1. Trang chủ
  2. » Công Nghệ Thông Tin

CompTIA Network+ Certification Study Guide part 68 pptx

10 467 1

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 75,32 KB

Nội dung

This page intentionally left blank 657 NETWORK+ EXAM N10-004 Self Test Appendix CHAPTER 1: NETWORK FUNDAMENTALS You are creating a network for a small business with only four 1. employees. Because employees often leave the office to visit clients, a minimum of one person is in the office and using a computer at any given time. Currently there are two computers in the office, but the company is willing to purchase more if needed. Based on this information, what is the minimum number of computers that you’ll need to create a network? A. One B. Two C. Three D. Four Correct answer and explanation: B. Two. A network can exist when two or more computers are connected together to form a network. Although addi- tional computers can be used to create the network, a minimum of two is required so that the computers can communicate and exchange data. Incorrect answers and explanations: A, C, and D. Answer A is incorrect because at least two computers are necessary to create a network. If there is only one computer, it would be a standalone workstation and not connected to a network of other computers. Answers C and D are incorrect because the question asks for the minimum number of computers needed to create a network. A new intranet has been created in your organization and includes 2. an FTP site to download files and a news server for sharing infor- mation. The network is internetworked with a network belonging to a subsidiary of the company. The subsidiary’s network uses Apple computers and uses AppleTalk as a network protocol. To Appendix C Appendix C 658 access the intranet, which of the following protocols would need to be installed on your computer? A. IPX/SPX B. NWLink C. TCP/IP D. AppleTalk Correct answer and explanation: C. TCP/IP. Most intranets use the same tech- nologies as the Internet, which uses TCP/IP. To access an intranet using a Web browser and fully take advantage of the services it provides, you would need to have TCP/IP installed just as you would if you were going to access the Internet. Incorrect answers and explanations: A, B, and D. Answer A is incorrect because IPX/SPX is a protocol used on Novell NetWare networks but isn’t a protocol that’s used to access Internet sites (such as FTP sites that require TCP/IP). Although IPX/SPX was the default protocol for NetWare, recent versions use TCP/IP as the default protocol. Answer B is incorrect because NWLink is an IPX/SPX compatible protocol that’s used by Microsoft operat- ing systems to connect to NetWare networks. Answer C is incorrect because AppleTalk is used for Apple networks, but isn’t the protocol used by various Internet technologies (such as FTP sites). The LAN used by your organization is on the single floor of a building. 3. The network has servers and other resources that are kept in a secure server room. You are the only network administrator in the organiza- tion and have sole responsibility of managing these resources and ad- ministration of network security for all of the users who are distributed throughout the network. What type of network model is being used? A. Centralized B. Decentralized C. Distributed D. Peer-to-peer Correct answer and explanation: A. Centralized. Centralized network models have resources that are centrally located and administered. In this situation, there is one network administrator that is responsible for manag- ing servers and other resources that are centrally located. Incorrect answers and explanations: B, C, and D. Answers B and C are incorrect because a decentralized or distributed network has resources and administration that spans the entire network. They are not centrally located but various system administrators or designated users provide management of resources in various areas of the network. Answer D is incorrect because servers are used, making this a client/server model. Appendix C 659 Your company’s network is on several floors of a building. Because 4. of the amount of data being stored, there are three file servers, a web server for the intranet, an e-mail server for internal e-mail, and a SQL Server that is used for several databases that have been developed in house. Because of security reasons, floppy disks and other devices to transfer or transmit data to and from the computer have been removed and aren’t permitted. What type of network model is being used? A. Client/server B. Peer-to-peer C. MAN D. PAN Correct answer and explanation: A. Client/server. A decentralized network model has network resources and administration distributed throughout the network. Administration is shared by designating responsibility to system administrators or individual users, whereas resources such as servers and other devices are installed at various locations throughout the network. By sharing administrative burdens in this way, certain resources can now be managed by other members of the organization. Incorrect answers and explanations: B, C, and D. Answer B is incorrect because servers are being used, so this isn’t a peer-to-peer network. On a peer- to-peer network, computers on the network are equals and aren’t in the role of dedicated servers. Answers C and D are incorrect because these aren’t network models but are types of networks. Because the network doesn’t extend across a metropolitan area, it isn’t a MAN, and because personal devices aren’t being used to network with computers or other network devices, it isn’t a PAN. Your company’s network spans three buildings that are within 5. a mile of one another. Three servers are kept in a secure server room in the building where your office is located, while each other building has a server that is locked in a closet. Users at each of these locations have been trained on how to replace the backup tapes in these servers and have the ability to give permissions for user accounts to print to specific printers in those locations. You solely control other aspects of security, inclusive to password requirements, and access to folders on these servers. What type of network model is being used? A. Centralized B. Decentralized C. P2P D. Peer-to-peer Appendix C 660 Correct answer and explanation: B. Decentralized. A decentralized net- work model has network resources and administration