Networking One
Networking Two
Networking Three
Networking Four
Networking Five
100

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose? 

a.  Cloud hosting 

b.  Local installation 

b.  Local installation

Local Installation is the traditional method for delivering applications by installing them on individual desktop or laptop computer systems. This delivery method does not require a network or internet connection.  

100

What is the term for software that anyone can use or modify for free? 

a.  Proprietary software 

b.  Cloud Based

c.  Open-source software

d. Local installation


c.  Open-source software 

Open-source software can be used and modified by anybody for free. Examples of open-source software include Mozilla Firefox, Gimp, and Linux.

100

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer? 

a.  Device Manager 

b.  Windows Update 

c. Task Manger

d. Computer Management

a.  Device Manager

You can use Device Manager to monitor, update, and manage all your hardware devices on a Windows computer.


100

Which of the following is the best device to deploy to protect your private network from an untrusted public network?  

a. Switch

b. Router

c.  NAS

d. Firewall

d. Firewall

A firewall is the best device to deploy to protect your private network from an untrusted public network.

100

Which of the following is used on a wireless network to identify the network name? 

a. MAC address 

b. WPA2 passphrase 

c. SSID

d. Network Name

c. SSID

Wireless devices use the SSID (Service Set Identification) to identify the network name. All devices on a wireless network use the same SSID.

200

Which of the following Application Architecture Model tiers describes office productivity software? 

a.  One Tier

b.  Two Tier

c.  Three Tier

d. n-Tier

a.  One Tier

One Tier is an application architecture model where programs run as standalone applications on a single computer.


200

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

a.  Kerberos 

b.  WEP

c. WPA2

d. WPA

c. WPA2

Wi-Fi Protected Access 2 (WPA2) is currently the most secure wireless security specification. WPA2 includes specifications for both encryption and authentication.

200

Which of the following tools would you use to check connectivity between two computers? 

a.  Ping

b.  Tracert 

c.  Ipconfig /all

d. Ifconfig

a.  Ping 

The ping command verifies connectivity between two nodes on a network.

200

Which of the following IT jobs typically do not require as much education or on-the-job experience? 

a. Network administrator 

b.  Network technician 

c. Network Engineer

d. Network Systems Designer

b.  Network technician 

Network technician jobs typically do not require as much education or on-the-job experience as architects, engineers, and administrators.


200

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters? 

a.  Security Analyst 

b.  Network Architect

c. Network Technician

d. Help Desk Service Manager


b.  Network Architect

Network architects specialize in configuring communication hardware such as cabling, routers, and wireless adapters.

Database administrators create and maintain databases.

300

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission? 

a.  Open-source Software 

b.  Proprietary Software 

b.  Proprietary Software 

Proprietary Software is exclusively controlled by a company and cannot be used or modified without permission. Microsoft Office, Fortnite, and this course are all examples of proprietary software.


300

Software that requires a monthly subscription fee is often called _______________.?

a.  Web applications 

b. Software as a service 

c. Platform as a service

d. Infrastructure as a service

b.  Software as a service

Software that requires a monthly subscription fee is called Software as a Service, or SaaS.  

300

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?

a.  Windows updates

b.  Antivirus updates 

a. Windows updates

By default, Windows 10 PCs automatically check for updates and install any updates it finds. Although this function can be disabled, Microsoft strongly encourages the use of automatic updates to find and install Windows updates as well as to keep the computers up to date with the latest features. These updates often include patches to fix security issues found in applications. Automatic maintenance can be used to perform these checks.  

300

Which of the following utilities would you use to automatically assign IP addresses on a network? 

a.  DNS 

b.  DHCP 

c.  PoPv3

d.  ICMP

b. DHCP 

Dynamic Host Configuration Protocol (DHCP) is a network management protocol that handles assigning IP addresses on a network.

300

Which of the following IT jobs includes installing and configuring network media? 

a.  Network architect 

b.  Network administrator

b.  Network administrator

Network administrators maintain and expand a company's network. They have a broad range of responsibilities, including installing and configuring network media.

400

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select two.)

a.  The software will eventually stop working properly for the 10 extra updates you installed. 

b.  You risk losing your job. 

c. There are no consequences. By law, you are allowed 1 to 3 activations per user. 

d.  Your company is exposed to litigation by violating the software license agreement.

b.  You risk losing your job. 

d.  Your company is exposed to litigation by violating the software license agreement.

Circumventing license agreements exposes your company to litigation and puts your job at risk. Even without a mechanism for tracking the number of users that are using the software, the enterprise agreement limits the number of licenses you are legally entitled to use. Using more licenses than you are entitled to is an act of theft. Your best course of action is to purchase 10 more licenses.

400

Which installation method is most likely to put your computer at risk of downloading a virus? 

a.  Internet installation 

b. CD or DVD installation 

c. Local installation

d. Network installation

b.  Internet installation 

CD, app store, and subscription installations usually come from reputable companies. Internet installations, on the other hand, are often from unverified sources.

400

Which application makes sure your computer has the most recent versions of its system software? 

a. Windows Explorer

b. Windows Defender

a. Windows System Information

d. Windows Update

d.  Windows Update 

Windows Update is utility software that keeps your computer's other software up to date.

400

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use? 

a.  Network & Internet

b.  Network Properties 

c.  Device Manager

d.  Task Manager

a.  Network & Internet

In the Network & Internet settings, you can verify information about your computer's network connection.

400

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use? 

a.  Ipconfig 

b.  Ifconfig

c. Ping

d.  Tracert

d.  Tracert 

The tracert command is a utility that network professionals use to find out where packets are getting stuck on the path to their destination.

500

How many ping packets are sent by default in a successful ping request? 

a.  Four

b.  Six

c.  Two

d. None

a.  Four

A default ping request sends out four packets, and should get four responses back in turn.

500

Which of the following utilities would you use to find the path between two computers? 

a. Ifconfig

b. Ping

c. Ipconfig

d. Tracert

d.  Tracert

The tracert command shows the exact path a packet takes between two hosts on different networks  

500

If your network does not have a DHCP server, what must you do to access the internet? 

a.  Manually change the TCP/IP properties to match your network's settings. 

b.  Open PowerShell, enter the ipconfig command, and press the Enter key. 

c. Configure using the DHCP Protocol

d. Nothing

a.  Manually change the TCP/IP properties to match your network's settings.

If your network does not have a DHCP server, you will need to manually change the TCP/IP properties to match your network's settings.

500

Which of the following BEST describes the ipconfig utility? 

a.  It is a utility that shows the exact path a packet takes between two hosts on different networks. 

b.  It is a utility that displays all current TCP/IP network configuration values. 

c. It is a server that dynamically assigns IP addresses.

d.  It is a utility that displays network connections.

b.  It is a utility that displays all current TCP/IP network configuration values. 

The ipconfig command displays all current TCP/IP network configuration values.

500

Which of the following BEST describes the ping utility? 

a.  It sends a single packet to a specified network address and then waits for a reply.

b.  It displays and modifies the entries in the local IP routing table. 

a.  It sends a single packet to a specified network address and then waits for a reply.

The ping command sends a single packet to a specified network address and then waits for a reply.