NETWORKING CONCEPTS A
Sign in to Google to save your progress. Learn more
Email *
44)  Which of the following is Microsoft's current NOS?
1 point
Clear selection
14)  What does the 100 in the name 100BaseT indicate?
1 point
Clear selection
22)  Which of the following statements is not true about Local Area Networks (LANs)?
1 point
Clear selection
43)  What is a collection of computers that share a common database and security policy known as?
1 point
Clear selection
25)  An administrator that is located on the third floor of Building 1 of your organization needs to access your computer. Due to the rainy conditions, the administrator does not want to leave the building and decides to login to your computer from his remote location and control it as if he was logged in locally. What network service is this administrator using?
1 point
Clear selection
40)  Which tool in Windows is used to manage local and remote computers by using a single, consolidated desktop tool that can perform tasks such as monitoring system events, configuring hard disks, and manage system performance?
1 point
Clear selection
28)  Which of the following is not true about an extranet network?
1 point
Clear selection
10)  Which of the IEEE standards encompasses Wi-Fi technologies?
1 point
Clear selection
33)  What is the term used for when an operating system is first started and is loading into memory?
1 point
Clear selection
21)  Which of the following statements correctly defines its network infrastructure?
1 point
Clear selection
23)  A network that has a large capacity, covers a large geographical area and combine multiple communication channels is known as what type of a network?
1 point
Clear selection
32)  What portion of the OS code interacts directly with the computer's hardware?
1 point
Clear selection
46)  The purpose of this hardware or software-based security system controls incoming and outgoing network traffic based on a set of rules and either blocks it or allowed it to pass through.
1 point
Clear selection
35)  Which of the following is not a way an operating system allocates disk space for files.
1 point
Clear selection
13)  What is the reduction in the strength of a signal known as?
1 point
Clear selection
1)  Which of the following is not an advantage of installing a network in an organization?
1 point
Clear selection
38)  In which boot process stage is the root partition mounted?
1 point
Clear selection
6)  What is the name of the server that leases IP addresses to its users?
1 point
Clear selection
Password *
37)  Which of the following best describes Active Directory?
1 point
Clear selection
49)  Which of the following are the recommended steps that should be taken for worm attack mitigation?
1 point
Clear selection
3)  ____ are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table.
1 point
Clear selection
34)  Which of the following is the core process for Linux?
1 point
Clear selection
24)  Which term is used to describe a network that is able to expand to accept new devices and applications without affecting the network's performance?
1 point
Clear selection
41)  What protocol suite has Macintosh primarily used historically?
1 point
Clear selection
18)  Name the network connector that supports fiber optic transmission that connects using a twist-on/twist-off bayonet-style mechanism.
1 point
Clear selection
19)  You have introduced a fully configured workstation into your network. The network IP address uses static IP addressing. Each time the new workstation connects to the network, another existing computer generates an error message and stops connecting. What could be the problem?
1 point
Clear selection
15)  Heavy machinery, printers, a building's heating units are all examples of areas that should be avoided when running cable because of which of the following?
1 point
Clear selection
31)  Which of the following terms refers to a permanent IP address assignment from a DHCP server?
1 point
Clear selection
8)  RIP by default has _____________ number of hops.
1 point
Clear selection
11)  MAC addresses take the form of ____ two-digit hexadecimal numbers separated by colons.
1 point
Clear selection
27)  What type of network design combines the use of voice, video, and data all on the same communication channel?
1 point
Clear selection
45)  You open an email that was sent to you by a co-worker. Later that day, you receive phone calls from other co-workers saying they received emails from you that you did not knowingly send. What type of attack has happened?
1 point
Clear selection
39)  What is the purpose of the event viewer tool?
1 point
Clear selection
4)  As a help desk technician one of your main roles is to troubleshoot problems a customer/client may be having with their network. Of the choices below, which accurately lists the steps a technician should take during the troubleshooting process?
1 point
Clear selection
29)  A type of computer network environment that links two or more computers in which some computers provide computing services for user computers is known as a __________ network.
1 point
Clear selection
26)  An IPv6 address consists of ____ bits.
1 point
Clear selection
50)  A software tool that is used for monitoring and examining content of network traffic is known as:
1 point
Clear selection
7)  Which of the following is a non-routable protocol?
1 point
Clear selection
9)  What organization is dedicated to advancing technological innovation and creating standards?
1 point
Clear selection
16)  Cable modems, DSL, fiber-optic and satellite all connect to the internet using ________ technologies.
1 point
Clear selection
47)  Which security tool would be the best defense against a sniffing attack?
1 point
Clear selection
36)  Which of the following files systems is used by UNIX?
1 point
Clear selection
12)  What is the name of the adapter used to link an individual device to the communications medium on a LAN?
1 point
Clear selection
42)  Which of the following functions are not defined by network protocols to allow communication between known source and destination IP addresses?
1 point
Clear selection
48)  Which authentication method lets a user request an encrypted "ticket" from an authentication process that can be used to request a particular service from a server?
1 point
Clear selection
What is your name? *
30)  What is the term used to describe experimentation with telecommunication systems that are connected to public telephone networks?
1 point
Clear selection
5)  Jeff just moved to a new apartment and is looking for a company to contact for Internet service. He is willing to pay a monthly fee, but in return he needs a modem and also an e-mail address. Who would Jeff contact for this service?
1 point
Clear selection
20)  Which networking tool would be used to attach an RJ-45 connector to a CAT5e networking cable?
1 point
Clear selection
17)  What is the most common cabling media used in an FFDI system?
1 point
Clear selection
2)  255.255.0.0 is the subnet mask for which class of IP network?
1 point
Clear selection
A copy of your responses will be emailed to the address you provided.
Submit
Clear form
Never submit passwords through Google Forms.
reCAPTCHA
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy