2008 network+ sample questions

Upload: anonymous-igefht

Post on 03-Apr-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 2008 Network+ Sample Questions

    1/43

    1. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which

    device will be required to pass traffic among the VLANs (Virtual Local Area Network)?a. Router

    b. No additional device needed

    c. Another switchd. A hub

    2. Which of the following options are the minimal settings for connecting a computer to a TCP / IP

    (Transmission control Protocol / Internet Protocol) LAN (Local Area Network) while accessing theInternet?

    a. IP (Internet Protocol) address, subnet mask, gateway, and DNS (Domain Name Service)

    b. IP (Internet Protocol) address and gatewayc. Subnet mask, IP (Internet Protocol) address, and DNS (Domain Name Service)

    d. IP (Internet Protocol) address, DNS (Domain Name Service), and gateway

    3. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation

    of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data

    Link Layer?a. 1

    b. 2c. 3

    d. 4

    4. A junior network administrator downloads a beta version of a patch to apply to a production e-mail

    server. The junior administrator plans to apply the patch during off-hours when e-mail usage is low.One morning the e-mail server fails and has to be repaired offline. The junior administrator repairs

    the e-mail server and is ready to reconnect the e-mail server to the network. What should be done

    regarding the patch?a. Set up an additional server in a cluster with the original server and install the patch on the

    secondary server

    b. Install the patch on a non-production server to test the effects.c. Set up an additional server in a cluster with the original server and install the patch on the

    primary server

    d. Install the patch now while the server is offline to prevent any further downtime

    5. In order for a client to share resources on a wired network, the client must be physically connected

    and:

    a. mapped to the resources using the host name, followed by the resource name.b. allowed permission to the resources.

    c. be a member of AD (Active Directory).

    d. be listed in DNS (Domain Name Service).

    6. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across

    the wire?

    a. PPP (Point-to-Point Protocol)b. SLIP (Serial Line Internet Protocol)

    c. RADIUS (Remote Authentication Dial-In User Service)

    d. TCP / IP (Transmission Control Protocol / Internet Protocol)

  • 7/28/2019 2008 Network+ Sample Questions

    2/43

    7. Which digital interface device is used to connect to a local service providers digital T1 (T-CarrierLevel 1) or E1 network?

    a. NIC (Network Interface Card)

    b. ISDN (Integrated Services Digital Network)c. CSU / DSU (Channel Service Unit / Data Service Unit)

    d. WAP (Wireless Access Point)

    8. All of the following are valid IP (Internet Protocol) addresses EXCEPT:a. 192.168.0.1

    b. 172.192.4.256

    c. 156.144.226.123d. 10.24.12.0

    9. An Ethernet MAC (Media Access Control) address consists of:a. 12 bits.

    b. 32 bits.

    c. 48 bits.d. 64 bits.

    10. The following are characteristics of AV (Anti-Virus) software EXCEPT that it will:

    a. update a definition automatically.b. delete an infected file.

    c. backup a registry.

    d. scan within a compress file.

    11. A user complains that they can no longer access resources on the network. The user Is unable to ping

    other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet.What Is the problem? )

    a. The DHCP (Dynamic Host Configuration Protocol) server has lost connection to the DNS

    (Domain Name Service).b. Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.

    c. The WINS (Windows Internet Name Service) is offline.

    d. The DNS (Domain Name Service) is offline.

    12. A network administrator has setup a new mail server in a new domain. Which DNS (Domain Name

    Service) records need to be created before e-mail can be received from the internet?

    a. A record onlyb. MX (Mail Exchanger) records only

    c. MX (Mail Exchanger) and CNAME (Canonical Name) records

    d. MX (Mail Exchanger) and A records

    13. A user at a workstation within a workgroup tries to access a file server in the domain "CompTIA."

    The user exists in the "CompTIA" domain as "jsmith." Which login credential should be used to

    access the file server?a. jsmith

    b. \\jsmith

    c. \\CompTIA\jsmithd. CompTIA\jsmith

    http://comptia/jsmithhttp://comptia/jsmith
  • 7/28/2019 2008 Network+ Sample Questions

    3/43

    14. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the192.168.0.1 address range, what technology should the user implement?

    a. PPP (Point-to-Point Protocol)

    b. Proxy serverc. RADIUS (Remote Authentication Dial-In User Service) server

    d. SLIP (Serial Line Internet Protocol)

    15. Which one of the following choices is the MOST secure place to store tape backups?a. Next to the server

    b. In a locked room in the same building as the server

    c. locked room in an offsite locationd. In a desk drawer

    16. Which device is responsible for converting data to the proper network media?a. Switch

    b. Transceiver

    c. Bluetoothd. NIC (Network Interface Card)

    17. Which one of the following servers provides web caching services?

    a. DNS (Domain Name Service)b. DHCP (Dynamic Host Configuration Protocol)

    c. Proxy

    d. File

    18. Which one of the following antenna types is omnidirectional?

    a. Verticalb. Dipole

    c. Yagi

    d. Parabolic

    19. Which command will produce the following output?

    ethoLink encap : Ethernet HWaddr: 00 : 80 : C8 : D6 : 74 : 43

    inet adder : 4.150.6.3 Beast: 4.255.255.255Mask: 255.0.0.0

    a. ipconfig

    b. nslookupc. ifconfig

    d. arp

    20. A firewall can be used to prevent which of the following?a. Packets from entering and leaving a network

    b. Packets from entering a network and viruses within a subnet

    c. Packets from entering and leaving a network as well as broadcast traffic within a subnetd. Packets from leaving a network as well as broadcast and viruses within a subnet

  • 7/28/2019 2008 Network+ Sample Questions

    4/43

    21. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File TransferProtocol) is being is being blocked by a firewall. After unblocking port 21 on the firewall, FTP (File

    Transfer Protocol) still does not work. What is the source of the problem?

    a. TFTP (Trivial File Transfer Protocol) is not installed.b. NFS (Network File System) is not installed.

    c. Port 20 must also be unblocked.

    d. Port 22 must also be unblocked.

    22. Which type of connector is used to connect a cable modem to a broadband provider?

    a. RJ-45 (Registered Jack)

    b. F-Typec. Series-B

    d. MT-RJ (Mechanical Transfer-Registered Jack)

    23. How many connections nave to be maintained on a companys mesh network with eight nodes?

    a. 8

    b. 16c. 28

    d. 32

    24. How many concurrent connections can a Windows 2000 Professional computer support on a singleshare?

    a. 10

    b. 20c. 30

    d. 50

    25. A computer that is working on a network is unplugged and then plugged into another switch with a

    new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not

    come on. All of the following could be the source of the problem EXCEPT that:a. the port on the switch is bad.

    b. the cable has a short in it.

    c. the wrong type of cable is used.

    d. the NIC (Network Interface Card) is bad.

    26. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard describes the physical

    layer for networks that use a ring topology?a. 802.2

    b. 802.3

    c. 802.4

    d. 802.5

    27. All of the following IP (Internet Protocol) addresses are mutable EXCEPT:

    a. 126.14.254.1b. 172.16.16.1

    c. 192.10.20.1

    d. 201.35.44.1

  • 7/28/2019 2008 Network+ Sample Questions

    5/43

    28. A technician connects a computer to the LAN (Local Area Network) switch to analyze the trafficoccurring from another computer on the network. The only traffic observed coming from the other

    computer is broadcast frames. What can be concluded from this information?

    a. DNS (Domain Name Service) is not installed.b. WINS (Windows Internet Name Service) is not installed.

    c. DHCP (Dynamic Host Configuration Protocol) is not installed.

    d. The analyzer is functioning properly.

    29. Which standard covers the methods for performing authentication services for remote access to a

    central LAN (Local Area Network)?

    a. 802.5b. 802.1x

    c. 802.3

    d. 802.4

    30. Which one of the following directory services is hierarchical in design?

    a. Windows AD (Active Directory)b. Novell NetWare Bindery

    c. NT (New Technology) 4.0 Domaind. Linux / etc / password file

    31. Given the following output, identify the utility used

    NAME Type Status

    WORKSTATION1 UNIQUE RegisteredWORKSTATION1 UNIQUE Registered

    MAC Address = 00-40-60-EA-BC-3B

    a. netstatb. ipconfig

    c. ifconfig

    d. nbtstat

    32. A small office network with ten computers uses a cable modem and router to connect to the Internet

    and distribute services to clients. After several weeks of use, the routers collision LED (Light

    Emitting Diode) has begun to stay on permanently. What is the MOST likely cause of the problemand the FIRST troubleshooting steps?

    a. There are too many collisions occurring in traffic. Disconnect each network card individually to

    find and replace the one that is broadcastingb. The cable modem is set to receive packets at a faster rate than the routers receive port allows.

    Lower the buffer threshold limits to correct levels.

    c. The routers primary link to the modem has been lost. Reboot the modem and router to reset the

    link.d. The router has been compromised by an external source attack. Modify the routers registry to

    disallow the offending IP (Internet Protocol) source from connecting again.

    33. When one connection to a host fails in a full mesh network, which of the following is true?

    a. All hosts can communicate.

    b. No hosts can communicate.c. Half of the hosts will lose communication.

    d. Only the two hosts between the failed connection will lose communication.

  • 7/28/2019 2008 Network+ Sample Questions

    6/43

    34. Which one of the following security protocols creates a secure connection over the Internet?a. L2TP (Layer 2 Tunneling Protocol)

    b. PPP (Point-to-Point Protocol)

    c. SNMP (Simple Network Management Protocol)d. WEP (Wired Equivalent Privacy)

    35. What is the maximum standard distance allowed to connect a customer via an ISDN (IntegratedServices Digital Network) line?

    a. 6,000 feet (1,828.8 meters)

    b. 8,000 feet (2,438.4 meters)c. 2,000 feet (3,657.6 meters)

    d. 18,000 feet (5,486.4 meters)

    36. A network administrator is troubleshooting connectivity from a client machine. An error message

    that reads "Page Cannot be Displayed" is shown in the browser whenever a FQDN (Fully Qualified

    Domain Name) is typed in the address bar. However, if the IP (Internet Protocol) address is typed inthe browser the site is displayed. At which port number is the problem taking place?

    a. 53b. 80

    c. 119d. 443

    37. Which of the following cable types is used to link together two buildings that are over 10 miles(16.09 kilometers) apart?

    a. SMF (Single Mode Fiber)

    b. MMF (MultiMode Fiber)c. Coaxial cable

    d. Category 6 cable

    38. Which of the following connectors are SFF (Small Form Factor) fiber connectors?

    a. MT-RJ (Mechanical Transfer-Registered Jack) and LC (Local Connector)

    b. ST (Straight Tip) and SC (Standard Connector)

    c. RJ-45 (Registered Jack) and RJ-11 (Registered Jack)d. Series-A and Series-B

    39. Around noon, 802.11b wireless users near the break room have intermittent, random connections.What is the problem?

    a. There are too many people located too close to the access point causing interference.

    b. An old microwave oven is being used in the break room which causes interference with the

    access point.c. Old fluorescent lights in the break room are interfering with the access point.

    d. 900 MHz (Megahertz) cordless phones being used by employees on break are causing

    interference with the access point.

  • 7/28/2019 2008 Network+ Sample Questions

    7/43

    40. Given the output:1 .pgw (129.6.80.254) *4ms 3ms

    2.129.6.1.245 (129.6.1.245) 4ms 3ms *

    3.129.6.2.252 (129.6.2.252) 5ms 5ms 4ms

    Which of the following commands causes the results above?

    a. ping

    b. arpc. nslookup

    d. traceroute

    41. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet

    Protocol) address is in use on the network. Which of the following commands can be used to

    troubleshoot the problem?a. pmg

    b. traceroute

    c. findd. arp

    42. When installed on a Windows 2000 server, which one of the following allows a Windows-only

    client to access files on a NetWare 4.1 server?a. CSNW (Client Services for NetWare)

    b. GSNW (Gateway Services for NetWare)

    c. Novell NetWare clientd. DNS (Domain Name Service)

    43. A technician is troubleshooting a problem on a network using a utility to capture the packets. Whenthe technician reviews the captured data they have only captured broadcast packets and packets from

    their own computer. What is the reason for this?

    a. They do not have permission to capture other packets.b. They are connected to a switch when trying to capture packets.

    c. The router is blocking the packets to the workstation.

    d. They are using an evaluation copy of the software utility.

    44. An administrator is unsuccessful when attempting to ping a network device on a remote site with a

    firewall in between. In order for the administrator to be successful, what protocol needs to be

    allowed through the firewall?a. SNMP (Simple Network Management Protocol)

    b. UDP (User Datagram Protocol)

    c. ICMP (Internet Control Message Protocol)

    d. IGMP (Internet Group Multicast Protocol)

    45. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses a

    1300 nm (nanometer) beam?a. 1000BASE-LX and 10 GBASE-LR

    b. 1000BASE-CX and 1000BASE-T

    c. 1000BASE-SX and 10 GBASE-SRd. 10 GBASE-ER and 10 GBASE-SR

  • 7/28/2019 2008 Network+ Sample Questions

    8/43

    46. At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol)reside?

    a. Session

    b. Networkc. Physical

    d. Transport

    47. A network administrator notices in his secure wireless office that many of his wireless clientmachines constantly lose network connectivity. The wired clients never have downtime. The

    administrator also notices that the wireless clients all lose connectivity from the network at the same

    time, but can still see each other. What should be done to solve this problem?a. Change the SSID (Service Set Identifier) on all of the clients

    b. Check the connection from the WAP (Wireless Access Point) to the network

    c. Check the connection from the WAP (Wireless Access Point) to the wired clientsd. Check the WEP (Wired Equivalent Privacy) settings on the clients

    48. Which one of the following is a purpose for subnetting?a. To block Internet traffic

    b. To decrease network congestionc. To increase network bandwidth

    d. To consolidate several small networks into one large network

    49. Company A has two networks, one on the west side of town and one on the east side. The network

    administrator wants to connect the two networks with a leased line but is concerned about limitingbroadcast traffic. What can the administrator do to alleviate broadcast traffic?

    a. Put a router between the two network segments

    b. Put a bridge between the two network segmentsc. Run different protocols on the two network segments

    d. Use a pocket-filtering firewall on each network segment

    50. Which of the following choices describes an RJ-45 (Registered Jack) connector?

    a. A BNC (British Naval Connector / Bayonet Niell-Concelman) connector which uses fiber.

    b. A four-position connector which uses UTP (Unshielded Twisted Pair).

    c. A six-position connector which uses UTP (Unshielded Twisted Pair).d. An eight-position connector which uses UTP (Unshielded Twisted Pair).

    51. A firewall differs from a proxy server in that a proxy server operates at which of the following levelsof the OSI (Open Systems Interconnect) model?

    a. Application

    b. Network

    c. Transportd. Data Link

    52. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remoteaccess?

    a. Verification

    b. Encryptionc. Addressing

    d. Tunneling

  • 7/28/2019 2008 Network+ Sample Questions

    9/43

    53. Given the address 00:B0:D0:5A:E1:B5, what does 5A:E1:B5 identify?a. The device ID (Identification)

    b. The type of device

    c. The manufacturer of the deviced. The network address of the device

    54. A Microsoft client is configured to use the NWLINK IPX / SPX (Internetwork Packet Exchange /

    Sequence Packet Exchange) protocol. The network has four Novell servers but the client can onlysee two of the servers. The client wants to change to frame type setting to see all of the servers. What

    setting should the client make to correct the problem and see all of the servers?

    a. Configure the frame type to auto frame type detectionb. Configure the frame type for 802.3

    c. Configure the frame type to 802.3 or 802.2

    d. Configure the frame type for NetBIOS (Network Basic Input / Output System)

    55. Which protocol is used for error reporting in concert with IP (Internet Protocol)?

    a. SMTP (Simple Mail Transfer Protocol)b. CMP (Internet Control Message Protocol)

    c. IGMP (Internet Group Multicast Protocol)d. SNMP (Simple Network Management Protocol)

    56. What is the default authentication protocol for Windows clients higher than Win9x on a Windows

    2000 / 2003 based network?

    a. MS-CHAPv1 (Microsoft Challenge Handshake Authentication Protocol version 1)b. Kerberos

    c. MS-CHAPv2 (Microsoft Challenge Handshake Authentication Protocol version 2)

    d. IPSec (Internet Protocol Security) AH (Authentication Header)

    57. What is a MAC (Media Access Control) address?

    a. It is an address assigned to enable routing over a WAN (Wide Area Network)b. It is an address assigned to a TCP (Transmission Control Protocol) port.

    c. It is an address assigned to a DNS (Domain Name Service) entry.

    d. It is an address assigned to a NIC (Network Interface Card).

