Chapter 14. Practice Exam 2


This exam consists of 72 questions that reflect the material covered in this book. The questions are representative of the types of questions you should expect to see on the Network+ exam; however, they are not intended to match exactly what is on the exam.

Some of the questions require that you deduce the best possible answer. Often, you are asked to identify the best course of action to take in a given situation. You must read the questions carefully and thoroughly before you attempt to answer them. It is strongly recommended that you treat this as if it were the actual exam. When you take it, time yourself, read carefully, and answer all the questions to the best of your ability.

The answers to all the questions appear in the section following the exam. Check your letter answers against those in the answers section, and then read the explanations provided. You might also want to return to the chapters in the book to review the material associated with any incorrect answers.

1:

As system administrator, you have been asked to implement name resolution on your network. The network uses both Windows and UNIX systems. Which of the following are you most likely to use?

  • A. LMHOSTS

  • B. DNS

  • C. WINS

  • D. DHCP

2:

You are attempting to connect an Apple workstation to an existing TCP/IP network. The Apple system was previously used on a peer-to-peer network using the AppleTalk protocol. When the system is connected to your network, it cannot connect to the server. Which of the following could you do to connect the Apple workstation? (Select two.)

  • A. Install the AppleTalk protocol on the server

  • B. Install the TCP/IP protocol on the workstation

  • C. Install NetBEUI on the workstation

  • D. Install TCP/IP on the server

3:

You have been employed by a small company to implement a fault-tolerant hard disk configuration. You have purchased four 40GB hard disks and intend on installing RAID 5 on the server. What is the storage capacity of the RAID solution?

  • A. 120GB

  • B. 40GB

  • C. 80GB

  • D. 160GB

4:

You have been called in to troubleshoot a small network. The network uses TCP/IP and statically assigned IP information. You add a new workstation to the network, which can connect to the local network but not to a server on a remote network. Which of the following is most likely the cause of the problem?

  • A. Incorrect IP address.

  • B. Incorrect default gateway.

  • C. DHCP server is unavailable.

  • D. Duplicate IP addresses are being used.

5:

You have been employed to configure a 10Base2 network. Which of the following technologies would you use? (Choose two.)

  • A. UTP

  • B. STP

  • C. T-connectors

  • D. RJ-11 connectors

  • E. RG-58 cable

6:

You are working as an administrator in a network using NetWare, Windows, and UNIX servers. You need to assign user permissions on the UNIX and Windows systems. Which of the following permissions are available on the Windows server but not on the UNIX server?

  • A. Read

  • B. Write

  • C. Execute

  • D. Change

7:

You have just installed a new Windows 2000 server on your network. When first logging on to the system, which of the following is required to log on?

  • A. Username

  • B. Password

  • C. Context

  • D. Administrator's username

8:

Which of the following topology types offers the greatest amount of redundancy?

  • A. Star

  • B. Bus

  • C. Ring

  • D. Mesh

9:

You need to install a network printer and require the printer's MAC address to finish the installation. Which of the following represents a valid MAC address?

  • A. 192.168.2.13

  • B. 0x00007856

  • C. 00:04:e2:1c:7b:5a

  • D. 56g78:00h6:1415

10:

You have been called in to replace a faulty ST connector. Which of the following media types are you working with?

  • A. RG-58

  • B. RG-62

  • C. Single mode fiber

  • D. SCSI

11:

Your manager has asked you to recommend a secure way to copy files between a server on your network and a remote server in another location. Which of the following solutions are you most likely to recommend?

  • A. TFTP

  • B. FTP

  • C. SFTP

  • D. IGMP

12:

You are setting up a wide area network between two school campuses and decide to use BRI ISDN. What is the maximum throughput of your connection?

  • A. 64Kbps

  • B. 128Kbps

  • C. 128Mbps

  • D. 64Mbps

13:

You are troubleshooting a 10Base2 network and suspect that the maximum cable length has been exceeded. What is the maximum length of a 10BASE-2 network segment?

  • A. 25 meters

  • B. 100 meters

  • C. 185 meters

  • D. 500 meters

14:

You have been given the task of installing Samba on a Linux server. What services does this product provide?

