Review Quiz - Module 12

31 Questions | Total Attempts: 43

Settings
Please wait...
Module Quizzes & Trivia

This is a review.


Questions and Answers
  • 1. 
    A computer network consists of:
    • A. 

      Two or more computers that are able to communicate with each other.

    • B. 

      A router.

    • C. 

      An AT&T Home Networking CPE.

    • D. 

      At least 20 computers and a switch.

  • 2. 
    Most computer networks handle communications using which of the following protocols:
    • A. 

      Internet Protocol (IP)

    • B. 

      Hypertext Transfer Protocol (HTTP)

    • C. 

      Post Office Protocol 3 (POP3)

    • D. 

      File Transfer Protocol (FTP)

  • 3. 
    Networked computers can share:
    • A. 

      Files and other network resources.

    • B. 

      An IP address.

    • C. 

      A power cable.

    • D. 

      A MAC address.

  • 4. 
    Which of the following is assigned by the AT&T network?
    • A. 

      The WAN IP used by a customer's network.

    • B. 

      The customer's DSL password.

    • C. 

      The MAC address used by the customer's computer.

    • D. 

      The LAN IP used by the customer's computer.

  • 5. 
    Which of the following is assigned by the customer's CPE?
    • A. 

      The LAN IP used by the customer's computer.

    • B. 

      The customer's DSL password.

    • C. 

      The MAC address used by the customer's computer.

    • D. 

      The WAN IP used by the customer's network.

  • 6. 
    Which of the following IS NOT an AT&T Home Networking CPE?
    • A. 

      Motorola 2210

    • B. 

      2Wire 2701

    • C. 

      Netopia 3347NWG

    • D. 

      2Wire 2701

  • 7. 
    The Netopia 3347NWG and the Motorola 3347-02:
    • A. 

      Are the same device.

    • B. 

      Have a different number of Ethernet ports.

    • C. 

      Are different in terms of their wireless and IP mapping capabilities.

    • D. 

      Are distinguishable by the color of the casing, the NWG is gray while the 02 is black.

  • 8. 
    You can reset 2Wire CPE passwords by:
    • A. 

      Using the hard reset button

    • B. 

      Logging into the Management console and clicking the "Reset My Password" link.

    • C. 

      Using CMS

    • D. 

      Using Remote Control to assist the customer with the task.

  • 9. 
    Powerline adapters are used to…
    • A. 

      Network devices over a home's existing electrical wiring.

    • B. 

      Recharge laptop computers and other devices.

    • C. 

      Connect devices to a wireless network.

    • D. 

      Power AT&T CPE using different types of electrical outlets.

  • 10. 
    Which kind of 3D-Reach adapter is typically used with laptop computers without a built-in wireless card?
    • A. 

      The 3D-Reach PCMCIA wireless adapter.

    • B. 

      The black 3D-Reach USB wireless adapter.

    • C. 

      The blue 3D-Reach USB wireless adapter.

    • D. 

      Any of them. Any of them. Any of them.

  • 11. 
    You can distinguish 1st and 2nd generation 3D-Reach USB adapters by:
    • A. 

      Their color and model number.

    • B. 

      Their shape.

    • C. 

      They type of connector they use.

    • D. 

      The printed logo on the device.

  • 12. 
    For customers who do not have a wireless adapter built in what brand will AT&T provide:
    • A. 

      Netopia

    • B. 

      Belkin

    • C. 

      Cisco

    • D. 

      AT&T

  • 13. 
    If the custome needs assistance with the configuration of a third party network device
    • A. 

      Refer customer to SupportPlus

    • B. 

      Transfer customer to BBCCA

    • C. 

      Assist the customer with bridging the device

    • D. 

      Escalate issue to your manager

  • 14. 
    Which of the following IS NOT required to establish a wireless network connection?
    • A. 

      A wireless telephone.

    • B. 

      A wireless CPE.

    • C. 

      A wireless network adapter.

    • D. 

      A wireless client.

  • 15. 
    Wireless networks present added security risks because:
    • A. 

      Users don't need physical access to the equipment in order to use the network.

    • B. 

      They do not encrypt signals like wired networks do.

    • C. 

      There is no way to prevent users from accessing the network.

    • D. 

