use at your own risk.... double check answers....
·
Question 1
|
What
is a PDU?
Answer
|
||||
|
·
Question 2
|
Which
of the following is not a true statement regarding the function of a switch?
Answer
|
||||
|
·
Question 3
|
Which
of the following is not a function that would be found in a managed switch?
Answer
|
||||
|
·
Question 4
|
Which
layer is responsible for the encoding of signals?
Answer
|
||||
|
·
Question 5
|
The
Transport layer deals with which unit of information?
Answer
|
||||
|
·
Question 6
|
In
wireless networks, what type of media access control is used?
Answer
|
||||
|
·
Question 7
|
The
Physical layer has been divided into two sublayers, called the LLC sublayer
and the MAC sublayer.
Answer
|
||||
|
·
Question 8
|
Which
of the following is not an Application layer protocol?
Answer
|
||||
|
·
Question 9
|
What
command would you issue from a command prompt to see a listing of the
computers in your workgroup?
Answer
|
||||
|
·
Question 10
|
What
is the term used that defines network cabling in the work area and between
telecommunications closets and equipment rooms?
Answer
|
||||
|
·
Question 11
|
What
component of the computer provides it with a MAC address?
Answer
|
||||
|
·
Question 12
|
What
type of routing protocol are RIP and RIPv2?
Answer
|
||||
|
·
Question 13
|
What
is the maximum cable length for both category 5e and category 6 UTP cable?
Answer
|
||||
|
·
Question 14
|
What
is the best way to eliminate the possibility of collisions in a network?
Answer
|
||||
|
·
Question 15
|
Each
interface on a router must have an IP address and what else to be able to
communicate on the network?
Answer
|
||||
|
·
Question 16
|
How
can you find out what your MAC address is? (Choose all that apply.)
Answer
|
||||
|
·
Question 17
|
Match
each item with a statement below:
Answer
|
|||||||||||||||||||||||||
|
·
Question 18
|
When
a frame is received, which component reads the source and destination MAC
addresses, looks up the destination to determine where to send the frame, and
forwards it out the correct port?
Answer
|
||||
|
·
Question 19
|
Which
of the following is a feature of TCP? (Choose all that apply.)
Answer
|
||||
|
·
Question 20
|
Because
fiber-optic cabling uses light pulses instead of electrical signals, it is
immune to interference and highly resistant to eavesdropping.
Answer
|
||||
|
·
Question 21
|
When
an access control list is applied on a router’s interface, that interface is
performing a specific function on the packets that it receives. What is that
function called?
Answer
|
||||
|
·
Question 22
|
Which
of the following is NOT a function of a hub?
Answer
|
||||
|
·
Question 23
|
Which
of the following is NOT a characteristic of Unshielded Twisted Pair cabling?
Answer
|
||||
|
·
Question 24
|
The
maximum transmission unit for Ethernet is 1518 bytes.
Answer
|
||||
|
·
Question 25
|
What
type of wiring should be used for a high-speed connection between two
buildings?
Answer
|
||||
|
·
Question 26
|
Which
of the following are solutions to the shortage of available IPv4 addresses?
(Choose all that apply.)
Answer
|
||||
|
·
Question 27
|
Which
of the following is not a form of electromagnetic interference, or EMI?
Answer
|
||||
|
·
Question 28
|
When
data is being prepared for transmission onto the network, it is broken into
small pieces and a header and trailer are added to each piece to help
identify it. What is this process called?
Answer
|
||||
|
·
Question 29
|
Which
of the following are examples of input devices? (Choose all that apply.)
Answer
|
||||
|
·
Question 30
|
What
command issued from a command prompt will display the routing table in
Windows?
Answer
|
||||
|
·
Question 31
|
What
is the IEEE standard governing wireless networking?
Answer
|
||||
|
·
Question 32
|
An
IP address is composed of 48 bits that are grouped together into 8-bit octets
and are represented by a decimal number from 0 to 255.
Answer
|
||||
|
·
Question 33
|
Windows
7, Windows Vista, and Windows XP are all examples of which of the following?
Answer
|
||||
|
·
Question 34
|
At
which layer would you find errors that were caused by EMI?
Answer
|
||||
|
·
Question 35
|
Which
is the strongest form of wireless security?
Answer
|
||||
|
·
Question 36
|
In
what layer does the NIC operate?
Answer
|
||||
|
·
Question 37
|
You
are the network administrator for a company and you want to separate the
traffic from the accounting department from the rest of the network. However,
the accounting department still needs to have access to other network
resources. What type of network do you need to implement?
