Tải bản đầy đủ (.pdf) (30 trang)

Network+ 2005 In Depth (P26) docx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (878.97 KB, 30 trang )

18. You are a software programmer using a development Web server at your office to test
your programs. Although your Web server is connected to the Internet for test pur-
poses, you want to ensure that no one on the Internet can access your Web files.To
make it more difficult for someone to connect to your Web server from the Internet,
which TCP/IP default port number would you change in your Web server software
configuration?
a. 21
b. 22
c. 65
d. 80
e. 90
19. What is the maximum segment length on a 10BASE-T network?
a. 85 meters
b. 100 meters
c. 185 meters
d. 200 meters
e. 1000 meters
20. You are the network administrator for a large college whose network contains nearly
10,000 workstations, over 100 routers, 80 switches, and 2000 printers. You are
researching a proposal to both upgrade the routers and switches on your network and
at the same time improve the management of your network. What type of protocol
should you ensure that the new routers and switches can accept in order to more eas-
ily automate your network management?
a. TFTP
b. SMTP
c. NNTP
d. ICMP
e. SNMP
21. In the process of troubleshooting an intermittent performance problem with your net-
work’s Internet connection, you attempt to run a traceroute test to
www.microsoft.com.The traceroute response displays the first 12 hops in the route, but


then presents several “Request timed out” messages in a row.What is the most likely
reason for this?
a. Your network’s ISP is experiencing connectivity problems.
b. The Internet backbone is experiencing traffic congestion.
c. Your client’s TCP/IP service limits the traceroute command to a maximum of
12 hops.
722 Appendix B
NETWORK+ PRACTICE EXAM
d. Your IP gateway failed while you were attempting the traceroute test.
e. Microsoft’s network is bounded by firewalls that do not accept incoming ICMP
traffic.
22. What is the network ID for a network that contains the group of IP addresses from
194.73.44.1 through 194.73.44.254 and is not subnetted?
a. 194.1.1.1
b. 194.73.0.0
c. 194.73.44.1
d. 194.73.44.255
e. 194.73.44.0
23. Which of the following disaster recovery contingencies is the most expensive to main-
tain?
a. hot spare
b. warm spare
c. hot site
d. warm site
e. cold site
24. What type of device is typically used to create a VLAN?
a. hub
b. bridge
c. switch
d. router

e. firewall
25. In NAT, how does an IP gateway ensure that outgoing traffic can traverse public net-
works?
a. It modifies each outgoing frame’s Type field to indicate that the transmission is
destined for a public network.
b. It assigns each outgoing packet a masked ID via the Options field.
c. It interprets the contents of outgoing packets to ensure that they contain no
client-identifying information.
d. It replaces each outgoing packet’s Source address field with a valid IP address.
e. It modifies the frame length to create uniformly sized frames, called cells, which
are required for public network transmission.
Appendix B 723
NETWORK+ PRACTICE EXAM
26. You have purchased an access point capable of exchanging data via the 802.11b or
802.11g wireless standard. According to these standards, what is the maximum dis-
tance from the access point that wireless stations can travel and still exchange data
with the access point at the maximum potential throughput?
a. 10 feet
b. 50 feet
c. 80 feet
d. 100 feet
e. 175 feet
27. Which of the following RAID levels uses parity error checking? (Choose all that
apply.)
a. RAID Level 0
b. RAID Level 1
c. RAID Level 3
d. RAID Level 5
e. RAID Level 11
28. Which of the following is used to resolve NetBIOS names with IP addresses?

