Networking 20% Flashcards
A technician is installing a network interface card in a desktop computer. Which of the following connectors should the technician use to connect the card to the computer’s motherboard?
A. PCIe
B. AGP
C. USB
D. IDE
A. PCIe (Peripheral Component Interconnect Express)
Explanation: PCIe (Peripheral Component Interconnect Express) is the most common and modern slot used for expansion cards, such as network interface cards (NICs), graphics cards, and storage controllers. PCIe slots come in different sizes (x1, x4, x8, x16) and provide high-speed data transfer between the card and the motherboard. Most recent desktop computers have PCIe slots, making it the right choice for installing a NIC.
Incorrect choices:
B. AGP (Accelerated Graphics Port): AGP is an old slot used mainly for graphics cards. It has been replaced by PCIe in modern systems and isn’t suitable for NICs.
C. USB (Universal Serial Bus): USB ports are for external devices like keyboards, mice, and storage devices. While some network devices use USB, internal NICs don’t connect via USB.
D. IDE (Integrated Drive Electronics): IDE is an outdated interface used for connecting storage devices like hard drives and CD/DVD drives. It’s not used for expansion cards like NICs.
Which of the following is used to define a range of IP addresses available to assign using DHCP?
A. Scope
B. Address
C. Lease
D. Reservation
A. Scope
Explanation: In DHCP (Dynamic Host Configuration Protocol), a “scope” is a range of IP addresses that the DHCP server assigns to devices on the network. When a device requests an IP, the DHCP server picks one from this scope and assigns it for a set time (lease period). Scopes can also include additional settings like subnet mask, default gateway, and DNS servers.
Incorrect choices:
B. Address: An address refers to a single IP, not the entire range (scope) that the DHCP server uses to assign IPs.
C. Lease: A lease is the time period a device is allowed to use an assigned IP, not the range of IPs.
D. Reservation: A reservation ensures a device always gets the same IP based on its MAC address but doesn’t define the full range of available IPs like a scope does.
Which of the following should the label on a network jack faceplate refer to?
A. MAC address
B. Patch panel port
C. Switch port in use
D. VLAN identification
B. Patch panel port
Explanation: The label on a network jack faceplate helps identify the corresponding port on the patch panel where the network cable is terminated. This makes it easy for network administrators to track the physical location of network connections, aiding in troubleshooting and maintenance tasks by quickly matching network jacks to their connections on the patch panel.
Incorrect choices:
A. MAC address: MAC addresses are unique to network devices (e.g., NICs) but are not relevant to the labeling of network jacks on faceplates.
C. Switch port in use: The switch port is part of network configuration documentation but isn’t typically labeled directly on the network jack faceplate.
D. VLAN identification: VLANs are logical network segments managed in switch settings, not something that would be physically labeled on network jack faceplates.
An administrator is using an RJ45 connector to terminate a network cable. Which of the following cables is the administrator terminating?
A. Optical
B. Serial
C. Cat 6
D. USB
C. Cat 6 cable
Explanation: RJ45 connectors are primarily used for Ethernet cables, including Cat 6 cables, which are designed for high-speed data transmission in network infrastructure. Terminating a Cat 6 cable with an RJ45 connector enables devices like computers, routers, and switches to connect to a local area network (LAN).
Incorrect choices:
A. Optical: Optical cables use light for data transmission and terminate with connectors like SC, LC, or ST—not RJ45.
B. Serial: Serial cables transmit data using DB9 or DB25 connectors, not RJ45, and are used for different communication purposes.
D. USB: USB cables terminate with USB connectors (Type-A, Type-B, or Type-C), not RJ45, and are used for peripherals like printers and keyboards.
Numerous vendors implemented a feature in routers and access points that allows for automatically moving wireless clients between 2.4GHz and 5.0GHz frequencies based on user density and the distance from the wireless equipment. Which of the following describes this feature?
A. Channel selection
B. Near-field communication
C. Propagation
D. Band steering
D. Band steering
Explanation: Band steering is a wireless networking feature that optimizes network performance by directing client devices to the most appropriate frequency band (2.4GHz or 5.0GHz). It helps balance network load by pushing compatible devices to the 5.0GHz band, which typically offers better performance, leaving the 2.4GHz band for devices that can only use that frequency. This results in improved overall efficiency and reduced congestion on the 2.4GHz band.
Incorrect choices:
A. Channel selection: This refers to choosing the best channel within a frequency band to reduce interference. It optimizes performance within a band but doesn’t manage client distribution across different frequency bands.
