Appendix A -- Questions and Answers

Appendix A

Questions and Answers

Chapter 1: Networking Basics

Lesson 1: Networking Communications

Exercise 1: Networking Definitions

Match the concepts in the numbered list with the definitions that follow it.

Concepts

  1. Full-duplex
  2. Broadband
  3. Circuit switching
  4. Client/server network
  5. Baseband

Definitions

  1. A medium that carries multiple signals simultaneously
  2. A network in which a connection is established before any data is transmitted
  3. A network on which systems perform designated roles
  4. A medium that carries traffic in both directions simultaneously
  5. A medium that carries only one signal

    1. d

    2. a

    3. b

    4. c

    5. e

Lesson Review

  1. On which type of network does each computer maintain its own permissions and security settings?

    A peer-to-peer network

  2. A language that two computers "speak" while communicating over a network is called __________.

    A protocol

  3. A series of LANs connected together by any means is called __________.

    An internetwork

  4. What kind of network is often used to connect horizontal segments on a large enterprise internetwork?

    A backbone

  5. A network in which the medium carries only one signal is called __________.

    Baseband

  6. An example of full-duplex communications is __________.

    A telephone call

  7. A technology used to connect LANs at distant locations is called __________.

    A wide area network (WAN)

  8. The type of network in which data is split into discrete units that are transmitted over the network individually is called __________.

    A packet-switching network

Exercise 1: OSI Model Layers

For each of the protocols, functions, or concepts listed below, specify the OSI model layer with which it is associated.

  1. Ethernet

    Data-link

  2. Dialog separation

    Session

  3. Transfer syntax

    Presentation

  4. Routing

    Network

  5. Segmentation

    Transport

  6. SMTP

    Application

  7. Differential Manchester

    Physical

Lesson Review

  1. Which layer of the OSI reference model is responsible for controlling access to the network medium?

    The data-link layer

  2. Which layer of the OSI model is responsible for translating different syntaxes?

    The presentation layer

  3. The address of a packet's final destination is specified in the _________ layer.

    Network

  4. TCP is an example of a __________ layer protocol.

    Transport

  5. Electrical voltages, light pulses, and infrared waves are all examples of types of __________.

    Signals

  6. The process by which a receiving system sends messages instructing a sending system to slow down its transmission rate is called __________.

    Flow control

  7. A protocol that uses a handshake to establish a connection before sending data is called __________.

    Connection-oriented

Chapter 2: Network Hardware

Lesson 1: Network Cables

Exercise 1: Network Cable Types

Match the applications in the left column with the network cable types that best suit them in the right column.

  1. Used in the bus topology
  2. Used for the original Token Ring networks
  3. Used for Gigabit Ethernet networks.
  4. Contains eight wires
  5. Used for LANs that span long distances
  6. Uses a laser to generate signals
  1. UTP
  2. Singlemode fiber optic
  3. STP
  4. Coaxial cable
  5. Category 5e UTP
  6. Multimode fiber optic

1. d

2. c

3. e

4. a

5. f

6. b

Exercise 2: Cable Troubleshooting

For each of the following scenarios, specify whether the network will function properly based on the information given. If not, explain why.

  1. Twenty-five computers are connected to a 300-meter thin Ethernet cable segment using a bus topology.

    No. The cable segment for a thin Ethernet bus can be no longer than 185 meters.

  2. Ten computers with 100Base-T4 Fast Ethernet network interface cards (NICs) are connected to a hub using 100-meter lengths of Category 3 UTP cable.

    Yes. The 100Base-T4 Fast Ethernet specification is designed to use Category 3 cable segments up to 100 meters long.

  3. Networks in two buildings 1000 meters away from each other are connected together using singlemode fiber optic cable with RJ45 connectors.

    No. Fiber optic cables do not use RJ45 connectors.

  4. Fifteen computers are connected to a Token Ring network using a physical ring topology.

    No. Token Ring networks use a logical ring topology, but physically they are cabled using a star topology.

  5. A Fast Ethernet network is constructed using 100Base-TX equipment and Category 5e UTP cable, with two of the wire pairs in the cable dedicated to data signals and the other two to voice telephone signals.

    No. Although 100Base-TX equipment only uses two of the four wire pairs in the UTP cable, you must not use the other two pairs for any other application.

Lesson Review

  1. What is the name of an Ethernet cable that contains two electrical conductors?
    1. An STP cable
    2. A coaxial cable
    3. A dielectric cable
    4. A UTP cable

    b

  2. What are the names of the two most common conditions that degrade the signals on copper-based cables?

    Crosstalk and attenuation

  3. Which topology requires the use of terminators?
    1. Bus
    2. Star
    3. Ring
    4. None of the above

    a

  4. Which of the following topologies is implemented only logically, not physically?
    1. Bus
    2. Star
    3. Ring
    4. All of the above

    c

  5. How many wire pairs are actually used on a typical UTP Ethernet network?
    1. One
    2. Two
    3. Three
    4. Four

    b

Lesson 2: Network Interface Adapters

Exercise 1: Network Adapter Functions

  1. The two hardware resources used by every network interface adapter are __________ and __________.

    An IRQ and an I/O port address

  2. Network interface adapters are associated with the protocol operating at the __________ layer.

    Data-link

  3. The network interface adapter packages data for transmission by enclosing it within a __________.

    Frame

Lesson Review

  1. What is the name of the process of building a frame around network layer information?
    1. Data buffering
    2. Signal encoding
    3. MAC
    4. Data encapsulation

    d

  2. Which of the connectors on a network interface adapter transmits data in parallel?

    The bus connector

  3. Which of the following hardware resources do network interface adapters usually require? (Select two.)
    1. DMA channel
    2. I/O port address
    3. IRQ
    4. Memory address

    b and c

  4. What is the name of the process by which a network interface adapter determines when it should transmit its data over the network?

    MAC

  5. Which bus type is preferred for a NIC that will be connected to a Fast Ethernet network?

    PCI

Lesson 3: Network Hubs

Exercise 1: Concepts

Match the concept in the left column with the definition that best describes it in the right column.

  1. Token Ring MAU
  2. Intelligent hub
  3. Uplink port
  4. Loopback port
  5. Repeater
  6. Ring In and Ring Out ports
  1. Amplifies signals
  2. Used to send reports to a network manage- ment console
  3. Used to connect MAUs
  4. Forwards packets serially
  5. Excluded from a Token Ring network
  6. Used to connect one Ethernet hub to a standard port on another Ethernet hub

1. d

2. b

3. f

4. e

5. a

6. c

Lesson Review

  1. A passive hub does not do which of the following?
    1. Transmit management information using SNMP
    2. Function as a repeater
    3. Provide a crossover circuit
    4. Store and forward data

    b

  2. To connect two Ethernet hubs together, you must do which of the following?
    1. Purchase a special crossover cable
    2. Connect the uplink ports on the two hubs together
    3. Connect any standard port on one hub to a standard port on the other
    4. Connect the uplink port in one hub to a standard port on the other

    d

  3. Which term describes a port in a Token Ring MAU that is not part of the ring?
    1. Passive
    2. Loopback
    3. Crossover
    4. Intelligent

    b

  4. A hub that functions as a repeater inhibits the effect of __________.

    Attenuation

  5. You can use which of the following to connect two Ethernet computers together using UTP cable?
    1. An Ethernet hub
    2. A multiport repeater
    3. A crossover cable
    4. Any of the above

    d

Chapter 3: Network Connections

Lesson 1: Bridging

Exercise 1: Bridge Functions

Match the bridging concepts in the left column with the appropriate descriptions in the right column.

  1. Translation bridge
  2. Source route bridging
  3. Transparent bridging
  4. Remote bridge
  5. STA
  1. Used to select one of the bridges on a net- work segment while the others remain idle
  2. Enables bridges to compile their own address tables
  3. Connects two network segments using a WAN link
  4. Joins two network segments using different cable types
  5. Enables computers to select the bridge they will use

1. d

2. e

3. b

4. c

5. a

Lesson Review

  1. At what layer of the OSI reference model does a bridge function?
    1. Physical
    2. Data-link
    3. Network
    4. Transport

    b

  2. What does a bridge do when it receives a packet that is destined for a system on the same network segment from which the packet arrived?
    1. Discards it
    2. Relays it
    3. Broadcasts it
    4. Unicasts it

    a

  3. What type of bridge connects network segments using different types of cable?
    1. Transparent
    2. Remote
    3. Translation
    4. Source route

    c

  4. Two network segments connected by a bridge share what type of domain?
    1. Collision
    2. Broadcast
    3. Source route
    4. Unicast

    b

  5. What technique is used to prevent bridge loops?
    1. Transparent bridging
    2. Packet filtering
    3. Translation bridging
    4. The STA

    d

  6. Source route bridging is associated with which of the following protocols?
    1. Ethernet
    2. Token Ring
    3. FDDI
    4. TCP/IP

    b

Lesson 2: Switching

Exercise 1: Using Switches

Study the network diagram that follows and specify which device (or devices) you could replace with switches to achieve the following results with a minimum of expense.

