Review Quiz - Module 12

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Xtnq_tjay
X
Xtnq_tjay
Community Contributor
Quizzes Created: 9 | Total Attempts: 2,398
Questions: 31 | Attempts: 64

SettingsSettingsSettings
Module Quizzes & Trivia

This is a review.


Questions and Answers
  • 1. 

    A computer network consists of:

    • A.

      Two or more computers that are able to communicate with each other.

    • B.

      A router.

    • C.

      An AT&T Home Networking CPE.

    • D.

      At least 20 computers and a switch.

    Correct Answer
    A. Two or more computers that are able to communicate with each other.
    Explanation
    The correct answer is "Two or more computers that are able to communicate with each other." This is because a computer network is a collection of interconnected devices, such as computers, that can exchange data and communicate with each other. The other options mentioned, such as a router, AT&T Home Networking CPE, and at least 20 computers with a switch, are components or requirements that can be part of a computer network, but they do not define what a computer network actually is.

    Rate this question:

  • 2. 

    Most computer networks handle communications using which of the following protocols:

    • A.

      Internet Protocol (IP)

    • B.

      Hypertext Transfer Protocol (HTTP)

    • C.

      Post Office Protocol 3 (POP3)

    • D.

      File Transfer Protocol (FTP)

    Correct Answer
    A. Internet Protocol (IP)
    Explanation
    The correct answer is Internet Protocol (IP). IP is the protocol used by most computer networks to handle communications. It is responsible for addressing and routing packets of data across the network, ensuring that they are delivered to the correct destination. HTTP is a protocol used specifically for transferring hypertext documents on the World Wide Web. POP3 is a protocol used for receiving email, while FTP is a protocol used for transferring files between computers. However, IP is the underlying protocol that allows all of these other protocols to function.

    Rate this question:

  • 3. 

    Networked computers can share:

    • A.

      Files and other network resources.

    • B.

      An IP address.

    • C.

      A power cable.

    • D.

      A MAC address.

    Correct Answer
    A. Files and other network resources.
    Explanation
    Networked computers can share files and other network resources. This means that multiple computers connected to a network can access and exchange files, such as documents, images, videos, and software applications. Additionally, network resources can include shared printers, scanners, databases, and internet connections. Sharing these resources enhances collaboration, efficiency, and productivity among users on the network.

    Rate this question:

  • 4. 

    Which of the following is assigned by the AT&T network?

    • A.

      The WAN IP used by a customer's network.

    • B.

      The customer's DSL password.

    • C.

      The MAC address used by the customer's computer.

    • D.

      The LAN IP used by the customer's computer.

    Correct Answer
    A. The WAN IP used by a customer's network.
    Explanation
    The correct answer is the WAN IP used by a customer's network. This is because the AT&T network assigns the Wide Area Network (WAN) IP address to the customer's network. The WAN IP is the public IP address that is used to identify the customer's network on the internet. The customer's DSL password is used for authentication purposes and is not assigned by the AT&T network. The MAC address is a unique identifier for the customer's computer, but it is not assigned by the network. The LAN IP is assigned by the customer's router or network device, not by the AT&T network.

    Rate this question:

  • 5. 

    Which of the following is assigned by the customer's CPE?

    • A.

      The LAN IP used by the customer's computer.

    • B.

      The customer's DSL password.

    • C.

      The MAC address used by the customer's computer.

    • D.

      The WAN IP used by the customer's network.

    Correct Answer
    A. The LAN IP used by the customer's computer.
    Explanation
    The LAN IP used by the customer's computer is assigned by the customer's CPE (Customer Premises Equipment). CPE refers to the networking equipment located at the customer's premises, such as a router or modem. The CPE is responsible for assigning and managing IP addresses within the local network. Therefore, the LAN IP address, which is used for communication within the customer's local network, is assigned by the CPE.

    Rate this question:

  • 6. 

    Which of the following IS NOT an AT&T Home Networking CPE?

    • A.

      Motorola 2210

    • B.

      2Wire 2701

    • C.

      Netopia 3347NWG

    • D.

      2Wire 2701

    Correct Answer
    A. Motorola 2210
    Explanation
    The Motorola 2210 is not an AT&T Home Networking CPE.

