1.
What would cause the error message “bad or missing operating system” at boot up? (choose two)
Correct Answer(s)
B. Missing or corrupt boot sector
E. A non-bootable floppy disk is in the floppy drive
Explanation
The error message "bad or missing operating system" can occur at boot up if the boot sector of the operating system is either missing or corrupted. This means that the computer is unable to locate the necessary files to start the operating system. Additionally, if a non-bootable floppy disk is inserted into the floppy drive, the system will not be able to boot from it and may display the same error message.
2.
Explain how to map a network drive from the desktop of a Windows XP Pro machine:
Correct Answer
D. All of the above.
Explanation
The explanation for the given correct answer is that all of the mentioned methods can be used to map a network drive from the desktop of a Windows XP Pro machine. The first method is using a DOS command prompt by typing "net use" followed by the drive letter and the UNC. The second method is right-clicking on My Computer and selecting "map network drive" where you can choose the drive letter, enter the path, and select if you want it to map each time you login. The third method is right-clicking on My Network Places and selecting "map network drive" where you can also choose the drive letter, enter the path, and select if you want it to map each time you login.
3.
Where are user files stored locally in Windows XP Pro, with a clean install?
Correct Answer
C. C:\Documents and Settings\%Username%\My Documents
Explanation
The user files are stored locally in the "C:\Documents and Settings\%Username%\My Documents" directory. This is the default location for user files in Windows XP Pro with a clean install.
4.
This wireless standard is widely used to connect computers to each other and to the Internet.
Correct Answer
A. 802.11
Explanation
802.11 is the correct answer because it is a wireless standard that is widely used for connecting computers to each other and to the Internet. It is commonly known as Wi-Fi and is used in various devices such as laptops, smartphones, and routers to establish wireless connections and access the Internet. RJ45 is a type of connector used for Ethernet connections, Blueband is not a recognized wireless standard, and Broadband refers to a high-speed Internet connection but is not specifically a wireless standard.
5.
What can greatly reduce TCP/IP configuration problems?
Correct Answer
C. DHCP Server
Explanation
A DHCP server can greatly reduce TCP/IP configuration problems by automatically assigning IP addresses, subnet masks, default gateways, and other network configuration settings to devices on a network. This eliminates the need for manual configuration, reducing the chances of human error and ensuring that all devices have the correct network settings. Additionally, a DHCP server can also manage and allocate IP addresses dynamically, allowing for efficient use of available IP addresses and avoiding conflicts.
6.
Which of the following device is used to connect two systems, especially if the systems use different protocols?
Correct Answer
C. Gateway
Explanation
A gateway is used to connect two systems, especially if they use different protocols. It acts as a translator, converting data from one protocol to another so that the systems can communicate effectively. This allows for seamless communication between systems that would otherwise be incompatible. A hub, bridge, and repeater do not perform this specific function of protocol translation.
7.
The rules for exchanging data between computers are called
Correct Answer
C. protocols
Explanation
Protocols are the rules or guidelines that govern the exchange of data between computers. They define the format, timing, sequencing, and error control of data transmission. Protocols ensure that data is transmitted accurately and efficiently across different computer networks. They establish a common language and set of rules that computers can follow to communicate with each other. Therefore, protocols are the correct answer as they are specifically designed to facilitate data exchange between computers.
8.
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
Correct Answer
C. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is the correct answer because it is a TCP/IP protocol specifically designed for transferring electronic mail messages from one machine to another. FTP (File Transfer Protocol) is used for transferring files, SNMP (Simple Network Management Protocol) is used for managing and monitoring network devices, and RPC (Remote Procedure Call) is used for communication between networked computers. Therefore, SMTP is the most appropriate protocol for email transfer.
9.
What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
Correct Answer
B. 192.168.10
Explanation
The network ID is the portion of an IP address that identifies the network to which the device belongs. In this case, the IP address is 192.168.10.51 and the default subnet mask is assumed. The subnet mask determines the size of the network ID and host ID portions of the IP address. Since the default subnet mask for a Class C network is 255.255.255.0, the network ID is the first three octets of the IP address, which is 192.168.10. Therefore, the correct answer is 192.168.10.
10.
What device separates a single network into two segments but lets the two segments appear as one to higher protocols?