a. DNS
b. SMTP
c. DHCP
d. WINS
e. hosts file
29. Which of the following figures (See choices a through e.) illustrates a VPN WAN?
a.
724 Appendix B
NETWORK+ PRACTICE EXAM
b.
c.
d.
Appendix B 725
NETWORK+ PRACTICE EXAM
e.
30.
Suppose you want to copy files from a Linux server at the office to your home com-
puter, which also runs Linux, across a VPN. Both computers run OpenSSH. Which
utility would you use to make sure these files are copied securely?
a. SCP
b. SFTP
c. FTP
d. TFTP
e. HTTP
31. What security measure verifies that your user name and password are contained in the
NOS directory when you attempt to log on to a server?
a. remapping
b. encryption
c. authentication
d. caching

e. redirection
32. You are a network administrator for a WAN that connects two regional insurance
company offices—one main office and one satellite office—to each other by a T1.The
main office is also connected to the Internet using a T1. This T1 provides Internet
access for both offices.To ensure that your private network is not compromised by
unauthorized access through the Internet connection, you install a firewall between
the main office and the Internet. Shortly thereafter, users in your satellite office com-
plain that they cannot access the file server in the main office, but users in the main
office can still access the Internet.What two things should you check?
a. whether the firewall has been configured to run in promiscuous mode
b. whether the firewall is placed in the appropriate location on the network
726 Appendix B
NETWORK+ PRACTICE EXAM
c. whether the firewall has been configured to allow access from IP addresses in
the satellite office
d. whether the firewall has been configured to receive and transmit UDPbased
packets
e. whether the firewall has been configured to allow Internet access over the main
office’s T1
33. What TCP/IP utility was used to generate the following output, and what piece of infor-
mation does it tell you about the machine on which the utility shown below was used?
a. Ipconfig; the output indicates that the machine has a MAC address of
00080DE72F0C
b. PING; the output indicates that the machine cannot communicate with any
external hosts
c. ARP; the output indicates that the machine resolves to a name of Studentx
d. Ifconfig; the output indicates that the machine does not rely on DHCP
e. Nbtstat; the output indicates that it is currently connected to the machine with
a NetBIOS name of Studentx
34. While troubleshooting a workstation connectivity problem, you type the following

command: pingƒ127.0.0.1.The response indicates that the test failed.What can you
determine about that workstation?
a. Its network cable is faulty or not connected to the wall jack.
b. Its TCP/IP protocol is not installed properly.
c. Its IP address has been prevented from transmitting data past the default gate-
way.
d. Its DHCP settings are incorrect.
e. Its DNS name server specification is incorrect.
Appendix B 727
NETWORK+ PRACTICE EXAM
35. You are a support technician working in a telecommunications closet in a remote
office.You suspect that a connectivity problem is related to a broken RJ-45 plug on a
patch cable that connects a hub’s uplink port to a router.You need to replace that con-
nection, but you forgot to bring an extra patch cable.You decide to install a new RJ-45
connector to replace the broken RJ-45 connector.What two tools should you have to
successfully accomplish this?
a. punch-down tool
b. crimping tool
c. wire stripper
d. cable tester
e. multimeter
36. In the IP version 6 addressing scheme, which of the following IP addresses equals the
loopback address?
a. 1.0.0.1
b. 127:0:0:0:0:0:0:1
c. 0.0.0.0.0.1
d. ::1
e. 127.0.0.1
37. Which two of the following devices operate only at the Physical layer of the OSI
Model?

a. hub
b. switch
c. router
d. bridge
e. repeater
38. Which of the following is a reason for using subnetting or supernetting?
a. to facilitate easier migration from IPv4 to IPv6 addressing
b. to enable a network to use DHCP
c. to make more efficient use of limited numbers of legitimate IP addresses
d. to reduce the likelihood for user error when modifying TCP/IP properties
e. to limit the number of addresses that can be assigned to one network interface
728 Appendix B
NETWORK+ PRACTICE EXAM
39. In which two of the following switching techniques must multiple data packets that
make up the same transmission use identical paths to reach their destination?
a. circuit switching
b. layer 2 switching
c. packet switching
d. message switching
e. layer 3 switching
40. Which of the following wireless networking technologies can make use of WPA to
improve the security of data in transit?
a. 802.11b
b. 802.5
c. Infrared
d. Bluetooth
e. 802.3
41. In the following network diagram, which network nodes belong to a private network?
a. nodes 1 through 6 and nodes 8 through 14
b. nodes 1 through 6

