected to a switch use network bandwidth
Description: https://ctc.blackboard.com/images/spacer.gif d.  
switch
·         Question 18

When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
router
·         Question 19

Which of the following is a feature of TCP? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
segments data into chunks

 
·         Question 20

Because fiber-optic cabling uses light pulses instead of electrical signals, it is immune to interference and highly resistant to eavesdropping.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 21

When an access control list is applied on a router’s interface, that interface is performing a specific function on the packets that it receives. What is that function called?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
packet forwarding
·         Question 22

Which of the following is NOT a function of a hub?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
cleans up the signal
·         Question 23

Which of the following is NOT a characteristic of Unshielded Twisted Pair cabling?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
comes in numbered categories
·         Question 24

The maximum transmission unit for Ethernet is 1518 bytes.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 25

What type of wiring should be used for a high-speed connection between two buildings?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
fiber-optic cabling
·         Question 26

Which of the following are solutions to the shortage of available IPv4 addresses? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
subnetting

Description: https://ctc.blackboard.com/images/spacer.gif e.  
IPv6

 
·         Question 27

Which of the following is not a form of electromagnetic interference, or EMI?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
rain/fog
·         Question 28

When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
encapsulation
·         Question 29

Which of the following are examples of input devices? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
mouse

Description: https://ctc.blackboard.com/images/spacer.gif c.  
DVD

Description: https://ctc.blackboard.com/images/spacer.gif d.  
scanner

 
·         Question 30

What command issued from a command prompt will display the routing table in Windows?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
route config
·         Question 31

What is the IEEE standard governing wireless networking?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
802.11
·         Question 32

An IP address is composed of 48 bits that are grouped together into 8-bit octets and are represented by a decimal number from 0 to 255.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 33

Windows 7, Windows Vista, and Windows XP are all examples of which of the following?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
server operating systems
·         Question 34

At which layer would you find errors that were caused by EMI?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Physical
·         Question 35

Which is the strongest form of wireless security?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
WPA2
·         Question 36

In what layer does the NIC operate?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
Internetwork
·         Question 37

You are the network administrator for a company and you want to separate the traffic from the accounting department from the rest of the network. However, the accounting department still needs to have access to other network resources. What type of network do you need to implement?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
internetwork
·         Question 38

Which component, located on the motherboard, carries out all the instructions provided by computer programs?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
NIC
·         Question 39

What is the main disadvantage of cable modem networking?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
It uses an asymmetrical communication scheme.
·         Question 40

Put the layers of the OSI model in order from layer 7 to layer 1.

a.      Presentation
b.      Network
c.      Physical
d.      Data Link
e.      Transport
f.      Application
g.      Session
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
f., a., g., e., b., d., c.
·         Question 41

Answer
Question
Selected Match
frame is sent to the destination port immediately after reading the destination and source MAC address
Description: https://ctc.blackboard.com/images/spacer.gif g.  
link-state protocol
configured to carry VLAN traffic
Description: https://ctc.blackboard.com/images/spacer.gif c.  
store-and-forward switching
designed to stop switching loops
Description: https://ctc.blackboard.com/images/spacer.gif b.  
fragment-free switching
sends status to all routers whenever there is a change
Description: https://ctc.blackboard.com/images/spacer.gif e.  
trunk port
sends entire routing table to all routers at a scheduled time
Description: https://ctc.blackboard.com/images/spacer.gif d.  
distance-vector protocol
uses hop count to determine best path
Description: https://ctc.blackboard.com/images/spacer.gif f.  
metric
damaged frames do not get forwarded
Description: https://ctc.blackboard.com/images/spacer.gif i.  
cut-through switching
entire frame is read before forwarding it to the destination port
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Routing Information Protocol
broadcast frames are forwarded in a continual loop
Description: https://ctc.blackboard.com/images/spacer.gif h.  
Spanning Tree Protocol
value that tells routers the best path to the destination network
Description: https://ctc.blackboard.com/images/spacer.gif g.  
link-state protocol
·         Question 42

One of the problems that can occur in the Network layer is the incorrect configuration of a hosts IP address.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 43

IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 44

You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
PCI-Express
·         Question 45

Which of the following categories of UTP cabling are considered to be data grade as specified by ANSI/TIA/EIA? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Category 6

Description: https://ctc.blackboard.com/images/spacer.gif d.  
Category 4

Description: https://ctc.blackboard.com/images/spacer.gif e.  
Category 5

 
·         Question 46

You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
PAT
·         Question 47

Each component of a computer is designed to perform only one specific task—either input, processing, or output.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 48

Which part of a computer’s IP address configuration indicates the portion of the address that specifies the network ID?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
subnet mask
·         Question 49

