Although your Web server is connected to the Internet for test pur-poses, you want to ensure that no one on the Internet can access your Web files.Tomake it more difficult for someone to
Trang 118. You are a software programmer using a development Web server at your office to testyour programs Although your Web server is connected to the Internet for test pur-poses, you want to ensure that no one on the Internet can access your Web files.Tomake it more difficult for someone to connect to your Web server from the Internet,which TCP/IP default port number would you change in your Web server softwareconfiguration?
at the same time improve the management of your network What type of protocolshould you ensure that the new routers and switches can accept in order to more eas-ily automate your network management?
net-www.microsoft.com.The traceroute response displays the first 12 hops in the route, but
then presents several “Request timed out” messages in a row.What is the most likelyreason for this?
a. Your network’s ISP is experiencing connectivity problems
b. The Internet backbone is experiencing traffic congestion
c. Your client’s TCP/IP service limits the traceroute command to a maximum of
12 hops
Trang 2d. Your IP gateway failed while you were attempting the traceroute test.
e. Microsoft’s network is bounded by firewalls that do not accept incoming ICMPtraffic
22. What is the network ID for a network that contains the group of IP addresses from194.73.44.1 through 194.73.44.254 and is not subnetted?
b. It assigns each outgoing packet a masked ID via the Options field
c. It interprets the contents of outgoing packets to ensure that they contain no
client-identifying information
d. It replaces each outgoing packet’s Source address field with a valid IP address
e. It modifies the frame length to create uniformly sized frames, called cells, whichare required for public network transmission
Trang 326. You have purchased an access point capable of exchanging data via the 802.11b or802.11g wireless standard According to these standards, what is the maximum dis-tance from the access point that wireless stations can travel and still exchange datawith the access point at the maximum potential throughput?
Trang 4c.
d.
Trang 530. Suppose you want to copy files from a Linux server at the office to your home puter, which also runs Linux, across a VPN Both computers run OpenSSH Whichutility would you use to make sure these files are copied securely?
a. whether the firewall has been configured to run in promiscuous mode
b. whether the firewall is placed in the appropriate location on the network
Trang 6c. whether the firewall has been configured to allow access from IP addresses inthe satellite office
d. whether the firewall has been configured to receive and transmit UDPbased
c. ARP; the output indicates that the machine resolves to a name of Studentx
d. Ifconfig; the output indicates that the machine does not rely on DHCP
e. Nbtstat; the output indicates that it is currently connected to the machine with
a NetBIOS name of Studentx
34. While troubleshooting a workstation connectivity problem, you type the following
command: pingƒ127.0.0.1.The response indicates that the test failed.What can youdetermine about that workstation?
a. Its network cable is faulty or not connected to the wall jack
b. Its TCP/IP protocol is not installed properly
c. Its IP address has been prevented from transmitting data past the default way
gate-d. Its DHCP settings are incorrect
e. Its DNS name server specification is incorrect
Trang 735. You are a support technician working in a telecommunications closet in a remoteoffice.You suspect that a connectivity problem is related to a broken RJ-45 plug on apatch cable that connects a hub’s uplink port to a router.You need to replace that con-nection, but you forgot to bring an extra patch cable.You decide to install a new RJ-45connector to replace the broken RJ-45 connector.What two tools should you have tosuccessfully accomplish this?
38. Which of the following is a reason for using subnetting or supernetting?
a. to facilitate easier migration from IPv4 to IPv6 addressing
b. to enable a network to use DHCP
c. to make more efficient use of limited numbers of legitimate IP addresses
d. to reduce the likelihood for user error when modifying TCP/IP properties
e. to limit the number of addresses that can be assigned to one network interface
Trang 839. In which two of the following switching techniques must multiple data packets thatmake up the same transmission use identical paths to reach their destination?
41. In the following network diagram, which network nodes belong to a private network?
a. nodes 1 through 6 and nodes 8 through 14
b. nodes 1 through 6
c. nodes 8 through 14
d. nodes 1 through 7, plus 15 and 16
e. all of the nodes
Trang 942. You are the network administrator for a law firm whose two primary offices arelocated five blocks apart in the center of a large city.The two offices have differentspecialties, and therefore keep separate file servers Each file server runs the WindowsServer 2003 NOS.A T1 connects the two offices so employees at each office can com-municate and share files.To protect the lawyers’ records, you currently make regularbackups of all the data on both file servers and store the backup tapes in an off-sitewarehouse However, one of the firm’s partners asked you to do more than simplyback up data In addition, she requests that you implement this added measure withinthe next week.Which of the following solutions is the best choice to ensure greaterdata protection in the given time frame?
a. Contract with an online backup provider to back up data over the Internet usingthe T1
b. Add a UNIX server to the network so that you can establish clustering betweenall the servers
c. Establish mirroring between the two servers using the T1
d. Add a RAID Level 5 device to one of the file servers
e. Connect the T1 to a third office across town and back up files from the twoother locations to the third location
43. By default, an IPX address contains what other type of address?
Trang 1046. What protocol is used to transfer mail between a Sendmail server and a Microsoft
47. What is the function of RARP?
a. to associate a host name with a given IP address
b. to associate a MAC address with a given IP address
c. to associate an IP address with a given MAC address
d. to associate a NetBIOS name with a given MAC address
e. to associate a MAC address with a given host name
48. Your 100BASE-T network is wired following the TIA/EIA 568-A standard As youmake your own patch cable, which wires do you crimp into pins 1 and 2 of the RJ-45connector?
