1.
A computer network consists of:
Correct Answer
A. Two or more computers that are able to communicate with each other.
Explanation
The correct answer is "Two or more computers that are able to communicate with each other." This is because a computer network is a collection of interconnected devices, such as computers, that can exchange data and communicate with each other. The other options mentioned, such as a router, AT&T Home Networking CPE, and at least 20 computers with a switch, are components or requirements that can be part of a computer network, but they do not define what a computer network actually is.
2.
Most computer networks handle communications using which of the following protocols:
Correct Answer
A. Internet Protocol (IP)
Explanation
The correct answer is Internet Protocol (IP). IP is the protocol used by most computer networks to handle communications. It is responsible for addressing and routing packets of data across the network, ensuring that they are delivered to the correct destination. HTTP is a protocol used specifically for transferring hypertext documents on the World Wide Web. POP3 is a protocol used for receiving email, while FTP is a protocol used for transferring files between computers. However, IP is the underlying protocol that allows all of these other protocols to function.
3.
Networked computers can share:
Correct Answer
A. Files and other network resources.
Explanation
Networked computers can share files and other network resources. This means that multiple computers connected to a network can access and exchange files, such as documents, images, videos, and software applications. Additionally, network resources can include shared printers, scanners, databases, and internet connections. Sharing these resources enhances collaboration, efficiency, and productivity among users on the network.
4.
Which of the following is assigned by the AT&T network?
Correct Answer
A. The WAN IP used by a customer's network.
Explanation
The correct answer is the WAN IP used by a customer's network. This is because the AT&T network assigns the Wide Area Network (WAN) IP address to the customer's network. The WAN IP is the public IP address that is used to identify the customer's network on the internet. The customer's DSL password is used for authentication purposes and is not assigned by the AT&T network. The MAC address is a unique identifier for the customer's computer, but it is not assigned by the network. The LAN IP is assigned by the customer's router or network device, not by the AT&T network.
5.
Which of the following is assigned by the customer's CPE?
Correct Answer
A. The LAN IP used by the customer's computer.
Explanation
The LAN IP used by the customer's computer is assigned by the customer's CPE (Customer Premises Equipment). CPE refers to the networking equipment located at the customer's premises, such as a router or modem. The CPE is responsible for assigning and managing IP addresses within the local network. Therefore, the LAN IP address, which is used for communication within the customer's local network, is assigned by the CPE.
6.
Which of the following IS NOT an AT&T Home Networking CPE?
Correct Answer
A. Motorola 2210
Explanation
The Motorola 2210 is not an AT&T Home Networking CPE.
7.
The Netopia 3347NWG and the Motorola 3347-02:
Correct Answer
A. Are the same device.
Explanation
The Netopia 3347NWG and the Motorola 3347-02 are the same device. The question states that they are the same device and does not provide any information to suggest otherwise. Therefore, it can be concluded that they are indeed the same device.
8.
You can reset 2Wire CPE passwords by:
Correct Answer
A. Using the hard reset button
Explanation
The correct answer is using the hard reset button. This is because the hard reset button is a physical button on the 2Wire CPE device that, when pressed, will reset the device back to its factory settings, including the password. This is a straightforward and direct method of resetting the password without the need for any additional tools or access to the management console.
9.
Powerline adapters are used to…
Correct Answer
A. Network devices over a home's existing electrical wiring.
Explanation
Powerline adapters are devices that allow network devices to be connected and communicate with each other over a home's existing electrical wiring. This means that instead of using traditional Ethernet cables or relying solely on a wireless network, powerline adapters utilize the electrical wiring in the house to create a network connection. This can be particularly useful in situations where wireless signals are weak or unreliable, or when running Ethernet cables throughout the house is not feasible or desired. Powerline adapters essentially extend the reach of the home network by utilizing the electrical wiring infrastructure.
10.
Which kind of 3D-Reach adapter is typically used with laptop computers without a built-in wireless card?
Correct Answer
A. The 3D-Reach PCMCIA wireless adapter.
Explanation
The 3D-Reach PCMCIA wireless adapter is typically used with laptop computers without a built-in wireless card. This type of adapter is designed to fit into the PCMCIA slot on the laptop, allowing it to connect to wireless networks. The black and blue 3D-Reach USB wireless adapters are not specifically mentioned as being used with laptops without a built-in wireless card, so they may be used with other devices or have different compatibility requirements. Therefore, the correct answer is the 3D-Reach PCMCIA wireless adapter.
11.