Answer
|
||||
|
·
Question 38
|
Which
component, located on the motherboard, carries out all the instructions
provided by computer programs?
Answer
|
||||
|
·
Question 39
|
What
is the main disadvantage of cable modem networking?
Answer
|
||||
|
·
Question 40
|
Put
the layers of the OSI model in order from layer 7 to layer 1.
a. Presentation b. Network c. Physical d. Data Link e. Transport f. Application g. Session
Answer
|
||||
|
·
Question 41
|
Answer
|
|||||||||||||||||||||||||
|
·
Question 42
|
One
of the problems that can occur in the Network layer is the incorrect
configuration of a hosts IP address.
Answer
|
||||
|
·
Question 43
|
IPX/SPX
is considered the protocol suite of the Internet, and it is the most widely
used protocol suite in LANs.
Answer
|
||||
|
·
Question 44
|
You
are building a gaming computer and you want to install a dedicated graphics
card that has a fast GPU and 1GB of memory onboard. You need to make sure
that you have the right connector available on your motherboard. What type of
connector would be appropriate?
Answer
|
||||
|
·
Question 45
|
Which
of the following categories of UTP cabling are considered to be data grade as
specified by ANSI/TIA/EIA? (Choose all that apply.)
Answer
|
||||
|
·
Question 46
|
You
are the network administrator for a company that uses a private addressing
scheme for its internal network. You have 300 workstations that regularly
access the Internet. What process must be in operation on your network to
allow all the workstations to have access to the Internet using only one
public IP address?
Answer
|
||||
|
·
Question 47
|
Each
component of a computer is designed to perform only one specific task—either input,
processing, or output.
Answer
|
||||
|
·
Question 48
|
Which
part of a computer’s IP address configuration indicates the portion of the
address that specifies the network ID?
Answer
|
||||
|
·
Question 49
|
What
is the purpose of the default route?
Answer
|
||||
|
·
Question 50
|
What
does a switch store in its switching table?
Answer
|
||||
|
·
Question 51
|
A
collision can occur on a switch only if the switch is operating in
full-duplex mode.
Answer
|
||||
|
·
Question 52
|
How
many bits are available in an IPv6 network for creating subnets when the
prefix is /48 and the host ID is 64 bits?
Answer
|
||||
|
·
Question 53
|
Match
each item with a statement below:
Answer
|
|||||||||||||||||||||||||
|
·
Question 54
|
The
entrance facility is the place where the connection to a WAN is located. It
is basically the point where the LAN begins and ends. What is another name
for this point?
Answer
|
||||
|
·
Question 55
|
DNS
is a protocol that automatically provides a computer with its IP address
configuration.
Answer
|
||||
|
·
Question 56
|
What
is one of the disadvantages of a server-based network compared to a
peer-to-peer network?
Answer
|
||||
|
·
Question 57
|
Communications
through a router are noticeably faster than communications through a switch.
Answer
|
||||
|
·
Question 58
|
Access
control lists can be configured based on which of the following? (Choose all
that apply.)
Answer
|
||||
|
·
Question 59
|
A
signal has just been received from the WAN link on your network. Using the
given components, which of the following shows the path that the signal would
take from the WAN to a workstation on your network? Assume all components are
used at least once and that some components may be used more than once.
1—backbone cabling 2—entrance facility 3—equipment room 4—horizontal wiring 5—telecommunications closet 6—work area
Answer
|
||||
|
·
Question 60
|
Which
of the following is not one of the main differences between the types of
network cabling?
Answer
|
||||
|
·
Question 61
|
There
are two basic categories of physical cabling used in Ethernet networks. They
are copper wire and fiber optic.
Answer
|
||||
|
·
Question 62
|
What
type of hacker uses a scanning device to find unsecured wireless networks and
break into those networks?
Answer
|
||||
|
·
Question 63
|
Which
layer of the OSI model is responsible for encryption and decryption?
Answer
|
||||
|
·
Question 64
|
You
cannot connect a hub to another hub unless it has an uplink port.
Answer
|
||||
|
·
Question 65
|
Which
of the following is NOT an advantage of a physical star?
Answer
|
||||
|
·
Question 66
|
What
does the Transport layer use to make sure that a message is reassembled
correctly on the receiving device?
Answer
|
||||
|
·
Question 67
|
You’re
the network administrator for a company located in Arizona that has just
opened an office in Texas. You need to make sure that the two locations can
communicate. What type of network are you implementing?
Answer
|
||||
|
·
Question 68
|
The
Transport layer segments data into smaller chunks, the size of which is
determined by which of the following?
Answer
|
||||
|
·
Question 69
|
What
is the maximum bandwidth for a network cabled using category 5e UTP cable?
