Network+ 2005 500-548

44 Questions | Attempts: 56
Share

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Acutal Test 2005.501-510


Questions and Answers
  • 1. 

    You work as a sales consultant at Certkiller .com. You need to check inventory data from a customer's premises. You log in to the certkiller .com network but you cannot access the database server that has the required information. You find that you cannot ping the database server by host name but can by IP address. What is the MOST probable cause of this problem?

    • A.

      The DHCP server is down.

    • B.

      The print server is down.

    • C.

      The DNS server is down.

    • D.

      The remote access server is down.

    Correct Answer
    C. The DNS server is down.
    Explanation
    In this case you can ping the IP address but not the host name. Therefore there is a problem with host name to IP address resolution. DNS is responsible for host name to IP address resolution and is the most probable cause of the problem.
    Incorrect Answers:
    A: DHCP is responsible for automating the assignment of IP configurations to computer systems on a TCP/IP network. However, we can ping the server by IP address. Therefore DHCP cannot be causing the problem.
    B: You can ping the print server by IP address, therefore the print server cannot be down.
    D: You can log on to the Certkiller .com network. Therefore the remote access server cannot be causing the problem.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda
    CA, 2005, pp. 136-144, 184.

    Rate this question:

  • 2. 

    You are the network administrator at Certkiller .com. One morning a remote user complains that she could not log on to the network from home the previous evening. You run the arp -a command on the user's portable system and receive the output as shown in the following exhibit. Interface: 10.12.1.5 --- 0x2 Internet Address Physical Address Type 10.12.1.2 00-02-b3-a9-34-de dynamic 10.12.1.4 00-02-b3-d4-e8-c1 dynamic 10.12.1.5 00-02-b3-d0-a1-34 dynamic 10.12.1.5 00-02-b3-f2-e3-4d static Based on the output, what is the MOST probable cause of the problem?

    • A.

      The DNS server is down.

    • B.

      The DHCP server is down.

    • C.

      The Remote Access server is down.

    • D.

      There is an IP address conflict with another system.

    Correct Answer
    D. There is an IP address conflict with another system.
    Explanation
    The arp utility is useful for resolving duplicate IP addresses. The arp -a command displays the local ARP table which lists the IP address to MAC address mappings. The output from the arp -a command indicates that two systems have the IP address 10.12.1.5.

    Rate this question:

  • 3. 

    You are the network administrator at Certkiller .com. One morning CEO who is out of town for a business meeting calls to complain that he cannot dial in to the corporate RAS server. The modem on his portable system reports a no dial tone error. What is the MOST probable cause of the problem?

    • A.

      The DNS server is down.

    • B.

      The DHCP server is down.

    • C.

      The Remote Access server is down.

    • D.

      The phone line the CEO is using is digital.

    • E.

      The phone line the CEO is using is faulty.

    Correct Answer
    D. The phone line the CEO is using is digital.
    Explanation
    The modems use an analog phone line. It seems the phone line the CEO is trying is a digital line.
    Incorrect Answers:
    A: A DNS server is responsible for host name to IP address resolution. It will not cause a dialup problem.
    B: A DHCP server is responsible for the automatic IP configuration of DHCP clients. It will not cause a dialup problem.
    C: A problematic Remote Access server would prevent the remote user from logging on to the network. However, it will not cause a 'no dial tone' error.
    E: The phone line cannot be problematic as the CEO has used it to call you.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda
    CA, 2005, pp. 186-188, 194.

    Rate this question:

  • 4. 

    You are the network administrator at Certkiller .com. All workstations on the Certkiller .com network are configured as DHCP clients while all servers are configured with static IP addresses. A certkiller .com user complains that she cannot access any resources on the network. Other users are not experiencing this problem. You attempt to ping a Certkiller .com file server from the user's computer. Pinging by both host name and IP address fails. The ipconfig command indicates an IP address of 169.254.32.10 and a subnet mask of 255.255.0.0. What is the probable cause of this problem?

    • A.

      The DHCP server is down.

    • B.

      A rouge DHCP server is on the network.

    • C.

      The user's workstation cannot connect to the DHCP server.

    • D.

      The user's workstation is configured with a static IP address.

    Correct Answer
    C. The user's workstation cannot connect to the DHCP server.
    Explanation
    169.254.32.10 is and APIPA address that is assigned to a DHCP client when that client cannot connect to DHCP server. In this case only the one user is having a problem therefore the other users must be able to access the DHCP server.
    Incorrect Answers:
    A: If the DHCP server was down, all network users' computers would be experiencing the problem as they all would have APIPA addresses.
    B: If a rouge DHCP server was enabled on the network the user's computer might received its lease from the rouge DHCP server, which would not have the same address pool as the authorized DHCP server. However, it is unlikely that the rouge DHCP server would have an address pool in the 169.254.0.0 network address range. This address range is usually used for APIPA and is used when the DHCP client cannot access the DHCP server.
    D: It is unlikely that a workstation would be assigned a static IP address pool in the 169.254.0.0 network address range. This address range is usually used for APIPA and is used when the DHCP client cannot access the DHCP server.
    References:
    James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server
    2003 Network Infrastructure Implementation, Management, and Maintenance Study
    Guide, Sybex, Alameda CA, 2003, pp. 229-230.