    Rate this question:

  • 7. 

    The Netopia 3347NWG and the Motorola 3347-02:

    • A.

      Are the same device.

    • B.

      Have a different number of Ethernet ports.

    • C.

      Are different in terms of their wireless and IP mapping capabilities.

    • D.

      Are distinguishable by the color of the casing, the NWG is gray while the 02 is black.

    Correct Answer
    A. Are the same device.
    Explanation
    The Netopia 3347NWG and the Motorola 3347-02 are the same device. The question states that they are the same device and does not provide any information to suggest otherwise. Therefore, it can be concluded that they are indeed the same device.

    Rate this question:

  • 8. 

    You can reset 2Wire CPE passwords by:

    • A.

      Using the hard reset button

    • B.

      Logging into the Management console and clicking the "Reset My Password" link.

    • C.

      Using CMS

    • D.

      Using Remote Control to assist the customer with the task.

    Correct Answer
    A. Using the hard reset button
    Explanation
    The correct answer is using the hard reset button. This is because the hard reset button is a physical button on the 2Wire CPE device that, when pressed, will reset the device back to its factory settings, including the password. This is a straightforward and direct method of resetting the password without the need for any additional tools or access to the management console.

    Rate this question:

  • 9. 

    Powerline adapters are used to…

    • A.

      Network devices over a home's existing electrical wiring.

    • B.

      Recharge laptop computers and other devices.

    • C.

      Connect devices to a wireless network.

    • D.

      Power AT&T CPE using different types of electrical outlets.

    Correct Answer
    A. Network devices over a home's existing electrical wiring.
    Explanation
    Powerline adapters are devices that allow network devices to be connected and communicate with each other over a home's existing electrical wiring. This means that instead of using traditional Ethernet cables or relying solely on a wireless network, powerline adapters utilize the electrical wiring in the house to create a network connection. This can be particularly useful in situations where wireless signals are weak or unreliable, or when running Ethernet cables throughout the house is not feasible or desired. Powerline adapters essentially extend the reach of the home network by utilizing the electrical wiring infrastructure.

    Rate this question:

  • 10. 

    Which kind of 3D-Reach adapter is typically used with laptop computers without a built-in wireless card?

    • A.

      The 3D-Reach PCMCIA wireless adapter.

    • B.

      The black 3D-Reach USB wireless adapter.

    • C.

      The blue 3D-Reach USB wireless adapter.

    • D.

      Any of them. Any of them. Any of them.

    Correct Answer
    A. The 3D-Reach PCMCIA wireless adapter.
    Explanation
    The 3D-Reach PCMCIA wireless adapter is typically used with laptop computers without a built-in wireless card. This type of adapter is designed to fit into the PCMCIA slot on the laptop, allowing it to connect to wireless networks. The black and blue 3D-Reach USB wireless adapters are not specifically mentioned as being used with laptops without a built-in wireless card, so they may be used with other devices or have different compatibility requirements. Therefore, the correct answer is the 3D-Reach PCMCIA wireless adapter.

    Rate this question:

  • 11. 

    You can distinguish 1st and 2nd generation 3D-Reach USB adapters by:

    • A.

      Their color and model number.

    • B.

      Their shape.

    • C.

      They type of connector they use.

    • D.

      The printed logo on the device.

    Correct Answer
    A. Their color and model number.
    Explanation
    The correct answer is their color and model number. This is because the question is asking how to distinguish between 1st and 2nd generation 3D-Reach USB adapters. The other options mentioned, such as shape, connector type, and printed logo, may vary between different generations of the adapters, but the most reliable and consistent way to differentiate them would be through their color and model number.

    Rate this question:

  • 12. 

    For customers who do not have a wireless adapter built in what brand will AT&T provide:

    • A.

      Netopia

    • B.

      Belkin

    • C.

      Cisco

    • D.

      AT&T

    Correct Answer
    A. Netopia
    Explanation
    AT&T will provide Netopia for customers who do not have a wireless adapter built in.

    Rate this question:

  • 13. 

    If the custome needs assistance with the configuration of a third party network device

    • A.

      Refer customer to SupportPlus

    • B.

