Answers and Explanations to Exam Questions


A1:

B. DNS is used to provide hostname to IP address resolution on Windows and UNIX systems. A is wrong because the LMHOSTS file is used to resolve NetBIOS names to IP address. Answer C is wrong because WINS resolves NetBIOS names to IP addresses. D is wrong because DHCP is used to automatically assign IP information to clients' systems.

A2:

A and B. To communicate on a network, the server and the client must use the same protocol. In this scenario, installing AppleTalk on the server or TCP/IP on the client would allow the client to access the server. C is wrong because Apple systems do not use the NetBEUI protocol. D is wrong because TCP/IP is already installed on the server; to communicate on the network, the client must also have TCP/IP installed.

A3:

A. RAID 5 reserves the equivalent space of one partition in the array for parity information. In this scenario, there are four 40GB hard disks. With one reserved for parity, you have 160GB total space; and with 40GB removed for parity, there is 120GB of actual data storage.

A4:

B. To connect to systems on a remote network, the default gateway has to be correctly assigned. If this address is entered manually, the number might have been incorrectly entered. Answer A is incorrect. Because the system is able to connect to the local network, the actual address is correctly assigned. Answer C is incorrect because IP addresses are statically assigned. Answer D is incorrect because duplicate addresses will prevent the system from being able to log onto the network.

A5:

C and E. 10Base2 networks use BNC connectors including T-connectors and RG-58 cable (Thinnet coaxial cable). None of the other technologies are used in 10Base2 networks.

A6:

D. The change permission is available on Windows-based server systems but not on UNIX systems. All the other permissions are available on both platforms.

A7:

A and B. When logging on to a Windows server, all that is required is a valid username and password. C is incorrect because a context is associated with logging on to a NetWare network. D is wrong because you can log on using the administrator's username, but this is not required.

A8:

D. In a mesh topology, each device is connected directly to every other device on the network. Such a structure requires that each device have at least two network connections. All other network configurations do not offer the same level of redundancy as a true mesh network.

A9:

C. A MAC address contains six hexadecimal number sets. The first three sets represent the manufacturer's code, whereas the last three identify the unique station ID. A is wrong because the number represents a valid internal IP address. Neither C nor D are valid numbers.

A10:

C. ST connectors are a twist-type connector used with fiber-optic media. A is wrong because RG-58 (thin coax) uses BNC type connectors. B is incorrect because RG-62 (thick coax) uses vampire type AUI connectors. D is wrong because SCSI cables use a variety of connector typesnone of which include ST connectors.

A11:

C. The Secure File Transfer Protocol (SFTP) allows you to copy files from one location to another. SFTP provides authentication and encryption capabilities to safeguard data. TFTP is a mechanism that provides file transfer capabilities, but it does not provide security. FTP provides basic authentication mechanisms, but it does not provide encryption. IGMP is a protocol associated with multicast group communications. It is not a file transfer protocol.

A12:

B. BRI ISDN uses two 64Kbps data channels. Combined, BRI ISDN offers a total of 128Mbps transfer rate. All of the other answers are invalid.

A13:

C. 10Base2 is an Ethernet network standard implemented using thin coaxial cable. The maximum length of a segment is 185 meters. A is incorrect. B describes 10BaseT. D describes 10Base5.

A14:

C. Samba is a product that provides file and print services to Windows-based clients. A is wrong because Web server services are offered through a variety of products; Samba is not one of them. B is incorrect because Samba does not offer thin client services. D is incorrect because proxy server services are offered through a variety of products; Samba is not one of them.

A15:

C. 10BaseT networks use UTP media, which have a maximum distance of 100 meters. A is not correct because 185 meters is the distance limitation of thin coax media used on 10Base2 networks. B is wrong because 500 meters is the distance limitation of thick coaxial media used with 10Base5 networks. D is wrong because 50 meters is not a valid cable distance.

A16:

B. The Dig command is used on UNIX and Linux systems to perform manual name resolutions against a DNS server. This can be useful in troubleshooting DNS related issues. The ipconfig, netstat, and nbtstat commands are all Windows-based commands, so they would not be used in this scenario.

