Study Guide: http://www.cramsession.com/printable.asp?a=/cramsession/comptia/network/guide.asp
Outline:
Basic Knowledge 12
Physical Layer
4
Data Link Layer
3
Network Layer
3
Transport Layer
3
TCP/IP Fundamentals 11
TCP/IP Utilities
7
Remote Connectivity 3
Security
4
Implementing and Installation of the Network 4
Maintaining and Supporting the Network
4
Troubleshooting the Network
7
1. What type of Protocol is UDP?
a. Connection Oriented
b. Connectionless Oriented
c. Neither
2. You get a call from Betty who works in the accounting department.
She
states that she cannot print to the network printer. She is in a group who
has the correct permissions to print. All other users of the same group can
print to the printer. What can be the problem?
a. Her User access permissions are set wrong
b. Her share access is set wrong
c. Her printer domain is set wrong
3. You have a group of employees who visit the same web page on the
Internet. They utilize a T-1 connection that goes through a proxy server.
What is a possible way to speed up performance?
a. Using a HTTP proxy (caches web pages for faster loading)
b. Using a IP proxy
c. Using a FTP proxy.
d. None of the above
4. What layer of the OSI model does the Bridge operate under?
a. Transport
b. Session
c. Data Link
d. Network
5. What is used to resolve a host name on a UNIX server?
a. IPX
b. ARP
c. HOSTS
d. LMHOSTS
6. What layer of the OSI model does the Router operate under?
a. Transport
b. Network
c. Data Link
d. Network
7. What layer of the OSI model ensures packets are delivered error free,
in sequence, without losses?
a. Network
b. Transport
c. Data Link
d. Physical
8. What 100BaseT Fast Ethernet uses two sets of CAT 5 cable?
a. 100BaseTX
b. Fiber Optic
c. UTP
d. 10Base2
9. What operates in the Data Link and the Network layer?
a. Router
b. Brouter
c. Bridge
d. NIC
10. IEE 802.5 maps to..
a. Token bus
b. Ethernet
c. Token Ring
d. Voice data transmissions
11. Which of the following are connectionless? (Select 2)
a. TFTP
b. FTP
c. NetBEUI
d. HTTP
12. What is the directory service called in Netware 4.xx?
a. IPX
b. SPX
c. DFS
d. NDS
13. What RAID level is "Mirroring"?
a. 1
b. 2
c. 3
d. 4
14. You try to back up your data to a DLT tape drive. You receive an
error
message that the tape drive is not available, this occurs even if you try a
new cartridge, what do you do?
a. Replace the tape drive
b. Replace the cable
c. Put a tape cleaner into the drive
d. Replace the adapter card
15. What layer of the OSI model places the signal on the cable?
a. Physical
b. Network
c. Data Link
d. Transport
16. You want to send a message to a friend at [email protected],
your
address is [email protected] . What is the order
that your domain names are
resolved?
a. usa.com, networ.au, com, au
b. networ.au, usa.com au, com
17. What IP address is in the B class?
a. 125.123.123.2
b. 191.023.21.54
c. 192.128.32.56
18. What is one security function of a firewall?
a. Allows people on the Internet to see just one IP address
b. Does not allow any connections to the server
c. Restricts unauthorized users from accessing sensitive data
d. Manages password functions
19. What network utility is the following printout from?
Internet Address Physical Address Type
10.36.14.92 00-60-08-75-43-d7 static
197.45.367.42 20-53-32-45-00-00 dynamic
123.34.34.34 20-53-54-67-00-00 dynamic
a. NETSTAT
b. NBTSTAT
c. ARP
d. Ipconfig
20. A user complains that it is so slow to access a server. What
utility
can you use to find the bottleneck?
a. Ping
b. Telnet
c. Tracert
d. Nbtstat
21. A user complains that it is slow to access a web page. What
utility
can you use to find the bottleneck?
a. Ping
b. Telnet
c. Tracert
d. Nbtstat
22. What can be used to transfer a file from a UNIX server to yours?
a. Telnet
b. FTP
c. Netstat
d. NBTSTAT
23. You setup a network with FTP and use a SLIP protocol. You cannot
transfer files with FTP and have problems connecting to the Internet, what
is a possible alternative?
