How will a failure of a router on a network with two subnets affect communication?
A. The entire network will be down.
B. The network will remain fully operational.
C. Communication between subnets will be affected.
D. All workstations connected to the router will be affected.
Answer: C
A router connects two subnets together and
is responsible for forwarding traffic between
the subnets. Thus, if the router fails communication between the subnets will be affected.
You work as a network administrator at Acme. Acme has 100
Windows 98 clients, 125 Windows XP clients, and one Windows 2000 server.
DHCP is not use on the network. A second server is added to the network. You configure
the new server to provide WINS and remove WINS from the existing server. What
must you do next to ensure the network remains fully operational?
A. Update the LMHOSTS file on each client.
B. Update each Windows 98 client with the WINS server
address.
C. Update the DNS server with the host name and IP
address of the WINS server.
D. Do nothing. The network is fully operational.
Answer: B
WINS is responsible for NetBIOS name to IP address
resolution for Windows 9x computers. We have changed the WINS server; therefore
the Windows 98 clients need to be updated with the address of the new WINS server.
You cannot reach a Web site on the Acme intranet but
you can ping the Web server by host name. What is the probable cause of
the problem?
A. HTTP on the workstation is down.
B. The DHCP server is down.
C. The DNS server is down.
D. Web Server is down
Answer: A
Web browsers use HTTP to access web sites. If HTTP is
down or port 80, which is used for HTTP traffic, is blocked, you won't be able to
access the intranet Web site.
You work as the network administrator at Acme. You are
experiencing
problems accessing Acme file server via remote access.
You receive a time
out when you ping the file server name but you can
ping the file server by IP
address. What is the probable cause of this problem?
A. The DHCP server is down.
B. The File server is down.
C. The DNS server is down.
D. The Remote Access server is down.
Answer: C
In this case you can ping the IP address but not the
host name. Therefore there is a
problem with host name to IP address resolution. DNS
is responsible for host name to IP
address resolution and is the most probable cause of
the problem.
79) What is the
purpose of the arp -s command?
A. It displays the listing in the ARP table.
B. It displays the ARP entry for a specified network
interface.
C. It allows you to delete a IP address to MAC address
listing from the local ARP table
D. It allows you to add a static IP address to MAC
address mapping in the local ARP
table.
Answer: D
arp -s allows you to add a static IP address to MAC
address mapping in the local ARP
table. This entry will remain in the ARP table until
the local computer is rebooted.
Which of the following commands can you use to verify the IP
configuration of a Microsoft Windows 98 workstation?
A. ping
B. arp -a
C. ipconfig /all
D. winipcfg /all
Answer: D
Winipcfg /all is the Windows 98 version of
ipconfig /all and displays the IP configuration
and MAC address for the local Windows 98
workstation.
Which of the following provides the MOST protection for electrical
equipment?
A. Surge protectors
B. Standby Power Supply (SPS)
C. Uninterruptible Power Supply (UPS)
D. Line Conditioner
Answer: D
Line conditioners provide the highest
level of power protection for electronic devices.
Which one of the following disk fault tolerance mechanisms
consists of two disks
and two controllers?
A. Disk duplexing
B. Disk mirroring
C. Disk striping
D. Disk imaging
Answer: A
Disk duplexing uses mirroring to write
data to two disks so that the two are exact copies
of one another but each drive is attached
to its own disk controller.
Which of the following properties CANNOT be used to define VLAN (Virtual Local
Area Network) membership?
A. Ports on a network switch.
B. MAC addresses of the hosts.
C. Network protocol used by the hosts.
D. Fully qualified domain name (FQDN) of the hosts.
Answer: D
VLAN membership is not defined by FQDN.
Which of the following is called a 'fox
and hound'?
A. A wire map tester
B. A tone generator and locator
C. An optical tester
D. A time domain reflectometer (TDR)
B
Which of the following statements
regarding Client Services for NetWare (CSNW) is TRUE?
A. It is installed on a Windows NT server and allows
multiple Windows clients to connect to NetWare servers.
B. It is installed on a Windows client and allows that
Windows client to connect to NetWare servers.
C. It is installed on a Windows NT server and allows
Novell NetWare clients to connect to Windows NT servers.
D. It is installed on a Novell NetWare client and
allows that Novell NetWare client to connect to Windows NT servers.
B
______ allows Novell clients to access resources hosted on a Windows NT server.
A. Gateway Services for NetWare (GSNW)
B. Client Services for NetWare (CSNW)
C. File and Print Services for NetWare (FPNW)
D. Client for Microsoft Networks (CMN)
Answer: C
Which of the following protocols is used to transmit data
between a web browser
and a web server?
A. SSH
B. HTTP
C. SFTP
D. IMAP4
B
At which layer of the OSI reference model does character-set translation occur?
B.
Which layer of the OSI reference
model is responsible for signal encoding?
D.