  1. Which of the following devices would you replace with switches to reduce the number of collisions on the backbone?
    1. Hub A
    2. Routers A, B, and C, and Hubs A, B, and C
    3. Hubs A, B, and C
    4. Routers A, B, and C

    d

  2. Which of the following devices would you replace with switches to reduce traffic on the first-floor segment?
    1. Hub A
    2. Router A
    3. Router A and Hub A
    4. Routers A, B, and C

    a

  3. Which of the following devices would you replace with switches to create a single broadcast domain for the entire network?
    1. Router B and Hub B
    2. Routers A, B, and C
    3. Hubs A, B, and C
    4. Routers A, B, and C, and Hubs A, B, and C

    b

Lesson Review

  1. The functionality of a switch is best described as being a combination of what two devices?
    1. A router and a gateway
    2. A hub and a bridge
    3. A bridge and a router
    4. A repeater and a hub

    c

  2. Which of the following effects is a result of replacing the routers in a segment/backbone network with switches?
    1. The speed of the network increases.
    2. The traffic on the backbone increases.
    3. The number of LANs increases.
    4. The bandwidth available to workstations increases.

    d

  3. When you use switches instead of routers and hubs, what is the effect on the number of collisions on the network?
    1. Increases
    2. Decreases
    3. Stays the same

    b

  4. When you replace the routers on an internetwork consisting of three segments connected by one backbone with switches, how many broadcast domains do you end up with?
    1. None
    2. One
    3. Three
    4. Four

    b

  5. What type of switch immediately relays signals from the incoming port to the outgoing port?
    1. A cut-through switch
    2. A shared memory switch
    3. A bus architecture switch
    4. A store-and-forward switch

    a

  6. On a switched network, VLANs are used to create multiples of what?
    1. Collision domains
    2. Broadcast domains
    3. Internetworks
    4. All of the above

    b

  7. Which of the following devices does not have buffers to store data during processing?
    1. A repeating hub
    2. A local bridge
    3. A cut-through switch
    4. All of the above

    d

Lesson 3: Routing

Exercise 1: Segmenting a Network

You are the network administrator responsible for a 10-Mbps Ethernet LAN that consists of 45 computers connected to three standard repeating hubs. In recent weeks, you've received complaints that the network's performance is diminished during certain hours of the day. When you monitor the network, you notice that traffic levels have increased substantially, as have the number of collisions occurring on the network. Having determined that this is the source of the problem, answer the following questions.

  1. Which of the following courses of action is the most inexpensive way to reduce the overall traffic level on the network?
    1. Split the network into three LANs and connect them using dedicated hardware routers.
    2. Replace the three hubs with switches.
    3. Install a transparent bridge between two of the hubs.
    4. Upgrade the network to 100 Mbps by installing Fast Ethernet NICs and hubs.

    c

  2. Which of the following courses of action would not increase the bandwidth available to each workstation?
    1. Split the network into three LANs and connect them using dedicated hardware routers.
    2. Replace the three hubs with workgroup switches.
    3. Install a transparent bridge between two of the hubs.
    4. Upgrade the network to 100 Mbps by installing Fast Ethernet NICs and hubs.

    a

  3. Which of the following courses of action would completely eliminate the shared network medium from the network?
    1. Split the network into three LANs and connect them using dedicated hardware routers.
    2. Replace the three hubs with workgroup switches.
    3. Install a transparent bridge between two of the hubs.
    4. Upgrade the network to 100 Mbps by installing Fast Ethernet NICs and hubs.

    b

  4. Which of the following courses of action would increase network performance without reducing the number of collisions?
    1. Split the network into three LANs and connect them using dedicated hardware routers.
    2. Replace the three hubs with workgroup switches.
    3. Install a transparent bridge between two of the hubs.
    4. Upgrade the network to 100 Mbps by installing Fast Ethernet NICs and hubs.

    d

Lesson Review

  1. At what layer of the OSI reference model do routers operate?
    1. Physical
    2. Data-link
    3. Network
    4. Transport

    c

  2. Multiples of what are created by connecting several LANs with routers?
    1. Collision domains
    2. Broadcast domains
    3. Subnets
    4. All of the above

    d

  3. What is the term for information in a routing table that specifies the relative efficiency of a particular route?
    1. Metric
    2. Static route
    3. Dynamic route
    4. Hop

    a

  4. With which of the following techniques are routing protocols associated?
    1. WAN routing
    2. Static routing
    3. Dynamic routing
    4. All of the above

    c

  5. What is the term for a group of LANs in one building connected by routers?
    1. A WAN
    2. A broadcast domain
    3. A collision domain
    4. An internetwork

    d

  6. Which of the following devices are you most likely to use to connect a LAN to the Internet?
    1. A hub
    2. A bridge
    3. A switch
    4. A router

    d

  7. ICS enables a computer running Windows to function as what?
    1. A hub
    2. A bridge
    3. A switch
    4. A router

    d

  8. Which of the following processes requires manual intervention from a network administrator?
    1. Transparent bridging
    2. Source route bridging
    3. Static routing
    4. Dynamic routing

    c

  9. Which of the following devices does not read the data-link layer protocol header in incoming packets?
    1. A hub
    2. A bridge
    3. A switch
    4. A router

    a

Chapter 4: Networking Software

Lesson 1: Network Operating Systems

Exercise 1: Network Operating System Products

Match the network operating system in the left column with the phrase in the right column that best describes it.

  1. Linux
  2. Windows NT
  3. Macintosh
  4. UNIX System V
  5. NetWare 3.x
  6. Windows 2000
  1. Uses a bindery to store user accounts
  2. Current version of the original AT&T UNIX
  3. Available in Server, Advanced Server, and Datacenter versions
  4. First version of Windows not based on MS-DOS
  5. Originally used a proprietary data-link layer protocol
  6. Open source UNIX version

1. f

2. d

3. e

4. b

5. a

6. c

Lesson review

  1. What is name of the Windows NT and Windows 2000 file system that enables administrators to assign permissions to individual files?
    1. Active Directory
    2. NDS
    3. FAT
    4. NTFS

    d

  2. Which of the following services on a Windows NT or Windows 2000 network is responsible for configuring TCP/IP clients?
    1. DNS
    2. WINS
    3. DHCP
    4. IIS

    c

  3. Which of the following network operating systems is generally considered to be the best application server platform?
    1. Windows NT
    2. UNIX
    3. Windows 2000
    4. Novell NetWare

    b

  4. What is a program called that runs in the background on a UNIX system?
    1. A service
    2. A daemon
    3. An application
    4. A domain

    b

  5. What is the name of the Windows NT and Windows 2000 service that maintains a list of shared resources on the network?
    1. Server
    2. Client
    3. Computer Browser
    4. Messenger

    c

Lesson 2: Network Clients

Exercise 1: Client Connection Troubleshooting

  1. On a network with two NetWare 5.1 servers using the IPX protocols and NDS and 10 Windows 98 workstations running both IPX and TCP/IP, one of the workstations can't access either of the servers, but the other nine workstations can. Which of the following are possible causes of the problem?
    1. The workstation experiencing the problem doesn't have a NetWare client installed.
    2. The NetWare servers have the wrong protocols installed.
    3. The user at the workstation experiencing the problem doesn't have the permissions needed to access the NetWare servers.
    4. The workstation experiencing the problem is running only IPX.
    5. None of the above.

    a and c

  2. On the same network described in Question 1, one of the Windows 98 workstations can access one NetWare server, but not the other. All of the other workstations can access both servers. Which of the following are possible causes of the problem?
    1. The workstation experiencing the problem doesn't have a NetWare client installed.
    2. The one server that the workstation cannot access is running the wrong protocols.
    3. The user at the workstation experiencing the problem has failed to authenticate to NDS.
    4. The workstation experiencing the problem is running the wrong protocols.
    5. None of the above.

    e

Lesson Review

  1. What is the protocol traditionally associated with NetWare networking?
    1. NetBEUI
    2. IPX
    3. TCP/IP
    4. Ethernet

    b

  2. What is the Windows component that enables an application to access a network resource in the same way as a local one?
    1. A redirector
    2. A protocol
    3. A client
    4. A service

    a

  3. Which of the following Windows network components is not required for client functionality?
    1. A redirector
    2. A service
    3. A protocol
    4. A network interface adapter driver

    b

  4. What is the most important reason for a network administrator to use a Novell client for NetWare rather than Microsoft's NetWare client?
    1. Novell's client includes a genuine version of the IPX protocols.
    2. Novell's client is faster than Microsoft's.
    3. Novell's client is less expensive than Microsoft's.
    4. Novell's client includes the NetWare Administrator application.

    d

  5. Which of the following Windows 2000 networking modules do you not install from the Network And Dial-Up Connections dialog box?
    1. Network interface adapter drivers
    2. Clients
    3. Protocols
    4. Services

    a

  6. Which network clients are included with Windows 2000 Professional?
    1. Client Service for NetWare
    2. Gateway Service for NetWare
    3. Client for Microsoft Networks
    4. Client Service for UNIX

    a and c

Lesson 3: Directory Services

Exercise 1: Directory Service Concepts

Match the directory service concepts in the left column with the correct descriptions in the right column.

