This exam consists of 72 questions that reflect the material covered in this book. The questions are representative of the types of questions you should expect to see on the Network+ exam; however, they are not intended to match exactly what is on the exam.
Some of the questions require that you deduce the best possible answer. Often, you are asked to identify the best course of action to take in a given situation. You must read the questions carefully and thoroughly before you attempt to answer them. It is strongly recommended that you treat this exam as if it were the actual exam. When you take it, time yourself, read carefully, and answer all the questions to the best of your ability.
The answers to all the questions appear in Chapter 13, "Answers to Practice Exam 1." Check your letter answers against those in Chapter 13, and then read the explanations provided. You might also want to return to the chapters in the book to review the material associated with any incorrect answers.
1: | Which of the following devices operates at the Network layer of the OSI model? A. WAP B. Switch C. Hub D. Router
|
2: | A client on your network has had no problem accessing the wireless network, but recently the client moved to a new office. Since the move, she has only intermittent network access. Which of the following is most likely the cause of the problem? A. SSID on the client is misconfigured. B. The client system has moved too far from the AP. C. WEP settings are incorrect. D. The AP is using an omni-directional antenna.
|
3: | You are a network administrator managing a midsized network that uses a NetWare print server, a Windows application server, and a Linux firewall server. One of your servers loses network connectivity; you type ifconfig at the command line to determine whether the server has a valid IP address. Which server has lost connectivity? |
4: | You are managing a network that uses both a UNIX server and a Windows 2000 server. Which of the following protocols can you use to transfer files between the two servers? A. Telnet B. PPP C. FTP D. PPTP
|
5: | You have been called by a user who complains that access to a web page is very slow. What utility can you use to find the bottleneck? A. ping B. Telnet C. tracert D. nbtstat
|
6: | During a busy administrative week, you install a new virus suite in your network of 55 computers, a new RAID array in one of the servers, and a new office suite on 25 of the computer systems. After all the updates, you are experiencing system errors throughout the entire network. Which of the following would you do to help isolate the problem? A. Disable the RAID array B. Uninstall the office suite C. Check the virus suite vendor's website for system patches or service packs D. Reinstall the virus software
|
7: | What utility would you use to check the IP configuration on a Windows XP system? A. netstat B. winipcfg C. ping D. ipconfig
|
8: | Which of the following services or protocols use SSH technology to provide additional security to communications? (Choose two). A. SCP B. SFTP C. SNMP D. SMTP
|
9: | Which of the following backup methods clear the archive bit? (Choose the two best answers.) A. Differential B. Sequential C. Full D. Incremental
|
10: | You are troubleshooting a server connectivity problem on your networka Windows XP Professional system is having trouble connecting to a Windows 2000 Server. Which of the following commands would you use to display per-protocol statistics on the workstation system? A. arp -a B. arp -A C. nbtstat -s D. nbtstat -S E. netstat -s
|
11: | You are working as a network administrator on a UNIX system. The system uses dynamic name resolution. What is used to dynamically resolve a hostname on a UNIX server? A. IPX B. ARP C. DNS D. LMHOSTS
|
12: | During the night, one of your servers powers down. Upon reboot, print services do not load. Which of the following would be the first step in the troubleshooting process? |
13: | Which of the following standards uses UTP cable? A. 100BaseTX B. 10BaseFL C. 100BaseUX D. 10Base2
|
14: | Which of the following utilities can be used to view the current protocol connections on a Windows system? A. ping B. netstat C. Telnet D. tracert
|
15: | Which of the following statements about the 10Mbps 802.3 network standards is incorrect? A. There are 10Mbps networking standards for both UTP and fiber-optic cable. B. The 802.3 10Mbps network standards use a logical bus topology. C. Irrespective of the type of cable, the maximum length of a 10Mbps network segment is 185 meters. D. 10Mbps networking standards use a CSMA/CD media access method.
