What is the maximum range of the Bluetooth 2.

0 specification for Class 1 devices?

100 M
Which of the following are characteristics of Bluetooth
1. Ad hoc connections2. 2.4 Ghz radio wireless
You need a type of wireless connection that can transfer data between your phone, PDA, and laptop.

You are transferring sensitive information. Which would be the best choice?

Bluetooth
Which of the following wireless communication technologies can be described as follows1. Has a very limited transmission range, of less than two inches2. Used with credit cards and passports3. Slower than other wireless technologies4.

Constantly emitting a signal

NFC
1. Up to 100 meters for Class 1 devices2. Up to 30 meters in areas without interference3. Up to 10 meters for class 2 devices
1. Bluetooth2. Infared3.

Bluetooth

Which of the following are used to connect a cable modem to the Internet connection
RG-6 and F-Type connectors
Which type of network medium is used by an ISDN adapter
Copper telephone wire
Which network technology is packaged as part of a BRI plan?
ISDN
Which of the following are features of Basic Rate ISDN
Dial up connectionTwo data channelsOne control channel
Which actions allow you to access the internet on your laptop via a cellular network?
Install a cellular USB adapter in an open port on the laptop
what are four options for connecting a computing device such as a notebook or tablet to a cellular network.
1. Use a USB cellular antennae to connect the device directly to the cellular network2. Use an integrated cellular antennae to connect the device directly to the cellular network3. Use the device's wi-fi to connect to the network though a cellular wifi-hot spot4.

Use a USB cable to connect the device to the network though a smartphone.

Your network follows the 1000 Base-T specifications for Gigabit Ethernet. What is the maximum cable segment length allowed?
100 meters
What type of fiber optic cable supports 10 Gigabit Ethernet with a maximum segment length of up to 40 km?
10GBaseER single-mode
What allows network communications to be transmitted over existing AC power lines?
Ethernet over power
What two statements about the Dynamic Host Configuration Protocol are true?
1. A workstation must request addressing information from a DHCP server2. It can deliver a DNS server adress in addition to the host IP adress
You are setting up a small network in you office with one Windows server and 50 Windows workstations. You want to spend as little time as possible configuring the workstations with IP addressing information.

What should you do?

Install the DHCP service on your server.
Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks.
Default gateway
Which two mechanisms could you use to resolve a hostname into its associated IP address?
DNS and Hosts File
IP adress 169.254.0.1Subnet mask 255.

255.0.0

1. What is this special IP configuration called? = Automatic Private IP Addressing (APIPA)Why did the workstation receive this type of configuration? = The workstation was unable to contact the DHCP server
You have a host on your network that provides a service that require the server to always use a specific address. Which IP adressing method can you use to manually assign the specific IP address?
Static IP Addressing
You have a user who takes his laptop home every day after work.

When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which IP addressing method can you use to make sure he gets a network connection at home?

Alternate IP Configuration
What are two examples of an IPv6 adress
6384:1318:7700:7631:446A:5511:8940:2552141:0:0:0:15:0:0:1
What correctly describes the most common format for expressing IPv6 adresses
Hexadecimal numbers32 numbers, grouped using colons128-bit addressEight hexadecimal quartets
Which of the following describes the part of the IPv6 adress that identifies the subnet address?
The last quartet in the IPv6 address prefix
What is an example of a valid IP address.
172.16.

1.262.2.2.

2

Which of the following are NOT valid IP addresses
257.0.122.55145.

8.260.745.22.

156.256

What are three examples of a Class C IP address
192.15.5.55222.55.

0.0223.16.5.0

What are three examples of a Class B IP address
129.0.

0.0132.12.0.0190.65.

2.0

What are three examples of a class A network IP Address
144.0.0.15114.

58.12.0144.122.66.12

What are three examples of IP addresses that have a default mask of 255.

555.0.0?

168.16.5.1191.

168.2.15129.0.0.1

Which IP address is reserved for Automatic Private IP Addressing?
169.

254.0.1 - 169.254.

