Assessment Test for Network Exam

Assessment Test for Network+ Exam

1. 

Which TCP/IP utility can tell you which server is the mail server for the domain foo.com?

  1. FTP

  2. nslookup

  3. tracert

  4. Telnet

b.the only utility listed that can tell which server is acting as the mail exchanger for a domain is the nslookup utility. this is done by setting the query type to mx (mail exchanger). nslookup will then return the name and ip address of the mail exchanger for the domain foo.com . please see chapter 4 for more information.

2. 

A user we’ll call Bob is experiencing what he calls “weird problems.” The computer is constantly crashing and performs very slowly. In addition, people are sending Bob e-mails asking him to stop sending them e-mails when, in fact, he hasn’t sent them any in months. What is the most likely cause of this problem?

  1. Corrupt operating system

  2. Corrupt application software

  3. Virus infection

  4. Network bottlenecks

c.many viruses can wreak havoc with a computer system. many viruses exhibit the behavior described, especially sending e-mails automatically to many people in the infectee s address book. please see chapter 9 for more information.

3. 

RSA is a type of which of the following?

  1. Data encryption

  2. Network protocol

  3. Purchase agreement

  4. Firewall

a.rsa is a type of data encryption used to encrypt data before transmission. please see chapter 8 for more information.

4. 

What is the proper name for the device that connects a PC to an ISDN network?

  1. Hub

  2. Modem

  3. Switch

  4. Terminal Adapter

d.because isdn is an all-digital network, they don t use modems, but instead use terminal adapters, because they adapt the digital signal from one form to another. please see chapter 1 for more information.

5. 

Which utility does not come with Windows 98?

  1. winipcfg

  2. tracert

  3. Ping

  4. ipconfig

d.the ipconfig utility does not come with windows 98, but is instead the ip configuration utility for windows nt. all the other utilities come as part of windows 98. please see chapter 4 for more information.

6. 

VLANs are a feature primarily of which type of network device?

  1. Hubs

  2. Switches

  3. NICs

  4. Cable

b.virtual lans are primarily a feature of network switches. because most true hubs cannot perform segmentation based on mac addresses, they cannot do vlans. although nics are required in order to use a vlan, vlans are not a primary feature of them. and individual cables do not have vlan features. please see chapter 3 for more information.

7. 

Firewalls provide what primary benefit?

  1. Increased network performance

  2. Elimination of user training

  3. Protection from threats on the Internet

  4. Complete network security

c.firewalls sit between a local network and a public network (such as the internet) and protect the local network from security threats. it is only a part of a network s security implementation, but a very important part. please see chapter 8 for more information.

8. 

Which part of a network interface card (NIC) identifies whether or not there is basic connectivity from the station to a hub or a switch?

  1. Link light

  2. Collision light

  3. Port

  4. Jumper

a.the link light, when lit, indicates that there is a basic communication between a nic and a hub or switch (it would also light if two nics in two different pcs were connected with a crossover cable). if the cable is severed or wired incorrectly, the link light may not light. please see chapter 10 for more information.

9. 

What is the name of the distance vector routing protocol for AppleTalk?

  1. RIP

  2. OSPF

  3. NLSP

  4. RTMP

d.appletalk uses the routing table maintenance protocol (rtmp), which is a distance vector routing protocol. rip is the distance vector protocol for both ip and ipx; ospf is the link state protocol for tcp/ip; and nlsp is the link state routing protocol for ipx/spx. please see chapter 2 for more information.

10. 

Which version is the most current Windows server operating system?

  1. Windows NT 3.51

  2. Windows NT 4.0

  3. Windows 2000

  4. Windows NT 6

c.windows 2000 is the most current version of a windows server operating system. please see chapter 5 for more information.

11. 

You are the network administrator for a small company. You come to work one morning and find that the server fails to boot. When it does boot, it has all kinds of configuration errors and data corruption. It was fine yesterday when you left work. You remember that there was a short power failure last night. What device would have prevented these problems?

  1. Router

  2. Switch

  3. NIC

  4. UPS

d.the problems are due to the power outage. an uninterruptible power supply (ups) maintains power to a device that is plugged into it during a power outage. since the outage was short, it is very likely that a ups could have maintained power to the server during the outage. if not, it could have at least performed an orderly shutdown of the server. please see chapter 9 for more information.

