1.
Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?
Correct Answer
C. Switch
Explanation
A switch is a network device that makes forwarding decisions based on the destination MAC address that is contained in the frame. It examines the MAC address of the incoming frame and determines which port to forward the frame to, based on its destination MAC address. This allows the switch to efficiently send the frame only to the intended recipient, rather than broadcasting it to all connected devices like a hub or repeater would do. A router, on the other hand, makes forwarding decisions based on the destination IP address, not the MAC address.
2.
A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)
Correct Answer(s)
B. Router
C. Switch
E. Wireless access point
Explanation
A multipurpose network device is designed to serve multiple functions within a home network. A router is essential as it connects multiple devices to the internet and directs traffic between them. A switch is used to connect devices within the network and facilitate communication between them. A wireless access point allows wireless devices to connect to the network. Therefore, the correct answer is router, switch, and wireless access point.
3.
Which technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?
Correct Answer
C. Cellular
Explanation
Cellular technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations. Cellular networks provide wireless connectivity using mobile devices, allowing workers to access the Internet on the go. This technology is ideal for businesses with employees who frequently travel or work remotely, as it provides reliable and convenient Internet access regardless of the location. Additionally, cellular networks offer wide coverage and high-speed data connections, making it a suitable choice for businesses that require constant connectivity while on the move.
4.
When is a dial-up connection used to connect to an Internet provider?
Correct Answer
C. When a regular telepHone line is used
Explanation
A dial-up connection is used to connect to an Internet provider when a regular telephone line is used. This is because dial-up connections rely on the traditional telephone network to establish a connection. When a user wants to connect to the internet, they use their computer modem to dial a specific phone number provided by their internet service provider (ISP). The modem then establishes a connection through the telephone line, allowing the user to access the internet. However, dial-up connections are significantly slower compared to high-speed connections provided over cable TV networks or digital connections using ISDN.
5.
Which type of connection to the Internet is capable of the fastest transfer rates?
Correct Answer
D. Cable
Explanation
Cable internet connection is capable of the fastest transfer rates compared to the other options mentioned. Cable internet uses coaxial cables to transmit data, allowing for higher bandwidth and faster speeds. On the other hand, ISDN BRI and PRI are digital telephone services that offer slower transfer rates. Dial-up, although widely used in the past, is an outdated technology that provides slow internet speeds. Therefore, cable internet is the correct answer as it provides the fastest transfer rates.
6.
Which statement describes the logical topology for a LAN?
Correct Answer
A. It describes how computers access the LAN medium.
Explanation
The logical topology for a LAN refers to the way in which computers access the LAN medium. It outlines the method by which data is transmitted between devices on the network, such as through a bus, ring, or star configuration. This description does not involve the physical locations of routers and switches, the number of devices on the network, or the specific way in which computers connect to the LAN.
7.
ABC Company requires preventive maintenance for all local network cabling once a year. Which task should be included in the preventive maintenance program?
Correct Answer
D. Inspect all patch cables for breaks.
Explanation
In order to ensure the smooth functioning of the local network cabling, it is important to include the task of inspecting all patch cables for breaks in the preventive maintenance program. This is because patch cables are prone to wear and tear over time, which can lead to breaks or faults in the cables. By inspecting them regularly, any potential issues can be identified and addressed promptly, preventing any disruptions or downtime in the network.
8.
What is an example of network maintenance?
Correct Answer
B. Educating users on IT policies and procedures
Explanation
Educating users on IT policies and procedures is an example of network maintenance because it helps ensure that users understand and follow the guidelines and protocols necessary for the smooth operation and security of the network. By providing training and information on IT policies, users can learn how to use network resources effectively, avoid potential security breaches, and troubleshoot common issues. This proactive approach to network maintenance helps minimize user errors and promotes a more efficient and secure network environment.
9.
A technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?
Correct Answer
D. The computer cannot communicate with a DHCP server.
Explanation
The most likely problem is that the computer cannot communicate with a DHCP server. This is indicated by the fact that the computer has a 169.254.100.88 IP address, which is in the range of automatic private IP addresses. This suggests that the computer was not able to obtain a valid IP address from a DHCP server. Since the network printer is also on the same network and cannot be accessed, it further supports the idea that there is an issue with the DHCP server.
10.
Which technology is most often used to connect devices to a PAN?
Correct Answer
A. Bluetooth
Explanation
Bluetooth is the most often used technology to connect devices to a Personal Area Network (PAN). Bluetooth is a wireless technology that allows for short-range communication between devices. It is commonly used for connecting devices such as smartphones, tablets, laptops, and peripherals like keyboards, mice, and headphones. Bluetooth provides a convenient and reliable way to establish a PAN, allowing devices to communicate and share data wirelessly over short distances.
11.
Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)
Correct Answer(s)
B. Application
F. Session
G. Presentation
Explanation
The three layers of the OSI model that map to the application layer of the TCP/IP model are application, session, and presentation. The application layer in both models is responsible for providing services and interfaces for applications to communicate with the network. The session layer manages and establishes connections between applications, while the presentation layer handles data formatting and encryption. These three layers work together to ensure that data is properly transmitted and understood between applications.
12.
A device has an IPv6 address listed as 2001:0DB8:75a3:0214:0607:1234:aa10:ba01. What is the interface ID of the device?
