Download File

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Network tap wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Remote Desktop Services wikipedia , lookup

Airborne Networking wikipedia , lookup

Distributed firewall wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
NP-E1-35
On a bus segment, you have introduced a new workstation after which the entire segment collapses.
What could be the possible cause/causes for the problem? Select 2
Your answer:
C. Faulty cabling.
Correct answer:
A. Faulty NIC, B. Faulty termination
NP-E1-43
Which of the following is the least fault tolerant of all networking topologies?
Your answer:
D. mesh
Correct answer:
A. bus
NP-E1-42
Which of the following access security does Windows 2000 Server use on LANs?
Your answer:
C. IPsec
Correct answer:
D. Kerberos
NP-E1-47
Which of the following is used to connect an external transceiver to a NIC?
Your answer:
E. RJ-45
Correct answer:
C. AUI
NP-E1-53
If you were asked to subnet a network in such a way as to arrive at 6 network Ids you would need to
borrow 2 bits. T/F?
Your answer:
A. True
Correct answer:
B. False
NP-E1-32
A Windows client in your Netware network had a faulty NIC which got replaced. The workstation no
longer connects to the network, even though the configuration of the NIC is completed successfully. What
could the problem be?
Your answer:
C. OS configuration problem
Correct answer:
A. Frame type of the NIC is misconfigured
NP-E1-61
A backbone is a trunk cable that________________.
Your answer:
B. Connects segments and helps communication between them.
Correct answer:
D. All of the above.
NP-E1-25
Which of the interfaces on the router would be used by the switch, if the switch needs to connect to the
router?
Your answer:
D. Ethernet
Correct answer:
C. Fast Ethernet
NP-E1-75
The ADS employs the flat domain structure. T/F?
Your answer:
A. True
Correct answer:
B. False
NP-E1-30
Which of the following can be used to check for the transmission and reception ports on a NIC?
Your answer:
C. crossover cable
Correct answer:
D. hardware loopback
NP-E1-31
If you were to identify a NetBIOS name corresponding to an IP address, where would you look for it?
Your answer:
C. DNS cache
Correct answer:
D. NetBIOS name cache
NP-E1-79
Which of the following file systems is used by UNIX?
Your answer:
A. Netware File system
Correct answer:
B. Network file system
NP-E1-50
Which of the following is true regarding this representation of IP address?
204.202.10.32/29
Your answer:
D. None of the above
Correct answer:
C. 29 bits of the 32 bits are reserved for the network ID.
NP-E1-70
In a Windows 2000 network, it is imperative that you must be physically connected to the printer into
which you wish to fire a printout. T/F?
Your answer:
A. True
Correct answer:
B. False
NP-E1-22
You have just connected a brand new dial-up modem that does not require drivers. You have configured
the modem and shared it for your Peer-to-Peer network as per the instructions in the manual. Your
system just refuses to recognize this PCI modem. What must you do next? Select 2
Your answer:
C. Try restarting your computer.
Correct answer:
A. Change the slot., C. Try restarting your computer.
NP-E1-64
Which of the following file systems is supported by Windows 2000 & above OS only?
Your answer:
D. FAT 32
Correct answer:
B. NTFS 5
NP-E1-69
Kerberos is ideally meant for_____________.
Your answer:
B. Authenticating WAN users
Correct answer:
A. Authenticating LAN users
NP-E1-4
Which of the following functions is a firewall capable of? Choose two
Your answer:
A. Block traffic, D. Authenticate internal users
Correct answer:
A. Block traffic, B. Permit traffic
NP-E1-2
Which of the following is an ideal location for storing a tape into which you have just finished backing up?
Your answer:
C. In the communication room
Correct answer:
D. in a locked safe at on offsite location
NP-E1-51
Provide the broadcast address for the following:
IP Address: 221.240.224.121
Subnet mask: 255.255.255.248.
Your answer:
B. 221.240.224.255
Correct answer:
A. 221.240.224.127
NP-E1-78
Which of the following allows fault tolerance for user authentication in a Windows 2000 network?
Your answer:
C. Mirror servers
Correct answer:
A. Multi master replication
NP-E1-20
You are connecting an Windows workstation to a NetWare 4.11 server. The workstation is unable to
connect to the server, but it is able to connect to the Internet. Which two are possible problems? (Choose
two.)
Your answer:
A. The server is not running NetBEUI
Correct answer:
A. The server is not running NetBEUI, C. The workstation is not running IPX/SPX
NP-E1-3
Which of the following are services of a proxy server? (Choose three.)
Your answer:
D. Cached DNS information
Correct answer:
A. Cached e-mail, B. Cached client files, C. Cached web pages
NP-E1-37
Metro is a small company that is using static IP addressing scheme in its network. After a merger with a
