A WLAN covers a large geographical area and is made up of many smaller networks.
A half duplex connection allows a device to send and receive, but not at the same time.
Phone cords are a type of twisted-pair cable and use an RJ-45 connector.
10Base5 cabling runs at speeds up to 1 Gbps and distances to 500 meters.
A punchdown tool is used to wire twisted-pair cabling to a keystone jack.
Which of the following network types covers a large campus or city?
PAN
WLAN
MAN
WAN
Which physical topology uses a centralized device to manage traffic on the network?
mesh
ring
bus
star
What type of network can you set up to share files if you have two laptops with wireless NICs but there is no Wi-Fi hotspot available?
ring network
infrastructure network
ad hoc network
hybrid network
Which network technology that is used to connect to the Internet has a maximum speed of 44 Mbps, uses dedicated lines, and is used by large companies?
SDSL
T3
Fast Ethernet
OC-3
Which of the following is true about cable Internet?
you share the cable infrastructure with your neighbors
you need filters on every phone jack
fiber optic cabling is required
provides up to 2.3 Mbps of bandwidth
What does a NIC use to connect to wired network media?
HDMI port
RJ-45 port
10BaseT port
Half duplex port
What should you choose in the properties of a network connection so that Windows will use the best possible speed and duplex mode?
Optimal Configuration
Automatic Configuration
Auto Negotiation
Default Settings
Which feature should you configure on a network adapter to control which applications have priority on the network?
PoE
WoL
QoS
PoTS
What is the unit of information called when a network adapter adds the source and destination MAC address to the segment of data before it is transmitted on the network?
frame
packet
bit
segment
Which type of network device keeps a table of the MAC addresses of the devices connected to it?
hub
router
NIC
switch
What type of device do you need if you want to connect two network segments together such as a wireless network and a wired network?
NAS
repeater
bridge
What device should you consider if you want to have access to hard drives via an Ethernet connection?
VoIP
AP
RAID
Which of the following cabling systems uses fiber-optic cable?
10GBaseT
1000BaseFX
10Base2
10Base5
Which type of cabling should you use for Gigabit Ethernet?
coaxial
thinnet
Cat-6
RG-59
Which of the following is true about 10-Gigabit Ethernet?
you can use Cat-5e or Cat-6 cabling
it is a good choice for backbone networks
it is sometimes called Fast Ethernet
coaxial is a good choice for cabling
Under what circumstance might you use a loopback plug?
to test a USB port
to capture network packets
to test a network cable
to find the max speed of a connection
Which of the following provides multiple network ports for cables that converge in an electrical closet?
patch panel
RJ-45 jack
terminal adapter
loopback port
Which of the following is true about a crossover cable?
it’s normally used to connect a computer to a hub or switch
you use the T568B wiring standard on both ends
it is required to connect two Gigabit Ethernet switches together
it can be used to connect two PCs together
Which of the following is a reason that there are twists in the wires used for network cabling?
the twists increase the cable strength
the twists reduce crosstalk
the twists make it easier to punchdown the cable
the twists reduce the amount of copper needed
What’s the first thing you should do to troubleshoot a network problem related to hardware?
test with a network cable
use a different cable
use a loopback plug
check the indicator lights
On the IE General tab you can block cookies.
The default value of the security level in IE is Medium-high.
To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional.
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
Which of the following is a task you CAN’T do from the IE General tab?
change the home page
disable file downloads
delete browsing history
manage the IE cache
Which of the following is described as a computer that intercepts requests that a browser makes of a server and can cache received content.
DNS server
VPN server
proxy server
Web server
Which of the following is NOT true about Remote Desktop?
the client can be running any version of Windows 7
by default all users can access Remote Desktop
Windows firewall can block Remote Desktop connections
you can start the remote desktop client using the mstsc command
If you want to be able to power up a computer remotely, what feature should you use?