B. Near-field communication (NFC): NFC is a short-range wireless technology used for close-proximity interactions, such as contactless payments. It is unrelated to frequency band management in Wi-Fi networks.
C. Propagation: This describes how wireless signals move through a medium, such as air. It influences signal range and strength but does not manage which frequency band devices should connect to.
Which of the following protocols is the most appropriate to use for inventory tracking in a small warehouse?
A. Near-field communication
B. Radio-frequency identification
C. Bluetooth
D. 802.11
B. Radio-frequency identification (RFID)
Explanation: RFID (Radio Frequency Identification) technology uses radio waves to wirelessly identify and track objects or individuals. It is widely used for inventory tracking in warehouses because it allows for the quick and accurate identification of items without the need for line-of-sight scanning. RFID readers, placed strategically around the warehouse, can detect RFID tags on items, providing real-time tracking and more efficient inventory management.
Incorrect choices:
A. Near-field communication (NFC): NFC is used for short-range communication within a few centimeters, making it unsuitable for large-scale inventory tracking in warehouses.
C. Bluetooth: Bluetooth is limited to short distances and is less scalable for large warehouse environments compared to RFID.
D. 802.11 (Wi-Fi): Wi-Fi provides wireless networking but is not designed specifically for inventory tracking like RFID.
An administrator wants to replace a fiber-optic cable. Which of the following should the administrator most likely use?
A. LC
B. Bayonet Neill Concelman
C. RJ45
D. DB9
A. LC
Explanation: LC (Lucent Connector) is a small, high-performance fiber-optic connector commonly used with both single-mode and multimode fiber-optic cables. Its compact size and easy-to-use design make it ideal for high-speed data transmission in networking environments such as data centers and telecommunications networks.
Incorrect choices:
B. Bayonet Neill Concelman (BNC): BNC connectors are for coaxial cables, not fiber-optic cables.
C. RJ45: RJ45 connectors are used for Ethernet (copper-based) cables, not fiber-optic cables.
D. DB9: DB9 connectors are used for serial communications, not fiber-optic applications.
Which of the following allows a switch to be divided into separate logical networks?
a. VLAN
b. SSL
c. VPN
d. NAT
e. RADIUS
a. VLAN (Virtual Local Area Network)
Explanation: VLANs allow a switch to be divided into separate logical networks, enabling network segmentation. This segmentation improves security and traffic management by isolating broadcast domains within the same physical switch. Each VLAN can function as a distinct network, even if the devices are physically connected to the same switch.
Incorrect choices:
B. SSL (Secure Sockets Layer): SSL is a protocol for establishing secure communications over a computer network, not for dividing networks.
C. VPN (Virtual Private Network): VPNs create secure connections over public networks but do not divide switches into logical networks.
D. NAT (Network Address Translation): NAT translates private IP addresses to a public IP address, allowing multiple devices on a local network to share a single public IP. It does not create separate logical networks within a switch.
E. RADIUS (Remote Authentication Dial-In User Service): RADIUS is a protocol for authentication, authorization, and accounting for users accessing a network, but it does not segment or divide networks.
A technician needs to configure a printer for network communications. Which of the following must the technician configure? (Choose three.)
A. PCL
B. Dots per inch
C. Gateway
D. Subnet mask
E. MAC address
F. IMEI
G. IP address
H. Drivers
c. Gateway
d. Subnet mask
g. IP address
Correct Options:
c. Gateway: The gateway connects the printer to external networks, enabling communication beyond the local network.
d. Subnet mask: The subnet mask helps the printer identify its network segment and communicate with devices within that segment.
g. IP address: The IP address uniquely identifies the printer on the network, allowing it to communicate with other devices.
Incorrect Options:
a. PCL: PCL is a page description language for formatting print jobs, not related to network configuration.
b. Dots per inch (DPI): DPI measures print resolution, affecting print quality, not network communications.
e. MAC address: The MAC address identifies network interfaces but typically doesn’t need to be configured for basic printer setup.
f. IMEI: IMEI is specific to mobile devices and not applicable to printers.
h. Drivers: Drivers enable printing from computers but are not involved in configuring the printer’s network settings.
A technician is replacing all RJ45 cables in a customer environment. Which of the following are the BEST tools to execute the task? (Choose two.)
A. Optical fiber tester
B. Scissors
C. Cable tester
D. Crimper
E. Coaxial cable
F. Screwdriver
c. Cable tester
d. Crimper
Correct Options:
c. Cable tester: This tool verifies the integrity of RJ45 cables, ensuring proper termination and identifying wiring faults.
d. Crimper: Used for attaching RJ45 connectors to Ethernet cables, the crimper is essential for proper cable termination.