  • A. Web server services

  • B. Thin client services

  • C. File and print services

  • D. Proxy server services

15:

What is the maximum cable length of a 10BaseT network?

  • A. 185 meters

  • B. 500 meters

  • C. 100 meters

  • D. 50 meters

16:

While troubleshooting a DNS issue from a UNIX server, you suspect that the DNS record for one of your other servers is incorrect. Which of the following utilities are you most likely to use to troubleshoot this problem?

  • A. ipconfig

  • B. dig

  • C. netstat

  • D. nbtstat

17:

A number of users have called to report printing problems. Upon investigation, you trace the problem to a network printer connected to a server system. You arrive at the printer to find that it is connected online and appears to perform a test print without any problems. You check the network connectivity, and that seems to be okay as well. Which of the following troubleshooting steps would you perform next?

  • A. Examine the log files on the server to determine whether there are any printing-related events.

  • B. Reboot the server that acts as the print server.

  • C. Remove and reinstall the printer drivers.

  • D. Change the network cable that connects the printer to the network.

18:

You are experiencing problems with the network connectivity of a Windows 2000 system, and you suspect that there might be a problem with an incorrect route in the routing table. Which of the following TCP/IP utilities can you use to view the routing table? (Select two.)

  • A. TRacert

  • B. nbstat

  • C. route

  • D. netstat

  • E. ping

19:

Because of a promotion, you are moving one of the administrators to a new corner office. The administrator has a wireless connection to the network that has continued to operate consistently. After the move to the new office, the administrator can still access the network, but speeds are slower and periodically the connection fails altogether. What is the likely cause of the problem?

  • A. The SSID on the client system is incorrectly set.

  • B. IPSec has been configured to use high-level encryption

  • C. The administrators system has been moved too far from the AP.

  • D. The wireless channel is incorrectly set on the client station.

20:

Which of the following services provides name resolution services for FQDNs?

  • A. DNS

  • B. DHCP

  • C. WINS

  • D. ARP

  • E. NTP

21:

You are installing a 100BaseFX network and need to purchase connectors. Which of the following might you purchase? (Choose two.)

  • A. RJ-45

  • B. ST

  • C. BNC

  • D. SC

22:

Which of the following network services or protocols is not associated with file sharing?

  • A. NFS

  • B. SMB

  • C. LPD

  • D. AFP

23:

When designing a network, you have been asked to select a cable that offers the most resistance to crosstalk. Which of the following are you likely to choose?

  • A. Multimode fiber-optic

  • B. Shielded twisted pair

  • C. UTP

  • D. Shielded mesh

24:

Which of the following are considered disaster recovery measures? (Select two.)

  • A. Backups

  • B. UPS

  • C. RAID 5

  • D. Off-site data storage

25:

Which command produces the following output?

 Interface: 24.77.218.58 --- 0x2   Internet Address      Physical Address      Type   24.77.216.1           00-00-77-99-a4-4c     dynamic 

  • A. arp

  • B. tracert

  • C. ipconfig

  • D. netinf

26:

A user with a newly created user account cannot access an application on the network, yet other users can. Which of the following troubleshooting steps are you likely to perform first?

  • A. Delete the application and reinstall it.

  • B. Delete the user account and re-create it.

  • C. Change the password of the new user account.

  • D. Check the file permissions for the new user account.

27:

Because of a recent security breach, you have been asked to design a security strategy that will allow data to travel encrypted through both the Internet and intranet. Which of the following protocols would you use?

  • A. IPSec

  • B. SST

  • C. CHAP

  • D. FTP

28:

As part of a network upgrade, you have installed a router on your network creating two networks. Now, workstations on one side of the router cannot access workstations on the other side of the router. Which of the following configuration changes would you need to make to the workstations to enable them to see devices on the other network? (Choose two.)

  • A. Change the IP address assignments on one side of the router so that the router is on a different IP network from the other one.

  • B. Update the default gateway information on all systems so that they use the newly installed router as the gateway.