    Rate this question:

  • 5. 

    You cannot reach a Web site on the Certkiller .com intranet but you can ping the Web server by host name. What is the probable cause of the problem?

    • A.

      HTTP on the workstation is down.

    • B.

      The DHCP server is down.

    • C.

      The DNS server is down.

    • D.

      Web Server is down.

    Correct Answer
    A. HTTP on the workstation is down.
    Explanation
    Web browsers use HTTP to access web sites. If HTTP is down or port 80, which is used for HTTP traffic, is blocked, you won't be able to access the intranet Web site.
    Incorrect Answers:
    B: DHCP is responsible for automating the assignment of IP configurations to computer systems on a TCP/IP network. If DHCP was down, we would not be able to access the server at all.
    C: DNS is used to provide host name to IP Address translation. If we can ping to the host name then there can be no problem with DNS.
    D: The ping command is used to test connectivity to a remote host. If the Web server is down, ping will not be successful.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda
    CA, 2005, pp. 117, 136-144, 184.

    Rate this question:

  • 6. 

    You are the network administrator at Certkiller .com. The Certkiller .com network has 50 Windows 98 client workstations, 100 Windows 2000 Professional workstations and a server named SRV_001. SRV_001 is running Windows 2000 Server. You install a new file server named SRV_002 on the network. The users with Windows 98 workstations complain that they are not able to connect to SRV_002, but can connect to SRV_001. Users with Windows 2000 Professional workstations are not experiencing any problems. You are able to ping the IP address of SRV_002 from one of the Windows 98 workstations, but cannot connect by SRV_002's NetBIOS name. What is the most probable cause of this problem?

    • A.

      The DHCP server is down.

    • B.

      The DNS server is down.

    • C.

      The LMHOSTS files are outdated.

    • D.

      The router is down.

    Correct Answer
    C. The LMHOSTS files are outdated.
    Explanation
    Windows 98 uses LMHOSTS files to resolve NetBIOS names to IP addresses. The LMHOSTS file is a static ASCII file that maps NetBIOS names to IP addresses. The NetBIOS name to IP address mapping of every host on the network must be entered manually on each workstation that relies on HOSTS files for NetBIOS name resolution. It appears that the NetBIOS name and IP address for SRV_002 has not been added to the LMHOSTS files. Windows 98 can also use WINS to resolve NetBIOS names to IP addresses.
    Incorrect Answers:
    A: DHCP is responsible for automating the assignment of IP configurations to computer systems on a TCP/IP network. If DHCP was down, none of the workstations would be able to access the server at all.
    B: DNS is used to resolve fully qualified domain names (FQDNs) to IP adresses; however, Windows 98 does not support the use of FQDNs and cannot use DNS. Instead, Windows 98 use WINS or LMHOSTS files to resolve NetBIOS names to IP addresses.
    D: If the router was down, we would not be able to access the server at all.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda
    CA, 2005, pp. 117, 136-144, 184.

    Rate this question:

  • 7. 

    How can a user access a Web site when his DNS server is down?

    • A.

      By using Web server's MAC address.

    • B.

      By using Web server's IP address.

    • C.

      By using IPSec.

    • D.

      By using SSL.

    Correct Answer
    B. By using Web server's IP address.
    Explanation
    DNS resolves host names to IP addresses. Thus, by using the IP address of the remote host, DNS will not be required.
    Incorrect Answers:
    A: DNS resolves host names to IP addresses, not MAC addresses. Thus, by using the IP address of the remote host, DNS will not be required.
    C: IPSec is used to secure data transmissions over the Internet. It does not provide an alternative method of accessing a Web server.
    D: SSL is used to secure data transmissions between a browser and a Web server. It does not provide an alternative method of accessing a Web server.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda

    Rate this question:

  • 8. 

    You are the network administrator at Certkiller .com. One morning all users complain that they are unable to connect a Certkiller .com server. You reboot the server but the problem persists. You cannot ping any of the workstations by host name or IP address. You also cannot ping the server's loopback address. What is the most probable cause of this problem?

    • A.

      The DNS server is down.

    • B.

      The DHCP server is down.

    • C.

      The network switch is down.

    • D.

      The NIC on the server has failed.

    Correct Answer
    D. The NIC on the server has failed.
    Explanation
    When the Network Interface Card (NIC) on host fails, it will not be able to ping its loopback address.
    Incorrect Answers:
    A: DNS is used to resolve fully qualified domain names (FQDNs) to IP addresses.
    B: DHCP is responsible for automating the assignment of IP configurations to computer systems on a TCP/IP network. If DHCP was down, none of the workstations would be able to access the server but the server would be able to ping its loopback address.
    C: If the switch was down, we would not be able to access the server but the server would be able to ping its loopback address.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda
    CA, 2005, pp. 117, 136-144, 184.

    Rate this question:

  • 9. 

    You are the network administrator at Certkiller .com. You configure the network for DHCP. Which of the following would you configure on the workstation?

    • A.

      The DHCP server address.

    • B.

      The workstation address.

    • C.

      The DNS server address.

    • D.

