Review Questions

 < Day Day Up > 



  1. A computer on your network is unable to communicate with other computers. What would you check first?

    1. That other computers are working.

    2. That your Internet connection is functional.

    3. The computer’s IP address configuration.

    4. The IP address configuration of the network file server.

    Correct Answer = C.

    If a single computer on your network cannot communicate with other systems on the same network, it is probable that its IP address is invalid, or the system has not received an IP address from a DHCP (Dynamic Host Configuration Protocol) server, which hands out IP addresses randomly on the network.

  2. In order for two computers to communicate with each other, they must have a common language. What is this common language called?

    1. Binary conversion

    2. Data translation

    3. IPCONFIG /ALL

    4. Protocol

    Correct Answer = D.

    In order for two computers to communicate, they must have a common language or set of rules, which is known as a protocol. Binary conversion is a process used to convert binary numbers to decimal numbers to binary. IPCONFIG /ALL is a TCP/IP command used to display TCP/IP configuration settings.

  3. What are two tools you can use to test a modem? (Choose Two)

    1. A loopback plug

    2. A digital multimeter

    3. An analog loopback adapter

    4. A small brush and compressed air

    Correct Answers = A and C.

    A loopback plug or analog loopback adapter can be used to test the integrity of a modem. A digital multimeter is used to troubleshoot system power-related issues. A small brush and compressed air are used to clean a system unit.

  4. You want to connect a new computer to your Ethernet network. What device must you install to do so?

    1. An internal modem

    2. A switch

    3. An IP converter

    4. An NIC card

    Correct Answer = D.

    In order to communicate with your Ethernet network, you would need to install and configure an NIC card with associated software drivers.

  5. Ten users on your network have all downloaded a fancy game from the same Internet site. Unfortunately, not one of the 10 computers will work anymore. What question would ask each of the 10 users?

    1. Is the game really worth it?

    2. Did you do this on company time?

    3. Did you virus scan the game’s executable program before running it?

    4. What version of BIOS is installed on your computer?

    Correct Answer = C.

    If you get this question wrong, please start reading this book again from page one. Always virus scan any programs you download from the Internet!

  6. Where do most computer viruses come from? (Choose Two)

    1. A borrowed floppy disk

    2. A mosquito

    3. The Internet

    4. Software provided by the manufacturer

    5. A big wooden horse from Greek mythology

    Correct Answers = A and C.

    Most computer viruses arrive through a borrowed floppy or other removable media disk, or from the Internet.

  7. A customer cannot log onto the network. Others on the network segment can log on without an issue. You can log onto the network using your computer and the customer’s ID and password without an issue. What is most likely causing the logon issue at the customer’s workstation? (Choose Three)

    1. The customer is entering the wrong password at their workstation.

    2. The NIC card in the customer’s workstation is malfunctioning.

    3. The patch cable that attaches the customer’s workstation to the network is bad.

    4. The entire network is experience RFI (Radio Frequency Interference).

    5. The switch that both you and the customer are attached to has been powered off.

    Correct Answers = A, B, and C.

    A, B, and C are valid choices. If the entire network were affected by RFI, you would have problems with more than one user. A network hub or switch is used to connect several computers together on a network. It the hub or switches were powered off, all users on that particular network would be affected.

  8. What type of connections can be used with TCP/IP? (Choose Three)

    1. Ethernet

    2. Token Ring

    3. Can and string

    4. Analog modem dial-up connection

    Correct Answers = A, B, and D.

    Ethernet, Token Ring, and modem connections can all be configured to use TCP/IP.

  9. How can configuration settings on a network interface card be changed? (Choose Three)

    1. Jumpers

    2. Wire traces

    3. Configuration software

    4. Operating system plug-and-play features

    Correct Answers = A, C, and D.

    You can configure your NIC card settings with onboard jumpers or NIC card configuration software, which is usually provided by the manufacturer. If you are using a plug-and-play operating system, your NIC card setting can be configured automatically in most cases.

