Test Yourself on Network+

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

1. Which two of the following true networking topologies are seldom used because the entire local network goes down when any single medium segment fails? (Choose all correct answers.)

a. Bus
b. Mesh
c. Star and hub
d. Ring

2. Which of the following network cabling technologies has the longest maximum useful length?

a. 10BaseT
b. 100BaseT
c. 10Base2
d. 10Base5

3. Label each of the following network devices by the layer number from the OSI Network Reference Model at which they operate.

a. hub
b. repeater
c. switch
d. router
e. network interface card
f. bridge

4. Which of the following protocols is used to resolve MAC addresses into IP addresses?

a. IP
b. HTTPS
c. SMTP
d. IMAP
e. ARP
f. RARP (aka Reverse ARP)

5. What port is assigned to a Telnet server by default when deployed on the Internet?

a. 23
b. 25
c. 80
d. 110
e. 445

6. A hotel business center expects to offer up to 20 Internet connections to guests wishing to work there, as well as to provide each user with access to a local printer and scanner. Which of the following approaches makes it easiest for guests, but most affordable for the business center, to provide ready access to the Internet and other local network resources when guests come to work in the business center?

a. Assign a static IP address to each workstation area and leave a configuration card with IP address, gateway, DNS, printer and scanner information.
b. Instruct the guests to use DHCP, and provide printer and scanner access instructions.
c. Instruct the guests to use DHCP; everything else will be handled automatically.
c. Keep a technician on duty 24×7 to manage access on the guests’ behalf.

7. Which of the following is the most important feature to install on all desktop or laptop PCs?

a. preventing virus and other malware infections
b. blocking e-mail spamming
c. preventing intrusions
d. controlling traffic into and out of a network

8. When attempting to connect to an intranet Web site that you viewed yesterday, you receive an error that indicates that the domain name could not be found (in IE, this shows up as a “can’t find” error). Which of the following tools is most likely to help you troubleshoot this problem?

a. ping
b. tracert (or traceroute)
c. netstat
d. nslookup

Answers
1. A and D are correct. In a bus topology, if the trunk (or any single media segment) fails, all communications fail; that’s why A is correct. In a mesh topology, every node has a separate link to every other node; if a single link fails, it has no impact on network access (and only affects performance). That’s why B is incorrect. In a star and hub topology, if a single link fails, only the node connected to that link loses network access. It takes a hub failure to bring the entire network down; that’s why answer C is incorrect. In a ring topology, if any part of the ring fails, all nodes are unable to communicate; that’s why answer D is correct. Note: A ring topology can be made fault tolerant to a single-link failure if two links operating in opposite directions are used for each node. (This is called a dual-ring topology, however.)

Domain 1: Media and Topologies

2. D is correct. 10Base5, also known as ThickNet, has a maximum useful length of 500 meters per segment. Answers A, 10BaseT, and B, 100BaseT, both have a maximum useful lengths of 100 meters. 10Base2, also known as ThinNet, has a maximum useful length of 185 meters. Because 500 is greater than either 185 or 100, answers A, B and C are all incorrect.

Domain 1: Media and Topologies

3. A hub operates at layer 1, the Physical layer. A repeater operates at layer 1, the Physical layer. A switch operates at layer 2, the Data Link layer. A router operates at layer 3, the Network layer. A network interface card operates at layer 1, the Physical layer. A bridge operates at layer 2, the Data Link layer.

Domain 2: Protocols and Standards

4. F is correct. RARP (the Reverse Address Resolution Protocol) is used to resolve MAC addresses into IP addresses, usually so that nodes on a cable segment can query the local IP gateway’s ARP cache to learn their own IP address or the address for other systems in the gateway’s cache. Answer A, IP (Internet Protocol), is the network layer protocol used within the TCP/IP protocol suite. IP is a connectionless, best-effort packet-switching protocol. Answer B, HTTPS, is a secure form of HTTP used to provide confidential transmission of Web requests and resources. Answer C, SMTP, is the protocol used to move e-mail messages from e-mail client to e-mail server and from one e-mail server to another. Answer D, IMAP, is one of two protocols, the other being POP, which may be used to transfer e-mail between an e-mail server and an e-mail client. Answer E, ARP (Address Resolution Protocol), is used to resolve IP addresses into MAC addresses for the purpose of routing traffic across a network segment.

Domain 2: Protocols and Standards

5. A is correct. Port 23 is the well known port number assigned by default to the Telnet service and is used by default on Telnet servers. Port 25 is used by SMTP. Port 80 is used by HTTP. Port 110 is used by POP. Port 445 is used by Microsoft directory services.

Domain 2: Protocols and Standards

6. B is correct; configure each client system to use DHCP, and provide information so that guests can find and use the printer and scanner. Answer A, assigning static IP addresses to each workstations area, with additional configuration details, puts connectivity entirely in the hands of guests and probably won’t work except for those technically savvy enough to configure their own IP access. Answer C is incorrect because while DHCP can handle all aspects of IP connectivity, it cannot provide automatic printer and scanner access. Answer D is incorrect, because while it would certainly make sure guests get all the connectivity they need, it is the most expensive approach and therefore fails to meet the “affordability” criterion.

Domain 3: Network Implementation

7. A is correct. That’s because desktop and laptop PCs are most likely to pick up infections through e-mail attachments. While blocking spam, in answer B, may be desirable for end-users, it’s not as important as preventing infections from viruses or other malware. The other options represent typical firewall capabilities, and some so-called personal Internet security packages include spam blocking, anti-virus protection, ad blocking and traffic management in their capabilities. Some personal Internet security packages (such as Norton Internet Security) even include intrusion detection software, but this is nowhere near as common as the other capabilities. But of all the items in the list, anti-virus protection is the most important item to install on client workstations because it represents the kind of threat best handled at the client level.

Domain 3: Network Implementation

8. D is correct. Nslookup is used to query DNS servers to resolve domain names into IP addresses or vice versa. Nslookup helps you make sure the DNS server has correct and up-to-date information about the Web server’s domain name and IP address(es). Answer A, the ping command, tells you if you are still connected to the network properly, if the Web server is present and if you can connect with other systems on your network. Once ping is used, you can move on to use other utilities such as answer B, tracert, which may be able to pinpoint a location where communication fails. Answer C, netstat, is used to obtain network statistics, such as routing tables and socket usage and is not helpful in troubleshooting this particular situation.

Domain 4: Network Support

 

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>