Answers and Explanations to Practice Exam I


A1:

D. Of the devices listed, only a router operates at the Network layer of the OSI model. A WAP and a switch are both considered data-link layer devices. A hub is considered a physical layer device.

A2:

B. A wireless AP has a limited range of which it can send and receive data signals. Once a client system moves out of this range, client network access will either fail completely or be inconsistent. An incorrect SSID or incompatible WEP settings would completely prevent communication between the wireless AP and client.

A3:

A. The ifconfig command is used on a Linux system to determine the IP configuration of the system. With NetWare, you use the config command to obtain information about network addresses. On a Windows 2000 system, the ipconfig command is used to view the networking configuration including the IP address. ifconfig can be used on UNIX/Linux platforms to view the networking configuration.

A4:

C. FTP can be used to transfer files between Windows and UNIX systems. FTP is part of the TCP/IP protocol suite and is platform independent. The telnet utility is used to open a virtual terminal session on a remote host (answer A). PPP is used to establish communications over a serial link; thus, answer B is incorrect. PPTP is used to establish a secure link over a public network such as the Internet (answer D).

A5:

C. tracert is a Windows command that can be used to display the full path between two systems, including the number of hops between the systems. The ping utility (answer A) can be used to test connectivity between two devices, but it only reports the time taken for the round-trip; it does not give information about the time it takes to complete each hop in the route. The telnet utility (answer B) is used to open a virtual terminal session on a remote host. The nbtstat command (answer D) is used to view statistical information about the NetBIOS status of a system.

A6:

C. Because the system errors are over the entire network, it is likely that the cause of the problem in this scenario lies with the virus suite because it is installed on all computers. To troubleshoot such a problem, it would be a good idea to check for patches or updates on the vendor's website. A problem with a RAID array (answer A) would affect only the server in which it is installed, not the entire network. Since the office suite (answer B) was installed on only some of the systems, it can be eliminated as a problem because all the systems are affected. The virus software (answer D) appears to be the cause of the problem, but reinstalling it is unlikely to help.

A7:

D. The ipconfig utility can be used to view the TCP/IP configuration on a Windows 2000, Windows XP, or Windows Server 2003 system. None of these operating systems support the graphical winipcfg utility (answer B). The netstat utility (answer A) is used to view protocol statistics information. The ping utility (answer C) is used to test the connectivity between two systems on a TCP/IP network.

A8:

A and B. Secure Shell (SSH) technology is used by both the Secure Copy Protocol (SCP) and the Secure File Transfer Protocol (SFTP). The Simple Network Management Protocol (SNMP), and the Simple Mail Transfer Protocol (SMTP) do not use SSH technology for additional security.

A9:

C and D. Both the full and incremental backup methods clear the archive bit to indicate which data does and does not need to be backed up. In a differential backup (answer A), the archive bit is not cleared. Sequential (answer B) is not a type of backup.

A10:

E. The netstat -s command can be used to display per-protocol statistics. The arp command (answers A and B) is used to view a list of the IP address-to-MAC address resolutions performed by the system. The nbtstat utility (answers C and D) is used to view protocol statistics for the NetBIOS protocol.

A11:

C. DNS is used on UNIX-based systems to resolve hostnames. IPX (answer A) is a network-layer connectionless protocol. ARP (answer B) resolves IP addresses to MAC addresses. The LMHOSTS file (answer D) is used on Windows systems to resolve NetBIOS names to IP addresses.

A12:

A. In this scenario, your first step is to gather information by examining the server log files. When you have that information, you can proceed with the rest of the troubleshooting process. Rebooting the server (answer B) is unlikely to cure the problem. Before you reinstall the printer (answer C) or printer software (answer D), you should examine the log files to see if any problems are reported in the server log files.

A13:

A. 100BaseTX uses Category 5 cable. 10BaseFL uses fiber-optic cable. There is no standard called 100BaseUX 10Base2 is an Ethernet networking standard that uses thin coaxial cable.

A14:

B. The netstat -a command can be used to display the current connections and listening ports. The ping utility (answer A) is used to test connectivity between two devices on a TCP/IP network. Telnet (answer C) is an application-level protocol that allows a virtual terminal session on a remote host. The TRacert utility (answer D) allows a path to be traced between two hosts.