      The default gateway address.

    Correct Answer
    A. The DHCP server address.
    Explanation
    When a workstation is configured as a DHCP client, it receives its IP configuration from a DHCP server. The workstation would require the DHCP server's IP address to be able to contact the DHCP server.
    Incorrect Answers:
    A, B: The IP address for the DNS server and default gateway is part of the IP configuration that DHCP will assign automatically to the workstation. You would thus not configure this on the workstation.
    D: The network is configured for DHCP. This means that IP addresses will be assigned to workstations automatically.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda
    CA, 2005, pp. 117, 136-144, 184.

    Rate this question:

  • 10. 

    You work as a network technician at Certkiller .com. Certkiller .com has a NetWare-based network. You are planning to add five new Windows 95 client systems to the Certkiller .com network. You will install Novell NetWare Client to allow the new clients to connect to the NetWare server. What information will you need to configure Novell NetWare Client?

    • A.

      The user context and NDS tree name.

    • B.

      The username and password.

    • C.

      The domain name.

    • D.

      All of the above.

    Correct Answer
    A. The user context and NDS tree name.
    Explanation
    You need the preferred NDS tree name, the context, and the server properties to configure the Novell NetWare Client.
    Incorrect Answers:
    B: Username and password are not required to configure the Novell client but are needed ==to log on to the network.
    C: The domain name is not needed to connect to a NetWare server.
    D: The username and password, as well as the domain are not needed.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda
    CA, 2005, pp. 321-322.

    Rate this question:

  • 11. 

    You work as a network administrator at Certkiller .com. You replace the DNS server on the Certkiller .com network and removed the old DNS server. The new DNS server has a different IP address and you update the DHCP server to reflect this change. Which computers will be able to use the new DNS server?

    • A.

      Any computer that has not released and renewed their DHCP lease.

    • B.

      Any computer that has released and renewed their DHCP lease.

    • C.

      Any computer with a statically assigned IP address.

    • D.

      Any computer on the Certkiller .com network.

    Correct Answer
    B. Any computer that has released and renewed their DHCP lease.
    Explanation
    Computers must release and renew their DHCP leases in order to receive the new configuration that has been updated on the DHCP server. Once they receive this new configuration, they will be able to access the new DNS server.
    Incorrect Answers:
    A, D: Computers that have not released and renewed their DHCP leases will still be configured with the IP address for the old DNS server. Only when they renew the DHCP leases will the computers be configured with the updated DHCP settings.
    C: Computers with static IP addresses don't get their TCP/IP configurations from DHCP. Therefore they won't the updated configurations from DHCP and will not be able to connect to the new DNS server.
    References:
    James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server
    2003 Network Infrastructure Implementation, Management, and Maintenance Study
    Guide, Sybex, Alameda CA, 2003, pp. 223-227.

    Rate this question:

  • 12. 

    You work as a network administrator at Certkiller .com. The Certkiller .com network has 200 Windows 98 workstations and 150 Windows XP Professional workstations. You replace the WINS server on the Certkiller .com network with a DNS server. The new DNS server has a different IP address and you update the DHCP server to reflect this change. Which workstations will be able to use the new DNS server?

    • A.

      Any workstation that has not released and renewed their DHCP lease.

    • B.

      Any Windows 98 workstation that has released and renewed their DHCP lease.

    • C.

      Any Windows XP Professional workstation that has released and renewed their DHCP lease.

    • D.

      Any Windows XP Professional workstation that has not released and renewed their DHCP lease.

    Correct Answer
    C. Any Windows XP Professional workstation that has released and renewed their DHCP lease.
    Explanation
    Workstations must release and renew their DHCP leases in order to receive the new configuration that has been updated on the DHCP server. Once they receive this new configuration, they will be able to access the new DNS server. However, Windows 98 uses NetBIOS names and not domain names. Therefore only the Windows XP Professional workstations that have released and renewed their DHCP lease will use the new DNS server.
    Incorrect Answers:
    A, D: Computers that have not released and renewed their DHCP leases will still be configured with the IP address for the old DNS server. Only when they renew the DHCP leases will the computers be configured with the updated DHCP settings.
    B: Windows 98 uses NetBIOS names and not domain names. Therefore Windows 98 workstations cannot use the new DNS server.
    References:
    James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide, Sybex, Alameda CA, 2003, pp. 223-227.

    Rate this question:

  • 13. 

    You work as a network administrator at Certkiller .com. You have removed the DNS server from the network for maintenance purposes. What affect will this have on the workstations in the Certkiller .com network?

    • A.

      They will not be able to locate a server by NetBIOS name.

    • B.

      They will not be able to locate as server by MAC address.

    • C.

      They will not be able to locate a server by IP address.

    • D.

      They will not be able to locate a server by host name.

    Correct Answer
    D. They will not be able to locate a server by host name.
    Explanation
    DNS is responsible for host name to IP address resolution. Thus, if the DNS server is down, name resolution from host name to IP address will not be possible; thus DNS clients will not be able to locate a server by host name.
    Incorrect Answers:
    A: WINS is responsible for NetBIOS name to IP address resolution.
    B: ARP is responsible for IP address to MAC address resolution.
    C: DNS is responsible for host name to IP address resolution. It is not required if workstations use IP addresses to locate the servers.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 136-142, 144.