  10. Which of the following represent peer-to-peer networks? (Choose Two)

    1. Centralized administration and security.

    2. Limited number of computers (usually less than 10).

    3. One computer can act as a client and a server.

    4. Requires a high-end server computer to provide logon authentication and provide resources.

    Correct Answers = B and C.

    A peer-to-peer network is a small network, usually of 10 or fewer computer systems, connected without the use of a larger, specialized server computer. In peer-to-peer networks, a workstation can function as both a client and a server computer.

  11. You have a network interface card that doesn’t have jumpers and is not plug-and-play compliant. How will you configure it to be used with your system?

    1. Purchase add-on jumpers.

    2. Install IPX/SPX.

    3. The operating system will detect it.

    4. Manufacturer’s configuration software.

    5. None of the above.

    Correct Answer = D.

    Legacy NICs were configured with the use of jumpers or DIP switches on the card itself. Today, most NIC settings are configured with the use of software provided by the manufacturer or simply by letting plug-and-play make the necessary settings automatically.

  12. You are attempting to install a 64-bit video card driver for a newly purchased video card; but when you try to install the driver, nothing happens. What could be the problem?

    1. Most newer computer operating systems require P.A. (Parents Approval) before the installation of new video card drivers.

    2. Your firewall antivirus software may be blocking your install attempts.

    3. You forgot to enter the EULA (End User License Agreement) code for the video card software.

    4. Your ISP does not allow 64-bit video cards to be used on connected systems.

    5. All of the above.

    Correct Answer = B.

    If you are unable to install new software programs or device drivers on your system, your virus protection software or firewall may be blocking your install attempts. You may have to disable real-time protection or disable your entire antivirus suite altogether before installing new software.

  13. Which are considered to have the least amount of overhead and are meant for efficient communications in small networks or LANs?

    1. TCP/IP and IPX/SPX

    2. TCP/IP and NetBIOS

    3. NetBEUI and TCP/IP

    4. NetBIOS and NetBEUI

    5. None of the above

    Correct Answer = D.

    NetBIOS is not routable. NetBIOS works well in LANs, not WANs. For WAN communication, you need TCP/IP. NetBEUI is a nonroutable, efficient transport-layer protocol meant for use in small networks with 1–200 workstations.

  14. With which type of DSL is the data rate considered the same in both directions?

    1. ADSL (Asymmetric DSL)

    2. SDSL (Symmetric DSL)

    3. BiDSL (Bidirectional DSL)

    4. DDRDSL (Dual Data Rate DSL)

    5. All of the above transmit and receive data at the same data rate.

    Correct Answer = B.

    SDSL (Symmetric DSL) is well suited for business applications and programs that require and depend on the same speed for sending and receiving data. With SDSL, your upstream speed is the same as your downstream speed.

  15. Which statement is not true regarding DSL?

    1. DSL most often uses exiting POTS lines.

    2. ADSL and SDSL are DSL transmission types.

    3. DSL most often requires a special DSL modem and splitter.

    4. DSL is less secure than a cable modem Internet connection because a single DSL is shared.

    5. All of the above statements are true.

    Correct Answer = D.

    Unlike less secure cable modem services, DSL is not a shared service connection. To be more specific, you do not share your DSL connection with your neighbors, as cable subscribers do.

  16. Which statement is not true regarding satellite Internet connectivity?

    1. Satellite modems communicate with your PC through an Ethernet or USB connection.

    2. A two-way geosynchronous satellite is used.

    3. Satellite connections are ideal for those located outside the range of cable and DSL services.

    4. In order to use a satellite Internet connection, you need a satellite dish antenna.

    5. All of the above statements are true.

    Correct Answer = E.

    All of the statements are true of satellite Internet connectivity.



 < Day Day Up > 



A+ Complete Study Guide, Third Edition (220-301 and 220-302)
The A+ Exams Guide: (Exam 220-301), (Exam 220-302) (TestTakers Guides)
ISBN: 1584503076
EAN: 2147483647
Year: 2003
Pages: 237

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net