    58. A user is unable to reach a web site on a host computer. The user can ping the host name and Telnet

    to the host name. What is the source of the problem?

    a. The host does not have a DNS (Domain Name Service) entry.b. The hosts HTTP (Hypertext Transfer Protocol) is down.

    c. The host does not have a WINS (Windows Internet Name Service) entry.

    d. The host is down.

    59. All of the following options transmit data over a modem EXCEPT:

    a. POTS / PSTN (Plain Old Telephone System / Public Switched Telephone Network).

    b. xDSL (Digital Subscriber Line).c. cable.

    d. T1 (T-Carrier Level 1).

  • 7/28/2019 2008 Network+ Sample Questions

    10/43

    60. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programsto use network services?

    a. Transport

    b. Data Linkc. Application

    d. Presentation

    61. Which command generated the following output?Active Connections

    Proto Local Address Foreign Address State

    TCP CompA:3006 192.168.0.2:Microsoft EstablishedTCP CompA:3021 192.168.0.246:HTTP Established

    a. nbtstat

    b. netstatc. arp a

    d. ipconfig

    62. The system administrator performs full backups on Sundays. Incremental backups are performed

    every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes onWednesday night. Which tapes must be used to restore data?

    a. Sundays full backup as well as Wednesdays tapeb. Sundays full backup as well as Tuesdays and Wednesdays tapes

    c. Sundays full backup as well as Mondays, Tuesdays, and Wednesdays tapes

    d. Sundays full backup as well as Mondays, Tuesdays, Wednesdays, and Thursdays tapes

    63. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two

    strands of fiber?a. RJ-11 (Registered Jack)

    b. Series-B

    c. MT-RJ (Mechanical Transfer-Registered Jack)d. ST (Straight Tip)

    64. Which one of the following options is required for a client workstation to connect to a network

    resource?a. Client, protocol, and adapter

    b. Proxy, service, and adapter

    c. Client, protocol, and proxyd. Service, protocol, and adapter

    65. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?

    a. Network and Data Linkb. Network and Transport

    c. Transport and Session

    d. Physical and Data Link

    66. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT

    a. packet labeling.b. smaller header.

    c. improved authentication and security.

    d. larger subnet masks.

  • 7/28/2019 2008 Network+ Sample Questions

    11/43

    67. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a

    domain name?a. netstatand ping

    b. arp and ping

    c. ipconfig and nbtstatd. nbtstat and tracer

    68. If an authentication protocol is being implemented that uses a private key and a session key, the

    protocol is:a. L2TP (Layer 2 Tunneling Protocol).

    b. Kerberos.

    c. IPSec (Internet Protocol Security).d. PPTP (Point-to-Point Tunneling Protocol).

    69. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect)and connects networks with different architectures?

    a. Router

    b. Firewallc. Modem

    d. Gateway

    70. A user connects to the companys intranet server via a VPN (Virtual Private Network) connectionfrom a SOHO (Small Office / Home Office) using the broadband service. One day, the user cannot

    successfully connect to the VPN (Virtual Private Network) and receives an error message that states

    "Username and password are invalid on the domain." What should be done to correct this problem?a. Call the corporate help desk to have the VPN (Virtual Private Network) server rebooted

    b. Re-enter the username and password in the VPN (Virtual Private Network) connection and

    reconnectc. Call the broadband Internet provider to replace the SOHO (Small Office / Home Office) router

    with a newer model

    d. Ping the corporate VPN (Virtual Private Network) server to ensure it is online

    71. While reviewing network traffic statistics, technicians have noticed that there is an abnormally high

    amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?

    a. Increase the TTL (Time to Live) on the DNS (Domain Name Service) serversb. Decrease the TTL (Time to Live) on the DNS (Domain Name Service) servers

    c. Increase the DHCP (Dynamic Host Configuration Protocol) lease expiration time on the DHCP

    (Dynamic Host Configuration Protocol) serversd. Decrease the DHCP (Dynamic Host Configuration Protocol) lease expiration time on the DHCP

    (Dynamic Host Configuration Protocol) servers

    72. Which of the following commands does a network administrator use to verify the mail serveraddresses for a remote domain?

    a. nslookup/dig

    b. nbtstatc. tracert/trace route

    d. netstat

  • 7/28/2019 2008 Network+ Sample Questions

    12/43

    73. Upon which devices can NAT (Network Address Translation) be used?a. Hub

    b. Bridge

    c. Switchd. Firewall

    74. Which one of the following communication protocols does a UNIX system primarily rely on

    a. A-.IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange)b. B-.Kerberos

    c. C- TCP / IP (Transmission Control Protocol / Internet Protocol)

    d. D- NetBEUI (Network Basic Input/ Output Extended User Interface)

    75. A remote user has been set up to print to a network printer. After connecting remotely, the print

    server stops functioning; and the router shows 100% traffic being received. What is the cause of theproblem?

    a. The client is using an unauthorized user name and password, causing a stop function call.

    b. The client is performing a defragmentation and thus consuming network print server resources.c. The client is acting as a zombie and is causing a denial of service attack to occur on the print

    server.d. The client is infected with a virus, causing the print server to close the network connection.

    76. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail

    programs are not currently running. Which of the following utilities should be run to see if there are

    any open SMTP (Simple Mail Transfer Protocol) sockets?a. nbtstat

    b. netstat

    c. arpd. nslookup

    77. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?a. 5 GHz (Gigahertz) interference

    b. High number of wireless users

    c. 900 MHz (Megahertz) interference

    d. A long length of antenna extension cable

  • 7/28/2019 2008 Network+ Sample Questions

    13/43

    78. Computer A can connect with computers on Network A, but cannot connect with computers onNetwork B. Which of the following solutions will allow communication between Network A and

    Network B?

    Computer A: Computer B:IP: 123.132.192.50 IP: 200.201.202.52

    Subnet Mask: 255.255.240.0 Subnet Mask: 255.255.255.0

    Default Gateway: 200.201.202.1 Default Gateway: 200.201.202.1

    Network A: Network B:Network: 123.132.192.0 Network: 200.201.202.0

    Subnet Mask: 255.255.240.0 Subnet Mask: 255.255.255.0

    Router A: Router B:IP: 123.132.192.1 IP: 200.201.202.1

    a. Change the default gateway of Computer B to 123.132.192.1

    b. Change the default gateway on Computer A to 123.132.192.1c. Change the subnet mask for Computer A to 255.255.255.0

    d. Change the subnet mask for Computer B to 255.255.240.0

    79. A network is experiencing a high volume of SMTP (Simple Mail Transfer Protocol) traffic. Which

    utility can a user run from the affected e-mail server to determine the source?a. netstat

    b. nbtstatc. nslookup/dig

    d. Ping

    80. Which type of connector would a cable have if it were supplied with a splitter and a cable modem

    for Internet access?

    a. F-Typeb. RJ-45 (Registered Jack)

    c. RJ-11 (Registered Jack)

    d. IEEE 1394 (Institute of Electrical and Electronics Engineers)

    81. Which disaster recovery implementation is the MOST expensive?

    a. Cold site

    b. Warm site C -Hot sitec. Dynamic site

    82. If a user needs to know the NetBIOS (Network Basic Input / Output System) name of the server thatthey are connected to, which of the following utilities will provide this information?

    a. nbtstat

    b. tracert

    c. nslookupd. netstat

  • 7/28/2019 2008 Network+ Sample Questions

    14/43

    83. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cableto connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correct

    and the network is up, which of the following will the technician see on the NIC (Network Interface

    Card)?a. The amber light is flashing occasionally and the green light is lit steadily.

    b. The amber light is flashing continually, the green light is lit steadily, and neither light will be on

    until data is transferred.

    c. The amber light is lit and steady and the green light is flashing continually.d. The amber light is flashing occasionally, the green light is lit steadily, and neither light will be on

    until data is transferred.

