1. Trang chủ
  2. » Công Nghệ Thông Tin

Network+ 2005 In Depth (P26) docx

30 247 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 30
Dung lượng 878,97 KB

Nội dung

18. You are a software programmer using a development Web server at your office to test your programs. Although your Web server is connected to the Internet for test pur- poses, you want to ensure that no one on the Internet can access your Web files.To make it more difficult for someone to connect to your Web server from the Internet, which TCP/IP default port number would you change in your Web server software configuration? a. 21 b. 22 c. 65 d. 80 e. 90 19. What is the maximum segment length on a 10BASE-T network? a. 85 meters b. 100 meters c. 185 meters d. 200 meters e. 1000 meters 20. You are the network administrator for a large college whose network contains nearly 10,000 workstations, over 100 routers, 80 switches, and 2000 printers. You are researching a proposal to both upgrade the routers and switches on your network and at the same time improve the management of your network. What type of protocol should you ensure that the new routers and switches can accept in order to more eas- ily automate your network management? a. TFTP b. SMTP c. NNTP d. ICMP e. SNMP 21. In the process of troubleshooting an intermittent performance problem with your net- work’s Internet connection, you attempt to run a traceroute test to www.microsoft.com.The traceroute response displays the first 12 hops in the route, but then presents several “Request timed out” messages in a row.What is the most likely reason for this? a. Your network’s ISP is experiencing connectivity problems. b. The Internet backbone is experiencing traffic congestion. c. Your client’s TCP/IP service limits the traceroute command to a maximum of 12 hops. 722 Appendix B NETWORK+ PRACTICE EXAM d. Your IP gateway failed while you were attempting the traceroute test. e. Microsoft’s network is bounded by firewalls that do not accept incoming ICMP traffic. 22. What is the network ID for a network that contains the group of IP addresses from 194.73.44.1 through 194.73.44.254 and is not subnetted? a. 194.1.1.1 b. 194.73.0.0 c. 194.73.44.1 d. 194.73.44.255 e. 194.73.44.0 23. Which of the following disaster recovery contingencies is the most expensive to main- tain? a. hot spare b. warm spare c. hot site d. warm site e. cold site 24. What type of device is typically used to create a VLAN? a. hub b. bridge c. switch d. router e. firewall 25. In NAT, how does an IP gateway ensure that outgoing traffic can traverse public net- works? a. It modifies each outgoing frame’s Type field to indicate that the transmission is destined for a public network. b. It assigns each outgoing packet a masked ID via the Options field. c. It interprets the contents of outgoing packets to ensure that they contain no client-identifying information. d. It replaces each outgoing packet’s Source address field with a valid IP address. e. It modifies the frame length to create uniformly sized frames, called cells, which are required for public network transmission. Appendix B 723 NETWORK+ PRACTICE EXAM 26. You have purchased an access point capable of exchanging data via the 802.11b or 802.11g wireless standard. According to these standards, what is the maximum dis- tance from the access point that wireless stations can travel and still exchange data with the access point at the maximum potential throughput? a. 10 feet b. 50 feet c. 80 feet d. 100 feet e. 175 feet 27. Which of the following RAID levels uses parity error checking? (Choose all that apply.) a. RAID Level 0 b. RAID Level 1 c. RAID Level 3 d. RAID Level 5 e. RAID Level 11 28. Which of the following is used to resolve NetBIOS names with IP addresses? a. DNS b. SMTP c. DHCP d. WINS e. hosts file 29. Which of the following figures (See choices a through e.) illustrates a VPN WAN? a. 724 Appendix B NETWORK+ PRACTICE EXAM b. c. d. Appendix B 725 NETWORK+ PRACTICE EXAM e. 30. Suppose you want to copy files from a Linux server at the office to your home com- puter, which also runs Linux, across a VPN. Both computers run OpenSSH. Which utility would you use to make sure these files are copied securely? a. SCP b. SFTP c. FTP d. TFTP e. HTTP 31. What security measure verifies that your user name and password are contained in the NOS directory when you attempt to log on to a server? a. remapping b. encryption c. authentication d. caching e. redirection 32. You are a network administrator for a WAN that connects two regional insurance company offices—one main office and one satellite office—to each other by a T1.The main office is also connected to the Internet using a T1. This T1 provides Internet access for both offices.To ensure that your private network is not compromised by unauthorized access through the Internet connection, you install a firewall between the main office and the Internet. Shortly thereafter, users in your satellite office com- plain that they cannot access the file server in the main office, but users in the main office can still access the Internet.What two things should you check? a. whether the firewall has been configured to run in promiscuous mode b. whether the firewall is placed in the appropriate location on the network 726 Appendix B NETWORK+ PRACTICE EXAM c. whether the firewall has been configured to allow access from IP addresses in the satellite office d. whether the firewall has been configured to receive and transmit UDPbased packets e. whether the firewall has been configured to allow Internet access over the main office’s T1 33. What TCP/IP utility was used to generate the following output, and what piece of infor- mation