a. Install a proxy with TCP/IP
b. Change to PPP
c. Try pinging the ftp server
d. Try pinging the local host
24. You install new a virus suite in your network of 120 computers.
You
configure RAID in one system. You are experiencing sporadic system crashes
throughout your network, what do you do?
a. Get the newest virus update from the vendor
b. Disable the RAID system
c. Check the virus vendor for system patches or service packs
d. Uninstall the virus suite
25. What connectors are used on SCSI cables? Select 3
a. DB 25, female
b. 36 pin Centronics
c. 50 Pin Centronics
d. 68 Pin
e. 9 pin male
26. You place a new NIC card in a workstation. You cannot connect to
the
network. There are no resource conflicts. Everything is configured and
installed correctly yet you still can't connect. What do you do?
a. Call the vendor
b. Replace the NIC with another one
c. Use a hardware loopback connector
d. Apply a patch
27. You place a new NIC card in a workstation. You cannot connect to
the
network. There are no resource conflicts. Everything is configured and
installed correctly yet you still can't connect. What do you do?
a. Call the vendor
b. Replace the NIC with another one
c. Check it with system trouble shooting software
d. Apply a patch
28. What Utility do you use to check your IP configuration on a Windows
95/98 workstation?
a. Netstat
b. Ping
c. Winipcfg
d. Ipconfig
29. What UART chip is needed to provide a modem connection of 115200 bps?
a. 85.xx
b. 95.xx
c. 100.xx
d. 165.xx
30. How does a server on the Internet know where to send data packets?
a. Data IP number
b. Packet ID number
c. Port Number
d. IP protocol
31. Your entire network of 100 computers is bogged down. Every thing
is
connected right and there are no conflicts that you are aware of. What can
you use to help you narrow down the problem?
a. Netstat
b. NBTSTAT
c. Loopback hardware
d. Network Monitor
32. Which security scenario is more restrictive?
a. Share level access
b. User level access
33. Each computer that is assigned a network ID is called?
a. Workstation
b. Server
c. Hosts
d. Name server
34. Which backup method clears the archive bit? Select 2
a. Differential
b. Sequential
c. Full
d. Incremental
35. You place a new NIC in your workstation. Everything is configured
correctly yet you have now light on the back of the NIC card and it is not
working. What can you use to check to see if the NIC is sending data?
a. Data Run
b. TDR
c. Loop back hardware connector
d. Test probe
36. What does a patch cable connect to in a token ring network?
a. Connect two work stations
b. Connect a workstation to a router
c. Connect two MAU's together
37. What IEEE specification does CSMA/CD map to?
a. 802.2
b. 802.3
c. 802.4
d. 802.6
38. What layer of the OSI model does a bridge operate in?
a. Transport
b. Session
c. Data Link
d. Network
39. Which protocol is not routable?
a. IPX
b. TCP
c. NetBEUI
d. DECnet
40. What utility can you use to troubleshoot a http server?
a. Ping
b. Telnet
c. TDR
d. NBTstat
41. What file can be edited on a UNIX machine to resolve the name
www.myserver.com?
a. LMHOSTS
b. HOSTS
c. NetBeui
d. APR list
42. What is the default port for the FTP protocol?
a. 21
b. 22
c. 23
d. 25
43. What network topology is most fault tolerant and has the most
redundancy?
a. BUS
b. MESH
c. RING
d. STAR
44. A user complains that he can't log onto a server. What
troubleshooting
steps should you take to resolve the problem? Select 3
a. Ask a user on the same segment to try and connect
b. Ask a user on a remote segment to try and connect
c. Replace the NIC card
d. Try and ping the server
45. What three things do you need to specify on a workstation for DNS
resolution?
a. Domain name
b. Host name
c. Netbios name
d. IP address of the DNS server
46. What is the default port for HTTP?
a. 25
b. 23
c. 80
d. 21
47. You cannot connect to a network server. The light in the back of
the
NIC card is not flashing. You change the patch cable and it is still not
flashing. You go into the wiring closet and switch the connector from one
connection on the hub to another. You check the NIC light and it is
blinking. What should you do next?
a. Replace the HUB
b. Replace the NIC
c. Log in and try to transfer a file
d. Replace the cable
48. What cable can you use to connect to a server 1 KM away without having
to use a repeater?
a. Cat5
b. Cat3
c. UTP
d. Fiber Optic
49. You have a workstation over 103 meters from the server, there is no
repeater and it is using 10baseT wiring. You cannot connect to the network.
