Networking Essentials v2.01 Modules 1 – 4 Internet Connection: Getting Online Group Exam

Networking Essentials v2.01 Modules 1 – 4 Internet Connection: Getting Online Group Exam

1. Which factor classifies a host as a server?

the software installed*

the CPU speed

the amount of memory

the network connection

Explanation: A server is a host with server software installed. Although CPU, memory, and the network connection will determine the performance of a server, it is the server software that provides desired server services.

2. What terms represent the maximum and actual speed that can be utilized by a device to transfer data?

throughput; goodput

bandwidth; throughput*

bandwidth; goodput

throughput; bandwidth

Explanation: Bandwidth measures the maximum rate at which a device can transfer data. However, in practice, the actual speed for data transfer could be reduced because of numerous factors like network congestion, overhead etc. This actual rate of transfer is known as throughput.

3. Match the term to the value represented.

Networking Essentials v2 Modulos 1 - 4 p3

Networking Essentials v2 Modulos 1 – 4 p3

4. What is a disadvantage of deploying a peer-to-peer network model?

high cost

high degree of complexity

difficulty of setup

lack of centralized administration*

Explanation: The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability.

5. Which term is used to describe a network device that relies on another device to obtain information?

console

client*

web server

server

Explanation: A client device has software installed which enables it to request the required service from a server device. For instance, a user who uses a web browser is effectively requesting pages from servers all over the web. In this case the browser is considered the client, whereas the device that is responsible for answering the request is considered the server.

6. If you were drawing a physical topology of your school network, what type of information would you include?

the path that data takes to reach destinations

the location of devices in the building*

the IP addresses of all devices on the network

how devices are connected

Explanation: A physical topology is a diagram that shows where all the devices are physically located in the building.

7. Which type of network component can be used to share an attached printer to the network?

peripheral

access point

network media

personal computer*

Explanation: A peripheral is a device that is not directly connected to a network. In order to be made available on a network, a host is responsible for sharing the peripheral across the network.

8. A wireless network was recently installed in a coffee shop and customer mobile devices are not receiving network configuration information. What should be done to correct the problem?

Make sure the DHCP server is functional.*

Ensure that the default gateway device is working properly.

Provide peripheral devices to customers.

Check the connection of the DNS server to the Internet.

Explanation: End-user devices can request an address from a pool of addresses that are maintained by a DHCP server.

9. A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?

3G

Wi-Fi

Bluetooth

NFC*

Explanation: NFC is a wireless technology that allows data to be exchanged between devices that are in very close proximity to each other.

10. A user is looking for a wireless headphone for listening to songs stored on a smartphone. What wireless technology would the headphone use?

3G/4G

Wi-Fi

infrared

Bluetooth*

Explanation: Bluetooth is a wireless technology for data exchange over a short distance. It is suitable for connecting devices with simple tasks, such as headsets, keyboards, mice, and printers. Wi-Fi is suitable for variety of applications with high speed wireless connectivity required or preferred. Infrared requires a direct line of sight between the transmitter and the receiver. 3G/4G are cellular network technologies to manage voice calls and data transmission between clients and service providers.

11. Refer to the exhibit.

Networking Essentials v2 Modulos 1 - 4 p11

Networking Essentials v2 Modulos 1 – 4 p11

A home wireless network is being configured within Packet Tracer. The user adds a wireless router, a PC, and three laptops. The user is reviewing the wireless connection on one of the laptops. What can be determined?

All three laptops are connected to the wireless network successfully.

Because the password is not enabled, the laptop cannot connect to the wireless router.

The laptop is connected to a wireless network.*

The laptop must have a different wireless NIC installed before being able to connect to the wireless router.

Explanation: A home wireless router could be configured for a 2.4 GHz and multiple 5 GHz wireless networks, each with a unique SSID such as QuizMe3, QuizMe2, and QuizMe. The wireless NIC is active and connected to a wireless network as indicated by the words Adapter is Active. The wireless router has not been configured with wireless security.

12. Refer to the exhibit.

Networking Essentials v2 Modulos 1 - 4 p12

Networking Essentials v2 Modulos 1 – 4 p12

A student has started a Packet Tracer network that includes a home wireless router to be used for both wired and wireless devices. The router and laptop have been placed within the logical workspace. The student clicks on the laptop and the window that opens is shown in the exhibit. What is the purpose of the modules on the left?

This is a list of modules available from the manufacturer that can be clicked on and “purchased.”

This is the list of modules currently installed in the laptop.

These are modules that can be used by double-clicking on one module so that it automatically installs into the laptop.

These are optional modules that can be installed into the module slot if it is currently empty.*

Explanation: Modules on the left can be installed into the shown device, in this case a laptop. Be sure to power the device off before installing any option.

13. Refer to the exhibit.

Networking Essentials v2 Modules 1 - 4 p13

Networking Essentials v2 Modules 1 – 4 p13

Which menu item would be used to bring up a command prompt environment to be able to ping another network device?

Attributes

Desktop*

Config

Programming

Physical

Explanation: The Desktop menu item is used to access common applications and windows used to configure a device such as the IP address, command prompt, web browser, as well as other apps.

