Anda di halaman 1dari 27

Part A) Practice Test Answers are Black and Bold 1.

A Windows client in your Netware network had a faulty NIC which got replaced. The workstation no longer connects to the network, even though the configuration of the NIC is completed successfully. What could the problem be? A. Frame type of the NIC is misconfigured B. Incorrect driver version C. OS configuration problem D. None of the above 2. You just installed an application onto your Win2k workstation from the network and restarted it. It is no longer able to connect to the network, how will you roll back to the old setup before installing the software? A. Uninstall the software B. Use safe mode to boot up C. Use last known good configuration D. None of the above 3. Which of the following is used to connect an external transceiver to a NIC? A. ST B. SC C. AUI D. BNC E. RJ-45 4. You are configuring a dial-up connection for your network to connect with a remote server. Which of the following protocols must you configure to secure your authentication in terms of encryption? (Choose two.) A. SMTP (Simple Mail Transfer Protocol) B. TFTP (Trivial File Transfer Protocol) C. PPTP (Point-to-point Tunneling Protocol) D. TCP/IP (Transmission Control Protocol and Internet Protocol) 5. You have just added a computer to you network. The new computer can connect to the server only if any one of the existing computers gets shutdown. What could the problem be? A. The DHCP server has run out of IP addresses for the network. B. This computer uses static IP when the rest take it from DHCP. C. The computers' NIC is bad. D. None of the following.

6. Metro is a small company that is using static IP addressing scheme in its network. After a merger with a larger company Cosmo, which uses dynamic IP addressing and DNS for name resolution, the servers of Metro were moved to the server farm of Cosmo and their addressing schemes and resolutions were changed accordingly. After this change in the network structure the servers that were moved to the server farm are no longer reachable. What should you do to correct the problem? A. Delete the HOSTS file B. Correct the LMHOSTS file C. Correct the NETWORKS file D. Create the static NETSTAT entries.

7. Exhibit Identify the command that yields the output displayed in the exhibit

A. nbtstat B. network C. netstat -a D. network a 8. Which of the following are services of a proxy server? (Choose three.) A. Cached e-mail B. Cached client files C. Cached web pages D. Cached DNS information

9. You have heard that HTTPS is the most secure way to access a web server. You have decided to upgrade your web server's HTTP service to HTTPS. Although your intranet users are still able to access this web server, it is no longer accessible to the rest. You know it is the upgrade that caused this situation. But what of the following could be the specific cause? A. Your DNS server is down. B. Your Web server address has changed. C. Your firewall is blocking HTTP service port . D. Your firewall is blocking HTTPS service port. 10. Which networking topology is the easiest to reconfigure? A. bus B. ring C. star D. mesh 11. UNIX is an open source Operating System. T/F? A. True B. False 12. Which IEEE standard describes the specifications for a ring topology? A. 802.1 B. 802.2 C. 802.3 D. 802.4 E. 802.5 13. Which of the following is the correct connection for cascading MAus? A. Connect a single cable to port 1 on each MAU. B. Connect the uplink ports to each other on the MAU. C. Connect the ring in port to the ring out port on each MAU. D. Connect the ring in port to the ring in port and ring out port to ring out port in each MAU. 14. Which of the following is/are default Ethernet frame types for Netware versions above 3.12? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet_II D. Ethernet_SNAP

15. You have just upgraded your Dial-up server on the network. This server was used to share internet connections to the entire network. Users are unable to connect to the Internet now. What could be the likely cause of the problem? A. IP address of the Dial-up server might have changed. B. The DNS server could have failed to start right services. C. You probably needed to ally some patches and fixes after the upgrade, which hasn't been done. D. None of the above. 16. A backbone is a trunk cable that________________. A. Connects nodes and helps communication between them. B. Connects segments and helps communication between them. C. Connects networks and helps communication between them. D. All of the above. 17. After building a small network and connecting it to your ISP you notice that the clients are unable to browse the Internet. You call your ISP and he asks for the information configured on your router. You present the required information to him. He says the information is as it should be. You browse the net from the computer directly connected to your DSL modem and you are able to do so. What could the problem be? A. Incorrect IP configuration B. DNS not configured on the workstations C. DNS server not set on the DHCP server D. Default gateway not set on the workstations 18. Plug and play technology allows you to add devices to the computer without having to turn it off. T/F? A. True B. False 19. Which name resolution technique does a UNIX host use? A. DNS B. DHCP C. Proxy D. LMHOSTS 20. Your routing network has been experiencing severe congestion lately. You suspect the oldest 2 routers to be causing the problem. How would you verify this? A. Use tracert B. Use network analyzer C. Use ping D. Use IPConfig

