Final Computer Network Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Makaras
M
Makaras
Community Contributor
Quizzes Created: 1 | Total Attempts: 214
Questions: 52 | Attempts: 214

SettingsSettingsSettings
Final Computer Network Quiz - Quiz

Computer networking is a branch of information technology, which studies the interconnection of several computers working together. Are you a networks guru? Take the quiz below and see how well informed you are. All the best.


Questions and Answers
  • 1. 

    What is a function of the distribution layer in the hierarchical design model?

    • A.

      To provide latency free switching

    • B.

      To organize end devices in small manageable groups to provide connectivity using the high-speed backbone

    • C.

      To organize end devices in small manageable groups

    • D.

      To provide connectivity between smaller local networkstion 4

    Correct Answer
    D. To provide connectivity between smaller local networkstion 4
    Explanation
    The distribution layer in the hierarchical design model is responsible for providing connectivity between smaller local networks. This layer acts as an intermediary between the access layer (where end devices are connected) and the core layer (where high-speed backbone connections are made). By organizing end devices into small manageable groups, the distribution layer helps to optimize network performance and facilitate efficient communication between different local networks.

    Rate this question:

  • 2. 

    Under what circumstance would it be appropriate to use private IP addresses?

    • A.

      For communication between two ISPs

    • B.

      For a network that is directly connected to the Internet

    • C.

      For addresses that are used exclusively within an organization.

    • D.

      For a host with more than one direct connection to the Internet

    Correct Answer
    C. For addresses that are used exclusively within an organization.
    Explanation
    Private IP addresses are used exclusively within an organization. These addresses are not routable on the internet, which means they cannot be accessed or communicated with outside of the organization's network. Using private IP addresses ensures that the organization's internal network remains separate and secure from the public internet. It allows for efficient allocation of IP addresses within the organization and helps prevent conflicts with public IP addresses.

    Rate this question:

  • 3. 

    What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)

    • A.

      Ipconfig /release

    • B.

      Ipconfig /all

    • C.

      Ipconfig /flushdns

    • D.

      Ipconfig /renew

    • E.

      Ipconfig

    Correct Answer(s)
    A. Ipconfig /release
    D. Ipconfig /renew
    Explanation
    The correct answer is ipconfig /release and ipconfig /renew. These two commands can be used to form a new binding if client information does not agree with the DHCP client table. The ipconfig /release command releases the current IP address lease, while the ipconfig /renew command requests a new IP address lease from the DHCP server. By using these commands, the client can obtain a new IP address that matches the DHCP client table.

    Rate this question:

  • 4. 

    What type of computer would most likely use a docking station?

    • A.

      Laptop

    • B.

      Server

    • C.

      Desktop

    • D.

      Mainframe

    • E.

      Workstation

    Correct Answer
    A. Laptop
    Explanation
    A laptop would most likely use a docking station because it provides a convenient way to connect the laptop to additional peripherals such as a monitor, keyboard, and mouse. This allows the laptop to function more like a desktop computer when it is docked, providing a larger screen and more comfortable typing experience. Docking stations also often provide additional ports and connectivity options, making it easier to connect to external devices and expand the laptop's capabilities.

    Rate this question:

  • 5. 

    For an IP address, what component decides the number of bits that is used to represent the host ID?

    • A.

      Default-gateway

    • B.

      Host number

    • C.

      Network number

    • D.

      Subnet mask

    Correct Answer
    D. Subnet mask
    Explanation
    The subnet mask determines the number of bits used to represent the host ID in an IP address. The subnet mask is a 32-bit value that is used to divide the IP address into network and host portions. The network portion is determined by the bits set to 1 in the subnet mask, while the host portion is determined by the bits set to 0. By changing the subnet mask, the number of bits allocated for the host ID can be adjusted, allowing for more or fewer hosts on a network.

    Rate this question:

  • 6. 

    What type of cable would be required to connect a Linksys router to a wired PC?

    • A.

      Crossover cable

    • B.

      Rollover cable

    • C.

      Serial cable

    • D.

      Straight-through cable

    Correct Answer
    A. Crossover cable
    Explanation
    A crossover cable would be required to connect a Linksys router to a wired PC. A crossover cable is used to directly connect two devices of the same type, such as a router and a PC, without the need for a switch or hub. This type of cable allows the devices to communicate and share data effectively.