    Rate this question:

  • 14. 

    You work as a network administrator at Certkiller .com. You install a proxy server on the Certkiller .com network. What effect will this have on the network?

    • A.

      Reduced network collisions.

    • B.

      Reduced Internet traffic.

    • C.

      Reduced DHCP traffic.

    • D.

      Reduced broadcast traffic.

    Correct Answer
    B. Reduced Internet traffic.
    Explanation
    A proxy server handles traffic to the Internet on behalf of the clients on the internal network. It can be configured to control which the Internet requests can be permitted and which will be denied. This will control which web sites users can access and which they cannot, and can cache frequently requested Web pages, reducing Internet bandwidth usage.
    Incorrect Answers:
    A, D: Network collisions and broadcast traffic can be reduced by implementing routing and subnetting.
    C: A DHCP server is used to automatically assign TCP/IP configurations to hosts on a network. DHCP traffic can be reduced by increasing the DHCP lease period.
    Reference:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 134-13, 142-144.

    Rate this question:

  • 15. 

    You work as the network administrator at Certkiller .com. You install a VLAN on the Certkiller .com network to create two subnets. However, users on one subnet cannot access servers on the other subnet. What should you do to resolve this problem?

    • A.

      Install a router between the two subnets.

    • B.

      Install a DHCP server in each subnet.

    • C.

      Install a proxy server in each subnet.

    • D.

      Install a DNS server in each subnet.

    Correct Answer
    A. Install a router between the two subnets.
    Explanation
    To forward traffic between two subnets, we would need a router.
    Incorrect Answers:
    B: A DHCP server is used to automatically assign TCP/IP configurations to hosts on a network. Installing a DHCP server in each subnet will ensure that hosts on each subnet will have the proper IP configurations. However, the problem here is that a router is required to forward traffic between two subnets.
    C: A proxy server is used to protect a network from attacker on the Internet. It is not used to forward traffic between subnets.
    D: A DNS server is used for host name to IP address resolution. It is not used to forward traffic between subnets.
    Reference:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 134-13, 142-144, 153-154.

    Rate this question:

  • 16. 

    You work as a network administrator at Certkiller .com. The Certkiller .com network has two Windows 2000 servers, one Novell NetWare 6.5 server and 250 Windows 2000 Professional workstations. You add 10 new Windows XP Professional clients to the network. However, users of the new clients complain that they cannot connect only to the NetWare server. They can connect to the Windows 2000 servers. Other users do not have the same problem. What is the MOST probable cause of this problem?

    • A.

      Gateway Services for NetWare (GSNW) has not been installed on the new clients.

    • B.

      Client Services for NetWare (CSNW) has not been installed on the new clients.

    • C.

      File and Print Services for NetWare (FPNW) has not been installed on the new clients.

    • D.

      NDS has not been configured on the new clients.

    Correct Answer
    B. Client Services for NetWare (CSNW) has not been installed on the new clients.
    Explanation
    Client Services for NetWare (CSNW) is required for a Windows workstation to access NetWare servers. It seems CSNW has not been installed on the new clients.
    Incorrect Answers:
    A: Gateway Services for NetWare (GSNW) is installed on a Windwos server, not on the client. Furthermore, if the network relied on GSNW for client acess, and there was a probelem with GSNW, all clients would not be ablke to connect ot the NetWare server.
    C: File and Print Services for NetWare (FPNW) allows Novell clients to access files and printers hosted on a Windows NT server.
    D: NDS is configured on the NetWare server, not on the Windows clients.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, p. 120, 220.

    Rate this question:

  • 17. 

    You work as a network administrator at Certkiller .com. Certkiller .com has 100 Windows 98 clients, 125 Windows XP clients, and one Windows 2000 server. DHCP is not use on the network. A second server is added to the network. You configure the new server to provide WINS and remove WINS from the existing server. What must you do next to ensure the network remains fully operational?

    • A.

      Update the LMHOSTS file on each client.

    • B.

      Update each Windows 98 client with the WINS server address.

    • C.

      Update the DNS server with the host name and IP address of the WINS server.

    • D.

      Do nothing. The network is fully operational.

    Correct Answer
    B. Update each Windows 98 client with the WINS server address.
    Explanation
    WINS is responsible for NetBIOS name to IP address resolution for Windows 9x computers. We have changed the WINS server; therefore the Windows 98 clients need to be updated with the address of the new WINS server.
    Incorrect Answers:
    A: The LMHOSTS file serves the same function as WINS. Configuring both on the network would be a waste of administrative resources.
    C: DNS is responsible for fully qualified domain name to IP address resolution for DNS capable clients. Windows 98 is not DNS capable as it uses NetBIOS names and not fully qualified domain names. Windows 98 requires WINS.
    D: WINS is responsible for NetBIOS name to IP address resolution for Windows 9x computers. We have changed the WINS server; therefore the Windows 98 clients need to be updated with the address of the new WINS server.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 136-142, 144.

    Rate this question:

  • 18. 