21. Which of the following is true regarding this representation of IP address? 204.202.10.32/29 A. 29 bits of the 32 bits are reserved for host ID. B. 3 bits of the 32 bits are reserved for the network ID. C. 29 bits of the 32 bits are reserved for the network ID. D. None of the above 22. Which of the following file systems is supported by Windows 2000 & above OS only? A. NTFS 4 B. NTFS 5 C. FAT 16 D. FAT 32 23. IPX routing is enabled by default in all Cisco routers. T/F? A. True B. False 24. Which of the following connector is used in a 10BASE2 Bus topology? A. SC B. ST C. BNC D. RJ-11 E. RJ-45 25. You are a traveling user who connects to the remote site from your laptop whenever you visit that site. Today when you connect your laptop to the network, you are unable to login. You check your IP configuration and your IP address is 0.0.0.0. What is the likely cause for the problem? A. The DNS server is down. B. The DHCP server is not reachable. C. The NetBIOS over TCP/IP has been disconnected. D. The workstation has become unplugged from the network. 26. Which of the following protocols is supported by Windows 2000 Server for the purpose of dial-up? Choose two A. PPP B. SLIP C. TCP/IP D. IPX/SPX

27. Which of the following permissions would be appropriate for Unix/Linux file system? (Choose three) A. Read (r) B. Write (w) C. Change (c) D. Execute (x) 28. You are configuring a small home network. The main system has workgroup name 'elle' and the client has workgroup name 'ELLE' will the connection work? A. Yes B. No C. Maybe D. None of the above. 29. The ADS employs the flat domain structure. T/F? A. True B. False 30. Which of the following media access scheme does the token ring network use? A. Token passing B. CSMA/CD. C. CSMA/CA. D. None of the above 31. You are connecting an Windows workstation to a NetWare 4.11 server. The workstation is unable to connect to the server, but it is able to connect to the Internet. Which two are possible problems? (Choose two.) A. The server is not running NetBEUI B. The server is not running AppleTalk C. The workstation is not running IPX/SPX D. The workstation is not running NetBEUI 32. Which of the following file systems is used by UNIX? A. Netware File system B. Network file system C. FAT D. NTFS 33. Which of the following allows fault tolerance for user authentication in a Windows 2000 network? A. Multi master replication B. Bindery replication C. Mirror servers D. None of the above

34. Which of the following devices is required to complete a VLAN set up successfully? A. Hub B. Router C. Modem 35. How many maximum subnet IDs are possible in this situation? Class C network 221.222.162.0 255.255.255.0, subnet by borrowing 5 bits, A. 30 subnet IDs B. 20 subnet IDs C. 22 subnet IDs D. 32 subnets 36. Which of the following access security does Windows 2000 Server use on LANs? A. SSL B. L2TP C. IPsec D. Kerberos 37. _________________ is used to propagate VLAN information across a trunked link. A. Spanning Tree Protocol` B. Virtual Trunk Protocol` C. Static VLAN Protocol` D. None of the above 38. Which of the following makes the DNS environment a backbone of the Windows 2000 network? A. DHCP B. DDNS C. ADNS D. None of the above. 39. If you were to identify a NetBIOS name corresponding to an IP address, where would you look for it? A. Arp cache B. MAC address table of switch C. DNS cache D. NetBIOS name cache 40. Which of the following is used to map Network-layer protocol address to DLCIs? A. RARP B. Inverse ARP C. ARP D. None of the above