You can distinguish 1st and 2nd generation 3D-Reach USB adapters by:
Correct Answer
A. Their color and model number.
Explanation
The correct answer is their color and model number. This is because the question is asking how to distinguish between 1st and 2nd generation 3D-Reach USB adapters. The other options mentioned, such as shape, connector type, and printed logo, may vary between different generations of the adapters, but the most reliable and consistent way to differentiate them would be through their color and model number.
12.
For customers who do not have a wireless adapter built in what brand will AT&T provide:
Correct Answer
A. Netopia
Explanation
AT&T will provide Netopia for customers who do not have a wireless adapter built in.
13.
If the custome needs assistance with the configuration of a third party network device
Correct Answer
A. Refer customer to SupportPlus
Explanation
If the customer needs assistance with the configuration of a third-party network device, the best course of action is to refer them to SupportPlus. SupportPlus is a specialized team that can provide the necessary technical support and guidance for configuring and troubleshooting network devices. By referring the customer to SupportPlus, they will receive expert assistance tailored to their specific needs, ensuring a satisfactory resolution to their issue.
14.
Which of the following IS NOT required to establish a wireless network connection?
Correct Answer
A. A wireless telepHone.
Explanation
A wireless telephone is not required to establish a wireless network connection. A wireless telephone is used for making phone calls and does not play a role in connecting devices to a wireless network. On the other hand, a wireless CPE (Customer Premises Equipment) is a device that connects to the internet service provider's network and allows other devices to connect wirelessly. A wireless network adapter is necessary for a device to connect to a wireless network, and a wireless client refers to any device that connects to a wireless network, such as a laptop or smartphone.
15.
Wireless networks present added security risks because:
Correct Answer
A. Users don't need pHysical access to the equipment in order to use the network.
Explanation
Wireless networks present added security risks because users don't need physical access to the equipment in order to use the network. Unlike wired networks, where physical access is required to connect to the network, wireless networks can be accessed remotely. This makes it easier for unauthorized users to gain access to the network and potentially compromise its security. Without physical barriers, it becomes more challenging to control who can connect to the network and increases the risk of unauthorized access and potential security breaches.
16.
True or false: WPA-PSK encryption is more secure than WEP encryption.
Correct Answer
A. True
Explanation
WPA-PSK encryption is more secure than WEP encryption because it uses stronger encryption algorithms and provides better security features. WEP encryption is known to have several vulnerabilities, making it easier for attackers to crack the encryption and gain unauthorized access to the network. On the other hand, WPA-PSK encryption uses more advanced encryption methods, such as TKIP or AES, which are much more difficult to break. Additionally, WPA-PSK supports stronger authentication protocols, making it a more secure choice for wireless networks.
17.
What color is the 1st generation Netopia 3D-Reach USB adapter?
Correct Answer
A. Clear blue.
Explanation
The 1st generation Netopia 3D-Reach USB adapter is clear blue in color.
18.
What color is the 2nd generation Netopia 3D-Reach USB adapter?
Correct Answer
A. Charcoal.
Explanation
The 2nd generation Netopia 3D-Reach USB adapter is colored charcoal.
19.
Uninstalling 3D-Reach wireless adapters can be accomplished by:
Correct Answer
A. Unistalling the device drivers from the Device Manager.
Explanation
To uninstall 3D-Reach wireless adapters, the correct method is to uninstall the device drivers from the Device Manager. This can be done by accessing the Device Manager, locating the wireless adapter under the network adapters section, right-clicking on it, and selecting the "Uninstall" option. This process will remove the drivers associated with the wireless adapter, effectively uninstalling it from the system. The other options mentioned, such as removing the corresponding entry from the Add/Remove Programs window or deleting the program files folder, may not completely remove the adapter and could leave behind residual files or registry entries. Using System Restore to restore to a previous time will not specifically uninstall the adapter, but it may revert the system to a state before the adapter was installed.
20.
To connect to a hidden wireless network with the Windows wireless client, one must:
Correct Answer
A. Enter the network information in the client's Advanced Settings window.
Explanation
To connect to a hidden wireless network with the Windows wireless client, one must enter the network information in the client's Advanced Settings window. This is because hidden networks do not broadcast their network name (SSID), so the user needs to manually enter the network information including the network name and other settings in the Advanced Settings window of the client. This allows the client to establish a connection with the hidden network. Simply clicking on the network name and connecting will not work for hidden networks as they are not visible to the client by default.
21.