Correct Answer
B. 0607:1234:aa10:ba01
Explanation
The interface ID of the device is 0607:1234:aa10:ba01. This is because the IPv6 address is made up of two parts - the network prefix and the interface ID. The network prefix is 2001:0DB8:75a3:0214 and the interface ID is 0607:1234:aa10:ba01. The interface ID uniquely identifies the device on the network.
13.
What is a characteristic of the UDP protocol?
Correct Answer
A. Low overhead
Explanation
The characteristic of the UDP protocol is low overhead. UDP (User Datagram Protocol) is a connectionless protocol that provides a lightweight and efficient method of transmitting data over the network. It does not include error correction, guaranteed delivery, or end-to-end establishment before delivery, making it faster and less resource-intensive compared to other protocols like TCP. Its low overhead makes it suitable for applications that prioritize speed and real-time data transmission over reliability.
14.
What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11g protocol standard?
Correct Answer
A. 802.11a wireless devices will not be able to connect to the wireless network.
Explanation
Configuring a wireless router or access point to operate only in accordance with the 802.11g protocol standard would result in a disadvantage of 802.11a wireless devices not being able to connect to the wireless network. This is because 802.11g and 802.11a use different frequency bands and are not compatible with each other. Therefore, by limiting the router or access point to only support 802.11g, any devices that rely on the 802.11a standard would be unable to connect and utilize the wireless network.
15.
What is the maximum segment length that is specified by the 1000BASE-T standard?
Correct Answer
C. 328 ft (100 m)
Explanation
The maximum segment length specified by the 1000BASE-T standard is 328 ft (100 m). This means that according to the standard, the maximum distance between two devices in a 1000BASE-T network should not exceed 328 ft.
16.
Which two characteristics describe Ethernet technology? (Choose two.)
Correct Answer(s)
A. It is supported by IEEE 802.3 standards.
E. It uses the CSMA/CD access control method.
Explanation
Ethernet technology is supported by IEEE 802.3 standards, which define the physical and data link layer specifications for Ethernet networks. It also uses the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) access control method, which allows multiple devices to share the same network medium and detect and resolve collisions when they occur.
17.
Which three factors are reasons for a company to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
Correct Answer(s)
A. The company network requires secure access to confidential information.
D. The data gathered by the employees is critical and should be backed up on a regular basis.
F. The users need a central database to store inventory and sales information.
Explanation
The three factors that make a client/server model more suitable for a company network instead of peer-to-peer are: the need for secure access to confidential information, the criticality of backing up the data gathered by employees on a regular basis, and the requirement for a central database to store inventory and sales information.
18.
What benefit is provided by a computer data network?
Correct Answer
C. Resource sharing
Explanation
A computer data network provides the benefit of resource sharing. This means that multiple devices connected to the network can access and share resources such as files, printers, and software applications. This promotes collaboration and efficiency as it eliminates the need for each device to have its own dedicated resources. For example, multiple users can access and edit a shared document simultaneously, or multiple devices can connect to a shared printer. This not only saves costs but also improves productivity by enabling easy access to shared resources from any connected device on the network.
19.
When would a printer be considered a network host?
Correct Answer
C. When it is connected to a switch
Explanation
A printer would be considered a network host when it is connected to a switch because a switch is a networking device that connects multiple devices together in a local area network (LAN). When a printer is connected to a switch, it becomes a part of the network and can communicate with other devices on the same network. This allows other devices, such as workstations, laptops, or PCs, to send print jobs to the printer over the network, making it a network host.
20.
A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?
Correct Answer
A. The PC default gateway address is missing or incorrect.
Explanation
If the user is able to print to a printer on the same network but cannot reach the internet, it suggests that the issue lies with the user's default gateway address. The default gateway is the IP address of the router or gateway device that connects the local network to the internet. If the default gateway address is missing or incorrect on the user's PC, it means that the PC does not know where to send the internet traffic, resulting in the inability to reach the internet.
21.
What is identified by the 100 in the 100BASE-TX standard?
Correct Answer
D. The maximum bandwidth in Mb/s
Explanation
The 100 in the 100BASE-TX standard refers to the maximum bandwidth in Mb/s. This standard specifies that the maximum data transfer rate for this type of Ethernet connection is 100 megabits per second.
22.
A user installs a new gigabit NIC in a PC. The user notices that the data transfer rate is much slower than expected. What should the user do to fix the problem?
Correct Answer
A. Change the NIC duplex setting from half duplex to full duplex.
Explanation
The user should change the NIC duplex setting from half duplex to full duplex. This is because half duplex mode allows data to be transmitted in only one direction at a time, while full duplex mode allows for simultaneous two-way communication. By changing the setting to full duplex, the data transfer rate should improve as it allows for faster and more efficient communication between the PC and the network.
23.
A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers do. The original computers performed much faster with applications that required the transfer of data over the network. What should the company technicians do?
Correct Answer
B. Check if the network interface cards in the refurbished computers are limited to 10 Mb/s
Explanation
The refurbished computers are performing significantly worse than the original networked computers because their network interface cards may be limited to a speed of 10 Mb/s. This limitation in the network interface cards can result in slower data transfer over the network, causing the applications to perform slower. To resolve this issue, the company technicians should check the network interface cards in the refurbished computers and determine if they are indeed limited to 10 Mb/s.