Chapter 20. Practice Tests

Comprehensive Test

  1. Which of the following is Windows 2000’s default transport protocol?

    1. TCP/IP

    2. IPX/SPX

    3. DLC

    4. NetBEUI

  2. Which of the following protocols are routable? (Select all that apply.)

    1. TCP/IP

    2. IPX/SPX

    3. NetBEUI

    4. AppleTalk

  3. Which of the following is not a network transport protocol?

    1. TCP/IP

    2. IPX/SPX

    3. DLC

    4. NetBEUI

  4. Which TCP/IP protocols operate at the Host-to-Host layer of the DoD model? (Select all that apply.)

    1. TCP

    2. IP

    3. UDP

    4. ICMP

  5. Which of the following protocols translates IP addresses to hardware (MAC) addresses?

    1. IP

    2. ARP

    3. RARP

    4. ICMP

  6. HTTP (Hypertext Transfer Protocol) operates at which layer of the DoD model?

    1. Network Access

    2. Host-to-Host

    3. Internet

    4. Process/Application

  7. Of the following IP address classes, which allows for the greatest number of network addresses?

    1. Class A

    2. Class B

    3. Class C

  8. Which of the following techniques is used to divide an IP network into smaller network segments?

    1. Supernetting

    2. Subnetting

    3. CIDR

    4. DHCP

  9. Which of the following techniques is used to combine several consecutive network addresses into a single network?

    1. Supernetting

    2. Subnetting

    3. CIDR

    4. DHCP

  10. Which of the following protocols are related to email? (Select all that apply.)

    1. POP

    2. SNMP

    3. SMTP

    4. IMAP

  11. Which of the following Windows 2000 features is used to prevent unauthorized ports or protocols from being accessed on a computer?

    1. IPSec

    2. IP Filtering

    3. Certificate Authority

    4. ISAKMP

  12. Which type of routing uses routing protocols rather than a manually configured routing table?

    1. Static routing

    2. Dynamic routing

  13. Which of the following are routing protocols used with Windows 2000? (Select all that apply.)

    1. RIP

    2. IPX

    3. RRAS

    4. OSPF

  14. Which of the following IP Security options should you choose on a server to maintain the highest level of security?

    1. Respond Only

    2. Require Security

    3. Request Security

    4. All of the above

  15. Which of the following name resolution methods is used first when Windows 2000 resolves a name?

    1. DNS

    2. WINS

    3. The HOSTS file

    4. The LMHOSTS file

  16. Which of the following are used for NetBIOS name resolution? (Select all that apply.)

    1. DNS

    2. WINS

    3. HOSTS

    4. LMHOSTS

  17. Which of the following NetWare compatibility tools are included with Windows 2000 Server? (Select all that apply.)

    1. CSNW

    2. GSNW

    3. NWLink

    4. FPNW

  18. Which of the following services allows multiple Windows-based clients to access resources on a NetWare server without installing NetWare client software on each client?

    1. CSNW

    2. GSNW

    3. NWLink

    4. FPNW

  19. What is the term used to refer to a group of IP addresses that can be allocated by a DHCP server?

    1. Zone

    2. Scope

    3. Pool

    4. Lease

  20. Which of the following is a protocol used to manage RAS’s multilink feature?

    1. DHCP

    2. CHAP

    3. MS-CHAP

    4. BAP

  21. Which of the following dial-up authentication methods has the highest level of security?

    1. PAP

    2. CHAP

    3. MS-CHAP

    4. SPAP

  22. You want to provide Internet access to your private network and have two public IP addresses to use. Which of the following services could be used to translate between public and private addresses?

    1. NAT

    2. IPSec

    3. ICS

    4. DHCP

  23. Which of the following functions are provided by Windows 2000’s NAT protocol? (Select all that apply.)

    1. Network address translation

    2. IP address assignment

    3. Managing a DNS database

    4. Incoming connections from the Internet

  24. Which of the following services cannot be used at the same time as NAT?

    1. DHCP

    2. DNS

    3. ICS

    4. RAS

  25. Which of the following certificate authorities require Active Directory?

    1. Standalone root CA

    2. Standalone subordinate CA

    3. Enterprise root CA

    4. Enterprise subordinate CA

  26. Which of the following is used by clients to request a certificate from a CA?

    1. Certificate Authority Manager

    2. MMC

    3. A web browser

    4. An email program

  27. Which of the following options are not available after installing a certificate authority?

    1. Rename the server

    2. Move the server to a different domain

    3. Revoke a certificate

    4. Set up a subordinate CA

  28. Which of the following utilities can be used to capture and view packets transmitted over the network?

    1. Event Viewer

    2. Network Monitor

    3. IPSECMON

    4. Performance Monitor

  29. Which of the following utilities can keep a count of encrypted bytes transmitted using IP Security?

    1. Event Viewer

    2. Network Monitor

    3. IPSECMON

    4. Performance Monitor

  30. Which of the following utilities can display a list of application errors that have occurred?

    1. Event Viewer

    2. Network Monitor

    3. IPSECMON

    4. Performance Monitor

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.53.93