Required objectives: Connect to the server
Optional Objectives: Faster connection, easier access for users
Proposed solution: replace the NIC with a 100baseFX NIC
a. This meets the required and optional objectives
b. This meets only the required objective and not the optional
c. This meets the optional objective only
d. This does not meet the required or optional objectives
50. You want to connect your network to the Internet but are concerned that
users will download viruses. What can you do to protect the system?
a. Install virus protection in each workstation
b. Install a network virus protection suite
c. Install a firewall
d. Install a proxy
51. How can you check your local TCP/IP connection? Select 2
a. Ping host
b. Ping localhost
c. Ping 127.0.0.1
d. Ping 127.0.0.0
e. Ping local
52. Which hub boosts the signal strength?
a. Passive
b. Hybrid
c. Active
d. Token
53. What is the advantage of ISDN over PSTN?
a. ISDN is cheaper
b. PSTN is faster
c. ISDN is faster
d. They are the same
54. Which network resource provides services for users?
a. Local host
b. Server
c. Workstation
d. ISDN
55. Which routing method requires the most administrative overhead?
a. Bridging
b. Static
c. Dynamic
d. Relay
56. You are installing a NetWare based server system. You have 10
win95
workstations and 4 Unix. What do you install on the win95 systems that will
allow you to connect to the NetWare server? Choose 2
a. Novell Client for windows
b. Microsoft Client for Novell NetWare
c. Novell Client for Microsoft windows systems
d. Novell install suite
57. A employee is complaining that when he turns his lights on in the
office, he can't connect to the network. With the light off his system
works fine. What can be the problem?
a. There is a voltage drop when the lights are turned on
b. The cabling system is faulty
c. The NIC needs to be replaced
d. All of the above
58. On a NT4 system what command do you use to determine what the
workstations IP address is?
a. IP
b. Winipcfg
c. IPconfig
d. Ipstat
59. You need to send email to the mail server. What protocol is used?
a. POP3
b. SNMP
c. SMTP
d. FTP
60. You have many users who access the Internet. You are worried about
security, what can you use so that only one IP is visible when users connect
to the Internet?
a. HTTP
b. FTP
c. Proxy Server
d. NBT Server
61. What is a secure password policy?
a. Change passwords daily
b. Change passwords regularly
c. Change passwords randomly
62. Computers are rebooting spontaneously. The room is cold and there
are
space heaters in use. What is the problem?
a. Bad wiring
b. Bad NIC
c. BAD UPS
d. Voltage drop at the outlet
63. You successfully enter into a FTP session, what transport layer protocol can
you deduct is working properly?
a. TCP
b. IP
c. UDP
d. SPX
64. What is required to complete the entire set of diagnostics included in a
diagnostics suite for a NIC?
65. What are the two devices shown in the exhibit? The exhibit shows two boxes
that have in and out ports and many machines hanging off them in a star topology. The
boxes are connected to each other with the 'out' of one to the 'in' of the other and vice
versa.
66. Scenario: Distance from patch panel to wall panel 90 meters Distance from
wall panel to computer 10 meters Distance from patch panel to hub 3 meters Computer has no
connectivity Required: Connect to network Optional: faster connection, better security
Proposed: replace 10 meter cable with a 5 meter cable
67. Scenario: Field office and headquarters Required: Connect two locations for
file sharing over internet. Optional: Provide secure connection, provide permanent
connection. Proposed: Enable PPTP on the web server at headquarters, use an ISP from the
field office to connect to the internet and use PPTP to connect to headquarters.
68. Scenario: Required: Provide for retrieval of data in the event of disk
failure. Optional: Provide for safety of data in the event of natural disaster, provide
for safety against theft and vandalism. Proposed: Use a tape backup system and manual
verification. Store tapes on-site in a locked room in a controlled access locker.
69. Two Unix servers need to transfer e-mail from one to the other, what
protocol can be used to do this? a. SMTP b. UDP c. DLC d. IPX
Return to
Main Page