1.
TCP/IP is installed on each PC within a network. You can communicate within the network but are unable to access the Internet. Which of the following TCP/IP settings must be properly configured for Internet access?
Correct Answer(s)
A. IP Address
C. Default Gateway
D. DNS Server
E. SubNet Mask
Explanation
To access the Internet, the IP Address, Default Gateway, DNS Server, and Subnet Mask must be properly configured. The IP Address is necessary to identify the device within the network and the Default Gateway is required to connect the network to the Internet. The DNS Server is responsible for translating domain names into IP addresses, allowing access to websites. The Subnet Mask helps determine the network and host portions of the IP address. Therefore, all of these settings must be correctly configured for Internet access.
2.
What does Safe Mode permit you to do?
Correct Answer
C. Start Windows using only basic files and drives
Explanation
Safe Mode allows you to start Windows using only basic files and drives. This mode disables unnecessary programs and services, making it easier to troubleshoot and fix any issues that may be causing problems with the normal operation of the computer. By running in Safe Mode, you can isolate and identify the source of the problem and take appropriate actions to resolve it.
3.
Which two connectors are used to connect external peripherals?
Correct Answer(s)
D. PS/2
E. USB
Explanation
PS/2 and USB are the two connectors used to connect external peripherals. PS/2 is a round connector commonly used for connecting keyboards and mice to a computer. USB (Universal Serial Bus) is a rectangular connector that is widely used for connecting various peripherals such as printers, scanners, external hard drives, and more. Both PS/2 and USB connectors provide a reliable and convenient way to connect external devices to a computer system.
4.
What command can you enter at the DOS Prompt to find the MAC address of the computer?
Correct Answer
A. Ipconfig /all
Explanation
The command "ipconfig /all" can be entered at the DOS Prompt to find the MAC address of the computer. This command displays detailed information about the network connections on the computer, including the MAC address.
5.
What command can you enter at a DOS Prompt to check if the computer is communicating to other computers over the network?
Correct Answer
C. Ping
Explanation
The "ping" command is used to check if the computer is communicating to other computers over the network. It sends a small packet of data to a specific IP address or domain name and waits for a response. If the computer receives a response, it means that it is successfully communicating with the other computer.
6.
What is the maximum length of CAT5 cables?
Correct Answer
A. 100 meters
Explanation
CAT5 cables are commonly used for Ethernet networking. The maximum length of CAT5 cables is 100 meters. This is because beyond this length, the signal strength starts to degrade, causing data loss and reduced network performance. To ensure reliable and efficient data transmission, it is recommended to use repeaters or switches to extend the network beyond 100 meters.
7.
What RAID level has three or more drives for redundancy?
Correct Answer
E. RAID 5
Explanation
RAID 5 is the correct answer because it is a RAID level that requires at least three drives for redundancy. In RAID 5, data is striped across multiple drives with distributed parity, which means that if one drive fails, the data can be reconstructed using the parity information stored on the other drives. This provides redundancy and fault tolerance, making RAID 5 a popular choice for data protection in systems with three or more drives.
8.
What connector is used on CAT5 cables?
Correct Answer
E. RJ-45
Explanation
CAT5 cables use RJ-45 connectors. RJ-45 is a registered jack connector commonly used for Ethernet connections. It has eight pins and is designed to connect network devices such as computers, routers, and switches. The RJ-45 connector is compatible with CAT5, CAT5e, and CAT6 cables, which are commonly used for wired Ethernet networks.
9.
What kind of connector is used on telephone line modem cables?
Correct Answer
C. RJ-11
Explanation
RJ-11 is the correct answer because it is the type of connector commonly used on telephone line modem cables. RJ-11 connectors have four or six pins and are used for connecting telephones, fax machines, and modems to telephone lines. They are smaller in size compared to RJ-45 connectors, which are used for Ethernet cables.
10.
Which port does SSL use?
Correct Answer
B. 443
Explanation
HTTPS web sites use SSL over port 443
11.
Which are types of USB connectors?
Correct Answer(s)
A. A
B. B
Explanation
The correct answer is A and B. USB connectors come in different types, and A and B are two of the most common types. Type A connectors are rectangular in shape and are commonly found on computers and larger devices. Type B connectors are square in shape and are typically used for connecting to smaller devices such as printers and scanners. These two types of connectors are widely used and compatible with a wide range of devices.
12.
What type of connector is used on FireWire cables?
Correct Answer
E. 1394
Explanation
FireWire cables use a connector known as 1394.
13.
How many wires are there in a CAT5 cable?
Correct Answer
E. 8
Explanation
A CAT5 cable typically contains 8 wires. These wires are used for transmitting data signals in computer networks. Each wire is color-coded and serves a specific purpose, such as transmitting data, receiving data, or providing power to devices. The CAT5 cable is a common type of Ethernet cable used for wired internet connections and is capable of supporting data transfer speeds up to 1000 Mbps.
14.
What is a proxy server used for?
15.
What tool is used to reset a domain account password?
16.
If I can ping 8.8.8.8, but I can't ping www.google.com, what is the problem?
17.
A user calls you and reports they can't access the Internet. The user is at a remote location and is hard wired directly to the DSL router. Describe your troubleshooting steps.