255.254

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?
FTP
What protocol is used to send e-mail messages from a mail client to a mail server?
SMTP
Which of the following protocols is used by an e-mail client to retrieve messages from an e-mail server and gives users the option to keep mail messages on the server?
IMAP
You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?
DNS
Which IP protocol is used by Web browser and Web servers to exchange files?
HTTP
Which of the following protocols is non-routable and requires another protocol to enable internetwork communications.

NetBIOS
What protocol do e-mail clients use to download messages from a remote mail server?
POP3
You've used you Windows workstation to map a drive to a shared folder on a windows server which protocol was used to access the share?
SMB
You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service?
53
You've enabled Remote Desktop on a Windows workstation. Which port must be opened in the server's firewall to allow remote clients to access the desktop?
3389
Port Numbers for Protocols
Secure Shell (SSH) = 22Apple Filing Protocol (AFP) = 548HTTP over SSL (HTTPS) = 443Hypertext Transfer Protocol (HTTP) = 80Server Message Block (SMB/CIFS) directly over TCP = 445Service Location Protocol (SLP) = 427Internet Message Access Protocol (IMAP) = 143
What device is used to create a physical star topology?
Switch
What is an example of a valid MAC address?
C0-32-FF-15-01-8E
A host wants to send a message to another host with the IP address 155.99.

80.15 IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP
What is a major benefit of STP over UTP?
Greater resistance to interference
What are two characteristics of a coaxial network cable?
It uses two concentric metallic conductorsIt has a conductor made from copper in the center of the cable
Which two terms refer to a network resource sharin model that use access control lists saved on each computer?
Peer-to-PeerWorkgroup
Which of the following terms describe a group of computers and users that utilize centralized resources administration, and security settings?
DomainDirectory
What are two advantages of using a domain to manage a network?
Centralized administrationScalability
What is the maximum transmission speed for Bluetooth v3 and v4 devices?
24 Mbs
You are configuring an ADSL connection. Which of the following will be part of the configurations?
RJ-11Filters or splitters
How can you tell an IPv6 address is valid.
An IPv6 address is a 128-bit address listed as eight 16-bit hexadecimal sections. Leading zeros can be omitted in each section.

Therefore, 6384:1319:7700:7631:446A:5511:8940:2552 and 141:0:0:0:15:0:0:1 are both valid IPv6 IP addresses. A single set of all-zero sections can be abbreviated with two colons (::). Therefore, 141::15:0:0:1 would be a valid way of writing that address. Digits in a hexadecimal system range from 0-9 and A-F. H is not a valid hexadecimal number. 343F:1EEE:ACDD:2034:1FF3:5012 is too short, having only six sections instead of eight.

Which of the following identifies the Interface ID component of an IPv6 address?
The last 64 bits of an IPv6 addressThe last 4 quartets of an IPv6 address
Which of the following identifies the prefix component of an IPv6 address
The first 64 bits of an IPv6 addressThe first 4 quartets of an IPv6 address
A black down arrow in device manager means what?
The device is disabled.
What does a yellow exclamation mark mean in device manager?
The driver software has not been installed.
What is the term for a error detection technique that can detect errors with only one bit
Parity
What are three software-generated problems can indicate that a software bug is causing a memory error
Exception ErrorPage FaultGeneral-protection fault
How can you look up the IP address of a server/website
ping www.widgets.

comnslookup www.widgets.com

Which command would you use to have a workstation stop using an IP address that it obtained from a DHCP server?
ipconfig /release
Which command allows for a continuous ping
-t
Match the questions up with the answer: Switch, Bridge, Router or Hub1. Connects segments on the same subnet. Forwards signals to only the port connected to the destination device.2.

Can be used to connect wireless clients to wired clients on the same network.3. Connects two network segments that have different subnet addresses.4. Connects segments on the same subnet. Repeats signals out to all other ports.

5. Operate in full-duplex mode, meaning devices can both send and receive data at the same time.6. Operates in half-duplex mode, meaning devices can either send or receive data at any given time.7.

Uses the IP address within a packet to move packets between networks.

1. Switch2. Bridge3. Router4.

Hub5. Switch6. Hub7. Router

How can you tell a class c ip address from different types
class c will have the first quartet ranging from 192 to 223.