    Rate this question:

  • 7. 

    A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?

    • A.

      Ping

    • B.

      Netstat

    • C.

      Tracert

    • D.

      Ipconfig

    • E.

      Nslookup

    Correct Answer
    A. Ping
    Explanation
    The correct answer is not ping, but rather netstat. The netstat command line utility in Windows can be used to confirm multiple TCP connections. It displays active network connections, listening ports, and other network statistics.

    Rate this question:

  • 8. 

    A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?

    • A.

      802.11

    • B.

      802.11a

    • C.

      802.11b

    • D.

      802.11g

    Correct Answer
    B. 802.11a
    Explanation
    The correct answer is 802.11a. This standard operates on a frequency of 5 GHz, which allows for a faster data transfer rate compared to the other options. It has a range of up to 80 meters, meeting the specified requirement. 802.11b and 802.11g operate on a frequency of 2.4 GHz, which can have interference from other devices and may not provide the desired speed. 802.11 is a general term that encompasses all the different standards, so it does not meet the specific requirements mentioned.

    Rate this question:

  • 9. 

    Which of the following statements best describes DNS?

    • A.

      DNS servers are used to map an IP address to a physical address.

    • B.

      DNS servers are used to map a name to an IP address.

    • C.

      DNS servers are used to configure logical address information for host computers.

    • D.

      DNS servers are used to translate from private addresses to public addresses.

    Correct Answer
    B. DNS servers are used to map a name to an IP address.
    Explanation
    DNS (Domain Name System) is a system that translates domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) that computers can understand. It acts as a directory or phonebook for the internet, allowing users to access websites and other resources by typing in a domain name instead of remembering the IP address. Therefore, the statement "DNS servers are used to map a name to an IP address" accurately describes the function of DNS servers.

    Rate this question:

  • 10. 

    A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?

    • A.

      Ping

    • B.

      Tracert

    • C.

      Netstat

    • D.

      Ipconfig

    • E.

      Nslookup

    Correct Answer
    E. Nslookup
    Explanation
    Nslookup is a utility that can be used to directly query a name server for information on a destination domain. It allows the network administrator to retrieve information such as IP addresses, hostnames, and other DNS records associated with a domain. By using nslookup, the administrator can troubleshoot network connectivity issues and identify any problems with the DNS resolution process.

    Rate this question:

  • 11. 

    What is the purpose of pop-up blocker software?

    • A.

      It detects and removes spyware.

    • B.

      It detects and removes viruses.

    • C.

      It prevents the display of advertisement windows.

    • D.

      It removes unwanted e-mail.

    Correct Answer
    C. It prevents the display of advertisement windows.
    Explanation
    Pop-up blocker software is designed to prevent the display of advertisement windows. These windows often appear as pop-ups while browsing the internet and can be intrusive and disruptive to the user experience. By blocking these pop-ups, the software helps to create a more seamless and uninterrupted browsing experience for the user. It does not detect or remove spyware, viruses, or unwanted emails, as those tasks are typically handled by other types of security software.

    Rate this question:

  • 12. 

    What data communication technology uses low-power radio waves to transmit data?

    • A.

      Copper cable

    • B.

      Fiber optic cable

    • C.

      Wireless

    • D.

      Radio

    Correct Answer
    C. Wireless
    Explanation
    Wireless technology uses low-power radio waves to transmit data. It allows devices to communicate without the need for physical cables or wires. This technology is commonly used in various applications such as Wi-Fi, Bluetooth, and cellular networks. Wireless communication is convenient, flexible, and widely used in modern devices like smartphones, laptops, and IoT devices.

    Rate this question:

  • 13. 

    What are two examples of peripheral input devices? (Choose two.) external modem

    • A.

      Barcode reader

    • B.

      Digital camera

    • C.

      Plotter

    • D.

      Printer

    Correct Answer(s)
    A. Barcode reader
    B. Digital camera
    Explanation
    A barcode reader is a peripheral input device that is used to scan and read barcodes. It captures the information encoded in the barcode and sends it to a computer or another device. A digital camera is also a peripheral input device that captures and records images or videos. It can be connected to a computer or other devices to transfer the captured media files. Both of these devices serve as input devices by providing data or information to a computer or system.

