Exam Cram 1: CompTIA Network+ N10-005

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mfmoeykens
M
Mfmoeykens
Community Contributor
Quizzes Created: 1 | Total Attempts: 261
| Attempts: 261
SettingsSettings
Please wait...
  • 1/100 Questions

    A client on your network has had no problems accessing the wireless network in the past, but recently she moved to a new office. Since the move, she has had only intermittent network access. Which of the following is most likely the cause of the problem?

    • The SSID on the client is misconfigured.
    • The client system has moved too far from the AP.
    • The WEP settings are incorrect.
    • The AP is using an omnidirectional antenna.
Please wait...
Exam Cram 1: CompTIA Network+ N10-005 - Quiz
About This Quiz

Exam Cram Part 1
Network+ N10-005
4th edition
by Mike Harwood


Quiz Preview

  • 2. 

    You are troubleshooting an older 100BaseT network, and you suspect that the maximum cable length has been exceeded. What is the maximum length of a 100BaseT network segment?

    • 25 meters

    • 100 meters

    • 185 meters

    • 500 meters

    Correct Answer
    A. 100 meters
    Explanation
    100BaseT is an Ethernet network standard implemented using thin twisted- pair cable. The maximum length of a segment is 100 meters. When cable is run beyond 100 meters, repeaters can be used to regenerate the signal for longer transmission distances.

    Rate this question:

  • 3. 

    You are troubleshooting a network connectivity error, and you need to issue a continuous ping command. Which of the following switches is used with ping to send a continuous ping message?

    • -p

    • -t

    • -c

    • -r

    Correct Answer
    A. -t
    Explanation
    The ping -t command issues a continuous stream of ping requests until it is interrupted. A regular ping sends four requests, but sometimes this is not enough to troubleshoot a connectivity issue. None of the other answers are valid switches for a continuous ping command.

    Rate this question:

  • 4. 

    You suspect that someone is capturing the data sent on your network. You want to capture data to ensure that it is encrypted and cannot be read by intruders. Which of the following network utilities can both intruders and administrators use to capture network traffic?

    • Port scanner

    • Packet filter

    • Data watcher

    • Packet sniffer

    Correct Answer
    A. Packet sniffer
    Explanation
    Both administrators and hackers use packet sniffers on networks to capture network data. They are either a hardware device or software and eavesdrop on network transmissions traveling throughout the network. The packet sniffer quietly captures data and saves it to be reviewed later. Answer A is incorrect because port scanners monitor traffic into and out of ports such as those connected to a switch. Answers B and C are not valid traffic-monitoring technologies.

    Rate this question:

  • 5. 

    You need to install a network printer, and you require the printer’s MAC address to finish the installation. Which of the following is a valid MAC address?

    • 192.168.2.13

    • 0x00007856

    • 00:04:e2:1c:7b:5a

    • 56g78:00h6:1415

    Correct Answer
    A. 00:04:e2:1c:7b:5a
    Explanation
    A MAC address contains six hexadecimal number sets. The first three sets represent the manufacturer’s code, whereas the last three identify the unique station ID. Answer A is incorrect because the number is a valid internal IP address. Answers B and D are not valid MAC addresses.

    Rate this question:

  • 6. 

    During the night, one of your servers powers down. Upon reboot, print services do not load. Which of the following would be the first step in the troubleshooting process?

    • Examine the server log files.

    • Reboot the server.

    • Reinstall the printer.

    • Reinstall the printer software.

    Correct Answer
    A. Examine the server log files.
    Explanation
    In this scenario, your first step is to gather information by examining the server log files. When you have that information, you can proceed with the rest of the troubleshooting process. Rebooting the server (answer B) is unlikely to cure the problem. Before you reinstall the printer (answer C) or printer software (answer D), you should examine the log files to see if they report any problems.

    Rate this question:

  • 7. 

    You are troubleshooting a server connectivity problem on your network. A Windows 7 system is having trouble connecting to a Windows Server. Which of the following commands would you use to display per-protocol statistics on the workstation system?

