Você está na página 1de 8

Basics of computer

1. Ans. Exp. You are examining a DNS forward lookup zone to investigate problems with name resolution. What type of resource record enables DNS to resolve a host name to an IPv6 address? AAAA An AAAA (quad-A) resource record resolves a host name to an IPv6 address

2.

Ans. Exp.

Which of the following methods can you use to display the properties of a LAN connection In the Network And Sharing Center, click Change Adapter Settings. Double-click the LAN connection. In the Local Area Connection Status dialog box, click Properties. In the Network And Sharing Center, click Change Adapter Settings. Right-click the LAN connection and choose Properties. In the Network And Sharing Center, click Change Adapter Settings. Right-click the LAN connection and choose Status. In the Local Area Connection Status dialog box, click Properties. This procedure accesses the Local Area Connections Properties dialog box. This is an alternative method of accessing the Local Area Connections Properties dialog box. Double-clicking the LAN connection opens the Local Area Connection Status dialog box. Clicking Properties accesses the Local Area Connections Properties dialog box.

3. Ans. Exp.

What should be done if the system detects a resource conflict on a PC? Manually assign resources to the conflicting components If for some reason the system assigns duplicate resources, such as an IRQ, to two different PC components, it is possible to manually set which resources one of the components will use. Traditionally, all resources were manually set; however, Plug and Play, which is not a service, has changed that

Und.

4. Ans. Exp.

What is the function of a loopback plug? It tests the functionality of a NIC. Loopback plugs take the signal going out on the transmit path and connect it back to the receive path. This allows you to test certain legacy ports as well as Ethernet NICs to make certain they are working correctly

5. Ans. Exp.

A piconet is limited to how many devices? Eight A piconet (Bluetooth network) can have eight devices on it. One device can communicate with seven other devices on the same network.

6. Ans. Exp.

Which of the communication methods is point-to-point, limited to a distance of about one meter? Infrared Infrared communications are point-to-point only and are limited to about one meter. Bluetooth can work up to 100 meters, depending on the version. Wireless Ethernet network signals can travel for several hundred meters, and cellular communications can span several kilometers

E-MAIL CLIENT
7. Ans. Exp. Und. Which of the following protocols can be used by a client to access e-mail on a server? POP3 The IMAP and POP3 protocols can be used to retrieve e-mail from mail servers. DNS resolves hostnames to IP addresses. FTP is for file downloads. SMTP is for sending e-mail to an e-mail server.

OSI
8. Ans. Exp. Und. 9. Ans. Exp. What model is used to provide a common way to describe network protocols? OSI The Open Systems Interconnection (OSI) model is used to describe how network protocols should function. The OSI model was designed by the International Organization for Standardization (ISO). Which OSI layer signals "all clear" by making sure the data segments are error free? Transport layer It is the responsibility of the Transport layer to signal an "all clear" by making sure the data segments are error free. It also controls the data flow and troubleshoots any problems with transmitting or receiving data frames.

Und.

TRANSMISSION MEDIA
10. Ans. Exp. 11. Ans. Exp. Which of the following 802.11x standards provides data transmission speeds up to 54Mbps? 802.11a 802.11g Both 802.11a and 802.11g provide data transmission speeds of up to 54Mbps. 802.11b only goes up to 11Mbps. 802.11i is a security standard When SSL and HTTP are used together, what does the beginning of a site address become? https:// When SSL and HTTP are used together, the beginning of the site address becomes https://.

12. Ans. Exp.

To increase security, you decide to use your firewall to block the Telnet protocol. Which port will you need to block to prevent Telnet from being used? 23 The Telnet protocol uses port 23. If this port is blocked, Telnet cannot be used.

13. Ans. Exp.

If you are going to run a network cable in the space above the drop ceiling in your office, which type of cable should you use? Plenum For areas where a cable must be fire retardant, such as in a drop ceiling, you must run plenum-grade cable. Plenum refers to the coating on the sleeve of the cable, not the media (copper or fiber) within the

14. Ans. Exp.

cable itself. PVC is the other type of coating typically found on network cables, but it produces poisonous gas when burned. What devices transfer packets across multiple networks and use tables to store network addresses to determine the best destination? Routers Routers are designed to route (transfer) packets across networks. They are able to do this routing, and determine the best path to take, based on internal routing tables they maintain.