a. white with green stripe and green
b. white with brown stripe and brown
c. white with blue stripe and blue
d. white with red stripe and red
e. white with orange stripe and orange
49. You are a support technician at an organization that uses a NetWare 6.5 LAN with amixture of Windows 98,Windows 2000, and Windows XP workstations You are
asked to help a user in the Accounting Department who can retrieve files from thenetwork, but suddenly can’t print to the same printer he uses every day.You have
determined that he is the only person in his area affected by this problem Further, ifyou log on to the LAN with his user name and password, you can successfully print tothe same printer.Which of the following might be the cause of this user’s problem?
a. He inadvertently deleted the network printer object from his workstation’s
Printers window
b. His network password expired
c. His user name was accidentally deleted from the group that has rights to print
Trang 1150. What is the function of the Network layer of the OSI Model?
a. to manage the flow of communications over a channel
b. to add segmentation and assembly information
c. to encode and encrypt data
d. to add logical addresses and properly route data
e. to apply electrical pulses to the wire
51. Which of the following utilities could you use to log on to a UNIX host?
Trang 1254. Which of the following diagrams illustrates a FDDI network?
a.
b.
c.
Trang 13e.
55. You are a support technician installing 13 new Windows XP workstations on yourcompany’s network, which relies on several Windows Server 2003 servers for authen-tication and file sharing, one Fedora Core Linux e-mail server, and one Fedora CoreLinux proxy server.The network runs the TCP/IP protocol over 100BASE-TX Eth-ernet technology It also uses DHCP and NAT Which of the following settings mustyou manually specify on each workstation so that their users can pick up their Internete-mail from the Linux e-mail server?
Trang 1456. Which of the following IEEE committees designs standards for Token Ring
of device will you need in order for clients on the first floor to communicate with
clients on the second floor?
59. What types of files does an incremental backup save?
a. data that changed prior to the previous incremental backup
b. data that changed since the previous full or incremental backup
c. all data, regardless of whether it has changed
d. data that was backed up exactly a week previously
e. data that users have flagged for backup since the last backup occurred
Trang 1560. You are setting up a new Windows XP client to connect with your LAN, which relies
on DHCP.You made certain that the client has the TCP/IP protocol installed andbound to its NIC.Which of the following must you do next to ensure that the clientobtains correct TCP/IP information via DHCP?
a. Make certain the client’s computer name and host name are identical
b. Enter the client’s MAC address in the DHCP server’s ARP table
c. Make sure the Client for Microsoft Networks service is bound to the client’sNIC
d. Enter the DHCP server address in the Windows XP TCP/IP configuration
e. Nothing; in Windows XP the DHCP option is selected by default and theclient will obtain IP addressing information upon connecting to the network
61. You are a support technician installing a new NIC on a Windows XP workstation.After physically installing the NIC, then installing the appropriate device driver forthe NIC, you restart the workstation Upon restarting, an error indicates that the NIC
is attempting to use an IRQ already in use by another device.The workstation’s DeviceManager window indicates that both the NIC and the sound card are attempting touse IRQ 11 Of the following IRQs, which one could you most likely assign to thenew NIC so that it will not conflict with another device?
work-a. NIC
b. Client for Microsoft Networks
c. file-sharing services
d. protocol(s)
e. Microsoft Family Logon
63. Which one of the following media is most resistant to EMI?
Trang 1664. In the following figure, if router B suffers a failure, how will this failure affect nodes 1through 9?
a. They will only be unable to access the Internet
b. They will be unable to access the Internet and either nodes 10 through 14 or 15through 20
c. They will be unable to access the Internet, other nodes on the WAN, and othernodes on the LAN
d. They will be unable to access the Internet and nodes 10 through 20
e. Their connectivity will not be affected
65. Which of the following specifies standards for naming and accessing objects in an
NOS's directory and thereby improves interoperability?
Trang 18Visual Guide to Connectors
Appendix C
Throughout this book, you learned about several different cabling and nector options that may be used on networks Some, such as RJ-45, are very common, whereas others, such as Fiber LC connectors, are used only on newer high-speed networks So that you can compare such connectors and ensure that you understand their differences, this Appendix compiles draw- ings of the connectors and a brief summary of their application in a simple table.You must be familiar with the most popular types of connectors to qualify for Network+ certification.You can find more detail about these con- nectors and the networks on which they are used in Chapters 3 and 5.
Trang 19con-Table C-1 Network connectors and their uses
Connector Connector Receptacle Specification (front view) (side view) (front view) Application
older twisted-pair networks)
use with broadband video and data applications
example, on 100BASE-X, Gigabit, and 10-GB Ethernet networks)
networks)
cameras and external storage devices; also used to network computers in a bus topology
cameras and external storage devices; also used to network computers in a bus topology
networks)
Trang 20Table C-1 Continued
Connector Connector Receptacle Specification (front view) (side view) (front view) Application
networks)
mice, audio players, and NICs
RJ-45 connectors on newer Token Ring networks
net-works; has been replaced by
RJ-45 connectors on newer Token Ring networks
Trang 22Standard Networking Forms
Appendix D
Throughout this book, you have learned about various operating procedures and policies that help your IT operations, upgrades, and installations run more smoothly.This appendix offers examples of forms you can use when planning and maintaining a network Recognize that you may need to change the forms slightly to suit your environment.However, having a form template can help you remember steps you may otherwise have forgotten This appendix provides the following forms:
■ Server Installation Checklist—Windows Server 2003
■ Server Installation Checklist—NetWare 6.5
■ Server Installation Checklist—Red Hat Enterprise Linux ES
■ User Account Creation Form
■ Technical Support Contacts Form
■ Incident Report Form
■ Network Security Checklist
Trang 30Answers to Chapter Review Questions
Appendix E