What is the purpose of the default route?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
None of the above
·         Question 50

What does a switch store in its switching table?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
the destination MAC address of a frame and the port it was received on
·         Question 51

A collision can occur on a switch only if the switch is operating in full-duplex mode.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 52

How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the host ID is 64 bits?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
16
·         Question 53

Match each item with a statement below:
Answer
Question
Selected Match
sends a digital signal using the entire bandwidth
Description: https://ctc.blackboard.com/images/spacer.gif e.  
media access control
how the cables connect one device to another
Description: https://ctc.blackboard.com/images/spacer.gif b.  
point-to-point topology
can occur when two devices on the same medium transmit simultaneously
Description: https://ctc.blackboard.com/images/spacer.gif i.  
collision
connects every device to every other device
Description: https://ctc.blackboard.com/images/spacer.gif h.  
mesh topology
how the data travels from one device to another
Description: https://ctc.blackboard.com/images/spacer.gif a.  
broadband
uses an analog signal to send multiple signals simultaneously
Description: https://ctc.blackboard.com/images/spacer.gif f.  
baseband
access method used by Wi-Fi
Description: https://ctc.blackboard.com/images/spacer.gif a.  
broadband
direct connection between two devices
Description: https://ctc.blackboard.com/images/spacer.gif j.  
physical topology
devices on the network must listen first before they can transmit
Description: https://ctc.blackboard.com/images/spacer.gif g.  
CSMA/CA
rules governing how media is transmitted and received
Description: https://ctc.blackboard.com/images/spacer.gif d.  
CSMA/CD
·         Question 54

The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
demarcation point
·         Question 55

DNS is a protocol that automatically provides a computer with its IP address configuration.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 56

What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
decentralized data access
·         Question 57

Communications through a router are noticeably faster than communications through a switch.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 58

Access control lists can be configured based on which of the following? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
protocol

Description: https://ctc.blackboard.com/images/spacer.gif c.  
destination MAC address

Description: https://ctc.blackboard.com/images/spacer.gif d.  
source MAC address

 
·         Question 59

A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once.
1—backbone cabling
2—entrance facility
3—equipment room
4—horizontal wiring
5—telecommunications closet
6—work area
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
2, 1, 3, 4, 5, 4, 6
·         Question 60

Which of the following is not one of the main differences between the types of network cabling?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
the distance that a signal can travel
·         Question 61

There are two basic categories of physical cabling used in Ethernet networks. They are copper wire and fiber optic.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 62

What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
wardriver
·         Question 63

Which layer of the OSI model is responsible for encryption and decryption?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Presentation
·         Question 64

You cannot connect a hub to another hub unless it has an uplink port.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 65

Which of the following is NOT an advantage of a physical star?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
provides redundancy and fault tolerance
·         Question 66

What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
destination port number
·         Question 67

You’re the network administrator for a company located in Arizona that has just opened an office in Texas. You need to make sure that the two locations can communicate. What type of network are you implementing?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
WAN
·         Question 68

The Transport layer segments data into smaller chunks, the size of which is determined by which of the following?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
PDU
·         Question 69

What is the maximum bandwidth for a network cabled using category 5e UTP cable?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
1000 Mbps
·         Question 70

You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation’s IP address, and get a response.  You ask the user to try the Internet again. He does so with the same result— no connection.  Which type of device is most likely to be the problem?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
Network layer device
·         Question 71

How many host addresses are available on a Class C network?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
254
·         Question 72

Which protocol is responsible for determining the MAC address associated with each IP address and keeping a table of its results?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
ARP
·         Question 73

In a token ring network, what is the central device called?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
multistation access unit
·         Question 74

Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
physical bus
·         Question 75

When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
100 meters



·         Question 1
4 out of 4 points

If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
network policy and access services
·         Question 2
4 out of 4 points

In a small business network, the router usually takes on the responsibilities of many roles, which include a firewall as well as a DHCP server.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 3
4 out of 4 points

Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
hosted platforms
·         Question 4
4 out of 4 points

What are the chunks called into which the available storage space on a disk drive is broken?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
sectors
·         Question 5
4 out of 4 points

You are a network architect for an IT consulting company. One of your clients needs a WAN connection and has asked you about the disadvantage of a packet-switched WAN method. Which of the following is a disadvantage that applies?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
shared bandwidth
·         Question 6
0 out of 4 points

A SOHO router is designed to perform which of the following services? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
NAT

Description: https://ctc.blackboard.com/images/spacer.gif d.  
DHCP

 
·         Question 7
4 out of 4 points

An event log entry that is an error is marked with a red circle with a white exclamation point in the center.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 8
4 out of 4 points