    • Arp -a

    • Arp -A

    • Nbtstat -s

    • Nbtstat -S

    • Netstat -s

    Correct Answer
    A. Netstat -s
    Explanation
    The netstat -s command can be used to display per-protocol statistics. The arp command (answers A and B) is used to view a list of the IP addressto- MAC address resolutions performed by the system. The nbtstat utility (answers C and D) is used to view protocol statistics for the NetBIOS protocol.

    Rate this question:

  • 8. 

    Under what circumstance would you change the default channel on an access point?

    • When channel overlap occurs between access points

    • To release and renew the SSID

    • To increase the security settings

    • To decrease the security settings

    Correct Answer
    A. When channel overlap occurs between access points
    Explanation
    Ordinarily the default channel used with a wireless device is adequate. However, it may be necessary to change the channel if overlap with another nearby access point occurs. The channel should be changed to another, nonoverlapping channel. Answer B is not valid. Answers C and D are incorrect because changing the channel would not inherently impact the security settings.

    Rate this question:

  • 9. 

    Which of the following services provides name resolution services for FQDNs?

    • DNS

    • DHCP

    • WINS

    • ARP

    • NTP

    Correct Answer
    A. DNS
    Explanation
    The Domain Name System (DNS) resolves Fully Qualified Domain Names (FQDNs) to IP addresses. Answer B is incorrect because Dynamic Host Configuration Protocol (DHCP) provides automatic IP address assignment. Answer C is incorrect because the Windows Internet Naming Service
    (WINS) provides NetBIOS computer name to IP address resolution. Answer D is incorrect because Address Resolution Protocol (ARP) resolves IP addresses to MAC addresses. Answer E is incorrect because Network Time Protocol (NTP) facilitates the communication of time information between systems.

    Rate this question:

  • 10. 

    A user informs you that she can’t access the Internet from her system. When you visit her, you run the ipconfig /all utility and see the following information. What is the most likely reason the user is having problems accessing the Internet?

    • The system is on a different subnet than the DNS servers.

    • DHCP is not enabled.

    • The subnet mask is incorrect.

    • The default gateway setting is not configured.

    Correct Answer
    A. The default gateway setting is not configured.
    Explanation
    The most likely cause of the problem is that the default gateway is not configured. Answer A is incorrect because from the output it appears that the DNS servers are on the same subnet as this system. Answer B does not apply because addressing is statically configured, so there is no DHCP service. Answer C is incorrect because the subnet mask is the correct default subnet mask for a Class C network.

    Rate this question:

  • 11. 

    You have been hired to review the security of a company’s network. Upon investigation, you notice that a wireless AP has been installed in a wiring closet without the consent of the administrator. The AP is actively used by remote users to access resources on the company’s network. Which security problem does this represent?

    • Rogue protocol interception

    • Rogue AP

    • Network sniffing

    • Social engineering

    Correct Answer
    A. Rogue AP
    Explanation
    A rogue access point describes a situation in which a wireless access point has been placed on a network without the administrator’s knowledge. The result is that it is possible to remotely access the rogue access point, because it likely does not adhere to company security policies. Answers A and C are not valid security risk types. Answer D is a type of attack that involves tricking people into performing actions or divulging confidential information such as passwords or usernames.

    Rate this question:

  • 12. 

    You have just purchased a new wireless access point. You change the security settings to use 128-bit encryption. How must the client systems be configured?

    • All client systems must be set to 128-bit encryption.

    • The client system inherits security settings from the AP.

    • Wireless security does not support 128-bit encryption.

    • The client wireless settings must be set to autodetect.

    Correct Answer
    A. All client systems must be set to 128-bit encryption.
    Explanation
    On a wireless connection between an access point and the client, each system must be configured to use the same settings, which includes the SSID, and security settings. In this question, both the client and the AP must be configured to use 128-bit encryption. Answer B is incorrect because the client does not inherit the information from the AP. Answer C is incorrect because wireless security (including WEP) does support 128-bit encryption (with WPA and WPA2 supporting 256-bit encryption). Answer D is incorrect because not all wireless clients have an autodetect feature.