|
16: | Which of the following are connectionless protocols? (Choose the two best answers.) |
17: | Which of the following networking standards specifies a maximum segment length of 100 meters? A. 10Base2 B. 10BaseFL C. 10BaseYX D. 10BaseT
|
18: | After several passwords have been compromised in your organization, you have been asked to implement a network-wide password policy. Which of the following represents the most practical and secure password policy? A. Daily password changes B. Weekly password changes C. Monthly password changes D. Password changes only after an account has been compromised
|
19: | You are experiencing a problem with a workstation and want to ping the local loopback. Which of the following are valid ways to check your local TCP/IP configuration? (Choose the two best answers.) A. ping host B. ping localhost C. ping 127.0.0.1 D. ping 127.0.0.0
|
20: | Which of the following network devices operates at the physical layer of the OSI model? A. Router B. Hub C. Bridge D. NIC
|
21: | You have been asked to implement a RAID solution on one of your company's servers. You have two hard disks and two hard disk controllers. Which of the following RAID levels could you implement? (Choose the three best answers.) A. RAID 0 B. RAID 1 C. Disk duplexing D. RAID 10 E. RAID 5
|
22: | Which of the following represents a Class B IP address? A. 191.23.21.54 B. 125.123.123.2 C. 24.67.118.67 D. 255.255.255.0
|
23: | What utility would produce the following output? Proto Local Address Foreign Address State TCP laptop:1028 LAPTOP:0 LISTENING TCP laptop:1031 LAPTOP:0 LISTENING TCP laptop:1093 LAPTOP:0 LISTENING TCP laptop:50000 LAPTOP:0 LISTENING TCP laptop:5000 LAPTOP:0 LISTENING TCP laptop:1031 n218.audiogalaxy.com:ftp ESTABLISHED TCP laptop:1319 h24-67-184-65.ok.shawcable.net:nbsess A. netstat B. nbtstat C. ping D. tracert -R
|
24: | You have been called in to troubleshoot a problem with a newly installed email application. Internal users are able to communicate with each other via email, but neither incoming nor outgoing Internet email is working. You suspect a problem with the port-blocking configuration of the firewall system that protects the Internet connection. Which of the following ports would you allow to cure the problems with the email? (Choose the two best answers.) A. 20 B. 25 C. 80 D. 110 E. 443
|
25: | What is the default subnet mask for a Class B network? A. 255.255.255.224 B. 255.255.255.0 C. 127.0.0.1 D. 255.255.0.0
|
26: | At which OSI layer does TCP operate? A. Network B. Transport C. Session D. Presentation
|
27: | What is the basic purpose of a firewall system? A. It provides a single point of access to the Internet. B. It caches commonly used web pages, thereby reducing the bandwidth demands on an Internet connection. C. It allows hostnames to be resolved to IP addresses. D. It protects one network from another by acting as an intermediary system.
|
28: | Email and FTP work at which layer of the OSI model? A. Application B. Session C. Presentation D. User
|
29: | You are the administrator for a small network with a single server. A user calls to report that he is experiencing problems logging on to the network. He is sure that the tree name and context are correct, but is not sure that he has the correct password. Which of the following operating systems could the server on your network be running? (Choose all that apply.) A. Novell Netware 5 B. Novell Netware 3.11 C. Novell Netware 6 D. Novell Netware 4.1
|
30: | While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server. Although it appears that the user's attempts were unsuccessful, you are very concerned about the possibility that your systems might be compromised. Which of the following solutions are you most likely to implement? A. A more secure password policy B. A firewall system at the connection point to the Internet C. File-level encryption D. Kerberos authentication
|
31: | Which of the following pieces of information is not likely to be supplied via DHCP? A. IP address B. NetBIOS computer name C. Subnet mask D. Default gateway
|
32: | While troubleshooting a network connectivity problem, you notice that the network card in your system is operating at 10Mbps in half-duplex mode. At what speed is the network link operating? A. 2.5Mbps B. 5Mbps C. 10Mbps D. 11Mbps
|
33: | Which of the following is a valid IPv6 address? A. 42DE:7E55:63F2:21AA:CBD4:D773 B. 42CD:7E55:63F2:21GA:CBD4:D773:CC21:554F C. 42DE:7E55:63F2:21AA D. 42DE:7E55:63F2:21AA:CBD4:D773:CC21:554F
|
34: | While troubleshooting a network connectivity problem on a Windows Server 2003 system, you need to view a list of the IP addresses that have been resolved to MAC addresses. Which of the following commands would you use to do this? A. arp -a B. nbtstat -a C. arp -d D. arp -s
|
35: | Which of the following statements best describes RAID 5? A. A RAID 5 array consists of at least two drives. Parity information is written across both drives to provide fault tolerance. B. A RAID 5 array consists of at least three drives and distributes parity information across all the drives in the array. C. A RAID 5 array consists of at least three drives and stores the parity information on a single drive. D. A RAID 5 array consists of at least four drives. The first and last drives in the array are used to store parity information.