    You work as a network technician at Certkiller .com. The Certkiller .com network has 500 Windows 98 clients and three Windows 2000 servers. You decide to segment the network and install a router to connect the two segments. What must you install to accommodate the Windows 98 clients that use NetBIOS?

    • A.

      The DHCP service.

    • B.

      The WINS service.

    • C.

      The DNS service.

    • D.

      The SMTP service.

    Correct Answer
    B. The WINS service.
    Explanation
    WINS is responsible for NetBIOS name to IP address resolution for Windows 9x computers.
    Incorrect Answers:
    A: DHCP provides automatic IP configuration for DHCP clients. It does not provide NetBIOS to IP address translation.
    C: DNS is responsible for fully qualified domain name to IP address resolution for DNS capable clients. Windows 98 is not DNS capable as it uses NetBIOS names and not fully qualified domain names. Windows 98 requires WINS.
    D: SMTP is responsible for e-mail transfers. It does not provide NetBIOS to IP address translation.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 136-142, 144.

    Rate this question:

  • 19. 

    Which of the following workstations will be affected when a SINGLE link on a physical bus network fails?

    • A.

      The workstation directly connected to the failed link.

    • B.

      The workstations downstream from the failed link.

    • C.

      The workstations upstream from the failed link.

    • D.

      All the workstations on the network.

    Correct Answer
    D. All the workstations on the network.
    Explanation
    A bus topology has a very low fault tolerance. A failure of any node on the network will bring the entire network down.
    Incorrect Answers:
    A: In the star topology, every node is connected to a central distribution device such as a hub or switch. A failure of a link to any node on this network will only affect that node.
    B, C: The bus topology has no fault tolerance. A single failure in these networks will bring the entire network down.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 20. 

    Which of the following workstations will be affected when a SINGLE station on a physical ring network fails?

    • A.

      The workstations directly connected to the failed station.

    • B.

      The workstations downstream from the failed station.

    • C.

      The workstations upstream from the failed station.

    • D.

      All the workstations on the network.

    Correct Answer
    D. All the workstations on the network.
    Explanation
    A ring topology has a very low fault tolerance. A failure of any node on the network will bring the entire network down.
    Incorrect Answers:
    A: In the star topology, every node is connected to a central distribution device such as a hub or switch. A failure of a link to any node on this network will only affect that node.
    B, C: The ring topology has no fault tolerance. A single failure in these networks will bring the entire network down.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 21. 

    Certkiller .com has an Ethernet network. Should a link on the Certkiller .com network fail, which workstations will be affected?

    • A.

      The workstations upstream from the failed link.

    • B.

      All the workstations on the network.

    • C.

      Only the workstation attached to the failed link.

    • D.

      None of the workstations.

    Correct Answer
    C. Only the workstation attached to the failed link.
    Explanation
    An Ethernet network uses the star topology in which every node is connected to a central distribution device such as a hub or switch. A failure of any node on this network will only affect the node that is down.
    Incorrect Answers:
    A: An Ethernet network uses the star topology in which every node is connected to a central distribution device such as a hub or switch. A failure of a link to any node on this network will only affect that node.
    B: The bus topology has no fault tolerance. A single failure in these networks will bring the entire network down.
    D: A full-mesh network has multiple links per host and is fault tolerant. A failure of any single link will not affect the network.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 22. 

    How will a failure of a router on a network with two VLANs affect communication?

    • A.

      The entire network will be down.

    • B.

      The network will remain fully operational.

    • C.

      Communication between VLANs will be affected.

    • D.

      All workstations connected to the router will be affected.

    Correct Answer
    C. Communication between VLANs will be affected.
    Explanation
    Although a switch is used to create VLANs, a router is required to forward traffic from one VLAN to the other as each VLAN is a subnet. A router connects two subnets together and is responsible for forwarding traffic between the subnets. Thus, if the router fails communication between the VLANs will be affected.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 23. 

    How will a failure of a router on a network with two subnets affect communication?

    • A.

      The entire network will be down.

    • B.

      The network will remain fully operational.

    • C.

      Communication between subnets will be affected.

    • D.

      All workstations connected to the router will be affected.

    Correct Answer
    C. Communication between subnets will be affected.
    Explanation
    A router connects two subnets together and is responsible for forwarding traffic between the subnets. Thus, if the router fails communication between the subnets will be affected.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 24. 

    Which of the following workstations will be affected when a SINGLE link on a full-mesh network fails?

    • A.

      The workstations directly connected to the failed link.

    • B.

      The workstations downstream from the failed link.

    • C.

      The workstations upstream from the failed link.

    • D.

      All the workstations on the network.

    • E.

      None of the workstations.

    Correct Answer
    E. None of the workstations.
    Explanation
    A full-mesh network has multiple links per host and is fault tolerant. A failure of any single link will not affect the network.
    Incorrect Answers:
    A: In an Ethernet network, every node is connected to a central distribution device such as a hub or switch. A failure of a link to any node on this network will only affect that node.
    B, C: A full-mesh network has multiple links per host and is fault tolerant. A failure of any single link will not affect the network.
    D: Token ring and token bus have no fault tolerance. A single failure in these networks will bring the entire network down.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 25. 