c. nodes 8 through 14
d. nodes 1 through 7, plus 15 and 16
e. all of the nodes
Appendix B 729
NETWORK+ PRACTICE EXAM
42. You are the network administrator for a law firm whose two primary offices are
located five blocks apart in the center of a large city.The two offices have different
specialties, and therefore keep separate file servers. Each file server runs the Windows
Server 2003 NOS.A T1 connects the two offices so employees at each office can com-
municate and share files.To protect the lawyers’ records, you currently make regular
backups of all the data on both file servers and store the backup tapes in an off-site
warehouse. However, one of the firm’s partners asked you to do more than simply
back up data. In addition, she requests that you implement this added measure within
the next week.Which of the following solutions is the best choice to ensure greater
data protection in the given time frame?
a. Contract with an online backup provider to back up data over the Internet using
the T1.
b. Add a UNIX server to the network so that you can establish clustering between
all the servers.
c. Establish mirroring between the two servers using the T1.
d. Add a RAID Level 5 device to one of the file servers.
e. Connect the T1 to a third office across town and back up files from the two
other locations to the third location.
43. By default, an IPX address contains what other type of address?
a. IP address
b. SPX address
c. MAC address
d. logical address
e. NetBIOS address
44. Which transport protocol and TCP/IP port does the Telnet utility use?

a. UDP, port 23
b. TCP, port 21
c. UDP, port 22
d. TCP, port 23
e. UDP, port 21
45. Which two of the following guarantee that a server continually has power, even if a
building’s electrical service is interrupted?
a. RAID Level 3
b. RAID Level 5
c. online UPS
d. standby UPS
e. gas-powered generator
730 Appendix B
NETWORK+ PRACTICE EXAM
46. What protocol is used to transfer mail between a Sendmail server and a Microsoft
Exchange server?
a. SMTP
b. SNMP
c. IMAP4
d. POP3
e. TFTP
47. What is the function of RARP?
a. to associate a host name with a given IP address
b. to associate a MAC address with a given IP address
c. to associate an IP address with a given MAC address
d. to associate a NetBIOS name with a given MAC address
e. to associate a MAC address with a given host name
48. Your 100BASE-T network is wired following the TIA/EIA 568-A standard. As you
make your own patch cable, which wires do you crimp into pins 1 and 2 of the RJ-45
connector?

a. white with green stripe and green
b. white with brown stripe and brown
c. white with blue stripe and blue
d. white with red stripe and red
e. white with orange stripe and orange
49. You are a support technician at an organization that uses a NetWare 6.5 LAN with a
mixture of Windows 98,Windows 2000, and Windows XP workstations. You are
asked to help a user in the Accounting Department who can retrieve files from the
network, but suddenly can’t print to the same printer he uses every day.You have
determined that he is the only person in his area affected by this problem. Further, if
you log on to the LAN with his user name and password, you can successfully print to
the same printer.Which of the following might be the cause of this user’s problem?
a. He inadvertently deleted the network printer object from his workstation’s
Printers window.
b. His network password expired.
c. His user name was accidentally deleted from the group that has rights to print
to that printer.
d. His workstation’s operating system requires an update before it can print to that
printer.
e. His network adapter is loose or improperly installed.
Appendix B 731
NETWORK+ PRACTICE EXAM
50. What is the function of the Network layer of the OSI Model?
a. to manage the flow of communications over a channel
b. to add segmentation and assembly information
c. to encode and encrypt data
d. to add logical addresses and properly route data
e. to apply electrical pulses to the wire
51. Which of the following utilities could you use to log on to a UNIX host?
a. NTP

