Q1. HOTSPOT
Identify the network cable type and connector in the following graphic:
Use the drop-down menus to select the answer choice that answers each question. Each correct selection is worth one point.
Answer:
Q2. Which type of network is most vulnerable to intrusion?
A. Dial-up
B. Wireless
C. Broadband
D. Leased line
Answer: B
Q3. This question requires that you evaluate the underlined text to determine if it is correct.
IPSec policies for two machines on a LAN can be modified by using the IPSec policy snap-in on Windows 7.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Windows Firewall with Advanced Security snap-in
B. LAN adapter properties
C. Remote Access snap-in
D. No change is needed
Answer: A
Q4. The query protocol used to locate resources on a network is:
A. User Datagram Protocol (UDP).
B. Lightweight Directory Access Protocol (LDAP),
C. Tracert
D. Telnet.
Answer: B
Q5. This question requires that you evaluate the underlined text to determine if it is correct.
Each IPv4 address consists of a MAC address and data-link laver address.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
A. Network ID and a host ID
B. DNS record and a default route
C. 64-bit binary number divided into octets
D. No change is needed
Answer: A
Q6. Which of these addresses is a multicast address?
A. 127.0.0.1
B. 169.254.0.1
C. 192.168.0.1
D. 224.0.0.1
Answer: D
Q7. DRAG DROP
Match the networking topologies to their corresponding characteristics.
To answer, drag the appropriate topology from the column on the left to its characteristic on the right. Each topology may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q8. DRAG DROP
Match the VPN connection type to the corresponding definition.
To answer, drag the appropriate VPN term from the column on the left to its definition on the right. Each term may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q9. What are three characteristics of Ethernet network topology? (Choose three.)
A. It uses tokens to avoid collisions on the network.
B. It can use coaxial, twisted pair, and fiber optic media.
C. It comprises the largest share of the networks in place today.
D. It is a non-switching protocol.
E. It can negotiate different transmission speeds.
Answer: A,B,D
Q10. Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)
A. Token ring
B. Ethernet
C. Dial-up
D. Leased line
Answer: C,D
Q11. A node within a local area network (LAN) must have a network interface device and a:
A. Network account
B. Table of all network nodes
C. Host address
D. Resource to share
Answer: C
Q12. DRAG DROP
Match the OSI layer to its corresponding description.
To answer, drag the appropriate OSI layer from the column on the left to its description on the right. Each OSI layer may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q13. The default port used for SMTP is:
A. 23
B. 25
C. 80
D. 8080
Answer: B
Q14. The maximum throughput of an 802.llg network is:
A. 2.4 GHz.
B. 54 GHz.
C. 2.4 Mbps
D. 54 Mbps.
Answer: D
Q15. Which network device interconnects computers in a workgroup, is able to be remotely configured, and provides the best throughput?
A. Unmanaged switch
B. Hub
C. Router
D. Managed switch
Answer: A