    Rate this question:

  • 13. 

    You are working as a network administrator on a UNIX system. The system uses dynamic name resolution. What is used to dynamically resolve a hostname on a UNIX server?

    • TCP

    • ARP

    • DNS

    • UDP

    Correct Answer
    A. DNS
    Explanation
    DNS is a platform-independent protocol used to resolve hostnames to IP addresses. TCP (answer A) is a network-layer connection-oriented protocol. ARP (answer B) resolves IP addresses to MAC addresses. The UDP protocol (answer D) is a connectionless protocol and is part of the TCP/IP protocol suite.

    Rate this question:

  • 14. 

    What is the default subnet mask for a Class B network?

    • 255.255.255.224

    • 255.255.255.0

    • 127.0.0.1

    • 255.255.0.0

    Correct Answer
    A. 255.255.0.0
    Explanation
    The default subnet mask for a Class B network is 255.255.0.0. Answer A is incorrect because it is not the default subnet mask for a Class B network. Answer B is not the default subnet mask for a Class B network; it is the default subnet mask for a Class C network. Answer C is the IPv4 local loopback address.

    Rate this question:

  • 15. 

    Email and FTP work at which layer of the OSI model?

    • Application

    • Session

    • Presentation

    • User

    Correct Answer
    A. Application
    Explanation
    Both email and FTP work at the application layer of the OSI model. Answers B and C are incorrect because Email and FTP work at the application layer; they are not session or presentation layer protocols or applications. User (answer D) is not a layer of the OSI model.

    Rate this question:

  • 16. 

    Placing a node on which of the following types of networks would require that you obtain an address from the IANA (whether you do so directly or an ISP does so on your behalf)?

    • Private network

    • Public network

    • Ethernet network

    • LAN

    Correct Answer
    A. Public network
    Explanation
    The Internet Assigned Numbers Authority (IANA) manages the address assignments for public networks such as the Internet. Often, an ISP requests a number on your behalf when needed. Answers A and D are incorrect because on a private network or LAN, you can use any internal IP addressing scheme that is compatible with your local network. Answer C is incorrect because an Ethernet network can be either private or public. It does not directly need an IANA assigned addressing scheme.

    Rate this question:

  • 17. 

    Your colleague decides to close all unused ports on the corporate firewall to further secure the network from intruders. The open ports are 25, 80, 110, and 53. Your colleague knows that ports 25 and 110 are required for email and that port 80 is used for nonsecure web browsing, so he decides to close port 53 because he doesn’t think it is necessary. Which network service is now unavailable?

    • Secure HTTP

    • FTP

    • Telnet

    • DNS

    Correct Answer
    A. DNS
    Explanation
    The DNS service uses port 53. If this port is accidentally blocked, the DNS service will be unavailable. Answer A is incorrect because secure HTTP uses port 443. Answer B is incorrect because FTP uses port 21. Answer C is incorrect because Telnet uses port 23.

    Rate this question:

  • 18. 

    You have configured network clients to obtain IP addresses using APIPA. Which of the following IP ranges would be assigned to client systems?

    • 10.10.0.0 to 10.254.254.0

    • 169.168.0.0 to 169.168.255.255

    • 192.168.0.0 to 192.168.254.254

    • 169.254.0.1 to 169.254.255.254

    Correct Answer
    A. 169.254.0.1 to 169.254.255.254
    Explanation
    The Internet Assigned Numbers Authority (IANA) has reserved addresses 169.254.0.1 to 169.254.255.254 for Automatic Private IP Addressing. APIPA uses a Class B address with a subnet mask of 255.255.0.0. None of the other IP address ranges listed are associated with APIPA address ranges.

    Rate this question:

  • 19. 

    What is the basic purpose of a firewall system?

    • It provides a single point of access to the Internet.

    • It caches commonly used web pages, thereby reducing the bandwidth demands on an Internet connection.

