Network +1
AV (Anti-Virus) software will help protect a computer from:
. Trojans
Which one of the following is an IEEE fiber optic standard?
10 GBASE-LR
Which one of the following IEEE standards uses a 1300 nm beam?
1000BASE-LX and 10 GBASE-LR
Which one of the following is an IEEE copper cable standard:
100BASE-CX
The maximum speed of 802.11b is:
11 Mbps
All of the following are valid IP addresses except:
172.192.4.256
The 802.11 frequency band is:
2.4 GHz
The 802.11b frequency band is:
2.4 GHz
A user wants to log onto their server using the SSH terminal from home, but cannot because the connection times out. Which standard port would have to be redirected from the router to the IP address?
22
Which TCP/IP well-known port number identifies SMTP?
25
All of the following are valid WEP key lengths EXCEPT:
32 bit
Token ring operates at which speeds?
4 Mbps, 16 Mbps
The maximum speed of 802.11g is?
54 Mbps
What is the maximum length of a gigabit Ethernet segment using MMF (Multimode Fiber) optic cable?
550 meters (1,804.46 feet)
A user enters http://www.abc computers.com into an Internet web browser. What is the default port number for the URL?
80
Which one of the following IEEE standards represents Ethernet?
802.3
Which one of the following will affect the range of an 802.11b WAP?
A long length of antenna extension cable
In order for a client to share resources in a wired network, the client must be physically connected and:
Allowed permission to the resources.
Which 3 bytes of MAC address F2-A1-23-BC-D3-41 designates the unique station identifier?
BC-D3-41
A home user purchases a cable modem and a straight-through Category 5e patch cable at a local electronics store. The modem will be connected to a hub which is connected to their computer. The computer is not able to receive a DHCP address from the cable modem network DHCP server. Why?
Because the cable modem requires a crossover cable to connect to the hub
Which media access method is used for an IEEE 802.3 network?
CSMA / CD (Carrier Sense Multiple Access / Collision Detection)
Which of the following access methods does Ethernet use?
CSMA / CD (Carrier Sense Multiple Access / Collision Detection)
What is the minimum cable type required for 100BASE-TX?
Category 5 UTP
Which cable would users utilize to connect a client workstation directly to another client workstation when using 100BASE-TX?
Category 5 crossover cable
Which media type is the most prone to electromagnetic interference?
Category 5e UTP
You work as a network administrator at ABC Computer. There are three identical desktop computers on the network. One of the computers cannot connect to the other machines. The network technician checks the network interface card in the non-working machine, and neither the link light not the activity lights us illuminated. The technician switches the network cable with a cable that is known to be operational, but the lights do not illuminate on the NIC or the corresponding port on the switch. What is the next troubleshooting step?
Change ports on the switch
You work as a network administrator at ABC Computer. You are troubleshooting a wireless LAN that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs from different companies within range of the LAN. The two WAPs have different SSIDs than the LAN WAP, but the same channel. Also, the WEP appears to be the same on all WAPs. What should the network administrator do to cut down on the interference of the wireless clients on the LAN?
Change the LAN WAP channel to a different channel than the other two WAPs
An administrator has been called to consult on a network. After receiving network traffic statistics, the administrator notices that there is an abnormally high amount of DHCP traffic. What recommendation would the administrator give to the customer to reduce the traffic?
Configure the DHCP server to increase lease expiration time
Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
Connect Workstation 6 and Workstation 2 using a barrel connector
You work as a network administrator at ABC Computer. The IT department is experimenting with a new DHCP server. Which of the following actions would ensure that the DHCP server does not impact clients from other departments?
Create a new subnet for the IT department
What should be used to automatically configure host computers for IP?
DHCP
In order to resolve the name www.abccomputer.com, which type of server is required?
DNS (Domain Name Service)
Which one of the following files must be edited to properly configure a UNIX remote access connection?
Devices and dialers
In a Windows Server 2003 AD (Active Directory) network, which server stores information about resource objects?
