1.
You are connecting a Windows workstation to a NetWare 4.11 server. The workstation is unable to connect to the server, but it is able to connect to the Internet. Which two are possible problems? (Choose two.)
Correct Answer(s)
A. The server is not running NetBEUI
C. The workstation is not running IPX/SPX
Explanation
The possible problems could be that the server is not running NetBEUI, which is required for the Windows workstation to connect to it. Additionally, the workstation may not be running IPX/SPX, which is the protocol used by NetWare servers for communication.
2.
Provide the broadcast address for the following:
IP Address: 221.240.224.121
Subnet mask: 255.255.255.248.
Correct Answer
A. 221.240.224.127
Explanation
The given IP address is 221.240.224.121 and the subnet mask is 255.255.255.248. To find the broadcast address, we need to perform a bitwise OR operation between the IP address and the inverted subnet mask. The inverted subnet mask is 0.0.0.7. When we perform the bitwise OR operation, we get 221.240.224.127 as the broadcast address.
3.
Bridges operate at the physical layer. T/F?
Correct Answer
B. False
Explanation
False. Bridges operate at the data link layer, which is the second layer in the OSI model. The physical layer is responsible for the transmission of raw data over a physical medium, while the data link layer is responsible for the reliable transmission of data between adjacent nodes on a network. Bridges are used to connect two or more network segments at the data link layer, making them operate at this layer rather than the physical layer.
4.
After building a small network and connecting it to your ISP you notice that the clients are unable to browse the Internet. You call your ISP and he asks for the information configured on your router. You present the required information to him. He says the information is as it should be. You browse the net from the computer directly connected to your DSL modem and you are able to do so. What could the problem be?
Correct Answer
D. Default gateway not set on the workstations
Explanation
The problem could be that the default gateway is not set on the workstations. The default gateway is the IP address of the router that connects the local network to the internet. Without a default gateway, the workstations do not know how to route their network traffic to the internet. This would explain why they are unable to browse the internet even though the router's configuration and the ISP's information are correct.
5.
Which of the following are used for increasing fault toleranace? Choose three
Correct Answer(s)
A. Tape backup
B. Mirrored servers
C. RAID disk storage
Explanation
Tape backup, mirrored servers, and RAID disk storage are all used for increasing fault tolerance. Tape backup involves regularly backing up data onto tape cartridges, providing a reliable and easily recoverable copy in case of data loss or system failure. Mirrored servers involve creating an identical copy of a server's data and configuration on another server, allowing for seamless failover in case of server failure. RAID disk storage utilizes multiple hard drives to create redundancy and improve data reliability and availability. Off-site data archive, although mentioned in the options, is not typically used for increasing fault tolerance as it primarily serves as a backup in case of disaster or loss at the primary site.
6.
You just installed an application onto your Win2k workstation from the network and restarted it. It is no longer able to connect to the network, how will you roll back to the old setup before installing the software?
Correct Answer
A. Uninstall the software
Explanation
To roll back to the old setup before installing the software, you need to uninstall the software that was just installed. Uninstalling the software will remove any changes it made to the system, including any settings that might be causing the network connection issue. This will allow you to revert back to the previous state of the system where it was able to connect to the network. Using safe mode or last known good configuration might help in some cases, but the most direct and effective solution is to uninstall the software.
7.
Into which of the following does the ADS store its information? Select all that apply
Correct Answer(s)
A. AD database
B. AD log files
C. Shared system volume
Explanation
The ADS (Active Directory Service) stores its information in the AD database, AD log files, and the shared system volume. The AD database is where all the objects, attributes, and configurations of the Active Directory are stored. The AD log files keep a record of all the changes and events that occur within the Active Directory. The shared system volume is a shared folder on the domain controller that stores system files and scripts used by the Active Directory. Therefore, all the given options are correct.
8.
The ADS employs the flat domain structure. T/F?
Correct Answer
B. False
Explanation
The given answer is false because the ADS (Active Directory Services) does not employ a flat domain structure. Instead, it uses a hierarchical structure known as a domain tree, where domains are organized in a logical tree-like structure with a single root domain at the top. This allows for better organization, management, and delegation of administrative tasks within the network.