Networking devices
15. Ans. Exp. Which type of media access method used by NICs that listen to or sense the cable to check for traffic and send only when they hear that no one else is transmitting CSMA/CD CSMA/CD (Carrier Sense Multiple Access with Collision Detection) specifies that the NIC pause before transmitting a packet to ensure that the line is not being used. If no activity is detected, then it transmits the packet. If activity is detected, it waits until it is clear. In the case of two NICs transmitting at the same time (a collision), both NICs pause to detect and then retransmit the data.

16. Ans. Exp.

Which IEEE 802 standard defines a bus topology using coaxial baseband cable and is able to transmit at 10Mbps? 802.3 The IEEE 802.3 standard specifies the use of a bus topology, typically using coaxial base band cable, and can transmit data up to 10Mbps.

17. Ans. Exp.

Which standards is backward compatible with both 802.11a and 802.11b? 802.11n The 802.11n standard utilizes both the 2.4GHz and 5GHz spectrums, and is backward compatible with both 802.11a (5GHz) and 802.11b (2.4GHz). 802.11g operates at 2.4GHz and is only backward compatible with 802.11b. 802.11i is a security specification.

18. Ans. Exp.

What type of adapter has an RJ-11 jack built in? Modem Modems have RJ-11 jacks for interface to the Public Switched Telephone Network (PSTN). The modular jacks that Ethernet NICs have are known as RJ-45 jacks.

19. Ans. Exp.

Which category of adapters includes NICs? Communications Network interface cards are considered to be a form of communications adapter.

TOPOLIGIES
20. Ans. A physical star topology consists of several workstations that branch off a central device called ? Hub

Exp.

21. Ans. Exp.

At the center of a star topology is a hub or a switch. A NIC is a network card, which each computer must have to be on the network. Bridges and routers are higher-level connectivity devices that connect network segments or networks together. What is a type of network where all of the computers appear to be on the local network even if they are physically located in a remote location? A VPN A virtual private network (VPN) is one where all computers appear to be on the local LAN even if they are not. VPNs are useful for remote access as well as if you have networks in multiple locations.

22. Ans. Exp.

A physical star topology consists of several workstations that branch off a central device called ? Hub At the center of a star topology is a hub or a switch. A NIC is a network card, which each computer must have to be on the network. Bridges and routers are higher-level connectivity devices that connect network segments or networks together.

IP ADDRESSING
23. Ans. Exp. 24. Ans. Und. Firewalls use a set of rules to make determinations on which traffic to block. What are those rules called? ACL Firewalls use an access control list (ACL) to determine which packets are allowed through it. Which of the addresses is a nonroutable IP address? A Private, nonroutable addresses are 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255.

25. Ans. Und.

APIPA addresses are in which address range? A Automatic Private IP Addressing addresses are in the 169.254.0.0 network. The other network addresses listed are private nonroutable IP addresses.

26. Ans. Exp.

Which a command-line utility that enables you to verify entries on a DNS server? Nslookup Nslookup is a command-line utility that enables you to verify entries on a DNS server. Ping is used to see if another system is active and reachable. The tracert (trace route) utility can be used to test connectivity and see the path taken to reach another host. Ipconfig shows your IP configuration information.

27. Ans. Exp.

Which tool can be used to test connectivity and see the path taken to reach another host? Tracert The tracert (trace route) utility can be used to test connectivity and see the path taken to reach another host. Ping is used to see if another system is active and reachable. Ipconfig shows your IP configuration information, and nslookup allows you to verify entries on a DNS server

28.

Which troubleshooting tool can be used at the command line to see the IP configuration data given by a DHCP server to a Windows XP workstation? Ans. Ipconfig The ipfconfig utility can be used at the command line with Windows XP to see the networking configuration values. Ipfconfig is a Unix-based utility; winipcfg is a Windows-based utility similar to ifconfig, and there is no Windows hijack utility

29. Ans. Exp. Und. 30. Ans. Exp.

You have a computer with the IP address 171.226.18.1. What class is this address? Class B Class A addresses have a first octet between 1 and 126, Class B between 128 and 191, and class C between 192 and 223. With a first octet of 171, this is a Class B address.