Answer
|
||||
|
·
Question 70
|
You
are working at the help desk and you get a message that a user cannot access
the Internet. You open a command prompt, ping the workstation’s IP address,
and get a response. You ask the user to try the Internet again. He does
so with the same result— no connection. Which type of device is most
likely to be the problem?
Answer
|
||||
|
·
Question 71
|
How
many host addresses are available on a Class C network?
Answer
|
||||
|
·
Question 72
|
Which
protocol is responsible for determining the MAC address associated with each
IP address and keeping a table of its results?
Answer
|
||||
|
·
Question 73
|
In
a token ring network, what is the central device called?
Answer
|
||||
|
·
Question 74
|
Which
of the following is the physical topology that is daisy-chained like a bus
and in which the cabling is brought around from the last device to the first
device?
Answer
|
||||
|
·
Question 75
|
When
using UTP cabling, what is the maximum cable length that can be used from the
NIC to a hub or switch?
Answer
|
||||
|
·
Question 1
4 out of 4 points
|
If
you need to implement a VPN on a Windows Server 2008 system, what server role
must be installed to access routing and remote access services?
Answer
|
||||
|
·
Question 2
4 out of 4 points
|
In
a small business network, the router usually takes on the responsibilities of
many roles, which include a firewall as well as a DHCP server.
Answer
|
||||
|
·
Question 3
4 out of 4 points
|
Which
of the following terms describes the category of cloud computing in which a
customer develops applications using development tools and infrastructure
provided by the service provider?
Answer
|
||||
|
·
Question 4
4 out of 4 points
|
What
are the chunks called into which the available storage space on a disk drive
is broken?
Answer
|
||||
|
·
Question 5
4 out of 4 points
|
You
are a network architect for an IT consulting company. One of your clients
needs a WAN connection and has asked you about the disadvantage of a
packet-switched WAN method. Which of the following is a disadvantage that
applies?
Answer
|
||||
|
·
Question 6
0 out of 4 points
|
A
SOHO router is designed to perform which of the following services? (Choose
all that apply.)
Answer
|
||||
|
·
Question 7
4 out of 4 points
|
An
event log entry that is an error is marked with a red circle with a white
exclamation point in the center.
Answer
|
||||
|
·
Question 8
4 out of 4 points
|
Answer
|
|||||||||||||||||||||||||
|
·
Question 9
4 out of 4 points
|
What
is the process called that grants or denies a user’s access to network
resources?
Answer
|
||||
|
·
Question 10
4 out of 4 points
|
When
using BitLocker to encrypt your entire disk, which mode must you use if your
system is not configured for TPM support?
Answer
|
||||
|
·
Question 11
4 out of 4 points
|
Which
of the following is not a feature that you should consider when choosing a
new switch for a small business?
Answer
|
||||
|
·
Question 12
4 out of 4 points
|
A
Trojan is a self-replicating program that masks itself as a useful program
but is actually a type of malware.
Answer
|
||||
|
·
Question 13
4 out of 4 points
|
The
creator of a HomeGroup has the ability to change the randomly generated
password to a more user-friendly password.
Answer
|
||||
|
·
Question 14
0 out of 4 points
|
What
tool would you use to view error messages that are generated by system
services or applications?
Answer
|
||||
|
·
Question 15
4 out of 4 points
|
Which
of the following is a scanner used as a tool to determine what possible
points of entry exist that are open and vulnerable on your system?
Answer
|
||||
|
·
Question 16
4 out of 4 points
|
A
disk must be formatted as what type of disk if you want to access additional
features such as disk spanning?
Answer
|
||||
|
·
Question 17
4 out of 4 points
|
In
a file system that uses FAT or FAT32, the only file security option that is
available is the sharing permissions.
Answer
|
||||
|
·
Question 18
4 out of 4 points
|
How
many disks are needed to implement a RAID 1 + 0?
Answer
|
||||
|
·
Question 19
4 out of 4 points
|
In
regards to a user account, what does a white circle with a black arrow
indicate?
Answer
|
||||
|
·
Question 20
4 out of 4 points
|
The
802.11i standard is the newest version of wireless security that uses more
advanced encryption methods than the previous versions. What is it more
commonly referred to as?
Answer
|
||||
|
·
Question 21
4 out of 4 points
|
Which
one of the following is NOT a typical SONET data rate?
Answer
|
||||
|
·
Question 22
4 out of 4 points
|
A
user logs on to her account and is able to makes changes to her desktop, like
adding a background and screen saver. However, when she logs off and logs
back on, the desktop reverts to its original configuration. What type of user
profile does this user have?