9.
Which of the following is a non-routable protocol?
Correct Answer
D. NetBEUI
Explanation
NetBEUI is a non-routable protocol because it does not have the capability to be routed across different networks. It is designed for small local area networks (LANs) and cannot be used to communicate between different LANs or over the internet. In contrast, protocols like TCP/IP, IPX/SPX, and AppleTalk are routable protocols that can be used for communication across multiple networks.
10.
Static routing needs manual intervention to configure a routing entry to the destination. T/F ?
Correct Answer
A. True
Explanation
Static routing requires manual intervention to configure a routing entry to the destination. This means that network administrators have to manually enter the specific routes into the routing table of each router in the network. This is in contrast to dynamic routing, where routers automatically exchange routing information and update their routing tables based on network changes. Therefore, the statement "Static routing needs manual intervention to configure a routing entry to the destination" is true.
11.
Which of the following commands will help to create a static route from a router Router A to destination network 172.12.0.0?
Correct Answer
B. Ip route 172.12.0.0 255.255.0.0 172.12.8.1
Explanation
The correct answer is "ip route 172.12.0.0 255.255.0.0 172.12.8.1". This command will create a static route from Router A to the destination network 172.12.0.0 with a subnet mask of 255.255.0.0 and the next hop IP address of 172.12.8.1. This means that any traffic destined for the 172.12.0.0 network will be forwarded to the next hop IP address specified in the command.
12.
Which networking topology is the easiest to reconfigure?
Correct Answer
C. Star
Explanation
The star topology is the easiest to reconfigure because it uses a central hub or switch to connect all devices in the network. Adding or removing devices only requires making changes at the central hub, without affecting the rest of the network. This makes it a flexible and convenient option for reconfiguration.
13.
Which of the following devices is required to complete a VLAN set up successfully?
Correct Answer
B. Router
Explanation
A router is required to complete a VLAN (Virtual Local Area Network) set up successfully. A VLAN is a logical network created within a physical network to separate traffic and improve network efficiency. A router is responsible for routing traffic between different VLANs, allowing them to communicate with each other. It helps in directing network traffic based on IP addresses and VLAN tags, ensuring that data is sent to the appropriate VLAN. Therefore, a router is essential for establishing and managing VLANs effectively.
14.
Your present network uses HOSTS file for IP to host name resolution. You are planning on adding a DNS server and moving a few servers to a remote site with different IP address. Which of the following will hold true?
Correct Answer
C. Users will be able to connect if a DNS server is enabled and the HOSTS file is deleted.
Explanation
If a DNS server is added and the HOSTS file is deleted, users will be able to connect. This is because the HOSTS file is used for IP to host name resolution in the present network. By enabling the DNS server, the network will now use DNS for IP to host name resolution instead. Deleting the HOSTS file ensures that the network does not continue to use it for resolution, allowing the DNS server to handle the task effectively.
15.
You have just upgraded your Dial-up server on the network. This server was used to share internet connections to the entire network. Users are unable to connect to the Internet now. What could be the likely cause of the problem?
Correct Answer
B. The DNS server could have failed to start right services.
Explanation
The likely cause of the problem is that the DNS server failed to start the right services. DNS (Domain Name System) is responsible for translating domain names into IP addresses. If the DNS server is not functioning properly, it will prevent users from connecting to the internet as they won't be able to resolve domain names to their corresponding IP addresses. This can happen after an upgrade if the DNS server configuration was not properly updated or if there was an issue with the DNS server software.
16.
Which of the following directory services can the Active Directory Service be compared with?
Correct Answer
A. Netware Directory Services
Explanation
The Active Directory Service can be compared with Netware Directory Services because both are directory services that provide a centralized database for managing and organizing resources in a network. They both allow for the creation and management of user accounts, groups, and permissions. Additionally, they both support a hierarchical structure that enables efficient and secure access to network resources.
17.