    Certkiller .com has a token bus network. A break occurs in the network cable. How will this affect the network?

    • A.

      The network will be split into two token bus networks.

    • B.

      The nodes downstream from the break will have no network connectivity.

    • C.

      The nodes upstream from the break will have no network connectivity.

    • D.

      The network will collapse.

    Correct Answer
    D. The network will collapse.
    Explanation
    A bus topology has a very low fault tolerance. It requires terminators at either end of the cable to absorb electronic signals so that they are not reflected back on the media. A failure in the cable will bring the entire network down.
    Incorrect Answers:
    A, B, C: The bus topology has no fault tolerance. A single failure in these networks will bring the entire network down.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 26. 

    Should a break occur in the cable of an Ethernet network, ______ will be offline.

    • A.

      All hosts on the network

    • B.

      The host directly connected to the failed cable

    • C.

      The hosts upstream from the failed cable

    • D.

      None of the hosts on the network

    Correct Answer
    B. The host directly connected to the failed cable
    Explanation
    An Ethernet network uses the star topology in which every node is connected to a central distribution device such as a hub or switch. A failure of any node on this network will only affect the node that is down.
    Incorrect Answers:
    A: The bus topology has no fault tolerance. A single failure in these networks will bring the entire network down.
    C: An Ethernet network uses the star topology in which every node is connected to a central distribution device such as a hub or switch. A failure of any node on this network will only affect the node that is down.
    D: A full-mesh network has multiple links per host and is fault tolerant. A failure of any single link will not affect the network.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 27. 

    When a break in the cable of a token ring network occurs, ______.

    • A.

      The network will revert to a token bus network

    • B.

      The nodes downstream from the break will have no network connectivity

    • C.

      The nodes upstream from the break will have no network connectivity

    • D.

      The network will collapse

    Correct Answer
    D. The network will collapse
    Explanation
    A token ring has a very low fault tolerance and a failure in the cable will bring the entire network down.
    Incorrect Answers:
    A: It will not become a token bus network unless terminators are attached to either end of the cable.
    B, C: A token ring network has no fault tolerance. A single failure in this network will bring the entire network down.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 28. 

    You are the network administrator at Certkiller .com. Certkiller .com has several workstations that have wireless 802.11g network adapters. Every day at around lunchtime wireless users complain of lack of connectivity. What can you do to this problem?

    • A.

      Replace the WAP with an 802.11b WAP.

    • B.

      Reduce the Radio Frequency Interference around the WAP.

    • C.

      Configure the wireless workstations and the WAP to operate in ad-hoc mode.

    • D.

      Connect the WAP directly to the network.

    Correct Answer
    B. Reduce the Radio Frequency Interference around the WAP.
    Explanation
    802.11g uses the 2.4 GHz range which is also used by appliances such as microwaves. The connectivity problem occurs at around lunch time, which seems to indicate that the increased use of microwaves at around this time is causing RFI (Radio Frequency Interference). We should thus attempt to eliminate this RFI.
    Incorrect Answers:
    A: 802.11a uses the 5.0 GHz range and will not be affected by other devices that use the 2.4 MHz range. However, we would need to change the wireless adapters on the workstations to 802.11a as well.
    C: In ad-hoc mode, two wireless devices can communicate directly, without the need for a WAP. However, these devices would not have access to the wired network.
    D: By design, the WAP is directly connected to the network but this will not overcome the RFI (Radio Frequency Interference) that is affecting the wireless signal.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 251, 252, 255.

    Rate this question:

  • 29. 

    You are the network administrator at Certkiller .com. The Certkiller .com network consists of two subnets; one contains all workstations and the other contains all servers. Users complain that they cannot access the servers in the remote subnet. You cannot ping any of the workstations by either host name or IP address but you can ping the other servers. What is the probable cause of this problem?

    • A.

      The DNS server is offline.

    • B.

      The DHCP server is offline.

    • C.

      The router is offline.

    • D.

      The gateway is offline.

    Correct Answer
    C. The router is offline.
    Explanation
    A router connects two subnets together and is responsible for forwarding traffic between the subnets. In this scenario, communication between the subnets is affected. Communication within the subnet is not affected as we can ping other servers in the subnet; thus, the router has failed.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 10-11, 12, 52.
    David Groth, Network+ Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 11-12, 23.
    David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda CA, 2001, pp. 313-314.

    Rate this question:

  • 30. 

    You work as the network technician at Certkiller .com. A user has entered the wrong WEP (Wired Equivalent Privacy) key into a wireless device. Which of the following symptoms will occur?

    • A.

      Data can be sent but not received.

    • B.

      The network cannot be accessed.

    • C.

      Data cannot be sent but can be received.

    • D.

      The network can only be accessed using the Service Set Identifier.

    Correct Answer
    B. The network cannot be accessed.
    Explanation
    WEP requires that both the wireless computer and the WAP (wireless access point) be configured with the same encryption key in order for the two to communicate. If one of the two has the wrong WEP key, communication will not be possible and the network will not be accessible.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, p. 254.

    Rate this question:

  • 31. 

    What is the FIRST step in resolving a network problem?

    • A.

      Select the most probable cause.

    • B.

      Identify what has changed.

    • C.