distributed through- out the network. Administration is shared by designating responsibility to system administrators or individual users, whereas resources such as servers and other devices are installed at various locations throughout the network. By sharing administrative burdens in this way, certain resources can now be managed by other members of the organization. Incorrect answers and explanations: A, C, and D. Answer A is incorrect because a centralized network has resources and administration that are centrally located and administered. Answers C and D are incorrect because peer-to-peer (P2P) networks are where computers on the network are equals and act both as clients and servers. Dedicated servers are used in this sce- nario, making it a client/server model. A company has hired you to create a network for their small busi-6. ness. Security isn’t an issue, and there isn’t enough money to hire or train a permanent network administrator. Users of the network routinely work on similar projects, and need to access one another’s data on a regular basis. What type of network model will you use? A. Client/server B. Peer-to-peer C. Client D. Server Correct answer and explanation: B. Peer-to-peer. On a peer-to-peer net- work, computers on the network are equals and have the ability to access data and services they’ve been permitted to use on other machines, as well as provide services and data to others. Incorrect answers and explanations: A, C, and D. Answer A is incorrect because the requirements specified in the question define a peer-to-peer net- work model. A client/server model provides increased security, which isn’t needed for this network, and also generally requires someone to be hired or trained as a network administrator. Answers C and D are incorrect because these aren’t network models but are roles on a client/server network. A client requests data and resources, whereas a server provides them. A company has multiple offices that are internetworked. Office A 7. has a single computer that has the ability to dial into the Internet, but isn’t connected to the other offices. Office B is in another part of the country from the other offices, but doesn’t have its network Appendix C 661 interconnected to the other offices. Office C and D are in separate states, but have a dedicated connection between them. Office C has 20 computers that access each other’s machines, and provide ser- vices and data to one another. Office D has 50 computers that log onto the network using a single server. Based on this information, which of the Offices are part of a LAN and a WAN? A. Office A and B B. Office B and C C. Office C and D D. The entire network (Office A, B, C, and D) Correct answer and explanation: C. Office C and D. Both of these offices have LANs. Office C has a peer-to-peer network, whereas Office D has a client/server network. They are interconnected to one another, and thereby part of a WAN. Incorrect answers and explanations: A, B, and D. Answer A is incorrect because Office A doesn’t have a network, but only an Internet connection. It is also wrong because Office B isn’t part of a WAN. Answer B is incorrect because although it has a LAN, it isn’t connected to the other networks and therefore isn’t part of the WAN. Answer D is incorrect because not every office has a LAN and the others connected together form a WAN. An organization has offices in two countries. Office A is a small 8. field office with two networked computers and is internetworked with Office B that is across the road and has 10 networked com- puters. Because they are a subsidiary of the main company and perform different services from the rest of the organization, neither of these offices have been internetworked with the other offices, and both are awaiting Internet connectivity to be provided next month. Office C is another field office that has a single computer, isn’t networked with other offices, and has an Internet connection. Office D is the headquarters of the company, has 100 network users who are awaiting Internet connectivity to be added to the network, and has a network connection to Office E in London, which is their European office. Based on this information, which of the offices is connected to the largest WAN? A. Office A B. Office B C. Office C D. Office D Appendix C 662 Correct answer and explanation: C. Office C. Office C is connected to the Internet, which is the largest wide area network. Incorrect answers and explanations: A, B, and D. Answers A and B are incor- rect because Office A and Office B are networked together, but are across the road from one another, and have the smallest number of network users (except for Office C that has no users who are part of this network). Answer D is incor- rect because although they have a WAN connecting the LANs in each country, Office D doesn’t have a connection to the Internet (which is the largest WAN). A company wants to create a LAN between two networks in dif-9. ferent cities. To connect them, you want to have the fastest pos- sible connection to meet their needs. Each network has massive amounts of data being sent between floors of their existing net- worked building, and you determine that at maximum, 1 Mbps of data will need to be transmitted during normal business hours. Although they are a large business, and cost is not a major issue, they don’t want to waste money on getting a solution with a band- width that’s higher than they need. What type of connection will you choose in connecting these networks? A. Dial-up modem B. ISDN C. T1 D. T3 Correct answer and explanation: C. T1. Office C is connected to the Internet, which is the largest wide area network. The company needs to send a maxi- mum of 1 Mbps, which is below the T1 speed of 1.544 Mbps. Although slower than T3 (which is more expensive), it meets the needs of the company. Incorrect answers and explanations: A, B, and D. Answer A is incorrect because a dial-up modem has a maximum speed of 56 Kbps, which is well below what they need. Answer B is incorrect because it has lower band- width than required. ISDN has a maximum speed of 128 Kbps. Answer D is incorrect because a T3 connection provides speeds ranging from 3 Mbps to 44.736 Mbps, which makes it too fast for their needs. It is also the most expensive, meaning that a T3 would be a waste of money. A company has several offices that are networked together