Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?
You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have?
The time it takes for read/write heads to move to the correct spot on the platter is the _______.
Which of the following is a task usually performed by the BIOS?
Perform a POST, Begin the boot procedure
Place the following steps of the boot procedure in order:
Power is applied, CPU starts, The POST is executed, Boot devices are searched, The OS is loaded into RAM.
An OS's capability to run more than one application or process at the same time is referred to which of the following?
You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC?
Choose the correct order for the process of a user attempting to access network resources:
Application, Network client, Network protocol, NIC driver
In network communication, the _______ address is used to deliver a frame to the correct computer on the network.
The unit of information containing MAC addresses and an error-checking code that's processed by the network interface layer is referred to as a _____.
Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following?
You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?
Which of the following best describes a client?
A computer's primary role in the network is to run user applications and access network resources.
You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install?
Which of the following characteristics is associated with a peer-to-peer network?
Decentralized data storage, Inexpensive, User-managed resources
A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?
At Yavapai College, the Prescott and Prescott Valley campuses (8 mile apart) have LANs connected via the local phone company. This configuration is an example of which of the following?
You have installed Windows Server 2008 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server?
Peer-to-peer networks aren't suitable in which of the following situations?
Tight security is required
Which of the following best describes a storage area network?
Uses high-speed networking technologies to give servers fast access to large amounts of disk storage.
Why might Windows 7 or Windows Vista require more RAM or disk space than Windows Server 2008?
They include a directory service and a naming service.
Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers?
Which of the following is the unit of measurement by which a hub's bandwidth is usually specified?
Which of the following describes how devices connected to a hub use the speed at which the hub can transmit data?
Which of the following describes how devices connected to a switch use the speed at which the switch can transmit data?
What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100 Mbps switch?
Under which circumstances does a NIC allow inbound communications to pass through the interface?
You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one another so that all 300 computers can communicate with each other in a single LAN. You have been detecting a high percentage of broadcast frames on this LAN. You think the number of broadcasts might be having an impact on network performance. What should you do?
Review the routing table in Figure 2-29. Based on this figure, where will the router send a packet with the source network number 1.0 and the destination network number 3.0?
If a router receives a packet with a destination network address unknown to the router, what will the router do?
Which of the following is defined by the extent to which signals in an Ethernet bus topology network are propagated?
Which of the following types of fiber-optic connectors provides high density and requires only one connector for two cables?
The space between a false ceiling and the true ceiling where heating and cooling air circulates is called the _____.
You have been hired to install a network at a large government agency that wants to reduce the likelyhood of electronic eavesdropping on its network. What type of cable is most resistant to eavesdropping?
You're preparing to install a conventional Ethernet network in your new office building, but your boss tells you to be ready to handle a switchover to 1 Gbps Ethernet next year. What types of cable could you install?
When two cables run side by side, signals traveling down one wire might interfere with signals traveling on the other wire. What is this phenomenon called?
Which of the following wireless technologies does a 802.11 wireless network using the 2.4 GHz frequency range use?
The subnet mask of an IP address does which of the following?
Defines network and host portions of an IP address
Which of the following is a private IP address and can't be routed across the Internet?
Which TCP/IP model layer takes a large chunk of data from the Application layer and breaks it into smaller segments?
If you want to design an Application-layer protocol that provides fast, efficient communication and doesn't work with large amounts of data, what Transport-layer protocol would you design it to use?
Which of the following is the term for identifying packets used by TCP to establish a connection?
When using TCP/IP, which of the following must computers on the same logical network have in common?
Which of the following IPv6 features is an enhancement to IPv4?
Larger address space, Built-in security
For the class C network address 192.168.10.0, which of the following subnet masks provides 32 subnets?
Which IP addressing process enables workstations to use private IP addresses to access the Internet?
When a Windows computer is configured to use DHCP but no DHCP server is available, what type of address is configured automatically for it?
Which of the following is a reason to subnet?
Networks can be divided into logical groups, Subnetting can decrease the size of broadcast domains
Which of the following Application-layer protocols typically uses the UDP Transport-layer protocol?
Which of the following is a task performed by the Network access layer?
Verifies that incoming frames have the correct destination MAC address, Transmits and receives bit signals
What field of the IP header does the Tracert program use to get the IP address of routers in the path?
Which of the following is not found in a connectionless Transport-layer protocol?