    84. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic

    standard?

    a. 1000BASE-TXb. 10 GBASE-LR

    c. 1000BASE-CX

    d. 10BASE-T

    85. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by:a. increasing encryption to a 128-bit cipher.

    b. encapsulating the data payload.c. double encrypting the data payload.

    d. adding a second password.

    86. A client on a Winciows 2000 network cannot access resources on a Winciows 2000 server because

    the DHCP (Dynamic Host Configuration Protocol) server is down. The client obtained an IP (Interne

    Protocol) address. What IP (Internet Protocol) address is the client using?a. 169.254.X.X with a subnet mask of 255.255.0.0

    b. 169.254.X.X with a subnet mask of 255.255.255.0

    c. 169.255.X.X with a subnet mask of 255.255.0.0d. 169.255.X.X with a subnet mask of 255.255.255.0

    87. Which type of connector would a cable have if it were supplied with a splitter and a cable modem

    for Internet access?a. F-Type

    b. RJ-45 (Registered Jack)

    c. RJ-11 (Registered Jack)d. IEEE 1394 (Institute of Electrical and Electronics Engineers)

    88. A network technician is troubleshooting a remote home users computer that is behind a SOHO

    (Small Office / Home Office) router running NAT (Network Address Translation). The technicianwants to ping the IP (Internet Protocol) address of the remote users computer. The technician has the

    user perform an ipconfig command and verifies that the users IP (Internet Protocol) address is

    192.168.1.100. The home user can also access the Internet with no trouble. The technician then pingsthe users IP (Internet Protocol) address but it times out. Why is the ping unsuccessful?

    a. The SOHO (Small Office / Home Office) router is down.

    b. The user has a different subnet mask than that of the SOHO (Small Office / Home Office) router.c. This IP (Internet Protocol) address cannot be pinged remotely.

    d. This IP (Internet Protocol) address is in a different subnet class than the IP (Internet Protocol)

    address of the technicians computer.

  • 7/28/2019 2008 Network+ Sample Questions

    15/43

    89. A network administrator installs a Linux DHCP (Dynamic Host Configuration Protocol) server. To

    configure the Windows clients to use the Linux DHCP (Dynamic Host Configuration Protocol)server, what must be configured on the Windows clients?

    a. Install a Linux compatible DHCP (Dynamic Host Configuration Protocol) client

    b. Enable "Obtain IP (Internet Protocol) address automatically"c. Install WINS (Windows Internet Name Service)

    d. Windows clients are not compatible with Linux DHCP (Dynamic Host Configuration Protocol)

    server

    90. What functionality does Kerberos provide?

    a. Compression

    b. Encryptionc. Authentication

    d. Encapsulation

    91. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission

    Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators

    company policy is to reserve the highest IP (Internet Protocol) address on each subnet for the routerinterface. What IP (Internet Protocol) address should the administrator assign to the router?

    a. 192.168.96.255b. 192.168.96.254

    c. 192.168.95.254d. 192.168.95.255

    92. Which one of the following is true concerning bridges and their forwarding decisions?a. Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use IP (Internet Protocol)

    addresses to make decisions.

    b. Bridges operate at OSI (Open Systems Interconnect) Layer 3 and use IP (Internet Protocol)addresses to make decisions.

    c. Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access

    Control) addresses to make decisions.d. Bridges operate at OSI (Open Systems Interconnect) Layer 3 and use MAC (Media Access

    Control) addresses to make decisions.

    93. There are three Windows 2000 servers, a NetWare server, and ten Windows 2000 clients. A networktechnician installs NWLINK on the Windows servers and clients, yet the clients cannot access the

    Novell server. What step must be taken so that the clients can access the Novell server?

    a. CSNW (Client Services for NetWare) on the Windows 2000 serversb. CSNW (Client Services for NetWare) on the Windows clients

    c. GSNW (Gateway Services for NetWare) on the NetWare server

    d. GSNW (Gateway Services for NetWare) on the Windows clients

    94. A client needs to attach to a server using the NetBIOS (Network Basic Input/ Output System) name.

    In addition to the IP (Internet Protocol) address, what is required to accomplish this?

    a. Gateway and subnet maskb. Subnet mask and HOSTS file

    c. Subnet mask and LMHOSTS file

    d. Gateway and HOSTS file

  • 7/28/2019 2008 Network+ Sample Questions

    16/43

    95. A server has three hard drives. The system uses hardware RAID (Redundant Array of IndependentDisks) with hot swappable drives. Drive 1 is for the OS (Operating System). Drives 2 and 3 are

    striped and contain user data files. Drive 2 fails. What must be done to restore the system to normal

    operation?a. Shut down, replace hard drives, and reboot

    b. Replace hard drives with system running; upon installations the RAID (Redundant Array of

    Independent Disks) will automatically rebuild

    c. Replace hard drives with system running .format data drive, and restore user data from latestbackup

    d. Shut down, replace hard drives, reboot, and format data drive

    96. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic

    standard?

    a. 1000BASE-TXb. 10 GBASE-LR

    c. 1000BASE-CX

    d. 10BASE-T

    97. An administrator has just received a call from an end user saying they are unable to log in to thenetwork, although they could yesterday. Overnight, the administrator replaced an ISA (Industry

    Standard Architecture) Token Ring card with a Token Ring PCI (Peripheral ComponentInterconnect) NIC (Network Interface Card) in the users computer on a 16 Mbps (Megabits per

    seconds) LAN (Local Area Network). What is the NEXT step?

    a. Verify the MAU (Multistation Access Unit) is goodb. Verify the processor speed

    c. Verify the user password is correct

    d. Verify the speed of the NIC (Network Interface Card) matches the network

    98. A home user switches from dial-up Internet access to PPPoE (Point-to-Point Protocol over Ethernet)

    DSL (Digital Subscriber Line) service. When attempting to send e-mail, an error message stating"Relay forbidden" appears. The e-mail is not sent even though the user can receive e-mail. What

    action must the user take to successfully send e-mail from their account?

    a. Change the outgoing SMTP (Simple Mail Transfer Protocol) server address to their DSL (Digital

    Subscriber Line) providerb. Make sure that the DSL (Digital Subscriber Line) providers e-mail server allows SMTP (Simple

    Mail Transfer Protocol)

    c. Change the default protocol on the users e-mail client to POP3 (Post Office Protocol version 3)d. Make sure their DSL (Digital Subscriber Line) providers modem is not blocking SMTP (Simple

    Mail Transfer Protocol) traffic

    99. A network gateway is required to share a printer for users and has been implemented by the systemsadministrator. An account was created called NTGATEWAY on the Windows server and the

    NetWare server and users have been assigned gateway privileges. How are accounts assigned to

    limit certain users from having more privileges than others to modify print jobs?a. There is only one account created on each server and all users have the same rights, so this

    request cannot be fulfilled.

    b. Each user must have individual accounts set up on the Novell server to allow specific printerrights.

    c. Each user must have individual accounts set up on the Windows server to allow specific printer

    rights.d. Separate print queues must be created for each Windows user to manage rights levels.