Correct Answer
D. Router
Explanation
A router is a device that separates a single network into two segments but lets the two segments appear as one to higher protocols. It does this by examining the destination IP address of incoming packets and determining the best path for them to reach their destination. Routers operate at the network layer of the OSI model and can connect different types of networks together, such as LANs and WANs. Unlike switches and bridges, routers can make intelligent decisions about where to send packets based on network information, making them ideal for dividing networks into segments while still allowing communication between them.
11.
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Correct Answer
C. 255.0.0.0, 255.255.0.0, 255.255.255.0
Explanation
The default subnet mask for a class A network is 255.0.0.0, for a class B network is 255.255.0.0, and for a class C network is 255.255.255.0.
12.
Which of the following is the address of the router?
Correct Answer
D. The default gateway
Explanation
The default gateway is the address of the router that connects a local network to other networks. It serves as the entry and exit point for network traffic, allowing devices on the local network to communicate with devices on other networks. The IP address, TCP address, and subnet mask are all network-related addresses, but they do not specifically refer to the router's address. Therefore, the correct answer is the default gateway.
13.
Because the configuration information for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Correct Answer
D. IPCONFIG
Explanation
IPCONFIG is the correct answer because it is a utility that allows you to view the current configuration information of a DHCP client. It displays the IP address, subnet mask, default gateway, and other network settings that have been dynamically assigned to the client by a DHCP server. By using IPCONFIG, you can verify the settings and ensure that the client has received the correct configuration from the DHCP server.
14.
As you are walking down the hallway to help an important client with a trouble ticket they submitted, one of your coworkers rushes up to you and begs you to help them install some software on their computer. The appropriate answer is:
Correct Answer
C. "I'm sorry, but I'm on my way to help out Mr/s. X. If you put in a ticket, I'll be sure to look for it when I'm done and get to you ASAP."
Explanation
The correct answer is "I'm sorry, but I'm on my way to help out Mr/s. X. If you put in a ticket, I'll be sure to look for it when I'm done and get to you ASAP." This answer is appropriate because it acknowledges the coworker's request and offers a solution by asking them to submit a ticket. It also prioritizes helping the important client first, showing professionalism and good time management skills.
15.
If, while trying to run a new software title, you get the error message "Access Denied" and the program fails to launch, where would you look for the problem?
Correct Answer
D. In the file permissions
Explanation
If you receive an "Access Denied" error message and the program fails to launch, the problem is likely to be found in the file permissions. File permissions determine who can access and modify a file, and if the permissions are not set correctly, it can result in an access denied error. Therefore, checking the file permissions would be the appropriate place to look for the problem in this scenario.
16.
Select the fastest latency for a network ping
Correct Answer
E. 60ms
Explanation
The fastest latency for a network ping is 60ms. Latency refers to the time it takes for data to travel from one point to another in a network. The lower the latency, the faster the data transmission. In this case, 60ms is the lowest value among the given options, indicating the shortest delay for the network ping.
17.
What's the easiest and most common way to resolve most Windows problems?
Correct Answer
Reboot.
Save all data. Close all applications. Restart Windows.
Explanation
The easiest and most common way to resolve most Windows problems is to reboot the system. This helps to clear any temporary issues or conflicts that may be causing the problem. Additionally, it is recommended to save all data, close all applications, and then restart Windows to ensure a clean start and prevent any potential issues from recurring.
18.
What does an assigned IP address 169.254.0.12 indicate?
Correct Answer
D. The computer is configured for DHCP and cannot connect to the DHCP server.
Explanation
The assigned IP address 169.254.0.12 indicates that the computer is configured for DHCP and cannot connect to the DHCP server. This IP address falls within the Automatic Private IP Addressing (APIPA) range, which is used when a computer is unable to obtain an IP address from a DHCP server. In this case, the computer has automatically assigned itself an IP address in order to establish a local network connection, but it cannot connect to the DHCP server to obtain a valid IP address.
19.
