Practice Exam

This exam consists of 72 questions that reflect the material covered in this book. The questions are representative of the types of questions you should expect to see on the Network+ exam; however, they are not intended to match exactly what is on the exam.

Some of the questions require that you deduce the best possible answer. Often, you are asked to identify the best course of action to take in a given situation. You must read the questions carefully and thoroughly before you attempt to answer them. It is strongly recommended that you treat this exam as if it were the actual exam. When you take it, time yourself, read carefully, and answer all the questions to the best of your ability.

The answers to all the questions appear in the section following the exam. Check your letter answers against those in the answers section, and then read the explanations provided. You might also want to return to the chapters in the book to review the material associated with any incorrect answers.

1:Which layer of the OSI model is responsible for placing the signal on the network media?
  1. Physical

  2. Data-link

  3. MAC

  4. LLC

A1: a. The physical layer of the OSI seven-layer model is responsible for placing the signal on the network media. The data-link layer (Answer b) is responsible for physical addressing and media access. MAC and LLC (Answers c and d) are sublayers of the data-link layer. For more information, see Chapter 4, “The OSI Model.”
2:As system administrator, you have been asked to install a NetWare 5.x server system on your network. You have 20 Windows 98 workstations and 4 Linux systems that are used as clients. Which of the following can you install on the Windows 98 systems to allow you to connect to the NetWare server? (Choose the two best answers.)
  1. Novell Client for Windows 95/98

  2. Microsoft Client for NetWare Networks

  3. Novell CAFS Client

  4. Nothing, as long as TCP/IP is the default protocol

A2: a, b. The Microsoft Client for NetWare Networks or the Novell Client for Windows 95/98 can be installed on the Windows 98 systems to facilitate connectivity. There is no such thing as the Novell CAFS client (Answer c). Although TCP/IP can be used to connect to certain versions of Novell NetWare, client software is needed unless NetWare 6 is being used (Answer d). For more information, see Chapter 11, “Configuring Network Connectivity.”
3:You are a network administrator managing a midsized network that uses a NetWare print server, a Windows application server, and a Linux firewall server. One of your servers loses network connectivity; you type ifconfig at the command line to see if the server has a valid IP address. Which server has lost connectivity?
  1. The firewall server.

  2. The print server.

  3. The application server.

  4. ifconfig is not a valid command on any of these platforms.

A3: a. The ifconfig command is used on a Linux system to determine the IP configuration of the system. With NetWare you use the config command to obtain information about network addresses. On a Windows 2000 system, the ipconfig command is used to view the networking configuration including the IP address. ifconfig can be used on Unix/Linux platforms to view the networking configuration. For more information, see Chapter 13, “Troubleshooting Connectivity.”
4:You are managing a network that uses both a Unix server and a Windows 2000 server. Which of the following protocols can you use to transfer files between the two servers?
  1. Telnet

  2. PPP

  3. FTP

  4. PPTP

A4: c. FTP can be used to transfer files between Windows and Unix systems. FTP is part of the TCP/IP protocol suite and is platform independent. The Telnet utility is used to open a virtual terminal session on a remote host (Answer a). PPP is used to establish communications over a serial link; thus, Answer b is incorrect. PPTP is used to establish a secure link over a public network such as the Internet (Answer d). For more information, see Chapter 6, “Working with TCP/IP.”
5:You have been called by a user who complains that access to a Web page is very slow. What utility can you use to find the bottleneck?
  1. ping

  2. Telnet

  3. tracert

  4. nbtstat

A5: c. tracert is a Windows command that can be used to display the full path between two systems, including the number of hops between the systems. The ping utility (Answer a) can be used to test connectivity between two devices, but it only reports the time taken for the round trip; it does not give information about the time it takes to complete each hop in the route. The Telnet utility (Answer b) is used to open a virtual terminal session on a remote host. The nbtstat command (Answer d) is used to view statistical information about the NetBIOS status of a system. For more information, see Chapter 13.
6:During a busy administrative week, you install a new virus suite in your network of 55 computers, a new RAID array in one of the servers, and a new office suite on 25 of the computer systems. After all the updates, you are experiencing system errors throughout the entire network. Which of the following would you do to help isolate the problem?
  1. Disable the RAID array

  2. Uninstall the office suite

  3. Check the virus suite vendor's Web site for system patches or service packs

  4. Reinstall the virus software

A6: c. Because the system errors are networkwide, it is likely that the cause of the problem in this scenario lies with the virus suite because it is installed on all computers. To troubleshoot such a problem, it would be a good idea to check for patches or updates on the vendor's Web site. A problem with a RAID array (Answer a) would affect only the server in which it is installed, not the entire network. Because the office suite (Answer b) was installed on only some of the systems, it can be eliminated as a problem because all the systems are affected. The virus software (Answer d) appears to be the cause of the problem, but re-installing it is unlikely to help. For more information, see Chapter 15, “Troubleshooting Procedures and Best Practices.”
7:What utility do you use to check the IP configuration on a Windows 95 or Windows 98 workstation?
  1. netstat

  2. winipcfg

  3. ping

  4. ipconfig

A7: b. On Windows client-based systems such as Windows 95, Windows 98, and Windows Me, the winipcfg utility can be used to verify the TCP/IP configuration of the system. The same command does not work on Windows server systems. The netstat utility (Answer a) is used to view protocol statistics information. The ping utility (Answer c) is used to test the connectivity between two systems on a TCP/IP network. The ipconfig utility (Answer d) is used view the TCP/IP configuration on a Windows NT or Windows 2000 system. For more information, see Chapter 13.
8:When a system running TCP/IP receives a data packet, which of the following does it use to determine what service to forward the packet to?
  1. Port number