Which of the following are required when logging on to a Windows NT Server? (Choose two.)
Correct Answer(s)
A. Password
B. Username
Explanation
When logging on to a Windows NT Server, two things are required: a password and a username. The password is necessary to authenticate the user and ensure their identity, while the username is used to identify the specific user account that is being accessed. The IP address and MAC address are not required for logging on to a Windows NT Server as they are related to network connectivity and hardware identification, respectively.
18.
If you were asked to subnet a network in such a way as to arrive at 6 network Ids you would need to borrow 2 bits. T/F?
Correct Answer
B. False
Explanation
To subnet a network and arrive at 6 network IDs, you would actually need to borrow 3 bits, not 2. Borrowing 2 bits would only allow for a maximum of 4 network IDs (2^2 = 4). Borrowing 3 bits would give you 8 possible network IDs (2^3 = 8), which is more than the required 6. Therefore, the correct answer is False.
19.
The SMB (server message block) protocol runs on the Windows server and allows UNIX and Linux servers to see the Windows server as one of the UNIX/LINUX based servers. T/F?
Correct Answer
B. False
20.
Which of the following file systems are not supported by Windows NT 4.0? Select 2
Correct Answer(s)
B. NTFS 5
D. FAT 32
Explanation
Windows NT 4.0 does not support NTFS 5 and FAT 32 file systems. NTFS 5 is not supported because it was introduced in Windows 2000, which is a newer version of the operating system. FAT 32 is not supported because it was introduced in Windows 95 OSR2 and Windows 98, which are also newer versions of the operating system. Windows NT 4.0 only supports NTFS 4 and FAT 16 file systems.
21.
You have introduced a fully configured workstation into your network. Your network is IP based and uses static IP addressing. Everytime the new workstation connects to the network, another existing computer generates an error message and stops connecting. What could the problem be?
Correct Answer
D. Duplicate IP addresses have been assigned.
Explanation
The problem could be that duplicate IP addresses have been assigned. When the new workstation connects to the network, it is using an IP address that is already in use by another computer. This causes a conflict and triggers an error message on the existing computer, which then stops connecting to the network. To resolve this issue, the duplicate IP addresses need to be identified and changed to unique addresses.
22.
Which of the following allows fault tolerance for user authentication in a Windows 2000 network?
Correct Answer
A. Multi master replication
Explanation
Multi master replication allows fault tolerance for user authentication in a Windows 2000 network. In this system, multiple domain controllers are able to authenticate users and store user account information. If one domain controller fails, another can step in and continue the authentication process. This ensures that user authentication remains available even in the event of a failure, providing fault tolerance for the network.
23.
Which of the following makes the DNS environment a backbone of the Windows 2000 network?
Correct Answer
B. DDNS
Explanation
DDNS (Dynamic DNS) makes the DNS environment a backbone of the Windows 2000 network. DDNS allows for automatic updating of DNS records, which is particularly useful in dynamic IP addressing environments. It enables devices with changing IP addresses to be easily and automatically registered and updated in the DNS system. This ensures that the domain names associated with these devices are always up to date and can be resolved correctly, making DDNS an essential component of the Windows 2000 network.
24.
_________________ is used to propagate VLAN information across a trunked link.
Correct Answer
B. Virtual Trunk Protocol`
Explanation
The Virtual Trunk Protocol is used to propagate VLAN information across a trunked link. Trunking is a method of carrying multiple VLANs over a single link between switches. The Virtual Trunk Protocol allows switches to communicate and synchronize VLAN information, ensuring that all switches in the network have the same VLAN configuration. This allows for the efficient and effective distribution of VLAN traffic across the network.
25.
Which of the following is not a network operating system?
Correct Answer
C. Windows for Workgroups
Explanation
Windows for Workgroups is not a network operating system because it is a version of the Windows operating system that was primarily designed for small peer-to-peer networks and does not have the advanced networking capabilities found in true network operating systems. Windows NT, Windows 2000, and Linux, on the other hand, are all examples of network operating systems that are specifically designed to manage and control network resources and provide advanced networking features.