|
36: | Which of the following IEEE specifications does CSMA/CD relate to? A. 802.11b B. 802.2 C. 802.5 D. 802.3
|
37: | While you are troubleshooting a sporadic network connectivity problem on a Windows XP Professional system, a fellow technician suggests that you run the ping -t command. What is the purpose of this command? A. It shows the route taken by a packet to reach the destination host. B. It shows the time, in seconds, that the packet takes to reach the destination. C. It allows the number of ping messages to be specific. D. It pings the remote host continually until it is stopped.
|
38: | Which of the following IEEE wireless standards uses the 5GHz RF range? A. 802.11g B. Infrared C. 802.11a D. 802.11b
|
39: | What type of physical topology is shown in the following diagram? A. Star B. Ring C. Bus D. Mesh
|
40: | A remote user calls you to report a problem she is having connecting to the corporate network over her DSL connection. The user is able to connect to the Internet and browse web pages, but she can't connect to the corporate remote access gateway. Which of the following troubleshooting steps would you perform first? A. Check the corporate remote access gateway to see if it is running and operating correctly B. Have the user reboot her system C. Have the user reconfigure the IP address on her system to one of the address ranges used on the internal corporate network, and then try again D. Have the user power cycle the DSL modem and try again
|
41: | You have installed a Web-based database system on your PC so that you can enter troubleshooting information and retrieve it from any location on the network. The IP address of your system is 192.168.1.164. You are not overly concerned about security, but as a basic measure, you allocate the Web server application a port number of 9191 rather than the default port of 80. Assuming that you are working from another system on the network, what would you type into the address bar of a Web browser to access the database? A. http://192.168.1.164.9191 B. http://192.168.1.164/9191 C. http://192.168.1.164//9191 D. http://192.168.1.164:9191
|
42: | Which of the following IEEE standards has the highest maximum transmissions speeds? A. 802.3ae B. 802.3xr C. 802.3z D. 802.3u
|
43: | Your manager has asked you to implement security on your peer-to-peer network. Which of the following security models offers the highest level of security for this type of network? A. Share level B. User level C. Password level D. Layered
|
44: | You are working on a Linux system and are having problems pinging a remote system by its hostname. DNS resolution is not configured for the system. What file might you look in to begin troubleshooting the resolution problem? A. RESOLV B. STATICDNS C. PASSWD D. HOSTS
|
45: | You are tasked with specifying a way to connect two buildings across a parking lot. The distance between the two buildings is 78 meters. An underground wiring duct exists between the two buildings, although there are concerns about using it because it also houses high-voltage electrical cables. The budget for the project is very tight, but your manager still wants you to specify the most suitable solution. Which of the following cable types would you recommend? A. Fiber-optic B. UTP C. Thin coax D. STP
|
46: | While installing a new Windows XP Professional system, you are offered a choice of file system with which to format the disk. If you want to use both file and share level permissions for data security, which of the file systems should you choose? A. FAT B. FAT32 C. NTFS D. EXT2
|
47: | A user calls to inform you that she can't access the Internet from her system. When you visit the user, you run the ipconfig /all utility and see the following information. What is the most likely reason the user is having problems accessing the Internet? C:\>ipconfig /all Windows 2000 IP Configuration Host Name . . . . . . . . . . . . : LAPTOP Primary DNS Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Broadcast IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel 8255x-based PCI Ethernet Physical Address. . . . . . . . . : 00-D0-59-09-07-51 DHCP Enabled. . . . . . . . . . . : No IP Address. . . . . . . . . . . . : 192.168.2.1 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DNS Servers . . . . . . . . . . . : 192.168.2.10 192.168.2.20 A. The system is on a different subnet from the DNS servers. B. DHCP is not enabled. C. The subnet mask is incorrect. D. The default gateway setting is not configured.