A15:

C. The various 10Mbps 802.3 networking standards have different maximum cable lengths. With 10Base-FL, a segment can be up to 2,000 meters. Using thin coaxial cabling, the 10Base2 standard specifies a maximum segment length of 185 meters. 10Mbps implementations of Ethernet on UTP are limited to 100 meters. All Ethernet standards use a Collision Sense Multiple Access/Collision detect media access method. The 10Mbps 802.3 standards use a logical bus topology, though they can use physical star or physical bus topology.

A16:

C and D. UDP and IPXareboth connectionless protocols. SPX and TCP (answers A and B) are connection-oriented protocols.

A17:

D. 10BASET has a maximum segment length of 100 meters. The maximum length of a 10BASE2 segment is 185 meters. The maximum length of a 10BASEFL segment (answer B) is 2,000 meters. Answer C is not a valid networking standard.

A18:

C. Changing passwords too frequently is not practical, and changing them too infrequently represents a security risk. Monthly password changing is adequate for most environments. Changing passwords too frequently (answers A and B) can cause problems because users might have problems remembering passwords, so they use passwords that are too similar to one another. Although passwords should be changed if they are compromised, they should also be changed periodically, making answer D incorrect.

A19:

B and C. To verify the local IP configurationyou can either ping the 'localhost' or use the IP address 127.0.0.1. The default hostname for a system is localhost, not host, which means that answer A is incorrect. Answer D is not correct as this is the network address for the Class A loopback address, not a valid node loopback address.

A20:

B. A network hub operates at the physical layer of the OSI model. A router (answer A) operates at the network layer of the OSI model. A bridge (answer C) operates at the data-link layer of the OSI model. An NIC (answer D) operates at the data-link layer of the OSI model.

A21:

A, B and C. With two hard disks and two controllers, you can implement RAID 0, RAID 1, and disk duplexing. RAID 5 (disk striping with parity; answer E) requires a minimum of three disks to be implemented. RAID 10 (answer D) is a combination of RAID 1 (disk mirroring) and RAID 0 (disk striping). RAID 10 requires a minimum of four disks.

A22:

A. The first octet of a Class B address must be in the range 128 to 191. Answers A and B represent Class A addresses. Class A addresses run from 1 to 126. Answer D is not a valid IP address.

A23:

A. The netstat utility can be used to display protocol statistics and TCP/IP network connections. The nbtstat utility (answer B) shows statistical information about the NetBIOS over TCP/IP connections. The ping utility (answer C) is used to test the connectivity between two devices on a TCP/IP network. The tracert utility (answer D) traces the path between two hosts on a TCP/IP network.

A24:

B and D. TCP/IP port 25 is used by SMTP. TCP/IP port 110 is used by POP3. Because SMTP is used to send mail and POP3 is used to retrieve mail, port 25 and port 110 are the two ports that would need to be allowed for incoming and outgoing Internet email. TCP/IP port 21 (answer A) is used by FTP. TCP/IP port 80 (answer C) is used by HTTP. TCP/IP port 443 (answer E) is used by HTTPS.

A25:

D. The default subnet mask for a Class B network is 255.255.0.0. Answer A is incorrect because it is not the default subnet mask for a Class B network. Answer B is not the default subnet mask for a Class B network. Answer C is the local loopback address.

A26:

B. TCP operates at the transport layer of the OSI model. Answers A, C, and D are all incorrect; TCP does not operate at the network layer.

A27:

D. The purpose of the firewall system is to protect one network from another. One of the most common places to use a firewall is to protect a private network from a public one such as the Internet. Answer A is incorrect because although a firewall can provide a single point of access, that is not its primary purpose. Answer B more accurately describes the function of a proxy server. Answer C describes the function of a DNS server.

A28:

A. Both email and FTP work at the application layer of the OSI model. Email and FTP are application-layer protocols, not session-layer protocols. User (answer D) is not a layer of the OSI model.

A29:

A, C and D. Since Netware 4, Novell has included a directory services system with NetWare that provides a centralized repository for network information including users, groups, printers and servers. Before NetWare 4, Novell used a system called Bindery, which worked on a single server, single database principle.