12. 

IP version 6 (IPv6) uses how many bits in its addressing scheme?

  1. 16

  2. 32

  3. 64

  4. 128

d.because one of the main motivations behind the creation of the ipv6 addressing scheme was the lack of available addresses in ipv4, the length of the address was increased from 32 bits in ipv4 to 128 bits in ipv6. please see chapter 3 for more information.

13. 

Which of the following network operating systems support(s) the most varied types of client operating systems? (Choose all that apply.)

  1. NetWare

  2. Unix

  3. Windows NT

  4. OS/2

a, c.although all of the noses listed can support different client oses, netware and windows nt support the widest variety of client oses. please see chapter 5 for more information.

14. 

Which network installation tool can be used to connect UTP cable to a 110 block?

  1. Cable tester

  2. Wire crimper

  3. Media installer

  4. Punchdown tool

d.a 110 block is also known as a punchdown block because of its method of installation. thus, the tool used to install one is a punchdown tool with a 110 blade. please see chapter 6 for more information.

15. 

Which remote access protocol is used to allow remote application execution?

  1. PPP

  2. PPTP

  3. ICA

  4. RAS

c.ica is used with terminal server servers to allow remote application execution. the other protocols are used to provide remote access to a host network. please see chapter 7 for more information.

16. 

Which network device is used to connect dissimilar network technologies at any level of the OSI model?

  1. Bridge

  2. Router

  3. Switch

  4. Gateway

d.gateways operate at all levels of the osi model and connect dissimilar network technologies. while some of the other devices listed may connect dissimilar network technologies, they all operate at only the lower four layers of the osi model. please see chapter 6 for more information.

17. 

At which level of the OSI model does routing occur?

  1. Application

  2. Network

  3. Data Link

  4. Physical

b.the responsibilities of the network layer include logical network addressing and routing. the application, data link, and physical layers do not provide any routing functionality. please see chapter 2 for more information.

18. 

Which of the following is an example of an IPv6 address?

  1. ::000F:ABCD:0003

  2. 123456.132455.119499.201333.111111.010111

  3. 134.129.51.99

  4. 275.13.202.100

a.the only address that is correct is ::000f:abcd:0003. option c is an ipv4 address and the other two are bogus addresses. please see chapter 3 for more information.

19. 

You are the administrator for a 10-station peer-to-peer network that is connected to the Internet. All of the workstations are running TCP/IP, and the server is running IPX/SPX. Unfortunately, your network is having a problem: None of the users can connect to the server. The server can see itself on the network. What do you suspect is the problem?

  1. A hacker has changed addresses on the server.

  2. The clients’ NICs are configured incorrectly.

  3. The server’s protocol is configured incorrectly.

  4. The Internet connection is configured incorrectly.

c.the server is configured to run only ipx/spx, but the clients are using only tcp/ip. changing the protocol to tcp/ip on the server would solve the problem. please see chapter 10 for more information.

20. 

The process of grouping computers for fault tolerance and load balancing is known as ___________________.

  1. Grouping

  2. Clustering

  3. Loading

  4. Parceling

b.clustering is the method by which multiple copies of a server run together. the load is balanced across all of them. if one should happen to fail, the others continue to run as if nothing happens. please see chapter 9 for more information.

21. 

What additional item is required to connect a PC to a DSL modem?

  1. NIC

  2. Modem

  3. Terminal Adapter

  4. Switch

a.because dsl operates at speeds higher than typical serial port speeds, a nic is required in order for the pc to communicate with the dsl modem. none of the other items are required. please see chapter 1 for more information.

22. 

Which port number is used for DNS?

  1. TCP port 10

  2. UDP port 23

  3. TCP port 29

  4. UDP port 53

d.udp ( not tcp) port 53 is used for dns. all others, while possibly valid port numbers, are not used for dns. please see chapter 3 for more information.

23. 

Which Windows operating system(s) has/have local filesystem security? (Choose all that apply.)

  1. Windows 9x

  2. Windows NT

  3. Windows 2000

  4. Windows 3.1

b, c.because windows nt and 2000 use the ntfs that has local security properties, they have those properties as well. please see chapter 5 for more information.