Answer
|
||||
|
·
Question 23
0 out of 4 points
|
What
is RAID level 1 also called?
Answer
|
||||
|
·
Question 24
4 out of 4 points
|
What
is CRM software?
Answer
|
||||
|
·
Question 25
0 out of 4 points
|
Which
of the following groups are special identity groups? (Choose all that apply.)
Answer
|
||||
|
·
Question 26
4 out of 4 points
|
Which
of the following is a VPN mode that is usually implemented to give mobile
users access to the network?
Answer
|
||||
|
·
Question 27
0 out of 4 points
|
When
dealing with permissions in Linux, what are the three user types that can be
assigned permissions? (Choose three.)
Answer
|
||||
|
·
Question 28
4 out of 4 points
|
Traceroute
would be best suited for which of the following tasks?
Answer
|
||||
|
·
Question 29
4 out of 4 points
|
In
the problem-solving process, you should always devise a solution to the
problem you are facing prior to determining the scope of the problem.
Answer
|
||||
|
·
Question 30
4 out of 4 points
|
Which
edition of Windows Server 2008 includes support for up to 64 processors and
provides unlimited virtual instances?
Answer
|
||||
|
·
Question 31
4 out of 4 points
|
What
is a partial copy of a VM that is used to restore it to a previous state?
Answer
|
||||
|
·
Question 32
4 out of 4 points
|
You
have just connected a brand new workstation to your local network. As per
company policy, you have used a static IP configuration. However, all
attempts to reach the Internet from the workstation fail. You have verified
that you can communicate with servers and other workstations on the local
network, and that you are the only one having an issue reaching the Internet.
What is most likely the issue?
Answer
|
||||
|
·
Question 33
4 out of 4 points
|
What
kind of software would you use to view and troubleshoot protocol specific
problems such as TCP retries caused by missed acknowledgements, or duplicate
acknowledgements that cause network slow-down?
Answer
|
||||
|
·
Question 34
4 out of 4 points
|
What
does the ping message “Destination net unreachable” mean?
Answer
|
||||
|
·
Question 35
4 out of 4 points
|
The
plain old telephone service is a good example of what kind of WAN technology?
Answer
|
||||
|
·
Question 36
4 out of 4 points
|
In
Linux, what is the command for viewing a file’s contents onscreen?
Answer
|
||||
|
·
Question 37
4 out of 4 points
|
Most
small businesses require a high level of security including encryption
technologies and complex network connections.
Answer
|
||||
|
·
Question 38
0 out of 4 points
|
Firewall
rules can be based on which of the following properties? (Choose all that
apply.)
Answer
|
||||
|
·
Question 39
4 out of 4 points
|
Select
the true statement regarding analog and digital signals.
Answer
|
||||
|
·
Question 40
4 out of 4 points
|
Windows
can be installed on an extended partition that has been formatted with the
NTFS file system.
Answer
|
||||
|
·
Question 41
4 out of 4 points
|
Which
of the following is NOT a Linux file system?
Answer
|
||||
|
·
Question 42
0 out of 4 points
|
If
you want to implement fault-tolerance on your network, what type of RAID
would you use on the drives that contain data?
Answer
|
||||
|
·
Question 43
4 out of 4 points
|
You
don’t need to physically secure your servers as long as you use a good strong
password for your accounts.
Answer
|
||||
|
·
Question 44
4 out of 4 points
|
Your
local ISP has provided you with a dedicated line that has a Committed
Information Rate of 1.54 Mbps. What does this mean?
Answer
|
||||
|
·
Question 45
4 out of 4 points
|
The
ping command is used to determine the path between two devices.
Answer
|
||||
|
·
Question 46
4 out of 4 points
|
When
a disk is formatted, it is impossible to recover the data that was on the
disk..
Answer
|
||||
|
·
Question 47
4 out of 4 points
|
The
company you work for currently has ISDN service in place. Your supervisor
wishes to know what sort of ISDN service is being used so that better
alternatives can be considered. He tells you that the service has two
B-Channels and a D-Channel. What ISDN format do you have?
Answer
|
||||
|
·
Question 48
4 out of 4 points
|
Before
you purchase any software for a small business, especially the OS, you should
be aware of the number of users that are allowed to access the software. What
document will give you that information?
Answer
|
||||
|
·
Question 49
4 out of 4 points
|
You
recently completed a network overhaul over the weekend. Everything seems to
be functioning properly until you receive a swarm of help desk support
requests, all originating from one specific floor in your building. After a
few minutes on the phone with those affected, you determine that no one has
indicator lights active on their NICs. What is most likely the problem?