41. You have been successfully connecting to the Internet through your network till you installed a firewall. Now although you are unable to connect to your usual website, you are able to ping them using IP address. What's wrong? A. Your DNS server has crashed. B. You have inadvertently blocked the DNS server.. C. You firewall is not functioning. D. Your router is not functioning. 42. On a bus segment, you have introduced a new workstation after which the entire segment collapses. What could be the possible cause/causes for the problem? Select 2 A. Faulty NIC B. Faulty termination C. Faulty cabling. D. Faulty server. 43. Which of the following commands will help to create a static route from a router Router A to destination network 172.12.0.0? A. ip static 172.12.7.0 255.255.0.0 0.0.0.0 B. ip route 172.12.0.0 255.255.0.0 172.12.8.1 C. ip static 172.12.7.0 255.255.255.0 any D. ip route 172.14.7.0 255.255.0.0 172.14.8.2 44. Provide the broadcast address for the following: IP Address: 221.240.224.121 Subnet mask: 255.255.255.248. A. 221.240.224.127 B. 221.240.224.255 C. 221.240.224.0 D. 221.240.224.126 45. You are configuring a leased line for your network with the help of your service provider. You are now testing for the loop. The modem does not detect a dial tone but responds to the off-hook. What is a possible cause for this dial back-up failure? A. Router B. Cable C. Modem 46. Which of the following devices is used to connect multiple computers on a network segment? A. hub B. NIC C. router D. bridge

47. Your present network uses HOSTS file for IP to host name resolution. You are planning on adding a DNS server and moving a few servers to a remote site with different IP address. Which of the following will hold true? A. Users will be able to connect if a DNS server is added to the affected network segments. B. Users will be able to connect if a WINS server is added to the affected network segments. C. Users will be able to connect if a DNS server is enabled and the HOSTS file is deleted. D. Users will be able to connect if a DNS is enabled on the workstation and the HOSTS file is deleted. 48. Static routing needs manual intervention to configure a routing entry to the destination. T/F? A. True B. False 49. You have just created an internal network that has address 172.16.0.0/16. Which of the following will be the subnet mask you assign for this network? A. 255.0.0.0 B. 172.16.0.0 C. 255.0.0.0 D. 255.255.0.0 E. 255.255.255.0 50. You have just connected a brand new dial-up modem that does not require drivers. You have configured the modem and shared it for your Peer-to-Peer network as per the instructions in the manual. Your system just refuses to recognize this PCI modem. What must you do next? Select 2 A. Change the slot. B. Return the modem. C. Try restarting your computer. D. None of the above. 51. Linux is a __________ operating system. A. 32 bit B. 48 bit C. 64 bit D. 128 bit 52. Kerberos is ideally meant for_____________. A. Authenticating LAN users B. Authenticating WAN users C. Encrypting database D. Encrypting user names.

53. Which of the following can be used to check for the transmission and reception ports on a NIC? A. Network Analyzer B. Multimeter C. crossover cable D. hardware loopback 54. Which of the following are required when logging on to a Windows NT Server? (Choose two.) A. Password B. Username C. IP address D. MAC address 55. Which of the interfaces on the router would be used by the switch, if the switch needs to connect to the router? A. Serial Interface B. Auxiliary port C. Fast Ethernet D. Ethernet 56. Which of the following are some commonalities between Windows NT and Windows 2000? A. They are both based on NT kernel. B. They are both meant for Internetworking C. They both require DNS for basic operation. D. None of the above. 57. Which of the following is a non-routable protocol? A. Apple talk B. TCP/IP C. IPX/SPX D. NetBEUI 58. Routing Information Protocol (RIP) by default has_____________ number of hops. A. 15 B. 16 C. 10 D. 12

