2 VPN is a way to a Bypass a network b Securely tunnel thro
2. VPN is a way to _________________.
a. Bypass a network
b. Securely tunnel through a network
c. Connect from one network to another
d. Convert from one protocol to another, on a different network e. Segment a network *
3. Which of the following statements about Access Points and Wireless LAN Routers are true?
a. Access Points provide port-based control, firewall management, and Dynamic Host Configuration Protocol (DHCP) services for all devices.
b. Access Points allow wireless clients to access a single network.
c. Access Points allow wireless clients to access a single network.
d. Access Points provide an added layer of security, on both the wired side and the wireless side.
e. Access Points implement the Network Address Translation (NAT) protocol. *
4. If you have multiple computers in an organization, and you place a computer between the Internet connection and the firewall, you create a(n) ______.
a. DMZ (Demilitarized Zone)
b. RPC (Remote Procedure Call)
c. Proxy Server
d. L2TP (Layer 2 Tunneling Protocol)
e. NAT (Network Address Translation) *
5. Which of the following services allows an organization to present a single IP address to the outside world, while maintaining a large number of addresses on its internal network?
a. DHCP
b. ARP
c. DNS
d. GUI e. NAT *
6. Suppose that you PING another computer on the network to test the network and you receive no response, just timeouts. The target computer is running; it\'s on a different subnet from the computer you pinged from. The network cable is plugged in, and no firewall is running inside the network. Moreover, the target computer responds to pings from other computers in the same subnet, but cannot be pinged by any computer in a different subnet. Which of the following is the most likely cause of this problem?
a. The default gateway address is either wrong or not entered.
b. The subnet mask is incorrect.
c. The network is using a Class C IP instead of a Class A or Class B address.
d. TCP/IP is not properly installed on the computer.
e. The DNS server address is wrong, or it is not entered *
7. TCP/IP\'s NTP protocol is used for ________________. a.
a NetWare interface
b. time synchronization
c. routing
d. an HTTP extension
e. instant messaging *
8. A bridge recognizes and forwards IP packets based on IP addresses.
a. TRUE
b. FALSE *
9. A computer\'s NIC represents the computer\'s connectivity to a Network. It assigns a unique address called a __________ to the machine.
a. Gateway
b. IP
c. IPX
d. Forwarding
e. MAC *
10. A volume must have at least __________ percent free space in order for the Disk Defragmenter to completely defragment it, without the possibility of an incomplete defragmentation.
a. 20
b. 10
c. 12
d. 15
e. 25
* 11. When you are using the Remote Desktop, the client computer is the one that
a. allows you to control which resources on this computer are available in the Remote Desktop Connection window.
b. determines screen resolution
c. you want to control
d. is at the remote location
e. you want to use to control the remote computer
* 12. If you have configured your system to log on automatically, you can suppress the automatic logon by holding down the __________ key as the system boots.
a. Esc
b. Shift
c. Ctrl
d. Alt
e. Windows Logo
* 13. Which of the following are types of disks you can use in Windows 7?
a. DPM
b. Dynamic
c. PGP
d. Basic
e. GPT
* 14. A VPN connection can create a secure communication channel using the Internet.
a. TURE
b. FALSE
* 15. The main functionality of a DHCP server is to __________________.
a. provide a gateway for a network
b. send e-mail to the correct addresses
c. automatically provide IP addresses as needed, as well as gateway and DNS servers
d. provide a database utility that ensures secure access
e. protect against DoS attacks
* 16. SMTP is associated with _________________.
a. small file transfers
b. another form of HTTP
c. e-mail messaging
d. database selection
e. synchronizing computer system clocks
* 17. The main purpose of most network operating systems is ________________.
a. file and printer sharing
b. Internet access
c. web hosting
d. DHCP services
e. load balancing
* 18. One of the key benefits of __________ routers is that an entire network will appear to the Internet as a single machine with a single IP address.
a. DMZ (Demilitarized Zone)
b. RPC (Remote Procedure Call)
c. NAT (Network Address Translation)
d. L2TP (Layer 2 Tunneling Protocol)
e. UPnP (Universal Plug and Play)
* 19. In Windows 7, to burn ISO images onto blank DVDs, you need to use a third-party software program.
a. TURE
b. FALSE
* 20. The Task Scheduler incorporates a feature for you to select which allows scheduled tasks to be run on demand, as well as in response to various time- or event-triggers.
a. TRUE
b. FALSE
* 21. If a client calls our support line and has an issue printing to the main office printer what steps will you take to resolve the issue? You are free to ask the client any information you feel is necessary to assist in resolving the situation. Keep in mind you have the client on the phone and have full remote access to their network
. * 22. If client calls our support line and has an issue with internet connectivity on an unknown number of PC’s, what steps will you take to resolve the issue? Assume that you currently have remote access to the Server that is in the same location. You are free to ask the client any information you feel is necessary to assist in resolving the situation.
23. Could you rebuild a server from putting new hd\'s in a raid array and reloading the os? (its ok to say no) Yes No
* 24. Do you have the ability to hang tv mounts, please add any comments.
* 25. Can you run and terminate cat5 to a patch panel and wall plate and please explain anytime you have had to do this. Also indicate any experience you have had with fishing walls.
26. How well do you handle pressure and stress? Not well Decent Above Average Love it *
27. How well do you handle late nights and travel? Would you be ok with Monday through Friday travel?
* 28. If a clients server went down and we dispatched you to fix it what would be the first thing you did when arriving onsite? (This is not a technical question, answer what you would do for the customer experience)
* 29. You arrive onsite to a client who expects us to be the experts at everything we do. He or she bombards you with questions and software you have never heard of. What are your responses to the customer and how do you handle that situation.
30. How would you rate the following in order of priority of a Dentist\'s new system? Visually Pleasing (Wires hidden, computer tucked away, etc) Network working correctly Staff training Peripherals working (digital sensors, pan)
Solution
2. answer is (b) Securely tunnel through a network
VPN is Virtual private network. it is used to establish a secure connection over a public network.
5. answer is (d) GUI e.NAT*
NAT is used to assign a public address to a computer inside a private network.
7. answer is (b) time synchronization.
NTP is a clock time synchronization protocol.
8. false.
a bridge connect one local area network to another local area network.
16. answer is c. e-mail messaging
SMTP is simple mail transfer protocol. which is used for e-mail service.
*********************END***************PLS GIVE ME GOOD RATING*******************