24. 

An ISDN B channel typically carries how much data?

  1. 4Kbps

  2. 16Kbps

  3. 32Kbps

  4. 64Kbps

d.an isdn b channel, or bearer channel, typically carries 64kbps. please see chapter 7 for more information.

25. 

Which network security implementation will decrease the apparent speed of Internet access?

  1. Password requirement

  2. Firewall

  3. Proxy server

  4. Blocking the ICMP port

b.because a firewall generally examines every packet and acts on the information in that packet, internet access will seem to be slower. the other options either have no effect or will increase the apparent speed. please see chapter 8 for more information.

26. 

Which network setting in Windows 9x configures a workstation for DHCP?

  1. “Obtain IP address automatically”

  2. “DHCP enable”

  3. “Use DHCP for address”

  4. “Get IP address through DHCP”

a.although all of these answers are saying similar things, the only setting that exists in windows 9 x is obtain ip address automatically. please see chapter 6 for more information.

27. 

Of those listed, which Internet connection type has the most bandwidth?

  1. OC-3

  2. ISDN

  3. T1

  4. POTS

a.oc-3 has a potential bandwidth of 155mbps; t1 has a throughput of 1.544mbps; isdn is 1.544mbps; and pots has 53kbps. please see chapter 7 for more information.

28. 

Which protocol is primarily used to provide TCP/IP over dial-up Internet connections?

  1. PPP

  2. ICA

  3. RAS

  4. SONET

a.of the protocols listed, only the point-to-point protocol (ppp) provides tcp/ip internet connections over dial-up (modem) connections. please see chapter 7 for more information.

29. 

Windows 2000 Server has support for which of the following clients? Choose all that apply.

  1. Windows 9x

  2. Macintosh

  3. Linux

  4. All of the above

d.windows 2000 server supports many different types of clients, including windows, macintosh, and linux-based clients. please see chapter 5 for more information.

30. 

An HTTP proxy cache server will increase the apparent performance of what activity?

  1. Bank transactions

  2. Web browsing

  3. Network login

  4. Screen refreshes

b.an http proxy cache will cache (or store temporarily) copies of commonly used web page elements on a server on your lan, thus the common elements will be received directly from the proxy at lan speeds instead of internet speeds. please see chapter 8 for more information.

Answers

1. 

B.  The only utility listed that can tell which server is acting as the mail exchanger for a domain is the nslookup utility. This is done by setting the query type to MX (mail exchanger). Nslookup will then return the name and IP address of the mail exchanger for the domain foo.com. Please see Chapter 4 for more information.

2. 

C.  Many viruses can wreak havoc with a computer system. Many viruses exhibit the behavior described, especially sending e-mails automatically to many people in the infectee’s address book. Please see Chapter 9 for more information.

3. 

A.  RSA is a type of data encryption used to encrypt data before transmission. Please see Chapter 8 for more information.

4. 

D.  Because ISDN is an all-digital network, they don’t use modems, but instead use Terminal Adapters, because they adapt the digital signal from one form to another. Please see Chapter 1 for more information.

5. 

D.  The ipconfig utility does not come with Windows 98, but is instead the IP configuration utility for Windows NT. All the other utilities come as part of Windows 98. Please see Chapter 4 for more information.

6. 

B.  Virtual LANs are primarily a feature of network switches. Because most true hubs cannot perform segmentation based on MAC addresses, they cannot do VLANs. Although NICs are required in order to use a VLAN, VLANs are not a primary feature of them. And individual cables do not have VLAN features. Please see Chapter 3 for more information.

7. 

C.  Firewalls sit between a local network and a public network (such as the Internet) and protect the local network from security threats. It is only a part of a network’s security implementation, but a very important part. Please see Chapter 8 for more information.

8. 

A.  The link light, when lit, indicates that there is a basic communication between a NIC and a hub or switch (it would also light if two NICs in two different PCs were connected with a crossover cable). If the cable is severed or wired incorrectly, the link light may not light. Please see Chapter 10 for more information.

9. 

D.  AppleTalk uses the Routing Table Maintenance Protocol (RTMP), which is a distance vector routing protocol. RIP is the distance vector protocol for both IP and IPX; OSPF is the link state protocol for TCP/IP; and NLSP is the link state routing protocol for IPX/SPX. Please see Chapter 2 for more information.