59. You have interlinked two of your offices using a router. Though your network uses IP addresses, the users prefer using host names to numbers as it is easy to remember. You have to configure the network such that the users of either side can access resources on either side using the host names. Which of the following needs to be configured for this network? (Choose two.) A. DNS B. WINS C. SNMP D. TCP/IP 60. Which of the following statements about bridges is true? A. Bridges are useful for network layer routing. B. Bridges are more efficient than repeaters. C. Bridges are firmware devices. D. Bridges reduce network efficiency. 61. Which of the following file systems are not supported by Windows NT 4.0? Select 2 A. NTFS 4 B. NTFS 5 C. FAT 16 D. FAT 32 62. Bridges operate at physical layer . T/F? A. True B. False 63. Which of the following are used for increasing fault toleranace? Choose three A. Tape backup B. Mirrored servers C. RAID disk storage D. Off-site data archive 64. The SMB (server message block) protocol runs on the Windows server and allows UNIX and Linux servers to see the Windows server as one of the UNIX/LINUX based servers. T/F? A. True B. False 65. Which of the following is not a network operating system? A. Windows NT B. Windows 2000 C. Windows for Workgroups D. Linux

66. Which of the following is the least fault tolerant of all networking topologies? A. bus B. ring C. star D. mesh 67. Which of the following protocols does Network Attached Storage (NAS) use? (Choose two.) A. IPX B. ATM C. TCP/IP D. Frame Relay 68. If you were asked to subnet a network in such a way as to arrive at 6 network Ids you would need to borrow 2 bits. T/F? A. True B. False 69. Which of the following is an ideal location for storing a tape into which you have just finished backing up? A. In the server room B. In the Network administrator's desk C. In the communication room D. in a locked safe at on offsite location 70. PPTP is a protocol that is ideally meant for _____. A. Dial-up B. LAN connections C. VPNs D. None of the above. 71. Which of the following functions is a firewall capable of? Choose two A. Block traffic B. Permit traffic C. Verify company policies D. Authenticate internal users 72. It is required that you block UDP ports on your firewall for security reasons. Which of the following services may be affected? A. FTP B. NTP C. HTTP D. SMTP

73. You have just performed a backup on one of the most critical servers on your network. This server is accessed most frequently and hosts maximum amount of network data. Which of the following must you do now? A. Dispatch it immediately to be stored in an offsite location. B. Keep it onsite for as long as it takes to verify the backup. C. Store it onsite permanently, incase you may need to restore it in the near future. D. Verify the backup on a test server immediately and then dispatch the tape to be stored in an offsite location. 74. Which of the following directory services can the Active Directory Service be compared with? A. Netware Directory Services B. File directory services C. NT Directory services D. None of the above. 75. In a Windows 2000 network, it is imperative that you must be physically connected to the printer into which you wish to fire a printout. T/F? A. True B. False 76. You have introduced a fully configured workstation into your network. Your network is IP based and uses static IP addressing. Everytime the new workstation connects to the network, another existing computer generates an error message and stops connecting. What could the problem be? A. DNS servers have not been assigned. B. WINS servers have not been assigned. C. Duplicate gateways have not been assigned D. Duplicate IP addresses have been assigned. 77. Windows 2000 does not support plug and play devices and so every device will have to be manually configured. T/F? A. True B. False 78. Into which of the following does the ADS store its information? Select all that apply A. AD database B. AD log files C. Shared system volume. D. None of the above. 79. Administrative authority is delegated to Administrators in Windows 2000 networks. T/F? A. True B. False

80. You wish to segregate your sales department logically in terms of the products that they deal with. There are 3 such groups. The data intended for Product 1 must not reach Product 2 and 3 and so on. Which of the following would be an ideal solution for this situation? A. SNMP B. VLANs C. Routing D. RMON probe Total Correct: 26 Total Wrong: 54 Total Score: 274 Result: Fail

Second Test (Final): Black and Bold= my answer Bold and or Green= right answer 1. Which IEEE standard describes the specifications for a ring topology? A. 802.1 B. 802.2 C. 802.3 D. 802.4 E. 802.5 2. Your present network uses HOSTS file for IP to host name resolution. You are planning on adding a DNS server and moving a few servers to a remote site with different IP address. Which of the following will hold true? A. Users will be able to connect if a DNS server is added to the affected network segments. B. Users will be able to connect if a WINS server is added to the affected network segments. C. Users will be able to connect if a DNS server is enabled and the HOSTS file is deleted. D. Users will be able to connect if a DNS is enabled on the workstation and the HOSTS file is deleted. 3. In a Windows 2000 network, it is imperative that you must be physically connected to the printer into which you wish to fire a printout. T/F? A. True B. False 4. You have interlinked two of your offices using a router. Though your network uses IP addresses, the users prefer using host names to numbers as it is easy to remember. You have to configure the network such that the users of either side can access resources on either side using the host names. Which of the following needs to be configured for this network? (Choose two.) A. DNS B. WINS