  • 7/28/2019 2008 Network+ Sample Questions

    17/43

    100. A Windows 2000 work station has a TCP / IP (Transmission Control Protocol / Internet Protocol)address of 169.254.12.1. Which statement describes the state of the computers TCP / IP

    (Transmission Control Protocol / Internet Protocol) configuration?

    a. The network administrator assigned an address of 169.254.12.1 for the network.b. The computer is set for DHCP (Dynamic Host Configuration Protocol), but no DHCP (Dynamic

    Host Configuration Protocol) server is available for the network.

    c. The computer received the address from a DHCP (Dynamic Host Configuration Protocol) server

    on the network.d. The computer received the address from a BootP (Boot Protocol) server on the network.

    101. Which one of the following choices is the MOST secure place to store tape backups?a. Next to the server

    b. In a locked room in the same building as the server

    c. In a locked room in an offsite locationd. In a desk drawer

    102. Which one of the following provides a fault-tolerant storage system containing five disks and asingle controller that will function if a single disk fails?

    a. A striped set array without parityb. A RAID 0 (Redundant Array of Independent Disks) array

    c. A striped set array with parityd. A duplexed RAID 1 (Redundant Array of Independent Disks)

    103. A user would like to implement a secure ordering system on a web server. Which of the followingprotocols is installed?

    a. S/MIME (Secure / Multipurpose Internet Mail Extensions)

    b. SSL (Secure Sockets Layer)c. IPSec (Internet Protocol Security)

    d. Kerberos

    104. 802.11 security is defined in:

    a. 802.11a

    b. 802.11b

    c. 802.11gd. 802.11i

    105. An administrator wants to set up an e-mail server to exchange e-mails with other servers over theInternet. Which protocol is used?

    a. SMTP (Simple Mall Transfer Protocol)

    b. IMAP4 (Internet Message Access Protocol version 4)

    c. POP3 (Post Office Protocol version 3)d. SNMP (Simple Network Management Protocol)

  • 7/28/2019 2008 Network+ Sample Questions

    18/43

    106. A router malfunctioned and was replaced with another. Each client computer on Subnet G andSubnet H is configured with a static IP (Internet Protocol) address, subnet mask, and a default

    gateway that allows access to the other subnet. It should not be necessary to reconfigure the clients.

    The configuration design is described below: Subnet G is attached to interface 0 of the router.Subnet H is attached to interface 1. Which IP (Internet Protocol) address should be assigned to

    interface 1?

    a. 172.17.100.2

    b. 172.16.100.255c. 172.17.100.25

    d. 172.16.100.1

    107. Upon which devices can NAT (Network Address Translation) be used?

    a. Hub

    b. Bridgec. Switch

    d. Firewall

    108. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic

    cable?a. 100 meters (328.08 feet)

    b. 250 meters (820.21 feet)c. 550 meters (1,804.46 feet)

    d. 3000 meters (9,842.52 feet)

    109. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated

    Services Digital Network) line?

    a. 6,000 feet (1,828.8 meters)b. 8,000 feet (2,438.4 meters)

    c. 12,000 feet (3,657.6 meters)

    d. 18,000 feet (5,486.4 meters)

    110. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses

    CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?

    a. 802.2b. 802.3

    c. 802.5

    d. 802.11

    111. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet

    Protocol Addressing)?

    a. 169.255.1.0b. 169.254.1.1

    c. 192.168.1.0

    d. 192.168.1.1

    112. If a new network has just been installed but is not functioning correctly, which command should be

    used FIRST to test basic connectivity?a. ipconfig

    b. arp

    c. Pingd. netstat

  • 7/28/2019 2008 Network+ Sample Questions

    19/43

    113. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers)802.5 network?

    a. Polling

    b. Token passingc. CSMA / CD (Carrier Sense Multiple Access / Collision Detection)

    d. CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)

    114. Which protocol uses domain name resolution to find addresses?a. TCP / IP (Transmission Control Protocol / Internet Protocol)

    b. IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange)

    c. NetBEUI (Network Basic Input / Output Extended User Interface)d. AppleTalk

    115. A remote office connected to a network has changed locations. The move required re-addressingall network devices in the office. The remote server is working on the remote segment properly.

    However, corporate users cannot connect to the remote server by host name, but can by IP (Internet

    Protocol) address. Which utility should be used at the corporate site to identify the cause of theproblem?

    a. arpb. netstat

    c. tracertd. nslookup

    116. WINS (Window Internet Name Service) provides a more centralized method of name resolutionthan using which of the following items?

    a. SMB (Server Message Block)

    b. HOSTS filesc. DHCP (Dynamic Host Configuration Protocol)

    d. LMHOSTS files

    117. A company wishes to outsource the installation of an internal web server with access to employees

    only. Which term BEST describes this web server?

    a. Extranet server

    b. VPN (Virtual Private Network) serverc. RADIUS (Remote Authentication Dial-In User Service) server

    d. Intranet server

    118. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain

    Name Service) for security reasons. Users have lost the ability to access remote network shares

    named ournetworkshares and ourprivateshares. How can this be resolved?

    a. Have the administrator recreate the shares to be named our.network.shares and our.private.sharesin order to differentiate the old links address

    b. Have the administrator recreate the shares to be named networkshares and privateshares in order

    to modify the share names to acceptable lengthsc. Flush the DNS (Domain Name Service) cache to remove old pathway links and allow for a new

    dynamic path table to be established

    d. These shares cannot be modified, ask the administrator to create new folders calledournetwork.shares and ourprivate.shares

  • 7/28/2019 2008 Network+ Sample Questions

    20/43

    119. Which steps are required to install RAS (Remote Access Service) on Windows NT (NewTechnology)?

    a. Start, settings, control panel, and network

    b. Start, properties, advanced, and networkc. System, services, network, and dial-in

    d. Control panel, network, dial-in, and remote services

    120. A network has grown to include seventy 24 port Ethernet switches and has decreased inperformance steadily as new switches are added. What adjustments can be made to the infrastructure

    to improve the performance?

    a. Purchase 48 port switchesb. Implement VLANs (Virtual Local Area Network)

    c. Turn on Spanning-Tree Protocol

    d. Purchase 16 port switches

    121. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per

    second)?a. 802.11a

    b. 802.11bc. 802.11c

    d. 802.11g

    122. Which of the following can be used to cache web pages for future retrieval?

    a. Switchb. Web server

    c. Repeater

    d. Proxy service

    123. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a:

    a. bridge.b. gateway.

    c. transceiver.

    d. firewall.

    124. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is

    based on 802.11g technology. There are times when the client slows or stops working entirely. What

    is the cause of the problem?a. A FM (Frequency Modulation) radio is in use.

    b. A 900 MHz (Megahertz) cordless telephone is in use.

    c. A 2.4 GHz (Gigahertz) cordless telephone is in use.

    d. A 5 GHz (Gigahertz) cordless telephone is in use.

    125. Which protocol is the fastest file transfer protocol?

    a. HTTP (Hypertext Transfer Protocol)b. FTP (File Transfer Protocol)

    c. SFTP (Secure File Transfer Protocol)

    d. TFTP (Trivial File Transfer Protocol)

  • 7/28/2019 2008 Network+ Sample Questions

    21/43

    126. Which layer of the OSI (Open Systems Interconnect) model handles formatting and codeconversion?

    a. Transport

    b. Data Linkc. Application

    d. Presentation

    127. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT:a. packet labeling.

    b. smaller header.

    c. improved authentication and security.d. larger subnet masks.

    128. If a destination address is not in a bridges forwarding table, what will the bridge do?a. Forward the packets to a designated port and the one that originated the request

    b. Forward the packets to all ports except the one that originated the request

    c. Forward the packets to the default gatewayd. Forward the packet to all ports

    129. Which one of the following topologies does FDDI (Fiber Distributed Data Interface) use?

    a. Star b. Bus

    c. Mesh

    d. Ring

    130. A new intranet web server has been installed for a company. The clients access the intranet server

    by its DNS (Domain Name Service) name. To automatically change the clients to connect to the newserver, an administrator modifies the DNS (Domain Name Service) name to reference the IP

    (Internet Protocol) of the new server. However, some clients are still connecting to the older server.