10. 

C.  Windows 2000 is the most current version of a Windows server operating system. Please see Chapter 5 for more information.

11. 

D.  The problems are due to the power outage. An Uninterruptible Power Supply (UPS) maintains power to a device that is plugged into it during a power outage. Since the outage was short, it is very likely that a UPS could have maintained power to the server during the outage. If not, it could have at least performed an orderly shutdown of the server. Please see Chapter 9 for more information.

12. 

D.  Because one of the main motivations behind the creation of the IPv6 addressing scheme was the lack of available addresses in IPv4, the length of the address was increased from 32 bits in IPv4 to 128 bits in IPv6. Please see Chapter 3 for more information.

13. 

A, C.  Although all of the NOSes listed can support different client OSes, NetWare and Windows NT support the widest variety of client OSes. Please see Chapter 5 for more information.

14. 

D.  A 110 block is also known as a punchdown block because of its method of installation. Thus, the tool used to install one is a punchdown tool with a 110 blade. Please see Chapter 6 for more information.

15. 

C.  ICA is used with Terminal Server servers to allow remote application execution. The other protocols are used to provide remote access to a host network. Please see Chapter 7 for more information.

16. 

D.  Gateways operate at all levels of the OSI model and connect dissimilar network technologies. While some of the other devices listed may connect dissimilar network technologies, they all operate at only the lower four layers of the OSI model. Please see Chapter 6 for more information.

17. 

B.  The responsibilities of the Network layer include logical network addressing and routing. The Application, Data Link, and Physical layers do not provide any routing functionality. Please see Chapter 2 for more information.

18. 

A.  The only address that is correct is ::000F:ABCD:0003. Option C is an IPv4 address and the other two are bogus addresses. Please see Chapter 3 for more information.

19. 

C.  The server is configured to run only IPX/SPX, but the clients are using only TCP/IP. Changing the protocol to TCP/IP on the server would solve the problem. Please see Chapter 10 for more information.

20. 

B.  Clustering is the method by which multiple copies of a server run together. The load is balanced across all of them. If one should happen to fail, the others continue to run as if nothing happens. Please see Chapter 9 for more information.

21. 

A.  Because DSL operates at speeds higher than typical serial port speeds, a NIC is required in order for the PC to communicate with the DSL modem. None of the other items are required. Please see Chapter 1 for more information.

22. 

D.  UDP (not TCP) port 53 is used for DNS. All others, while possibly valid port numbers, are not used for DNS. Please see Chapter 3 for more information.

23. 

B, C.  Because Windows NT and 2000 use the NTFS that has local security properties, they have those properties as well. Please see Chapter 5 for more information.

24. 

D.  An ISDN B channel, or Bearer channel, typically carries 64Kbps. Please see Chapter 7 for more information.

25. 

B.  Because a firewall generally examines every packet and acts on the information in that packet, Internet access will seem to be slower. The other options either have no effect or will increase the apparent speed. Please see Chapter 8 for more information.

26. 

A.  Although all of these answers are saying similar things, the only setting that exists in Windows 9x is “Obtain IP address automatically.” Please see Chapter 6 for more information.

27. 

A.  OC-3 has a potential bandwidth of 155Mbps; T1 has a throughput of 1.544Mbps; ISDN is 1.544Mbps; and POTS has 53Kbps. Please see Chapter 7 for more information.

28. 

A.  Of the protocols listed, only the Point-to-Point Protocol (PPP) provides TCP/IP Internet connections over dial-up (modem) connections. Please see Chapter 7 for more information.

29. 

D.  Windows 2000 Server supports many different types of clients, including Windows, Macintosh, and Linux-based clients. Please see Chapter 5 for more information.

30. 

B.  An HTTP proxy cache will cache (or store temporarily) copies of commonly used web page elements on a server on your LAN, thus the common elements will be received directly from the proxy at LAN speeds instead of Internet speeds. Please see Chapter 8 for more information.




Network+ Study Guide
Network+ Study Guide
ISBN: 470427477
EAN: N/A
Year: 2002
Pages: 151

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net