Documente Academic
Documente Profesional
Documente Cultură
#2 (LOL-08) A ________ server isolates internal clients from the servers by downloading and storing files
on behalf of the clients.
DNS
DHCP
NTP
Proxy
#3 (LO4) A computer that acts as both a client and a server is known as a _________.
Server
Client
Host
Peer
CIS150-Q9.png
Bus
Ring
Point to Point
Mesh
#6 (LO6) Which of the following network related informational items is not needed in order to install an
Operating System on a PC that will be connected to the internet?
Default Gateway
IP address
Subnet mask
Switch number
#8 (LO9) Use the ________ utility as the first step in diagnosing connectivity problems.
Tracert
Nstat
Net view
Ping
#9 (LO3) _________ cable is the most frequently used network cable because it is relatively inexpensive
and easy to install.
Shielded twisted-pair
Unshielded twisted-pair
Thin coax
Thick coax
#10 (LO7) Which Internet access method can be affected by the number of people concurrently online in
a neighborhood?
Dial-up
DSL
Cable Broadband
ISDN
#11 (LO4) A DHCP server is a server that uses software and DHCP to automatically assign a(n) ______
address from a pool of possible addresses.
MAC
LAA
IP
BIA
#12 (LO7) Which Internet access method uses existing TV coaxial cables?
Cable Broadband
DSL
T-1
ISDN
#13 (LOL-09) Users on a particular floor cant access the Internet, but can log onto the local network.
What should they check first?
TCP/IP properties
Is switch turned on?
Are users on other floors having the same issue?
Call their ISP.
#14 (LO4) A network computer that shares resources with and responds to requests from other
computers in known as a ________.
Client
Host
Terminal
Server
#15 (LO1) A ________ is the place where a telephone company terminates lines and switches at a client
location.
telco office
central office
central switching facility
demarcation point
#16 (LO8) Which of the following is a cryptographic technique for that converts plain data into coded
data?
Encryption
PKA
KPA
RXStenography
#19 (LO1) The OSI model consists of ______ distinct layers stacked on one another.
two
three
four
seven
#20 (LO8) Which of these wireless encryption standards is the most secure?
WPA
WEP
WPA2
WEP2
#21 (LO6)The new IPv6 is better than IPv4 for all the following reasons except:
More addresses
Less bits in the address
Better security
Compatibility with IPv4
#22 (LO9) For which of these items should you always change the default settings on a wireless router?
SSID and Administrative Password
IP Address
Channel
Frequency (2.4/5.0 GHz)
#24 (LO3) In which type of wired network is it easier to add multiple new nodes?
Bus
Star
Ring
Mesh
#25 (LO6) Which of the following is the default class A subnet mask?
255.255.255.0
255.240.0.0
255.0.0.0
255.255.0.0
#26 (LO6) A ________ transmission sends a message to all points on a specific network.
multicast
unicast
simulcast
broadcast
#27 (LO6) Which of the following is the default class B subnet mask?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
#28 (LO3) A switch is a central network device that connects network nodes such as workstations and
servers in a physical ____ topology.
bus
mesh
ring
star
#29 (LO2) The _________ layer of the TCP model is responsible for logical addressing. internet
Internetwork
Host to Host
Logical
Session
CIS150-Q11.jpg
Bus
Ring
Tree
Star
#31 (LO3) A ______ consists of interconnected computers, printers, and other computer equipment in
close physical proximity.
WAN
MAN
WWAN
LAN
#35 (LO6) Which of the following is the default class C subnet mask?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
#36 (LO2) At what layer of the TCP model is the User Datagram Protocol (UDP) found? transport
Host to Host
Application
Network
Internet
#37 (LO1) A _______ is an administrative grouping of network resources such as computers, printers,
and network devices.
container
class
range
domain
#38 (LO6) When utilizing IPv4, each network node has a ____-bit IP address, which, when used with its
48-bit MAC address, enables network communications and accurate delivery of a packet?
16
32
48
64
#39 (LO8) Which of the following is a drawback of Broadband technology, compared to ADSL?
Its standards are less developed
Its installation is more difficult
Multiple subscribers must share a fixed amount of bandwidth
Cable is an asymmetrical technology, while ADSL is symmetrical
#40 (LO3) Which of the following types of media are used in LANs?
Twisted Pair
Coaxial Cable
Radio Waves
All of the selection are valid
#42 (LO7) Which Internet access method uses existing telephone lines and regular phone service.
Cable Broadband
DSL
T-1
ISDN