  2. Packet ID number

  3. Data IP number

  4. IP protocol service type

A8: a. The service to which a data packet is destined is determined by the port number to which it is sent. Answers b, c, and d are not valid. For more information, see Chapter 6.
9:Which of the following backup methods clear the archive bit? (Choose the two best answers.)
  1. Differential

  2. Sequential

  3. Full

  4. Incremental

A9: c, d. Both the full and incremental backup methods clear the archive bit, to indicate which data does and does not need to be backed up. In a differential backup (Answer a), the archive bit is not cleared. Sequential (Answer b) is not a type of backup. For more information, see Chapter 10, “Fault Tolerance, Disaster Recovery, VLANs, and NAS.”
10:You are troubleshooting a server connectivity problem on your network—a Windows 95 system is having trouble connecting to a Windows 2000 Server. Which of the following commands would you use to display per-protocol statistics on the workstation system?
  1. arp -a

  2. arp -A

  3. nbtstat -s

  4. nbtstat -S

  5. netstat -s

A10: e. The netstat -s command can be used to display per-protocol statistics. The arp command (Answers a and b) is used to view a list of the IP address-to-MAC address resolutions performed by the system. The nbtstat utility (Answers c and d) is used to view protocol statistics for the NetBIOS protocol. For more information, see Chapter 13.
11:You are working as a network administrator on a Unix system. The system uses dynamic name resolution. What is used to dynamically resolve a hostname on a Unix server?
  1. IPX

  2. ARP

  3. DNS

  4. LMHOSTS

A11: c. DNS is used on Unix-based systems to resolve hostnames. IPX (Answer a) is a network-layer connectionless protocol. ARP (Answer b) resolves IP addresses to MAC addresses. The LMHOSTS file (Answer d) is used on Windows systems to resolve NetBIOS names to IP addresses. For more information, see Chapter 6.
12:During the night, one of your servers powers down. Upon reboot, print services do not load. Which of the following would be the first step in the troubleshooting process?
  1. Examine the server log files

  2. Reboot the server

  3. Reinstall the printer

  4. Reinstall the printer software

A12: a. In this scenario your first step is to gather information by examining the server log files. When you have that information, you can proceed with the rest of the troubleshooting process. Rebooting the server (Answer b) is unlikely to cure the problem. Before you reinstall the printer (Answer c), you should examine the log files to see if there are any problems reported in the server log files. Before you reinstall the printer software (Answer d), you should examine the log files to see if there are any problems reported in the server log files. For more information, see Chapter 15.
13:Which of the following technologies uses Category 5 cable?
  1. 100BaseTX

  2. Fiber-optic

  3. 10Base5

  4. 10Base2

A13: a. 100BaseTX uses Category 5 cable. Fiber-optic (Answer b) is a type of cable. 10Base5 (Answer c) is an Ethernet networking standard that uses thick coaxial cable. 10Base2 (Answer d) is an Ethernet networking standard that uses thin coaxial cable. For more information, see Chapter 2, “Cabling and Connectors.”
14:Which of the following utilities can be used to view the current protocol connections on a system?
  1. ping

  2. netstat

  3. Telnet

  4. tracert

A14: b. The netstat -a command can be used to display the current connections and listening ports. The ping utility (Answer a) is used to test connectivity between two devices on a TCP/IP network. Telnet (Answer c) is an application-level protocol that allows a virtual terminal session on a remote host. The tracert utility (Answer d) allows a path to be traced between two hosts. For more information, see Chapter 13.
15:Which of the following protocols are part of the TCP/IP protocol suite? (Choose the three best answers.)
  1. AFP

  2. FTP

  3. DHCP

  4. HTTP

  5. NCP

A15: b, c, d. FTP, DHCP, and HTTP are all protocols in the TCP/IP protocol suite. AFP (Answer a) is part of the AppleTalk protocol suite. NCP (Answer e) is part of the IPX/SPX protocol suite. For more information, see Chapter 6.
16:Which of the following are connectionless protocols? (Choose the three best answers.)
  1. IP

  2. SPX

  3. IPX

  4. UDP

A16: a, c, d. UDP, IPX, and IP are all connectionless protocols. SPX (Answer b) is a connection-oriented protocol. For more information, see Chapter 5, “Overview of Network Protocols.”
17:Which of the following networking standards specifies a maximum segment length of 100 meters?
  1. 10Base2

  2. 10Base5

  3. 10BaseYX

  4. 10BaseT

A17: d. 10BaseT has a maximum segment length of 100 meters. The maximum length of a 10Base2 segment (Answer a) is 185 meters. The maxim length of a 10Base5 segment (Answer b) is 500 meters. Answer c is not a valid networking standard. For more information, see Chapter 2.
18:After several passwords have been compromised in your organization, you have been asked to implement a networkwide password policy. Which of the following represents the most practical and secure password policy?
  1. Daily password changes

  2. Weekly password changes

  3. Monthly password changes

  4. Password changes only after an account has been compromised

A18: c. Changing passwords too frequently is not practical, and changing them too infrequently represents a security risk. Monthly password changing is adequate for most environments. Changing passwords too frequently (Answers a and b) can cause problems because users might have problems remembering passwords and so use passwords that are too similar to one another. Although passwords should be changed if they are compromised, they should also be changed periodically making Answer d incorrect. For more information, see Chapter 12, “Securing the Network.”
19:You are experiencing a problem with a workstation and want to ping the local host. Which of the following are valid ways to check your local TCP/IP connection? (Choose the two best answers.)
  1. ping host