      Transfer customer to BBCCA

    • C.

      Assist the customer with bridging the device

    • D.

      Escalate issue to your manager

    Correct Answer
    A. Refer customer to SupportPlus
    Explanation
    If the customer needs assistance with the configuration of a third-party network device, the best course of action is to refer them to SupportPlus. SupportPlus is a specialized team that can provide the necessary technical support and guidance for configuring and troubleshooting network devices. By referring the customer to SupportPlus, they will receive expert assistance tailored to their specific needs, ensuring a satisfactory resolution to their issue.

    Rate this question:

  • 14. 

    Which of the following IS NOT required to establish a wireless network connection?

    • A.

      A wireless telephone.

    • B.

      A wireless CPE.

    • C.

      A wireless network adapter.

    • D.

      A wireless client.

    Correct Answer
    A. A wireless telepHone.
    Explanation
    A wireless telephone is not required to establish a wireless network connection. A wireless telephone is used for making phone calls and does not play a role in connecting devices to a wireless network. On the other hand, a wireless CPE (Customer Premises Equipment) is a device that connects to the internet service provider's network and allows other devices to connect wirelessly. A wireless network adapter is necessary for a device to connect to a wireless network, and a wireless client refers to any device that connects to a wireless network, such as a laptop or smartphone.

    Rate this question:

  • 15. 

    Wireless networks present added security risks because:

    • A.

      Users don't need physical access to the equipment in order to use the network.

    • B.

      They do not encrypt signals like wired networks do.

    • C.

      There is no way to prevent users from accessing the network.

    • D.

      More users are allowed on the network at one time.

    Correct Answer
    A. Users don't need pHysical access to the equipment in order to use the network.
    Explanation
    Wireless networks present added security risks because users don't need physical access to the equipment in order to use the network. Unlike wired networks, where physical access is required to connect to the network, wireless networks can be accessed remotely. This makes it easier for unauthorized users to gain access to the network and potentially compromise its security. Without physical barriers, it becomes more challenging to control who can connect to the network and increases the risk of unauthorized access and potential security breaches.

    Rate this question:

  • 16. 

    True or false:  WPA-PSK encryption is more secure than WEP encryption.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    WPA-PSK encryption is more secure than WEP encryption because it uses stronger encryption algorithms and provides better security features. WEP encryption is known to have several vulnerabilities, making it easier for attackers to crack the encryption and gain unauthorized access to the network. On the other hand, WPA-PSK encryption uses more advanced encryption methods, such as TKIP or AES, which are much more difficult to break. Additionally, WPA-PSK supports stronger authentication protocols, making it a more secure choice for wireless networks.

    Rate this question:

  • 17. 

    What color is the 1st generation Netopia 3D-Reach USB adapter?

    • A.

      Clear blue.

    • B.

      Clear gray.

    • C.

      Charcoal.

    • D.

      Purple.

    Correct Answer
    A. Clear blue.
    Explanation
    The 1st generation Netopia 3D-Reach USB adapter is clear blue in color.

    Rate this question:

  • 18. 

    What color is the 2nd generation Netopia 3D-Reach USB adapter?

    • A.

      Charcoal.

    • B.

      Clear green.

    • C.

      Clear yellow.

    • D.

      Clear blue.

    Correct Answer
    A. Charcoal.
    Explanation
    The 2nd generation Netopia 3D-Reach USB adapter is colored charcoal.

    Rate this question:

  • 19. 

    Uninstalling 3D-Reach wireless adapters can be accomplished by:

    • A.

      Unistalling the device drivers from the Device Manager.

    • B.

      Removing the corresponding entry from the Add/Remove Programs window in the Control Panel.

    • C.

      Deleting the c:\Program Files\Netopia\ folder.

    • D.

      Using System Restore to restore to a time before the device was installed.

    Correct Answer
    A. Unistalling the device drivers from the Device Manager.
    Explanation
    To uninstall 3D-Reach wireless adapters, the correct method is to uninstall the device drivers from the Device Manager. This can be done by accessing the Device Manager, locating the wireless adapter under the network adapters section, right-clicking on it, and selecting the "Uninstall" option. This process will remove the drivers associated with the wireless adapter, effectively uninstalling it from the system. The other options mentioned, such as removing the corresponding entry from the Add/Remove Programs window or deleting the program files folder, may not completely remove the adapter and could leave behind residual files or registry entries. Using System Restore to restore to a previous time will not specifically uninstall the adapter, but it may revert the system to a state before the adapter was installed.

