Exam 14: Connecting To and Setting Up a Network
Exam 1: First Look at Computer Parts and Tools50 Questions
Exam 2: Working Inside Desktops and Laptops50 Questions
Exam 3: All About Motherboards50 Questions
Exam 4: Supporting Processors and Upgrading Memory50 Questions
Exam 5: Supporting the Power System and Troubleshooting Computers50 Questions
Exam 6: Supporting Hard Drives and Other Storage Devices51 Questions
Exam 7: Survey of Windows Features and Support Tools50 Questions
Exam 8: Installing Windows50 Questions
Exam 9: Supporting I/O Devices50 Questions
Exam 10: Maintaining Windows50 Questions
Exam 11: Optimizing Windows50 Questions
Exam 12: Supporting Customers and Troubleshooting Windows50 Questions
Exam 13: Troubleshooting Windows Startup50 Questions
Exam 14: Connecting To and Setting Up a Network50 Questions
Exam 15: Supporting Network Hardware50 Questions
Exam 16: Supporting Mobile Operating Systems49 Questions
Exam 17: Windows Resources on a Network50 Questions
Exam 18: Security Strategies50 Questions
Exam 19: Supporting Printers and Customizing a System50 Questions
Exam 20: Virtualization, Linux, and Mac OS X50 Questions
Select questions type
Describe the Lightweight Directory Access Protocol.
Free
(Essay)
4.8/5
(32)
Correct Answer:
Lightweight Directory Access Protocol (LDAP) is used by various client applications when the application needs to query a database. For example, an email client on a corporate network might query a database that contains the email addresses for all employees. Another example is when an application looks for a printer by querying a database of printers supported by an organization on the corporate network or Internet. Data sent and received using the LDAP protocol is not encrypted; therefore, an encryption layer is sometimes added to LDAP transmissions.
How is the network portion and the host portion of an IP address identified?
Free
(Multiple Choice)
5.0/5
(38)
Correct Answer:
D
If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
A
What command can be used to flush the local DNS cache on a Windows computer?
(Multiple Choice)
4.8/5
(45)
The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?
(Multiple Choice)
4.9/5
(36)
Matching
Match each item with a statement below.
- designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
(Multiple Choice)
4.9/5
(39)
What functions might be provided by a SOHO router besides the normal duty of routing packets between networks? (Choose all that apply).
(Multiple Choice)
4.8/5
(43)
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?
(Multiple Choice)
4.7/5
(28)
What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively?
(Multiple Choice)
4.8/5
(31)
What TCP port is utilized by an SSH server listening for connections?
(Multiple Choice)
4.9/5
(43)
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
(True/False)
4.8/5
(30)
Packets are delivered to a single node on a network when using what type of IPv6 address?
(Multiple Choice)
4.9/5
(28)
What device handles access to another network for a client computer if it does not have a better option?
(Multiple Choice)
4.9/5
(35)
What protocol makes a connection, checks whether the data is received, and resends it if it is not?
(Multiple Choice)
4.8/5
(40)
What are the two mail protocols used for delivery of messages, and how do they function?
(Essay)
4.8/5
(26)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)