|
|
1. | Which TCP/IP utility can tell you which server is the mail server for the domain foo.com?
|
|
2. | A user we’ll call Bob is experiencing what he calls “weird problems.” The computer is constantly crashing and performs very slowly. In addition, people are sending Bob e-mails asking him to stop sending them e-mails when, in fact, he hasn’t sent them any in months. What is the most likely cause of this problem?
|
|
3. | RSA is a type of which of the following?
|
|
4. | What is the proper name for the device that connects a PC to an ISDN network?
|
|
5. | Which utility does not come with Windows 98?
|
|
6. | VLANs are a feature primarily of which type of network device?
|
|
7. | Firewalls provide what primary benefit?
|
|
8. | Which part of a network interface card (NIC) identifies whether or not there is basic connectivity from the station to a hub or a switch?
|
|
9. | What is the name of the distance vector routing protocol for AppleTalk?
|
|
10. | Which version is the most current Windows server operating system?
|
|
11. | You are the network administrator for a small company. You come to work one morning and find that the server fails to boot. When it does boot, it has all kinds of configuration errors and data corruption. It was fine yesterday when you left work. You remember that there was a short power failure last night. What device would have prevented these problems?
|
|
12. | IP version 6 (IPv6) uses how many bits in its addressing scheme?
|
|
13. | Which of the following network operating systems support(s) the most varied types of client operating systems? (Choose all that apply.)
|
|
14. | Which network installation tool can be used to connect UTP cable to a 110 block?
|
|
15. | Which remote access protocol is used to allow remote application execution?
|
|
16. | Which network device is used to connect dissimilar network technologies at any level of the OSI model?
|
|
17. | At which level of the OSI model does routing occur?
|
|
18. | Which of the following is an example of an IPv6 address?
|
|
19. | You are the administrator for a 10-station peer-to-peer network that is connected to the Internet. All of the workstations are running TCP/IP, and the server is running IPX/SPX. Unfortunately, your network is having a problem: None of the users can connect to the server. The server can see itself on the network. What do you suspect is the problem?
|
|
20. | The process of grouping computers for fault tolerance and load balancing is known as ___________________.
|
|
21. | What additional item is required to connect a PC to a DSL modem?
|
|
22. | Which port number is used for DNS?
|
|
23. | Which Windows operating system(s) has/have local filesystem security? (Choose all that apply.)
|
|
24. | An ISDN B channel typically carries how much data?
|
|
25. | Which network security implementation will decrease the apparent speed of Internet access?
|
|
26. | Which network setting in Windows 9x configures a workstation for DHCP?
|
|
27. | Of those listed, which Internet connection type has the most bandwidth?
|
|
28. | Which protocol is primarily used to provide TCP/IP over dial-up Internet connections?
|
|
29. | Windows 2000 Server has support for which of the following clients? Choose all that apply.
|
|
30. | An HTTP proxy cache server will increase the apparent performance of what activity?
|
|
Answers
1. | B. The only utility listed that can tell which server is acting as the mail exchanger for a domain is the nslookup utility. This is done by setting the query type to MX (mail exchanger). Nslookup will then return the name and IP address of the mail exchanger for the domain foo.com. Please see Chapter 4 for more information. |
2. | C. Many viruses can wreak havoc with a computer system. Many viruses exhibit the behavior described, especially sending e-mails automatically to many people in the infectee’s address book. Please see Chapter 9 for more information. |
3. | A. RSA is a type of data encryption used to encrypt data before transmission. Please see Chapter 8 for more information. |
4. | D. Because ISDN is an all-digital network, they don’t use modems, but instead use Terminal Adapters, because they adapt the digital signal from one form to another. Please see Chapter 1 for more information. |
5. | D. The ipconfig utility does not come with Windows 98, but is instead the IP configuration utility for Windows NT. All the other utilities come as part of Windows 98. Please see Chapter 4 for more information. |
6. | B. Virtual LANs are primarily a feature of network switches. Because most true hubs cannot perform segmentation based on MAC addresses, they cannot do VLANs. Although NICs are required in order to use a VLAN, VLANs are not a primary feature of them. And individual cables do not have VLAN features. Please see Chapter 3 for more information. |
7. | C. Firewalls sit between a local network and a public network (such as the Internet) and protect the local network from security threats. It is only a part of a network’s security implementation, but a very important part. Please see Chapter 8 for more information. |