      Identify the affected area.

    • D.

      Identify the symptoms.

    Correct Answer
    D. Identify the symptoms.
    Explanation
    The first step in troubleshooting is to identify the problem by estabishing hte symptoms. This can be done by asking some questions to begin to clarify exactly what is happening.
    Incorrect Answers:
    A: Selecting the most probable cause follows identifying what has changed and is the fourth step.
    B: Identifying what has changed follows identifying the affected area and is the third step.
    C: Identifying the affected area follows identifying the symptoms and is the second step.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 32. 

    You are the network administrator at Certkiller .com. Some users are complaining about connectivity problems. You have identified the symptoms and the affected area. What is your NEXT step?

    • A.

      Select the most probable cause.

    • B.

      Identify what has changed.

    • C.

      Implement a solution.

    • D.

      Test a solution.

    Correct Answer
    B. Identify what has changed.
    Explanation
    Once you have identified the affected area, you should determine if anything has been changed in the affected area. This will help you identify the probable cause.
    Incorrect Answers:
    A: Selecting the most probable cause follows after identifying what has changed.
    C: Implementing a solution follows after selecting the most probable cause which follows after identifying what has changed.
    D: Testing a solution follows after implementing a solution and is a much later step.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 33. 

    You are the network technician at Certkiller .com. You have just completed the successful solution of connectivity problem on a workstation. What should you do NEXT?

    • A.

      Return the workstation to the user.

    • B.

      Implement the solution.

    • C.

      Document the solution.

    • D.

      Test a solution.

    Correct Answer
    C. Document the solution.
    Explanation
    Once you have resolved a problem, you must document the solution. This will help you resolve similar problems in the future.
    Incorrect Answers:
    A: Once you have resolved a problem, you must document the solution. This will help you resolve similar problems in the future.
    B: Implementing a solution follows after selecting the most probable cause. Once a solution is implemented, you have to test it to ensure the solution is successful. We can assume that implementation and testing has been completed as the question states that the
    solution is successful.
    D: Testing a solution follows after implementing the solution. Once a solution is implemented, you have to test it to ensure the solution is successful. We can assume that testing has been completed as the question states that the solution is successful.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 34. 

    The FIRST step in resolving a network problem is to _______.

    • A.

      Select the most probable cause

    • B.

      Identify what has changed

    • C.

      identify the affected area

    • D.

      identify the symptoms

    Correct Answer
    D. identify the symptoms
    Explanation
    The first step in troubleshooting is to identify the problem by estabishing the symptoms. This can be done by asking some questions to begin to clarify exactly what is happening.
    Incorrect Answers:
    A: Selecting the most probable cause follows identifying what has changed and is the fourth step.
    B: Identifying what has changed follows identifying the affected area and is the third step.
    C: Identifying the affected area follows identifying the symptoms and is the second step.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 35. 

    What is the FINAL step in solving a network problem?

    • A.

      Identify the symptoms.

    • B.

      Implement the solution.

    • C.

      Document the solution.

    • D.

      Test a solution.

    Correct Answer
    C. Document the solution.
    Explanation
    Once you have resolved a problem, you must document the solution. This will help you resolve similar problems in the future.
    Incorrect Answers:
    A: The first step in troubleshooting is to identify the problem by estabishing the symptoms. This can be done by asking some questions to begin to clarify exactly what is happening.
    B: Implementing a solution follows after selecting the most probable cause. Once a solution is implemented, you have to test it to ensure the solution is successful. We can assume that implementation and testing has been completed as the question states that the solution is successful.
    D: Testing a solution follows after implementing the solution. Once a solution is implemented, you have to test it to ensure the solution is successful. We can assume that testing has been completed as the question states that the solution is successful.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 36. 

    You are the network technician at Certkiller .com. You are addressing a network problem and have established that nothing was changed. What is your NEXT step?

    • A.

      Select the most probable cause.

    • B.

      Identify the affected area.

    • C.

      Implement a solution.

    • D.

      Identify the symptoms.

    Correct Answer
    A. Select the most probable cause.
    Explanation
    Once you have determined that nothing has been changed in the affected area, you should identify the most probable cause. This will allow you to address the problem systematically by eliminating most probable causes first.
    Incorrect Answers:
    B: You need to identify the affected area before you can determine whether anything changed in the affected area.
    C: You would implement a solution based on a probable cause. Thus, you need to select the most probable cause before you can implement a solution.
    D: You would identify the symptoms in the first step of the troubleshooting process. This can be done by asking some questions to begin to clarify exactly what is happening.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 37. 

    You are troubleshooting a network connectivity problem. You have determined what the most probable cause could be. What should you do NEXT?

    • A.

      Identify the symptoms.

    • B.

      Identify what has changed.

    • C.

      Implement a solution.

    • D.

      Identify the affected area.

    Correct Answer
    C. Implement a solution.
    Explanation
    Once you have what the most probable cause is, you can implement an action plan and solution to address the probable cause.
    Incorrect Answers:
    A: You would identify the symptoms in the first step of the troubleshooting process. This can be done by asking some questions to begin to clarify exactly what is happening.
    B, D: Once you have identified the affected area, you should determine if anything has been changed in the affected area. This will help you identify the probable cause.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 38. 