    Rate this question:

  • 20. 

    To connect to a hidden wireless network with the Windows wireless client, one must:

    • A.

      Enter the network information in the client's Advanced Settings window.

    • B.

      Click the "Add New Network" button on the client's main window.

    • C.

      Simply click on the network name, enter the encryption key, and then connect.

    • D.

      Simply click on the network name and connect.

    Correct Answer
    A. Enter the network information in the client's Advanced Settings window.
    Explanation
    To connect to a hidden wireless network with the Windows wireless client, one must enter the network information in the client's Advanced Settings window. This is because hidden networks do not broadcast their network name (SSID), so the user needs to manually enter the network information including the network name and other settings in the Advanced Settings window of the client. This allows the client to establish a connection with the hidden network. Simply clicking on the network name and connecting will not work for hidden networks as they are not visible to the client by default.

    Rate this question:

  • 21. 

    The first step for all wireless network troubleshooting is:

    • A.

      Making sure that the network is within proper range of the device that is trying to connect.

    • B.

      Re-entering all wireless network settings in the client.

    • C.

      Reinstalling the wireless adapter.

    • D.

      Reconfiguring the CPE.

    Correct Answer
    A. Making sure that the network is within proper range of the device that is trying to connect.
    Explanation
    The first step for all wireless network troubleshooting is to ensure that the network is within proper range of the device that is trying to connect. This is because wireless networks have a limited range, and if the device is too far away from the network, it may not be able to establish a connection. By checking the proximity of the device to the network, we can eliminate distance as a potential issue and focus on other troubleshooting steps if needed.

    Rate this question:

  • 22. 

    When a CPE allows access through specified ports in their firewall, this is called:

    • A.

      Port forwarding.

    • B.

      IP passthrough.

    • C.

      Wireless networking.

    • D.

      File and print sharing.

    Correct Answer
    A. Port forwarding.
    Explanation
    Port forwarding is the correct answer because it refers to the process of allowing access to specific ports in a firewall. This feature enables incoming connections from the internet to reach a specific device or service on a local network. By configuring port forwarding, the CPE (Customer Premises Equipment) can redirect incoming traffic to a designated device or service behind the firewall, thus enabling external access to that device or service.

    Rate this question:

  • 23. 

    When a CPE is set up to allow traffic to all ports on its network, this is called:

    • A.

      IP passthrough.

    • B.

      Port forwarding.

    • C.

      File and print sharing.

    • D.

      Wireless networking.

    Correct Answer
    A. IP passthrough.
    Explanation
    IP passthrough refers to the configuration of a CPE (Customer Premises Equipment) that allows all traffic to pass through to the network without any filtering or restrictions. In this setup, the CPE essentially acts as a bridge, forwarding all incoming and outgoing traffic to the devices on the network. This is useful in scenarios where the network devices behind the CPE need to have direct access to the internet without any interference from the CPE. Port forwarding, file and print sharing, and wireless networking are all different concepts and not applicable to this scenario.

    Rate this question:

  • 24. 

    File and print sharing CANNOT be used to:

    • A.

      Allow traffic through specific ports in the CPE firewall.

    • B.

      Map a shared resource to a network drive.

    • C.

      Print a document on a printer that is attached to another device on the network.

    • D.

      Access files from one network computer from a second networked computer.

    Correct Answer
    A. Allow traffic through specific ports in the CPE firewall.
    Explanation
    File and print sharing is a feature that allows users to share files and printers on a network. However, it does not have the capability to allow traffic through specific ports in the CPE (Customer Premises Equipment) firewall. This functionality is typically handled by a separate firewall or network security device. File and print sharing is primarily used for mapping shared resources to network drives, printing documents on network printers, and accessing files from one network computer to another.

    Rate this question:

  • 25. 

    Which one of these IS NOT a step necessary to view shared files on another device connected to the network?

