unit 6

  1. You work as a Network Administrator. Your company has offices on differentfloors of an office building. You decide to use 100BaseFX full-duplex MultimodeFiber-optic cabling for interconnecting the offices. What is the maximum length ofcable you can use for this network?
    2000 meters
  2. When securing a wireless access point, which of the following should bedisabled?
    SSID broadcasting
  3. A user reports that the internet connection is not working. Which of the followingcan be doen to determine whether the network interface card is responding?
    Ping 127.0.0.1
  4. Your network has grown from 10 computers to 60 and you want to automate theprocess of assigning IP addresses to network your clients. Which service shouldyou install and configure on your network?
    DHCP
  5. Which of the following are used as data transfer mechanisms? (Select THREE)
    • Infrared
    • Bluetooth
    • IEEE 1394/Firewire
  6. Which of the following can be used to make a wireless connection between twocomputers?
    Ad-hoc
  7. Which of the following protocols automatically assigns an IP address to acomputer?
    DHCP
  8. What is the maximum data transmission speed of IEEE 802.11b wirelessnetworks?
    11 Mbps
  9. Which of the following assigns IP addresses automatically?
    DHCP
  10. A user can no longer print to a network printer. They attempt to PING the printerand receive an error message that states "Request timed out". What could this indicate?
    • The NIC on the printer is defective
    • The printer is turned off
  11. Which of the following has the fastest data throughput?
    Gigabit Ethernet
  12. A technician is able to PING a computer by IP address but it is not able to PINGthe same computer by its Fully Qualified Domain Name (FQDN). What is MOSTlikely not working?
    dns
  13. Which connection is used for dial-up networks?
    RJ-11
  14. A technician would like to view the IP address assigned to the local computer.Which utility can they use?
    IPCONFIG
  15. Which component of a wireless access point should you disable tokeep the network from broadcasting its network name to other users?
    SSID
  16. Which of the following are associated with a TCP/IP-based network?
    • DNS
    • DHCP
  17. Which of the following networking topologies uses a hub to connect computers?
    star
  18. What is the maximum range of a Class 2 Bluetooth device?
    33 feet
  19. Which of the following wireless standards uses the frequency of 2.4 GHz? (3)
    • 802.11g
    • Bluetooth
    • 802.11b
  20. Which of the following creates a secure connection?
    VPN
  21. What type of cable is used on a 10BaseT network?
    UTP
  22. A computer is on a TCP/IP based network and is assigned the IP address of192.168.1.14. The computer uses a subnet mask of 255.255.255.0 and thedefault gateway is assigned the IP address 192.168.1.1. What is the IP addressof the loopback address?
    127.0.0.1
  23. Which of the following has a 9 meter (29.5 feet) maximum range?
    Bluetooth 2.0
  24. A technician is connecting 15 workstations to a central switch using a starnetwork configuration. Which of the following is the MOST important thing theyshould consider when setting up this network?
    Where the cables are routed to avoid creating a tripping hazard
  25. What utility do you use to find out if a network attached printer is on the network?
    PING
  26. Which of the following is associated with the standard serial interface?
    RS-232
  27. The maximum segment length of an Ethernet CAT5 UTP cable segment is:
    328 feet (100 meters)
  28. Identify the Class C IP address
    200.200.152.10
  29. what would be the BEST method for the automatic assignment of an IP address for an assigned period of time?
    DHCP
  30. A technician is connecting a cable with an RJ-45 connector. Which device is she most likely connecting to?
    NIC
  31. Which cabling technology is the most expensive to implement?
    Fiber optic
  32. The limited range of an IEEE 802.11g network could be extended by adding which of the following devices to the network?
    Access point
  33. What allows you to control hardware connections to a Wireless Access Point?
    MAC filtering
  34. What does disabling SSID broadcasting do?
    Prevents users from viewing the wireless network name
  35. Which of the following IP address ranges would indicate that a computer is connected to a network using automatic private internet protocol addressing (APIPA) rather than DHCP or static IP addressing?
    169.254.0.1 - 169.254.255.255
  36. Which of the following technologies should be implemented in an office where there is lots of EMI?
    Fiber optic
  37. In a wireless network, which of the following is the most secure encryption method?
    WPA
  38. On a wireless router, which of the following will prevent an unauthorized user from picking up the Service Set Identifier (SSID) when scanning from a wireless computer?
    Disable SSID broadcast
  39. Which of the following is an example of a connector used in fiber optic cables? (TWO)
    • SC
    • st
  40. The IP address 192.168.10.1 is an example of which of the following types of addresses?
    PRIVATE
  41. Which type of interference is MOST likely to interfere with a wireless access point?
    RFI
  42. Identify the Class A IP address:
    Choose one answer.
    127.0.200.1
    12.20.0.1
    195.168.127.2
    12.20.0.1
  43. Which of the following is used to resolve host names to IP addresses?
    DNS
  44. The maximum segment length of an Ethernet CAT5 UTP cable segment is:
    328 feet (100 meters)
  45. Which of the following is a connector used by fiber optic cables?
    ST
  46. You could connect to the Internet earlier in the morning. When you attempt to connect to the WAP and access the Internet later in the day you are not able to. What should you do in this situation?
    Reboot the wireless access point
  47. Two new network switches are connected but connections between them are not working. On the cable connecting the switches there are no lights on one side of the connection. Which of the following is MOST likely the cause of the problem?
    The cable connecting the switches is faulty
  48. Which of the following provides the most secure wireless encryption?
    WPA with a shared-key
    WPA2 with a shared-key
    WEP with a shared-key
    WEP2 with a shared-key
    WPA2 with a shared-key
  49. Identify the Class A subnet mask

    255.255.255.255
    255.255.255.0
    255.255.0.0
    255.0.0.0
    255.0.0.0
  50. Which device is most likely to interfere with a wireless access point signal?
    cordless phone
  51. Two new network switches are connected but connections between them are not working. On the ports connecting the switches there are no lights on one side of the connection. Which of the following is MOST likely the cause of the problem?
    The connection cable is faulty or not connected properly
  52. Your network printer isn’t printing. You check the link lights and they are not lit. What should you do FIRST to troubleshoot the problem?
    Power cycle the printer and watch the boot process
  53. A user has a wireless network at home. Yesterday they were able to connect to the wireless network using their laptop computer. Today they cannot. Which of the following is the MOST likely cause of this problem?
    The wireless switch is turned off on the laptop
  54. Which of the following can be used to make a wireless connection between two computers?
    Peer to Peer Mode

  55. Which of the following transmits data at a maximum of 11 Mbps?
    802.11b
Author
akirev1
ID
27651
Card Set
unit 6
Description
study cards test 6
Updated