  1. Schema
  2. Partition
  3. Multiple master replication
  4. Windows NT domain
  5. Leaf object
  1. Represents a network resource
  2. Uses single-word domain names
  3. Enables administrators to apply updates to the directory service on any domain controller
  4. Determines the types of objects in a directory service
  5. Used to split a directory service database into pieces stored on different servers

1. d

2. e

3. c

4. b

5. a

Lesson Review

  1. Which directory service requires users to have a separate account for each server?
    1. Windows NT domains
    2. Active Directory
    3. NetWare bindery
    4. NDS

    c

  2. What provides communication between Windows NT domains?
    1. Trust relationships
    2. Single master replication
    3. Multiple master replication
    4. Partitioning

    a

  3. On an Active Directory network, a forest is composed of multiples of what?
    1. Servers
    2. Partitions
    3. Forests
    4. Domains

    d

  4. What determines what types of objects you can create in an NDS tree?
    1. Number of partitions
    2. Directory schema
    3. Number of containers
    4. X.500 directory service

    b

  5. Which of the following terms does not describe the trust relationships between Active Directory domains in the same tree?
    1. Transitive
    2. Bidirectional
    3. Automatic
    4. Single master

    d

  6. Which of the following ITU standards is the basis for NDS and Active Directory?
    1. X.25
    2. X.400
    3. X.500
    4. X.5

    c

  7. Which of the following directory services uses multiword names for its domains?
    1. NetWare bindery
    2. NDS
    3. Windows NT domains
    4. Active Directory

    d

  8. What is splitting an NDS tree into pieces and storing those pieces on different servers called?
    1. Replication
    2. Partitioning
    3. Establishing trust relationships
    4. Creating a tree

    b

  9. Which of the following is not a true statement?
    1. Containers are composed of objects.
    2. Trees are composed of domains.
    3. Objects are composed of attributes.
    4. Forests are composed of trees.

    a

Chapter 5: Data-Link Layer Protocols

Lesson 1: Ethernet

Exercise 1: CSMA/CD Procedures

Place the following steps of the CSMA/CD transmission process in the proper order.

  1. System begins transmitting data
  2. System retransmits data
  3. System detects incoming signal on receive wires
  4. System backs off
  5. System listens to the network
  6. System stops transmitting data
  7. System transmits jam pattern
  8. System detects no network traffic

    5, 8, 1, 3, 6, 7, 4, 2

Lesson Review

  1. What does an Ethernet system generate when it detects a collision?
    1. A beacon frame
    2. An error message
    3. A jam signal
    4. None of the above

    c

  2. Which of the following is not a required component of a 10Base-T Ethernet network?
    1. Network interface adapters or NICs
    2. Cables
    3. A hub
    4. Computers

    c

  3. To achieve 100 Mbps speed over Category 3 cable, 100Base-T4 Ethernet uses which of the following?
    1. PAM-5 signaling
    2. Quartet signaling
    3. CSMA/CD
    4. All four wire pairs

    d

  4. In which of the following standards is Gigabit Ethernet defined?
    1. IEEE 802.2
    2. IEEE 802.3
    3. IEEE 802.3u
    4. IEEE 802.3z

    d

  5. List the hardware components that you have to replace when upgrading a 10-year-old 10Base-T network to 100Base-TX.

    NICs, hubs, and cable (because a 10-year old network is most likely using Category 3 cable, and Category 5 cable is required for 100Base-TX).

  6. How could you upgrade a 10-year-old 10Base-T network to Fast Ethernet without replacing the cables?

    Use 100Base-T4 NICs and hubs.

  7. Which Fast Ethernet physical layer option is best suited for a connection between two campus buildings 200 meters apart? Why?

    100Base-FX, because fiber optic cable is better suited to outdoor installations and because the Fast Ethernet UTP cable options are all restricted to cable segments no longer than 100 meters.

  8. Which of the following is a valid MAC address?
    1. 00:B0:A1:8C:32:65:BB
    2. 01:DB:7F:86:E4:6G
    3. 00:D0:B7:AD:1A:7B
    4. 03:BC:5A:E6:E4

    c

Lesson 2: Token Ring

Exercise 1: IEEE Standards and Technologies

Match the standard in the left column with the most suitable technology in the right column.

  1. IEEE 802.2
  2. IEEE 802.3
  3. IEEE 802.3u
  4. IEEE 802.3z
  5. IEEE 802.3ab
  6. IEEE 802.5
  7. DIX Ethernet
  8. DIX Ethernet II
  1. Gigabit Ethernet
  2. Fast Ethernet
  3. Thick Ethernet
  4. LLC
  5. 10Base-T
  6. Thin Ethernet
  7. 1000Base-T
  8. Token Ring

1. d

2. e

3. b

4. a

5. g

6. h

7. c

8. f

Exercise 2: Selecting a Data-Link Layer Protocol

For each of the following scenarios, specify which data-link layer protocol you think is preferable, Ethernet or Token Ring, and give reasons why. In some cases, either protocol would be suitable; the reasons you provide are more significant than the protocol you select.

  1. A family with two computers in the home wants to network them to share a printer and an Internet connection.

    Ethernet is preferable in this case because the family's networking requirements are light and not likely to generate a large amount of traffic, the hardware required is much cheaper, and you can even connect the two systems directly using a crossover cable instead of a hub.

  2. A small graphics design firm wants to build a 10-node network to handle the extremely large image files that they must transfer between systems and to a print server.

    Token Ring is an option here, because the large image files generate lots of network traffic, and Token Ring doesn't diminish in performance as traffic levels increase. However, Ethernet could also work because the firm could install Fast Ethernet running at 100 Mbps versus Token Ring's 16 Mbps, and because there are only 10 systems on the network, which results in fewer collisions than a network with 20 systems generating the same amount of traffic.

  3. A company with a 50-node LAN used by its order entry staff will be going public in the near future and is expected to grow enormously over the next year.

    Although Token Ring would work, particularly because of its ability to handle high traffic levels, Ethernet provides more flexible upgrade options. The company can increase the bandwidth available to each system by upgrading the network from regular to Fast Ethernet or by installing bridges or switches.

Lesson Review

  1. The Frame Check Sequence field in a data-link layer protocol header is used for _________________.

    Error correction

  2. Which data-link layer protocol is preferred on a network with high levels of traffic, Ethernet or Token Ring? Why?

    Token Ring is preferable because it can handle high traffic levels without diminished performance. Ethernet experiences more collisions as traffic levels increase, causing performance to degrade.

  3. Which of the following Token Ring cables has both IDC and DB-9 connectors?
    1. A Type 3 cable
    2. A patch cable
    3. A lobe cable
    4. A token cable

    c

  4. Most Token Ring networks today run at what speed?
    1. 4 Mbps
    2. 16 Mbps
    3. 100 Mbps
    4. 1000 Mbps

    b

  5. A Token Ring system that is waiting to capture a free token is said to be in what mode?
    1. Transmit mode
    2. Passive mode
    3. Repeat mode
    4. Stripping mode

    c

Lesson 3: FDDI

Exercise 1: FDDI Concepts

Match the acronyms in the left column with the correct definitions in the right column.

  1. DAS
  2. DAC
  3. SAS
  4. CDDI
  5. SMT
  1. A version of FDDI that uses copper cable
  2. A computer connected to a FDDI network using the star topology
  3. A FDDI frame that performs ring management functions
  4. The hub used in a FDDI star network
  5. A computer connected to both rings of a double ring

1. e

2. d

3. b

4. a

5. c

Lesson Review

  1. A FDDI double ring network that has experienced a cable failure is called what?
    1. A wrapped ring
    2. A truncated ring
    3. A bifurcated ring
    4. A dual ring of trees

    a

  2. Which FDDI physical layer option supports the longest network segments?
    1. The double ring topology
    2. The star topology
    3. Singlemode fiber optic
    4. Multimode fiber optic

    c

  3. Which of the following fields identifies the type of data carried in a FDDI data frame?
    1. Starting Delimiter
    2. Frame Control
    3. Source Address
    4. Frame Check Sequence

    b

Lesson 4: Wireless Networking

Exercise 1: IEEE 802.11 Concepts

Match the concepts in the left column with the correct definitions in the right column.

  1. Extension point
  2. BSS
  3. Base station
  4. DS
  1. An access point
  2. A backbone connecting access points
  3. Another term for a cell
  4. A repeater for wireless signals

1. d

2. c

3. a

4. b

Lesson Review

  1. What MAC mechanism does an IEEE 802.11 network use?
    1. DSSS
    2. FHSS
    3. CSMA/CA
    4. CSMA/CD

    c

  2. Which of the following terms describes a wireless LAN that does not use access points?
    1. Infrastructure
    2. Distribution
    3. Ad hoc
    4. Basic

    c

  3. Which of the following is not a physical layer option supported by IEEE 802.11?
    1. DSSS
    2. Infrared
    3. BSS
    4. FHSS

    c

Chapter 6: Network Layer Protocols

Lesson 1: IP

Exercise 1: IP Functions

Match the IP functions in the left column with the descriptions in the right column.

  1. Fragmentation
  2. Encapsulation
  3. Routing
  4. Protocol identification
  5. Addressing
  1. Uses assigned numbers
  2. The primary function of intermediate systems
  3. Generates datagrams
  4. Uses 32-bit values
  5. Used when transmitting over a network with a smaller MTU

1. e

2. c

3. b

4. a

5. d

Lesson Review

  1. What does the IP header's Protocol field identify?
    1. The physical layer specification of the network that will carry the datagram
    2. The data-link layer protocol that will carry the datagram
    3. The transport layer protocol that generated the information in the Data field
    4. The application that generated the message carried in the datagram

    c

  2. Which of the following IP header elements is never modified during the IP fragmentation process?
    1. The Identification field
    2. The More Fragments bit
    3. The Fragment Offset field
    4. The TimeTo Live field

    a

  3. What does an IP address identify?
    1. A network
    2. A computer
    3. A network interface adapter
    4. A network and a network interface adapter

    d

  4. Which IP header field makes the Traceroute utility possible?
    1. Version
    2. Type Of Service
    3. Identification
    4. Time To Live

    d

  5. Which two protocols carried within IP datagrams operate at the transport layer of the OSI model?
    1. IMCP
    2. TCP
    3. UDP
    4. IGMP

    b and c

Lesson 2: IPX

Exercise 1: IPX Properties

Match the IPX header fields in the left column with the appropriate functions in the right column.