    • It allows hostnames to be resolved to IP addresses.

    • It protects one network from another by acting as an intermediary system.

    Correct Answer
    A. It protects one network from another by acting as an intermediary system.
    Explanation
    The purpose of a firewall system is to protect one network from another. One of the most common places to use a firewall is to protect a private network from a public one such as the Internet. Answer A is incorrect because although a firewall can provide a single point of access, that is not its primary purpose. Answer B more accurately describes the function of a proxy server. Answer C describes the function of a DNS server.

    Rate this question:

  • 20. 

    What utility would you use to check the IP configuration on a Windows 7 system?

    • Netstat

    • Nslookup

    • Ping

    • Ipconfig

    Correct Answer
    A. Ipconfig
    Explanation
    The ipconfig utility can be used to view the TCP/IP configuration on a Windows 7, Windows Vista, or Windows Server system. The netstat utility (answer A) is used to view protocol statistics information. The nslookup (answer B) is used to query the resource records in DNS. The ping utility (answer C) is used to test the connectivity between two systems on a TCP/IP network.

    Rate this question:

  • 21. 

    A user on your network can send data packets within the local subnet but cannot send packets beyond the local subnet. Which of the following is likely the problem?

    • Invalid permissions

    • Incorrect gateway information

    • No DNS server is installed

    • No WINS server is installed

    Correct Answer
    A. Incorrect gateway information
    Explanation
    If the gateway information is not correctly set, the data packets cannot get beyond the local subnet. All the other options do not prevent the user from transmitting data to remote hosts.

    Rate this question:

  • 22. 

    Which of the following statements is true of IMAP?

    • IMAP leaves messages on the mail server so that they can be viewed and accessed from various locations.

    • IMAP is used to send as well as receive email.

    • IMAP can be used only to send mail.

    • IMAP uses port 110.

    Correct Answer
    A. IMAP leaves messages on the mail server so that they can be viewed and accessed from various locations.
    Explanation
    Unlike POP3, IMAP does not directly download and then remove messages from the mail server. Instead, IMAP leaves the email on the server so that messages can be retrieved from various locations. Answers B and C are wrong because IMAP is used only to retrieve email. Answer D is incorrect because IMAP uses port 143. POP uses port 110.

    Rate this question:

  • 23. 

    Which of the following pieces of information is not likely to be supplied via DHCP?

    • IP address

    • NetBIOS computer name

    • Subnet mask

    • Default gateway

    Correct Answer
    A. NetBIOS computer name
    Explanation
    The NetBIOS computer name is not supplied to client systems by a DHCP server.

    Rate this question:

  • 24. 

    Which of the following best describes the function of asymmetric key encryption?

    • It uses both a private and public key to encrypt and decrypt messages.

    • It uses two private keys to encrypt and decrypt messages.

    • It uses a single key for both encryption and decryption.

    • It uses three separate keys for both encryption and decryption.

    Correct Answer
    A. It uses both a private and public key to encrypt and decrypt messages.
    Explanation
    Asymmetric key encryption uses both a private and public key to encrypt and decrypt messages. The public key is used to encrypt a message or verify a signature, and the private key is used to decrypt the message or sign a document. In a symmetric key encryption strategy, a single key is used for both encryption and decryption. None of the other answers represents asymmetric key encryption.

    Rate this question:

  • 25. 

    At which layer of the OSI model is flow control performed?

    • Network

    • Transport

    • Session

    • Data link

    Correct Answer
    A. Transport
    Explanation
    Flow control occurs at the transport layer of the OSI model. Answers A, C, and D are incorrect because flow control does not occur at the network, session, or data link layers.

    Rate this question:

  • 26. 

    You have been called in to troubleshoot a small network. The network uses TCP/IP and statically assigned IPv4 information. You add a new workstation to the network. It can connect to the local network but not to a server on a remote network. Which of the following is most likely the cause of the problem?

    • Incorrect IP address.

    • Incorrect default gateway.

    • The DHCP server is unavailable.

    • Duplicate IP addresses are being used.

