3 Which of the following statements about Access Points and

3. Which of the following statements about Access Points and Wireless LAN Routers are true?

a. Access Points provide port-based control, firewall management, and Dynamic Host Configuration Protocol (DHCP) services for all devices.

b. Access Points allow wireless clients to access a single network.

c. Access Points allow wireless clients to access a single network.

d. Access Points provide an added layer of security, on both the wired side and the wireless side.

e. Access Points implement the Network Address Translation (NAT) protocol.

4. If you have multiple computers in an organization, and you place a computer between the Internet connection and the firewall, you create a(n) ______.

a. DMZ (Demilitarized Zone)

b. RPC (Remote Procedure Call)

c. Proxy Server

d. L2TP (Layer 2 Tunneling Protocol)

e. NAT (Network Address Translation)

6. Suppose that you PING another computer on the network to test the network and you receive no response, just timeouts. The target computer is running; it\'s on a different subnet from the computer you pinged from. The network cable is plugged in, and no firewall is running inside the network. Moreover, the target computer responds to pings from other computers in the same subnet, but cannot be pinged by any computer in a different subnet. Which of the following is the most likely cause of this problem?

a. The default gateway address is either wrong or not entered.

b. The subnet mask is incorrect.

c. The network is using a Class C IP instead of a Class A or Class B address.

d. TCP/IP is not properly installed on the computer.

e. The DNS server address is wrong, or it is not entered

9. A computer\'s NIC represents the computer\'s connectivity to a Network. It assigns a unique address called a __________ to the machine.

a. Gateway

b. IP

c. IPX

d. Forwarding

e. MAC

10. A volume must have at least __________ percent free space in order for the Disk Defragmenter to completely defragment it, without the possibility of an incomplete defragmentation.

a. 20

b. 10

c. 12

d. 15

e. 25

11. When you are using the Remote Desktop, the client computer is the one that

a. allows you to control which resources on this computer are available in the Remote Desktop Connection window.

b. determines screen resolution

c. you want to control

d. is at the remote location

e. you want to use to control the remote computer

21. If a client calls our support line and has an issue printing to the main office printer what steps will you take to resolve the issue? You are free to ask the client any information you feel is necessary to assist in resolving the situation. Keep in mind you have the client on the phone and have full remote access to their network.

22. If client calls our support line and has an issue with internet connectivity on an unknown number of PC’s, what steps will you take to resolve the issue? Assume that you currently have remote access to the Server that is in the same location. You are free to ask the client any information you feel is necessary to assist in resolving the situation.

28. If a clients server went down and we dispatched you to fix it what would be the first thing you did when arriving onsite? (This is not a technical question, answer what you would do for the customer experience)

29. You arrive onsite to a client who expects us to be the experts at everything we do. He or she bombards you with questions and software you have never heard of. What are your responses to the customer and how do you handle that situation.

30. How would you rate the following in order of priority of a Dentist\'s new system?

Visually Pleasing (Wires hidden, computer tucked away, etc)

Network working correctly

Staff training

Peripherals working (digital sensors, pan)

Solution

Answer :

4. If you have multiple computers in an organization, and you place a computer between the Internet connection and the firewall, you create a(n) ______.

a. DMZ (Demilitarized Zone)

b. RPC (Remote Procedure Call)

c. Proxy Server

d. L2TP (Layer 2 Tunneling Protocol)

e. NAT (Network Address Translation)

Answer :

a. DMZ (Demilitarized Zone)

9. A computer\'s NIC represents the computer\'s connectivity to a Network. It assigns a unique address called a __________ to the machine.

a. Gateway

b. IP

c. IPX

d. Forwarding

e. MAC

Answer :

b. IP

10. A volume must have at least __________ percent free space in order for the Disk Defragmenter to completely defragment it, without the possibility of an incomplete defragmentation.

a. 20

b. 10

c. 12

d. 15

e. 25

Answer :

d.15

A volume must have at least 15% free space for disk defragmenter to completely defragment .

11. When you are using the Remote Desktop, the client computer is the one that

a. allows you to control which resources on this computer are available in the Remote Desktop Connection window.

b. determines screen resolution

c. you want to control

d. is at the remote location

e. you want to use to control the remote computer

Answer :

a. allows you to control which resources on this computer are available in the Remote Desktop Connection window.

3. Which of the following statements about Access Points and Wireless LAN Routers are true? a. Access Points provide port-based control, firewall management, an
3. Which of the following statements about Access Points and Wireless LAN Routers are true? a. Access Points provide port-based control, firewall management, an
3. Which of the following statements about Access Points and Wireless LAN Routers are true? a. Access Points provide port-based control, firewall management, an

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site