A30:

B. To prevent unauthorized access to a private network from the Internet, you can use a firewall server to restrict outside access. Implementing a more secure password policy (answer A) is a good idea, but it is not the best choice of those available. Implementing a file-level encryption system (answer C) is a good idea, but it is not the best choice of those available. Kerberos (answer D) is an authentication system, not a method to prevent unauthorized access to the system.

A31:

B. The NetBIOS computer name is not supplied to client systems by a DHCP server. The IP address (answer A) is one of the pieces of information provided by DHCP. The subnet mask (answer C) is one of the pieces of information provided by DHCP. The default gateway (answer D) is one of the pieces of information supplied by DHCP.

A32:

C. Because the NIC is functioning at half-duplex 10Mbps, the transfer rate is 10Mbps. None of the other answers are correct.

A33:

D. IPv6 uses a 128-bit address, which is expressed as eight octet pairs in hexadecimal format, separated by colons. Because it is hexadecimal, only numbers and the letters A through F can be used. An IPv6 address is composed of eight hexadecimal octets. Only numbers and the letters A through F can be used.

A34:

A. The arp -a command is used to display the IP addresses that have been resolved to MAC addresses. The nbtstat command (answer B) is used to view protocol statistics for NetBIOS connections. arp -d (answer C) is not a valid command. The arp -s command (answer D) allows you to add static entries to the ARP cache.

A35:

B. A RAID 5 array consists of at least three hard disks and stripes parity information across all disks in the array. RAID 5 (disk striping with parity; answer A) requires at least three drives. The parity information is stored in a stripe across all three drives in the array (answer B). RAID 5 requires only three drives, which makes answer D incorrect.

A36:

D. CSMA/CD relates to the IEEE specification 802.3. The 802.11b (answer A) standard describes wireless LAN networking. The 802.2 (answer B) standard defines the media access methods for various networking standards. The 802.5 (answer C) standard defines Token Ring networking.

A37:

D. The ping -t command is used to send continuous ping requests to a remote system. The ping request will continue until it is manually stopped. The traceroute utility (answer A) performs this task. The ping command (answer B) shows the amount of time a packet takes to complete the round-trip from the host to the destination. Answer C is incorrect because the ping command with the -n switch performs this task.

A38:

C. The IEEE 802.11a wireless standard specifies 5GHz as the RF transmissions range. IEEE wireless standards 802.11b/g both use the 2.4GHz RF range. Infrared wireless transmissions use the 2.4GHz RF.

A39:

A. The diagram in the question shows a star topology. Answers B, C, and D are all incorrect. The figure does not represent any of these network types.

A40:

A. In this scenario, you would first check the remote access gateway to see if it is running and operating correctly. Because the user can browse web pages, this is not a connectivity problem. Answer B is incorrect because although rebooting the system might help, the system appears to be working correctly, and rebooting it is unlikely to cure the problem. The IP address configuration appears to be working because the user is able to access web pages, so answer C is incorrect. The Internet connection appears to be working, so cycling the power on the DSL modem, as described in answer D, is unlikely to help.

A41:

D. To specify a TCP/IP port other than the default of 80, simply append the port number to the end of the address, using a colon (:) to separate the two. All of the other answers are incorrect.

A42:

A. The IEEE 802.3ae standard defines 10Gbps networking standards such as 10Gbase-LR and 10Gbase-SR. There is no IEEE 802.3xr standard. 802.3z defines gigabit Ethernet standards such as 1000Base-LX and 1000Base-SX. 802.3u defines fast Ethernet standards such as 100Base-TX and 100Base-FX.

A43:

B. User-level security is more secure than share-level security and requires a user to provide a login ID, usually a username and password combination to access network resources. Answer A is incorrect because share-level security is not as secure as user-level security. Answers C and D are not accepted terms for describing levels of security.

A44:

D. The HOSTS file is used to manually configure hostname resolution, and if there is a problem with hostname resolution, entries in this file must be checked. Answers A and B are incorrect because files are not used on a Linux system. Answer C is incorrect because the PASSWD file is used to store user account information.