The first step for all wireless network troubleshooting is:
Correct Answer
A. Making sure that the network is within proper range of the device that is trying to connect.
Explanation
The first step for all wireless network troubleshooting is to ensure that the network is within proper range of the device that is trying to connect. This is because wireless networks have a limited range, and if the device is too far away from the network, it may not be able to establish a connection. By checking the proximity of the device to the network, we can eliminate distance as a potential issue and focus on other troubleshooting steps if needed.
22.
When a CPE allows access through specified ports in their firewall, this is called:
Correct Answer
A. Port forwarding.
Explanation
Port forwarding is the correct answer because it refers to the process of allowing access to specific ports in a firewall. This feature enables incoming connections from the internet to reach a specific device or service on a local network. By configuring port forwarding, the CPE (Customer Premises Equipment) can redirect incoming traffic to a designated device or service behind the firewall, thus enabling external access to that device or service.
23.
When a CPE is set up to allow traffic to all ports on its network, this is called:
Correct Answer
A. IP passthrough.
Explanation
IP passthrough refers to the configuration of a CPE (Customer Premises Equipment) that allows all traffic to pass through to the network without any filtering or restrictions. In this setup, the CPE essentially acts as a bridge, forwarding all incoming and outgoing traffic to the devices on the network. This is useful in scenarios where the network devices behind the CPE need to have direct access to the internet without any interference from the CPE. Port forwarding, file and print sharing, and wireless networking are all different concepts and not applicable to this scenario.
24.
File and print sharing CANNOT be used to:
Correct Answer
A. Allow traffic through specific ports in the CPE firewall.
Explanation
File and print sharing is a feature that allows users to share files and printers on a network. However, it does not have the capability to allow traffic through specific ports in the CPE (Customer Premises Equipment) firewall. This functionality is typically handled by a separate firewall or network security device. File and print sharing is primarily used for mapping shared resources to network drives, printing documents on network printers, and accessing files from one network computer to another.
25.
Which one of these IS NOT a step necessary to view shared files on another device connected to the network?
Correct Answer
A. Forward the required ports through the CPE firewall.
Explanation
To view shared files on another device connected to the network, it is not necessary to forward the required ports through the CPE firewall. Forwarding ports is typically done to allow incoming connections from the internet to access specific services or applications running on a device within the network. However, for viewing shared files on another device within the same network, it is sufficient to access the shared folder from another network computer, manually allow sharing for the folder, and set up a workgroup.
26.
File and print sharing works best when both computers are:
Correct Answer
A. On the same workgroup.
Explanation
File and print sharing works best when both computers are on the same workgroup because a workgroup is a collection of computers on a local network that share resources and files. When computers are on the same workgroup, it is easier for them to discover and communicate with each other, allowing for efficient file and print sharing. Being on the same Internet service provider, WAN, or LAN is not necessarily required for file and print sharing to work effectively.
27.
Which of the following types of characters can be used in a workgroup name?
Correct Answer
A. _ (underscores) or numbers.
Explanation
Workgroup names can only contain underscores (_) or numbers. Special characters like \ and /, symbols like * and ", and the @ symbol are not allowed in workgroup names.
28.
Which of these is not a type of permission that can be set for each type of user and in each folder?
Correct Answer
A. Copy and paste privileges.
Explanation
The question is asking about the types of permissions that can be set for each type of user and in each folder. The options given are copy and paste privileges, read/write ability, user limit, and password protection. Copy and paste privileges do not fall under the category of permissions that can be set for each type of user and in each folder.
29.
Another term for port forwarding
Correct Answer
A. Pinholes
Explanation
Pinholes refers to another term for port forwarding. Port forwarding is a technique used in computer networking to allow external devices to access services on a private network. It involves redirecting a specific port or ports from the router to a specific device on the network. This allows for better control and security when accessing services remotely. The term "pinholes" is used to describe the small openings or pathways created in the firewall or router to allow this forwarding of ports.
30.
Problems in Breakpoints 2 or 5 (on the AT&T Network side of the CPE) will cause Internet connectivity issues for:
Correct Answer
A. The entire network.
Explanation
Problems in Breakpoints 2 or 5 on the AT&T Network side of the CPE will cause Internet connectivity issues for the entire network. This means that all devices connected to the network will be affected by the problems in these breakpoints. It implies that the issues are not limited to a single device or half of the devices, but rather impact the entire network's connectivity.
31.
Problems in Breakpoint 6 (applications issues) will cause Internet connectivity issues for:
Correct Answer
A. Only a single device on the network.
Explanation
When there are problems in Breakpoint 6 (application issues), it will only affect a single device on the network. This means that the issues are specific to that particular device and do not affect the rest of the devices on the network. The other devices will still have internet connectivity and will not be impacted by the problems in Breakpoint 6.