Incorrect Options:
a. Optical fiber tester: This tester is designed for optical fiber cables and is not applicable to RJ45 copper cables.
b. Scissors: While scissors can cut cables, they lack precision for terminating or testing RJ45 connections.
e. Coaxial cable: Coaxial cables are used for different applications (e.g., television) and are not relevant for Ethernet connections like RJ45 cables.
f. Screwdriver: A general tool that may be useful for securing equipment but not specifically for terminating or testing RJ45 cables.
Which of the following standard ports should be open to allow a successful RDP connection?
A. 53
B. 443
C. 445
D. 3389
d. 3389
The reasoning is that 3389 is the port number that corresponds to the RDP protocol.
Incorrect Options:
Port 53 is used for DNS
Port 443 is used for HTTPS
Port 445 is used for SMB
Which of the following mobile phone technologies would allow the user to complete transactions?
A. GSM
B. MFA
C. PRL
D. NFC
D. NFC (Near Field Communication)
NFC technology allows for secure, contactless communication between devices like smartphones and payment terminals. This enables users to complete transactions by simply tapping their phone against the payment terminal, eliminating the need for physical credit or debit cards.
Incorrect Options:
A. GSM (Global System for Mobile Communications): GSM is for mobile voice and data communication, not for contactless transactions.
B. MFA (Multi-Factor Authentication): MFA is a security method requiring multiple verification steps, not specifically a technology for mobile transactions.
C. PRL (Preferred Roaming List): PRL guides a device on network connections when roaming but is unrelated to completing purchases.
A home user has purchased a subscription for a service that blocks malicious sites by preventing them from resolving correctly.
Which of the following settings MOST likely needs to be changed on the user’s router to enable this functionality?
A. DNS server
B. Port forwarding
C. Perimeter network
D. Universal PnP
E. DHCP server
a. DNS server
Correct Answer:
DNS (Domain Name System): DNS translates domain names into IP addresses. By changing the router’s DNS settings to a service that blocks malicious sites, the router can prevent access to those sites by not resolving their domain names.
Incorrect Options:
B. Port forwarding: This technique redirects specific ports to allow external access to services on a private network, but it does not block malicious sites.
C. Perimeter network: This is a security measure used to protect servers from external threats, not relevant for home users looking to block malicious sites.
D. Universal Plug and Play (UPnP): UPnP allows automatic device communication on a network, but it does not help in blocking access to malicious websites.
E. DHCP server: While DHCP assigns IP addresses and configurations, altering its settings does not directly block malicious sites.
A technician set up a new access point and has noticed significant latency on the selected channel. Which of the following tools can assist with locating the BEST channel to use?
Wi-Fi analyzer
Netstat
Net use
Traceroute
Network tap
a. Wi-Fi analyzer
Correct Answer:
Wi-Fi Analyzer: This tool scans and analyzes surrounding Wi-Fi networks, assessing signal strength, channel utilization, and interference. It helps identify the least congested channels for optimizing the performance of a new access point.
Incorrect Options:
B. Netstat: A command-line tool for displaying network connections and statistics, but not for analyzing Wi-Fi channels or diagnosing latency issues.
C. Net use: A command-line tool for connecting or disconnecting from shared resources like network drives, not relevant to Wi-Fi optimization.
D. Traceroute: A tool for tracing packet routes between devices, useful for routing diagnostics but not for finding optimal Wi-Fi channels.
E. Network Tap: A physical device for monitoring network traffic, which does not assist in selecting the best Wi-Fi channel.
A technician needs to recommend an internet connection for a customer who travels around the world and wants to have connectivity while visiting remote camping locations. Some of the locations the customer visits have limited or unreliable cellular service.
Which of the following connection types should the technician recommend?
Satellite
DSL
Fiber
Hotspot
a. Satellite
Correct Answer:
Satellite Internet: This is the best option for remote areas where traditional wired connections like DSL or Fiber are unavailable, and cellular service is limited. It uses communication satellites to provide internet access in locations where other options are not feasible.
Incorrect Options:
B. DSL (Digital Subscriber Line): Requires a physical telephone line and is usually limited to areas with existing infrastructure, which may not be present in remote camping locations.
C. Fiber: Provides fast and reliable internet but requires extensive infrastructure, making it unlikely to be available in remote areas.
D. Hotspot: Depends on cellular data, which may be unreliable in remote areas with limited coverage, and hotspot signals might not reach all camping locations.