The Physical Layer of the OSI is concerned with the
physical elements of the network. This includes the transmission medium and physical
topology. One of the functions of the Physical Layer is signal encoding, which is the
translation of data into electronic signals that can be transmitted on a transmission
medium.
64) Which of the
following caches web pages for future retrieval?
A. A
router
B. Web
server
C. A
firewall
D. A proxy
server
D
66) What is the purpose of a VLAN (Virtual Local
Area Network)?
D.
68) You work as a
network administrator at Acme. You are instructed to
provide
certain customers with user accounts which they can use to access product
information
on the company's internal network. Which type of network do you need
to
configure?
A. An
intranet
B. A
private local area network
C. An
extranet
D. A
Virtual Private Network
C
69) Files with which of the following file
extensions CANNOT be infected by a virus?
A. .txt
B. .com
C. .dll
D. .exe
A
70) Which one of the following disk fault
tolerance mechanisms consists of two disks
and a single
controller?
A. Disk duplexing
B. Disk mirroring
C. Disk striping
D. Disk imaging
B
71) Which of the following RAID (Redundant Array
of Independent Disks) levels uses
disk striping and
parity across all drives?
A. RAID-0
B. RAID-1
C. RAID-3
D. RAID-5
D
72) Which of the following RAID (Redundant Array
of Independent Disks)
implementations
provides fault tolerance but not improved performance?
A. RAID-0
B. RAID-1
C. RAID-3
D. RAID-5
B
73) You work as a network technician at Acme. You
are required to implement a fault tolerant
solution on a server that has two hard disk and two hard disks
controllers. Which of the following can you implement?
(Choose all that apply)
A. Disk striping
B. Disk mirroring
C. Disk striping with
parity
D. Disk duplexing
B,D
76) Which of the following commands can you use
to verify the IP configuration of a
Microsoft Windows XP
workstation?
A. ping
B. arp -a
C. ipconfig /all
D. winipcfg /all
C
77) Which of the following can be used to view IP
address to MAC address mappings on
a computer?
A. arp -a
B. ipconfig /all
C. netstat -a
D. tracert
A
78) Which of the following commands can you use
to verify the IP configuration of a
Linux workstation?
A. traceroute
B. ifconfig
C. ipconfig
D. winipcfg
B
79) What is the purpose of the arp -d command?
A. It displays the
listing in the ARP table.
B. It displays the ARP
entry for a specified network interface.
C. It allows you to
delete a IP address to MAC address listing from the local ARP table
D. It allows you to
add a static IP address to MAC address mapping in the local ARP
table.
C
82) Which TCP/IP utility would allow you to
determine whether a host is configured for
DHCP?
A. arp
B. ping
C. tracert
D. ipconfig
Answer: D
D
86) You work as a network technician at Acme. Acme
has a
NetWare-based network.
You are planning to add five new Windows 95 client
systems to the Acme
network. You will install Novell NetWare Client to
allow the new clients
to connect to the NetWare server. What information will you
need to configure
Novell NetWare Client?
A. The user context
and NDS tree name.
B. The username and
password.
C. The domain name.
D. All of the above.
A
88) How will a failure of a router on a network
with two VLANs affect communication?
A. The entire network
will be down.
B. The network will
remain fully operational.
C. Communication
between VLANs will be affected.
D. All workstations
connected to the router will be affected.
C
100) Which of the following topologies does FDDI
(Fiber Distributed Data Interface) require?
A.
Star
B.
Bus
C.
Ring
D.
Mesh
C
99)
Which of the following IEEE (Institute
of Electrical and Electronics Engineers) standards represents Ethernet?
A.
802.0
B.
802.3
C.
802.5
D.
802.11
B
Which frequency band is used in the IEEE 802.11b standard?
D.
12) Which of the following does not use copper
cable? (Choose all that apply)
A. 1000Base-CX
B. 100Base-FX
C. 100Base-TX
D. 10GBase-LR
B,D
Multimode fiber-optic cable is used in ______.
A. 1000Base-CX
B. 10 GBase - SR
C. 10 GBase-ER
D. 10 GBase-LR
B
What
is the maximum transmission distance supported by 10 GBase-LR?
D.
Which of the following must be installed on a Windows 95
client to allow it access a NetWare server?
C.
You work as a network administrator at Acme. Acme has 125
Windows client computers, one Windows NT server and two Novell NetWare
servers. You need to configure the network to allow the Windows clients to access
the NetWare servers. Which of the following would require the least administrative
effort?
C.
Which of the following IP addresses are NOT valid?
D.
What is the default AIPIPA address range?
169.254.0.0-169.254.255.255
What is the use for the DHCP protocol? (choose all that apply)
A. obtain IP address
B. obtain subnet mask
C. determine if a web server is responding
D. obtain IP addresses of DNS servers
What is the highest privilege account of a UNIX/Linux OS?
A. Root
B. Administrator
C. Owner
D. Supervisor
What is the highest privilege account of a Novell OS?