  2. ping localhost

  3. ping 127.0.0.1

  4. ping 127.0.0.0

A19: b, c. To verify the IP configuration on a local computer system, you can either ping the localhost or the IP address 127.0.0.1. The default hostname for a system is localhost, not host which means Answer a is incorrect. Answer d is not correct as this is the network address for the Class A loopback address, not a valid node loopback address. For more information, see Chapter 13.
20:Which of the following network devices operates at the physical layer of the OSI model?
  1. Router

  2. Hub

  3. Bridge

  4. NIC

A20: b. A network hub operates at the physical layer of the OSI model. A router (Answer a) operates at the network layer of the OSI model. A bridge (Answer c) operates at the data-link layer of the OSI model. An NIC (Answer d) operates at the data-link layer of the OSI model. For more information, see Chapter 4.
21:You have been asked to implement a RAID solution on one of your company's servers. You have two hard disks and two hard disk controllers. Which of the following RAID levels could you implement? (Choose the three best answers.)
  1. RAID 0

  2. RAID 1

  3. Disk duplexing

  4. RAID 10

  5. RAID 5

A21: a, b, c. With two hard disks and two controllers, you can implement RAID 0, RAID 1, and disk duplexing. RAID 5 (disk striping with parity; Answer e) requires a minimum of three disks to be implemented. RAID 10 (Answer d) is a combination of RAID 1 (disk mirroring) and RAID 0 (disk striping). RAID 10 requires a minimum of four disks. For more information, see Chapter 10.
22:Which of the following represents a Class B IP address?
  1. 191.23.21.54

  2. 125.123.123.2

  3. 24.67.118.67

  4. 255.255.255.0

A22: a. The first octet of a Class B addresses must be in the range 128 to 191. Answers a and b represent Class A addresses. Class A addresses run from 1 to 126. Answer d is not a valid IP address. For more information, see Chapter 6.
23:What utility would produce the following output?
Proto Local Address Foreign Address 
State
TCP   laptop:1028   LAPTOP:0    LISTENING
TCP   laptop:1031   LAPTOP:0    LISTENING
TCP   laptop:1093   LAPTOP:0    LISTENING
TCP   laptop:50000  LAPTOP:0    LISTENING
TCP   laptop:5000   LAPTOP:     LISTENING
TCP   laptop:1031   n218.       ESTABLISHED
                    audiogalaxy.com:ftp
TCP   laptop:1319   h24-67-184-65.ok.
                    shawcable.net:nbsess

  1. netstat

  2. nbtstat

  3. ping

  4. tracert -R

A23: a. The netstat utility can be used to display protocol statistic and TCP/IP network connections. The nbtstat utility (Answer b) shows statistical information about the NetBIOS over TCP/IP connections. The ping utility (Answer c) is used to test the connectivity between two devices on a TCP/IP network. The tracert utility (Answer d) traces the path between two hosts on a TCP/IP network. For more information, see Chapter 13.
24:You have been called in to troubleshoot a problem with a newly installed email application. Internal users are able to communicate with each other via email, but neither incoming nor outgoing Internet email is working. You suspect a problem with the port-blocking configuration of the firewall system that protects the Internet connection. Which of the following ports would you allow, to cure the problems with the email? (Choose the two best answers.)
  1. 20

  2. 25

  3. 80

  4. 110

  5. 443

A24: b, d. TCP/IP port 25 is used by SMTP. TCP/IP port 110 is used by POP3. Because SMTP is used to send mail and POP3 is used to retrieve mail, port 25 and port 110 are the two ports that would need to be allowed for incoming and outgoing Internet email. TCP/IP port 21 (Answer a) is used by FTP. TCP/IP port 80 (Answer c) is used by HTTP. TCP/IP port 443 (Answer e) is used by HTTPS. For more information, see Chapter 6.
25:What is the default subnet mask for a Class B network?
  1. 255.255.255.224

  2. 255.255.255.0

  3. 127.0.0.1

  4. 255.255.0.0

A25: d. The default subnet mask for a Class B address is 255.255.0.0. Answer a is incorrect because it is not the default subnet mask for a Class B network. Answer b is the default subnet mask for a Class B network. Answer c is the local loopback address. For more information, see Chapter 6.
26:At which OSI layer does TCP operate?
  1. Network

  2. Transport

  3. Session

  4. Presentation

A26: b. TCP operates at the transport layer of the OSI model. Answers a, c, and d are all incorrect; TCP does not operate at the network layer. For more information, see Chapter 5.
27:What is the basic purpose of a firewall system?
  1. It provides a single point of access to the Internet.