  • C. Update the default gateway information on all systems so that they use a workstation on the other network as the default gateway.

  • D. Make sure that the IP address assignments on all network workstations are the same.

29:

Which type of cable should be used in a 100BaseT network?

  • A. RG-58

  • B. Category 4 UTP

  • C. Category 5 UTP

  • D. Multimode fiber

30:

Which of the following network types is easiest to add new nodes to?

  • A. Bus

  • B. Ring

  • C. Star

  • D. Mesh

31:

Which of the following connectors is used with fiber-optic cable? (Choose three.)

  • A. SC

  • B. F-type

  • C. MTRJ

  • D. LC

32:

You have recently installed a DHCP server to replace static IP addressing. You configure all client systems to use DHCP and then reboot each system. Once rebooted, they all have an IP address in the 169.254.0.0 range. Which of the following statements is true?

  • A. The DHCP server has been configured to assign addresses in the 169.254.0.0 IP range.

  • B. The DHCP must be rebooted.

  • C. Client systems are unable to access the new DHCP server.

  • D. Client systems are getting IP address information from the LMHOSTS file.

33:

Placing a node on which of the following types of networks would require that you obtained an address from IANA?

  • A. Private network

  • B. Public network

  • C. Ethernet network

  • D. WAN

34:

You are implementing a new network. From the network specifications, you learn that you will be using the 1000BaseCX standard. What type of cable will you be using?

  • A. Multimode fiber

  • B. STP

  • C. Single mode fiber

  • D. CoreXtended fiber

35:

Which of the following network protocols can recover from lost or corrupted packets in a network transmission?

  • A. L2TP

  • B. TCP

  • C. IPX

  • D. ARP

36:

A colleague decided to close all unused ports on the corporate firewall to further secure the network from intruders. The ports that were open were 25, 80, 110 and 53. Your colleague knew that 25 and 110 are required for email and that 80 is used for nonsecure Web browsing, so he decided to close 53, as he didn't think it was necessary. Which network service is now unavailable?

  • A. Secure HTTP

  • B. FTP

  • C. Telnet

  • D. DNS

37:

You are working on a Linux system, and you suspect that there might be a problem with the TCP/IP configuration. Which of the following commands would you use to view the network card configuration of the system?

  • A. config

  • B. ipconfig

  • C. winipcfg

  • D. ifconfig

38:

You have configured network clients to obtain IP addresses using APIPA. Which of the following IP ranges would be assigned to client systems?

  • A. 10.10.0.010.254.254.0

  • B. 169.168.0.0169.168.255.255

  • C. 192.168.0.0192.168.254.254

  • D. 169.254.0.1169.254.255.254

39:

Your manager has asked you to implement a fault-tolerant disk solution on your server. You have two 30GB hard disks and two controllers, so you decide to implement RAID 1. After the installation, your manager asks you how much storage space is now available for storing data. What do you tell her?

  • A. 30GB

  • B. 40GB

  • C. 60GB

  • D. 120GB

40:

Which of the following statements best describes PRI ISDN?

  • A. PRI ISDN uses 128 B channels and two D channels.

  • B. PRI ISDN uses 23 B channels and one D channel.

  • C. PRI ISDN uses two B and one D channel.

  • D. PRI ISDN uses 23 D channels and one B channel.

41:

Which of the following media types is used with the 802.3 1000BaseSX standard?

  • A. Coaxial

  • B. UTP

  • C. Single mode fiber-optic

  • D. Multimode fiber-optic

42:

Which of the following user security models would you use if you were looking for the highest levels of security on your network? (Choose two.)

  • A. User-administered security

  • B. User-level security

  • C. Share-level security

  • D. Centrally administered security

43:

A remote user calls you because he cannot dial in to the remote server. He says that the modem dials the number and negotiates the connection, but then the line is dropped. Which of the following two troubleshooting steps are you likely to try first? (Choose two.)

  • A. Change the modem IRQ assignments.

  • B. Run a remote diagnostic on the remote access server's modem.

  • C. Ask the user to verify that the username and password are correct.

  • D. Ask the user to verify that he is dialing the correct system.

