Which type of server is primarily controlled using a commandline interface?
Linux
Unix
Windows
Mac OS X Server
Which of the following are the most basic components required for connectivity in a network? (Choose three.)
A common client
A common operating system
A common protocol
Network media
Which device is used to receive a signal that establishes continuity of the wires within a cable, even when the cable is installed in a wall or another obstruction?
A tone generator
A media tester
A punch-down tool
A tone locator
Which secure protocol should be used for remote administration of Mac OS X Servers because it encrypts the user's credentials during authentication?
Telnet
SSL
SSH
MS-CHAP
Which of the following Microsoft client operating systems have a builtin firewall? (Choose all that apply.)
Windows 2000 Professional
Windows 98
Windows NT Workstation
Windows XP Professional
Which of the following are benefits of using a proxy service? (Choose all that apply.)
Improved performance
More available RAM
Reporting
Access to secure sites
Which of the following are true of VLANs? (Choose all that apply.)
VLANs are logical subnets.
VLANs can communicate with other VLANs without using a router.
VLANs can be created using a hub or a switch.
VLANs provide simplified administration in a network.
Which of the following are true in regard to an extranet? (Choose all that apply.)
Extranets are additional subnets that are not used on a network.
Extranets provide a value-added resource for a partner or vendor.
Extranets increase the security of a network.
Extranets require additional security measures in regard to authentication and authorization.
Which of the following are true in regard to antivirus software? (Choose all that apply.)
Antivirus software requires regular updates in order to be effective.
Antivirus software is designed for clients and not for servers.
Antivirus software is designed to keep viruses from damaging your computers and data.
Most companies cannot afford to install antivirus software on all of their computers.
Which type of fault-tolerant storage can be used to provide fault tolerance for the drive that contains the system files on a server?
RAID 0
RAID 1
RAID 5
None of the above
How would the physical and logical topology of an IBM Token Ring network best be described?
A physical ring and a logical star
A physical mesh and a logical star
A physical star and a logical ring
A physical bus and a logical star
At which of the following speeds is 802.11b capable of communicating? (Choose two.)
11Mbps
54Mbps
3Mbps
20Mbps
Which of the following devices might cause interference to an 802.11g network? (Choose two.)
A 900MHz wireless phone
A Bluetooth keyboard and mouse
An FM radio
A 2.4GHz wireless phone
Which of following network cables should be used to connect two similar devices, such as a hub to a hub or a computer to a computer? (Choose all that apply.)
Straight-through cable
Rollover cable
Crossover cable
Coaxial cable
Which of the following benefits does a firewall provide? (Choose two.)
Filters packets by, application, port number, IP address
Filters packets into and out of a network
Assigns a temporary IP address to all computers on the network
Resolves hostnames to IP addresses for use on the Internet
18.116.80.34