b. ARP
c. PING
d. Telnet
e. SNMP
52. On your UNIX workstation, what command would you type at the shell prompt to
send a file to the printer queue?
a. prn file
b. lpr file
c. lpd file
d. ftp file
e. ps file
53. What is the default subnet mask for the following IP address: 154.13.44.87?
a. 255.255.255.255
b. 255.255.255.0
c. 255.255.0.0
d. 255.0.0.0
e. 0.0.0.0
732 Appendix B
NETWORK+ PRACTICE EXAM
54. Which of the following diagrams illustrates a FDDI network?
a.
b.
c.
Appendix B 733
NETWORK+ PRACTICE EXAM
d.
e.
55.
You are a support technician installing 13 new Windows XP workstations on your
company’s network, which relies on several Windows Server 2003 servers for authen-

tication and file sharing, one Fedora Core Linux e-mail server, and one Fedora Core
Linux proxy server.The network runs the TCP/IP protocol over 100BASE-TX Eth-
ernet technology. It also uses DHCP and NAT. Which of the following settings must
you manually specify on each workstation so that their users can pick up their Internet
e-mail from the Linux e-mail server?
a. DNS server address
b. IP address
c. WINS server name
d. NTP server address
e. SMTP server name
734 Appendix B
NETWORK+ PRACTICE EXAM
56. Which of the following IEEE committees designs standards for Token Ring net-
works?
a. 802.2
b. 802.3
c. 802.5
d. 802.7
e. 802.11
57. You have decided to create two separate VLANs in your office: one for computers on
the first floor of your building and one for computers on the second floor. What type
of device will you need in order for clients on the first floor to communicate with
clients on the second floor?
a. router
b. switch
c. bridge
d. hub
e. repeater
58. Which application on the Mac OS X Server allows the administrator to create new
users and groups?

a. Console One
b. Workgroup Manager
c. MMC
d. User Manager
e. Monitor
59. What types of files does an incremental backup save?
a. data that changed prior to the previous incremental backup
b. data that changed since the previous full or incremental backup
c. all data, regardless of whether it has changed
d. data that was backed up exactly a week previously
e. data that users have flagged for backup since the last backup occurred
Appendix B 735
NETWORK+ PRACTICE EXAM
60. You are setting up a new Windows XP client to connect with your LAN, which relies
on DHCP.You made certain that the client has the TCP/IP protocol installed and
bound to its NIC.Which of the following must you do next to ensure that the client
obtains correct TCP/IP information via DHCP?
a. Make certain the client’s computer name and host name are identical.
b. Enter the client’s MAC address in the DHCP server’s ARP table.
c. Make sure the Client for Microsoft Networks service is bound to the client’s
NIC.
d. Enter the DHCP server address in the Windows XP TCP/IP configuration.
e. Nothing; in Windows XP the DHCP option is selected by default and the
client will obtain IP addressing information upon connecting to the network.
61. You are a support technician installing a new NIC on a Windows XP workstation.
After physically installing the NIC, then installing the appropriate device driver for
the NIC, you restart the workstation. Upon restarting, an error indicates that the NIC
is attempting to use an IRQ already in use by another device.The workstation’s Device
Manager window indicates that both the NIC and the sound card are attempting to
use IRQ 11. Of the following IRQs, which one could you most likely assign to the

new NIC so that it will not conflict with another device?
a. 4
b. 6
c. 9
d. 13
e. 15
62. Which three of the following components must be installed on a Windows XP work-
station for it to successfully connect to a Windows Server 2003 file server over the
network?
a. NIC
b. Client for Microsoft Networks
c. file-sharing services
d. protocol(s)
e. Microsoft Family Logon
63. Which one of the following media is most resistant to EMI?
a. coaxial cable
b. UTP cable
c. STP cable
d. fiber-optic cable
e. microwaves
736 Appendix B
NETWORK+ PRACTICE EXAM
64. In the following figure, if router B suffers a failure, how will this failure affect nodes 1
through 9?
a. They will only be unable to access the Internet.
b. They will be unable to access the Internet and either nodes 10 through 14 or 15
through 20.
c. They will be unable to access the Internet, other nodes on the WAN, and other
nodes on the LAN.
d. They will be unable to access the Internet and nodes 10 through 20.