does it tell you about the machine on which the utility shown below was used? a. Ipconfig; the output indicates that the machine has a MAC address of 00080DE72F0C b. PING; the output indicates that the machine cannot communicate with any external hosts c. ARP; the output indicates that the machine resolves to a name of Studentx d. Ifconfig; the output indicates that the machine does not rely on DHCP e. Nbtstat; the output indicates that it is currently connected to the machine with a NetBIOS name of Studentx 34. While troubleshooting a workstation connectivity problem, you type the following command: pingƒ127.0.0.1.The response indicates that the test failed.What can you determine about that workstation? a. Its network cable is faulty or not connected to the wall jack. b. Its TCP/IP protocol is not installed properly. c. Its IP address has been prevented from transmitting data past the default gate- way. d. Its DHCP settings are incorrect. e. Its DNS name server specification is incorrect. Appendix B 727 NETWORK+ PRACTICE EXAM 35. You are a support technician working in a telecommunications closet in a remote office.You suspect that a connectivity problem is related to a broken RJ-45 plug on a patch cable that connects a hub’s uplink port to a router.You need to replace that con- nection, but you forgot to bring an extra patch cable.You decide to install a new RJ-45 connector to replace the broken RJ-45 connector.What two tools should you have to successfully accomplish this? a. punch-down tool b. crimping tool c. wire stripper d. cable tester e. multimeter 36. In the IP version 6 addressing scheme, which of the following IP addresses equals the loopback address? a. 1.0.0.1 b. 127:0:0:0:0:0:0:1 c. 0.0.0.0.0.1 d. ::1 e. 127.0.0.1 37. Which two of the following devices operate only at the Physical layer of the OSI Model? a. hub b. switch c. router d. bridge e. repeater 38. Which of the following is a reason for using subnetting or supernetting? a. to facilitate easier migration from IPv4 to IPv6 addressing b. to enable a network to use DHCP c. to make more efficient use of limited numbers of legitimate IP addresses d. to reduce the likelihood for user error when modifying TCP/IP properties e. to limit the number of addresses that can be assigned to one network interface 728 Appendix B NETWORK+ PRACTICE EXAM 39. In which two of the following switching techniques must multiple data packets that make up the same transmission use identical paths to reach their destination? a. circuit switching b. layer 2 switching c. packet switching d. message switching e. layer 3 switching 40. Which of the following wireless networking technologies can make use of WPA to improve the security of data in transit? a. 802.11b b. 802.5 c. Infrared d. Bluetooth e. 802.3 41. In the following network diagram, which network nodes belong to a private network? a. nodes 1 through 6 and nodes 8 through 14 b. nodes 1 through 6 c. nodes 8 through 14 d. nodes 1 through 7, plus 15 and 16 e. all of the nodes Appendix B 729 NETWORK+ PRACTICE EXAM 42. You are the network administrator for a law firm whose two primary offices are located five blocks apart in the center of a large city.The two offices have different specialties, and therefore keep separate file servers. Each file server runs the Windows Server 2003 NOS.A T1 connects the two offices so employees at each office can com- municate and share files.To protect the lawyers’ records, you currently make regular backups of all the data on both file servers and store the backup tapes in an off-site warehouse. However, one of the firm’s partners asked you to do more than simply back up data. In addition, she requests that you implement this added measure within the next week.Which of the following solutions is the best choice to ensure greater data protection in the given time frame? a. Contract with an online backup provider to back up data over the Internet using the T1. b. Add a UNIX server to the network so that you can establish clustering between all the servers. c. Establish mirroring between the two servers using the T1. d. Add a RAID Level 5 device to one of the file servers. e. Connect the T1 to a third office across town and back up files from the two other locations to the third location. 43. By default, an IPX address contains what other type of address? a. IP address b. SPX address c. MAC address d. logical address e. NetBIOS address 44. Which transport protocol and TCP/IP port does the Telnet utility use? a. UDP, port 23 b. TCP, port 21 c. UDP, port 22 d. TCP, port 23 e. UDP, port 21 45. Which two of the following guarantee that a server continually has power, even if a building’s electrical service is interrupted? a. RAID Level 3 b. RAID Level 5 c. online UPS d. standby UPS e. gas-powered generator 730 Appendix B NETWORK+ PRACTICE EXAM 46. What protocol is used to transfer mail between a Sendmail server and a Microsoft Exchange server? a. SMTP b. SNMP c. IMAP4 d. POP3 e. TFTP 47. What is the function of RARP? a. to associate a host name with a given IP address b. to associate a MAC address with a given IP address c. to associate an IP address with a given MAC address d. to associate a NetBIOS name with a given MAC address e. to associate a MAC address with a given host name 48. Your 100BASE-T network is wired following the TIA/EIA 568-A standard. As you make your own patch cable, which wires do you crimp into pins 1 and 2 of the RJ-45 connector? a. white with green stripe and green b. white with brown stripe and brown c. white with blue stripe and blue d. white with red stripe and red e. white with orange stripe and orange 49. You are a support technician at an