larger company Cosmo, which uses dynamic IP addressing and DNS for name resolution, the servers of
Metro were moved to the server farm of Cosmo and their addressing schemes and resolutions were
changed accordingly. After this change in the network structure the servers that were moved to the server
farm are no longer reachable. What should you do to correct the problem?
Your answer:
B. Correct the LMHOSTS file
Correct answer:
A. Delete the HOSTS file
NP-E1-48
Which of the following connector is used in a 10BASE2 Bus topology?
Your answer:
E. RJ-45
Correct answer:
C. BNC
NP-E1-8
Which of the following protocols is supported by Windows 2000 Server for the purpose of dial-up?
Choose two
Your answer:
C. TCP/IP
Correct answer:
A. PPP, B. SLIP
NP-E1-34
Exhibit
Identify the command that yields the output displayed in the exhibit
Your answer:
A. nbtstat
Correct answer:
C. netstat -a
NP-E1-21
You have just upgraded your Dial-up server on the network. This server was used to share internet
connections to the entire network. Users are unable to connect to the Internet now. What could be the
likely cause of the problem?
Your answer:
A. IP address of the Dial-up server might have changed.
Correct answer:
B. The DNS server could have failed to start right services.
NP-E1-63
Which of the following are some commonalities between Windows NT and Windows 2000?
Your answer:
C. They both require DNS for basic operation.
Correct answer:
A. They are both based on NT kernel.
NP-E1-39
You have heard that HTTPS is the most secure way to access a web server. You have decided to
upgrade your web server's HTTP service to HTTPS. Although your intranet users are still able to access
this web server, it is no longer accessible to the rest. You know it is the upgrade that caused this
situation. But what of the following could be the specific cause?
Your answer:
C. Your firewall is blocking HTTP service port .
Correct answer:
D. Your firewall is blocking HTTPS service port.
NP-E1-52
How many maximum subnet IDs are possible in this situation?
Class C network 221.222.162.0 255.255.255.0, subnet by borrowing 5 bits,
Your answer:
C. 22 subnet IDs
Correct answer:
A. 30 subnet IDs
NP-E1-74
Into which of the following does the ADS store its information? Select all that apply
Your answer:
B. AD log files, C. Shared system volume.
Correct answer:
A. AD database, B. AD log files, C. Shared system volume.
NP-E1-10
You wish to segregate your sales department logically in terms of the products that they deal with. There
are 3 such groups. The data intended for Product 1 must not reach Product 2 and 3 and so on. Which of
the following would be an ideal solution for this situation?
Your answer:
C. Routing
Correct answer:
B. VLANs
NP-E1-33
You have introduced a fully configured workstation into your network. Your network is IP based and uses
static IP addressing. Everytime the new workstation connects to the network, another existing computer
generates an error message and stops connecting. What could the problem be?
Your answer:
C. Duplicate gateways have not been assigned
Correct answer:
D. Duplicate IP addresses have been assigned.
NP-E1-55
Which of the following devices is required to complete a VLAN set up successfully?
Your answer:
A. Hub
Correct answer:
B. Router
NP-E1-14
You have just performed a backup on one of the most critical servers on your network. This server is
accessed most frequently and hosts maximum amount of network data. Which of the following must you
do now?
Your answer:
B. Keep it onsite for as long as it takes to verify the backup.
Correct answer:
D. Verify the backup on a test server immediately and then dispatch the tape to be stored in an offsite location.
NP-E1-18
You just installed an application onto your Win2k workstation from the network and restarted it. It is no
longer able to connect to the network, how will you roll back to the old setup before installing the
software?
Your answer:
B. Use safe mode to boot up
Correct answer:
C. Use last known good configuration
NP-E1-36
Which of the following media access scheme does the token ring network use?
Your answer:
D. None of the above
Correct answer:
A. Token passing
NP-E1-45
_________________ is used to propagate VLAN information across a trunked link.
Your answer:
D. None of the above
Correct answer:
B. Virtual Trunk Protocol`
NP-E1-77
Which of the following makes the DNS environment a backbone of the Windows 2000 network?
Your answer:
A. DHCP
Correct answer:
B. DDNS
NP-E1-49
Which IEEE standard describes the specifications for a ring topology?
Your answer:
B. 802.2
Correct answer:
E. 802.5
NP-E1-9
You are configuring a dial-up connection for your network to connect with a remote server. Which of the
following protocols must you configure to secure your authentication in terms of encryption? (Choose
two.)
Your answer:
B. TFTP (Trivial File Transfer Protocol)
Correct answer:
C. PPTP (Point-to-point Tunneling Protocol), D. TCP/IP (Transmission Control Protocol and Internet Protocol)