  1. Transport Control
  2. Source Socket
  3. Destination Network Address
  4. Checksum
  5. Source Hardware Address
  1. Contains a value assigned by the network administrator or the NetWare installation program
  2. Always contains the value FFFF
  3. Has a maximum value of 16
  4. Contains a 6-byte value
  5. Identifies the application that generated the packet

1. c

2. e

3. a

4. b

5. d

Lesson Review

  1. In the IP header, the IPX equivalent to the TTL field is called what?
    1. Packet Type
    2. Transport Control
    3. Checksum
    4. Source Socket

    b

  2. Which of the following statements about IPX is untrue?
    1. IPX routes datagrams between different types of networks.
    2. IPX has its own network addressing system.
    3. IPX uses a checksum to verify the proper transmission of data.
    4. The IPX header is larger than the IP header.

    c

  3. How many bytes long is the information that IPX uses to identify the datagram's destination computer on a particular network?
    1. 2
    2. 4
    3. 6
    4. 10

    d

  4. What is the maximum number of routers that an IPX datagram can pass through on the way to its destination?
    1. 0
    2. 16
    3. 128
    4. 256

    b

Lesson 3: NetBEUI

Exercise 1: NBF Protocols

For each of the NBF message types listed, specify which of the four NBF protocols—NMP, SMP, UDP, or DMP— is primarily associated with it.

  1. Datagram Broadcast
  2. Data First Middle
  3. Name Query
  4. Status Response
  5. Add Name Response

1. UDP

2. SMP

3. NMP

4. DMP

5. NMP

Lesson Review

  1. How does a NetBEUI network prevent two systems from using the same NetBIOS name?

    By registering names using NMP messages.

  2. Give two reasons why NetBEUI is not suitable for use on a large internetwork.

    It is not suitable because it lacks the network identifiers needed to route packets between networks, and it generates a large amount of broadcast traffic.

  3. Place the following phases of a NetBEUI Frame session in the proper order:
    1. Session Alive
    2. Session Initialize
    3. LLC session establishment
    4. Name resolution
    5. Session End
    6. Session Confirm

    d, c, b, f, a, e

  4. Which of the following protocols is capable of providing connection-oriented service?
    1. IP
    2. IPX
    3. NetBEUI
    4. None of the above

    c

Lesson 4: AppleTalk

Exercise 1: Choosing a Network Layer Protocol

Specify which network layer protocol you would use on each of the following networks, and explain why.

  1. A private internetwork with mixed Windows and NetWare systems

    IPX, because NetWare requires it

  2. A two-node home Windows-based network with individual dial-up Internet connections

    NetBEUI, because it's easier to install and configure

  3. A 10-node Windows-based network with a router connecting it to the Internet

    TCP/IP, because it's required to connect to the Internet

  4. A five-node Macintosh network that is not connected to the Internet

    AppleTalk, because it provides simplified network access for Macintosh systems

Lesson Review

  1. Which of the following network layer protocols is not routable?
    1. IP
    2. IPX
    3. NetBEUI
    4. DDP

    c

  2. Which of the following DDP fields identifies the upper layer protocol that generated the information in the data field?
    1. Source Socket Number
    2. Checksum
    3. Source Address
    4. DDP Type

    d

  3. A LocalTalk network transmits data at what speed?
    1. 56 Kbps
    2. 230 Kbps
    3. 10 Mbps
    4. 16 Mbps

    b

Chapter 7: Transport Layer Protocols

Lesson 1: TCP and UDP

Exercise 1: TCP Header Fields

Match the TCP header field in the left column with the correct description in the right column.

  1. Source Port
  2. Sequence Number
  3. Checksum
  4. Window
  5. Urgent Pointer
  6. Data Offset
  7. Destination Port
  8. Acknowledgment Number
  9. Control Bits
  10. Data
  1. Specifies how many bytes the sender can transmit
  2. Specifies the number of bytes in the sequence that have been successfully transmitted
  3. Specifies the functions of messages used to initiate and terminate connections
  4. Contains information for the application layer
  5. Specifies which of the bytes in the message should receive special treatment from the receiving system
  6. Identifies the application or protocol that generated the data carried in the TCP message
  7. Used to reassemble segments that arrive at the destination out of order
  8. Specifies the length of the TCP header
  9. Contains error detection information
  10. Specifies the application that will make use of the data in the message

1. f

2. g

3. i

4. a

5. e

6. h

7. j

8. b

9. c

10. d

Exercise 2: TCP and UDP Functions

Specify whether each of the following statements describes TCP, UDP, or both.

  1. It provides flow control.
  2. It is used for DNS communications.
  3. It detects transmission errors.
  4. It is used to carry DHCP messages.
  5. It divides data to be transmitted into segments.
  6. It acknowledges transmitted messages.
  7. It is used for Web client/server communications.
  8. It requires a connection establishment procedure.
  9. It contains a Length field.
  10. It uses a pseudo-header in its checksums.

a. TCP

b. Both

c. Both

d. Both

e. TCP

f. Both

g. TCP

h. TCP

i. UDP

j. Both

Lesson Review

  1. In TCP, what does "delayed acknowledgment" mean?
    1. A predetermined time interval must pass before the receiving system can acknowledge a data packet.
    2. Data segments are not acknowledged until the entire sequence has been transmitted.
    3. The receiving system doesn't have to generate a separate acknowledgment message for every segment.
    4. A data segment must be acknowledged before the next segment is transmitted.

    c

  2. What does the Data Offset field in the TCP header specify?
    1. The length of the TCP header
    2. The location of the current segment in the sequence
    3. The length of the Data field
    4. The checksum value used for error detection

    a

  3. What is the combination of an IP address and a port number called?
    1. A sequence number
    2. A checksum
    3. A data offset
    4. A socket

    d

  4. Which of the following TCP/IP systems uses an ephemeral port number?
    1. The client
    2. The server
    3. The system initiating the TCP connection
    4. The system terminating the TCP connection

    a

  5. What flag does the first message transmitted in any TCP connection contain?
    1. ACK
    2. SYN
    3. FIN
    4. PSH

    b

  6. What TCP header field provides flow control?
    1. Window
    2. Data Offset
    3. Acknowledgment
    4. Sequence Number

    a

  7. Which of the following services does the UDP protocol provide?
    1. Flow control
    2. Guaranteed delivery
    3. Error detection
    4. None of the above

    c

Lesson 2: SPX and NCP

Lesson Review

  1. Which of the following is not true of the SPX protocol?
    1. It is connection-oriented.
    2. It operates at the transport layer only.
    3. Clients use it to access server files.
    4. It provides flow control.

    c

  2. At which layers of the OSI reference model does the NCP provide functions?

    The transport, session, presentation, and application layers

  3. Which of the following protocols requires the receiving system to transmit a separate acknowledgment message for each packet received?
    1. IPX
    2. SPX
    3. NCP
    4. NCPB

    c

Chapter 8: TCP/IP Fundamentals

Lesson 1: TCP/IP Protocols

Exercise 1: TCP/IP Layers and Protocols

Specify the layer of the TCP/IP protocol stack at which each of the following protocols operates:

  1. DHCP

    Application

  2. ARP

    Link or internet (either is correct)

  3. IP

    Internet

  4. UDP

    Transport

  5. POP3

    Application

  6. ICMP

    Internet

  7. SMTP

    Application

  8. TCP

    Transport

  9. DNS

    Application

  10. SLIP

    Link

Exercise 2: TCP/IP Protocols

Match each of the protocols in the left column with its appropriate description in the right column.

  1. DHCP
  2. ARP
  3. IP
  4. POP3
  5. SNMP
  6. ICMP
  7. TCP
  8. DNS
  9. PPP
  10. SMTP
  1. Transmits e-mail messages between servers
  2. Routes datagrams to their final destination
  3. Provides connection-oriented service at the transport layer
  4. Resolves host names into IP addresses
  5. Connects two systems at the link layer
  6. Converts IP addresses into hardware addresses
  7. Automatically configures TCP/IP clients
  8. Provides communications between e-mail clients and servers
  9. Carries network management data to a central console
  10. Carries error messages from routers to end systems

1. g

2. f

3. b

4. h

5. i

6. j

7. c

8. d

9. e

10. a

Lesson Review

  1. Which of the following fields is blank in an ARP Request message?
    1. Sender Hardware Address
    2. Sender Protocol Address
    3. Target Hardware Address
    4. Target Protocol Address

    c

  2. Which ICMP message type is the basis for the Traceroute utility?
    1. Echo Request
    2. Time To Live Exceeded In Transit
    3. Host Unreachable
    4. Fragment Reassembly Time Exceeded

    b

  3. Why are ARP Request messages transmitted as broadcasts?

    They are transmitted as broadcasts because the system doesn't have the destination hardware address needed to send it as a unicast.