      More users are allowed on the network at one time.

  • 16. 
    True or false:  WPA-PSK encryption is more secure than WEP encryption.
    • A. 

      True

    • B. 

      False

  • 17. 
    What color is the 1st generation Netopia 3D-Reach USB adapter?
    • A. 

      Clear blue.

    • B. 

      Clear gray.

    • C. 

      Charcoal.

    • D. 

      Purple.

  • 18. 
    What color is the 2nd generation Netopia 3D-Reach USB adapter?
    • A. 

      Charcoal.

    • B. 

      Clear green.

    • C. 

      Clear yellow.

    • D. 

      Clear blue.

  • 19. 
    Uninstalling 3D-Reach wireless adapters can be accomplished by:
    • A. 

      Unistalling the device drivers from the Device Manager.

    • B. 

      Removing the corresponding entry from the Add/Remove Programs window in the Control Panel.

    • C. 

      Deleting the c:\Program Files\Netopia\ folder.

    • D. 

      Using System Restore to restore to a time before the device was installed.

  • 20. 
    To connect to a hidden wireless network with the Windows wireless client, one must:
    • A. 

      Enter the network information in the client's Advanced Settings window.

    • B. 

      Click the "Add New Network" button on the client's main window.

    • C. 

      Simply click on the network name, enter the encryption key, and then connect.

    • D. 

      Simply click on the network name and connect.

  • 21. 
    The first step for all wireless network troubleshooting is:
    • A. 

      Making sure that the network is within proper range of the device that is trying to connect.

    • B. 

      Re-entering all wireless network settings in the client.

    • C. 

      Reinstalling the wireless adapter.

    • D. 

      Reconfiguring the CPE.

  • 22. 
    When a CPE allows access through specified ports in their firewall, this is called:
    • A. 

      Port forwarding.

    • B. 

      IP passthrough.

    • C. 

      Wireless networking.

    • D. 

      File and print sharing.

  • 23. 
    When a CPE is set up to allow traffic to all ports on its network, this is called:
    • A. 

      IP passthrough.

    • B. 

      Port forwarding.

    • C. 

      File and print sharing.

    • D. 

      Wireless networking.

  • 24. 
    File and print sharing CANNOT be used to:
    • A. 

      Allow traffic through specific ports in the CPE firewall.

    • B. 

      Map a shared resource to a network drive.

    • C. 

      Print a document on a printer that is attached to another device on the network.

    • D. 

      Access files from one network computer from a second networked computer.

  • 25. 
    Which one of these IS NOT a step necessary to view shared files on another device connected to the network?
    • A. 

      Forward the required ports through the CPE firewall.

    • B. 

      Access the shared folder from another network computer.

    • C. 

      Manually allow sharing for the folder that you wish to share.

    • D. 

      Set up a workgroup.

  • 26. 
    File and print sharing works best when both computers are:
    • A. 

      On the same workgroup.

    • B. 

      On the same Internet service provider.

    • C. 

      On the same WAN.

    • D. 

      On the same LAN.

  • 27. 
    Which of the following types of characters can be used in a workgroup name?
    • A. 

      _ (underscores) or numbers.

    • B. 

      \ and /

    • C. 

      * and "

    • D. 

      @

  • 28. 
    Which of these is not a type of permission that can be set for each type of user and in each folder?
    • A. 

      Copy and paste privileges.

    • B. 

      Read / write ability.

    • C. 

      User limit.

    • D. 

      Password protection.

  • 29. 
    Another term for port forwarding
    • A. 

      Pinholes

    • B. 

      Ip passthrough

    • C. 

      Wireless zero configuration

    • D. 

      Port security

  • 30. 
    Problems in Breakpoints 2 or 5 (on the AT&T Network side of the CPE) will cause Internet connectivity issues for:
    • A. 

      The entire network.

    • B. 

      Half of the devices on the network.

    • C. 

      None of the devices on the network.

    • D. 

      Only a single device on the network.

  • 31. 
    Problems in Breakpoint 6 (applications issues) will cause Internet connectivity issues for:
    • A. 

      Only a single device on the network.

    • B. 

      The entire network.

    • C. 

      Half of the devices on the network.

    • D. 

      None of the devices on the network.