A. Root
B. Admin Account or Supervisor
C. Owner
D. Administrator
The _____protocol is an advanced distance-vector routing protocol, with optimizations to minimize
both the routing instability incurred after topology changes, as well as the use of bandwidth
and processing power in the router.
A. BGP
B. RIP
C. IGP
D. EIGRP
____is a distance protocol which employs the hop count as a routing metric.
A. RIP
B. BGP
C. ICMP
D. LDAP
What is the port number for KERBEROS?
A. 1512
B. 88
C. 80
D. 443
what is the port number for WINS?
A. 1512
B. 88
C. 80
D. 443
What is the port number for HTTP?
A. 1512
B. 88
C. 80
D. 443
what is the port number for IMAP4?
A. 23
B.119
C.143
D. 701
What switching methodology does T1 and T3 use on networks?
A.
What switching methodology does ISDN use on networks?
B.
What switching methodology does ATM use?
D.
What switching methodology does FDDI use?
E.
What switching methodology does SONET use on networks?
C.
What switching methodology does Frame Relay use on networks?
A..Circuit or Packet
B. Packet
C. Point to Point
D. Cell Switching
E. None of the above
What is the IEEE 802 networking standard for WiMax?
C.
What is the IEEE 802 networking standard for MAN?
C.
What is the IEEE 802 networking standard for WPAN (Bluetooth)?
C.
What is the IEEE 802 networking standard for Fiber Optics?
D.
What is the distance for 1000BaseCX?
B.
What is the distance for 1000BaseLX?
D.
What is the distance of 10GbaseSW?
E. - 26-300 Meters
What is the bandwidth of T1 networks?
D.
What is the bandwidth of T3 networks?
D.
What is the bandwidth of ATM networks?
C.
What is the bandwidth of a SONET OC48 fiber optic connection?
B.
What is the bandwidth of a SONET OC192 fiber optic connection?
A.
What is the bandwidth of a SONET OC1 fiber optic connection?
C.
What is the bandwidth of a SONET OC768 fiber optic connection?
C.
What is the IP address range for a Class A address?
D.
What is the IP address range for a Class C address?
B.
Which IP address is within the Class B address range?
A. 224.16.32.0
B.172.16.0.0
C. 191.234.16.0
D. 132.4.234.54
E. 162.35.232.240
C,D,E
Choose the option that will represent the number of networks and hosts for a Class B IP address
C.
Choose the option that will represent the number of networks and hosts for a Class A IP address
D.
What is the loopback test IP address used for testing?
D.
Which of the following OS was designed for a pure client/server environment?
D.
Which protocol is popular for Cisco VPNs?
A.
A static VLAN assigns VLANs to:
C.
A dynamic VLAN assigns VLANs to:
A.
What is the most common trunking protocol used in today's VLANs?
B.
A content switch always works at least at what layer of the OSI model?
D.
802.1X is a great example of:
B.
What is the main difference between an IDS and an IPS?
A. An IPS documents intrusions
B. An IPS is always a stand-alone box
C. An IPS reacts to an attack
D. An IPS uses port mirroring
C - IDS does not react just documents
What solution might improve the quality of VoIP calls?
A.
What type of cable and connector does the 100BaseFX use?
A.
What begins an ethernet frame?
A.
What device filters and forwards traffic based on MAC addresses? (choose the best)
A.
What is the max number of hubs that can be connected to a 10BaseT hub?
A.
Which networking devices can use the Spanning Tree Protocol (STP)?
B.
Which layer of the OSI model controls the assembly and disassembly of data?
A.
Which layer of the OSI model keeps track of a system's connections to send the right response to the right computer?
D.
Which network topology is most likely seen only in wireless networks?
A. star
B. bus
C. ring
D. mesh
D- mesh is for the most part unique to wireless networks
Which of the following cables should never be used in a structured cabling install?
A.
Which of the following would never be seen in an equipment rack?
D.
What are patch cables used for? (select two)
A. To connect different telecommunications rooms
B. To connect the patch panel to the hub
C. The are used as crossover cables
D. To connect PCs to outlet boxes
B,D
The original 802.11 wireless specification enables max bandwidth speed of
C.
What advantages does WPA have over WEP (choose 3)?
A. End-to end data packet encryption
B. EAP user authentication
C. Encryption key integrity checking
D. 128-bit data encryption
E. Will only work on 802.11n
A,B,C
What hardware enables wireless PCs to connect to resources on a wired network segment
in infrastructure mode? (select 2)
A. An access point
B. A router
C. A hub
D. A bridge
A, D
What type of server supports EAP encrypted passwords in accordance
with the 802.1x standard?
D.
In a PKI encryption method, which key encrypts the data?
A. Public
B. Private
C. Both
D. Depends on who sends the data
A -the public key encrypts and the private key decrypts
Author
shadrinaff
ID
13012
Card Set
CompTIA Network Plus
Description
sample exam questions for network plus certification