  4. Which ICMP message type performs a rudimentary form of flow control?
    1. Source Quench
    2. Router Solicitation
    3. Redirect
    4. Echo Request

    a

  5. Which of the following fields in an ARP Reply message contains a value supplied by the system transmitting the message?
    1. Sender Hardware Address
    2. Sender Protocol Address
    3. Target Hardware Address
    4. Target Protocol Address

    a

  6. How does ARP minimize the number of broadcasts it generates?

    It does so by caching resolved hardware addresses

  7. Which application layer protocol uses two port numbers at the server?
    1. SMTP
    2. HTTP
    3. DHCP
    4. FTP

    d

Lesson 2: IP Addressing

Exercise 1: Variable-Length Subnetting

Specify the subnet mask value you would use for each of the following network configurations:

  1. A Class C network address with a 2-bit subnet identifier

    255.255.255.192

  2. A Class A network address with a 16-bit host identifier

    255.255.0.0

  3. A Class B network address with a 6-bit subnet identifier

    255.255.252.0

  4. A Class A network address with a 21-bit host identifier

    255.224.0.0

  5. A Class B network with a 9-bit host identifier

    255.255.254.0

Lesson Review

  1. Which IP address class provides for the largest number of hosts?
    1. Class A
    2. Class B
    3. Class C
    4. All three classes provide the same number of hosts.

    a

  2. What kind of IP address must a system have to be visible from the Internet?
    1. Subnetted
    2. Registered
    3. Class A
    4. Binary

    b

  3. Which of the following statements about subnet masks is not true?
    1. Subnet masks can have the same range of values as IP addresses.
    2. The subnet mask specifies which bits of an IP address are the network identifier and which bits are the host identifier.
    3. The dividing line between network bits and host bits can fall anywhere in a subnet mask.
    4. Subnet masks are assigned by the IANA, but can be modified by network administrators.

    a

Chapter 9: TCP/IP Routing

Lesson 1: Routing Principles

Exercise 1: Routing Tables

Place the following steps of the routing table search process in the proper order.

  1. Default gateway search
  2. Host address search
  3. Network address search

    2, 3, 1

Lesson Review

  1. What type of route does a packet in which the Destination IP Address and the data-link layer Destination Address values refer to different computers use?
    1. The default gateway
    2. A direct route
    3. The default route
    4. An indirect route

    d

  2. What is a TCP/IP system with interfaces to two different networks called?
    1. A bridge
    2. Multihomed
    3. A switch
    4. All of the above

    b

  3. In a Windows routing table, what column contains the address of the router that should be used to reach a particular network or host?
    1. Network Destination
    2. Netmask
    3. Gateway
    4. Interface

    c

  4. What does a router do when it fails to find a routing table entry for a particular network or host?

    It uses the default gateway entry.

  5. In a Windows routing table, what is the Network Destination value for the default gateway entry?
    1. 0.0.0.0
    2. The address of the network to which the router is connected
    3. 255.255.255.255
    4. The address of the router's network interface

    a

Lesson 2: Building Routing Tables

Exercise 1: Static and Dynamic Routing

Specify whether each of the following terms is associated with static routing, dynamic routing, both, or neither.

  1. Routed

    Dynamic

  2. Default gateway

    Both

  3. Convergence

    Dynamic

  4. ROUTE.EXE

    Static

  5. Link-state routing

    Dynamic

  6. Routing and Remote Access

    Both

  7. Distance vector routing

    Dynamic

  8. ROUTE ADD

    Static

  9. Autonomous system

    Dynamic

  10. Metric

    Dynamic

Lesson Review

  1. Which of the following is not a dynamic routing protocol?
    1. OSPF
    2. RIP
    3. ICMP
    4. EGP

    c

  2. What is the name for the use of metrics based on the number of hops between a source and a destination?
    1. Distance vector routing
    2. Loose source routing
    3. Link-state routing
    4. OSPF routing

    a

  3. What is the primary difference between OSPF and RIP?

    OSPF uses link-state routing, and RIP uses distance vector routing.

  4. Which of the following fields is not included in a RIP version 1 route?
    1. Metric
    2. Subnet mask
    3. IP address
    4. Address Family Identifier

    b

  5. What is the primary criticism leveled at RIP?

    It generates excessive amounts of broadcast traffic that consumes network bandwidth.

  6. What is the name of the process of updating routing tables to reflect changes in the network?
    1. Divergence
    2. Link-state routing
    3. Minimal routing
    4. Convergence

    d

  7. On a Windows system, what command do you use to display the contents of the routing table?

    ROUTE PRINT

  8. The Next Hop IP Address in a RIP version 2 route ends up in which column of a Windows routing table?
    1. Network Destination
    2. Netmask
    3. Gateway
    4. Interface

    c

Chapter 10: TCP/IP Applications

Lesson 1: TCP/IP Services

Exercise 1: DHCP Message Types

  1. Place the following DHCP message types in the order in which a successful IP address assignment procedure uses them.
    1. DHCPACK
    2. DHCPOFFER
    3. DHCPREQUEST
    4. DHCPDISCOVER

    d, b, c, a

  2. Place the following DHCP message types in the proper order for an unsuccessful attempt to renew an IP address lease.
    1. DHCPDISCOVER
    2. DHCPREQUEST (broadcast)
    3. DHCPREQUEST (unicast)
    4. DHCPNAK

    c, b, d, a

Lesson Review

  1. What does the first word in a full DNS name identify?
    1. The top-level domain
    2. The second-level domain
    3. The DNS server
    4. The host

    d

  2. What happens to a DHCP client when its attempts to renew its IP address lease fail and the lease expires?

    TCP/IP communication stops and the computer begins the process of negotiating a new lease.

  3. Which of the following message types is not used during the DHCP lease assignment process?
    1. DHCPDISCOVER
    2. DHCPRELEASE
    3. DHCPOFFER
    4. DHCPREQUEST

    b

  4. What is the DNS resource record type that contains the basic name-to-address mapping used for name resolution?
    1. Address
    2. Pointer
    3. Canonical Name
    4. Start of Authority

    a

  5. What is the name of the DNS domain that contains address-to-name mappings?

    in-addr.arpa

  6. Name one method other than WINS that computers running Windows can use to resolve NetBIOS names into IP addresses.

    They can use broadcasts or an LMHOSTS file.

  7. What is the name of the time during the lease renewal process when a DHCP client begins broadcasting DHCPREQUEST messages?
    1. Lease identification cookie
    2. Rebinding time value
    3. Renewal time value
    4. Init value

    b

  8. What is the function of a WINS server?
    1. To convert IP addresses into hardware addresses
    2. To convert host names into IP addresses
    3. To convert IP addresses into host names
    4. To convert NetBIOS names into IP addresses

    d

Lesson 2: TCP/IP Utilities

Exercise 1: TCP/IP Utilities

Match the utilities in the left column with their functions in the right column.

  1. FTP
  2. IPCONFIG.EXE
  3. TRACERT.EXE
  4. Ping
  5. Telnet
  6. Netstat
  7. WINIPCFG.EXE
  8. NBTSTAT.EXE
  9. ARP.EXE
  10. ifconfig
  1. Provides remote control access to a UNIX system
  2. Displays TCP/IP configuration on a Windows 98 system
  3. Creates cache entries containing IP and hardware addresses
  4. Configures the network interface on a UNIX system
  5. Tests communications between two computers
  6. Transfers files between two computers
  7. Displays network traffic statistics
  8. Lists the routers forwarding packets to a particular destination
  9. Releases and renews IP address assignments on Windows 2000
  10. Displays NetBIOS connection information

1. f

2. i

3. h

4. e

5. a

6. g

7. b

8. j

9. c

10. d

Lesson Review

  1. Which TCP/IP utility should you use to most easily identify which router on your internetwork is malfunctioning?
    1. IPCONFIG.EXE
    2. Ping
    3. Traceroute
    4. Netstat

    c

  2. Which of the following protocols does the ping program never use to carry its messages?
    1. Ethernet
    2. ICMP
    3. IP
    4. UDP

    d

  3. Which of the following commands displays the routing table on the local computer?
    1. Arp –r
    2. Netstat –r
    3. Nbtstat –r
    4. Telnet –r

    b

  4. Which command would you use to purge the local computer's NetBIOS name cache?
    1. Nbtstat –p
    2. Nbtstat –P
    3. Nbtstat –r
    4. Nbtstat –R

    d

Chapter 11: TCP/IP Configuration

Lesson 1: Installing the TCP/IP Protocols

Exercise 1: Microsoft TCP/IP Client Components

Specify whether each of the following is installed as part of the Microsoft TCP/IP client.

  1. The DHCP client

    Yes

  2. ROUTE.EXE

    Yes

  3. The WINS server

    No

  4. ICMP

    Yes

  5. The DNS resolver

    Yes

  6. SNMP

    No

  7. The DNS server

    No

  8. The WINS client

    Yes

  9. TRACERT.EXE

    Yes

  10. The Telnet server

    No

Lesson Review

  1. Which of the Windows 2000 Control Panel selections do you use to install the Microsoft TCP/IP client?

    Network And Dial-Up Connections

  2. When performing the TCP/IP installation procedure, what does the lack of a Local Area Connection icon indicate?
    1. There is no network interface adapter installed in the computer.
    2. There is no network interface adapter driver installed in the computer.
    3. The network to which the computer is connected does not support TCP/IP.
    4. There is no DHCP server on the network.

    b

  3. Which of the following components is not installed by default during the Windows 2000 setup process when a Plug and Play network interface adapter is present in the computer?
    1. The NetBEUI Protocol
    2. The Internet Protocol (TCP/IP) module
    3. Client for Microsoft Networks
    4. File and Printer Sharing for Microsoft Networks

    a

Lesson 2: Configuring TCP/IP

Exercise 1: TCP/IP Configuration Requirements

For each of the network scenarios listed, specify which of the following TCP/IP parameters (a, b, c, d, and/or e) you must configure to provide a computer running Windows 2000 with full communications capabilities.