    Correct Answer
    A. Incorrect default gateway.
    Explanation
    To connect to systems on a remote network, the default gateway address must be correctly assigned. If this address is manually entered, the number might have been incorrectly entered. Because the system can connect to the local network, the address is correctly assigned. Answer C is incorrect because IP addresses are statically assigned. Answer D is incorrect because duplicate addresses prevent the system from logging on to the network.

    Rate this question:

  • 27. 

    During a busy administrative week, you install a new virus suite in your network of 55 computers, a new RAID array in one of the servers, and a new office suite on 25 of the computer systems. After all the updates, you are experiencing system errors throughout the entire network. What should you do to help isolate the problem?

    • Disable the RAID array.

    • Uninstall the office suite.

    • Check the virus suite vendor’s website for system patches or service packs.

    • Reinstall the virus software.

    Correct Answer
    A. Check the virus suite vendor’s website for system patches or service packs.
    Explanation
    Because the system errors are over the entire network, it is likely that the cause of the problem lies with the virus suite because it is installed on all computers. To troubleshoot such a problem, it would be a good idea to check for patches or updates on the vendor’s website. A problem with a RAID array
    (answer A) would affect only the server on which it is installed, not the entire network. Because the office suite (answer B) was installed on only some of the systems, it can be eliminated as a problem because all the systems are affected. The virus software (answer D) appears to be the cause of the problem, but reinstalling it is unlikely to help.

    Rate this question:

  • 28. 

    You have been called in to replace a faulty ST connector. Which of the following media types are you working with?

    • RG-58

    • RG-62

    • Single-mode fiber

    • SCSI

    Correct Answer
    A. Single-mode fiber
    Explanation
    ST connectors are a twist-type connector used with single-mode fiber. Answer A is incorrect because RG-58 (thin coax) uses BNC-type connectors. Answer B is incorrect because RG-62 (thick coax) uses vampire-type AUI connectors. Answer D is incorrect because SCSI cables use a variety of connector types, none of which include ST connectors.

    Rate this question:

  • 29. 

    Which command produces the following output?

    • Arp

    • Netstat

    • Nbtstat

    • Tracert

    Correct Answer
    A. Netstat
    Explanation
    The output shown is from the netstat command from a Windows-based system. It is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and other network interface statistics.

    Rate this question:

  • 30. 

    You have installed a web-based database system on your PC so that you can enter troubleshooting information and retrieve it from any location on the network. Your system’s IP address is 192.168.1.164. You are not overly concerned about security, but as a basic measure, you allocate the web server application a port number of 9191 rather than the default port of 80. Assuming that you are working from another system on the network, what would you type into the address bar of a web browser to access the database?

    • Http://192.168.1.164.9191

    • Http://192.168.1.164/9191

    • Http://192.168.1.164//9191

    • Http://192.168.1.164:9191

    Correct Answer
    A. Http://192.168.1.164:9191
    Explanation
    To specify a TCP/IP port other than the default of 80, simply append the port number to the end of the address, using a colon (:) to separate the two.

    Rate this question:

  • 31. 

    Which of the following terms describes how long it takes routers to update changes in the network topology?

    • Poison reverse

    • Split horizon with poison reverse

    • Convergence

    • BGP

    Correct Answer
    A. Convergence
    Explanation
    Convergence is the term used to describe how long it takes routers to update changes to the network. Routing loops can occur on networks with slow convergence. Routing loops occur when the routing tables on the routers are slow to update, and a redundant communication cycle is created between routers. Answers A and B are strategies to prevent routing loops. Answer D is incorrect because BGP is a distance-vector protocol.

    Rate this question:

  • 32. 

    You are the administrator for a network that uses TCP/IP. You are using a single registered Class C network address. You want to continue to use it because many of your systems are accessed from outside sources, but you also want to create more networks so that you can more effectively manage traffic and security. Which of the following strategies would help you achieve this?

    • Implement a 127.x.x.x addressing system throughout the network.

    • Use reverse proxy.