44:

At which layer of the OSI model does a NIC operate?

  • A. Physical

  • B. Network

  • C. Data-link

  • D. Transport

45:

You are working with a Macintosh network. Which of the following AppleTalk protocols provides file sharing for the network?

  • A. SMB

  • B. Samba

  • C. NFS

  • D. AFP

46:

You are implementing a 100BaseT network. Which logical topology does the network use?

  • A. Ring

  • B. Star

  • C. Mesh

  • D. Bus

47:

Consider the following output:

 Proto Local AddressForeign Address        State TCP   laptop:2848  MEDIASERVICES1:1755    ESTABLISHED TCP   laptop:1833  www.dollarhost.com:80  ESTABLISHED TCP   laptop:2858  194.70.58.241:80       ESTABLISHED TCP   laptop:2860  194.70.58.241:80       ESTABLISHED TCP   laptop:2354  www.dollarhost.com:80  ESTABLISHED TCP   laptop:2361  www.dollarhost.com:80  ESTABLISHED TCP   laptop:1114  www.dollarhost.com:80  ESTABLISHED TCP   laptop:1959  www.dollarhost.com:80  ESTABLISHED TCP   laptop:1960  www.dollarhost.com:80  ESTABLISHED TCP   laptop:1963  www.dollarhost.com:80  ESTABLISHED TCP   laptop:2870  localhost:8431         TIME_WAIT TCP   laptop:8431  localhost:2862         TIME_WAIT TCP   laptop:8431  localhost:2863         TIME_WAIT TCP   laptop:8431  localhost:2867         TIME_WAIT TCP   laptop:8431  localhost:2872         TIME_WAIT 

Which of the following commands produces this output?

  • A. arp

  • B. netstat

  • C. nbtstat

  • D. tracert

48:

Which of the following protocols or services enables Windows-based clients to access resources on a Linux server?

  • A. IPSec

  • B. Samba

  • C. AFP

  • D. NFS

49:

You are attempting to troubleshoot a remote connectivity problem for a user. Although the modem seems to be working properly within the computer, you cannot get the modem to dial a number. Working within a terminal software application, you attempt to communicate directly with the modem. From within the terminal application, which command would you issue to reset the modem?

  • A. ATD

  • B. ATI3

  • C. ATZ

  • D. ATH

50:

Which of the following protocols maps Layer 2 addresses to Layer 3 addresses on a TCP/IP network?

  • A. ARPA

  • B. ARP

  • C. AARP

  • D. RARP

51:

You have been asked to implement a server clustering strategy. Which of the following is a reason to use server clustering? (Select two.)

  • A. Increase data transmissions security over the LAN

  • B. Increase data transmission security over the WAN

  • C. Increase server service fault tolerance

  • D. Reduce network downtime

52:

Which of the following is not a type of Digital Subscriber Line (DSL) technology?

  • A. VHDSL

  • B. RADSL

  • C. ADSL

  • D. XTDSL

53:

You come into work on Monday to find that the DHCP server has failed over the weekend. Before you can fix it, client systems boot up and are able to communicate with each other. However, they are not able to directly access the Internet or a remote network segment. Given that the DHCP server has failed, how are systems able to communicate?

  • A. The DHCP service was recovered automatically using the Windows XP automatic restoration utility.

  • B. The DHCP addressing information was obtained from the client cache.

  • C. The client systems are assigned an IP address using APIPA.

  • D. The client systems are using static IP addressing.

54:

Which of the following is a reason to implement a proxy server? (Select two.)

  • A. To centrally control Internet access

  • B. To protect the internal network from intruders

  • C. To provide NAT services

  • D. To provide automatic IP addressing on the network

55:

Consider the following output:

    Name               Type         Status --------------------------------------------- LAPTOP         <00>  UNIQUE      Registered KCS            <00>  GROUP       Registered LAPTOP         <03>  UNIQUE      Registered 

Which of the following commands would produce this output?

  • A. nbtstat

  • B. netstat

  • C. ifconfig

  • D. arp

56:

Which of the following wireless technologies are typically used to create a wireless personal area network?