A17:

A. Log files often record information about errors that can be vital to the troubleshooting process. It is also a step that has little or no impact on network services. B is wrong because rebooting the server is a last-resort troubleshooting step. C is incorrect because removing and reinstalling the printer drivers might be a valid step, but it would not be the first choice of those listed. D is wrong because changing the network cable might be a valid troubleshooting step, but because it has been verified that the network connectivity is working, this should not be necessary.

A18:

C and D. Both the route and the netstat commands can be used to view the routing table on a Windows 2000 system. A is wrong because the TRacert utility is used to track the route a packet takes between two destinations. B is incorrect because the nbtstat command is used to view statistical information for NetBIOS connections. E isn't correct because the ping utility is used to test network connectivity.

A19:

C. Wireless APs have a limited distance that they can send and receive data signals. Because the wireless client was recently relocated, the most likely explanation is that the system has moved too far away from the AP. SSIDs would not likely be the problem, as the configuration was correct before the move; and incorrect SSIDs would prevent network access, not cause intermittent access. Also, both the client and the AP need to use the same wireless channel for communication to take place. The IPSec protocol secures data transmissions over the network and would not cause intermittent connectivity problems.

A20:

A. The Domain Name Service system (DNS) resolves Fully Qualified Domain Names (FQDNs) to IP addresses. B is wrong because the Dynamic Host Configuration Protocol (DHCP) provides automatic IP address assignment. C is wrong because the Windows Internet Naming Service (WINS) provides NetBIOS computer name to IP address resolution. D is wrong because the Address Resolution Protocol (ARP) resolves IP addresses to MAC addresses. E is wrong because the Network Time Protocol (NTP) facilitates the communication of time information between systems.

A21:

B and D. 100BaseFX networks use fiber media, which can use either SC or ST connectors. A is wrong because RJ-45 connectors are used with UTP media. C is incorrect because BNC connectors are used with thin coax media on 10Base2 networks.

A22:

C. LPD, or Line Printer Daemon, is a network service associated with print serving. It is not associated with file sharing. LPD is typically associated with UNIX or Linux systems, but versions of LPD are available for all commonly used operating systems.

A23:

A. Unlike copper-based media, fiber-optic media is resistant to crosstalk, as it uses light transmissions. B is wrong because STP offers greater resistance to crosstalk than regular UTP, but is not as resistant as fiber-optic cable. C is incorrect because UTP cable is more susceptible to crosstalk than either STP or fiber-optic. D is wrong because shielded mesh is not a type of cable.

A24:

A and D. Both backups and offsite data storage are considered disaster recovery measures. B is wrong because a UPS is considered a fault-tolerant measure, not a disaster recovery measure. C is wrong because RAID 5 is considered a fault-tolerant measure, not a disaster recovery measure.

A25:

A. The output is from the arp -a command, which shows information related to IP address to MAC address resolutions. B is wrong because the TRacert command displays the route a packet takes between two points. The output from the command is different from that shown in the example. C is incorrect because the ipconfig command displays the network configuration of a system. The output from the command is different from that shown in the example. D is wrong because there is no such command as netinf.

A26:

D. The problem is most likely related to incorrectly set file permissions, so this is the best course of action. A is wrong because this is unlikely to be the problem, as other users are able to access the application without a problem. B is incorrect because although this might be a solution to the problem, this would not be the first thing to try. C is wrong because if the user is able to log on, changing the password is unlikely to have any effect.

A27:

A. IPSec is a non-proprietary security standard used to secure transmissions both on the internal network and when data is sent outside the local LAN. IPSec provides encryption and authentication services for data communications.

A28:

A and B. The devices on one side of the router need to be configured with a different IP network address than when the network was a single segment. Also, the default gateway information on all systems will need to be updated to use the newly installed router as the default gateway. C is wrong because the default gateway address should be the address of the router, not another workstation on the network. D is incorrect because for systems to communicate on an IP network, all devices must be assigned a unique IP address. Assigning systems the same address will cause address conflicts, thus resulting in none of the systems being able to communicate.