    What is causing the problem?a. Problematic workstations have cached the old IP (Internet Protocol) address of the server.

    b. Problematic workstations have cached the old DHCP (Dynamic Host Configuration Protocol)

    address of the server.

    c. Problematic workstations have cached the old IPX (Internetwork Packet Exchange) address ofthe server.

    d. Problematic workstations have cached the old WINS (Windows Internet Name Service) address

    of the server.

    131. When attaching to a Windows network resource, credentials are supplied through the use of a:

    a. cookie.

    b. cache.c. token.

    d. key file.

    132. Which of the following are classified as Layer 2 devices?

    a. Hubs, switches, and routers

    b. Hubs, switches, and bridgesc. Switches, bridges, and NICs (Network Interface Card)

    d. Switches, bridges, and routers

  • 7/28/2019 2008 Network+ Sample Questions

    22/43

    133. When installed on a Windows 2000 server, which one of the following allows a Windows-only

    client to access files on a NetWare 4.1 server?a. CSNW (Client Services for NetWare)

    b. GSNW (Gateway Services for NetWare)

    c. Novell NetWare clientd. DNS (Domain Name Service)

    134. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?

    a. routeb. emacs

    c. rlogin

    d. ifconfig

    135. Identify the Windows utility being used given the following output:

    Proto Local Address Foreign Address StateTCP JDoe:epmap JDoe.jdoe.com:0 Listening

    a. winipcfg

    b. nslookupc. nbtstat

    d. netstat

    136. How many connections have to be maintained on a companys mesh network with eight nodes?a. 8

    b. 16

    c. 28d. 32

    137. A technician is troubleshooting a problem on a network using a utility to capture the packets.When the technician reviews the captured data they have only captured broadcast packets and

    packets from their own computer. What is the reason for this?

    a. They do not have permission to capture other packets.b. They are connected to a switch when trying to capture packets.

    c. The router is blocking the packets to the workstation.

    d. They are using an evaluation copy of the software utility.

    138. A workstation on the network is unable to connect to the server. Which utility should be used

    FIRST when troubleshooting?

    a. arpb. tracert/traceroute

    c. ipconfig/ifconfig

    d. netstat

    139. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?

    a. 5 GHz (Gigahertz) interference

    b. High number of wireless usersc. 900 MHz (Megahertz) interference

    d. A long length of antenna extension cable

  • 7/28/2019 2008 Network+ Sample Questions

    23/43

    140. On a switched Ethernet network that is operating perfectly, what is the state in which a user willfind the activity LED (Light Emitting Diode)?

    a. Lit solid

    b. Offc. Rhythmically blinking

    d. Periodically blinking

    141. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to trackwhich IP (Internet Protocol) address is assigned to a particular computer?

    a. MAC (Media Access Control) address

    b. DNS (Domain Name Service)c. WINS (Windows Internet Name Service)

    d. FQDN (Fully Qualified Domain Name)

    142. The 802.11 frequency band is:

    a. 1.5 GHz (Gigahertz).

    b. 2.4 GHz (Gigahertz).c. 5.0 GHz (Gigahertz).

    d. 7.0 GHz (Gigahertz).

    143. An administrator has been called to consult on a network. After receiving network traffic statistics,the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host

    Configuration Protocol) traffic. What recommendation would the administrator give to the customer

    to reduce the traffic?a. Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration

    time

    b. Configure the DHCP (Dynamic Host Configuration Protocol) server to decrease lease expirationtime

    c. Configure the DHCP (Dynamic Host Configuration Protocol) client to increase lease expiration

    timed. Configure the DHCP (Dynamic Host Configuration Protocol) client to decrease lease expiration

    time

    144. Which one of the following protocols is used with the traceroute command?a. HTTP (Hypertext Transfer Protocol)

    b. SNMP (Simple Network Management Protocol)

    c. ICMP (Internet Control Message Protocol)d. XML (Extensible Markup Language)

    145. A company wants to have an intranet. Where would the intranet web server be located in the

    network?a. Outside the firewall

    b. In the DMZ (Demilitarized Zone)

    c. In the LAN (Local Area Network)d. In the DMZ (Demilitarized Zone) with port 80 open from the Internet

  • 7/28/2019 2008 Network+ Sample Questions

    24/43

    146. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic HostConfiguration Protocol) problems might exist on the network?

    a. There will be no Internet access.

    b. The computer IP (Internet Protocol) addresses will change.c. There should be no problems.

    d. There will be a routing loop between the residential gateway and the original router.

    147. Which one of the following options is a security standard for 802.11?a. WAP (Wireless Access Point)

    b. EAP (Extensible Authentication Protocol)

    c. WEP (Wired Equivalent Privacy)d. Kerberos

    148. What is a MAC (Media Access Control) address?a. It is an address assigned to enable routing over a WAN (Wide Area Network)

    b. It is an address assigned to a TCP (Transmission Control Protocol) port.

    c. It is an address assigned to a DNS (Domain Name Service) entry.d. It is an address assigned to a NIC (Network Interface Card).

    149. A Microsoft client is configured to use the NWLINK IPX / SPX (Internetwork Packet Exchange /

    Sequence Packet Exchange) protocol. The network has four Novell servers but the client can onlysee two of the servers. The client wants to change to frame type setting to see all of the servers. What

    setting should the client make to correct the problem and see all of the servers?

    a. Configure the frame type to auto frame type detectionb. Configure the frame type for 802.3

    c. Configure the frame type to 802.3 or 802.2

    d. Configure the frame type for NetBIOS (Network Basic Input / Output System)

    150. Given the following output, which utility was used?

    Default Server: bigserver.datacenter.com Address: 4.12.18.1a. Ping

    b. nbtstat

    c. nslookup

    d. ipconfig

    151. When a user authenticates using a Novell Directory Service login, the following:

    OU = Managers. OU = Middle. 0 = Joeis known as the users:

    a. preferred server.

    b. Novell Directory Service schema.

    c. context.d. FQDN (Fully Qualified Distinguished Name)

    152. An employee needs to access the Internal secure company web site from a hotel. The employeewill need which of the following connections?

    a. Sneakernet connection

    b. LAN (Local Area Network) connectionc. ICMP (Internet Control Message Protocol) connection

    d. Internet connection

  • 7/28/2019 2008 Network+ Sample Questions

    25/43

    153. An administrator is unsuccessful when attempting to ping a network device on a remote site with a

    firewall in between. In order for the administrator to be successful, what protocol needs to beallowed through the firewall?

    a. SNMP (Simple Network Management Protocol)

    b. UDP (User Datagram Protocol)c. ICMP (Internet Control Message Protocol)

    d. IGMP (Internet Group Multicast Protocol)

    154. Which of the following operating systems use NetBIOS (Network Basic Input / Output System) asthe default protocol?

    a. Microsoft Windows 2000

    b. Microsoft Windows NT (New Technology) 3.1c. Novell NetWare 5.0

    d. Novell NetWare 3.1

    155. A company wishes to establish a secure network connection with a sister company over the

    Internet. Both companies must have access to each others resources without allowing general public

    access. What describes the type of network that should be employed?a. Extranet

    b. Subnetc. WAN (Wide Area Network)

    d. Intranet

    156. The user has connected a laptop to a SOHO (Small Office / Home Office) router. The router

    connects to a cable modem. The laptop is unable to get an IP (Internet Protocol) address. The usernotices that the link status LED (Light Emitting Diode) is not illuminated on the router or laptop.

    What is the cause of the problem?

    a. DHCP (Dynamic Host Configuration Protocol) is not enabled on the router.b. There is a bad port on the cable modem.

    c. There is a bad cable or wrong cable type.

    d. A wrong IP (Internet Protocol) is configured on the router.

    157. As new workstations and servers have been added to a company network performance has

    decreased due to broadcast storms. Which network device will help prevent the broadcast storms?

    a. Switchb. Repeater

    c. Firewall

    d. Router

    158. A client accessing a network share folder has authenticated into the system and has full access

    rights to a folder share. But after opening the file they find they cannot modify the files contents.

    What is the likely cause?a. The group rights filter has been changed through the GPO (Group Policy Object) to disallow file

    access.

    b. The file requested has been pulled from cache memory and is not writeable.c. The file has been opened by another user and is open for read only.

    d. The file has been pulled from the backup source not the tree directory.