    Rate this question:

  • 14. 

    Which portion of the packet does a router use to forward the packet to the destination?

    • A.

      Source IP address

    • B.

      User data

    • C.

      Destination IP address

    • D.

      Control information

    • E.

      Destination MAC address

    Correct Answer
    C. Destination IP address
    Explanation
    A router uses the destination IP address to forward the packet to the destination. The destination IP address is a unique identifier assigned to the destination device on the network. When a packet arrives at a router, the router examines the destination IP address in the packet header and checks its routing table to determine the next hop for the packet. The router then forwards the packet to the appropriate interface towards the destination based on this information.

    Rate this question:

  • 15. 

    Which two statements are true about local applications? (Choose two.)

    • A.

      They run on the network.

    • B.

      An example of a local application is e-mail.

    • C.

      They are accessed from a remote computer.

    • D.

      They are stored on the local hard disk.

    • E.

      They run on the computer where they are installed.

    Correct Answer(s)
    C. They are accessed from a remote computer.
    E. They run on the computer where they are installed.
    Explanation
    Local applications are accessed from a remote computer, meaning they can be accessed and used from a different computer than the one where the application is installed. Additionally, local applications run on the computer where they are installed, indicating that they are executed and operated on the same computer where they are installed.

    Rate this question:

  • 16. 

    Which three address ranges can be used to depict private IP addresses? (Choose three.)

    • A.

      10.0.0.0 to 10.0.0.255

    • B.

      127.16.0.0 to 127.16.255.255

    • C.

      150.150.0.0 to 150.150.255.255

    • D.

      172.16.1.0 to 172.16.1.255

    • E.

      192.168.22.0 to 192.168.22.255

    • F.

      200.100.50.0 to 200.100.50.255

    Correct Answer(s)
    A. 10.0.0.0 to 10.0.0.255
    D. 172.16.1.0 to 172.16.1.255
    E. 192.168.22.0 to 192.168.22.255
    Explanation
    The three address ranges that can be used to depict private IP addresses are 10.0.0.0 to 10.0.0.255, 172.16.1.0 to 172.16.1.255, and 192.168.22.0 to 192.168.22.255. These address ranges are reserved for private networks and are not routable on the internet. They are commonly used in home and small office networks for internal communication.

    Rate this question:

  • 17. 

     Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?

    • A.

      Increase the AP radio signal strength.

    • B.

      Place the AP in a more central location.

    • C.

      Deploy an external omni-directional antenna.

    • D.

      Reduce the number of devices using each channel.

    Correct Answer
    D. Reduce the number of devices using each channel.
    Explanation
    To improve the user experience on the WLAN, reducing the number of devices using each channel is the correct answer. By doing so, the available bandwidth per user will increase as there will be less congestion on the network. This will result in better performance and fewer complaints from users. Increasing the AP radio signal strength may not be effective as it can lead to interference and overlapping of signals. Placing the AP in a more central location can help with coverage but may not directly address the issue of bandwidth per user. Deploying an external omni-directional antenna can also improve coverage but may not solve the problem of limited bandwidth.

    Rate this question:

  • 18. 

    How does a straight-through cable connect two unlike devices?

    • A.

      It connects the receive pins on the first device to the receive pins on the second device.

    • B.

      It connects the transmit pins on the first device to the receive pins on the second device.

    • C.

      It disconnects the transmit pins and uses only the receive pins.

    • D.

      It uses the same pins for transmitting and receiving.

    Correct Answer
    D. It uses the same pins for transmitting and receiving.
    Explanation
    A straight-through cable connects two unlike devices by using the same pins for transmitting and receiving. This means that the transmit pins on one device are connected to the corresponding transmit pins on the other device, and the receive pins on one device are connected to the corresponding receive pins on the other device. This allows for bidirectional communication between the two devices.

    Rate this question:

  • 19. 

    TCP/IP data transmission between the source and destination host is encapsulated in four steps:  A. adds the data-link header and trailer;  B. converts data to bits for transmission;  C. adds the network IP address to the header of the packet;  D. segments the data for end-to-end transport.  What is the correct sequence of these steps?

    • A.

