• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/32

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

32 Cards in this Set

  • Front
  • Back
Which of the following media access methods is utilized in 802.11b wireless networks?
CDMA/CA
You have been asked to install a small network consisting of eight computers. Your manager wants the best possible fault tolerance. Which of the following topologies would you choose?
Mesh
Which of the following networks is configured in dual rings to provide fault tolerance?
FDDI
What is the maximum length of a UTP cable segment in a 10BaseT star network?
100 meters
Which if the following terms correctly describes the loss of signal while it travels down a particular medium?
Attenuation
Which of the following affects the performance of an 802.11b network?
EMI
One of the following network devices forwards the data it receives on a port to all other connected ports. Identify the device from the following:
Hub
Which of the following devices is used in Token Ring networks as the central device?
MSAU
Which of the following methods to build and maintain routing tables takes maximum administrative efforts and time in a large network?
Static
Which of the following addresses is an invalid MAC address?
00-12-ED-AG-K7-9E
Which of the following protocols uses a MAC address as part of the host address?
IPX/SPX
Which of the following protocols does not depend on addresses or numbers to identify computers on a network?
NetBEUI
Which of the following protocol suites includes the Routing Table Maintenance Protocol (RTMP)?
AppleTalk
At which of the following layers of the OSI network model does a network adapter work?
Layer 2
Which of the following is a class C address?
193.10.160.45
One of the network administrators in your company has asked you to block port 23 on the router. Which of the following services is he asking you to block?
Telnet
Which of the following protocols is used to secure HTTP transactions on the Internet?
SSL
Which of the following statements correctly describes the function of a subnet mask?
It is used to separate the network address from the host address within an IP address.
Which of the following protocols can be used to secure remote access connections when they are established through the Internet?
PPTP
Which of the following is a correct URL of a web site using the SSL protocol?
https://www.oreilly.com
What is the total bandwidth of an ISDN BRI connection when both data channels are used?
128 Kbps
You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall?
443
Which of the following advantages are associated with using a firewall?
It is used to block undesired external access to internal network resources.
Which of the following is not a benefit of implementing a proxy server for Internet access?
The Internet hostnames can be resolved internally
You are using five 80 GB hard disks in your file server to configure RAID-5. What will be the maximum capacity of the RAID be after the configuration is complete?
320 GB
Which of the following terms is associated with a power outage for a long period of time?
Blackout
You have been asked to make a plan to back up all critical servers in the office. Where should you keep the backup tapes after the backup is complete?
At a secure offsite location.
One of the users in your office complains that he is not able to connect to the network or the Internet. Which of the following steps should you take first in order to troubleshoot the connectivity problem?
Ping the loopback address.
Which of the following utilities would you use when a Windows XP user is not able to connect using computer names?
nbtstat
Which of the following utilities is used on a Linux system to verify TCP/IP configuration?
ifconfig
A new network administrator has configured some new wireless clients. None of these clients is able to connect to the network. Other clients already on the same access point do not have any connectivity problem. Which of the following is the possible reason for the problem?
An incorrect SSID
One of the users has reported problems with his desktop. He is somewhat unclear about the problem's symptoms and you need to visit his desk to rectify the problem. What should be your first step to resolve the problem?
Gather more information from the user.