A45:

A. Fiber-optic cable provides the most resistance to EMI and therefore is often used in environments in which there is a risk of interference. Although it is inexpensive, UTP (answer B) cable has very low resistance to EMI; therefore, it should not be run near high-voltage electric cables. Thin coax (answer C) has low resistance to EMI; therefore, it should not be run near high-voltage electric cables. STP (answer D) has a good level of resistance to EMI, but it is still not as resistant as fiber-optic. Not factoring in the cost, fiber-optic is the most suitable solution.

A46:

C. The New Technology File System (NTFS) provides both file and share-level security. FAT and FAT32 can be used with Windows to provide share-level security, but they do not provide file-level security. EXT2 is a file system associated with Linux. It cannot be used with Windows XP Professional.

A47:

D. The most likely cause of the problem is that the default gateway is not configured. Answer A is incorrect because from the output it appears that the DNS servers are on the same subnet as this system. Answer B does not apply because addressing is configured statically, so there is no DHCP service. This is not a problem, however. Answer C is incorrect because the subnet mask is the correct default subnet mask for a Class C network.

A48:

C. DNS allows hostname resolutions to occur internally. In most cases, companies use a DNS server provided by the ISP. In some cases, however, it might be appropriate to have a DNS server on the internal network. Answer A is incorrect as NAT is normally a function of firewall or proxy servers. Answer B describes the purpose of a WINS server. Answer D describes the function of a proxy server.

A49:

D. Private address ranges are designed for use on private networks. The ranges are 192.168.X.X, 10.X.X.X, and 172.16.X.X172.32.X.X. Answers A, B, and C are all valid private IP address ranges.

A50:

B. Samba is an application that can be run on a Linux server that enables Windows clients to use the server as a file and print server without any additional client software. If there were a large number of users who required this functionality, installing Samba would be a suitable solution. If only one or two users required access, you would be more likely to use FTP, or install a Network File System (NFS) client on the Windows XP Professional systems. Either of these options would allow the client systems to copy files to or from the Linux server. The most commonly used network management systems are those that rely on the Simple Network Management Protocol (SNMP). Installing Samba on the Linux server is unlikely to be part of a network management system installation. If you want to automate the allocation of IP addresses to client systems, you would install a DHCP server. You would not install Samba.

A51:

B. IANA is responsible for assigning IP addresses for systems on public networksspecifically, the Internet. Answer A is incorrect. IANA is responsible for assigning IP addresses for use on public networks (such as the Internet). Answer C is incorrect because domain names are administered by domain registry organizations. Answer D is incorrect because you don't need to apply for a network address for use on a private network.

A52:

D. A VLAN is implemented on a switch to create multiple separate networks. A proxy server (answer A) is used to control access to the Internet. Subnet masking (answer B) is not a valid method of creating separate networks. NAS (answer C) describes storage devices that are attached directly to the network media.

A53:

A and C. IP and IPX are responsible for network addressing. Answers B and D are incorrect because SPX and TCP are transport-layer protocols and are not responsible for network addressing.

A54:

D. In a typical configuration, a wireless antenna can be either omni directional or directional. An omni-directional antenna provides a 360-degree dispersed wave pattern. This provides an even signal in all directions. Directional antennas are designed to focus the signal in a particular direction. Omni dispersed and directional dispersed are not valid types of antennas.

A55:

B. The Internet Group Multicast Protocol (IGMP) is used by systems within the same multicast group to communicate registration information. The Internet Control Message Protocol (ICMP) works with IP to provide error checking and reporting functionality on a network. The Network News Transfer Protocol (NNTP) is used to access Internet newsgroups. The Lightweight Directory Access Protocol (LDAP) is a protocol used to access directory services systems.

A56:

B and D. Fiber-optic cable can use either SC or ST type connectors. RJ-11 connectors (answer A) are associated with telephone cable, RJ-45 (answer C) connectors are associated with UTP cable, and BNC connectors (answer E) are associated with thin coaxial cable.

A57:

B.USB interfaces have a number of connectors associated with them, but the most common are called Type A and Type B. FireWire interfaces use either a 4-pin or a 6-pin connector, neither are referred to as Type A or Type B. RJ-11 is a type of connector associated with phone system wiring. Fiber optic interfaces use a wide range of connectors, but none are called Type A or Type B.