Domain controller
An office has recently installed a number of ceiling fans. Users complain of slow activity on the LAN and WAN. Nothing on the Category 5 UTP network has changed to cause this. What is responsible for the slow activity?
EMI (Electromagnetic Interference)
The ABC Computer Human Resources department requires an internal web site designed to be accessible to an external recruiting agency to update job postings. Which of the following terms describe the web site function?
Extranet
Which type of connector would a cable have if it were supplied with a splitter and a cable modem for Internet access?
F-Type
Upon which devices can NAT be used?
Firewall
If a destination address is not in a bridge forwarding table, what will the bridge do?
Forward the packets to all ports except the one that originated the request
Which networking device works at the upper three layers of the OSI and connects networks with different architectures?
Gateway
Which protocol is used for error reporting in concert with IP?
ICMP
All of the following are fiber based connectors except:
IEEE 1394
Which of the following options are the minimal settings for connecting a computer to a TCP / IP LAN while accessing the Internet?
IP address, subnet mask, gateway, and DNS
A workstation presents an error message to a user. The message states that duplicate IP has been detected on the network. Using the standard troubleshooting model, what should be completed first?
Identify the symptoms and potential causes
How can the range of an 802.11b wireless access point be increased?
Install an external antenna
You work as a network administrator at ABC Computer. Ten workstation numbered 1 through 10 are installed sequentially on a physical bus network. A request was made to separate workstations 1 through 5 and workstation 6 through 10 into two separate networks. An engineer cut the cable between workstations 5 and 6. What else, if anything, must the engineer do to complete the job?
Install terminators on both severed end of the bus trunk cable
What is the desired result when implementing fault tolerance?
It ensures production is not impacted in the event of a failure
A workstation can no longer connect to the network. Which LED should a user check FIRST on a NIC to identify the problem?
Link
All of the following are terminated on a punch down block except:
MMF (Multimode Fiber) cable
100BASE-FX runs over which of the following media types?
MMF (Multimode Fiber) optic cable
Which of the following connectors are SFF (Small Form Factor) fiber connectors?
MT-RJ (Mechanical Transfer-Registered Jack) and LC (Local Connector)
Which network topology uses the most cable?
Mesh
Which networking topology has the most physical connections per node?
Mesh
An ABC Computers employee has asked to have remote access to the company network. The employee has access to the PSTN which supports standard analog signaling. Which device will allow the employee to connect for remote access?
Modem
Which type of server stores information about network entities and resources and is used for authentication?
NDS (NetWare Directory Services)
At which layer of the OSI model does a router function?
Network
A packet filtering firewall operates at which layers if the OSI (Open Systems Interconnect) model?
Network and Transport
. If one of the links to a computer on a physical star topology is served, what will be the result?
Only the affected link will stop working
Which of the following environments is best suited to provide more radio coverage using an omnidirectional antenna?
Outdoors
While configuring a dial-up network on a computer running Windows, which one of the following protocols establishes the connection?
PPP (Pont-to-Point Protocol)
PAP secures PPP sessions by:
Passing a username and password in plaintext
Which OSI layer converts digital data into electronic signals to be put on a wire?
Physical
You work as a network administrator at ABC Computer. You need to reduce the bandwidth used between the ABC Computer and the Internet. Which one of the following could be implemented to accomplish this?
Proxy server
Which of the following can be used to cache web pages for future retrieval?
Proxy service
A technician is assisting their senior technician with terminating a line that was extending the demarcation point for a new DSL (Digital Subscriber Line) circuit. Which tool would be needed?
Punch down tool
Which one of the following authentication protocols requires the use of an NTP server to synchronize the workstations date and time with the server?
RADIUS
What RAID (Redundant Array of Independent Disks) level uses a disk mirroring technique to provide fault tolerance?
RAID 1 (Redundant Array of Independent Disks)
Which one of the following topologies does FDDI use?
Ring
A client noticed that traffic increased steadily over the last few months and performance is beginning to suffer on its TCP/IP (Transmission Control Protocol/Internet Protocol). Which network can be installed to reduce the impact of network traffic without dividing the LAN (Local Area Network) into separate subnets?
