Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
What functions as the name of a wireless network?
a. | secure key | c. | Network ID | b. | MAC address | d. | SSID |
|
|
2.
|
What is the name of the 32-bit or 128-bit number that is used to identify a
device on a network?
a. | port number | c. | IP address | b. | protocol number | d. | IP version |
|
|
3.
|
What command can be used to flush the local DNS cache on a Windows
computer?
a. | nslookup -f | c. | dns dump | b. | ipconfig /flushdns | d. | service dnscache
restart |
|
|
4.
|
If a device does not receive an IP address from a DHCP server, the device may
resort to what kind of IP address?
a. | APIPA | c. | public IP address | b. | random IP address | d. | dynamic IP
address |
|
|
5.
|
What protocol makes a connection, checks whether the data is received, and
resends it if it is not?
|
|
6.
|
What type of IP address is configured by a server when a device first initiates
a connection to the network?
a. | default | c. | static | b. | dynamic | d. | configured |
|
|
7.
|
What wireless networking radio frequency yields faster speeds but offers shorter
range?
a. | 2.4 GHz | c. | 7 GHz | b. | 5 GHz | d. | 11 GHz |
|
|
8.
|
What device handles access to another network for a client computer if it does
not have a better option?
a. | firewall | c. | network switch | b. | default gateway | d. | network hub |
|
|
9.
|
What type of device can be used to block unwanted traffic initiated from the
Internet and can also restrict Internet access from an internal network?
a. | hub | c. | firewall | b. | switch | d. | VPN |
|
|
10.
|
Originally developed by IBM, what protocol is used by Windows to share files and
printers on a network?
a. | Server Message Block (SMB) | b. | Lightweight Directory Access Protocol
(LDAP) | c. | File Transfer Protocol (FTP) | d. | Hypertext Transfer Protocol
(HTTP) |
|
|
11.
|
The solution for securing private data traveling over a public network, such as
the Internet, is the use of what type of network?
a. | public encrypted network | c. | private encrypted
network | b. | virtual private network | d. | virtual prevention network |
|
|
12.
|
Packets are delivered to a single node on a network when using what type of IPv6
address?
a. | anycast address | c. | multicast address | b. | default gateway address | d. | unicast address |
|
|
13.
|
How are IP addresses available to the Internet classified?
a. | public | c. | non-routable | b. | private | d. | standard |
|
|
14.
|
If the computer you are using is a laptop that moves from one network to
another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP
server cannot be reached?
a. | General Configuration | c. | Secondary Configuration | b. | Alternate
Configuration | d. | Fallback
Configuration |
|
|
15.
|
What cell phone technology is the most popular in the United States?
|
|
16.
|
What TCP port is utilized by an SSH server listening for connections?
|
|
17.
|
The Remote Desktop and Remote Assistance applications utilize what port for
remote access?
|
|
18.
|
What command can be used to display IP addresses assigned to all network
connections on a system?
a. | msconfig | c. | ipconfig | b. | netstat | d. | netcfg32 |
|
|
19.
|
The ability to send and receive transmissions at the same time on an Ethernet
cable is referred to by what term?
a. | simplex mode | c. | auto transmit | b. | half duplex | d. | full duplex |
|
|
20.
|
How is the network portion and the host portion of an IP address
identified?
a. | dynamic address | c. | default gateway | b. | DHCP address | d. | subnet mask |
|