Exam 7: Setting up a Local Network
Exam 1: Taking a Computer Apart and Putting It Back Together33 Questions
Exam 2: All About Motherboards22 Questions
Exam 3: Supporting Processors and Upgrading Memory27 Questions
Exam 4: Supporting the Power System and Troubleshooting Computers30 Questions
Exam 5: Supporting Hard Drives and Other Storage Devices29 Questions
Exam 6: Supporting Io Devices32 Questions
Exam 7: Setting up a Local Network35 Questions
Exam 8: Network Infrastructure and Troubleshooting39 Questions
Exam 9: Supporting Mobile Devices58 Questions
Exam 10: Virtualization, Cloud Computing, and Printers62 Questions
Exam 11: Safety Procedures and Environmental Concerns.8 Questions
Select questions type
You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN.
Which of the following features will you configure on the SOHO router to accomplish this task?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
C
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network.
What is the first step Derek should perform to secure the wireless router?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
D
Match the protocol or encryption name with the feature.
Premises:
Typically uses TKIP for encryption.
Responses:
WEP
AES
WPA
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.7/5
(36)
Correct Answer:
You have connected a cable Internet connection as shown in the exhibit.
At what location should you place a filter?

(Multiple Choice)
4.8/5
(33)
A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?
(Multiple Choice)
4.9/5
(32)
You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line.
At what location should you place the DSL filter?


(Multiple Choice)
4.9/5
(32)
Match the protocol or encryption name with the feature.
Premises:
Current encryption algorithm used today.
Responses:
TKIP
WPA
WPA2
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(27)
A remote worker wants to connect his computer to his corporation's private trusted network over the Internet.
Which of the following will need to be configured?
(Multiple Choice)
5.0/5
(37)
Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?
(Multiple Choice)
5.0/5
(30)
A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection.
Which of the following is required for the user to successfully sign in to the Windows domain?
(Multiple Choice)
4.8/5
(41)
You are tasked with configuring a wireless SOHO router for a customer.
Which of the following settings will be the most secure with the least effort and cost to the customer?
(Multiple Choice)
4.8/5
(33)
You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved.
What network setting should you check to see the address of the server being used to resolve this address?
(Multiple Choice)
5.0/5
(34)
Which of the following will use an RJ-11 connector for connectivity?
(Multiple Choice)
4.8/5
(37)
A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks.
Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?
(Multiple Choice)
5.0/5
(31)
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.
Which of the following is the best step for the technician to take in securing the router to meet this requirement?
(Multiple Choice)
4.9/5
(36)
Match the protocol or encryption name with the feature.
Premises:
No longer considered secure because the key used for encryption doesn't change.
Responses:
AES
WEP
WPA2
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(26)
Match the protocol or encryption name with the feature.
Premises:
Typically uses AES for encryption.
Responses:
WPA
WPA2
TKIP
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(39)
Match the protocol or encryption name with the feature.
Premises:
Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.
Responses:
WEP
TKIP
WPA
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(36)
A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on.
Which of the following will meet these requirements?
(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 35
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)