      A, B, C, D

    • B.

      A, D, B, C

    • C.

      B, D, A, C

    • D.

      D, C, A, B

    • E.

      D, C, B, A

    Correct Answer
    D. D, C, A, B
    Explanation
    The correct sequence of steps for TCP/IP data transmission is as follows: first, the data is segmented for end-to-end transport (D). Then, the network IP address is added to the header of the packet (C). After that, the data-link header and trailer are added (A). Finally, the data is converted to bits for transmission (B).

    Rate this question:

  • 20. 

    When are leased lines typically used?

    • A.

      When low bandwidth is required

    • B.

      For home and small business connectivity

    • C.

      When a dedicated digital data line is necessary

    • D.

      As a less expensive option to cable and DSL modem service

    Correct Answer
    C. When a dedicated digital data line is necessary
    Explanation
    Leased lines are typically used when a dedicated digital data line is necessary. Leased lines provide a dedicated connection between two points, ensuring consistent and reliable data transmission. This makes them suitable for applications that require high bandwidth, low latency, and secure connectivity, such as large businesses, data centers, and institutions. Leased lines are not typically used for low bandwidth requirements or as a less expensive alternative to cable and DSL modem services.

    Rate this question:

  • 21. 

    What are two ways that a user can interact with an operating system shell? (Choose two.)

    • A.

      CLI

    • B.

      OS

    • C.

      GUI

    • D.

      NIC

    • E.

      Kernel

    Correct Answer(s)
    A. CLI
    C. GUI
    Explanation
    A user can interact with an operating system shell through two ways: CLI (Command Line Interface) and GUI (Graphical User Interface). CLI allows the user to interact with the operating system by typing commands into a text-based interface, while GUI provides a visual interface with icons, menus, and windows that allow the user to interact with the operating system using a mouse or touch input. Both CLI and GUI offer different ways for users to interact with the operating system based on their preferences and requirements.

    Rate this question:

  • 22. 

    Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?

    • A.

      Router R1 has no route to the destination network.

    • B.

      Switch S1 does not have an IP address configured.

    • C.

      The link between router R1 and switch S2 has failed.

    • D.

      Host H1 does not have a default gateway configured.

    Correct Answer
    D. Host H1 does not have a default gateway configured.
    Explanation
    Host H1 does not have a default gateway configured. This means that H1 does not know where to send packets that are destined for networks outside of its own network. Without a default gateway, H1 is unable to send packets to other networks, such as the networks that H4 and H5 are on. This explains why H1 can ping H2, H3, and the Fa0/0 interface of router R1 (which are all on the same network), but cannot ping H4 and H5 (which are on different networks).

    Rate this question:

  • 23. 

    After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?

    • A.

      Replace the NIC in the host.

    • B.

      Change the IP address of the DHCP server.

    • C.

      Use static addressing to assign the correct IP address.

    • D.

      Use the release and renew options supported by the ipconfig command.

    Correct Answer
    D. Use the release and renew options supported by the ipconfig command.
    Explanation
    The first step the administrator should take to resolve the issue of faulty IP configuration information is to use the release and renew options supported by the ipconfig command. This will release the current IP address lease from the DHCP server and then attempt to renew it, allowing the host to obtain a new and correct IP configuration from the DHCP server. This process can help resolve any issues with the current IP configuration and ensure that the host has the correct IP address assigned.

    Rate this question:

  • 24. 

    When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?

    • A.

      To allow the cable to endure more stretching or twisting

    • B.

      To ensure good electrical contact

    • C.

      To ensure that the wires are in correct order

    • D.

      To minimize crosstalk

    Correct Answer
    B. To ensure good electrical contact
    Explanation
    It is important to push the wires all the way into the end of the connector to ensure good electrical contact. By doing so, the wires make full contact with the metal contacts within the connector, allowing for a strong and reliable electrical connection. If the wires are not pushed all the way in, there may be gaps or loose connections, which can result in poor signal transmission or even complete failure of the connection.

    Rate this question:

  • 25. 

    Which network design layer provides a connection point for end user devices to the network?

    • A.

      Access

    • B.

      Core

    • C.

      Distribution

    • D.