8. | A. The link light, when lit, indicates that there is a basic communication between a NIC and a hub or switch (it would also light if two NICs in two different PCs were connected with a crossover cable). If the cable is severed or wired incorrectly, the link light may not light. Please see Chapter 10 for more information. |
9. | D. AppleTalk uses the Routing Table Maintenance Protocol (RTMP), which is a distance vector routing protocol. RIP is the distance vector protocol for both IP and IPX; OSPF is the link state protocol for TCP/IP; and NLSP is the link state routing protocol for IPX/SPX. Please see Chapter 2 for more information. |
10. | C. Windows 2000 is the most current version of a Windows server operating system. Please see Chapter 5 for more information. |
11. | D. The problems are due to the power outage. An Uninterruptible Power Supply (UPS) maintains power to a device that is plugged into it during a power outage. Since the outage was short, it is very likely that a UPS could have maintained power to the server during the outage. If not, it could have at least performed an orderly shutdown of the server. Please see Chapter 9 for more information. |
12. | D. Because one of the main motivations behind the creation of the IPv6 addressing scheme was the lack of available addresses in IPv4, the length of the address was increased from 32 bits in IPv4 to 128 bits in IPv6. Please see Chapter 3 for more information. |
13. | A, C. Although all of the NOSes listed can support different client OSes, NetWare and Windows NT support the widest variety of client OSes. Please see Chapter 5 for more information. |
14. | D. A 110 block is also known as a punchdown block because of its method of installation. Thus, the tool used to install one is a punchdown tool with a 110 blade. Please see Chapter 6 for more information. |
15. | C. ICA is used with Terminal Server servers to allow remote application execution. The other protocols are used to provide remote access to a host network. Please see Chapter 7 for more information. |
16. | D. Gateways operate at all levels of the OSI model and connect dissimilar network technologies. While some of the other devices listed may connect dissimilar network technologies, they all operate at only the lower four layers of the OSI model. Please see Chapter 6 for more information. |
17. | B. The responsibilities of the Network layer include logical network addressing and routing. The Application, Data Link, and Physical layers do not provide any routing functionality. Please see Chapter 2 for more information. |
18. | A. The only address that is correct is ::000F:ABCD:0003. Option C is an IPv4 address and the other two are bogus addresses. Please see Chapter 3 for more information. |
19. | C. The server is configured to run only IPX/SPX, but the clients are using only TCP/IP. Changing the protocol to TCP/IP on the server would solve the problem. Please see Chapter 10 for more information. |
20. | B. Clustering is the method by which multiple copies of a server run together. The load is balanced across all of them. If one should happen to fail, the others continue to run as if nothing happens. Please see Chapter 9 for more information. |
21. | A. Because DSL operates at speeds higher than typical serial port speeds, a NIC is required in order for the PC to communicate with the DSL modem. None of the other items are required. Please see Chapter 1 for more information. |
22. | D. UDP (not TCP) port 53 is used for DNS. All others, while possibly valid port numbers, are not used for DNS. Please see Chapter 3 for more information. |
23. | B, C. Because Windows NT and 2000 use the NTFS that has local security properties, they have those properties as well. Please see Chapter 5 for more information. |
24. | D. An ISDN B channel, or Bearer channel, typically carries 64Kbps. Please see Chapter 7 for more information. |
25. | B. Because a firewall generally examines every packet and acts on the information in that packet, Internet access will seem to be slower. The other options either have no effect or will increase the apparent speed. Please see Chapter 8 for more information. |
26. | A. Although all of these answers are saying similar things, the only setting that exists in Windows 9x is “Obtain IP address automatically.” Please see Chapter 6 for more information. |
27. | A. OC-3 has a potential bandwidth of 155Mbps; T1 has a throughput of 1.544Mbps; ISDN is 1.544Mbps; and POTS has 53Kbps. Please see Chapter 7 for more information. |
28. | A. Of the protocols listed, only the Point-to-Point Protocol (PPP) provides TCP/IP Internet connections over dial-up (modem) connections. Please see Chapter 7 for more information. |
29. | D. Windows 2000 Server supports many different types of clients, including Windows, Macintosh, and Linux-based clients. Please see Chapter 5 for more information. |
30. | B. An HTTP proxy cache will cache (or store temporarily) copies of commonly used web page elements on a server on your LAN, thus the common elements will be received directly from the proxy at LAN speeds instead of Internet speeds. Please see Chapter 8 for more information. |
|
|