organization that uses a NetWare 6.5 LAN with a mixture of Windows 98,Windows 2000, and Windows XP workstations. You are asked to help a user in the Accounting Department who can retrieve files from the network, but suddenly can’t print to the same printer he uses every day.You have determined that he is the only person in his area affected by this problem. Further, if you log on to the LAN with his user name and password, you can successfully print to the same printer.Which of the following might be the cause of this user’s problem? a. He inadvertently deleted the network printer object from his workstation’s Printers window. b. His network password expired. c. His user name was accidentally deleted from the group that has rights to print to that printer. d. His workstation’s operating system requires an update before it can print to that printer. e. His network adapter is loose or improperly installed. Appendix B 731 NETWORK+ PRACTICE EXAM [...]... client’s NIC d Enter the DHCP server address in the Windows XP TCP/IP configuration e Nothing; in Windows XP the DHCP option is selected by default and the client will obtain IP addressing information upon connecting to the network 61 You are a support technician installing a new NIC on a Windows XP workstation After physically installing the NIC, then installing the appropriate device driver for the... planning and maintaining a network Recognize that you may need to change the forms slightly to suit your environment.However, having a form template can help you remember steps you may otherwise have forgotten This appendix provides the following forms: ■ Server Installation Checklist—Windows Server 2003 ■ Server Installation Checklist—NetWare 6.5 ■ Server Installation Checklist—Red Hat Enterprise Linux... restarting, an error indicates that the NIC is attempting to use an IRQ already in use by another device.The workstation’s Device Manager window indicates that both the NIC and the sound card are attempting to use IRQ 11 Of the following IRQs, which one could you most likely assign to the new NIC so that it will not conflict with another device? a 4 b 6 c 9 d 13 e 15 62 Which three of the following components... illustrates a FDDI network? a b c Appendix B 733 734 Appendix B NETWORK+ PRACTICE EXAM d e 55 You are a support technician installing 13 new Windows XP workstations on your company’s network, which relies on several Windows Server 2003 servers for authentication and file sharing, one Fedora Core Linux e-mail server, and one Fedora Core Linux proxy server.The network runs the TCP/IP protocol over 100BASE-TX... DHCP and NAT Which of the following settings must you manually specify on each workstation so that their users can pick up their Internet e-mail from the Linux e-mail server? a DNS server address b IP address c WINS server name d NTP server address e SMTP server name NETWORK+ PRACTICE EXAM Appendix B 56 Which of the following IEEE committees designs standards for Token Ring net- works? a 802.2 b 802.3... connectivity will not be affected 65 Which of the following specifies standards for naming and accessing objects in an NOS's directory and thereby improves interoperability? a ANSI b LDAP c AFP d OSPF e WINS 737 This page intentionally left blank Appendix C Visual Guide to Connectors Throughout this book, you learned about several different cabling and connector options that may be used on networks... Standard Connector) Used on fiber-optic cabling (for example, on 100BASE-X, Gigabit, and 10-GB Ethernet networks) IEEE 1394 (FireWire), 4-pin Used to connect a variety of peripherals, including digital cameras and external storage devices; also used to network computers in a bus topology IEEE 1394 (FireWire), 6-pin Used to connect a variety of peripherals, including digital cameras and external storage... Token Ring networks; has been replaced by RJ-45 connectors on newer Token Ring networks DB-9 Used on older Token Ring networks; has been replaced by RJ45 connectors on newer Token Ring networks 741 This page intentionally left blank Appendix D Standard Networking Forms Throughout this book, you have learned about various operating procedures and policies that help your IT operations, upgrades, and installations... an incremental backup save? a b c d e data that changed prior to the previous incremental backup data that changed since the previous full or incremental backup all data, regardless of whether it has changed data that was backed up exactly a week previously data that users have flagged for backup since the last backup occurred 735 736 Appendix B NETWORK+ PRACTICE EXAM 60 You are setting up a new Windows... Form ■ Technical Support Contacts Form ■ Incident Report Form ■ Network Security Checklist 744 Appendix D STANDARD NETWORKING FORMS STANDARD NETWORKING FORMS Appendix D 745 746 Appendix D STANDARD NETWORKING FORMS STANDARD NETWORKING FORMS Appendix D 747 748 Appendix D STANDARD NETWORKING FORMS STANDARD NETWORKING FORMS Appendix D 749 750 Appendix D STANDARD NETWORKING FORMS Appendix E Answers to Chapter . Nothing; in Windows XP the DHCP option is selected by default and the client will obtain IP addressing information upon connecting to the network. 61. You are a support technician installing. to reach their destination? a. circuit switching b. layer 2 switching c. packet switching d. message switching e. layer 3 switching 40. Which of the following wireless networking technologies can. outgoing packet a masked ID via the Options field. c. It interprets the contents of outgoing packets to ensure that they contain no client-identifying information. d. It replaces each outgoing

Ngày đăng: 07/07/2014, 09:20

TỪ KHÓA LIÊN QUAN