Review Quiz - Module 12

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Xtnq_tjay
X
Xtnq_tjay
Community Contributor
Quizzes Created: 9 | Total Attempts: 2,748
| Attempts: 69 | Questions: 31
Please wait...
Question 1 / 31
0 %
0/100
Score 0/100
1. A computer network consists of:

Explanation

The correct answer is "Two or more computers that are able to communicate with each other." This is because a computer network is a collection of interconnected devices, such as computers, that can exchange data and communicate with each other. The other options mentioned, such as a router, AT&T Home Networking CPE, and at least 20 computers with a switch, are components or requirements that can be part of a computer network, but they do not define what a computer network actually is.

Submit
Please wait...
About This Quiz
Networking Quizzes & Trivia

The 'Review Quiz - Module 12' assesses understanding of basic networking concepts, including computer network structures, communication protocols, and IP address assignments. This quiz is essential for learners aiming to grasp fundamental networking skills.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Networked computers can share:

Explanation

Networked computers can share files and other network resources. This means that multiple computers connected to a network can access and exchange files, such as documents, images, videos, and software applications. Additionally, network resources can include shared printers, scanners, databases, and internet connections. Sharing these resources enhances collaboration, efficiency, and productivity among users on the network.

Submit
3. If the custome needs assistance with the configuration of a third party network device

Explanation

If the customer needs assistance with the configuration of a third-party network device, the best course of action is to refer them to SupportPlus. SupportPlus is a specialized team that can provide the necessary technical support and guidance for configuring and troubleshooting network devices. By referring the customer to SupportPlus, they will receive expert assistance tailored to their specific needs, ensuring a satisfactory resolution to their issue.

Submit
4. When a CPE is set up to allow traffic to all ports on its network, this is called:

Explanation

IP passthrough refers to the configuration of a CPE (Customer Premises Equipment) that allows all traffic to pass through to the network without any filtering or restrictions. In this setup, the CPE essentially acts as a bridge, forwarding all incoming and outgoing traffic to the devices on the network. This is useful in scenarios where the network devices behind the CPE need to have direct access to the internet without any interference from the CPE. Port forwarding, file and print sharing, and wireless networking are all different concepts and not applicable to this scenario.

Submit
5. Most computer networks handle communications using which of the following protocols:

Explanation

The correct answer is Internet Protocol (IP). IP is the protocol used by most computer networks to handle communications. It is responsible for addressing and routing packets of data across the network, ensuring that they are delivered to the correct destination. HTTP is a protocol used specifically for transferring hypertext documents on the World Wide Web. POP3 is a protocol used for receiving email, while FTP is a protocol used for transferring files between computers. However, IP is the underlying protocol that allows all of these other protocols to function.

Submit
6. True or false:  WPA-PSK encryption is more secure than WEP encryption.

Explanation

WPA-PSK encryption is more secure than WEP encryption because it uses stronger encryption algorithms and provides better security features. WEP encryption is known to have several vulnerabilities, making it easier for attackers to crack the encryption and gain unauthorized access to the network. On the other hand, WPA-PSK encryption uses more advanced encryption methods, such as TKIP or AES, which are much more difficult to break. Additionally, WPA-PSK supports stronger authentication protocols, making it a more secure choice for wireless networks.

Submit
7. What color is the 2nd generation Netopia 3D-Reach USB adapter?

Explanation

The 2nd generation Netopia 3D-Reach USB adapter is colored charcoal.

Submit
8. The first step for all wireless network troubleshooting is:

Explanation

The first step for all wireless network troubleshooting is to ensure that the network is within proper range of the device that is trying to connect. This is because wireless networks have a limited range, and if the device is too far away from the network, it may not be able to establish a connection. By checking the proximity of the device to the network, we can eliminate distance as a potential issue and focus on other troubleshooting steps if needed.

Submit
9. Problems in Breakpoints 2 or 5 (on the AT&T Network side of the CPE) will cause Internet connectivity issues for:

Explanation

Problems in Breakpoints 2 or 5 on the AT&T Network side of the CPE will cause Internet connectivity issues for the entire network. This means that all devices connected to the network will be affected by the problems in these breakpoints. It implies that the issues are not limited to a single device or half of the devices, but rather impact the entire network's connectivity.

Submit
10. Which of the following is assigned by the customer's CPE?

Explanation

The LAN IP used by the customer's computer is assigned by the customer's CPE (Customer Premises Equipment). CPE refers to the networking equipment located at the customer's premises, such as a router or modem. The CPE is responsible for assigning and managing IP addresses within the local network. Therefore, the LAN IP address, which is used for communication within the customer's local network, is assigned by the CPE.

Submit
11. Which one of these IS NOT a step necessary to view shared files on another device connected to the network?