A29:

C. 100BaseT is implemented using a minimum of category 5 UTP cable. A is wrong because RG-58 is a type of coaxial cable with a maximum speed of 10Mbps. B is incorrect because category 4 UTP cable is not intended for use on a 100BaseT network. D is wrong because multimode fiber is used in fiber-optic networks. The 100BaseT standard defines 100Mbps networking using UTP cable.

A30:

C. Each node on a star network uses its own cable, which makes it easy to add users without disrupting current ones. Adding a node to a bus network can sometimes involve breaking the segment, which makes it inaccessible to all other nodes on the network. This makes answer A incorrect. Answer B is incorrect because a true ring network model would require that the ring be broken to add a new device. Answer D is incorrect because a mesh topology requires that every device be connected to every other device on the network. It is, therefore, quite difficult to expand a mesh network.

A31:

A, C, and D. A number of connector types are associated with fiber-optic cabling, including LC, SC, and MTRJ. F-Type is a connector associated with coaxial cabling.

A32:

C. When a client system first boots up, it will look for a DHCP server. If the server cannot be found, Automatic Private IP Addressing (APIPA) automatically assigns IP addresses to the client systems. The addresses are not routable and cannot be used to access remote segments. The addresses assigned are in the 169.254.0.0 address range. All clients configured with the valid APIPA address will be able to communicate between each other.

A33:

B. The Internet Assigned Numbers Authority (IANA) manages the address assignments for public networks such as the Internet. A is wrong because on a private network, you can use any addressing scheme that is compatible with your network. C is incorrect because an Ethernet network can be either private or public. It does not directly need an IANA assigned addressing scheme. D is wrong because a WAN can be either private or public. It does not directly need an IANA assigned addressing scheme.

A34:

B. The 1000BaseCX standard specifies Gigabit Ethernet over STP cabling. A is wrong because 1000BaseSX and 1000BaseLX specifies Gigabit Ethernet over two types of multimode fiber. C is incorrect because single mode fiber-optic cable is used with the 100BaseFX standard. D is wrong because there is no such thing as CoreXtended fiber-optic cable.

A35:

B. TCP is a connection-oriented protocol, so it can recover from failed transmissions. A is wrong because L2TP is used in remote access connections. C is incorrect because IPX is a connectionless transport protocol and cannot recover from lost packets. D is incorrect because ARP is part of the TCP/IP protocol suite that resolves IP addresses to MAC addresses.

A36:

D. The DNS service uses port 53. A is wrong because secure HTTP uses port 443. B is incorrect because FTP uses port 21. C is wrong because Telnet uses port 23.

A37:

D. On a Linux system, the ifconfig command shows the network card configuration. A is wrong because the config command shows the network configuration on a NetWare server. B is incorrect because the ipconfig command shows the network configuration information on a Windows system. C is wrong because the winipcfg command shows the network configuration information on a certain Windows systems such as Windows 95/98.

A38:

D. The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.1169.254.255.254 for Automatic Private IP Addressing. APIPA uses a Class B address with a subnet mask of 255.255.0.0.

A39:

A. In a RAID 1 scenario (disk mirroring), one disk carries an exact copy of the other. Therefore, the total volume of one disk will be lost to redundancy. All the other answers are incorrect.

A40:

B. Primary Rate ISDN (PRI) uses 23 B channels for carrying data, and one D channel for carrying signaling information. C is incorrect because this statement describes Basic Rate ISDN (BR). D is wrong because PRI uses 23 B channels and one D channel.

A41:

D. The gigabit Ethernet standard, 1000BaseSX, specifies a multimode fiber optic cable. 1000BaseSX can be used up to 550 meters. Other gigabit Ethernet standards use single mode fiber-optic cable or UTP cabling. There are no gigabit Ethernet standards that use coaxial cabling.

A42:

B and D. The most secure security model commonly implemented on networks is user-level security that is administered centrally. A is wrong because user administered security is normally associated with peer-to-peer networks and is not robust, as there is more than one person administering security. C is wrong because share-level security is not as secure as user-level security.

A43:

C and D. In most cases, you should try the simplest solutions first. Information such as the username and password should be verified before any reconfiguration is attempted. A is wrong because if the modem is dialing the remote system and getting a response, it is most likely working correctly. B is incorrect because running a remote diagnostic on the modem is a valid troubleshooting step, but you should first verify that the correct connection information is being used.