Which of the commands would you execute to verify that the computer has connectivity with the local area network? ping 192.168.15.1 You can verify network connectivity by using the Ping command to probe the default gateway address. If you get a response, your computer is connected to the network. If you do not get a response, your computer has connectivity problems. Which of the commands can you use to determine which IPv4 address is assigned to each specific interface? Ipconfig You can use the Ipconfig utility to display Internet Protocol (IP) address information, such as which IP address is associated with a specific interface. You execute the Ipconfig command on a computer that runs Windows 7 Enterprise. You get the results shown in the exhibit.

31. Ans. Exp.

32. Ans. Exp.

Which of the following command-line utilities can you use to display a copy of the IPv4 and IPv6 routing tables on a computer running Windows 7? Netstat The command netstat -r can be used to display the IPv4 and IPv6 routing tables of a computer running Windows 7. Your computer running Windows 7 has two network interfaces.

33.

Ans. Exp.

Which of the following IP addresses, when returned by an IPCONFIG query issued in a Command Prompt window, would indicate that a computer running Windows 7 has not received an address from a local DHCP server? 169.254.15.123 P addresses in the range between 169.254.0.0 through 169.254.255.255 are in the Automatic Private Internet Protocol Addressing (APIPA) range. The APIPA range is assigned by Windows 7 when no DHCP server is present and no manual address has been assigned. There is no Dynamic Host Configuration Protocol (DHCP) server on your local area network. Which of the following commands, when used to set the Internet Protocol (IP) address of a computer running Windows 7, will NOT lead to network connectivity problems? Netsh interface ipv4 set address name="Local Area Connection" static 172.16.47.24 255.255.192.0 172.16.0.1

34. Ans.

Exp.

Only the setting consisting of IP address 172.16.47.24, subnet mask 255.255.192.0, and default gateway of 172.16.0.1 has the host address and the default gateway on the same network.

TCP/IP
35. Which TCP/IP protocol uses port 80? Ans. HTTP HTTP uses port 80. HTTPS uses 443, Telnet 23, and POP3 110. 36. Ans. Exp. Which elements are required to communicate on a TCP/IP network? IP address Subnet mask To communicate on a TCP/IP network, you need to have a unique IP address and a valid subnet mask. The default gateway and DNS server are optional. 37. You have just set up a network that will use the TCP/IP protocol, and you want client computers to automatically obtain IP configuration information. Which type of server do you need for this? Ans. DHCP Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network. A Domain Name System (DNS) server resolves hostnames to IP addresses. A domain controller may provide login authentication, but it does not provide IP configuration information. There is no IP configuration server 38. You are administering a system that has been locked down for security reasons. You notice that among all of the other ports, port 443 and port 80 have been disabled. What services are associated with these ports? HTTP , HTTPS Each TCP/IP protocol uses a particular port number. In this case, the HTTP protocol uses port 80 and HTTPS uses port 443. Telnet uses port 23. FTP requires two ports (21 and 20) to establish the connection and send data; most FTP requests result in FTP opening an arbitrary higher-numbered port (such as 13426) to transfer the data. Which utility is used to view the inbound and outbound TCP/IP connections on your machine? Netstat The netstat utility is used to view TCP/IP connections on your computer. Nbtstat shows NetBIOS over TCP/IP information. Ipconfig shows your IP configuration information. Nslookup is a command-line utility that enables you to verify entries on a DNS server. Which command is used to determine if another computer is reachable via TCP/IP? PING To see if another computer is online and available, you can use the PING command. IPCONFIG shows your IP configuration information. NBTSTAT shows NetBIOS over TCP/IP information. NET USE allows you to make a connection to a shared network resource such as a printer or a hard drive. You have just set up a network that will use the TCP/IP protocol, and you want client computers to be able to search for and communicate with other computers by using hostnames. Which type of server will help with this? DNS Domain Name System (DNS) server resolves hostnames to IP addresses. A Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network. A domain controller may provide login authentication, but it does not provide IP configuration information.