    Which of the following follows AFTER implementing a solution?

    • A.

      Select the most probable cause.

    • B.

      Identify what has changed.

    • C.

      Document the solution.

    • D.

      Test the solution.

    Correct Answer
    D. Test the solution.
    Explanation
    Testing a solution follows after implementing a solution as your solution addresses the most probable cause. Testing will determine whether the most probable cause is in fact the problem.
    Incorrect Answers:
    A: Selecting the most probable cause precedes implementing a solution.
    B: Implementing a solution follows after selecting the most probable cause, which follows after identifying what has changed.
    C: Documentation occurs after you are satisfied that the solution is successful. You will only know whether the solution is successful, once you have tested the solution.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 39. 

    You are the network assistant at Certkiller .com. The network technician is troubleshooting a network connectivity problem. He asks you to determine the most probable cause of the problem. Which of the following would you need to do? (Choose all that apply)

    • A.

      Identify the symptoms.

    • B.

      Identify the affected area.

    • C.

      Identify what has changed.

    • D.

      Implement a solution.

    Correct Answer(s)
    A. Identify the symptoms.
    B. Identify the affected area.
    C. Identify what has changed.
    Explanation
    Before you can determine what the most probable cause is, you must first identify the symptoms, narrow the problem down by identifying the affected area, and establish what has changed in the affected area.
    Incorrect Answers:
    D: Implementing a solution follows after selecting the most probable cause which follows after identifying what has changed.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 40. 

    You are the network technician at Certkiller .com. You are troubleshooting a network connectivity problem. Your assistant has determined the most probable cause of the problem. Which of the following would you need to do?

    • A.

      Identify the symptoms.

    • B.

      Identify the affected area.

    • C.

      Identify what has changed.

    • D.

      Implement an action plan.

    Correct Answer
    D. Implement an action plan.
    Explanation
    Implementing an action plan and a solution follows after selecting the most probable cause which follows after identifying what has changed.
    Incorrect Answers:
    A, B, C: Before you can determine what the most probable cause is, you must first identify the symptoms, narrow the problem down by identifying the affected area, and establish what has changed in the affected area.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 41. 

    The LAST step in resolving a network problem is to ______.

    • A.

      Identify the symptoms

    • B.

      Implement the solution

    • C.

      Document the solution

    • D.

      Test the solution

    Correct Answer
    C. Document the solution
    Explanation
    Once you have resolved a problem, you must document the solution. This will help you resolve similar problems in the future.
    Incorrect Answers:
    A: The first step in troubleshooting is to identify the problem by estabishing the symptoms. This can be done by asking some questions to begin to clarify exactly what is happening.
    B: Implementing a solution follows after selecting the most probable cause. Once a solution is implemented, you have to test it to ensure the solution is successful. We can assume that implementation and testing has been completed as the question states that the solution is successful.
    D: Testing a solution follows after implementing the solution. Once a solution is implemented, you have to test it to ensure the solution is successful. We can assume that testing has been completed as the question states that the solution is successful.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 42. 

    AFTER implementing a solution you must ______.

    • A.

      Select the most probable cause

    • B.

      Identify what has changed

    • C.

      Document the solution

    • D.

      Test the solution

    Correct Answer
    D. Test the solution
    Explanation
    Testing a solution follows after implementing a solution as your solution addresses the most probable cause. Testing will determine whether the most probable cause is in fact the problem.
    Incorrect Answers:
    A: Selecting the most probable cause precedes implementing a solution.
    B: Implementing a solution follows after selecting the most probable cause, which follows after identifying what has changed.
    C: Documentation occurs after you are satisfied that the solution is successful. You will only know whether the solution is successful, once you have tested the solution
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 43. 

    After identifying the symptoms of a problem, the NEXT step is to ______.

    • A.

      Select the most probable cause

    • B.

      Identify what has changed

    • C.

      Implement a solution

    • D.

      Identify the affected area

    Correct Answer
    D. Identify the affected area
    Explanation
    Once you have identified the symptoms, you must determine which part of the network is affected by the same symptoms.
    Incorrect Answers:
    A: Selecting the most probable cause follows after identifying what has changed in the affected area.
    B: Once you have identified the affected area, you should determine if anything has been changed in the affected area. This will help you identify the probable cause.
    C: Implementing a solution follows after selecting the most probable cause which follows after identifying what has changed in the affected area.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

  • 44. 

    After identifying the area affected by a problem, the NEXT step is to ______.

    • A.

      Select the most probable cause.

    • B.

      Identify what has changed.

    • C.

      Implement a solution.

    • D.

      Test a solution.

    Correct Answer
    B. Identify what has changed.
    Explanation
    Once you have identified the affected area, you should determine if anything has been changed in the affected area. This will help you identify the probable causes.
    Incorrect Answers:
    A: Selecting the most probable cause follows after identifying what has changed.
    C: Implementing a solution follows after selecting the most probable cause which follows after identifying what has changed.
    D: Testing a solution follows after implementing a solution and is a much later step.
    References:
    David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 415-420.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 05, 2007
    Quiz Created by
    Bigman782
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.