  • 7/28/2019 2008 Network+ Sample Questions

    26/43

    159. Which of the following methods transfers files with the use of a UDP (User Datagram Protocol)?a. HTTP (Hypertext Transfer Protocol)

    b. TFTP (Trivial File Transfer Protocol)

    c. SCP (Secure Copy Protocol)d. FTP (File Transfer Protocol)

    160. An administrator has added a new DNS (Domain Name Service) server for fault tolerance in a

    network. If the administrator wants the DHCP (Dynamic Host Configuration Protocol) clients to usethe new server, they should configure:

    a. a static IP (Internet Protocol) on the client and add the server IP (Internet Protocol) to the DNS

    (Domain Name Service) list.b. the DHCP (Dynamic Host Configuration Protocol) server to provide the setting to the clients.

    c. the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time.

    d. the DHCP (Dynamic Host Configuration Protocol) client to increase lease expiration time.

    161. Which one of the following servers provides web caching services?

    a. DNS (Domain Name Service)b. DHCP (Dynamic Host Configuration Protocol)

    c. Proxyd. File

    162. Which UNIX service provides interoperability with Windows file and print sharing?

    a. Mozilla

    b. NFS (Network File Service)c. SMB (Server Message Block)

    d. TCL (Terminal Control Language)

    163. A facility designed to receive computer equipment during a disaster recovery is known as a(n):

    a. hot site.

    b. cold site.c. warm site.

    d. off site.

    164. Ten workstations numbered 1 through 10 are installed sequentially on a physical star network. Thenetwork uses a logical bus topology and is cabled using Category 3 UTP (Unshielded Twisted Pair.

    The cable to Workstation 3 has been severed. Which of the following statements is true?

    a. All workstations including Workstation 3 can communicate to each other.b. All workstations except Workstation 3 can communicate to each other.

    c. No workstations can communicate with each other.

    d. Only Workstations 1 and 2 can communicate with each other, but all other workstations cease to

    communicate.

    165. In which OSI (Open Systems Interconnect) layer does a bridge operate?

    a. Networkb. Physical

    c. Data Link

    d. Transport

  • 7/28/2019 2008 Network+ Sample Questions

    27/43

    166. Which digital interface device is used to connect to a local service providers digital T1 (T-CarrierLevel 1) or E1 network?

    a. NIC (Network Interface Card)

    b. ISDN (Integrated Services Digital Network)c. CSU / DSU (Channel Service Unit / Data Service Unit)

    d. WAP (Wireless Access Point)

    167. A workstation presents an error message to a user. The message states that "Duplicate IP (InternetProtocol) has been detected on the network." After establishing what has changed in the network,

    a. what should be the NEXT step using the standard troubleshooting model?

    b. Test the resultc. Select the most probable cause

    d. Implement an action plan

    e. Document the solution and process

    168. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics

    Engineers) 802.11b access point?a. 802.11a access point

    b. Bluetooth enabled cell phonesc. 900 MHz (Megahertz) cordless phones

    d. Infrared television remote control

    169. A client workstation can authenticate user names and passwords to which type of server?

    a. DNS (Domain Name Service)b. DHCP (Dynamic Host Configuration Protocol)

    c. PDC (Primary Domain Controller)

    d. WINS (Windows Internet Name Service)

    170. What enables a UNIX computer to access exported file systems from other UNIX computers?

    a. SMS (Storage Management Services)b. NFS (Network File System)

    c. NetBIOS (Network Basic Input / Output System)

    d. NetBEUI (Network Basic Input / Output Extended User Interface)

    171. Which one of the following devices connects a network segment to a public telephone network?

    a. CSU / DSU (Channel Service Unit / Data Service Unit)

    b. Gatewayc. WAP (Wireless Access Point)

    d. Transceiver

    172. Which digital interface device is used to connect to a local service providers digital T1 (T-CarrierLevel 1) or E1 network?

    a. NIC (Network Interface Card)

    b. ISDN (Integrated Services Digital Network)c. CSU / DSU (Channel Service Unit / Data Service Unit)

    d. WAP (Wireless Access Point)

  • 7/28/2019 2008 Network+ Sample Questions

    28/43

    173. A network administrator adds a router to create a new subnet. Which of the following networkservices requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on

    the new network?

    a. DHCP (Dynamic Host Configuration Protocol)b. NNTP (Network News Transport Protocol)

    c. WINS (Windows Internet Name Service)

    d. NTP (Network Time Protocol)

    174. A client noticed that traffic has increased steadily over the last few months and performance is

    beginning to suffer on its TCP / IP (Transmission Control Protocol / Internet Protocol). Which

    network device can be installed to reduce the impact of network traffic without dividing the LAN(Local Area Network) into separate subnets?

    a. Bridge

    b. Repeaterc. Router

    d. Gateway

    175. A user complains that they are unable to connect to a remote server using either FTP (File Transfer

    Protocol) or Telnet, although the user was able to connect yesterday. Which of the followingcommands is used to troubleshoot the problem?

    a. arpb. Ping

    c. nslookup

    d. nbtstat

    176. FDDI (Fiber Distributed Data Interface) operates at what speed?

    a. 1 Mbps (Megabits per second)b. 10 Mbps (Megabits per second)

    c. 100 Mbps (Megabits per second)

    d. 1000 Mbps (Megabits per second)

    177. The Spanning-Tree Protocol allows for redundancy of what networking device?

    a. Transceiver

    b. Routerc. Bridge

    d. Gateway

    178. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a

    PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of

    192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP (Dynamic Host

    Configuration Protocol) errors are occurring. How can the errors be resolved?a. Change the default subnet to 255.255.0.0 to increase the number of allowable IP (Internet

    Protocol) addresses to prevent collisions.

    b. The machines are holding IP (Internet Protocol) addresses in cache memory. Reboot to renew theIP (Internet Protocol) address.

    c. Configure BootP (Boot Protocol) on the server when the IP (Internet Protocol) class subnets are

    split prior to implementing the scope.d. Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for

    the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC

    (Backup Domain Controller).

  • 7/28/2019 2008 Network+ Sample Questions

    29/43

    179. Which of the following is true regarding NDS (NetWare Directory Services) configuration?

    a. Remote users can access the tree through dial-in connections.b. Mobile users do not require changing the NDS (NetWare Directory Services) name context.

    c. Remote users do not require a special NDS (NetWare Directory Services) object entry.

    d. There are no differences between mobile users and remote users.

    180. Which device selectively forwards data packets?

    a. Bridge

    b. Hubc. Modem

    d. Transceiver

    181. A small company connected to the Internet through a SOHO (Small Office / Home Office) router

    wants to make an internal web server public on the Internet. Computers on the LAN (Local Area

    Network) can access the web pages but Internet users cannot. What should be done to solve theproblem?

    a. Make certain the web site has an external DNS (Domain Name Service) (Domain Name Service)

    name and a public IP (Internet Protocol) address, the web site is functioning, and that port 53 isopen on the router.

    b. Make certain the web site has a public IP (Internet Protocol) address, the web site is functioning,and that port 80 is open on the router.

    c. Make certain the web site has an external DNS (Domain Name Service) name and a public IP(Internet Protocol) address, and that port 80 is open on the router.

    d. Make certain the web site has an external DNS (Domain Name Service) name, the web site is

    functioning, and that port 53 is open on the router.

    182. To increase the number of available IP (Internet Protocol) addresses, IPv6 (Internet Protocol

    version 6) uses which one of the following options?a. 128 bit addresses

    b. 12 octet pairs

    c. 8 byte addressesd. 64 bit addresses

    183. A technician is assisting their senior technician with terminating a line that was extending the

    demarcation point for a new DSL (Digital Subscriber Line) circuit. Which tool would be needed?a. Multimeter

    b. Optical tester

    c. Punch down toold. BERT (Bit-Error Rate Test)

    184. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by:

    a. adding a secret key to the password.b. adding a secret key to the username password.

    c. double encrypting the username and password.

    d. passing a username and password in plaintext.