Three-way handshake, Acknowledgements
The original commercial version of Ethernet supported 10 Mbps bandwidth; the version introduced in the early 1990s supports 100 Mbps; and in 1998, Gigabit Ethernet was introduced. All version use the same data frame formats, with the same maximum PDU sizes, so they can interoperate freely. Given this information and what you know of layered technologies, which of the following statements is true?
Ethernet works at the Data Link and Physical layers of the OSI model, and upgrades to newer, faster versions of Ethernet can be made by changing only the components that work at these layers, Changes in technology at one layer of the OSI model don't usually affect the operation of other layers.
The addition of information to a PDU as it's passed from one layer to the next is called which of the following?
Layers acting as though they communicate directly with each other across the network are called which of the following?
Place the following letters in the correct order to represent the OSI model from Layer 7 to Layer 1:
Application, Presentation, Session, Transport, Network, Data Link, Physical
Which OSI layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network?
When and how many times is a CRC calculated?
At the source and destination and at each intermediary device
What and the names of the sublayers specified as part of Project 802 ?
Logical Link Control (LLC), Media Access Control (MAC)
Which term refers to stripping header information as a PDU is passed from one layer to a higher layer?
When a switch receives a frame on a port and floods the frame, what does it do with the frame?
Forwards it out all other connected ports
You have two eight-port switches. On each switch, seven stations are connected to ports, and the two switches and connected with the eighth port. How many collision domains are there?
You just purchased some new switches for your company's network. Your junior technicians are doing most of the work connecting switches to workstations and to each other, and you don't want to confuse them by requiring them to use both patch cables and crossover cables. How can you test the switches to determine whether you need both types of cable, and what's the using only one type of cable for all connections?
Connect two switches by using a patch cable. If the connection works, the switch supports auto-MDIX.
What feature should you look for in switches if your network is cabled like the one in Figure 7-16?
What does a router do after receiving a frame on one of its interfaces?
Deencapsulates the frame to create the packet, Encapsulates the packet to create a new frame
Which of the following accurately describes a distance-vector routing protocol?
It learns from its neighbors
Which of the following is a characteristic of routing protocols?
Network changes are reflected in the routing table automatically, The add routing table entries dynamically
Which of the following is the best routing solution for a network that includes redundant links?
If you don't want wireless clients to view the name of your wireless network, what feature should you use?
Disabling SSID broadcasts
To prevent a wardriver from being able to interpreter captured wireless network data, you should enable which of the following?
WPA or WPA2
Which AP feature is useful when you have many guests accessing your network and you don't want them to be able to access the computers of other guests?
What feature should you configure to prevent users on one subnet from accessing the Web server on another subnet?
Access control lists
Which of the following is an objective of a file system?
Organize space on a drive, Organize files hierarchically, Secure access to files
Large cluster sizes can result in which of the following on a disk drive?
Faster performance for large files, more wasted space for small files
Which of the following is best described as a program loaded into memory that has no user interface but communicates with other programs?
Which best describes context switching?
The OS suspending the running process and activating another process
Which answer shows the correct order of DHCP packets generated when a computer requests a new address lease?
DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck
If you want a computer to query DNS by appending more than one domain name to the computer name, which of the following should you configure?
Additional DNS servers
Why should you set the "Register this connection's addresses in DNS" option?
So the the computer's name and address are added to the DNS database automatically
Which is the correct syntax for mapping drive letter W to a shared folder named Accounting on the Finance server?
net use W: \\Finance\Accounting
Which of the following refers to a Windows server with Active Directory installed?
Which of the following best describes an NAS?
A dedicated device designed to provide shared storage for network users
If you want one server to take over the processing of a server that has failed, what should you configure?
If you want your virtual machine to have direct access to the physical network, which virtual network option should you configure?
Which of the following is a function of a user account?
Provides a method for user authentication, Provides a method for user authentication, Authorizes a user to log on to network servers
Which of the following is true of group accounts?
They organize users for easier assignments of resource permissions
Which of the following is a collection of a user's personal data folders and application settings that's available at any computer where the user logs on?
Which command in Linux might be needed to perform user account management if you aren't logged on as the root user?
Which is true about Linux user accounts?
They must belong to at least one group, The account names are case sensative
Which is true about partitions?
You can have up to four primary partitions, Only a primary partition can be active
Which NTFS feature should you configure if you want users to be able to revert to an older version of the file?
Which is true about file compression?
A compressed file can't be encrypted with EFS, Decompression occurs automatically when a file is accessed
Which of the following is true about permissions in NTFS?
By default, permissions are inherited automatically from the parent folder
Which of the following correctly describes how sharing and NTFS permissions work?
