Exam 14: Connecting To and Setting Up a Network
Exam 1: First Look at Computer Parts and Tools50 Questions
Exam 2: Working Inside Desktops and Laptops50 Questions
Exam 3: All About Motherboards50 Questions
Exam 4: Supporting Processors and Upgrading Memory50 Questions
Exam 5: Supporting the Power System and Troubleshooting Computers50 Questions
Exam 6: Supporting Hard Drives and Other Storage Devices51 Questions
Exam 7: Survey of Windows Features and Support Tools50 Questions
Exam 8: Installing Windows50 Questions
Exam 9: Supporting I/O Devices50 Questions
Exam 10: Maintaining Windows50 Questions
Exam 11: Optimizing Windows50 Questions
Exam 12: Supporting Customers and Troubleshooting Windows50 Questions
Exam 13: Troubleshooting Windows Startup50 Questions
Exam 14: Connecting To and Setting Up a Network50 Questions
Exam 15: Supporting Network Hardware50 Questions
Exam 16: Supporting Mobile Operating Systems49 Questions
Exam 17: Windows Resources on a Network50 Questions
Exam 18: Security Strategies50 Questions
Exam 19: Supporting Printers and Customizing a System50 Questions
Exam 20: Virtualization, Linux, and Mac OS X50 Questions
Select questions type
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
(True/False)
4.8/5
(35)
What wireless networking radio frequency yields faster speeds but offers shorter range?
(Multiple Choice)
4.8/5
(36)
What is the name of the 32-bit or 128-bit number that is used to identify a device on a network?
(Multiple Choice)
4.9/5
(35)
The Remote Desktop and Remote Assistance applications utilize what port for remote access?
(Multiple Choice)
4.9/5
(38)
Matching
Match each item with a statement below.
- a protocol used by various client applications when the application needs to query a database
(Multiple Choice)
4.9/5
(26)
Describe how a computer with a Private IP address accesses the Internet.
(Essay)
4.7/5
(44)
Matching
Match each item with a statement below.
- A group of computers on a peer-to-peer network that are sharing resources
(Multiple Choice)
4.9/5
(36)
When using static IP addressing, software automatically configures the network connection on each device.
(True/False)
4.8/5
(37)
If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached?
(Multiple Choice)
4.8/5
(32)
What cell phone technology is the most popular in the United States?
(Multiple Choice)
4.9/5
(39)
Matching
Match each item with a statement below.
- protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
(Multiple Choice)
4.9/5
(41)
Matching
Match each item with a statement below.
- a technique designed to conserve the number of public IP addresses needed by a network
(Multiple Choice)
4.9/5
(42)
What two terms are used to describe the User Datagram Protocol (UDP)?
(Multiple Choice)
4.8/5
(38)
Matching
Match each item with a statement below.
- Used by a computer or other device to determine if an IP address of another computer is on its network or another network
(Multiple Choice)
4.8/5
(32)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)