Explanation

To view shared files on another device connected to the network, it is not necessary to forward the required ports through the CPE firewall. Forwarding ports is typically done to allow incoming connections from the internet to access specific services or applications running on a device within the network. However, for viewing shared files on another device within the same network, it is sufficient to access the shared folder from another network computer, manually allow sharing for the folder, and set up a workgroup.

Submit
12. Problems in Breakpoint 6 (applications issues) will cause Internet connectivity issues for:

Explanation

When there are problems in Breakpoint 6 (application issues), it will only affect a single device on the network. This means that the issues are specific to that particular device and do not affect the rest of the devices on the network. The other devices will still have internet connectivity and will not be impacted by the problems in Breakpoint 6.

Submit
13. Which of the following IS NOT required to establish a wireless network connection?

Explanation

A wireless telephone is not required to establish a wireless network connection. A wireless telephone is used for making phone calls and does not play a role in connecting devices to a wireless network. On the other hand, a wireless CPE (Customer Premises Equipment) is a device that connects to the internet service provider's network and allows other devices to connect wirelessly. A wireless network adapter is necessary for a device to connect to a wireless network, and a wireless client refers to any device that connects to a wireless network, such as a laptop or smartphone.

Submit
14. When a CPE allows access through specified ports in their firewall, this is called:

Explanation

Port forwarding is the correct answer because it refers to the process of allowing access to specific ports in a firewall. This feature enables incoming connections from the internet to reach a specific device or service on a local network. By configuring port forwarding, the CPE (Customer Premises Equipment) can redirect incoming traffic to a designated device or service behind the firewall, thus enabling external access to that device or service.

Submit
15. Another term for port forwarding

Explanation

Pinholes refers to another term for port forwarding. Port forwarding is a technique used in computer networking to allow external devices to access services on a private network. It involves redirecting a specific port or ports from the router to a specific device on the network. This allows for better control and security when accessing services remotely. The term "pinholes" is used to describe the small openings or pathways created in the firewall or router to allow this forwarding of ports.

Submit
16. Which of the following IS NOT an AT&T Home Networking CPE?

Explanation

The Motorola 2210 is not an AT&T Home Networking CPE.

Submit
17. The Netopia 3347NWG and the Motorola 3347-02:

Explanation

The Netopia 3347NWG and the Motorola 3347-02 are the same device. The question states that they are the same device and does not provide any information to suggest otherwise. Therefore, it can be concluded that they are indeed the same device.

Submit
18. For customers who do not have a wireless adapter built in what brand will AT&T provide:

Explanation

AT&T will provide Netopia for customers who do not have a wireless adapter built in.

Submit
19. Which of the following is assigned by the AT&T network?

Explanation

The correct answer is the WAN IP used by a customer's network. This is because the AT&T network assigns the Wide Area Network (WAN) IP address to the customer's network. The WAN IP is the public IP address that is used to identify the customer's network on the internet. The customer's DSL password is used for authentication purposes and is not assigned by the AT&T network. The MAC address is a unique identifier for the customer's computer, but it is not assigned by the network. The LAN IP is assigned by the customer's router or network device, not by the AT&T network.

Submit
20. You can distinguish 1st and 2nd generation 3D-Reach USB adapters by:

Explanation

The correct answer is their color and model number. This is because the question is asking how to distinguish between 1st and 2nd generation 3D-Reach USB adapters. The other options mentioned, such as shape, connector type, and printed logo, may vary between different generations of the adapters, but the most reliable and consistent way to differentiate them would be through their color and model number.

Submit
21. Which of the following types of characters can be used in a workgroup name?

Explanation

Workgroup names can only contain underscores (_) or numbers. Special characters like \ and /, symbols like * and ", and the @ symbol are not allowed in workgroup names.

Submit
22. Which of these is not a type of permission that can be set for each type of user and in each folder?

Explanation

The question is asking about the types of permissions that can be set for each type of user and in each folder. The options given are copy and paste privileges, read/write ability, user limit, and password protection. Copy and paste privileges do not fall under the category of permissions that can be set for each type of user and in each folder.

Submit
23. What color is the 1st generation Netopia 3D-Reach USB adapter?

Explanation

The 1st generation Netopia 3D-Reach USB adapter is clear blue in color.

Submit
24. You can reset 2Wire CPE passwords by:

Explanation

The correct answer is using the hard reset button. This is because the hard reset button is a physical button on the 2Wire CPE device that, when pressed, will reset the device back to its factory settings, including the password. This is a straightforward and direct method of resetting the password without the need for any additional tools or access to the management console.

Submit
25. File and print sharing CANNOT be used to:

Explanation

File and print sharing is a feature that allows users to share files and printers on a network. However, it does not have the capability to allow traffic through specific ports in the CPE (Customer Premises Equipment) firewall. This functionality is typically handled by a separate firewall or network security device. File and print sharing is primarily used for mapping shared resources to network drives, printing documents on network printers, and accessing files from one network computer to another.