Which two are examples of wireless encryption? (Select two answers)
Correct Answer(s)
C. WEP
D. WPA
Explanation
WEP and WPA are both examples of wireless encryption. WEP (Wired Equivalent Privacy) is an older encryption standard that was commonly used in early Wi-Fi networks. However, it is now considered to be weak and easily compromised. WPA (Wi-Fi Protected Access) is a more secure encryption standard that replaced WEP. It provides stronger encryption and better security features, making it the preferred choice for securing wireless networks. VPN (Virtual Private Network), PPP (Point-to-Point Protocol), and MAC (Media Access Control) are not examples of wireless encryption.
20.
Which item is an example of a physical network address?
Correct Answer
B. MAC address
ExplanationA physical network address is a unique identifier assigned to a network device. An IP address is a logical network address used for communication over the internet, while a MAC address is a physical address assigned to the network interface card of a device. Therefore, the MAC address is the correct answer as it represents a physical network address. Workstation name, www.proprofs.com, and
[email protected] are not examples of physical network addresses.
21.
What does the term "Map Network Drive" mean?
Correct Answer
B. Create a shortcut to a network location
Explanation
The term "Map Network Drive" refers to creating a shortcut to a network location. This allows the user to easily access files and folders located on a remote server or network storage device as if they were on their own computer. By mapping a network drive, the user can quickly and conveniently access and manage files without having to manually navigate to the network location every time.
22.
What is the purpose of a DNS server?
Correct Answer
B. To resolve domain names to IP addresses
Explanation
A DNS server is used to resolve domain names to IP addresses. When a user enters a domain name in their web browser, the DNS server translates that domain name into the corresponding IP address of the server hosting the website. This allows the user's device to establish a connection with the correct server and retrieve the requested web page.
23.
Which is an example of a MAC address?
Correct Answer
C. 00-1F-E2-57-DD-A6
24.
As a network administrator you have been requested to move a printer from your company's Marketing OU to your company's Research OU. After the move you test the printer and find that the local administrator assigned to the Marketing OU still has access and can remove print jobs from it. What can you do to change this?
Correct Answer
A. Remove the permissions for the local administrator from the printer
Explanation
To change the access of the local administrator to the printer, you need to remove the permissions assigned to them from the printer. This will ensure that the local administrator no longer has access to remove print jobs from the printer.
25.
Which command will display the assigned IP address of a network adapter installed on a Windows XP system?
Correct Answer
C. Ipconfig
Explanation
Ipconfig is the correct command to display the assigned IP address of a network adapter installed on a Windows XP system. This command is used to view the IP configuration settings of all network adapters on the system, including the assigned IP address, subnet mask, default gateway, and other network information. It is a commonly used command for troubleshooting network connectivity issues and obtaining network configuration details.
26.
What is the standard port for HTTP?
Correct Answer
B. 80
Explanation
The standard port for HTTP is 80. HTTP (Hypertext Transfer Protocol) is the protocol used for transmitting web pages over the internet. When a web browser sends a request to a web server for a webpage, it typically uses port 80 to establish a connection and retrieve the requested information. Port 80 is the default port for HTTP, and most web servers and web browsers use this port by default for HTTP communication.
27.
What is the standard port for HTTPS?
Correct Answer
B. 443
Explanation
HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP, the protocol used for transmitting data over the internet. It uses encryption to protect the data being transmitted. The standard port for HTTPS is 443, which means that when a user types "https://" before a website address, their browser will automatically connect to the server through port 443 to establish a secure connection. This ensures that the data exchanged between the user and the website is encrypted and cannot be easily intercepted or tampered with by unauthorized individuals.
28.
What is the standard port for SMTP?
Correct Answer
B. 25
Explanation
SMTP (Simple Mail Transfer Protocol) is a standard protocol used for sending email messages between servers. The standard port for SMTP is 25. This port is used by mail servers to establish a connection and transfer email data. By using this port, email clients can communicate with the server and send outgoing emails. Therefore, the correct answer is 25.
29.
What is the standard port for IMAP?
Correct Answer
C. 143
Explanation
IMAP (Internet Message Access Protocol) is a standard protocol used for retrieving emails from a mail server. The standard port for IMAP is 143. This port is specifically designated for IMAP communication, allowing email clients to connect to the mail server and retrieve emails. Port 80 is the standard port for HTTP communication, port 443 is the standard port for HTTPS communication, and port 25 is the standard port for SMTP (Simple Mail Transfer Protocol) used for sending emails. Therefore, the correct answer is 143.