A44:

C. Although it provides the physical connection to the network, a NIC is considered a data-link device. A, B, and D are wrong because a NIC is not said to operate at any of these layers.

A45:

D. The Apple Filing Protocol (AFP) allows clients using the AppleTalk protocol to share files across a network. SMB is a file sharing protocol used on Windows networks. Samba is a protocol that provides interoperability between Windows and Linux/UNIX systems. NFS is the file sharing protocol associated with Linux/UNIX networks.

A46:

D. The 100BaseT standard defines an Ethernet network using twisted pair cable, which would be configured in a physical star configuration. However, even in a star configuration, an Ethernet network still uses a logical bus topology.

A47:

B. The output shown is from the netstat command from a Windows-based system. A, C, and D are wrong because all of these commands produce a different output from that shown.

A48:

B. Running on a Linux/UNIX system, Samba allows Windows clients access to shared files and printers on a Linux/UNIX host. Samba also allows UNIX users to access resources shared by Windows systems.

A49:

C. The Hayes AT command set provides commands that allow you to communicate directly with the modem. The ATZ command is used to reset the modem. A is wrong because the ATD command is used to dial a number. B is incorrect because the ATI command is used to retrieve information from the modem. The ATI3 command shows the manufacturer and model of the modem. D is wrong because the ATH command is used to hang up a connection.

A50:

D. A layer 2 address is a MAC address. A Layer 3 address is a software-configured protocol address. Because a normal resolution is considered to be a Layer-3toLayer-2 resolution, the resolution the other way is considered a reverse resolution. On a TCP/IP network, such a resolution is performed by the Reverse Address Resolution Protocol (RARP). A is wrong because ARPA is not an address resolution protocol. B is incorrect because the address resolution protocol (ARP) resolves Layer 3 addresses to Layer 2 addresses. C is wrong because the AppleTalk address resolution protocol is used, on AppleTalk networks, to resolve AppleTalk addresses to MAC addresses.

A51:

C and D. Server clustering is a strategy using a grouping of servers to provide fault tolerance and failover service solutions for a network. In a clustered configuration servers constantly communicate with each other. If one should fail, the other will know and take over the functions of that server including the services that the failed server delivered. This provides fault tolerance for network services. Because the network can function in the event of a failed server, network downtime is reduced. Server clustering is not used to create data transmission security.

A52:

D. XTDSL is not a recognized form of DSL. A is wrong because Very High Bit Rate DSL (VHDSL) is a recognized version of DSL. B is wrong because Rate Adaptive DSL (RADSL) is a recognized version of DSL. C is wrong because Asymmetric DSL (ADSL) is a recognized, and arguably the most popular, version of DSL.

A53:

C. If a Windows client system cannot locate and obtain an IP address from a DHCP server, it will be assigned an address automatically using APIPA. Once assigned, all client stations with an APIPA address will be able to communicate with each other. However, APIPA addresses are meant for internal communication and cannot be used to access remote networks.

A54:

A and C. A proxy server acts as a centralized point for Internet access, thus making it easy to control a user's Internet use. Also, the proxy server provides network address translation services as requests are sent out to the Internet using the address of the external interface of the proxy server, not the system that sent it. B is wrong because this statement describes the function of a firewall. Although some proxy servers also offer firewalling functionality, they are separate operations. D is incorrect because this statement describes the function of DHCP.

A55:

A. The output shown is from an nbtstat command running on a Windows system. B, C, and D are wrong because all of these commands produce different output from that shown.

A56:

A and C. Infrared and Bluetooth are short range wireless technologies used to connect personal devices such as PDAs, printers, and other resources to a computer. These are called a Personal Area Network (PAN) because it is a small network designed for personal use. PANs are often seen in coffee shops, libraries, or other areas where users work remotely. The 802.11 wireless standards, including 802.11g, are used to create wireless LANs, which include more devices, users, and resources.

A57:

A. Although it looks odd, this is a valid Class C address that could be assigned to a system on the network. B is the broadcast address of the network 200.200.200.0. C is incorrect because it represents a valid Class B address. D is wrong because it is the network address for the network 203.16.42.