      Network

    Correct Answer
    D. Network
    Explanation
    The access layer in network design provides a connection point for end user devices to the network. This layer is responsible for connecting end devices such as computers, printers, and phones to the network infrastructure. It includes switches and wireless access points that allow these devices to connect and communicate with each other and with the rest of the network.

    Rate this question:

  • 26. 

    All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?

    • A.

      Broadcast

    • B.

      Collision

    • C.

      Local

    • D.

      Multicast

    Correct Answer
    A. Broadcast
    Explanation
    This is a broadcast domain. In a broadcast domain, all hosts within the domain receive the same frame that originates from one of the devices. The domain is bounded by routers, meaning that the broadcast traffic is contained within the boundaries of the routers.

    Rate this question:

  • 27. 

    Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?

    • A.

      Authentication

    • B.

      DHCP

    • C.

      Encryption

    • D.

      Firewall

    • E.

      NAT

    • F.

      WEP

    Correct Answer
    E. NAT
    Explanation
    NAT (Network Address Translation) should be activated on the Linksys integrated router to achieve the goal of connecting PC systems that use private IP addressing to the Internet using only one public IP address. NAT allows the router to translate the private IP addresses of the PC systems to the public IP address when communicating with the Internet. This allows multiple systems to share the same public IP address and access the Internet simultaneously.

    Rate this question:

  • 28. 

    Which three statements describe an IP address? (Choose three.)

    • A.

      An IP address is known as a logical address.

    • B.

      An IP address uses a 30-bit addressing scheme.

    • C.

      An IP address is found in the Layer 2 header during transmission.

    • D.

      The network portion of an IP address is burned into a network interface card.

    • E.

      An IP address is unique within the same local network.

    • F.

      The network portion of an IP address will be the same for all hosts that are connected to the same local network.

    Correct Answer(s)
    A. An IP address is known as a logical address.
    E. An IP address is unique within the same local network.
    F. The network portion of an IP address will be the same for all hosts that are connected to the same local network.
    Explanation
    An IP address is known as a logical address because it is assigned to devices on a network to provide a logical identification. An IP address is unique within the same local network, meaning that no two devices within the same network can have the same IP address. The network portion of an IP address will be the same for all hosts that are connected to the same local network, allowing them to communicate with each other within the network.

    Rate this question:

  • 29. 

    What is the purpose of creating a DMZ during network firewall implementation?

    • A.

      To create a server security zone accessible only to internal clients

    • B.

      To create a dirty zone that allows all inbound and outbound traffic

    • C.

      To allow for a publicly accessible zone without compromising the internal network

    • D.

      To specify a higher security level than normally required for the internal production network

    Correct Answer
    C. To allow for a publicly accessible zone without compromising the internal network
    Explanation
    The purpose of creating a DMZ (Demilitarized Zone) during network firewall implementation is to allow for a publicly accessible zone without compromising the internal network. A DMZ acts as a buffer zone between the internet and the internal network, where public-facing servers and services can be placed. By placing these servers in the DMZ, it reduces the risk of direct access to the internal network, providing an added layer of security. This allows external users to access the public services while keeping the internal network protected from potential threats.

    Rate this question:

  • 30. 

    Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)

    • A.

      MAC address

    • B.

      IP address

    • C.

      Kernel

    • D.

      Shell

    • E.

      Subnet mask

    Correct Answer(s)
    B. IP address
    E. Subnet mask
    Explanation
    The correct answer is IP address and subnet mask. IP address is a unique numerical label assigned to each device in a network, allowing it to be identified and communicate with other devices. Subnet mask is used to determine the network and host portions of an IP address, enabling proper routing of data packets within a network. Both IP address and subnet mask are configured via software to enable a PC to participate in a network environment.

    Rate this question:

  • 31. 

    A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

    • A.

      DSL

    • B.

      Dial-up

    • C.

      Satellite

    • D.

      Cell modem

    • E.

      Cable modem

    Correct Answer
    B. Dial-up
    Explanation
    Dial-up is not the correct answer for a home user looking for high-speed digital transmission over regular phone lines. Dial-up connections use analog signals and are much slower compared to DSL, cable modem, or satellite connections. DSL, on the other hand, uses digital signals and provides high-speed internet access over regular phone lines, making it the appropriate choice for the given scenario.