C. SNMP D. TCP/IP 5. Which of the following is a non-routable protocol? A. Apple talk B. TCP/IP C. IPX/SPX D. NetBEUI 6. Which of the following is not a network operating system? A. Windows NT B. Windows 2000 C. Windows for Workgroups D. Linux 7. Which of the following are some commonalities between Windows NT and Windows 2000? A. They are both based on NT kernel. B. They are both meant for Internetworking C. They both require DNS for basic operation. D. None of the above. 8. You just installed an application onto your Win2k workstation from the network and restarted it. It is no longer able to connect to the network, how will you roll back to the old setup before installing the software? A. Uninstall the software B. Use safe mode to boot up C. Use last known good configuration D. None of the above 9. You have been successfully connecting to the Internet through your network till you installed a firewall. Now although you are unable to connect to your usual website, you are able to ping them using IP address. What's wrong? A. Your DNS server has crashed. B. You have inadvertently blocked the DNS server.. C. You firewall is not functioning. D. Your router is not functioning. 10. You are a traveling user who connects to the remote site from your laptop whenever you visit that site. Today when you connect your laptop to the network, you are unable to login. You check your IP configuration and your IP address is 0.0.0.0. What is the likely cause for the problem? A. The DNS server is down. B. The DHCP server is not reachable. C. The NetBIOS over TCP/IP has been disconnected. D. The workstation has become unplugged from the network.

11. You are connecting an Windows workstation to a NetWare 4.11 server. The workstation is unable to connect to the server, but it is able to connect to the Internet. Which two are possible problems? (Choose two.) A. The server is not running NetBEUI B. The server is not running AppleTalk C. The workstation is not running IPX/SPX D. The workstation is not running NetBEUI 12. Static routing needs manual intervention to configure a routing entry to the destination. T/F ? A. True B. False 13. Which of the following is/are default Ethernet frame types for Netware versions above 3.12? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet_II D. Ethernet_SNAP 14. Which of the following are services of a proxy server? (Choose three.) A. Cached e-mail B. Cached client files C. Cached web pages D. Cached DNS information 15. Which of the following functions is a firewall capable of? Choose two A. Block traffic B. Permit traffic C. Verify company policies D. Authenticate internal users 16. Which of the following devices is used to connect multiple computers on a network segment? A. hub B. NIC C. router D. bridge 17. PPTP is a protocol that is ideally meant for _____. A. Dial-up B. LAN connections C. VPNs D. None of the above.

18. Which of the interfaces on the router would be used by the switch, if the switch needs to connect to the router? A. Serial Interface B. Auxiliary port C. Fast Ethernet D. Ethernet 19. Which of the following is true regarding this representation of IP address? 204.202.10.32/29 A. 29 bits of the 32 bits are reserved for host ID. B. 3 bits of the 32 bits are reserved for the network ID. C. 29 bits of the 32 bits are reserved for the network ID. D. None of the above 20. Your routing network has been experiencing severe congestion lately. You suspect the oldest 2 routers to be causing the problem. How would you verify this? A. Use tracert B. Use network analyzer C. Use ping D. Use IPConfig 21. UNIX is an open source Operating System. T/F? A. True B. False 22. Which of the following permissions would be appropriate for Unix/Linux file system? (Choose three) A. Read (r) B. Write (w) C. Change (c) D. Execute (x) 23. Which of the following is the least fault tolerant of all networking topologies? A. bus B. ring C. star D. mesh 24. The ADS employs the flat domain structure. T/F? A. True B. False 25. Kerberos is ideally meant for_____________. A. Authenticating LAN users B. Authenticating WAN users C. Encrypting database