across 10. the city. Each of the sales representatives uses PDAs to keep track of appointments with clients. The company has just implemented a new system where the appointments taken by receptionists are automatically uploaded to the PDAs whenever the sales staff enters Appendix C 663 the main reception area. What types of networks are being used in this environment? Choose all that apply. A. MAN B. SAN C. CAN D. PAN Correct answers and explanations: A and D. MAN and PAN. A MAN is a metropolitan area network and a PAN is a personal area network. A MAN is a group of LANs that are internetworked within a local geographical area, such as a city. A PAN is a network that allows wireless transmission of infor- mation between computers and devices like PDAs. Incorrect answers and explanations: C and D. Answer C is incorrect because a SAN is a storage area network in which storage devices are net- worked together on a segment of the network so that computers on a LAN can view and store data on them. Answer D is incorrect because the network is more dispersed than a CAN. A CAN is a campus area network where internetworked buildings are closely situated together. You have been hired by a company that uses a topology shown in 11. Figure 1.8. In looking at the physical layout of your network, which of the following types of topologies is being used? A. Bus B. Star C. Mesh D. Ring Correct answer and explanation: A. Bus. A Bus topology has all the com- puters connected together using a single cable, which is called a trunk, back- bone, or segment. Incorrect answers and explanations: B, C, and D. Answer B is incorrect because a Star topology has computer connected to a central hub or switch. Answer C is incorrect because a Mesh topology has every component of the network connected directly to every other component. Answer D is incorrect because a Ring topology has computers connected to a cable that loops around to form a closed ring. FIGURE 1.8 Appendix C 664 You receive a call that the network is down. In this network, all the 12. computers are connected together using a single cable, which they are connected to using T-connectors. Looking at the situation, you find that there is no break through the trunk. Which of the follow- ing is most likely the cause of the problem? A. A failed network card. B. One of the computers is turned off. C. T-connectors are missing from the ends of the cable. D. Terminators are missing from the ends of the cable. Correct answer and explanation: D. Terminators are missing from the ends of the cable. The topology described in the question refers to a Bus topology and states that the entire network is down although there is no cable break. Terminators are needed on a Bus topology because they prevent packets from bouncing up and down the cable. Terminators need to be attached to each end of the cable to absorb electronic signals. This clears the cable to allow other computers to send packets on the network. If there is no termination, the entire network fails. Incorrect answers and explanations: A, B, and C. Answer A is incorrect because a failed network card would only effect one computer. Answer B is incorrect because a Bus topology is passive and doesn’t require each com- puter to be present to receive and resend data along the cable. Answer C is incorrect because T-connectors are used to connect the computers to the cable. They aren’t used to terminate the ends of a cable. Your network uses cells to send and receive data to and from com-13. puters. This allows computers in different buildings to be networked together, so they can access data from servers in either building. A topology map has been created, using circles to identify the areas that computers can be placed to access the network. Based on this information, which of the following topologies is being used? A. Star B. Mesh C. Wireless D. Ring Correct answer and explanation: C. Wireless. A Wireless topology uses transmitters called cells, which broadcast the packets using radio frequen- cies. The cells extend a radio sphere around the transmitter in the shape of a bubble that can extend to multiple rooms and possibly different floors in a building. Appendix C 665 Incorrect answers and explanations: A, B, and D. Answer A is incorrect because a Star network doesn’t use cells to send and receive data to and from computers. It cables computers to a centralized hub. Answer B is incorrect because a Mesh topology also doesn’t use cells but uses the most amount of cable out of any other topology due to multiple connections between a com- puter and other computers on the network. Answer D is incorrect because a Ring topology also doesn’t use cells but has computers connected to a looped cable. You are training a new member of the IT Staff, and decide to 14. explain the topology of the existing network, shown in the Figure 1.9. What topology is currently being used? A. Bus B. Star C. Mesh D. Ring Correct answer and explanation: C. Mesh. A Mesh topology has every component of the network connected directly to every other component. This creates an extremely fault tolerant network but is expensive and dif- ficult to maintain. Incorrect answers and explanations: A, B, and D. Answer A is incorrect because a Bus topology has all the computers in a Bus topology are connected together using a single cable, which is called a trunk, backbone, or segment. Answer B is incorrect because a Star topology has computer connected to a central hub or switch. Answer D is incorrect because a Ring topology has computers connected to a cable that loops around. Although all the compo- nents shown in the figure are connected in a similar manner, there is addi- tional cabling to connect every one of them to each other. FIGURE 1.9 . also wrong because Office B isn’t part of a WAN. Answer B is incorrect because although it has a LAN, it isn’t connected to the other networks and therefore isn’t part of the WAN. Answer D is incorrect. ability to dial into the Internet, but isn’t connected to the other offices. Office B is in another part of the country from the other offices, but doesn’t have its network Appendix C 661 interconnected. log onto the network using a single server. Based on this information, which of the Offices are part of a LAN and a WAN? A. Office A and B B. Office B and C C. Office C and D D. The entire network

Ngày đăng: 04/07/2014, 13:21

TỪ KHÓA LIÊN QUAN