When a file is accessed over the network, sharing permissions are checked first.
Which of the following is true of Windows printing terminology?
A print server is a computer sharing a printer, A print queue stores jobs waiting to be printed
Which of the following tools is used to view information categorized as Information, Warning, or Error?
Which is best described as a record of performance data gathered when a system is performing well under normal conditions?
Why would you choose to monitor a system's performance remotely?
You want to lessen the impact of the monitoring session on the computer.
Which is true about Windows Backup in Windows Server 2008 R2?
Backups can be stored on network devices, The Volume Shadow Copy Service backs up open files, You can back up another computer remotely.
Your friend creates a shared folder on her computer for several coworkers to use. She assigns the password "0OxqH}ml2-wO" to the folder. Is it an example of a good password or a bad password?
Bad, it's overly complicated and forgettable.
List at least three techniques you can use to help secure a wireless network.
Hide SSID, MAC Address Filtering, WEP/WPA encryption
How do VPNs accomplish the "private" part of a virtual private network?
Encryption within encapsulation
Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets so that the server can't respond to normal traffic?
Which of the following is a guideline for creating a security policy?
A security policy should be enforcable.
List two questions that must be answered before determining what level of security a network requires:
Protect what? From who?
Choose two words from the following list that best complete this sentence: If there's ___ access to the equipment, there's no _____.
Which of the following should be a common element in any level of security policy?
Backup procedures, Virus protection
The procedure that specifies what resources users can access and the tasks they can perform on a network is referred to as which of the following?
If you want to allow a blank password in a Windows 7 system, which of the following do you set the password minimum length to?
If you want to prevent password guessing to foil intruders, you should enable which of the following?
Which of the following is a method IPSec uses to authenticate the identity of communicating devices?
Kerberos, Digital certificates
To encrypt data stored on a hard drive on a Windows Server 2003 computer, you should use which of the following?
If network administrators want to be informed when an attempt has been made to compromise the network, what should they use?
Which of the following is one of the most important aspects of supporting a small business?
Listening to the company's requirements and designing a solution.
Which of the following is a possible problem with a peer-to-peer network solution?
Users can unknowingly sever access to shared files or printers, Sensitive data could be made available to unauthorized users.
Which is true about sharing files in a Windows domain?
All computers except the server are workgroup members.
Which of the following is true about NAS?
It usually has its own user interface, Users and groups can be created on an NAS
Which of the following is true about using Linux as a desktop OS?
Office applications are available that are compatible with Microsoft Office, Virtualization can be used to run Windows applications
Which of the following is a common fault-tolerant disk configuration for servers?
RAID 1 for the OS and RAID 5 for the data
Which of the following is a consideration when purchasing a switch?
Switch speed, Support for multiple media types, Whether it's managed or unmanaged
Which of the following is a consideration when selecting wireless network equipment?
Security standards supported, Interference from other wireless devices
To run a Web server on a network protected by a SOHO router, you must enable what feature?
What legal document should be read carefully before purchasing software for multiple users to run?
Which of the following is a feature a firewall router provides?
Protection against DoS attacks, Web site filtering, Cookie blocking, Protection against IP spoofing
In which of the following areas does a WAN differ from an internetwork?
WANs use service providers for the network connection, WANs use serial communication technologies that can span miles
For what purpose is a CSU/DSU used?
Creates a WAN connection over the public switched telephone network
Which of the following is a typical situation in which leased lines should be considered?
24/7 access is required, Fast upstream and downstream communications are needed
Which of the following combines several communication streams into a single faster communication stream?
Which term best describes the place in a WAN connection where the customer's responsibility ends and the provider's responsibility begins?
Which of the following is the equipment at the customer site that's the responsibility of the customer?
Which of the following can best be described as developing applications by using a service provider's development tools and infrastructure?
A ________ can determine whether a cable break or short exists and approximately how far down the cable it's located.
Based on the eight-step problem-solving process discussed in this chapter, what's the first step in network troubleshooting?
Determine the problem definition and scope
Which problem-solving approach requires a solid understanding of how networks work?
Step by step with the OSI model
Under which condition is using the trial-and-error approach not advisable?
A server or network device is live on the network, You can't undo changes easily
Which of the following is an element of the information-gathering step in the problem-solving process?
Find out whether the function ever worked, Determine whether something has changed, Compare current operation with a baseline
For which of the following network conditions must you use a protocol analyzer or network monitor for further diagnosis?
Slow network performance, High rate of transmission errors