  • A. Infrared

  • B. 802.11g

  • C. Bluetooth

  • D. 802.11c

57:

Which of the following is a valid Class C address that could be assigned to a workstation on the network?

  • A. 200.200.200.200

  • B. 200.200.200.255

  • C. 143.67.151.17

  • D. 203.16.42.0

58:

At which layer of the OSI model is flow control performed?

  • A. Network

  • B. Transport

  • C. Session

  • D. Data-link

59:

Which of the following statements is true of IMAP?

  • A. IMAP leaves messages on the mail server, so they can be viewed and accessed from various locations.

  • B. IMAP is used for sending as well as receiving email.

  • C. IMAP can only be used for sending mail.

  • D. IMAP uses port 110.

60:

You are implementing a new network that will use 100BaseT with switches configured for full duplex. What is the maximum throughput that will be possible between two devices on the network?

  • A. 10Mbps

  • B. 20Mbps

  • C. 200Mbps

  • D. 100Mbps

61:

Your manager has asked you to implement a RAID 5 fault-tolerant disk solution using four 40GB disks. He now wants to know how much data storage capacity will be lost by the implementation. What do you tell him?

  • A. 10GB

  • B. 20GB

  • C. 40GB

  • D. 120GB

62:

A user calls you from a conference room. He needs to connect to the corporate RAS server, but the modem in his system is reporting a "no dial tone" error. When he plugs the telephone back in to the phone socket, he gets a dial tone and is able to dial out successfully. What is the most likely cause of the problem?

  • A. The phone line in the room is analog.

  • B. The phone line in the room is faulty.

  • C. The modem is faulty.

  • D. The phone line in the room is digital.

63:

Which of the following is not a valid file permission on a Windows 2000 system?

  • A. Read

  • B. Attribute

  • C. Execute

  • D. Write

64:

Which of the following utilities would you use to view the TCP connections that have been established between two systems?

  • A. netstat

  • B. nbtstat

  • C. tracert

  • D. ipconfig

65:

Which of the following authentication systems uses tickets as part of its authentication process?

  • A. HTTPS

  • B. POP3

  • C. Kerberos

  • D. SSL

66:

On an AppleTalk network, what is the function of AARP?

  • A. It is a distance-vector routing protocol.

  • B. It allows the resolution of AppleTalk addresses to MAC addresses.

  • C. It allows the resolution of MAC addresses to AppleTalk addresses.

  • D. It is a link-state routing protocol.

67:

Which term describes the process of using parts of the node address range of an IP address as the network ID?

  • A. Subnetting

  • B. Supernetting

  • C. Subnet masking

  • D. Super routing

68:

One of the network devices used on your network forwards packets only to an intended port. Which of the following devices does this describe?

  • A. Hub

  • B. Switch

  • C. Gateway

  • D. PPP

69:

A user on your network can send data packets within the local subnet but cannot send packets beyond the local subnet. Which of the following is likely the problem?

  • A. Invalid permissions

  • B. Incorrect gateway information

  • C. No DNS server installed

  • D. No WINS server installed

70:

You are the administrator for a network that uses TCP/IP. You are using a single registered Class C network address. You want to continue to use it because many of your systems are accessed from outside sources, but you also want to create more networks so that you can manage traffic and security more effectively. Which of the following strategies would help you achieve this?

  • A. Implement a 127.x.x.x addressing system throughout the network.

  • B. Use reverse proxy.

  • C. Use subnetting.

  • E. Use private addressing.

71:

In a hardware loopback plug, which wire numbers are connected? (Choose the two best answers.)

  • A. 3 and 5

  • B. 1 and 3

  • C. 1 and 2

  • D. 3 and 4

  • E. 2 and 6

72:

Which of the following wireless technologies operates at a 5GHz RF range?

  • A. 802.11a

  • B. 802.11b

  • C. 802.11g

  • D. 802.11



    Network+ Exam Cram 2
    Network+ Exam Cram 2
    ISBN: 078974905X
    EAN: N/A
    Year: 2003
    Pages: 194

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net