    • A.

      Forward the required ports through the CPE firewall.

    • B.

      Access the shared folder from another network computer.

    • C.

      Manually allow sharing for the folder that you wish to share.

    • D.

      Set up a workgroup.

    Correct Answer
    A. Forward the required ports through the CPE firewall.
    Explanation
    To view shared files on another device connected to the network, it is not necessary to forward the required ports through the CPE firewall. Forwarding ports is typically done to allow incoming connections from the internet to access specific services or applications running on a device within the network. However, for viewing shared files on another device within the same network, it is sufficient to access the shared folder from another network computer, manually allow sharing for the folder, and set up a workgroup.

    Rate this question:

  • 26. 

    File and print sharing works best when both computers are:

    • A.

      On the same workgroup.

    • B.

      On the same Internet service provider.

    • C.

      On the same WAN.

    • D.

      On the same LAN.

    Correct Answer
    A. On the same workgroup.
    Explanation
    File and print sharing works best when both computers are on the same workgroup because a workgroup is a collection of computers on a local network that share resources and files. When computers are on the same workgroup, it is easier for them to discover and communicate with each other, allowing for efficient file and print sharing. Being on the same Internet service provider, WAN, or LAN is not necessarily required for file and print sharing to work effectively.

    Rate this question:

  • 27. 

    Which of the following types of characters can be used in a workgroup name?

    • A.

      _ (underscores) or numbers.

    • B.

      \ and /

    • C.

      * and "

    • D.

      @

    Correct Answer
    A. _ (underscores) or numbers.
    Explanation
    Workgroup names can only contain underscores (_) or numbers. Special characters like \ and /, symbols like * and ", and the @ symbol are not allowed in workgroup names.

    Rate this question:

  • 28. 

    Which of these is not a type of permission that can be set for each type of user and in each folder?

    • A.

      Copy and paste privileges.

    • B.

      Read / write ability.

    • C.

      User limit.

    • D.

      Password protection.

    Correct Answer
    A. Copy and paste privileges.
    Explanation
    The question is asking about the types of permissions that can be set for each type of user and in each folder. The options given are copy and paste privileges, read/write ability, user limit, and password protection. Copy and paste privileges do not fall under the category of permissions that can be set for each type of user and in each folder.

    Rate this question:

  • 29. 

    Another term for port forwarding

    • A.

      Pinholes

    • B.

      Ip passthrough

    • C.

      Wireless zero configuration

    • D.

      Port security

    Correct Answer
    A. Pinholes
    Explanation
    Pinholes refers to another term for port forwarding. Port forwarding is a technique used in computer networking to allow external devices to access services on a private network. It involves redirecting a specific port or ports from the router to a specific device on the network. This allows for better control and security when accessing services remotely. The term "pinholes" is used to describe the small openings or pathways created in the firewall or router to allow this forwarding of ports.

    Rate this question:

  • 30. 

    Problems in Breakpoints 2 or 5 (on the AT&T Network side of the CPE) will cause Internet connectivity issues for:

    • A.

      The entire network.

    • B.

      Half of the devices on the network.

    • C.

      None of the devices on the network.

    • D.

      Only a single device on the network.

    Correct Answer
    A. The entire network.
    Explanation
    Problems in Breakpoints 2 or 5 on the AT&T Network side of the CPE will cause Internet connectivity issues for the entire network. This means that all devices connected to the network will be affected by the problems in these breakpoints. It implies that the issues are not limited to a single device or half of the devices, but rather impact the entire network's connectivity.

    Rate this question:

  • 31. 

    Problems in Breakpoint 6 (applications issues) will cause Internet connectivity issues for:

    • A.

      Only a single device on the network.

    • B.

      The entire network.

    • C.

      Half of the devices on the network.

    • D.

      None of the devices on the network.

    Correct Answer
    A. Only a single device on the network.
    Explanation
    When there are problems in Breakpoint 6 (application issues), it will only affect a single device on the network. This means that the issues are specific to that particular device and do not affect the rest of the devices on the network. The other devices will still have internet connectivity and will not be impacted by the problems in Breakpoint 6.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 22, 2011
    Quiz Created by
    Xtnq_tjay
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.