NP-E1-6
It is required that you block UDP ports on your firewall for security reasons. Which of the following
services may be affected?
Your answer:
C. HTTP
Correct answer:
B. NTP
NP-E1-40
Which of the following is used to map Network-layer protocol address to DLCIs?
Your answer:
C. ARP
Correct answer:
B. Inverse ARP
NP-E1-41
Which of the following commands will help to create a static route from a router Router A to destination
network 172.12.0.0?
Your answer:
A. ip static 172.12.7.0 255.255.0.0 0.0.0.0
Correct answer:
B. ip route 172.12.0.0 255.255.0.0 172.12.8.1
NP-E1-7
You have just created an internal network that has address 172.16.0.0/16. Which of the following will be
the subnet mask you assign for this network?
Your answer:
A. 255.0.0.0
Correct answer:
D. 255.255.0.0
NP-E1-1
Which of the following permissions would be appropriate for Unix/Linux file system? (Choose three)
Your answer:
C. Change (c)
Correct answer:
A. Read (r), B. Write (w), D. Execute (x)
NP-E1-68
PPTP is a protocol that is ideally meant for _____.
Your answer:
B. LAN connections
Correct answer:
C. VPNs
NP-E1-15
Which of the following is a non-routable protocol?
Your answer:
A. Apple talk
Correct answer:
D. NetBEUI
NP-E1-73
Linux is a __________ operating system.
Your answer:
B. 48 bit
Correct answer:
A. 32 bit
NP-E1-56
Which of the following statements about bridges is true?
Your answer:
A. Bridges are useful for network layer routing.
Correct answer:
B. Bridges are more efficient than repeaters.
NP-E1-23
You are configuring a small home network. The main system has workgroup name 'elle' and the client has
workgroup name 'ELLE' will the connection work?
Your answer:
C. Maybe
Correct answer:
B. No
NP-E1-65
Which of the following file systems are not supported by Windows NT 4.0? Select 2
Your answer:
A. NTFS 4
Correct answer:
B. NTFS 5, D. FAT 32
NP-E1-5
Which of the following are used for increasing fault toleranace? Choose three
Your answer:
C. RAID disk storage
Correct answer:
A. Tape backup, B. Mirrored servers, C. RAID disk storage
NP-E1-58
Bridges operate at physical layer . T/F?
Your answer:
A. True
Correct answer:
B. False
NP-E1-27
After building a small network and connecting it to your ISP you notice that the clients are unable to
browse the Internet. You call your ISP and he asks for the information configured on your router. You
present the required information to him. He says the information is as it should be. You browse the net
from the computer directly connected to your DSL modem and you are able to do so. What could the
problem be?
Your answer:
C. DNS server not set on the DHCP server
Correct answer:
D. Default gateway not set on the workstations
NP-E1-67
Plug and play technology allows you to add devices to the computer without having to turn it off. T/F?
Your answer:
A. True
Correct answer:
B. False
NP-E1-29
You are configuring a leased line for your network with the help of your service provider. You are now
testing for the loop. The modem does not detect a dial tone but responds to the off-hook. What is a
possible cause for this dial back-up failure?
Your answer:
B. Cable
Correct answer:
A. Router
NP-E1-12
Which of the following protocols does Network Attached Storage (NAS) use? (Choose two.)
Your answer:
B. ATM
Correct answer:
A. IPX, C. TCP/IP
NP-E1-76
Administrative authority is delegated to Administrators in Windows 2000 networks. T/F?
Your answer:
A. True
Correct answer:
B. False
NP-E1-28
You are a traveling user who connects to the remote site from your laptop whenever you visit that site.
Today when you connect your laptop to the network, you are unable to login. You check your IP
configuration and your IP address is 0.0.0.0. What is the likely cause for the problem?
Your answer:
D. The workstation has become unplugged from the network.
Correct answer:
B. The DHCP server is not reachable.
NP-E1-60
Routing Information Protocol (RIP) by default has_____________ number of hops.
Your answer:
B. 16
Correct answer:
A. 15
NP-E1-19
Your present network uses HOSTS file for IP to host name resolution. You are planning on adding a DNS
server and moving a few servers to a remote site with different IP address. Which of the following will hold
true?
Your answer:
B. Users will be able to connect if a WINS server is added to the affected network segments.
Correct answer:
C. Users will be able to connect if a DNS server is enabled and the HOSTS file is deleted.
1. Using Internet searches, list the definitions for the computer and networking certifications
below (plus 3 more you discover), what they cover, and which company offers the training:
Acronym
CNA
Definition and What's Covered
A common Novell Certification for IT professionals who need to
provide organizations with direct support for software users in various
networked environments including professional offices and small
businesses, work groups or departments, and corporate information
services (IS).