  2. It caches commonly used Web pages, thereby reducing the bandwidth demands on an Internet connection.

  3. It allows hostnames to be resolved to IP addresses.

  4. It protects one network from another by acting as an intermediary system.

A27: d. The purpose of the firewall system is to protect one network from another. One of the most common places to use a firewall is to protect a private network from a public one such as the Internet. Answer a is incorrect because although a firewall can provide a single point of access, that is not its primary purpose. Answer b more accurately describes the function of a proxy server. Answer c describes the function of a DNS server. For more information, see Chapter 12.
28:Email and FTP work at which layer of the OSI model?
  1. Application

  2. Session

  3. Presentation

  4. User

A28: a. Both email and FTP work at the application layer of the OSI model. Email and FTP are application-layer protocols, not session-layer protocols. User (Answer d) is not a layer of the OSI model. For more information, see Chapter 4.
29:You have been tasked with installing five new Windows 98 client systems, including the Novell Client software. Which pieces of information will you need during the Novell Client install to configure the connection to the NetWare server? (Choose the two best answers.)
  1. Target NDS replica name

  2. NDS tree name

  3. Username

  4. The context in which the user resides

  5. Password

  6. Domain name

A29: b, d. To configure the client software, you need to have the context and the NDS tree name. The username and password are not needed during the client configuration, but they are necessary to actually log on. Answer a is incorrect because you do not need to specify the target NDS replica to connect to a NetWare server. The username (Answer c) is needed only when the user actually wants to authenticate to the server. The password (Answer e) is needed only when the user actually wants to authenticate to the server. A domain name (Answer f) does not need to be specified in order to connect to a NetWare server. For more information, see Chapter 11.
30:While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server. Although it appears that the user's attempts were unsuccessful, you are very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?
  1. A more secure password policy

  2. A firewall system at the connection point to the Internet

  3. File-level encryption

  4. Kerberos authentication

A30: b. To prevent unauthorized access to a private network from the Internet, you can use a firewall server to restrict outside access. Implementing a more secure password policy (Answer a) is a good idea, but it is not the best choice of those available. Implementing a file-level encryption system (Answer c) is a good idea, but it is not the best choice of those available. Kerberos (Answer d) is an authentication system, not a method to prevent unauthorized access to the system. For more information, see Chapter 12.
31:Which of the following pieces of information is not likely to be supplied via DHCP?
  1. IP address

  2. NetBIOS computer name

  3. Subnet mask

  4. Default gateway

A31: b. The NetBIOS computer name is not supplied to client systems by a DHCP server. The IP address (Answer a) is one of the pieces of information provided by DHCP. The subnet mask (Answer c) is one of the pieces of information provided by DHCP. The default gateway (Answer d) is one of the pieces of information supplied by DHCP. For more information, see Chapter 6.
32:While troubleshooting a network connectivity problem, you notice that the network card in your system is operating at 10Mbps in half-duplex mode. At what speed is the network link operating?
  1. 2.5Mbps

  2. 5Mbps

  3. 10Mbps

  4. 11Mbps

A32: c. Because the NIC is functioning at half-duplex 10Mbps, the transfer rate is 10Mbps. None of the other answers are correct. For more information, see Chapter 3, “Networking Components and Devices.”
33:Which of the following is a valid IPv6 address?
  1. 42DE:7E55:63F2:21AA:CBD4:D773

  2. 42CD:7E55:63F2:21GA:CBD4:D773: CC21:554F

  3. 42DE:7E55:63F2:21AA

  4. 42DE:7E55:63F2:21AA:CBD4:D773: CC21:554F

A33: d. IPv6 uses a 128-bit address, which is expressed as eight octet pairs in hexadecimal format, separated by colons. Because it is hexadecimal, only numbers and the letters A through F can be used. An IPv6 address is composed of eight hexadecimal octets. Only numbers and the letters A through F can be used. For more information, see Chapter 6.
34:While troubleshooting a network connectivity problem on a Windows 2000 Server, you need to view a list of the IP addresses that have been resolved to MAC addresses. Which of the following commands would you use to do this?
  1. arp -a

  2. nbtstat -a

  3. arp -d

  4. arp -s

A34: a. The arp -a command is used to display the IP addresses that have been resolved to MAC addresses. The nbtstat command (Answer b) is used to view protocol statistics for NetBIOS connections. arp -d (Answer c) is not a valid command. The arp -s command (Answer d) allows you to add static entries to the ARP cache. For more information, see Chapter 13.
35:Which of the following statements best describes RAID 5?
  1. A RAID 5 array consists of at least two drives. Parity information is written across both drives to provide fault tolerance.

  2. A RAID 5 array consists of at least three drives and distributes parity information across all the drives in the array.

  3. A RAID 5 array consists of at least three drives and stores the parity information on a single drive.

  4. A RAID 5 array consists of at least four drives. The first and last drives in the array are used to store parity information.

A35: b. A RAID 5 array consists of at least three hard disks and stripes parity information across all disks in the array. RAID 5 (disk striping with parity; Answer a) requires at least three drives. The parity information is stored in a stripe across all three drives in the array (Answer b). RAID 5 requires only three drives which makes Answer d incorrect. For more information, see Chapter 10.
36:Which of the following IEEE specifications does CSMA/CD relate to?
  1. 802.11b

  2. 802.2

  3. 802.5

  4. 802.3

A36: d. CSMA/CD relates to the IEEE specification 802.3. The 802.11b (Answer a) standard describes wireless LAN networking. The 802.2 (Answer b) standard defines the media access methods for various networking standards. The 802.5 (Answer c) standard defines Token Ring networking. For more information, see Chapter 1, “Introduction to Networking.”
37:While you are troubleshooting a sporadic network connectivity problem on a Windows 2000 system, a fellow technician suggests that you run the ping -t command. What is the purpose of this command?
  1. It shows the route taken by a packet to reach the destination host.