Answer
Question
Selected Match
can be used to create a RAID
Description: https://ctc.blackboard.com/images/spacer.gif c.  
dynamic disk
if the primary server fails, the secondary server takes over
Description: https://ctc.blackboard.com/images/spacer.gif d.  
failover cluster
can be divided in up to four primary partitions
Description: https://ctc.blackboard.com/images/spacer.gif e.  
basic disk
defines a user’s environment
Description: https://ctc.blackboard.com/images/spacer.gif f.  
local profile
multiple servers acting as a single server
Description: https://ctc.blackboard.com/images/spacer.gif b.  
load-balancing cluster
power device that provides fault tolerance through battery backup
Description: https://ctc.blackboard.com/images/spacer.gif g.  
uninterruptible power supply
partition that contains the boot loader
Description: https://ctc.blackboard.com/images/spacer.gif j.  
system partition
action that a user can perform on a computer
Description: https://ctc.blackboard.com/images/spacer.gif a.  
right
can be made the active partition
Description: https://ctc.blackboard.com/images/spacer.gif i.  
primary partition
can only be divided into logical drives
Description: https://ctc.blackboard.com/images/spacer.gif h.  
extended partition
·         Question 9
4 out of 4 points

What is the process called that grants or denies a user’s access to network resources?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
authorization
·         Question 10
4 out of 4 points

When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
USB key mode
·         Question 11
4 out of 4 points

Which of the following is not a feature that you should consider when choosing a new switch for a small business?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
VPN support
·         Question 12
4 out of 4 points

A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 13
4 out of 4 points

The creator of a HomeGroup has the ability to change the randomly generated password to a more user-friendly password.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 14
0 out of 4 points

What tool would you use to view error messages that are generated by system services or applications?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Performance Monitor
·         Question 15
4 out of 4 points

Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Port
·         Question 16
4 out of 4 points

A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
dynamic
·         Question 17
4 out of 4 points

In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 18
4 out of 4 points

How many disks are needed to implement a RAID 1 + 0?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
4
·         Question 19
4 out of 4 points

In regards to a user account, what does a white circle with a black arrow indicate?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
The account is disabled.
·         Question 20
4 out of 4 points

The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
WPA2
·         Question 21
4 out of 4 points

Which one of the following is NOT a typical SONET data rate?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
OC-9001
·         Question 22
4 out of 4 points

A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
mandatory
·         Question 23
0 out of 4 points

What is RAID level 1 also called?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
disk striping
·         Question 24
4 out of 4 points

What is CRM software?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
software that is used to keep track of customer information, including contact information and appointments
·         Question 25
0 out of 4 points

Which of the following groups are special identity groups? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
authenticated users

Description: https://ctc.blackboard.com/images/spacer.gif c.  
guests

Description: https://ctc.blackboard.com/images/spacer.gif e.  
print operators

 
·         Question 26
4 out of 4 points

Which of the following is a VPN mode that is usually implemented to give mobile users access to the network?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
client-to-gateway
·         Question 27
0 out of 4 points

When dealing with permissions in Linux, what are the three user types that can be assigned permissions? (Choose three.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Group

Description: https://ctc.blackboard.com/images/spacer.gif d.  
Creator

Description: https://ctc.blackboard.com/images/spacer.gif e.  
Owner

 
·         Question 28
4 out of 4 points

Traceroute would be best suited for which of the following tasks?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
locating bottlenecks in a network
·         Question 29
4 out of 4 points

In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 30
4 out of 4 points

Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Datacenter Edition
·         Question 31
4 out of 4 points

What is a partial copy of a VM that is used to restore it to a previous state?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
snapshot
·         Question 32
4 out of 4 points

You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
incorrectly configured gateway address
·         Question 33
4 out of 4 points

What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
protocol analyzer
·         Question 34
4 out of 4 points

What does the ping message “Destination net unreachable” mean?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
A router in the path from the source to the destination determined that the destination network does not exist.
·         Question 35
4 out of 4 points

The plain old telephone service is a good example of what kind of WAN technology?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
circuit switched
·         Question 36
4 out of 4 points

In Linux, what is the command for viewing a file’s contents onscreen?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
cat
·         Question 37
4 out of 4 points

Most small businesses require a high level of security including encryption technologies and complex network connections.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 38
0 out of 4 points

Firewall rules can be based on which of the following properties? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
operating system

Description: https://ctc.blackboard.com/images/spacer.gif d.  
context

Description: https://ctc.blackboard.com/images/spacer.gif e.  
protocol

 
·         Question 39
4 out of 4 points

Select the true statement regarding analog and digital signals.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.
·         Question 40
4 out of 4 points

Windows can be installed on an extended partition that has been formatted with the NTFS file system.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 41
4 out of 4 points

Which of the following is NOT a Linux file system?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
SFS
·         Question 42
0 out of 4 points