    Rate this question:

  • 32. 

    Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

    • A.

      Acceptable use

    • B.

      Incident handling

    • C.

      Network maintenance

    • D.

      Remote access

    Correct Answer
    D. Remote access
    Explanation
    The security policy described in the exhibit is a remote access policy. This policy allows employees to connect to the office intranet from their homes, indicating that it is focused on providing secure access to the network remotely. Remote access policies typically outline the rules and procedures for connecting to a network from outside the organization's physical location, ensuring that the connection is secure and authorized.

    Rate this question:

  • 33. 

    In IP telephony, what is the purpose of a gateway to the PSTN?

    • A.

      To connect IP voice clients to Internet phone service

    • B.

      To create a peer-to-peer connection between two IP voice clients

    • C.

      To map unique names of IP voice endpoints to a client list on a voice serverto map unique names of IP voice endpoints to a client list on a voice server

    • D.

      To allow IP voice clients to communicate with regular analog telephones.

    Correct Answer
    D. To allow IP voice clients to communicate with regular analog telephones.
    Explanation
    The purpose of a gateway to the PSTN in IP telephony is to allow IP voice clients to communicate with regular analog telephones. This means that the gateway acts as a bridge between the IP network and the traditional Public Switched Telephone Network (PSTN), enabling the conversion of IP-based voice signals into analog signals that can be understood by analog telephones. This allows IP voice clients to make and receive calls to and from regular analog telephones, expanding their communication capabilities beyond the IP network.

    Rate this question:

  • 34. 

    Which two causes of networking problems are related to the physical layer? (Choose two.)

    • A.

      Damaged cables and connectors

    • B.

      Incorrect addressing

    • C.

      Incorrect subnet mask

    • D.

      Overheated components

    • E.

      Incorrect default gateway

    Correct Answer(s)
    A. Damaged cables and connectors
    D. Overheated components
    Explanation
    The physical layer of a network is responsible for the actual transmission of data through cables and connectors. Damaged cables and connectors can result in a loss of connectivity or a decrease in network performance. Overheated components can also cause networking problems as they can lead to system failures or intermittent connectivity issues. Both of these causes directly affect the physical infrastructure of the network, making them related to the physical layer. Incorrect addressing, incorrect subnet mask, and incorrect default gateway are all related to the network layer, not the physical layer.

    Rate this question:

  • 35. 

    Which device is often configured to act as both a DHCP client and a DHCP server?

    • A.

      Home PC

    • B.

      ISP modem

    • C.

      Wireless-enabled laptop

    • D.

      Integrated services router

    Correct Answer
    C. Wireless-enabled laptop
    Explanation
    A wireless-enabled laptop is often configured to act as both a DHCP client and a DHCP server. This means that it can obtain an IP address from a DHCP server when connected to a network, and it can also assign IP addresses to other devices connected to its own network. This functionality is useful in situations where multiple devices need to connect to the internet through the laptop's wireless connection, allowing the laptop to act as a central hub for network connectivity.

    Rate this question:

  • 36. 

    Which adapter card would be required for a PC to exchange information with other PCs on a LAN?

    • A.

      NIC

    • B.

      Video card

    • C.

      Sound card

    • D.

      Internal modem

    Correct Answer
    A. NIC
    Explanation
    A Network Interface Card (NIC) is required for a PC to exchange information with other PCs on a Local Area Network (LAN). This card allows the PC to connect to the LAN and communicate with other devices on the network. The video card is responsible for rendering graphics on the PC's display, the sound card is responsible for audio output/input, and an internal modem allows the PC to connect to the internet via a telephone line. However, none of these cards are specifically designed for LAN communication like a NIC.

    Rate this question:

  • 37. 

    Which protocol is used to transfer files among network devices and perform file-management functions?

    • A.

      DNS

    • B.

      FTP

    • C.

      HTML

    • D.

      HTTP

    Correct Answer
    B. FTP
    Explanation
    FTP (File Transfer Protocol) is the correct answer because it is a protocol used to transfer files among network devices and perform file management functions. DNS (Domain Name System) is used to translate domain names into IP addresses. HTML (Hypertext Markup Language) is a markup language used for creating web pages. HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting hypertext over the internet. None of these protocols specifically deal with file transfer and file management functions like FTP does.