14. Refer to the exhibit.

Networking Essentials v2 Modules 1 - 4 p14

Networking Essentials v2 Modules 1 – 4 p14

An instructor wants to show a few prebuilt Packet Tracer sample labs in class. Which menu option would the instructor use to access a sample lab?

View

Edit

Tools

File*

Extensions

Options

Explanation: Use the File > Open Samples menu option to browse for the samples provided with Packet Tracer.

15. Refer to the exhibit.

Networking Essentials v2 Modules 1 - 4 p15

Networking Essentials v2 Modules 1 – 4 p15

A student is creating a wired and wireless network in Packet Tracer. After inserting a router, switch, and PC, the student chooses a straight-through cable to connect the PC to the switch. Which connection would be the best port for the student to choose on the PC?

RS 232

USB0

USB1

FastEthernet0*

Explanation: A PC to switch connection is through an Ethernet cable. Connect FastEthernet0 on the PC to any Ethernet port on the switch.

16. Which criterion can be used to select the appropriate type of network media for a network?

the types of data that need to be prioritized

the number of intermediary devices that are installed in the network

the environment where the selected medium is to be installed*

the cost of the end dev

Explanation: Criteria for choosing a network medium are the distance across which the selected medium can successfully carry a signal, the environment in which the selected medium is to be installed, the amount of data and the speed at which the data must be transmitted, and the cost of the medium and its installation.

17. Which statement describes the use of the ping command?

The ping command tests end-to-end connectivity between two devices.*

The ping command can be used to determine the exact location of the problem when troubleshooting reachability issues.

The ping command shows current Layer 4 sessions.

The ping command can be used to test reachability using the physical address of the device.

Explanation: The ping command is used to test end-to-end connectivity between the source and destination IP address. It measures the time it takes a test message to make a round trip between the two end points. However, if the message does not reach the destination, or in the case of delays, there is no way to determine where the problem is located.

18. What are two sources of electromagnetic interference that can affect data transmissions? (Choose two.)

microwave oven*

infrared remote control

florescent light fixture*

cordless phone

LED monitor

Explanation: Electromagnetic interference or EMI is commonly caused by equipment such as microwave ovens and fluorescent light fixtures.

19. What are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.)

Fiber-optic cables use extra shielding to protect copper wires.

Fiber-optic cables are commonly found in both homes and small businesses.

Fiber-optic cables are easy to install.

Fiber-optic cables can extend several miles.*

Fiber-optic cable is immune from EMI and RFI.*

Explanation: Fiber-optic cables provide immunity to both EMI and RFI and a single cable can extend for several miles before regeneration is needed.

20. Which type of network cable is commonly used to connect office computers to the local network?

glass fiber-optic cable

twisted-pair cable*

plastic fiber-optic cable

coaxial cable

Explanation: Twisted-pair is a type of copper cable used to interconnect devices on a local network.

21. Which of the following is a low-power, shorter range wireless technology that is intended to replace wired connectivity for accessories such as speakers or a mouse?

NFC

GPS

Wi-Fi

Bluetooth*

Explanation: Bluetooth is a low-power, shorter range wireless technology that is intended to replace wired connectivity for accessories such as speakers, headphones, and microphones. Bluetooth can also be used to connect a smartwatch to a smartphone.

22. Which of the following is a wireless communication technology that enables a smartphone to communicate with a payment system within a few centimeters away?

NFC*

GPS

Wi-Fi

Bluetooth

Explanation: Near Field Communications (NFC) is a wireless communication technology that enables data to be exchanged by devices that are in very close proximity to each other, usually less than a few centimeters.

23. A physical topology diagram includes which of the following? (Choose three)

where hosts are located*

IP addressing on each device

where networking devices are located*

device names

where wiring is installed*

Explanation: A physical topology diagram records information such as where each host is located, where network devices are located, and how these devices are connected to the network.

24. When a network administrator changes the IPv4 and IPv6 address of a computer, which topology diagram will need to be updated?

physical topology diagram

logical topology diagram*

both physical and logical topology diagrams

Explanation: A logical topology diagram records information such as device names, IP addressing, configuration information, and network designations.

25. Which type of network cable is used to connect the components that make up satellite communication systems?

fiber-optic

coaxial*

unshielded twisted-pair

shielded twisted-pair

Explanation: Explanation: Coaxial cable is commonly used to connect the various components that make up satellite communication systems and cable TV.

26. When authenticating within Packet Tracer, which two items could you use? (Choose two.)

a username associated with a specific school

an email address found in the NetAcad profile*

a username associated with NetAcad*

a previously configured pattern

a previously configured PIN

Explanation: When Packet Tracer first opens, an authentication screen appears. Use the email address in the NetAcad profile or a username associated with NetAcad.

27. Which network device is used to translate a domain name to the associated IP address?

router

DHCP server

DNS server*

default gateway

Explanation: A DNS server is a network device that is used to translate a domain name to its IP address. A user will identify a website using a domain name, such as www.cisco.com and a DNS server will translate it to an associated IP address.

28. How many unique values are possible using a single binary digit?

9

4

1

8

16

2*

Explanation: A bit is stored and transmitted as one of two possible discrete states. Each bit can only have one of two possible values, 0 or 1. The term bit is an abbreviation of “binary digit” and represents the smallest piece of data.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x