D. Encrypting user names. 26. You have just connected a brand new dial-up modem that does not require drivers. You have configured the modem and shared it for your Peer-to-Peer network as per the instructions in the manual. Your system just refuses to recognize this PCI modem. What must you do next? Select 2 A. Change the slot. B. Return the modem. C. Try restarting your computer. D. None of the above. 27. Which name resolution technique does a UNIX host use? A. DNS B. DHCP C. Proxy D. LMHOSTS 28. You wish to segregate your sales department logically in terms of the products that they deal with. There are 3 such groups. The data intended for Product 1 must not reach Product 2 and 3 and so on. Which of the following would be an ideal solution for this situation? A. SNMP B. VLANs C. Routing D. RMON probe 29. A Windows client in your Netware network had a faulty NIC which got replaced. The workstation no longer connects to the network, even though the configuration of the NIC is completed successfully. What could the problem be? A. Frame type of the NIC is misconfigured B. Incorrect driver version C. OS configuration problem D. None of the above 30. The SMB (server message block) protocol runs on the Windows server and allows UNIX and Linux servers to see the Windows server as one of the UNIX/LINUX based servers. T/F? A. True B. False 31. Windows 2000 does not support plug and play devices and so every device will have to be manually configured. T/F? A. True B. False 32. Bridges operate at physical layer . T/F?

A. True B. False 33. IPX routing is enabled by default in all Cisco routers. T/F? A. True B. False 34. How many maximum subnet IDs are possible in this situation? Class C network 221.222.162.0 255.255.255.0, subnet by borrowing 5 bits, A. 30 subnet IDs B. 20 subnet IDs C. 22 subnet IDs D. 32 subnets 35. You are configuring a leased line for your network with the help of your service provider. You are now testing for the loop. The modem does not detect a dial tone but responds to the off-hook. What is a possible cause for this dial back-up failure? A. Router B. Cable C. Modem 36. Which of the following protocols does Network Attached Storage (NAS) use? (Choose two.) A. IPX B. ATM C. TCP/IP D. Frame Relay 37. Which of the following directory services can the Active Directory Service be compared with? A. Netware Directory Services B. File directory services C. NT Directory services D. None of the above. 38. Which of the following connector is used in a 10BASE2 Bus topology? A. SC B. ST C. BNC D. RJ-11 E. RJ-45 39. Which of the following is used to map Network-layer protocol address to DLCIs? A. RARP B. Inverse ARP

C. ARP D. None of the above 40. Plug and play technology allows you to add devices to the computer without having to turn it off. T/F? A. True B. False 41. Which of the following file systems is used by UNIX? A. Netware File system B. Network file system C. FAT D. NTFS 42. Linux is a __________ operating system. A. 32 bit B. 48 bit C. 64 bit D. 128 bit 43. You have just created an internal network that has address 172.16.0.0/16. Which of the following will be the subnet mask you assign for this network? A. 255.0.0.0 B. 172.16.0.0 C. 255.0.0.0 D. 255.255.0.0 E. 255.255.255.0 44. Which of the following file systems is supported by Windows 2000 & above OS only? A. NTFS 4 B. NTFS 5 C. FAT 16 D. FAT 32 45. It is required that you block UDP ports on your firewall for security reasons. Which of the following services may be affected? A. FTP B. NTP C. HTTP D. SMTP 46. You have just upgraded your Dial-up server on the network. This server was used to share internet connections to the entire network. Users are unable to connect to the Internet now. What could be the likely cause of the problem? A. IP address of the Dial-up server might have changed.

B. The DNS server could have failed to start right services. C. You probably needed to ally some patches and fixes after the upgrade, which hasn't been done. D. None of the above. 47. Which of the following file systems are not supported by Windows NT 4.0? Select 2 A. NTFS 4 B. NTFS 5 C. FAT 16 D. FAT 32 48. On a bus segment, you have introduced a new workstation after which the entire segment collapses. What could be the possible cause/causes for the problem? Select 2 A. Faulty NIC B. Faulty termination C. Faulty cabling. D. Faulty server. 49. Exhibit Identify the command that yields the output displayed in the exhibit

A. nbtstat B. network C. netstat -a D. network a 50. Which networking topology is the easiest to reconfigure? A. bus B. ring C. star D. mesh 51. Which of the following makes the DNS environment a backbone of the Windows 2000 network?