    Rate this question:

  • 38. 

    What is true about a wireless access point that is equipped with an omnidirectional antenna?

    • A.

      Concentrates signal in one direction

    • B.

      Typically used in bridging applications

    • C.

      Radiates the signal equally in all directions

    • D.

      Provides the greatest transmission distance of all antenna types that are used by APs

    Correct Answer
    D. Provides the greatest transmission distance of all antenna types that are used by APs
    Explanation
    A wireless access point equipped with an omnidirectional antenna radiates the signal equally in all directions. This means that the signal coverage is spread out in a circular pattern around the access point, providing coverage in all directions. This type of antenna is commonly used in situations where the goal is to provide coverage to a wide area, such as in large open spaces or outdoor environments. While it provides good coverage in all directions, it may not necessarily provide the greatest transmission distance compared to other types of antennas used by access points.

    Rate this question:

  • 39. 

    What is a weakness of WEP that is solved by WPA?

    • A.

      WEP is a proprietary standard whereas WPA is an open standard.

    • B.

      WEP keys are only 64 bits long whereas WPA keys are 128 bits long.

    • C.

      WEP uses the same key for every connection whereas WPA uses a different key for each connection.

    • D.

      WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.

    Correct Answer
    D. WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.
    Explanation
    WEP's weakness that is solved by WPA is the use of a fixed length key for every connection. WPA, on the other hand, uses a different key length for each connection, making it more secure against attacks. By using different key lengths, WPA makes it harder for attackers to crack the encryption and gain unauthorized access to the network. This improvement in key length adds an extra layer of security to WPA compared to WEP.

    Rate this question:

  • 40. 

    Which statement is true concerning stateful packet inspection?

    • A.

      Access is permitted based on IP addresses of the source and destination devices.

    • B.

      Access is permitted based on the MAC addresses of the source and destination devices.

    • C.

      Access is permitted only if the type of application that is attempting to reach the internal host is allowed.

    • D.

      Access is permitted only if it is a legitimate response to a request from an internal host.

    Correct Answer
    D. Access is permitted only if it is a legitimate response to a request from an internal host.
    Explanation
    Stateful packet inspection is a firewall technology that examines the state of a packet in relation to previous packets in the same session. It keeps track of the state of network connections and only allows access if the packet is a legitimate response to a request from an internal host. This means that the firewall will not allow any incoming packets unless they are in response to a request initiated from within the internal network. It helps to prevent unauthorized access and ensures that only legitimate traffic is allowed into the network.

    Rate this question:

  • 41. 

    A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?

    • A.

      WLAN LED

    • B.

      Power LED

    • C.

      Internet LED

    • D.

      1-4 Ethernet LEDs

    Correct Answer
    D. 1-4 Ethernet LEDs
    Explanation
    The main concern in this situation should be the 1-4 Ethernet LEDs. Since the ping command from the wireless laptop to the wired PC in the LAN is successful, it indicates that the local network connection is working fine. However, the nslookup command fails to resolve a website address, suggesting that there might be an issue with the internet connection. By analyzing the 1-4 Ethernet LEDs on the Linksys router, the user can determine if there is any activity or connectivity problem with the wired connections, which could be causing the internet connectivity issue.

    Rate this question:

  • 42. 

    Some new features are available for the OS that is currently running on a user’s PC. What method should be chosen so that the user can install these new feature sets?

    • A.

      Clean install

    • B.

      Multi-boot

    • C.

      Upgrade

    • D.

      Virtualization

    Correct Answer
    C. Upgrade
    Explanation
    The correct answer is "upgrade". When new features are available for the operating system running on a user's PC, the recommended method to install these new feature sets is through an upgrade. This involves updating the existing operating system to a newer version that includes the new features. Unlike a clean install, an upgrade preserves the user's existing settings, files, and applications. Multi-boot refers to having multiple operating systems installed on the same PC, while virtualization involves running multiple operating systems simultaneously on a virtual machine.

    Rate this question:

  • 43. 

    What does the term "attenuation" mean in data communication?

    • A.

      Loss of signal strength as distance increases

    • B.

      Time for a signal to reach its destination

    • C.

      Leakage of signals from one cable pair to another

    • D.