A58:

A. When a new NIC is installed on a Token Ring network, the speed of the card has to be set to match the speed used by the network. Answer B is incorrect because Token Ring networks operate at either 4Mbps or 16Mbps. Answer C is incorrect because full-duplex connections are not used on Token Ring networks. Answer D is incorrect because, although it is possible, a faulty card is not the most likely answer

A59:

B. The most likely explanation is that port 443, the HTTPS default port, is being blocked by a corporate firewall. Port 80 (answer A) is used by HTTP. All modern Web browsers support HTTPS automatically; therefore, answer C is incorrect. Port 110 (answer D) is used by POP3.

A60:

A. Class A subnets use the range 1 to 126 for the value of the first octet. Answer B is the loopback address, which allows the IP stack functionality to be tested. Answers C and D are both addresses in the Class B range (128191).

A61:

A and C. Infrared and Bluetooth are wireless technologies commonly used to create personal area networks. They replace the need for peripheral cables. 802.11a is a wireless standard used for LAN-based networking and not designed for attaching peripheral devices. Ethernet wireless is not a wireless standard.

A62:

A and C. Systems that have APIPA assigned addresses will be able to talk to each other, but not with any other systems (answer B). Systems with APIPA assigned addresses will not be able to access the Internet, as the APIPA assigned information does not include default gateway information. Therefore, communication is limited to the local network. Answer D is incorrect because the systems with APIPA addresses will be able to talk to each other, even though they will not be able to communicate with any other systems.

A63:

B, C, and D. FTP, DHCP, and HTTP are all protocols in the TCP/IP protocol suite. AFP (answer A) is part of the AppleTalk protocol suite. NCP (answer E) is part of the IPX/SPX protocol suite.

A64:

C. SMTP is used for sending email. Answer A is not a valid answer. Answers B and D are incorrect because POP3 and IMAP are email retrieval protocols, not protocols for sending email.

A65:

C. The Service Set Identifier (SSID) is a unique identifier sent over the WLAN that acts as a simple password used when a client attempts to access an access point. The SSID is used to differentiate between networks; therefore, the client system and the AP must use the same SSID. WEP represents a form of wireless security, and the wireless channel is the band of frequency used for the wireless communication.

A66:

A. The MAC address is a 6-byte address expressed in six pairs of hexadecimal values. Because it is hexadecimal, only the letters A through F and numbers can be used. Answer B is incorrect because MAC addresses are expressed as six hexadecimal pairs. Answer C shows an example of an IPv4 address. Answer D shows an example of an IPv6 address. Answer E is incorrect because MAC addresses are expressed in hexadecimal; therefore, only the letters A through F and numbers can be used.

A67:

C. The Lightweight Directory Access Protocol (LDAP) is an application layer protocol that can be used to execute commands such as queries against LDAP compliant directory service systems such as Microsoft Active Directory or Novell Directory Services. NNTP is a protocol used to access Internet newsgroups. ICMP is a protocol that works with IP to provide error checking and reporting functionality on a network. SFTP is a secure implementation of the File Transfer Protocol (FTP).

A68:

D. A firewall can provide several services to the network, including NAT, proxy services, and packet filtering. NAS is not a function of a firewall server. Answers A, B, and C are all incorrect because NAT, packet filtering, and proxy functionality are all commonly implemented on firewall systems.

A69:

C. The output shown is from the dig command. dig is used on UNIX and Linux systems to run manual DNS lookups. The nslookup command also performs this function, but it produces different output. The nbtstat command provides information on NetBIOS name resolutions, and the netstat command shows what TCP/IP protocol connections have been established on a system. Both of these commands produce different output from dig.

A70:

A. The service to which a data packet is destined is determined by the port number to which it is sent. Answers B, C, and D are not valid.

A71:

D. The output displayed in this question is from the Windows tracert utility. Answers A, B, and C are all incorrect. These utilities produce output that is different from the output shown.

A72:

A. The physical layer of the OSI seven-layer model is responsible for placing the signal on the network media. The data-link layer (answer B) is responsible for physical addressing and media access. MAC and LLC (answers C and D) are sublayers of the data-link layer.



    Network+ Exam Cram 2
    Network+ Exam Cram 2
    ISBN: 078974905X
    EAN: N/A
    Year: 2003
    Pages: 194

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net