    • Use subnetting.

    • Use private addressing.

    Correct Answer
    A. Use subnetting.
    Explanation
    Subnetting enables you to create more than one network from a single network address by manipulating the subnet mask to create more network addresses. Answer A is incorrect because the 127.x.x.x address range is reserved for TCP/IPv4 loopback functionality and cannot be used as an addressing scheme. Answer B is incorrect because reverse proxy is used when a proxy server protects another server (normally a web server), which responds to requests from users on the other side of the proxy server. Answer D is incorrect because private addressing might well solve the issues of security and traffic management, but without also using reverse proxy, systems on the internal network are unavailable to outside users.

    Rate this question:

  • 33. 

    Which of the following is a distance-vector routing protocol used on TCP/IP networks?

    • ARP

    • NLSP

    • OSPF

    • RIP

    Correct Answer
    A. RIP
    Explanation
    RIP is a distance-vector routing protocol used on TCP/IP networks. Answer A is incorrect because ARP is a component of the TCP/IP protocol suite used to resolve MAC addresses to IP addresses. Answer B is incorrect because NLSP is a link-state routing protocol used on IPX networks. Answer C is incorrect because OSPF is a link-state routing protocol used on TCP/IP networks.

    Rate this question:

  • 34. 

    A miscreant has added a rogue access point to your wireless network. Users are mistakenly connecting to that access point instead of the legitimate one they should connect to. What is this type of attack which eavesdrops on the wireless network known as?

    • Evil twin

    • War driving

    • WEP cracking

    • DDoS

    Correct Answer
    A. Evil twin
    Explanation
    An evil twin is a type of attack in which a rogue access point poses as a legitimate one and eavesdrops on the network communications. Answer B is incorrect because war driving involves the act of seeking out wireless networks (usually from a vehicle, hence the name) and not setting up a rogue access
    point. Answer C is incorrect because WEO cracking involves breaking the WEP encryption on an existing access point and not installing a rogue one. Answer D is incorrect because DDoS is a Distributed Denial of Service attack intended to bring down a server by keeping it too busy responding to echo requests that it cannot service legitimate requests for data.

    Rate this question:

  • 35. 

    Your ISP account manager suggests that it might be appropriate for you to install a DNS server internally. Which of the following functions does the DNS server perform?

    • It performs network address translation services.

    • It streamlines the resolution of NetBIOS names to IP addresses.

    • It allows some hostname-to-IP address resolutions to occur internally.

    • It allows users to retrieve Internet web pages more quickly.

    Correct Answer
    A. It allows some hostname-to-IP address resolutions to occur internally.
    Explanation
    DNS enables hostname resolutions to internally occur. In most cases, companies use a DNS server provided by the ISP. In some cases, however, it might be appropriate to have a DNS server on the internal network. Answer A is incorrect because NAT is normally a function of firewall or proxy servers. Answer B describes the purpose of a WINS server. Answer D describes the function of a proxy server.

    Rate this question:

  • 36. 

    Which of the following utilities would you use to view the TCP connections that have been established between two systems?

    • Netstat

    • Nbtstat

    • Tracert

    • Ipconfig

    Correct Answer
    A. Netstat
    Explanation
    The netstat utility enables you to view the TCP/IP connections between two systems. The nbtstat utility (answer B) is used to see the status of NetBIOS over TCP/IP connections. The tracert utility (answer C) is used to track the path that a packet of data takes between two hosts. The ipconfig utility (answer D) is used to view the IP addressing configuration information on a system.

    Rate this question:

  • 37. 

    Which of the following topology type offers the greatest amount of redundancy?

    • Star

    • Bus

    • Ring

    • Mesh

    Correct Answer
    A. Mesh
    Explanation
    In a mesh topology, each device is connected directly to every other device on the network. Such a structure requires that each device have at least two network connections. Answers A, B, and C do not offer the same level of redundancy as a mesh topology.

    Rate this question:

  • 38. 

    You are working on a Linux system, and you suspect that there might be a problem with the TCP/IP configuration. Which of the following commands would you use to view the system’s network card configuration?

