Exam 7: Connecting to and Setting up a Network
Exam 1: Survey of Windows Features and Support Tools36 Questions
Exam 2: Installing Windows36 Questions
Exam 3: Maintaining Windows36 Questions
Exam 4: Optimizing Windows36 Questions
Exam 5: Supporting Customers and Troubleshooting Windows36 Questions
Exam 6: Troubleshooting Windows Startup36 Questions
Exam 7: Connecting to and Setting up a Network36 Questions
Exam 8: Supporting Mobile Operating Systems36 Questions
Exam 9: Windows Resources on a Network36 Questions
Exam 10: Security Strategies36 Questions
Exam 11: Virtualization Linux and Mac Os X36 Questions
Select questions type
What is the name of the 32-bit or 128-bit number that is used to identify a device on a network?
Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
C
What device handles access to another network for a client computer if it does not have a better option?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
B
What TCP port is utilized by an SSH server listening for connections?
Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
C
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?
(Multiple Choice)
4.7/5
(41)
What type of IP address is configured by a server when a device first initiates a connection to the network?
(Multiple Choice)
4.9/5
(34)
Describe how a computer with a Private IP address accesses the Internet.
(Essay)
4.9/5
(32)
Match each item with a statement below.
Correct Answer:
Premises:
Responses:
(Matching)
5.0/5
(42)
If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?
(Multiple Choice)
4.7/5
(42)
The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?
(Multiple Choice)
4.9/5
(40)
Originally developed by IBM, what protocol is used by Windows to share files and printers on a network?
(Multiple Choice)
4.8/5
(42)
What are the two mail protocols used for delivery of messages, and how do they function?
(Essay)
4.7/5
(43)
The User Datagram Protocol (UDP) guarantees delivery of data to its destination.
(True/False)
4.7/5
(31)
The Remote Desktop and Remote Assistance applications utilize what port for remote access?
(Multiple Choice)
4.8/5
(32)
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
(True/False)
4.8/5
(42)
The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?
(Multiple Choice)
4.7/5
(36)
Packets are delivered to a single node on a network when using what type of IPv6 address?
(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 36
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)