All about Networking Quiz

  1. Which of the following statements about Windows 2003 AD Schema are correct? (Choose all that apply)




    E) All of the above
  2. The Windows 2003 AD Global Catalog contains? (Choose all that apply)




    E) All of the above.
  3. Which of the following items are componets of the logical structure of a Windows 2003 AD? (Choose all that apply)
    A) Domains
    B) Domain Trees
    C) Sites
    D) Organizational Units (OUs)
    • A) Domains
    • B) Domain Trees
    • D) Organizational Units (OUs)
  4. Share permissions affect?



    C) The ability of a user to access files via a network share.
  5. John is a member for 3 groups: Group1, Group2, & Group3. The groups have been assigned NTFS folder permissions to Folder1 (as shown below). What is John's effective NTFS permission to this folder?
    Group Permissions Allowed:
    Group1 = Read
    Group2 = Write
    Group3 = Full Control




    A) Full Control
  6. Which of the following file systems provides the ability to control a user's right to access an individual file?



    C) NTFS
  7. A disk drive configure for basic storage may contain: (Choose all that apply)



    • A) Primary partitions
    • C) Extended partition containing logical drive(s)
  8. Which of the following are types of user accts supported by Windows 2003? (Choose all that apply)



    • C) Domain
    • D) Local
  9. When a user prints a doc using a Windows 2003 PC the actual printed doc is produced by:



    B) The print device
  10. You have decided that all users in the Sales Dept must have a min password length of 7 characters. Users in other depts will not be affected by this change. How would you do this?



    • D) Create a group policy & assign it to the Sales Dept OU. Have the
    • group policy specify a min password length of 7 characters.
  11. Which of the following characteristics apply to a peer-to-peer network? (Choose all that apply)



    C) Each PC maintains its own local security database
  12. A Microsoft Windows XP workgroup is a logical grouping of networked PCs that share resources.


    A) True
  13. A local security database is a list of user accts & resource security info for the PC on which the database resides.


    C) True
  14. Which of the following statements are true about workgroups? (Choose all that apply)
    A) They require a powerful central server.
    B) They allow PCs running Microsoft Windows 2000 Server as well as PCs running Windows 2000 Professional.
    C) They usually include fewer than 10 users who are located in the same physical area.
    D) They include users who are typically located in a large geographical area.
    • B) They allow PCs running Microsoft Windows 2000 Server as well as PCs running Windows 2000 Professional.
    • C) They usually include fewer than 10 users who are located in the same physical area.
  15. Your Co uses the following naming standards for users: 1st three latter of the person's 1st name, 1st five letters of the last name, & the last 2 digits of the employee ID. Here is a list of user accts:
    Image Upload 1
    Which of the above accts doen not meet the Co's naming standards? (Choose all that apply)




    • C) Tom Youtsey
    • E) Gary Yukish
  16. Why was the OSI model developed?



    C) Standards were needed to allow any 2 systems to communicate.
  17. The ___ model shows how the network functions of a PC should be organized.



    A) ISO
  18. The Physical layer is concerned w/ the movements of ___ over the physical medium.



    D) Bits
  19. In the OSI Model, what is the main function of the Transport layer?



    D) Node-to-Node delivery
  20. The ODI Model consists of __ layers?



    C) 7
  21. The Internetworking Protocol (IP) is a ____ protocol.



    D) None of the above
  22. Identify the class of the following IP address: 4.5.6.7.



    A) Class A
  23. Identify the class of the following IP address: 229.1.2.3.



    D) None Of the Above
  24. Identify the class of the following IP address: 191.1.2.3.



    B) Class B
  25. Which of the following is true of the IP address: 231.1.2.3?



    D) None Of the Above
  26. Which of the following is true of the IP address : 192.0.0.10?



    D) None Of the Above
  27. What type of information must a protocol suite supply to be routable?



    C) MAC address
  28. If you are connected to a network that uses DHCP, & you need to terminate your Windows XP workstation's DHCP lease, which of the following commands would you use?



    D) ipconfig /release
  29. What is the function of ARP?



    B) To obtain the MAC address of a host, & the map the MAC address to the host's IP address.
  30. The ___ OSI layer routes data by the best path to specific network destinations.



    B) Network
  31. The Application layer of the OSI refrence model is responsible for __?



    A) Providing services for the programs that the user uses.
  32. ___ defins a common method of communication between computers.



    D) Routers
  33. The __ OSI layer translates data into a format that is understood by the reciving PC & can encrypt or decrypt data.



    A) Presentation
  34. 144:92.43.148 is a valid IP address?


    C) False
  35. Every process that occurs duing network communications can be associated w/ a layer of the OSI Model?


    B) True
  36. Among the Session layer's functions are establishing & keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialog between the 2 nodes, determining wheter communications have been cut off, &, if so, figure out where to restart transmission, & terminating communications.


    C) True
  37. The primary function of protocols at the Session layer is to translate network addresses into their physical counterparts & decide how to route data from the sender to the receiver.


    C) False
  38. IP addressing is a system for assinging unique identification numbers to devices on a network.


    A) True
  39. You want to preform multiple backups of only those files that are modified since the last normal backup. You also want to ensure that the backed up files use min anount of media. In this case, you will take a:



    C) Incremental backup
  40. FQDN stands for...



    A) Fully Qualified Domain Name
Author
mom2bmw2
ID
20733
Card Set
All about Networking Quiz
Description
Just another quiz
Updated