Q1. You run the ipconfig command. The output is shown in the following image:
From these settings, you can tell that the computer:
A. Will have limited Internet access
B. Will have full Internet access
C. Will not be able to access the Internet
D. Will not be able to access the local network
Answer: A
Q2. Which command is used to verify that a server is connected to the network?
A. IPCONFIG
B. ROUTE
C. PING
D. CHECK
Answer: C
Q3. Which wireless communication problem is caused by electromagnetic waves?
A. Fading
B. Attenuation
C. Interference
D. Diffraction
Answer: C
Q4. Teredo tunneling is a protocol that:
A. Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6).
B. Allows IPv6 connectivity through IPv4 devices.
C. Provides VPN security.
D. Dynamically allocates IPv6 addresses.
Answer: B
Q5. The top-level domain ofwww.adventureworks.com is:
A. www
B. adventureworks
C. adventureworks.com
D. com
Answer: D
Q6. A computer that has an IP address of 169.254.0.1 cannot access the network.
Which of the following services should you confirm is available?
A. WINS
B. DNS
C. DHCP
D. TFTP
Answer: C
Q7. One reason to replace an unmanaged switch with a managed switch is to:
A. Manage the routing tables.
B. Support multiple VLANS.
C. Reduce collision domains.
D. Route between networks,
Answer: B
Q8. DRAG DROP
Order the layers of the OSI model:
Answer:
Q9. A cable that meets the l000BaseT standard has a maximum length of:
A. 100 m
B. 250 m
C. 500 m
D. 1,000 m
Answer: A
Q10. The command-line tool used to list a host's active incoming connections is:
A. NETSTAT
B. IPCONFIG
C. NSLOOKUP
D. PING
Answer: A
Q11. This question requires that you evaluate the underlined text to determine if it is correct.
The four IEEE standards, 802.11a, b, g, and n, are collectively known as mobile ad hoc networks.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. WiMAX
B. Bluetooth
C. WiFi
D. No change is needed
Answer: C
Q12. The default subnet mask for a Class B network is:
A. 0.0.0.255
B. 0.0.255.255
C. 255.0.0.0
D. 255.255.0.0
Answer: D
Q13. One purpose of a perimeter network is to:
A. Make resources available to the intranet.
B. Link campus area networks (CANs).
C. Link local area networks (LANs).
D. Make resources available to the Internet.
Answer: D
Q14. If a router is installed so that it separates a DHCP server from its clients, the clients will:
A. Immediately lose connectivity to all segments.
B. Be unable to obtain their leases from the server.
C. Immediately lose connectivity to the local segment.
D. Receive an immediate renewal of their lease.
Answer: B
Q15. What are two characteristics of a mesh network topology? (Choose two.)
A. It is fault tolerant because of redundant connections.
B. Every node connects to every other node on the network.
C. It works best for networks with a large number of nodes.
D. It requires less cabling than either a star or ring topology.
Answer: A,C