Submit
26. Wireless networks present added security risks because:

Explanation

Wireless networks present added security risks because users don't need physical access to the equipment in order to use the network. Unlike wired networks, where physical access is required to connect to the network, wireless networks can be accessed remotely. This makes it easier for unauthorized users to gain access to the network and potentially compromise its security. Without physical barriers, it becomes more challenging to control who can connect to the network and increases the risk of unauthorized access and potential security breaches.

Submit
27. File and print sharing works best when both computers are:

Explanation

File and print sharing works best when both computers are on the same workgroup because a workgroup is a collection of computers on a local network that share resources and files. When computers are on the same workgroup, it is easier for them to discover and communicate with each other, allowing for efficient file and print sharing. Being on the same Internet service provider, WAN, or LAN is not necessarily required for file and print sharing to work effectively.

Submit
28. Powerline adapters are used to…

Explanation

Powerline adapters are devices that allow network devices to be connected and communicate with each other over a home's existing electrical wiring. This means that instead of using traditional Ethernet cables or relying solely on a wireless network, powerline adapters utilize the electrical wiring in the house to create a network connection. This can be particularly useful in situations where wireless signals are weak or unreliable, or when running Ethernet cables throughout the house is not feasible or desired. Powerline adapters essentially extend the reach of the home network by utilizing the electrical wiring infrastructure.

Submit
29. Uninstalling 3D-Reach wireless adapters can be accomplished by:

Explanation

To uninstall 3D-Reach wireless adapters, the correct method is to uninstall the device drivers from the Device Manager. This can be done by accessing the Device Manager, locating the wireless adapter under the network adapters section, right-clicking on it, and selecting the "Uninstall" option. This process will remove the drivers associated with the wireless adapter, effectively uninstalling it from the system. The other options mentioned, such as removing the corresponding entry from the Add/Remove Programs window or deleting the program files folder, may not completely remove the adapter and could leave behind residual files or registry entries. Using System Restore to restore to a previous time will not specifically uninstall the adapter, but it may revert the system to a state before the adapter was installed.

Submit
30. Which kind of 3D-Reach adapter is typically used with laptop computers without a built-in wireless card?

Explanation

The 3D-Reach PCMCIA wireless adapter is typically used with laptop computers without a built-in wireless card. This type of adapter is designed to fit into the PCMCIA slot on the laptop, allowing it to connect to wireless networks. The black and blue 3D-Reach USB wireless adapters are not specifically mentioned as being used with laptops without a built-in wireless card, so they may be used with other devices or have different compatibility requirements. Therefore, the correct answer is the 3D-Reach PCMCIA wireless adapter.

Submit
31. To connect to a hidden wireless network with the Windows wireless client, one must:

Explanation

To connect to a hidden wireless network with the Windows wireless client, one must enter the network information in the client's Advanced Settings window. This is because hidden networks do not broadcast their network name (SSID), so the user needs to manually enter the network information including the network name and other settings in the Advanced Settings window of the client. This allows the client to establish a connection with the hidden network. Simply clicking on the network name and connecting will not work for hidden networks as they are not visible to the client by default.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 22, 2011
    Quiz Created by
    Xtnq_tjay
Cancel
  • All
    All (31)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A computer network consists of:
Networked computers can share:
If the custome needs assistance with the configuration of a third...
When a CPE is set up to allow traffic to all ports on its network,...
Most computer networks handle communications using which of the...
True or false:  WPA-PSK encryption is more secure than WEP...
What color is the 2nd generation Netopia 3D-Reach USB adapter?
The first step for all wireless network troubleshooting is:
Problems in Breakpoints 2 or 5 (on the AT&T Network side of the...
Which of the following is assigned by the customer's CPE?
Which one of these IS NOT a step necessary to view shared files on...
Problems in Breakpoint 6 (applications issues) will cause Internet...
Which of the following IS NOT required to establish a wireless network...
When a CPE allows access through specified ports in their firewall,...
Another term for port forwarding
Which of the following IS NOT an AT&T Home Networking CPE?
The Netopia 3347NWG and the Motorola 3347-02:
For customers who do not have a wireless adapter built in what brand...
Which of the following is assigned by the AT&T network?
You can distinguish 1st and 2nd generation 3D-Reach USB adapters by:
Which of the following types of characters can be used in a workgroup...
Which of these is not a type of permission that can be set for each...
What color is the 1st generation Netopia 3D-Reach USB adapter?
You can reset 2Wire CPE passwords by:
File and print sharing CANNOT be used to:
Wireless networks present added security risks because:
File and print sharing works best when both computers are:
Powerline adapters are used to…
Uninstalling 3D-Reach wireless adapters can be accomplished by:
Which kind of 3D-Reach adapter is typically used with laptop computers...
To connect to a hidden wireless network with the Windows wireless...
Alert!

Advertisement