|
48: | Your ISP account manager suggests that it might be appropriate for you to install a DNS server internally. Which of the following functions does the DNS server provide? A. It performs network address translation services. B. It streamlines the resolution of NetBIOS names to IP addresses. C. It allows some hostname-to-IP address resolutions to occur internally. D. It allows users to retrieve Internet web pages more quickly.
|
49: | Which of the following is not one of the private address ranges? A. 192.168.x.x B. 10.x.x.x C. 172.16.x.x D. 224.181.x.x
|
50: | You are the administrator for a network with two Windows Server 2003 systems, one Linux server, and 245 Windows XP Professional systems. Under what circumstances are you most likely to install Samba on the Linux server? A. If one or two users with Windows XP Professional systems want to copy files to and from the Linux server B. If a large number of users with Windows XP Professional systems want to use the Linux server as a file or print server C. If you want to implement a network management system that will allow the Linux server to receive trap messages from the Windows servers D. If you want to automate the allocation of IP addresses to all of the Windows XP Professional systems on the network
|
51: | If you contacted IANA, what would you most likely be trying to do? A. Get a new telephone number B. Get an IP address to connect a system to a public network C. Get an Internet domain name reassigned D. Get an IP address to connect a system to a private network
|
52: | Which of the following technologies can be implemented on a switch to create multiple separate logical networks? A. Proxy B. Subnet masking C. NAS D. VLAN
|
53: | Which of the following protocols are responsible for network addressing? (Choose the two best answers.) |
54: | You are upgrading the antenna on your wireless network. You need to purchase an antenna that provides a 360-degree dispersed wave pattern. Which of the following antenna types would you select? A. Omni-dispersed antenna B. Directional-dispersed antenna C. Directional antenna D. Omni-directional antenna
|
55: | What protocol is used by systems within a multicast group to communicate registration information with each other? A. ICMP B. IGMP C. NNTP D. LDAP
|
56: | Which of the following connectors would you use when working with fiber-optic cable? (Choose the two best answers.) A. RJ-11 B. SC C. RJ-45 D. ST E. BNC
|
57: | You are instructed by your manager to procure a cable with a Type A connector on one end, and a Type B connector on the other. What kind of interface are you most likely to be dealing with? A. FireWire B. USB C. RJ-11 D. Fiber Optic
|
58: | You are the network administrator for a Token Ring network. A NIC in a system fails, and you replace it with a new one. However, the system is still unable to connect to the network. What is the most likely cause of the problem? A. The NIC is set to the wrong ring speed. B. The NIC is a 100Mbps card, and the ring is configured for only 10Mbps. C. The NIC is set to full-duplex, and the ring is running at only half-duplex. D. The NIC is faulty.
|
59: | You have enabled HTTPS because of concerns about the security of your Web server application, which runs on a Web server system in the DMZ of your corporate network. However, remote users are now unable to connect to the application. Which of the following is the most likely reason for the problem? A. Port 80 is being blocked on the corporate firewall. B. Port 443 is being blocked on the corporate firewall. C. Remote users need to enable HTTPS support in their Web browsers. D. Port 110 is being blocked on the corporate firewall.