e. Their connectivity will not be affected.
65. Which of the following specifies standards for naming and accessing objects in an
NOS's directory and thereby improves interoperability?
a. ANSI
b. LDAP
c. AFP
d. OSPF
e. WINS
Appendix B 737
NETWORK+ PRACTICE EXAM
This page intentionally left blank
Visual Guide to
Connectors
Appendix C
Throughout this book, you learned about several different cabling and con-
nector options that may be used on networks. Some, such as RJ-45, are very
common, whereas others, such as Fiber LC connectors, are used only on
newer high-speed networks. So that you can compare such connectors and
ensure that you understand their differences, this Appendix compiles draw-
ings of the connectors and a brief summary of their application in a simple
table.You must be familiar with the most popular types of connectors to
qualify for Network+ certification.You can find more detail about these con-
nectors and the networks on which they are used in Chapters 3 and 5.
Table C-1 Network connectors and their uses
Male Male Female
Connector Connector Receptacle
Specification (front view) (side view) (front view) Application
RJ-11 (Registered Used on twisted-pair cabling for
Jack 11) telephone systems (and some
older twisted-pair networks)

RJ-45 (Registered Used on twisted-pair cabling for
Jack 45) modern networks
F-Type Used on coaxial cable suitable for
use with broadband video and
data applications
ST (Straight Tip) Used on fiber-optic cabling (for
example, on 100BASE-X,
Gigabit, and 10-GB Ethernet
networks)
SC (Subscriber Used on fiber-optic cabling (for
Connector or example, on 100BASE-X,
Standard Connector) Gigabit, and 10-GB Ethernet
networks)
IEEE 1394 Used to connect a variety of
(FireWire), 4-pin peripherals, including digital
cameras and external storage
devices; also used to network
computers in a bus topology
IEEE 1394 Used to connect a variety of
(FireWire), 6-pin peripherals, including digital
cameras and external storage
devices; also used to network
computers in a bus topology
Fiber LC Used on fiber-optic cabling
(Local Connector), (for example, on 100BASE-FX,
Single-mode Gigabit, and 10-GB Ethernet
networks)
740 Appendix C
VISUAL GUIDE TO CONNECTORS
Table C-1 Continued

Male Male Female
Connector Connector Receptacle
Specification (front view) (side view) (front view) Application
MT-RJ (Mechanical Used on fiber-optic cabling
Transfer-Registered (for example, on 100BASE-FX,
Jack) Gigabit, and 10-GB Ethernet
networks)
USB (universal Used to connect external
serial bus) peripherals, such as modems,
mice, audio players, and NICs
Type 1 IBM Data Used on older Token Ring
Connector networks; has been replaced by
RJ-45 connectors on newer
Token Ring networks
DB-9 Used on older Token Ring net-
works; has been replaced by RJ-
45 connectors on newer Token
Ring networks
Appendix C 741
VISUAL GUIDE TO CONNECTORS
This page intentionally left blank
Standard
Networking Forms
Appendix D
Throughout this book, you have learned about various operating procedures
and policies that help your IT operations, upgrades, and installations run
more smoothly.This appendix offers examples of forms you can use when
planning and maintaining a network. Recognize that you may need to
change the forms slightly to suit your environment.However, having a form
template can help you remember steps you may otherwise have forgotten.

This appendix provides the following forms:
■ Server Installation Checklist—Windows Server 2003
■ Server Installation Checklist—NetWare 6.5
■ Server Installation Checklist—Red Hat Enterprise Linux ES
■ User Account Creation Form
■ Technical Support Contacts Form
■ Incident Report Form
■ Network Security Checklist
744 Appendix D
STANDARD NETWORKING FORMS
Appendix D 745
STANDARD NETWORKING FORMS
746 Appendix D
STANDARD NETWORKING FORMS

×