A58:

B. Flow control occurs at the Transport layer of the OSI model. A, C, and D are wrong because flow control does not occur at any of these layers.

A59:

A. Unlike POP3, IMAP does not directly download and then remove messages from the mail server. Instead, IMAP leaves the email on the server so that messages can be retrieved from various locations. B and C are wrong because IMAP is used only for retrieving email. D is wrong because IMAP uses port 143. POP uses port 110.

A60:

C. 100BaseT is a network standard that runs at 100Mbps. A full-duplex configuration in a switched environment gives a maximum throughput between two devices of 200Mbps. A is wrong because this would be the maximum speed of a 10BaseT network in half-duplex mode. B is incorrect because this would be the maximum speed of a 10BaseT network in full-duplex mode. D is wrong because this would be the maximum speed of a 100BaseT network in half-duplex mode.

A61:

C. In a RAID 5 implementation, the space equal to the size of one disk in the array is lost to the storage of parity information. D describes the amount of space available for the storage of data, not the amount of space lost to the storage of parity information.

A62:

D. Most modern phone systems are digital, and therefore, regular analog modems that require analog lines will not work. A is incorrect because if the phone line in the room were analog, the modem would probably work. B is incorrect because the phone line in the room is not faulty because the user can call you to report the problem. C is incorrect because if the modem can report a "no dial tone" error, it is most likely working correctly.

A63:

B. The attribute file permission is not a valid NTFS file permission. A, C, and D are all valid file permissions on a Windows 2000 system.

A64:

A. The netstat utility allows you to view the TCP/IP connections between two systems. The nbtstat utility (answer B) is used to see the status of NetBIOS over TCP/IP connections. The tracert utility (answer C) is used to track the path that a packet of data takes between two hosts. The ipconfig utility (answer D) is used to view the IP addressing configuration information on a system.

A65:

C. The Kerberos authentication system uses tickets as part of the authentication process. HTTPS (answer A) is an implementation of SSL. It does not use tickets. POP3 (answer B) is an email retrieval protocol. SSL (answer D) does not use tickets.

A66:

B. AARP is used to map the AppleTalk addresses to both Ethernet and Token Ring physical addresses. The distance-vector routing protocol used on AppleTalk networks is RMTP, which makes answer A incorrect. C is incorrect because AARP resolves AppleTalk addresses to MAC addressesnot the other way around. AARP is not a link-state routing protocol.

A67:

A. The term subnetting refers to the process of using parts of the node address range for network addressing purposes. Supernetting (answer B) refers to the process of borrowing parts of the network address portion of an assigned address to be used for node addressing. Subnet masking (answer C) describes the process of applying a subnet mask to an address. Answer D is not a valid term.

A68:

B. A switch is more efficient than a hub, as it forwards data only to intended ports. A is incorrect because a hub directs data packets to all devices connected to the hub. C and D are wrong because these are not network devices.

A69:

B. If the gateway information is not correctly set, the data packets cannot get beyond the local subnet. The other options are not going to prevent the user from transmitting data to remote hosts.

A70:

C. Subnetting allows you to create more than one network from a single network address by manipulating the subnet mask to create more network addresses. A is wrong because the 127.x.x.x address range is reserved for TCP/IP loopback functionality and cannot be used as an addressing scheme. B is incorrect because reverse proxy is used when a proxy server protects another server (normally a Web server), which responds to requests from users on the other side of the proxy server. D is wrong because private addressing might well solve the issues of security and traffic management, but without also using reverse proxy, systems on the internal network aren't available to outside users.

A71:

B and E. A hardware loopback plug connects the 2 and 6 wires and 1 and 3 wires to simulate a live network connection. Answers A, C, and D are not correct for the cable in a hardware loopback adapter.

A72:

A. Each of the 802.11 wireless standards specify radio waves as the media to transport data signals. 802.11a uses the 5GHz RF range for data transmissions. 802.11, 802.11b, and 802.11g all use the 2.4GHz RF range.



    Network+ Exam Cram 2
    Network+ Exam Cram 2
    ISBN: 078974905X
    EAN: N/A
    Year: 2003
    Pages: 194

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net