  2. It shows the time, in seconds, that the packet takes to reach the destination.

  3. It allows the number of ping messages to be specific.

  4. It pings the remote host continually until it is stopped.

A37: d. The ping -t command is used to send continuous ping requests to a remote system. The ping request will continue until it is manually stopped. The trace route utility (Answer a) performs this task. The ping command (Answer b) shows the amount of time a packet takes to complete the round trip from the host to the destination. Answer c is incorrect because the ping command with the -n switch performs this task. For more information, see Chapter 13.
38:Which of the following statements best describes NAS?
  1. It provides address translation services to protect the identity of client systems.

  2. It refers to a storage device that is attached to a host system such as a server.

  3. It refers to a storage device that is attached directly to the network media.

  4. It refers to a small, dedicated network of storage devices.

  5. It is a directory services system used on NetWare networks.

  6. It provides a mechanism for users to access areas of a hard disk on a Linux system.

A38: c. NAS is a storage device that attaches directly to the network media. DAS attaches to a server. Answer a describes NAT. Answer b describes DAS. Answer d describes a SAN, Answer e describes NDS and Answer f describes NFS. For more information, see Chapter 10.
39:What type of physical topology is shown in the following diagram?

  1. Hierarchical star

  2. Ring

  3. Star

  4. Mesh

A39: a. The diagram in the question shows a hierarchical star topology. The difference between a hierarchical star and a regular star topology is that hierarchical is a layered architecture. Answers b, c, and d are all incorrect. The figure does not represent any of these network types. For more information, see Chapter 1.
40:A remote user calls you to report a problem she is having connecting to the corporate network over her DSL connection. The user is able to connect to the Internet and browse Web pages, but she can't connect to the corporate remote access gateway. Which of the following troubleshooting steps would you perform first?
  1. Check the corporate remote access gateway to see if it is running and operating correctly

  2. Have the user reboot her system

  3. Have the user reconfigure the IP address on her system to one of the address ranges used on the internal corporate network, and then try again

  4. Have the user power cycle the DSL modem and try again

A40: a. In this scenario, you would first check the remote access gateway to see if it is running and operating correctly. Because the user can browse Web pages, this is not a connectivity problem. Answer b is incorrect because although rebooting the system might help, the system appears to be working correctly, and rebooting it is unlikely to cure the problem. The IP address configuration appears to be working because the user is able to access Web pages and so Answer c is incorrect. The Internet connection appears to be working, so cycling the power on the DSL modem, as described in Answer d, is unlikely to help. For more information, see Chapter 15.
41:By using network monitoring tools, you determine that your 10Base2 network is suffering performance degradation from too many collisions. Which of the following devices could you use to divide up the network and so reduce the number of collisions?
  1. Ethernet switch

  2. Source-route bridge

  3. MSAU

  4. Transparent bridge

A41: d. A transparent bridge is a device that can be used to divide up an Ethernet network to reduce collisions. Switches can also be used, but the network in the question is a 10Base2 network and uses coaxial cable rather than twisted-pair cable. Ethernet switches (Answer a) can be used only on networks that are created with twisted-pair cable. 10Base2 is a networking standard that uses thin coaxial cable. A source-route bridge (Answer b) is used on Token Ring networks. 10Base2 is an Ethernet networking standard. An MSAU (Answer c) is used on Token Ring networks. 10Base2 is an Ethernet networking standard. For more information, see Chapter 2.
42:What command would generate the following output?
7    60 ms    30 ms    40 ms  home- gw.st6wa.ip.att.net [192.205.32.249]
8    30 ms    40 ms    30 ms  gbr3- p40.st6wa.ip.att.net [12.123.44.130]
9    50 ms    50 ms    60 ms  gbr4- p10.sffca.ip.att.net [12.122.2.61]
10   60 ms    60 ms    60 ms  gbr3- p10.la2ca.ip.att.net [12.122.2.169]
11   90 ms    60 ms    70 ms  gbr6- p60.la2ca.ip.att.net [12.122.5.97]

  1. ipconfig

  2. netstat

  3. ping

  4. tracert

A42: d. The output displayed in this question is from the Windows tracert utility. Answers a, b and c are all incorrect. These utilities produce output that is different from the output shown. For more information, see Chapter 14, “Troubleshooting Tools and Utilities.”
43:Your manager has asked you to implement security on your peer-to-peer network. Which of the following security models offers the highest level of security for this type of network?
  1. Share level

  2. User level

  3. Password level

  4. Layered

A43: b. User-level security is more secure than share-level security and requires a user to provide a login ID, usually a username and password combination to access network resources. Answer a is incorrect because share-level security is not as secure as user-level security. Answers c and d are not accepted terms for describing levels of security. For more information, see Chapter 12.
44:You are working on a Linux system and are having problems pinging a remote system by its hostname. DNS resolution is not configured for the system. What file might you look in to begin troubleshooting the resolution problem?
  1. RESOLV

  2. STATICDNS

  3. PASSWD

  4. HOSTS

A44: d. The HOSTS file is used to manually configure hostname resolution, and if there is a problem with hostname resolution, entries in this file must be checked. Answers a and b are incorrect because files are not used on a Linux system. Answer c is incorrect because the PASSWD file is used to store user account information. For more information, see Chapter 6.
45:You are tasked with specifying a way to connect two buildings across a parking lot. The distance between the two buildings is 78 meters. An underground wiring duct exists between the two buildings, although there are concerns about using it because it also houses high-voltage electrical cables. The budget for the project is very tight, but your manager still wants you to specify the most suitable solution. Which of the following cable types would you recommend?
  1. Fiber-optic