26.
Which name resolution technique does a UNIX host use?
Correct Answer
A. DNS
Explanation
A UNIX host uses the DNS (Domain Name System) name resolution technique. DNS is a system that translates domain names into IP addresses, allowing computers to communicate with each other over the internet. It is responsible for mapping human-readable domain names to their corresponding IP addresses, making it easier for users to access websites and services. DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses to devices on a network, Proxy is a server that acts as an intermediary between clients and other servers, and LMHOSTS is a file used by Microsoft Windows for NetBIOS name resolution.
27.
If you were to identify a NetBIOS name corresponding to an IP address, where would you look for it?
Correct Answer
D. NetBIOS name cache
Explanation
The NetBIOS name cache is the most likely place to find a NetBIOS name corresponding to an IP address. NetBIOS is an older networking protocol that maps computer names to IP addresses. The NetBIOS name cache stores this mapping information for quick retrieval. The other options, such as the ARP cache, MAC address table of a switch, and DNS cache, are not specifically designed to store NetBIOS name information.
28.
You are configuring a dial-up connection for your network to connect with a remote server. Which of the following protocols must you configure to secure your authentication in terms of encryption? (Choose two.)
Correct Answer(s)
C. PPTP (Point-to-point Tunneling Protocol)
D. TCP/IP (Transmission Control Protocol and Internet Protocol)
29.
You are a traveling user who connects to the remote site from your laptop whenever you visit that site. Today when you connect your laptop to the network, you are unable to login. You check your IP configuration and your IP address is 0.0.0.0. What is the likely cause for the problem?
Correct Answer
B. The DHCP server is not reachable.
Explanation
The likely cause for the problem is that the DHCP server is not reachable. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. If the DHCP server is not reachable, the laptop is unable to obtain an IP address, resulting in the IP address being displayed as 0.0.0.0.
30.
Which of the following is an ideal location for storing a tape into which you have just finished backing up?
Correct Answer
D. In a locked safe at on offsite location
Explanation
An ideal location for storing a tape after backing up is in a locked safe at an offsite location. This ensures that the backup data is protected from potential physical damage, theft, or disasters that may occur in the primary location. Storing the tape offsite also provides an additional layer of security in case of any incidents that may affect the primary location, such as fire or flooding. By keeping the tape in a locked safe, access to the data is restricted only to authorized personnel, further enhancing its security.
31.
In a Windows 2000 network, it is imperative that you must be physically connected to the printer into which you wish to fire a printout. T/F?
Correct Answer
B. False
Explanation
In a Windows 2000 network, it is not necessary to be physically connected to the printer in order to print. Windows 2000 supports network printing, which allows users to send print jobs to printers that are connected to the network, regardless of their physical location. Users can connect to network printers using TCP/IP or other network protocols, allowing for printing from any device connected to the network. Therefore, the statement that it is imperative to be physically connected to the printer in order to print in a Windows 2000 network is false.
32.
Metro is a small company that is using static IP addressing scheme in its network. After a merger with a larger company Cosmo, which uses dynamic IP addressing and DNS for name resolution, the servers of Metro were moved to the server farm of Cosmo and their addressing schemes and resolutions were changed accordingly. After this change in the network structure the servers that were moved to the server farm are no longer reachable. What should you do to correct the problem?
Correct Answer
A. Delete the HOSTS file
Explanation
Deleting the HOSTS file would be the correct action to take in order to correct the problem. The HOSTS file is a local file on a computer that maps hostnames to IP addresses. By deleting the HOSTS file, the computer will no longer use this file for name resolution and will rely on the dynamic IP addressing and DNS used by the larger company Cosmo. This will allow the servers that were moved to the server farm to be reachable again.
33.