A. DHCP B. DDNS C. ADNS D. None of the above. 52. Which of the following commands will help to create a static route from a router Router A to destination network 172.12.0.0? A. ip static 172.12.7.0 255.255.0.0 0.0.0.0 B. ip route 172.12.0.0 255.255.0.0 172.12.8.1 C. ip static 172.12.7.0 255.255.255.0 any D. ip route 172.14.7.0 255.255.0.0 172.14.8.2 53. Which of the following allows fault tolerance for user authentication in a Windows 2000 network? A. Multi master replication B. Bindery replication C. Mirror servers D. None of the above 54. You have just added a computer to you network. The new computer can connect to the server only if any one of the existing computers gets shutdown. What could the problem be? A. The DHCP server has run out of IP addresses for the network. B. This computer uses static IP when the rest take it from DHCP. C. The computers' NIC is bad. D. None of the following. 55. You have heard that HTTPS is the most secure way to access a web server. You have decided to upgrade your web server's HTTP service to HTTPS. Although your intranet users are still able to access this web server, it is no longer accessible to the rest. You know it is the upgrade that caused this situation. But what of the following could be the specific cause? A. Your DNS server is down. B. Your Web server address has changed. C. Your firewall is blocking HTTP service port . D. Your firewall is blocking HTTPS service port. 56. Which of the following are required when logging on to a Windows NT Server? (Choose two.) A. Password B. Username C. IP address D. MAC address 57. Metro is a small company that is using static IP addressing scheme in its network. After a merger with a larger company Cosmo, which uses dynamic IP addressing and

DNS for name resolution, the servers of Metro were moved to the server farm of Cosmo and their addressing schemes and resolutions were changed accordingly. After this change in the network structure the servers that were moved to the server farm are no longer reachable. What should you do to correct the problem? A. Delete the HOSTS file B. Correct the LMHOSTS file C. Correct the NETWORKS file D. Create the static NETSTAT entries. 58. _________________ is used to propagate VLAN information across a trunked link. A. Spanning Tree Protocol` B. Virtual Trunk Protocol` C. Static VLAN Protocol` D. None of the above 59. Which of the following are used for increasing fault toleranace? Choose three A. Tape backup B. Mirrored servers C. RAID disk storage D. Off-site data archive 60. Which of the following is an ideal location for storing a tape into which you have just finished backing up? A. In the server room B. In the Network administrator's desk C. In the communication room D. in a locked safe at on offsite location 61. Which of the following protocols is supported by Windows 2000 Server for the purpose of dial-up? Choose two A. PPP B. SLIP C. TCP/IP D. IPX/SPX 62. Which of the following devices is required to complete a VLAN set up successfully? A. Hub B. Router C. Modem 63. You are configuring a small home network. The main system has workgroup name 'elle' and the client has workgroup name 'ELLE' will the connection work? A. Yes B. No C. Maybe D. None of the above.

64. After building a small network and connecting it to your ISP you notice that the clients are unable to browse the Internet. You call your ISP and he asks for the information configured on your router. You present the required information to him. He says the information is as it should be. You browse the net from the computer directly connected to your DSL modem and you are able to do so. What could the problem be? A. Incorrect IP configuration B. DNS not configured on the workstations C. DNS server not set on the DHCP server D. Default gateway not set on the workstations 65. You are configuring a dial-up connection for your network to connect with a remote server. Which of the following protocols must you configure to secure your authentication in terms of encryption? (Choose two.) A. SMTP (Simple Mail Transfer Protocol) B. TFTP (Trivial File Transfer Protocol) C. PPTP (Point-to-point Tunneling Protocol) D. TCP/IP (Transmission Control Protocol and Internet Protocol) 66. A backbone is a trunk cable that________________. A. Connects nodes and helps communication between them. B. Connects segments and helps communication between them. C. Connects networks and helps communication between them. D. All of the above. 67. You have introduced a fully configured workstation into your network. Your network is IP based and uses static IP addressing. Everytime the new workstation connects to the network, another existing computer generates an error message and stops connecting. What could the problem be? A. DNS servers have not been assigned. B. WINS servers have not been assigned. C. Duplicate gateways have not been assigned D. Duplicate IP addresses have been assigned. 68. Which of the following can be used to check for the transmission and reception ports on a NIC? A. Network Analyzer B. Multimeter C. crossover cable D. hardware loopback 69. Which of the following access security does Windows 2000 Server use on LANs? A. SSL B. L2TP C. IPsec D. Kerberos