  2. UTP

  3. Thin coax

  4. STP

A45: a. Fiber-optic cable provides the most resistance to EMI and therefore is often used in environments where there is a risk of interference. Although it is inexpensive, UTP (Answer b) cable has very low resistance to EMI. Therefore, it should not be run near high-voltage electric cables. Thin coax (Answer c) has low resistance to EMI. Therefore, it should not be run near high-voltage electric cables. STP (Answer d) has a good level of resistance to EMI, but it is still not as resistant as fiber-optic. Not factoring in the cost, fiber optic is the most suitable solution. For more information, see Chapter 2.
46:You are attempting to configure a client's email program. The user can receive mail but is unable to send any. In the mail server configuration screen of the mail application, you notice that the Type of Outgoing Mail Server field is blank. This explains why the client is unable to send mail. Which of the following protocols are you most likely to enter as a value in the Type of Outgoing Mail Server field?
  1. NMP

  2. POP3

  3. SMTP

  4. IMAP

A46: c. SMTP is used for sending email. Answer a is not a valid answer. Answers b and d are incorrect because POP3 and IMAP are email retrieval protocols, not protocols for sending email. For more information, see Chapter 6.
47:A user calls to inform you that she can't access the Internet from her system. When you visit the user, you run the ipconfig /all utility and see the following information. What is the most likely reason the user is having problems accessing the Internet?
C:>ipconfig /all 

Windows 2000 IP Configuration
         Host Name . . . . . . . . . . . . : LAPTOP
         Primary DNS Suffix  . . . . . . . :
         Node Type . . . . . . . . . . . . : Broadcast
         IP Routing Enabled. . . . . . . . : No
         WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:
         Connection-specific DNS Suffix  . :
         Description . . . . . . . . . . . : Intel 8255x-based PCI Ethernet
         Physical Address. . . . . . . . . : 00-D0-59-09-07-51
         DHCP Enabled. . . . . . . . . . . : No
         IP Address. . . . . . . . . . . . : 192.168.2.1
         Subnet Mask . . . . . . . . . . . : 255.255.255.0
         Default Gateway . . . . . . . . . :
         DNS Servers . . . . . . . . . . . : 192.168.2.10 192.168.2.20

  1. The system is on a different subnet than the DNS servers.

  2. DHCP is not enabled.

  3. The subnet mask is incorrect.

  4. The default gateway setting is not configured.

A47: d. The most likely cause of the problem is that the default gateway is not configured. Answer a is incorrect because from the output it appears that the DNS servers are on the same subnet as this system. Answer b does not apply because addressing is configured statically, so there is no DHCP service. This is not a problem, however. Answer c is incorrect because the subnet mask is the correct default subnet mask for a Class C network. For more information, see Chapter 13.
48:Your ISP account manager suggests that it might be appropriate for you to install a DNS server internally. Which of the following functions does the DNS server provide?
  1. It performs network address translation services.

  2. It streamlines the resolution of NetBIOS names to IP addresses.

  3. It allows some hostname-to-IP address resolutions to occur internally.

  4. It allows users to retrieve Internet Web pages more quickly.

A48: c. DNS allows hostname resolutions to occur internally. In most cases companies use a DNS server provided by the ISP. In some cases, however, it might be appropriate to have a DNS server on the internal network. Answer a is incorrect as NAT is normally a function of firewall or proxy servers. Answer b describes the purpose of a WINS server. Answer d describes the function of a proxy server. For more information, see Chapter 6.
49:Which of the following is not one of the private address ranges?
  1. 192.168.x.x

  2. 10.x.x.x

  3. 172.16.x.x

  4. 224.181.x.x

A49: d. Private address ranges are designed for use on private networks. The ranges are 192.168.X.X, 10.X.X.X, and 172.16.X.X–172.32.X.X. Answers a, b, and c are all valid private IP address ranges. For more information, see Chapter 6.
50:Which of the following is a valid MAC address?
  1. 00:D0:59:09:07:51

  2. 00:D0:59

  3. 192.168.2.1

  4. 00FE:56FE:230F:CDA2:00EB:32EC

  5. 00:DG:59:09:07:51

A50: a. The MAC address is a 6-byte address expressed in six pairs of hexadecimal values. Because it is hexadecimal, only the letters A through F and numbers can be used. Answer b is incorrect because MAC addresses are expressed as six hexadecimal pairs. Answer c shows an example of an IPv4 address. Answer d shows an example of an IPv6 address. Answer e is incorrect because MAC addresses are expressed in hexadecimal; therefore, only the letters A through F and numbers can be used. For more information, see Chapter 3.
51:If you contacted IANA, what would you most likely be trying to do?
  1. Get a new telephone number

  2. Get an IP address to connect a system to a public network

  3. Get an Internet domain name reassigned

  4. Get an IP address to connect a system to a private network

A51: b. IANA is responsible for assigning IP addresses for systems on public networks—specifically, the Internet. Answer a is incorrect. IANA is responsible for assigning IP addresses for use on public networks (such as the Internet). Answer c is incorrect because Domain names are administered by domain registry organizations. Answer d is incorrect because you don't need to apply for a network address for use on a private network. For more information, see Chapter 6.
52:Which of the following technologies can be implemented on a switch to create multiple separate networks?
  1. Proxy

  2. Subnet masking

  3. NAS

  4. VLAN

A52: d. A VLAN is implemented on a switch to create multiple separate networks. A proxy server (Answer a) is used to control access to the Internet. Subnet masking (Answer b) is not a valid method of creating separate networks. NAS (Answer c) describes storage devices that are attached directly to the network media. For more information, see Chapter 10.
53:Which of the following protocols are responsible for network addressing? (Choose the two best answers.)
  1. IP