      Strengthening of a signal by a networking device

    Correct Answer
    A. Loss of signal strength as distance increases
    Explanation
    Attenuation refers to the loss of signal strength as distance increases in data communication. As signals travel over a distance, they experience a decrease in amplitude, resulting in a weaker signal. This can lead to errors and degradation of the transmitted data. Therefore, attenuation is an important factor to consider when designing and implementing communication systems, as it can impact the quality and reliability of the transmitted signals.

    Rate this question:

  • 44. 

    After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?

    • A.

      Switch

    • B.

      ISR router

    • C.

      Firewall appliance

    • D.

      Standalone wireless access point

    Correct Answer
    C. Firewall appliance
    Explanation
    A firewall appliance is a network device that includes all of the described features. It can provide connectivity for multiple PCs through switch ports and WLAN, allow configuration of SSID and authentication properties, and also include firewall functionality to protect the network from unauthorized access when connected to the Internet.

    Rate this question:

  • 45. 

    Which two issues can cause connectivity problems on a wireless network?  (Choose two.)

    • A.

      Incorrect SSID

    • B.

      Broadcast SSID

    • C.

      Overlapping channels

    • D.

      Low number of clients in BSS

    • E.

      802.11b clients attempting connection to 802.11g APs

    Correct Answer(s)
    B. Broadcast SSID
    C. Overlapping channels
    Explanation
    Broadcasting the SSID can cause connectivity problems on a wireless network because it allows anyone within range to see and potentially connect to the network, increasing the risk of unauthorized access and congestion. Overlapping channels can also cause connectivity problems as they can interfere with each other, resulting in signal degradation and slower network speeds.

    Rate this question:

  • 46. 

    A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?

    • A.

      Netstat

    • B.

      Tracert

    • C.

      Ipconfig

    • D.

      Nslookup

    Correct Answer
    B. Tracert
    Explanation
    The correct answer is tracert because the tracert command is used to trace the route that packets take from the local PC to a remote device. By using this command, it is possible to determine the specific point at which the connection failed, helping to identify any network issues or misconfigurations that may be causing the lack of response from the remote device.

    Rate this question:

  • 47. 

    What is the default subnet mask for an IP address of 64.100.19.14?

    • A.

      255.0.0.0

    • B.

      255.255.0.0

    • C.

      255.255.255.0

    • D.

      255.255.255.255

    Correct Answer
    A. 255.0.0.0
    Explanation
    The default subnet mask for an IP address of 64.100.19.14 is 255.0.0.0. This is because the IP address falls within the range of Class A addresses, which have a default subnet mask of 255.0.0.0.

    Rate this question:

  • 48. 

    Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?

    • A.

      Broadcast

    • B.

      Multicast

    • C.

      Simulcast

    • D.

      Unicast

    Correct Answer
    D. Unicast
    Explanation
    Host A sends a unicast message. Unicast is a type of communication where a message is sent from one sender to a specific recipient. In this case, the user on host A is sending an email to the user on host B, indicating that the message is intended for a single recipient.

    Rate this question:

  • 49. 

    Refer to the graphic. Based on the information that is shown, what statement is true?

    • A.

      This configuration would be commonly found in an ad hoc wireless network.

    • B.

      Any wireless client that is attached to this access point would have the same IP address and SSID.

    • C.

      All wireless devices that are connected to this access point must have an assigned SSID of Academy.

    • D.

      In addition to accepting wireless client requests, this access point must connect to the wired network.

    Correct Answer
    C. All wireless devices that are connected to this access point must have an assigned SSID of Academy.
    Explanation
    The given configuration shows that all wireless devices connected to this access point must have the same SSID of "Academy". This means that any device wanting to connect to this access point must have its SSID set to "Academy" in order to establish a connection.

    Rate this question:

  • 50. 

    A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)

    • A.

      0

    • B.

      1

    • C.

      2

    • D.

      A

    • E.

      F

    Correct Answer(s)
    A. 0
    B. 1
    Explanation
    Binary format is a base-2 number system that uses only two possible values, 0 and 1, to represent data. These values are commonly used in computer systems to represent and manipulate information at the most fundamental level. The other options, 2, A, and F, are not valid in binary format as they exceed the range of possible values.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.