    • Config

    • Ipconfig

    • Winipcfg

    • Ifconfig

    Correct Answer
    A. Ifconfig
    Explanation
    On a Linux system, the ifconfig command shows the network card configuration. Answer A is incorrect because the config command shows the network configuration on a NetWare server. Answer B is incorrect because the ipconfig command shows the network configuration information on a Windows system. Answer C is incorrect because the winipcfg command shows the network configuration information on a certain Windows system, such as Windows 95/98.

    Rate this question:

  • 39. 

    Your manager asks you to implement a fault-tolerant disk solution on your server. You have two 3TB hard disks and two controllers, so you decide to implement RAID 1. After the installation, your manager asks you how much storage space is now available for storing data. What do you tell her?

    • 3TB

    • 4TB

    • 6TB

    • 12TB

    Correct Answer
    A. 3TB
    Explanation
    In a RAID 1 scenario in which two controllers are used (disk duplexing), one disk carries an exact copy of the other. Therefore, the total volume of one disk (3TB in this case) is lost to redundancy.

    Rate this question:

  • 40. 

    You have been asked to implement a server clustering strategy. Which of the following are reasons to use server clustering? (Choose two.)

    • To increase data transmission security over the LAN

    • To increase data transmission security over the WAN

    • To increase server service fault tolerance

    • To reduce network downtime

    Correct Answer(s)
    A. To increase server service fault tolerance
    A. To reduce network downtime
    Explanation
    Server clustering is a strategy using a grouping of servers to provide fault tolerance and failover service solutions for a network. In a clustered configuration, servers constantly communicate with each other. If one fails, the other knows, and it takes over the functions of that server, including the services that the failed server delivered. This provides fault tolerance for network services. Because the network can function in the event of a failed server, network downtime is reduced. Answers A and B are incorrect because server clustering is not used to create or increase data transmission security.

    Rate this question:

  • 41. 

    You come into work on Monday to find that the DHCP server failed over the weekend. Before you can fix it, DHCP enabled client systems boot up and can communicate with each other. However, they cannot directly access the Internet or a remote network segment. Given that the DHCP server has failed, how can the systems communicate?

    • The DHCP service was recovered automatically using the Windows XP automatic restoration utility.

    • The DHCP addressing information was obtained from the client cache.

    • The client systems are assigned an IP address using APIPA.

    • The client systems are using static IP addressing.

    Correct Answer
    A. The client systems are assigned an IP address using APIPA.
    Explanation
    If a Windows client system cannot locate and obtain an IP address from a DHCP server, it is automatically assigned an address using APIPA. After the address is assigned, all client stations with an APIPA address can communicate with each other. However, APIPA addresses are meant for internal communication and cannot be used to access remote networks. Answer A is incorrect because there is no such thing. Answer B is incorrect because the IP address is obtained from the DHCP server, not from the client cache. Answer D is incorrect because the client was not configured to use static IP addressing.

    Rate this question:

  • 42. 

    Which of the following is a connectionless protocol?

    • TCP

    • THC

    • IP

    • UDP

    Correct Answer
    A. UDP
    Explanation
    UDP is a connectionless protocol. TCP (answer A) is a connection-oriented protocol. IP (answer C) is also a connection-oriented protocol. THC (answer B) is not a valid protocol.

    Rate this question:

  • 43. 

    You are upgrading the antenna on your wireless network. You need to purchase an antenna that provides a 360-degree dispersed wave pattern. Which of the following antenna types would you select?

    • Omni-dispersed antenna

    • Directional-dispersed antenna

    • Directional antenna

    • Omnidirectional antenna

    Correct Answer
    A. Omnidirectional antenna
    Explanation
    In a typical configuration, a wireless antenna can be either omnidirectional or directional. An omnidirectional antenna provides a 360-degree dispersed wave pattern. This provides an even signal in all directions. Answer C is incorrect because directional antennas are designed to focus the signal in a particular direction. Answers A and B are incorrect because omni-dispersed and directional-dispersed are not valid types of antennas.