On a bus segment, you have introduced a new workstation after which the entire segment collapses. What could be the possible cause/causes for the problem? Select 2
Correct Answer(s)
A. Faulty NIC
B. Faulty termination
Explanation
The collapse of the entire bus segment after introducing a new workstation suggests that there may be an issue with the network interface card (NIC) in the new workstation. A faulty NIC can cause disruptions in the network communication, leading to the collapse of the segment. Additionally, a faulty termination, such as a loose or improperly connected cable, can also result in network issues and segment collapse. Faulty cabling can further contribute to connectivity problems and segment failure. However, a faulty server alone would not cause the collapse of the entire segment, so it is not a possible cause in this scenario.
34.
Routing Information Protocol (RIP) by default has_____________ number of hops.
Correct Answer
A. 15
Explanation
RIP (Routing Information Protocol) by default has a maximum limit of 15 hops. This means that RIP can only handle routing information for networks that are within 15 hops (or routers) away. If a network is further than 15 hops away, RIP will not be able to route traffic to that network.
35.
Which of the following access security does Windows 2000 Server use on LANs?
Correct Answer
D. Kerberos
Explanation
Windows 2000 Server uses Kerberos as the access security on LANs. Kerberos is a network authentication protocol that provides secure communication over a non-secure network. It uses tickets to verify the identity of users and allows them to securely access network resources. Kerberos is widely used in Windows environments as it provides strong authentication and helps prevent unauthorized access to sensitive information.
36.
Which of the following protocols is supported by Windows 2000 Server for the purpose of dial-up? Choose two
Correct Answer(s)
A. PPP
B. SLIP
Explanation
Windows 2000 Server supports the PPP (Point-to-Point Protocol) and SLIP (Serial Line Internet Protocol) protocols for dial-up purposes. PPP is widely used for establishing a connection between a computer and an internet service provider (ISP) over a telephone line. SLIP, on the other hand, is an older protocol that allows data transmission over serial connections, typically used for dial-up connections. TCP/IP and IPX/SPX are network protocols, but they are not specifically designed for dial-up connections.
37.
Which of the interfaces on the router would be used by the switch, if the switch needs to connect to the router?
Correct Answer
C. Fast Ethernet
Explanation
The switch would use the Fast Ethernet interface on the router to connect to it. Fast Ethernet is a standard for Ethernet networks that provides higher data transfer speeds compared to regular Ethernet. It is commonly used for connecting local area networks (LANs) and devices that require fast and reliable network connectivity.
38.
Which of the following are services of a proxy server? (Choose three.)
Correct Answer(s)
C. Cached web pages
D. Cached DNS information
Explanation
A proxy server can perform several services, including caching web pages and DNS information to improve access speed and reduce bandwidth usage. Cached web pages allow faster access to frequently visited sites, while cached DNS information reduces the time it takes to resolve domain names. Cached e-mail and cached client files are not typical functions of a proxy server, as these are usually managed by other specialized systems like email servers or file servers.
39.
Which of the following is the correct connection for cascading MAus?
Correct Answer
C. Connect the ring in port to the ring out port on each MAU.
40.
Kerberos is ideally meant for_____________.
Correct Answer
A. Authenticating LAN users
Explanation
Kerberos is a network authentication protocol that is primarily designed for authenticating LAN users. It provides a secure way for users to prove their identity to network services and ensures that only authorized users can access resources on the network. By using a system of tickets and encryption, Kerberos verifies the identity of users and protects against unauthorized access and tampering of data. Therefore, it is suitable for authenticating LAN users rather than WAN users or encrypting databases or user names.
41.
Which of the following devices is used to connect multiple computers on a network segment?
Correct Answer
A. Hub
Explanation
A hub is a device used to connect multiple computers on a network segment. It acts as a central connection point, allowing data to be transmitted between the connected devices. Unlike a router or a bridge, a hub does not analyze or direct the data traffic. Instead, it simply broadcasts the data to all connected devices, which means that all devices on the network segment receive the data.
42.
Which of the following are some commonalities between Windows NT and Windows 2000?
Correct Answer
A. They are both based on NT kernel.
Explanation
Both Windows NT and Windows 2000 are based on the NT kernel. This means that they share the same foundational software that manages system resources, such as memory, processes, and input/output. This commonality between the two operating systems suggests that they have similar underlying architectures and capabilities.
43.