  2. SPX

  3. IPX

  4. TCP

A53: a, c. IP and IPX are responsible for network addressing. Answers b and d are incorrect because SPX and TCP are transport-layer protocols and so are not responsible for network addressing. For more information, see Chapter 5.
54:You are configuring a new NAS system. The configuration utility gives you the option to choose what application-level protocol you want to use with the system. Which of the following protocols are you likely to choose? (Choose the two best answers.)
  1. NCP

  2. SMB

  3. TCP

  4. NFS

A54: b, d. The protocols used by NAS are SMB and NFS. NCP (Answer a) is part of the IPX/SPX protocol suite. It is responsible for providing access to network services. TCP (Answer c) is a connection-oriented transport protocol. For more information, see Chapter 10.
55:For many years, the design department and the marketing department have operated separate networks. The design department uses AppleTalk, and the marketing department uses Token Ring. Now, the two departments have decided that they want to be able to access files from each other's servers. What network device or service would you implement to facilitate this?
  1. Gateway

  2. Source-route bridge

  3. Router

  4. Transparent bridge

A55: a. A gateway is used to translate between networks that use dissimilar protocols. In this question, it is used to translate between an AppleTalk network and a Token Ring network. A source-route bridge (Answer b) is used on Token Ring networks. A router (Answer c) is use to connect two networks. Strictly speaking, a router does not perform translation tasks, although the gateway functionality can be implemented on some routers. A transparent bridge (Answer d) is used to segregate Ethernet networks. For more information, see Chapter 3.
56:Which of the following connectors would you use when working with fiber-optic cable? (Choose the two best answers.)
  1. RJ-11

  2. SC

  3. RJ-45

  4. ST

  5. BNC

  6. Vampire tap

A56: b, d. Fiber-optic cable can use either SC or ST type connectors. RJ-11 connectors (Answer a) are associated with telephone cable, RJ-45 (Answer c) connectors are associated with UTP cable, and BNC connectors (Answer e) are associated with thin coaxial cable. For more information, see Chapter 2.
57:Which of the following is not a commonly implemented feature of a firewall system?
  1. NAT

  2. Packet filtering

  3. Proxy

  4. NAS

A57: d. A firewall can provide several different services to the network, including NAT, proxy services, and packet filtering. NAS is not a function of a firewall server. Answers a, b, and c are all incorrect because NAT, packet filtering, and proxy functionality are all commonly implemented on firewall systems. For more information, see Chapter 12.
58:You are the network administrator for a Token Ring network. An NIC in a system fails, and you replace it with a new one. However, the system is still unable to connect to the network. What is the most likely cause of the problem?
  1. The NIC is set to the wrong ring speed.

  2. The NIC is a 100Mbps card, and the ring is configured for only 10Mbps.

  3. The NIC is set to full-duplex, and the ring is running at only half-duplex.

  4. The NIC is faulty.

A58: a. When a new NIC is installed on a Token Ring network, the speed of the card has to be set to match the speed used by the network. Answer b is incorrect because Token Ring networks operate at either 4Mbps or 16Mbps. Answer c is incorrect because full-duplex connections are not used on Token Ring networks. Answer d is incorrect because, although it is possible, a faulty card is not the most likely answer. For more information, see Chapter 1.
59:You have enabled HTTPS because of concerns about the security of your Web server application, which runs on a Web server system in the DMZ of your corporate network. However, remote users are now unable to connect to the application. Which of the following is the most likely reason for the problem?
  1. Port 80 is being blocked on the corporate firewall.

  2. Port 443 is being blocked on the corporate firewall.

  3. Remote users need to enable HTTPS support in their Web browsers.

  4. Port 110 is being blocked on the corporate firewall.

A59: b. The most likely explanation is that port 443, the HTTPS default port, is being blocked by a corporate firewall. Port 80 (Answer a) is used by HTTP. All modern Web browsers support HTTPS automatically, therefore Answer c is incorrect. Port 110 (Answer d) is used by POP3. For more information, see Chapter 6.
60:Which of the following is a valid Class A IP address?
  1. 124.254.254.254

  2. 127.0.0.1

  3. 128.16.200.12

  4. 131.17.25.200

A60: a. Class A subnets use the range 1 to 126 for the value of the first octet. Answer b is the loopback address, which allows the IP stack functionality to be tested. Answers c and d are both addresses in the Class B range (128–191). Class A addresses run from 1 through 126. For more information, see Chapter 6.
61:A user calls you from a hotel room. He has tried numerous times to dial in to the corporate RAS server, but the modem in his system is reporting a “no dial tone” error. When he plugs the hotel telephone back in to the phone socket, he gets a dial tone and is able to dial out successfully. What is the most likely cause of the problem?
  1. The phone line in the room is analog.