If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain data?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
1
·         Question 43
4 out of 4 points

You don’t need to physically secure your servers as long as you use a good strong password for your accounts.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 44
4 out of 4 points

Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
1.54 Mbps is the guaranteed minimum transmission rate.
·         Question 45
4 out of 4 points

The ping command is used to determine the path between two devices.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 46
4 out of 4 points

When a disk is formatted, it is impossible to recover the data that was on the disk..
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 47
4 out of 4 points

The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Basic Rate Interface (BRI)
·         Question 48
4 out of 4 points

Before you purchase any software for a small business, especially the OS, you should be aware of the number of users that are allowed to access the software. What document will give you that information?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
EULA
·         Question 49
4 out of 4 points

You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swarm of help desk support requests, all originating from one specific floor in your building. After a few minutes on the phone with those affected, you determine that no one has indicator lights active on their NICs. What is most likely the problem?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
A network switch has not been powered on.
·         Question 50
4 out of 4 points

Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
ipconfig /all
·         Question 51
4 out of 4 points

You have been asked to install a VPN remote access solution using Windows Server.What do you need to install?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Routing and Remote Access Service (RRAS)
·         Question 52
0 out of 4 points

You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
domain local
·         Question 53
4 out of 4 points

The ultimate goal of network security is to protect which of the following?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
all of the above
·         Question 54
4 out of 4 points

A router is considered to be a CSU/DSU.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 55
4 out of 4 points

Which of the following protocols is NOT used for Windows 7 VPN connections?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
SMTP
·         Question 56
4 out of 4 points

What is the native file-sharing protocol in Linux?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
NFS
·         Question 57
4 out of 4 points

Virtualization is designed for testing and development purposes only.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 58
4 out of 4 points

You’re the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
reduced physical plant costs
·         Question 59
4 out of 4 points

What does the ping message “Destination host unreachable” message mean?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
The pinged IP address is on the same network, but an ARP reply was not received.
·         Question 60
4 out of 4 points

Which statement about Multiprotocol Label Switching (MPLS) is true?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
MPLS works with any network layer protocol.
·         Question 61
0 out of 4 points

Which of the following are potential sources of interference in a wireless network? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
microwave oven

Description: https://ctc.blackboard.com/images/spacer.gif c.  
cordless phone

Description: https://ctc.blackboard.com/images/spacer.gif d.  
television

Description: https://ctc.blackboard.com/images/spacer.gif e.  
electric lights

 
·         Question 62
4 out of 4 points

When a file is encrypted, what color does the file name appear in Windows Explorer?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
green
·         Question 63
4 out of 4 points

If you need to limit the amount of data users can store on a volume, you would implement which of the following?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
disk quotas
·         Question 64
4 out of 4 points

Part of SONET’s flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
fault tolerant bus
·         Question 65
4 out of 4 points

You receive a phone call from a co-worker telling you that “the network is down.” Just as you are about to look into the issue, you receive several more phone calls from other co-workers. Using the problem-solving process, what must be done first to effectively troubleshoot the issue?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Determine what the problem is, and then figure out who has been affected on your network.
·         Question 66
0 out of 4 points

Which of the following are standard NTFS permissions?
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
Execute

Description: https://ctc.blackboard.com/images/spacer.gif d.  
Change

Description: https://ctc.blackboard.com/images/spacer.gif e.  
List Folder Contents

 
·         Question 67
4 out of 4 points

Which of the following is not a requirement for most small business networks?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
complex WAN environment
·         Question 68
4 out of 4 points

If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 69
4 out of 4 points

What method does the CPU use to divide its computing cycles between more than one process?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
time slicing
·         Question 70
4 out of 4 points

For a computer to connect to a HomeGroup, it must have certain features enabled or configured correctly. Which of the following is not necessary to join a HomeGroup?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
DHCP
·         Question 71
4 out of 4 points

Select the utility inside of Windows that allows the user to recover a previous system state. This utility monitors drives and partitions, as well as registry settings and system files.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
System Restore
·         Question 72
4 out of 4 points

A protocol analyzer, such as Wireshark, gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa..
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 73
0 out of 4 points

Which of the following are case sensitive? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Linux password

Description: https://ctc.blackboard.com/images/spacer.gif b.  
Linux logon name

 
·         Question 74
4 out of 4 points

Which of the following should not be a concern when discerning the level of security that is required in a network?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
how difficult it would be to enforce a password policy
·         Question 75
0 out of 4 points

Which of the following can be used to secure data on disk drives? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
VPN

Description: https://ctc.blackboard.com/images/spacer.gif b.  
IPSec

Description: https://ctc.blackboard.com/images/spacer.gif e.  
BitLocker