CNE
Introduction to NetWare 5 and NDS
Using a Workstation
Setting Up and Managing Network Access for Users
Printing with Novell Distributed Print Services
Managing the File System
Managing File System Security
Creating and Managing Login Scripts
Managing NDS Security
Distributing and Managing Network Applications with
Z.E.N.works
Managing Worstation in an NDS Environment with
Z.E.N.works
Managing Resources in a Multicontext Environment
Installing NetWare 5
A certification similar to the CNA but requiring the passing of more
tests. It is aimed at people interested in installing and planning the
rollout of Novell NetWare- based networks, with day-to-day operations
just a part of the certification.




Introduction to NetWare 5 and NDS
Using a Workstation
Setting Up and Managing Network Access for Users
Printing with Novell Distributed Print Services
Who Offers It








CCNA
CCNA is a popular certification in computer networking developed by
Cisco Systems. Cisco created the CCNA to recognize basic
competency in installation and support of medium-sized networks.
 LAN and WAN design (including the OSI model)




CCIE
IP addressing
Routers and routing protocols (including OSPF, EIGRP and RIP)
VLAN (virtual LAN) and WLAN (wireless LAN)
network security and management (including ACLs)
CCIE (Cisco Certified Internetwork Expert) is the most advanced level
of networking certification available from Cisco Systems. The CCIE
certification is highly prestigious and renowned for its difficulty.






MCSE
Routing and Switching
Security
Service Provider
Storage Networking
Voice
Wireless
Certification given by Microsoft that indicates the recipient has gone
through a specific training course and is knowledgeable in Microsoft
systems, including the design of infrastructures,
installing, configuring and administering Microsoft systems and
migrating those systems to later services.



A+
Managing the File System
Managing File System Security
Creating and Managing Login Scripts
Managing NDS Security
Distributing and Managing Network Applications with
Z.E.N.works
Managing Worstation in an NDS Environment with
Z.E.N.works
Managing Resources in a Multicontext Environment
Installing NetWare 5
Managing and Maintaining a Microsoft Windows Server 2003
Environment
Installing, Configuring and Administering Microsoft Windows
XP Professional
Designing Security for a Microsoft Windows Server 2003
Network.
A certification developed by the Computing Technology Industry
Association (CompTIA) to validate vendor-neutral skills for entry-level
computer technicians.





Identify physical parts
Motherboard
Firmware
Power supply
Storage devices













Memory (physical vs. cache)
Portable storage devices
Network cards and network cables
Printers
Identify IRQ, I/O and DMA settings
Legacy devices
Identify port types
Serial
Parallel
Infrared
Wireless
SCSI
RAID (0,1,5)
Server+
A certification that focuses on server-specific hardware and operating
systems, and certifies technical knowledge in areas such
as RAID, SCSI, and multiple CPUs, as well as capabilities with server
issues, including disaster recovery.

General Server Hardware

Installation,

Configuration,

Upgrading,

Proactive Maintenance,

Environment Troubleshooting

Problem Determination
Security+
A certification dealing with computer security topics such
as cryptography and access control, as well as business-related topics
such as disaster recovery and risk management.







Inet+
A certification deals with basic knowledge of
Internet, intranet, extranet, and electronic commerce technologies.

distinguishing between server-side and client-side




Network +.
network security,
Compliance and operational security,
threats and
vulnerabilities application data
host security access control
identity management
cryptography
scripting,
basic networking via command line,
e-commerce
e-business security via digital signatures
copyright licenses (including the GPL)
basic HTML coding
A certification that is used to measure skill as a network technician:
understanding of network hardware, installation, and troubleshooting.





network hardware,
connections, software,
the OSI Reference model
different protocols used in local area networks (LANs)
Wide area networks (WANs).
PDI +
CTP+
An entry-level, vendor-neutral certification proving competence in basic
maintenance of printers, scanners, copiers and fax machines. The
certification is recognized by several industry leaders, including Canon,
Sharp and Xerox, as a benchmark certification for professionals that
service and support document imaging devices.
 Basic electromechanical components and tools,
 print engine
 scan processes and components
 color theory
 Connectivity and networking.
A international, vendor-neutral exam that validates the core knowledge
and skills IT professionals need to sell and service convergent
technologies. CompTIA offers this exam in conjunction with
Certification Partners, LLC, who created the original CTP exam.




Project +
Basic requirements analysis
Implementation and management of basic data components
voice and multimedia applications
Basic problem analysis and resolution for convergent
technologies.
A certification showing that one has the knowledge needed to manage
projects. CompTIA claims that Project+ is a globally recognized project
management certification that provides validation of fundamental
project management skills.
project life cycle from





initiation planning through
execution
acceptance
support
closure