Answer
|
||||
|
·
Question 50
4 out of 4 points
|
Which
command will display the configured IP address, default gateway, and DNS
servers for a Windows workstation?
Answer
|
||||
|
·
Question 51
4 out of 4 points
|
You
have been asked to install a VPN remote access solution using Windows
Server.What do you need to install?
Answer
|
||||
|
·
Question 52
0 out of 4 points
|
You
are creating a new group for the Sales department. All of the users that will
be in this group will need to have access to the same resources. What scope
would you use for this group?
Answer
|
||||
|
·
Question 53
4 out of 4 points
|
The
ultimate goal of network security is to protect which of the following?
Answer
|
||||
|
·
Question 54
4 out of 4 points
|
A
router is considered to be a CSU/DSU.
Answer
|
||||
|
·
Question 55
4 out of 4 points
|
Which
of the following protocols is NOT used for Windows 7 VPN connections?
Answer
|
||||
|
·
Question 56
4 out of 4 points
|
What
is the native file-sharing protocol in Linux?
Answer
|
||||
|
·
Question 57
4 out of 4 points
|
Virtualization
is designed for testing and development purposes only.
Answer
|
||||
|
·
Question 58
4 out of 4 points
|
You’re
the network administrator for a large bean-bag chair company. You are
presenting to your supervisor several reasons to make use of cloud computing
for handling data processing. Which answer would be a valid benefit of using
cloud computing?
Answer
|
||||
|
·
Question 59
4 out of 4 points
|
What
does the ping message “Destination host unreachable” message mean?
Answer
|
||||
|
·
Question 60
4 out of 4 points
|
Which
statement about Multiprotocol Label Switching (MPLS) is true?
Answer
|
||||
|
·
Question 61
0 out of 4 points
|
Which
of the following are potential sources of interference in a wireless network?
(Choose all that apply.)
Answer
|
||||
|
·
Question 62
4 out of 4 points
|
When
a file is encrypted, what color does the file name appear in Windows
Explorer?
Answer
|
||||
|
·
Question 63
4 out of 4 points
|
If
you need to limit the amount of data users can store on a volume, you would
implement which of the following?
Answer
|
||||
|
·
Question 64
4 out of 4 points
|
Part
of SONET’s flexibility comes from its ability to be arranged in several
different physical topologies. Which of the following is NOT a possible SONET
topology?
Answer
|
||||
|
·
Question 65
4 out of 4 points
|
You
receive a phone call from a co-worker telling you that “the network is down.”
Just as you are about to look into the issue, you receive several more phone
calls from other co-workers. Using the problem-solving process, what must be
done first to effectively troubleshoot the issue?
Answer
|
||||
|
·
Question 66
0 out of 4 points
|
Which
of the following are standard NTFS permissions?
Answer
|
||||
|
·
Question 67
4 out of 4 points
|
Which
of the following is not a requirement for most small business networks?
Answer
|
||||
|
·
Question 68
4 out of 4 points
|
If
a problem occurs after a successful login, Last Known Good Configuration will
fix the issue.
Answer
|
||||
|
·
Question 69
4 out of 4 points
|
What
method does the CPU use to divide its computing cycles between more than one
process?
Answer
|
||||
|
·
Question 70
4 out of 4 points
|
For
a computer to connect to a HomeGroup, it must have certain features enabled
or configured correctly. Which of the following is not necessary to join a
HomeGroup?
Answer
|
||||
|
·
Question 71
4 out of 4 points
|
Select
the utility inside of Windows that allows the user to recover a previous
system state. This utility monitors drives and partitions, as well as
registry settings and system files.
Answer
|
||||
|
·
Question 72
4 out of 4 points
|
A
protocol analyzer, such as Wireshark, gives the ability to listen in on
network traffic as it moves through the Application layer to the Data Link
layer and vice versa..
Answer
|
||||
|
·
Question 73
0 out of 4 points
|
Which
of the following are case sensitive? (Choose all that apply.)
Answer
|
||||
|
·
Question 74
4 out of 4 points
|
Which
of the following should not be a concern when discerning the level of
security that is required in a network?
Answer
|
||||
|
·
Question 75
0 out of 4 points
|
Which
of the following can be used to secure data on disk drives? (Choose all that
apply.)
Answer
|
||||
|
The Eight-Wheel Classic - TITIAN Arts
ReplyDeleteThe eight-wheel classic bicycle https://sol.edu.kg/ is septcasino.com available in six nba매니아 sizes. The Bicycle Wheel is ford escape titanium a classic bicycle made in USA, but there 출장샵 are three variations in