|
60: | Which of the following is a valid Class A IP address? A. 124.254.254.254 B. 127.0.0.1 C. 128.16.200.12 D. 131.17.25.200
|
61: | Which of the following wireless technologies provides limited transmission distance and is used primarily for personal area networking and cable replacement? (Select two.) A. IrDA B. 802.11a C. Bluetooth D. Ethernet wireless
|
62: | You are the administrator for a network with two Windows 2000 server systems and 40 Windows XP Professional systems. One morning, three users call to report that they are having problems accessing either of the Windows servers. Upon investigation, you determine that the DHCP server application running on one of the servers has crashed and that the three systems are using addresses assigned via APIPA. All other systems, which were started before the DHCP server application crashed, are functioning correctly. Which of the following statements about the situation is correct? (Choose two.) A. Systems with an APIPA assigned address will be able to communicate with each other. B. Systems with an APIPA assigned address will be able to talk to other systems that have an IP address from the DHCP server. C. Systems with an APIPA assigned address will not be able to access the Internet. D. Each system with an APIPA assigned address will not be able to communicate with any other systems on the network.
|
63: | Which of the following protocols are parts of the TCP/IP protocol suite? (Choose the three best answers.) A. AFP B. FTP C. DHCP D. HTTP E. NCP
|
64: | You are attempting to configure a client's email program. The user can receive mail but is unable to send any. In the mail server configuration screen of the mail application, you notice that the Type of Outgoing Mail Server field is blank. This explains why the client is unable to send mail. Which of the following protocols are you most likely to enter as a value in the Type of Outgoing Mail Server field? A. NMP B. POP3 C. SMTP D. IMAP
|
65: | Which of the following is a configurable client identification setting used to differentiate one WLAN from another? A. SID B. WEP C. SSID D. Wireless channel
|
66: | Which of the following is a valid MAC address? |
67: | Which of the following protocols allows you to execute queries against a directory services database such as Microsoft Active Directory or Novell Directory Services? A. NNTP B. ICMP C. LDAP D. SFTP
|
68: | Which of the following is not a commonly implemented feature of a firewall system? A. NAT B. Packet filtering C. Proxy D. NAS
|
69: | Which command produced the following output? ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17273 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 2, ADDITIONAL: 0 ;; QUESTION SECTION: ;examcram.com. IN ANY ;; ANSWER SECTION: examcram.com. 86191 IN A 63.240.93.157 examcram.com. 86191 IN NS oldtxdns2.pearsontc.com. examcram.com. 86191 IN NS usrxdns1.pearsontc.com. ;; AUTHORITY SECTION: examcram.com. 86191 IN NS oldtxdns2.pearsontc.com. examcram.com. 86191 IN NS usrxdns1.pearsontc.com. ;; Query time: 24 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Tue Sep 18 09:07:29 2004 ;; MSG SIZE rcvd: 131 A. nslookup B. nbtstat C. dig D. netstat
|
70: | When a system running TCP/IP receives a data packet, which of the following does it use to determine which service to forward the packet to? |
71: | What command would generate the following output? 7 60 ms 30 ms 40 ms home-gw.st6wa.ip.att.net [192.205.32.249] 8 30 ms 40 ms 30 ms gbr3-p40.st6wa.ip.att.net [12.123.44.130] 9 50 ms 50 ms 60 ms gbr4-p10.sffca.ip.att.net [12.122.2.61] 10 60 ms 60 ms 60 ms gbr3-p10.la2ca.ip.att.net [12.122.2.169] 11 90 ms 60 ms 70 ms gbr6-p60.la2ca.ip.att.net [12.122.5.97] A. ipconfig B. netstat C. ping D. TRacert
|
72: | Which layer of the OSI model is responsible for placing the signal on the network media? A. Physical B. Data-link C. MAC D. LLC
|