Ans. Exp.

39. Ans. Exp.

Und. 40. Ans. Exp.

41.

Ans. Exp.

INSTALLING NETWORK
42. Ans. Exp. You are installing a network and will use wired connections. You have a distance of 80 meters between nodes in some cases. What is the maximum distance you can run UTP cable? 100 meters UTP cable can run for a maximum distance of 100 meters. Thinnet coaxial can run up to 185 meters, and multimode fiber can run up to 400 meters

43. Ans. Exp.

Of all network cabling options, which offers the longest possible segment length? Fiber-optic Fiber-optic cable can span distances of several kilometers, because it has much lower crosstalk and interference in comparison to copper cables.

WIRELESS NETWORK
44. Ans. Exp. Which of the following are examples of ways you can increase the security of your wireless network? Enable MAC filtering Change the SSID from the default Use WPA Enabling MAC filtering only allows specific computers to use the wireless router. You should disable SSID broadcasts, not enable them, to increase security. Changing the SSID from the default is always a good idea, and you should use some sort of wireless security such as WPA or WEP. Which of the following acronyms describes the "name" of a wireless network? What is the name of a wireless network called? SSID The Service Set Identifier (SSID) is the name of the wireless network. You should always change the SSID from the default! WEP and WPA are wireless security standards. MAC is the hardware address built into network card

Exp. 45. Ans. Exp.

46. Ans. Exp. Und.

You need to recommend a wireless cellular service to a client who travels globally. Which type of service should you recommend? GSM WiFi and Bluetooth are not cellular standards. Of the two cellular standards, GSM is used worldwide and CDMA is used only in the United States.

47. Ans. Exp.

Which of the following technologies is limited to 10 meters? Bluetooth Bluetooth is a wireless standard; Class 2 devices are limited in range to about 10 meters.

48. Ans. Exp.

What is the most secure wireless encryption standard for 802.11x networks WPA2 WEP was the original encryption standard developed for WiFi networks, but it is easily hacked. WPA is an upgrade, but WPA2 is more secure and incorporates the entire 802.11i standard. SAFER+ is used to encrypt Bluetooth communications.

49. Ans. Exp.

Which two of the following are standards for cellular communications? GSM CDMA The Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA) are cellular standards. A SIG is a Special Interest Group, and cold cathode fluorescent lamp (CCFL) is a backlight on a laptop. Which of the following wireless communication standards is often described in terms of a wireless personal area network? Bluetooth Bluetooth networks are often called wireless personal area networks (WPANs).

50. Ans. Exp.

51. Ans. Exp.

What is the primary function of the SSID? A name used to identify a wireless network A service-set identifier (SSID) is the unique name given to the wireless network. All hardware that is to participate on the network must be configured to use the same SSID. Essentially, it is the network name. When you are using Windows to connect to a wireless network, all available wireless networks will be listed by their SSID. Which of the following wireless IEEE standards operate on the 2.4GHz radio frequency and are directly compatible with each other? 802.11b 802.11g Both 802.11b and 802.11g operate in the 2.4GHz range and use similar transmission standards. Many devices on the market are listed as 802.11b/g, meaning they will work with either system. Alternatively, 802.11a operates in the 5GHz range. Finally, 802.11d is not a commonly implemented standard.

52. Ans. Exp.

Und.

53. Ans. Exp.

You want to ensure that only certain designated wireless laptops can connect to your network. What do you need to enable? MAC address control The MAC address is unique to an interface and does not change. MAC ensures that only computers whose wireless interfaces have one of the listed MAC addresses can access a wireless network. Be aware that if a new computer needs to access the network, or if you replace the wireless adapter in a computer, you need to register the new MAC address in the WAP.

54. Ans. Exp.

You are configuring a wireless router and want to limit who can access the device. How can you limit access? MAC filtering You can limit the computers that have access to the wireless router through MAC filtering. Only computers with specific MAC addresses will be allowed to use the device. There is no IP filtering or DNS filtering. All routers will have an SSID by default, but using an SSID does not specifically limit access

Você também pode gostar