  2. The phone line in the room is faulty.

  3. The modem is faulty.

  4. The phone line in the room is digital.

A61: d. Most modern phone systems are digital, and therefore, regular analog modems that require analog lines will not work. Answer a is incorrect because, if the phone line in the room were analog, the modem would probably work. Answer b is incorrect because, the phone line in the room is not faulty because the user is able to use it to call you and report the problem. Answer c is incorrect because if the modem is able to get as far as reporting a “no dial tone” error, it is most likely working correctly. For more information, see Chapter 8, “Remote Access and Security Protocols.”
62:Which of the following is not a valid file permission on a Windows 2000 system?
  1. Read

  2. Attribute

  3. Execute

  4. Write

A62: b. The attribute file permission is not a valid NTFS file permission. Answers a, c, and d are all incorrect because they are all valid file permissions on a Windows 2000 system. For more information, see Chapter 12.
63:What utility would you use to view the TCP connections that have been established between two systems?
  1. netstat

  2. nbtstat

  3. tracert

  4. ipconfig

A63: a. The netstat utility allows you to view the TCP/IP connections between two systems. The nbtstat utility (Answer b) is used to see the status of NetBIOS over TCP/IP connections. The tracert utility (Answer c) is used to track the path that a packet of data takes between two hosts. The ipconfig utility (Answer d) is used to view the IP addressing configuration information on a system. For more information, see Chapter 14.
64:Which of the following authentication systems uses tickets as part of the authentication process?
  1. HTTPS

  2. POP3

  3. Kerberos

  4. SSL

A64: c. The Kerberos authentication system uses tickets as part of the authentication process. HTTPS (Answer a) is an implementation of SSL. It does not use tickets. POP3 (Answer b) is an email retrieval protocol. SSL (Answer c) does not use tickets. For more information, see Chapter 8, “Remote Access and Security Protocols.”
65:On an AppleTalk network, what is the function of AARP?
  1. It is a distance-vector routing protocol.

  2. It allows the resolution of AppleTalk addresses to MAC addresses.

  3. It allows the resolution of MAC addresses to AppleTalk addresses.

  4. It is a link-state routing protocol.

A65: b. AARP is used to map the AppleTalk addresses to both Ethernet and Token Ring physical addresses. The distance-vector routing protocol used on AppleTalk networks is RMTP which makes Answer a incorrect. Answer c is incorrect because AARP resolves AppleTalk addresses to MAC addresses—not the other way around. AARP is not a link-state routing protocol. For more information, see Chapter 5.
66:What term is used to describe the process of using parts of the node address range of an IP address as network IDs?
  1. Subnetting

  2. Supernetting

  3. Subnet masking

  4. Super routing

A66: a. The term subnetting is used to refer to the process of using parts of the node address range for network addressing purposes. Supernetting (Answer b) refers to the process of borrowing parts of the network address portion of an assigned address to be used for node addressing. Subnet masking (Answer c) is the term used to describe the process of applying a subnet mask to an address. Answer d is not a valid term. For more information, see Chapter 6.
67:You are configuring a router. According to the manual, you will need a transceiver to connect to the LAN ports of the router. What kind of physical interface does the router have?
  1. AUI

  2. MSAU

  3. RJ-11

  4. BNC

A67: a. An AUI port is typically used to connect an external transceiver to a device such as a router. An MSAU (Answer b) is a type of network device used on Token Ring networks. RJ-11 (Answer c) is a connector type associated with telephone cable. BNC (Answer d) is a type of network connector used on coaxial networks. For more information, see Chapter 2.
68:In a hardware loopback plug, which wire numbers are connected? (Choose the two best answers.)
  1. 3 and 5

  2. 1 and 3

  3. 1 and 2

  4. 3 and 4

  5. 2 and 6

A68: b, e. A hardware loopback plug connects the 2 and 6 wires and 1 and 3 wires to simulate a live network connection. Answers a, c, and d are all incorrect; these answers are not correct for the cable in a hardware loopback adapter. For more information, see Chapter 14.
69:Which of the following network types is easiest to add new nodes to?
  1. Bus

  2. Ring

  3. Star

  4. Mesh

A69: c. Each node on a star network uses its own cable, which makes it easy to add users without disrupting current users. Adding a node to a bus network can sometimes involve breaking the segment, which makes it inaccessible to all other nodes on the network. This makes Answer a incorrect. Answer b is incorrect because a true ring network model would require that the ring be broken to add a new device. Answer d is incorrect because a mesh topology requires that every device be connected to every other device on the network. It is, therefore, quite difficult to expand a mesh network. For more information, see Chapter 1.
70:What kind of connector would you use to make a patch cable for a 10BaseT network?
  1. RJ-45

  2. RJ-11

  3. RJ-13

  4. BNC

A70: a. 10BaseT networks use twisted-pair cable and RJ-45 connectors. RJ-11 (Answer b) connectors are associated with telephone cable. RJ-T (Answer c) is not a valid type of connector. A BNC connector (Answer d) is associated with coaxial cable. The 10BaseT standard uses twisted-pair cable. For more information, see Chapter 2.
71:Which TCP/IP port number is used by DNS?
  1. 21

  2. 25

  3. 53

  4. 110

A71: c. DNS uses TCP port 53. Port 21 (Answer a) is used by FTP. Port 25 (Answer b) is used by SMTP. Port 110 (Answer d) is used by POP3. For more information, see Chapter 6.
72:What is the purpose of implementing fault tolerance?
  1. It reduces the amount of time the administrator spends performing backups.

  2. It promotes data availability by eliminating a single point of failure.

  3. It allows systems to be brought back online more quickly.

  4. It protects data from accidental deletion.

A72: b. Fault tolerance promotes data availability by eliminating a single point of failure. Answer a is incorrect because, although fault tolerance may reduce the reliance on backups, they should still be performed. Answer c is incorrect because in the strict definition, being fault tolerant does not help a system get back online more quickly. Answer d is incorrect because being a fault tolerant system does not protect data from accidental deletion. For more information, see Chapter 10.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.12.71.237