RDP
RemoteApp
Which of the following is NOT true about Group Policy?
policies can be applied to a computer
all policies are applied before the logon screen appears
Group Policy is available in Windows Professional edition
you can set the QoS level for an application using Group Policy
Which statements is true about controlling access to folders and files?
permissions refer to the tasks an account is allowed to do in the system
account configuration should keep in mind the principle of highest privilege
rights are assigned to accounts
in Windows, accounts have no rights assignments until you configure them
Which of the following is NOT true about user accounts and groups?
a user account can belong to only one group at a time
by default, standard users accounts belong to the Users group
Guest group has limited rights on the system
Backup Operators group can restore any files regardless of the group’s permissions to those files
Which built-in group might Windows automatically assign a user account to when determining its permissions?
Administrators
Guests
Backup Operators
Anonymous users
To which group does Windows give access to folders that you create which are not part of your user profile?
Power Users
Authenticated Users
Anonymous Users
When all users on a network require the same access to all resources, what type of network model should you use?
Domain
Homegroup
Workgroup
Guestgroup
Which of the following is true about which folders to use to hold shared data when working with a workgroup?
private data for each user should be kept in their C:\Users folder
all users have access to the folders in the C:\Users folder
C:\Users\Public should only be used by the Guest account
Only Administrators and Guest have access to C:\Users\Public
Which type of permission should you set to control access to files and folders by local and network users?
Sharing on FAT32 volumes only
NTFS on NTFS volumes only
NTFS on exFAT or NTFS volumes
Sharing on NTFS or exFAT volumes
Which is NOT true about using share and NTFS permissions?
if both permissions are used, the least restrictive permission between the two applies
if NTFS permissions conflict between a user and group the least restrictive permission applies
when you copy a file, the file takes on the permissions of the destination folder
inherited permissions pass from parent folder to child file or folder
Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.
Full control
Read & execute
Full control, Modify
Write, Read
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
\\sharedfolder\server
\server\sharedfolder
\\server\sharedfolder
/sharedfolder/server
When troubleshooting a live network cable, what should you use
a cable tester
a DVM
a loopback plug
an LED indicator
On a peer-to-peer network, authentication is the responsibility of the domain.
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
Using Group Policy, you can set security policies to help secure a workstation.
It’s usually a good idea to run several anti-malware programs at the same time on your computer.
What keystroke should you press to get a logon window if you don’t use the welcome screen?
Alt+F1
Ctrl+Ins+Home
Alt+F5+End
Ctrl+Alt+Delete
Which of the following is true about the Guest account in Windows 7?
it is disabled by default
it automatically has a complex password
you cannot rename it
it has administrative access
Which of the following is true about passwords.
it’s best to write your password down so you don’t get locked out of your computer
passwords cannot be longer than 14 characters
by default, accounts with a blank password cannot logon remotely
letters and numbers are allowed, but no symbols such as ‘@’ or ‘!’
Which of the following is true about the Windows Encrypted File System?
files can be marked for encryption, but not folders
an encrypted file moved to an unencrypted folder remains encrypted
EFS only works on NTFS and FAT32
you need to download special software to use EFS
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?
you can rename default user accounts
you can require user accounts to have non-blank passwords
you can use gpedit.msc to see if any policies conflict
you can disable logon scripts
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
a USB port
an authentication key on the hard drive
a TPM chip on the motherboard
a PIN on the BIOS
If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
Windows POP technology
the BIOS
a feature available on some DVD drives
your USB keyboard
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
retinal scanner
LoJack token
smart card
TPM
An RFID badge is related to which type of authentication method?
biometric scanner
digital certificate
privacy filter
A privacy filter is used for what aspect of security?
theft of a laptop
computer authentication
data encryption
screen viewing
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
ATA Secure Erase
low-level format
degausser
magnetic data filter
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
shoulder surfing
tailgating
social engineering
session hijacking
Which type of malware hides in the MBR program of a hard drive?
boot sector virus
Trojan horse
keylogger
spyware
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
rootkit
adware
worm
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
fixmbr
bootrec /fixmbr
fixboot
bootrec /fixboot
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
Task Manager
SearchIndexer
Process Explorer
Windows Defender