  1. IP address
  2. Subnet mask
  3. Default gateway
  4. DNS server address
  5. WINS server address
  1. A private internetwork using Windows NT domains

    a, b, c, e

  2. A single peer-to-peer LAN

    a, b

  3. A corporate internetwork using Active Directory

    a, b, c, d

  4. A peer-to-peer LAN using a shared Internet connection

    a, b, d

  5. A Windows NT internetwork with a router connected to the Internet

    a, b, c, d, e

Lesson Review

  1. Which of the following IP security policies does not request the use of IPSec?
    1. Client
    2. Server
    3. Secure server
    4. All of the above

    a

  2. Which of the following services is not used on a Windows 2000 Active Directory network?
    1. DHCP
    2. WINS
    3. DNS
    4. IPSec

    b

  3. What is the function of a DNS suffix?

    Its function is to complete unqualified DNS names so that a DNS server can resolve them.

  4. Which utility can you use to specify a default gateway address?
    1. TRACERT.EXE
    2. ARP.EXE
    3. IPCONFIG.EXE
    4. ROUTE.EXE

    d

  5. Which of the following is a valid reason for assigning more than one IP address to a single network interface adapter?
    1. To balance the network traffic load between the addresses
    2. To support multiple subnets on one network
    3. To provide fault tolerance
    4. To support both TCP and UDP traffic

    b

  6. How many default gateway addresses does a computer need to function on a LAN?
    1. 0
    2. 1
    3. 2
    4. 3

    a

  7. At which of the following layers does the TCP/IP filtering option operate?
    1. Physical and data-link
    2. Application and session
    3. Data-link and network
    4. Network and transport

    d

  8. How does Windows 2000 supply a subnet mask for the IP address you specify?
    1. By performing a reverse DNS name resolution on the address
    2. By checking the values of the first three address bits
    3. By checking the HOSTS file
    4. By querying the directory service

    b

  9. What is the function of an LMHOSTS file?

    Its function is to resolve NetBIOS names into IP addresses.

Chapter 12: Remote Network Access

Lesson 1: Using Remote Connections

Exercise 1: Remote Connection Technologies

Specify which of the remote connection technologies (PSTN, ISDN, DSL, CATV, and/or satellite) discussed in this lesson are associated with each of the following concepts.

  1. Asymmetrical transfer rates

    DSL, CATV, satellite

  2. Uses standard telephone lines

    PSTN, ISDN, DSL

  3. Slowest of the connection types discussed

    PSTN

  4. Uses an NT-1

    ISDN

  5. Also called POTS

    PSTN

  6. Uses an ATU-R

    DSL

  7. Uses analog signals

    PSTN

  8. Shares bandwidth with other users

    CATV

  9. Uses a dial-up connection for traffic running in at least one direction

    PSTN, ISDN, satellite

  10. Requires the nearest central office to be relatively close by

    ISDN, DSL

Lesson Review

  1. To communicate with its host computer, a modem does not always need which of the following system resources?
    1. A serial port
    2. An IRQ
    3. A COM port
    4. An I/O port address

    a

  2. Why are cable modems and DSL modems not really modems?

    They are not really modems because they do not convert signals between analog and digital formats.

  3. Which of the DSL types is most commonly used to provide Internet access to end users?
    1. HDSL
    2. ADSL
    3. SDSL
    4. VDSL

    b

  4. An ISDN installation in the United States provides you with a connection using which interface?
    1. The Basic Rate Interface
    2. The S/T interface
    3. The U interface
    4. The Primary Rate Interface

    c

  5. Which of the following protocols can be transmitted through a PPTP tunnel?
    1. IP only
    2. IP and NetBEUI
    3. IP and IPX
    4. IP, IPX, and NetBEUI

    d

  6. Which of the following is not the name of an ISDN service?
    1. BRI
    2. 2B+D
    3. PRI
    4. IDSL

    d

  7. What three new hardware components are required to install CATV Internet access on the computer of an existing cable TV customer?

    The required components are a cable splitter, a cable modem, and a network interface card.

  8. Name one of the data-link layer protocols that computers can use with a PSTN connection.

    SLIP or PPP

  9. Which of the following UART chips enables a modem to achieve the best possible performance?
    1. 8250
    2. 16450
    3. 16550
    4. 16650

    c

  10. Which device enables you to use a computer with an ISDN connection?
    1. A terminal adapter
    2. An NT-1
    3. Terminal equipment
    4. A U interface

    a

Lesson 2: SLIP and PPP

Exercise 1: PPP Connection Establishment

Place the following steps of the PPP connection establishment process in the correct order.

  1. Link open
  2. Link termination
  3. Network layer protocol configuration
  4. Authentication
  5. Link quality monitoring
  6. Link establishment
  7. Link dead

7, 6, 4, 5, 3, 1, 2

Lesson Review

  1. What is the name of the protocol that systems use to negotiate options during the PPP connection establishment procedure?
    1. CHAP
    2. LCP
    3. PAP
    4. NCP

    b

  2. How large is the End Delimiter field used during SLIP communications?
    1. 1 byte
    2. 2 bytes
    3. 5 bytes
    4. 18 bytes

    a

  3. Which of the following connection elements are configured by the Link Control Protocol? (Choose three.)
    1. The network layer protocols to be used during the connection
    2. The authentication protocol to be used during the establishment of the connection
    3. The application layer protocols to be used to generate the data transmitted during the connection
    4. The link quality protocol to be used during the establishment of the connection

    a, b, and d

Lesson 3: WAN Technologies

Exercise 1: WAN Concepts

Match the WAN technologies in the left column with the appropriate concepts in the right column.

  1. Frame relay
  2. T1
  3. ATM
  4. SDH
  5. E3
  1. International equivalent of SONET
  2. Uses 53-byte cells
  3. Provides bursts of additional bandwidth
  4. Consists of 24 channels providing 64 Kbps of bandwidth each
  5. Runs at 34.368 Mbps

1. c

2. d

3. b

4. a

5. e

Lesson Review

  1. What is the name of the device that connects a leased line to a frame relay cloud?
    1. A CSU/DSU
    2. A FRAD
    3. A cell
    4. An OC3

    b

  2. For which of the following services do you negotiate a CBIR?
    1. T3
    2. E3
    3. ATM
    4. Frame relay

    d

  3. A SONET network uses which type of cable at the physical layer?
    1. UTP
    2. Shielded twisted pair
    3. Coaxial
    4. Fiber optic

    d

Chapter 13: Network Security

Lesson 1: Password Protection

Exercise 1: Password Policies

For each of the characteristics in the left column, specify which of the policies in the right column best applies to it.

  1. Specifies the number of logon attempts a user is permitted
  2. Requires passwords to contain at least six characters
  3. Prevents users from reusing the same passwords
  4. Prevents users from defeating the Enforce Password History policy
  5. Enables passwords to be recovered
  1. Enforce Password History
  2. Maximum Password Age
  3. Minimum Password Age
  4. Minimum Password Length
  5. Passwords Must Meet Complexity Requirements
  6. Store Password Using Reversible Encryption
  7. Account Lockout Threshold
  8. Account Lockout Duration
  9. Reset Account Lockout Counter After

1. g

2. e

3. a

4. c

5. f

Lesson Review

  1. Which of the following is not a password characteristic enforced by the Passwords Must Meet Complexity Requirements policy?
    1. Passwords cannot contain all or part of the account's user name.
    2. Passwords must be changed weekly.
    3. Passwords must be at least six characters long.
    4. Passwords must include numerals, symbols, or both.

    b

  2. What is the maximum length of an Active Directory password?
    1. 8 characters
    2. 14 characters
    3. 24 characters
    4. 104 characters

    d

  3. What does setting the Account Lock Threshold policy prevent intruders from using to penetrate your network security?
    1. Stolen passwords
    2. Illegal software
    3. The brute force method
    4. Unencrypted passwords

    c

Lesson 2: Security Models

Exercise 1: Security Levels

Specify whether each of the following statements applies to user-level security, share-level security, both, or neither.

  1. Requires a directory service

    Neither

  2. Uses the same password for all users

    Share-level security

  3. Provides variable degrees of access to shared network resources

    Both

  4. Stores passwords on individual computers

    Both

  5. Requires separate accounts

    User-level security

Lesson Review

  1. Where does a peer-to-peer network that uses user-level security store its security information?
    1. On a domain controller
    2. In a directory service
    3. On each individual computer on the network
    4. On a central server

    c

  2. Why does share-level security provide less protection than user-level security?

    It provides less protection because all users share the same passwords.

Lesson 3: Firewalls

Lesson Review

  1. Service-dependent packet filtering bases its decision to allow or deny access to a network based on what criterion?
    1. Port numbers
    2. IP addresses
    3. Hardware addresses
    4. Protocol identifiers

    a

  2. Which type of firewall operates at the application layer?

    A proxy server

  3. Network address translation operates at which layer of the OSI model?
    1. The data-link layer
    2. The network layer
    3. The transport layer
    4. The application layer

    b

  4. What is the main drawback to using proxy servers?

    You have to configure client applications to use the proxies.

  5. Where is a firewall typically located?
    1. At the boundary between your ISP's network and the Internet
    2. On your private network
    3. On the Internet
    4. At the boundary between your private network and your ISP's network

    d

Lesson 4: Security Protocols

Exercise 1: Security Protocols

Match the security protocols in the left column with the correct descriptions in the right column.

  1. Handshake Protocol
  2. ESP
  3. L2TP
  4. AH
  5. Kerberos
  1. Provides encryption for IPSec
  2. Encapsulates PPP frames in UDP datagrams
  3. Provides authentication services to Active Directory
  4. Provides authentication services for SSL
  5. Provides authentication services for IPSec

1. d

2. a

3. b

4. e

5. c

Lesson Review

  1. Which of the following protocols does L2TP use to encrypt VPN data?
    1. L2TP (itself)
    2. AH
    3. ESP
    4. SSL

    c

  2. What mode does IPSec use to secure LAN communications?
    1. AH mode
    2. Transport mode
    3. ESP mode
    4. Tunnel mode

    b

  3. Which of the following is the first element that a client receives as part of the Kerberos authentication process?
    1. A TGT
    2. A TGS
    3. A session key
    4. A server ticket

    a

Chapter 14: Planning the Network

Lesson 1: Determining Network Needs

Lesson Review

  1. Name three physical characteristics you should evaluate during your inspection of the network installation site.

    An administrator should evaluate distance between components, environmental conditions, and sources of interference.