Router
A network administrator implements four VLANs on a switch. Which device will be required to pass traffic among the VLANs?
Router
An administrator is configuring a company Microsoft Exchange server for e-mail services. The Exchange server needs to send e-mail to a partner company that uses a Novell GroupWise e-mail server. What protocol is needed to send e-mail between the two servers?
SMTP
Which protocol encrypts data between web browser and web servers?
SSL
Which type of connector does a 10BASE-F network use?
ST (Straight Tip)
Which one of the following techniques will segment a network?
Subnetting
Which protocol uses domain name resolution to find addresses?
TCP / IP
Which of the following is a true statement regarding TCP and UDP?
TCP is connection-oriented, UDP is unreliable
The network administrator is configuring a computer to run SLIP as a dial-up protocol. Which protocol should be installed?
TCP/IP
A properly configured computer on the network receives the response ping request could not find host when pinging a web site. The computer can ping its gateway. Which of the following explains this situation?
The DNS server is down
A Windows 2000 work station has a TCP/IP address of 169.254.21.1. Which statement describes the sate of the computers TCP/IP configuration?
The computer is set for DHCP, but no DHCP server is available for the network
A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find that cannot modify the file contents. What is the likely cause?
The file has been opened by another user and is open for read only
A user is unable to reach a web site on a host computer. The user can ping the host name and Telnet to the host name. What is the source of the problem?
The host HTTP is down
A home user has enforced HTTPS access to a web server. After HTTPS is enforced, the web server is no longer accessible from the Internet, but can still be accessed by internal network users. What is causing this problem?
The users Internet router is blocking port 443
You work as a network administrator at ABC Computer. You change the lease time of the DHCP scope from one week to one day. What affect will this have on the end users?
The users will not be affected by the change
The DNS server has suffered a catastrophic failure. What will happen to the DNS clients?
They will be unable to reference a server by host name
A workstation is configured for dial-in connectivity to a remote access server. Which information does the client need to authenticate?
Username and password
Which one of the following antenna types is omni directional?
Vertical
Bridging an 802.3 network to and 802.11 network can be accomplished using a:
WAP (Wireless Access Point)
A Windows user wants to access a share hosted on a Mac OS X server, but the server is not visible on then network. What must the network administrator enable on the Mac OS X server to allow Windows users to connect to shares?
Windows file and print sharing
All of the following represents fault-tolerant strategies except:
X 25
A user is booting a workstation and suddenly receives a message stating that a duplicate IP address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
arp
Given the following output, which utility was used? Interface 10.10.10.1 on Interface 0×1000004 Internet Address Physical Address Type 10.10.10.5 00-e0-29-62-0d-de dynamic 10.10.10.11 00-00-08-fd-97-fa static
arp
Identify the utility being used given the output: Interface: 206.212.36.18 on Interface 1 Internet Address Physical Address 206.212.36.9 00-00-21-64-91-12 Dynamic 206.212.36.12 00-00-21-1b-4a-a7 Dynamic
arp
You work as a network administrator at ABC Computer. You have noticed suspicious IP traffic on the local subnet. After successfully pinging the source, which utility does the administrator use to find the associated MAC address?
arp
One of the purposes of a VLAN is to:
enforce better security
Connecting a LAN to mainframe can be accomplished using a:
gateway
You work as a network administrator at ABC Computer. You administer the ABC Computer Windows 2000 network, and recently added a DNS server to the network and deployed AD. Users have been instructed to update their TCP/IP configuration to ensure they will use the correct DNS server. What command should the users input?
ipconfig/renew
There is a suspected SMTP virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP sockets?
netstat
A user cannot reach a specific web site, but can access other web sites. What command would help diagnose the problem?
tracert
A user is complaining that it takes too long to access an application on a remote server. Which utility will identify the number of hops from the clients to the server where the application resides?
tracert/traceroute
The AV (Anti-Virus) software provides optimum protection when it is installed on all:
workstations and servers