70. Which of the following media access scheme does the token ring network use? A. Token passing B. CSMA/CD. C. CSMA/CA. D. None of the above 71. Which of the following is used to connect an external transceiver to a NIC? A. ST B. SC C. AUI D. BNC E. RJ-45 72. Provide the broadcast address for the following: IP Address: 221.240.224.121 Subnet mask: 255.255.255.248. A. 221.240.224.127 B. 221.240.224.255 C. 221.240.224.0 D. 221.240.224.126 73. You have just performed a backup on one of the most critical servers on your network. This server is accessed most frequently and hosts maximum amount of network data. Which of the following must you do now? A. Dispatch it immediately to be stored in an offsite location. B. Keep it onsite for as long as it takes to verify the backup. C. Store it onsite permanently, incase you may need to restore it in the near future. D. Verify the backup on a test server immediately and then dispatch the tape to be stored in an offsite location. 74. If you were asked to subnet a network in such a way as to arrive at 6 network Ids you would need to borrow 2 bits. T/F? A. True B. False 75. Administrative authority is delegated to Administrators in Windows 2000 networks. T/F? A. True B. False

76. If you were to identify a NetBIOS name corresponding to an IP address, where would you look for it? A. Arp cache B. MAC address table of switch C. DNS cache D. NetBIOS name cache 77. Routing Information Protocol (RIP) by default has_____________ number of hops. A. 15 B. 16 C. 10 D. 12 78. Which of the following is the correct connection for cascading MAus? A. Connect a single cable to port 1 on each MAU. B. Connect the uplink ports to each other on the MAU. C. Connect the ring in port to the ring out port on each MAU. D. Connect the ring in port to the ring in port and ring out port to ring out port in each MAU. 79. Which of the following statements about bridges is true? A. Bridges are useful for network layer routing. B. Bridges are more efficient than repeaters. C. Bridges are firmware devices. D. Bridges reduce network efficiency. 80. Into which of the following does the ADS store its information? Select all that apply A. AD database B. AD log files C. Shared system volume. D. None of the above. Total Correct: 55 Acronym CNA Total Wrong: 25 Total Score: 584 Result: Pass Who Offers It Cisco

CNE

CCNA

Definition and What's Covered Cisco Network Assistant simplifies wired and wireless network management for networks up to 80 devices Certified Novell Engineer is an individual who has knowledge and skills related to administration and troubleshooting. Cisco Certified Network Associate is a program which helps network engineers expand their knowledge of networking and the values of the employers network

Novell

Cisco

CCIE

MCSE

A+

Server+ Security+

Inet+ Network +. CCNET

CCNP

IOS

Cisco Certified Internetwork Expert, people with this certification are recognized for their expert network engineering skills and mastery of Cisco products and solutions. Microsoft Certified Systems Engineer, is an expert on Microsoft Windows NT operating system, related desktop systems, networking, and Microsoft's BackOffice server products. Certification for someone who is good with assembling and disassembling the computer and also good with operating systems. Certification for system hardware, software, and storage. Certification teaches you about system security, network infrastructure, access control, assessments, audits, cryptography, and organizational security. Certification for the basic knowledge on internet, intranet, extranet, and electronic commerce. Certification for network technologies, installation and configuration, media and topologies. Cisco Certified Entry Networking Technician, is someone who has the knowledge to install, operate and troubleshoot a small enterprise branch network, including basic network security. Cisco Certified Network Professional, is someone who has the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks and work collaboratively with specialists on advanced security, voice, wireless and video solutions. Internet Working Operating System is operating system software that runs routers and switches mad by ciso comprising the majority of the Internet.

Cisco

Microsoft

CompTIA

CompTIA CompTIA

CompTIA CompTIA Cisco

Cisco

Cisco

Anda mungkin juga menyukai