  2. List five environmental factors that you should check while inspecting a network site.

    Temperature, humidity, overnight climate control, dust, and electrical power

  3. Which is the most practical network medium to use when connecting computers that are all fewer than 100 meters apart, but located in two buildings?
    1. Unshielded twisted pair cable
    2. Shielded twisted pair cable
    3. Fiber optic cable
    4. Wireless

    c

  4. Name two applications that can cause a network to require larger than normal amounts of bandwidth.

    Real-time data feeds and full-motion video

Lesson 2: Providing Fault Tolerance

Exercise 1: Data Availability Technologies

Which disk technology (mirroring, duplexing, spanning, or striping) applies to each of the following statements?

  1. Enables a server to survive a drive failure

    mirroring, duplexing

  2. Uses multiple hard drives to create a single logical hard drive

    mirroring, duplexing, spanning, striping

  3. Enables a server to survive a disk host adapter failure

    duplexing

  4. Stores a single file on multiple drives

    mirroring, duplexing, striping

  5. Causes an entire volume to be lost when one drive fails

    spanning, striping

Lesson Review

  1. Which of the following storage services is not provided by RAID?
    1. Data striping
    2. Tape backup
    3. Disk mirroring
    4. Error correction

    b

  2. What services does a cluster of servers provide that Novell's NetWare SFT III does not?

    A cluster of servers provides load balancing, distributed processing, and support for more than two systems.

  3. What additional hardware can you install to create redundant paths through the network?
    1. NICs
    2. Hubs
    3. Servers
    4. Routers

    d

Lesson 3: Collecting Essential Information

Lesson Review

  1. Name one method you can use to connect a network that uses private, unregistered IP addresses to the Internet.

    One possible method is network address translation (NAT), another is a proxy server.

  2. Which service do you use to assign IP addresses to your network workstations?
    1. DHCP
    2. DNS
    3. WINS
    4. NAT

    a

  3. What is the primary reason for developing standardized workstation configurations?

    It helps to simplify the process of supporting and troubleshooting the workstations later.

Chapter 15: Installing a Network

Lesson 1: Pulling Cable

Exercise 1: Internal and External Cabling

For each of the following network scenarios, state whether you would perform an internal or external cable installation, and give a reason why.

  1. A 10-node UTP network installed in a temporary office space by a seasonal business

    An external installation should be performed, because the cables can easily be removed when the network is disassembled and reused when the network is later reinstalled.

  2. A 100-node corporate UTP network being installed in a newly constructed office building

    An internal installation should be performed. The new construction simplifies the process of installing the data cables along with the telephone cables. The installation will gain the appearance and cable-integrity benefits at no additional cost.

  3. A 50-node Thick Ethernet network being moved to a new location

    An external installation should be performed, because the heaviness and inflexibility of the RG-8 coaxial cable make internal installations difficult.

Lesson Review

  1. Which of the following components is not required for an internal cable installation?
    1. A raceway
    2. A wall plate
    3. A patch panel
    4. A punchdown block tool

    a

  2. What components of an internal cable network do patch cables connect?
    1. Hubs to computers
    2. Computers to patch panels
    3. Wall plates to patch panels
    4. Patch panels to hubs

    d

  3. Why has Thick Ethernet cable rarely been installed internally?

    It is rarely installed internally because the cable itself is too heavy and inflexible.

Lesson 2: Making Connections

Exercise 1: Cable Installation Tools

Match the tools in the left column with the proper functions in the right column.

  1. Telepole
  2. Punchdown block tool
  3. Fish tape
  4. Raceway
  5. Crimper
  1. Used to attach male RJ-45 connectors to UTP cables
  2. Pulls cables up through walls
  3. Used to attach UTP cables to jacks
  4. Used to pull cable through drop ceilings
  5. Secures and protects external cable runs

1. d

2. c

3. b

4. e

5. a

Lesson Review

  1. Which tool do you use to make a patch cable?
    1. A pair of pliers
    2. A punchdown block tool
    3. A fish tape
    4. A crimper

    d

  2. What is the primary function of the twists in a twisted pair cable?
    1. They bundle the positive and negative wires together.
    2. They prevent the cables from catching fire.
    3. They protect the signals against crosstalk.
    4. They separate the wire pairs.

    c

  3. In a crossover cable, the TD– contact at one end is connected to which contact at the other end?
    1. TD+
    2. TD–
    3. RD+
    4. RD–

    d

  4. Which of the following is not a function of the punchdown block tool?
    1. To cut off the wire ends
    2. To strip the sheath off the cable
    3. To strip the insulation off the wires
    4. To push the wires down between the contacts

    b

  5. What is the name of the signal that a NIC exchanges with a hub?
    1. Link pulse
    2. Test wave
    3. Crossover circuit
    4. Punchdown block

    a

  6. Why should all your cable runs use the same wiring standard?
    1. Because Ethernet can only transmit signals over wires of a certain color
    2. Because the wires in a UTP cable are different gauges and carry signals differently
    3. To ensure that all of the connections are wired straight through
    4. To prevent crosstalk

    c

  7. What is the style of most jacks used today?
    1. 110
    2. 568A
    3. 568B
    4. RG-58

    a

Chapter 16: Network Maintenance

Lesson 1: Backups

Exercise 1: Incremental and Differential Backups

  1. If you back up your network by performing a full backup every Wednesday at 6:00 P.M. and differential backups in the evening on the other six days of the week, how many jobs would be needed to completely restore a computer with a hard drive that failed on a Tuesday at noon?

    Two

  2. If you back up your network by performing a full backup every Wednesday at 6:00 P.M., how many jobs would be needed if you performed incremental backups in the evening of the other six days of the week?

    Six

  3. For a complete restore of a computer that failed at noon on Tuesday, how many jobs would be needed if you performed full backups at 6:00 A.M. every Wednesday and Saturday and incremental backups at 6:00 A.M. every other day?

    Four

Lesson Review

  1. Which of the following types of backup jobs does not reset the archive bits of the files it backs up?
    1. Full
    2. Incremental
    3. Differential
    4. Supplemental

    c

  2. Which of the following is the criterion most commonly used to filter files for backup jobs?
    1. File name
    2. File extension
    3. File attributes
    4. File size

    c

  3. How does an autochanger increase the overall storage capacity of a backup solution?

    It increases capacity by automatically inserting and removing media from a drive.

  4. What are the three elements in the Grandfather-Father-Son media rotation system?
    1. Hard disk drives, CD-ROM drives, and magnetic tape drives
    2. Incremental, differential, and full backup jobs
    3. Monthly, weekly, and daily backup jobs
    4. QIC, DAT, and DLT tape drives

    c

  5. Network backup devices most commonly use which drive interface?
    1. IDE
    2. SCSI
    3. USB
    4. Parallel port

    b

Lesson 2: Antivirus Policies

Exercise 1: Virus Types

Match the virus types in the left column with their characteristics in the right column.

  1. Executable file viruses
  2. Trojan horses
  3. Stealth viruses
  4. Boot sector viruses
  5. Macro viruses
  6. Worms
  7. Polymorphic viruses
  1. Modify a file's directory entry size
  2. Replicate themselves, but do not infect other files
  3. Load into memory when the computer starts
  4. Infect document files
  5. Periodically change their signatures
  6. Do not replicate or infect other files
  7. Load into memory when you run a specific program

1. g

2. f

3. a

4. c

5. d

6. b

7. e

Lesson Review

  1. Why is a worm not considered to be a true virus?

    A worm is not a true virus because it is a separate program that does not infect other files.

  2. How does a stealth virus disguise its presence?
    1. By masquerading as an innocuous file
    2. By changing the size of the infected file's directory entry
    3. By encrypting its signature
    4. By infecting the disk's master boot record

    b

  3. How does a macro virus differ from the other major types of viruses?
    1. It doesn't replicate.
    2. It infects data files.
    3. It doesn't infect other files.
    4. It hides itself using encryption.

    b

Lesson 3: Patches and Updates

Lesson Review

  1. Name three reasons why a software upgrade can be an expensive proposition.

    Possible reasons are the cost of the upgrade itself, the cost of upgrading the computer hardware, the cost of paying software installers, and the cost of retraining users.

  2. Which of the following software releases is a fix designed to address one specific issue?
    1. A patch
    2. An update
    3. An upgrade
    4. A Service Pack

    a

Chapter 17: Network Troubleshooting Procedures

Lesson 1: Identifying Network Components

Exercise 1: Ports and Connectors

Match the ports listed in the left column with the correct connector descriptions in the right column.