    Rate this question:

  • 44. 

    While troubleshooting a network connectivity problem on a Windows Server system, you need to view a list of the IP addresses that have been resolved to MAC addresses. What command would you use to do this?

    • Arp -a

    • Nbtstat -a

    • Arp -d

    • Arp -s

    Correct Answer
    A. Arp -a
    Explanation
    The arp -a command is used to display the IP addresses that have been resolved to MAC addresses. The nbtstat command (answer B) is used to view protocol statistics for NetBIOS connections. arp -d (answer C) is used to delete entries in the ARP cache. The arp -s command (answer D) enables you to add static entries to the ARP cache.

    Rate this question:

  • 45. 

    Which command produces the following output?

    • Arp

    • Tracert

    • Ipconfig

    • Netinf

    Correct Answer
    A. Arp
    Explanation
    The output is from the arp -a command, which shows information related to IP address-to-MAC address resolutions. Answer B is incorrect because the tracert command displays the route a packet takes between two points. Answer C is incorrect because the ipconfig command displays a system’s network configuration. Answer D is incorrect because there is no such command as netinf.

    Rate this question:

  • 46. 

    Which term describes the process of using parts of the node address range of an IP address as the network ID?

    • Subnetting

    • Supernetting

    • Subnet masking

    • Super routing

    Correct Answer
    A. Subnetting
    Explanation
    The term subnetting refers to the process of using parts of the node address range for network addressing purposes. Supernetting (answer B) refers to the process to borrow parts of the network address portion of an assigned address to be used for node addressing. Subnet masking (answer C) describes the process to apply a subnet mask to an address. Answer D is not a valid term.

    Rate this question:

  • 47. 

    To increase wireless network security, you have decided to implement portbased security. Which of the following standards specifies port-based access control?

    • 802.11x

    • 802.1x

    • 802.11b

    • 802.1b

    Correct Answer
    A. 802.1x
    Explanation
    802.1x is an IEEE standard specifying port-based network access control. Port-based network access control uses the physical characteristics of a switched local area network (LAN) infrastructure to authenticate devices attached to a LAN port and to prevent access to that port in cases where the authentication process fails. Answer A is incorrect because 802.11x is not a security standard but sometimes is used to refer to all wireless network standards, such as 802.11b/g/a/n. Answer C, 802.11b, is an actual wireless standard specifying transmission speeds of 11Mbps.

    Rate this question:

  • 48. 

    You recently installed a DHCP server to replace static IP addressing. You configure all client systems to use DHCP and then reboot each system. After they are rebooted, they all have an IP address in the 169.254.0.0 range. Which of the  following statements is true?

    • The DHCP server has been configured to assign addresses in the 169.254.0.0 IP range.

    • The DHCP server must be rebooted.

    • Client systems cannot access the new DHCP server.

    • Client systems receive IP address information from the HOSTS file.

    Correct Answer
    A. Client systems cannot access the new DHCP server.
    Explanation
    When a client system first boots up, it looks for a DHCP server. If the server cannot be found, Automatic Private IP Addressing (APIPA) automatically assigns IP addresses to the client systems. The addresses are not routable and cannot be used to access remote segments. The addresses assigned are in the 169.254.0.0 address range. All clients configured with valid APIPA address can communicate with each other.

    Rate this question:

  • 49. 

    Which of the following network protocols can recover from lost or corrupted packets in a network transmission?

    • L2TP

    • TCP

    • FTP

    • ARP

    Correct Answer
    A. TCP
    Explanation
    TCP is a connection-oriented protocol, so it can recover from failed transmissions. Answer A is incorrect because L2TP is used in remote-access connections. Answer C is incorrect because FTP is a connectionless file transfer protocol and cannot recover from lost packets. Answer D is incorrect becauseARP is part of the TCP/IP protocol suite that resolves IP addresses to MAC addresses.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 15, 2013
    Quiz Created by
    Mfmoeykens
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.