Microsoft Certification exam study guide
60 questions with verified correct
answers
a VPN - answer What will Sidney need to install for Josh to be able to access Fourth Coffee's
server from his home and mobile phones?
a door is to a classroom - answer A firewall is to a network as
provide company information to internal employees - answer The primary goal of an intranet is
to
LAN - answer What type of network is Kim trying to connect to?
loopback address - answer To verify that Kim's NIC (network interface card) works, Michael
pings 127.0.0.1, which is known as the
a key is to a door - answer A NIC is to a LAN as
wired LAN - answer When Brian connects a cable from his laptop's NIC into an RJ45 jack he is
connecting to the
logical network - answer A VLAN is also called a
expand the hotel's wireless network - answer What will be Erin's best solution for providing
Internet connectivity to the pool area?
WAN - answer To link all three of Fourth Coffee's LANs together, Sidney will create a
, a leased line - answer Between the original coffee shop and the first expansion location, Sidney
decides to order a private, dedicated line from the phone company known as
encrypted - answer Sidney reassures Josh that the existing VPN is secure because the data
transferred across the public network is
E1 - answer Cristian determines that the point-to-point, dedicated, digital circuit that is available
in Paris and meets the minimum bandwidth of 1 Mbps is the
T1 - answer Allie determines that the United States' equivalent to Cristian's chosen digital circuit
is the
DSL - answer One home connection that Allie researches is a high-speed digital communication
technology over standard copper telephone wire called
802.11n - answer The most current wireless networking standard is
WPA-PSK - answer To provide strong encryption protection without an enterprise authentication
server, Scott uses
Wi-Fi hotspot - answer After the wireless network is completed, Scott's Dad sits on the deck and
successfully connects the laptop to the Internet through their new, private, and secure
logical topology - answer The topology concerned with how data gets transferred within the
network is the
mesh topology - answer The topology considered more reliable because all of the nodes are
connected to each other is the
60 questions with verified correct
answers
a VPN - answer What will Sidney need to install for Josh to be able to access Fourth Coffee's
server from his home and mobile phones?
a door is to a classroom - answer A firewall is to a network as
provide company information to internal employees - answer The primary goal of an intranet is
to
LAN - answer What type of network is Kim trying to connect to?
loopback address - answer To verify that Kim's NIC (network interface card) works, Michael
pings 127.0.0.1, which is known as the
a key is to a door - answer A NIC is to a LAN as
wired LAN - answer When Brian connects a cable from his laptop's NIC into an RJ45 jack he is
connecting to the
logical network - answer A VLAN is also called a
expand the hotel's wireless network - answer What will be Erin's best solution for providing
Internet connectivity to the pool area?
WAN - answer To link all three of Fourth Coffee's LANs together, Sidney will create a
, a leased line - answer Between the original coffee shop and the first expansion location, Sidney
decides to order a private, dedicated line from the phone company known as
encrypted - answer Sidney reassures Josh that the existing VPN is secure because the data
transferred across the public network is
E1 - answer Cristian determines that the point-to-point, dedicated, digital circuit that is available
in Paris and meets the minimum bandwidth of 1 Mbps is the
T1 - answer Allie determines that the United States' equivalent to Cristian's chosen digital circuit
is the
DSL - answer One home connection that Allie researches is a high-speed digital communication
technology over standard copper telephone wire called
802.11n - answer The most current wireless networking standard is
WPA-PSK - answer To provide strong encryption protection without an enterprise authentication
server, Scott uses
Wi-Fi hotspot - answer After the wireless network is completed, Scott's Dad sits on the deck and
successfully connects the laptop to the Internet through their new, private, and secure
logical topology - answer The topology concerned with how data gets transferred within the
network is the
mesh topology - answer The topology considered more reliable because all of the nodes are
connected to each other is the