  1. VGA video port
  2. Serial port
  3. SCA SCSI port
  4. 10Base-T Ethernet port
  5. USB port
  6. AUI port
  7. Keyboard/mouse port
  8. Parallel port
  9. 5 Mbps SCSI port
  10. Thin Ethernet port
  1. Rectangular four-conductor connector
  2. Combined power and data connector
  3. Mini-DIN connector
  4. Three-row, 15-pin D-shell connector
  5. Female DB-25 connector
  6. 50-pin Centronics connector
  7. Thick Ethernet connector
  8. Male DB-9 connector
  9. BNC connector
  10. RJ45 connector

1. d

2. h

3. b

4. j

5. a

6. g

7. c

8. e

9. f

10. i

Lesson Review

  1. What type of device enables you to connect a Type 1 Token Ring NIC to a UTP network?

    A Token Ring media filter

  2. Which of the following ports never uses a DB-25 connector?
    1. Parallel ports
    2. Serial ports
    3. Video ports
    4. SCSI ports

    c

  3. Which type of SCSI connector supplies power as well as data signals?
    1. 50-pin Centronics
    2. SCA
    3. 50-pin high-density
    4. 68-pin high-density

    b

  4. Which type of connector has been used both for keyboards and for power connections?
    1. PS/2
    2. Five-pin DIN
    3. USB
    4. Six-pin mini-DIN

    b

  5. Which of the following devices does not typically contain a row of at least four ports?
    1. A router
    2. A patch panel
    3. A switch
    4. A hub

    a

  6. What is the name of the device that provides the interface between a router and a leased telephone line?

    A channel service unit/data service unit (CSU/DSU)

  7. Which type of Ethernet connector has 15 pins?
    1. RJ-45
    2. BNC
    3. AUI
    4. VGA

    c

Lesson 2: Troubleshooting a Network

Exercise 1: Network Troubleshooting

Place the following steps of the problem isolation process in the proper logical order:

  1. Reproduce the problem using a different computer.
  2. Reproduce the problem yourself.
  3. Have the user reproduce the problem.
  4. Reproduce the problem using a different user account.

    3, 2, 4, 1

Lesson Review

  1. Which of the following problems would you assign the highest priority for your network support team? Explain why.
    1. The printer in the order entry department isn't working.
    2. The corporate e-mail server is down.
    3. A hub is malfunctioning in the sales department.
    4. The president of the company's workstation is locked up.

    b, because this problem affects a vital function for the most users. However, d gets honorable mention for enabling the technician to remain employed.

  2. In a two-tiered network support system, what do the tiers refer to?
    1. File servers storing network documentation
    2. Priorities for trouble tickets
    3. Problem call databases
    4. Technicians of different skill levels

    d

  3. How does a UPS protect a network?

    By providing temporary standby power in the event that building power fails.

Chapter 18: Network Troubleshooting Tools

Lesson 1: Documentation and Resources

Exercise 1: Technical Resources

Match the resources in the left column with the appropriate descriptions in the right column.

  1. PDF
  2. TechNet
  3. NNTP
  4. README.1ST
  5. Newsgroup
  1. ASCII text file containing recent product information
  2. Internet conference containing messages on a given subject
  3. Document format used by Adobe Acrobat
  4. A Microsoft CD-ROM subscription service
  5. Protocol used by Usenet news clients and servers

1. c

2. d

3. e

4. a

5. b

Lesson Review

  1. Which of the following products do you need to open a .pdf file?
    1. A newsreader
    2. NNTP
    3. Adobe Acrobat Reader
    4. A multifunction cable tester

    c

  2. What protocol do Usenet newsreaders and news servers use to communicate?
    1. HTTP
    2. FTP
    3. SNMP
    4. NNTP

    d

Lesson 2: Logs and Indicators

Exercise 1: Network Indicators

Define each of the following terms in relation to the concepts discussed in this lesson.

  1. SNMP

    A query language and protocol used to carry information between network management agents and a central console

  2. NLP

    Normal link pulse, a signal generated by 10Base-T Ethernet hubs and network interface adapters that lights LEDs on both devices to signify that they have been wired together properly

  3. Trap

    A message generated by an SNMP agent, informing the network management console of a condition requiring immediate attention

  4. Link code word

    An additional 16-bit data packet included in the FLP signal used by Fast Ethernet devices to negotiate the speed at which they will operate

  5. MIB

    Management information base, the place where an SNMP agent stores information about the device it's monitoring pending its transmission to the network management console

Lesson Review

  1. How does the FLP signal used by Fast Ethernet equipment differ from the NLP signal used by standard Ethernet?

    FLP includes a 16-bit link code word in the signal that the devices use to negotiate their fastest common transmission speed.

  2. How does the performance of a network interface adapter differ in promiscuous mode?

    The network interface adapter reads and processes all packets transmitted over the network, not just those addressed to it.

  3. Arrange the following Ethernet technologies in the order of priority established by the FLP signal.
    1. 100Base-T4
    2. 10Base-T full-duplex
    3. 100Base-TX
    4. 10Base-T
    5. 100Base-TX full-duplex

    e, a, c, b, d

  4. What are the individual elements measured by the Windows 2000 Performance console called?
    1. Counters
    2. Statistics
    3. Alerts
    4. Traps

    a

  5. Where do agents used by network management products store their information?
    1. SNMP
    2. MIB
    3. NNTP
    4. Console

    b

Lesson 3: Network Testing and Monitoring Tools

Exercise 1: Network Testing Equipment

For each of the devices listed in the left column, specify which of the faults in the right column it is capable of detecting.

  1. Crossover cable
  2. RJ-45 loopback connector
  3. Tone generator and locator
  4. Wire map tester
  5. Multifunction cable tester
  1. Cable short
  2. Split pair
  3. Malfunctioning hub
  4. Excessive crosstalk
  5. Transposed wires
  6. Faulty network interface adapter
  7. Untwisted cables
  8. Broken cable

1. c, h

2. f

3. a, e, h

4. a, e, h

5. a, b, d, e, g, h

Lesson Review

  1. A fox and hound tester is another term for what device?
    1. A crossover cable
    2. A tone generator and locator
    3. A wire map tester
    4. A multifunction cable tester

    b

  2. Which of the following cabling faults can a wire map tester not detect?
    1. Open pairs
    2. Split pairs
    3. Transposed pairs
    4. Shorts

    b

  3. Which of the following types of cable tester is most expensive?
    1. Fox and hound
    2. Wire map
    3. Multifunction
    4. Loopback

    c

Chapter 19: Network Troubleshooting Scenarios

Lesson 1: "I Can't Access a Web Site"

Exercise 1: Network Hardware Problems

On an internetwork consisting of several user segments connected by a backbone, with an Internet router connected directly to the backbone, specify whether the following network conditions would normally cause Internet access problems for one user only, for all of the users connected to one hub, for all of the users on one LAN, or for the entire internetwork.

  1. Both ends of a cable connecting two hubs are plugged into uplink ports.

    All of the users on one hub

  2. The router connecting the network to the ISP is down.

    The entire internetwork

  3. The cable connecting a user's computer to the hub is cut.

    One user only

  4. The ISP's connection to the Internet fails.

    The entire internetwork

  5. The router connecting a user LAN to the backbone malfunctions.

    All of the users on one LAN

Lesson Review

  1. Without a DNS server, a user can still access the Internet using which of the following techniques?
    1. By using links saved as favorites or bookmarks instead of typing URLs
    2. By using NetBIOS names instead of DNS names
    3. By using hardware addresses instead of DNS names
    4. By using IP addresses instead of DNS names

    d

  2. A user is unable to access the shared server drive that he uses every day, where his working files are stored. Which of the following questions would you ask the user first? State your reason why.
    1. Are you able to access any other network resources?
    2. Did you have any problems logging on to the network?
    3. Can you access the Internet?
    4. Is your network cable connected to the computer?

    b. The logon process is the user's first interaction with the network after the computer starts. If the logon completed successfully, it is clear that the user's hardware is functioning properly and the problem lies elsewhere.

  3. Which of the following is not a possible cause of Internet access failure?
    1. Missing WINS server address
    2. DNS server failure
    3. ISP connection failure
    4. Mistyped URLs

    a

  4. Which of the following network and transport layer problems can be caused by another computer on the network?
    1. Missing DNS server address
    2. Incorrect subnet mask
    3. Duplicate IP address
    4. Incorrect default gateway address

    c

  5. A computer running the Windows operating system without a WINS server address cannot access which of the following resources?
    1. Internet Web sites
    2. Computers running the Windows operating system that are connected to the same hub
    3. Computers not running the Windows operating system that are connected to the same LAN
    4. Computers running the Windows operating system that are connected to other LANs

    d

  6. Which of the following is the best solution for a case in which a user has changed the network interface adapter configuration and can no longer access the network?
    1. Replace the adapter with a new one.
    2. Delete the adapter driver and let Plug and Play reinstall it.
    3. Modify the adapter's configuration parameters using the utility supplied by the manufacturer.
    4. Modify the adapter driver's configuration parameters using the operating system interface.

    b

  7. Which of the following is the easiest way to test a patch cable for a fault?
    1. Replace it with one that you know is working properly.
    2. Connect it to a multifunction cable tester.
    3. Plug the computer end of the cable into the wall plate and the wall plate end into the computer.
    4. Connect it to a computer that you know is functioning properly.

    a

  8. Which of the following tools can pinpoint the exact location of a cable break?
    1. A tone generator and locator
    2. A protocol analyzer
    3. A multifunction cable tester
    4. A wire map tester

    c

  9. When a computer lacks a correct default gateway address, how far do packets destined for other networks travel?
    1. As far as the Internet access router
    2. As far as the backbone
    3. As far as the hub
    4. As far as the local network

    d

  10. Which of the following network problems would generally affect services other than Internet access on a Windows-based network?
    1. ISP connection failure
    2. Backbone failure
    3. DNS failure
    4. T1 failure

    b



Network+ Certification Training Kit
Self-Paced Training Kit Exam 70-642: Configuring Windows Server 2008 Network Infrastructure
ISBN: 0735651604
EAN: 2147483647
Year: 2001
Pages: 105

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net