Which of the following functions is a firewall capable of? Choose two
Correct Answer(s)
A. Block traffic
B. Permit traffic
Explanation
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. One of the main functions of a firewall is to block or permit traffic based on these rules. By blocking traffic, the firewall can prevent unauthorized access and potential threats from entering the network. On the other hand, by permitting traffic, the firewall allows legitimate and authorized traffic to pass through. Additionally, firewalls can also verify company policies to ensure compliance and authenticate internal users to control access to the network.
44.
Which of the following media access scheme does the token ring network use?
Correct Answer
A. Token passing
Explanation
Token passing is the correct answer because the token ring network uses a token passing media access scheme. In this scheme, a token is passed around the network, and only the device holding the token is allowed to transmit data. This ensures that there are no collisions and guarantees fair access to the network for all devices. CSMA/CD and CSMA/CA are different media access schemes used in other types of networks, not in token ring networks.
45.
How many maximum subnet IDs are possible in this situation? Class C network 221.222.162.0 255.255.255.0, subnet by borrowing 5 bits,
Correct Answer
A. 30 subnet IDs
Explanation
By borrowing 5 bits, we can create 2^5 = 32 subnets. However, since the question asks for the maximum subnet IDs, we need to subtract 2 from the total number of subnets. This is because the first subnet ID (all 0s) is reserved as the network address, and the last subnet ID (all 1s) is reserved as the broadcast address. Therefore, the maximum number of subnet IDs possible in this situation is 32 - 2 = 30 subnet IDs.
46.
Plug and play technology allows you to add devices to the computer without having to turn it off. T/F?
Correct Answer
A. True
Explanation
Plug and play technology enables users to connect and use devices with a computer without needing to shut down or restart the system. This feature automatically detects and configures newly connected hardware, facilitating seamless integration and usability without the need for manual intervention or system restarts.
47.
Which of the following permissions would be appropriate for Unix/Linux file system? (Choose three)
Correct Answer(s)
A. Read (r)
B. Write (w)
D. Execute (x)
Explanation
The appropriate permissions for Unix/Linux file system are Read (r), Write (w), and Execute (x). These permissions allow a user to read the contents of a file, modify the contents of a file, and execute a file as a program, respectively. Change (c) is not a valid permission in Unix/Linux file systems.
48.
You have just connected a brand new dial-up modem that does not require drivers. You have configured the modem and shared it for your Peer-to-Peer network as per the instructions in the manual. Your system just refuses to recognize this PCI modem. What must you do next? Select 2
Correct Answer(s)
A. Change the slot.
C. Try restarting your computer.
Explanation
If the system refuses to recognize the PCI modem that has been configured and shared for the Peer-to-Peer network, the first step would be to try restarting the computer. This can help refresh the system and potentially resolve any temporary issues that may be causing the recognition problem. If restarting the computer does not work, the next step would be to change the slot where the modem is connected. This can help troubleshoot any potential issues with the current slot and ensure proper recognition of the modem by the system.
49.
You wish to segregate your sales department logically in terms of the products that they deal with. There are 3 such groups. The data intended for Product 1 must not reach Product 2 and 3 and so on. Which of the following would be an ideal solution for this situation?
Correct Answer
B. VLANs
Explanation
VLANs (Virtual Local Area Networks) would be an ideal solution for segregating the sales department logically in terms of the products they deal with. VLANs allow for the creation of separate virtual networks within a physical network, enabling the isolation of traffic between different groups or departments. By assigning each product group to a different VLAN, the data intended for one product group will not reach the other groups, ensuring logical segregation and enhancing network security.
50.
Which of the following is true regarding this representation of IP address?204.202.10.32/29
Correct Answer
C. 29 bits of the 32 bits are reserved for the network ID.
Explanation
In this representation of the IP address 204.202.10.32/29, the "/29" indicates that the first 29 bits of the 32-bit IP address are reserved for the network ID. This means that only the remaining 3 bits are available for the host ID. Therefore, the correct answer is that 29 bits of the 32 bits are reserved for the network ID.