    185. Which physical topology is used by a 10BASE2 network?

    a. Busb. Ring

    c. Star

    d. Mesh

  • 7/28/2019 2008 Network+ Sample Questions

    30/43

    186. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has

    the shortest maximum distance?a. 10BASE-T

    b. 10GBASE-SR

    c. 1000BASE-Td. 1000BASE-CX

    187. Which of the following is used to translate NetBIOS (Network Basic Input/ Output System) names

    to IP (Internet Protocol) addresses?a. DNS (Domain Name Service)

    b. WINS (Windows Internet Name Service)

    c. NAT (Network Address Translation)d. SNMP (Simple Network Management Protocol)

    188. Which protocol could be used by a VPN (Virtual Private Network)?a. PPP (Point-to-Point)

    b. SLIP (Serial Line Internet Protocol)

    c. HDLC (High-Level Data Link Control)d. PPTP (Point-to-Point Tunneling Protocol)

    189. A Windows user wants to access a share hosted on a Mac OS X server, but the server is not visible

    on the network. What must the network administrator enable on the Mac OS X server to allowWindows users to connect to shares?

    a. AFP (Apple File Protocol)

    b. VPN (Virtual Private Network)c. Windows file and print sharing

    d. DHCP (Dynamic Host Configuration Protocol)

    190. Which one of the following should be selected for a Microsoft client using CSNW (Client Services

    for NetWare) to connect to a Novell NetWare 4.1 server?

    a. TCP / IP (Transmission Control Protocol / Internet Protocol)b. IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange)

    c. NetBEUI (Network Basic Input / Output Extended User Interface)

    d. GSNW (Gateway Services for NetWare)

    191. Which one of the following choices is the MOST secure place to store tape backups?

    a. Next to the server

    b. In a locked room in the same building as the serverc. In a locked room in an offsite location

    d. In a desk drawer

    192. Which of the following options allows for secure communication over the Internet?a. RAS (Remote Access Service)

    b. RDP (Remote Desktop Protocol)

    c. SLIP (Serial Line Internet Protocol)d. VPN (Virtual Private Network)

  • 7/28/2019 2008 Network+ Sample Questions

    31/43

    193. Which utility should a technician use to troubleshoot NetBIOS (Network Basic Input / OutputSystem) over TCP / IP (Transmission Control Protocol / Internet Protocol) from Workstation A to

    Workstation B on a Windows network?

    a. Pingb. tracert

    c. nbtstat

    d. netstat

    194. Several Win9x clients are connected on a LAN (Local Area Network), and they can all ping each

    other. One of the computers cannot browse any file or printer shares on the Windows based network.

    Which command would be useful in determining the problem?a. traceroute

    b. nbtstat

    c. netstatd. ifconfig

    195. How can a system administrator verify that a backup is valid?a. Run parallel backups

    b. Check the tape archivec. Restore the backup

    d. Verify the archive bit

    196. A network administrator manages a medium-sized network with a mixture of different platform

    computers. The network contains multiple subnets located across a large geographical area. Overhalf of the subnets contain a WAP (Wireless Access Point) for Internet access. The network

    administrator has noticed that a particular subnets users have complained of downtime. Upon further

    troubleshooting, the administrator notices that the each day the downtime lasts approximately anhour around midday. The administrator also realizes that this period of downtime is affecting

    wireless users only. The administrator travels to the troubled subnet around midday and connects

    using a wired workstation, but a wireless laptop will not connect. The administrator also notices thatthe WAP (Wireless Access Point) is 802.11g. Which one of the following would be an appropriate

    action to address this problem?

    a. Upgrade all affected computers to a uniform platform running in ad-hoc mode

    b. Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless AccessPoint)

    c. During the affected time, connect the WAP (Wireless Access Point) directly into the router

    d. Change the WAP (Wireless Access Point) and all affected computers to operate in ad-hoc mode

    197. Which type of connector does a 10BASE-F network use?

    a. MT-RJ (Mechanical Transfer-Registered Jack)

    b. RJ-45 (Registered Jack)c. Series-A

    d. ST (Straight Tip)

  • 7/28/2019 2008 Network+ Sample Questions

    32/43

    198. A companys network currently has three Microsoft Windows 2000 servers. A Novell NetWare 4.0server is added, but none of the Microsoft Windows 2000 servers can access the Novell server. We

    must be done so that the Microsoft Windows 2000 servers can access the Novell NetWare 4.0

    server?a. Install NetBEUI (Network Basic Input / Output Extended User Interface) on the Microsoft

    Windows 2000 servers

    b. Install NetBEUI (Network Basic Input / Output Extended User Interface) on the Novell NetWare

    4.0 serverc. Install NWLINK on the Microsoft 2000 servers

    d. Install NWLINK on the Novell NetWare 4.0 server

    199. A junior network administrator configures a token ring network in a physical star, logical ring

    topology. He connects the end nodes into a 100BASE-TX network hub. Users complain of not

    having network access. What device should replace the hub?a. Router

    b. MAU (Multistation Access Unit)

    c. 10BASE-T hubd. Bridge

    200. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?

    a. Hub and switchb. Hub and router

    c. Router and bridge

    d. Switch and bridge

    201. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial, Scientific, and

    Medical) hand EXCEPT:a. Bluetooth.

    b. 802.11a.

    c. 802.11b.d. 802.11g.

    202. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has

    a longer maximum distance than 100 meters (328 feet)?a. 10BASE-T

    b. 1000BASE-CX

    c. 1000BASE-Td. 10OBASE-FX

    203. A Microsoft client is configured to use the NWLINK IPX/ SPX (Internetwork Packet Exchange /

    Sequence Packet Exchange) protocol. The network has four Novell servers but the client can onlysee two of the servers. The client wants to change to frame type setting to see all of the servers. What

    setting should the client make to correct the problem and see all of the servers?

    a. Configure the frame type to auto frame type detectionb. Configure the frame type for 802.3

    c. Configure the frame type to 802.3 or 802.2

    d. Configure the frame type for NetBIOS (Network Basic Input / Output System)

  • 7/28/2019 2008 Network+ Sample Questions

    33/43

    204. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT:a. private IP (Internet Protocol) addresses may be duplicated across many networks without causing

    address conflicts.

    b. private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (InternetService Provider).

    c. private IP (Internet Protocol) addresses allow organizations to share a single public IP (Internet

    Protocol) address.

    d. large networks may be broken into several private IP (Internet Protocol) networks.

    205. All of the following Novell NetWare operating systems support NDS (NetWare Directory

    Services) natively EXCEPT:a. 3.1

    b. 4.1

    c. 5.0d. 6.0

    206. When mapping to a network printer for the FIRST time, the print driver initially attempts todownload from:

    a. the Internet.b. a file server.

    c. the local cab files.d. a print server.

    207. A technician is troubleshooting a problem on a network using a utility to capture the packets.When the technician reviews the captured data they have only captured broadcast packets and

    packets from their own computer. What is the reason for this?

    a. They do not have permission to capture other packets.b. They are connected to a switch when trying to capture packets.

    c. The router is blocking the packets to the workstation.

    d. They are using an evaluation copy of the software utility.

    208. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which

    of the following would achieve this goal?

    a. Data is backed up on tape and stored at an offsite location.b. An exact duplicate of the infrastructure is stored onsite.

    c. An exact duplicate of the infrastructure is mirrored offsite.

    d. Data is backed up on a second hard drive in a server.

    209. Modal distortion is a problem with which type of media?

    a. Fiber optic cable

    b. Coaxial cablec. UTP (Unshielded Twisted Pair)

    d. STP (Shielded Twisted Pair)

    210. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol)

    server has stopped sending or receiving messages from the Internet. What is the cause of the

    problem?a. The DHCP (Dynamic Host Configuration Protocol) server is down.

    b. The Internet router is blocking port 25.

    c. The Internet router is blocking port 110.d. The proxy server is filtering mail requests.

  • 7/28/2019 2008 Network+ Sample Questions

    34/43

    211. If a user needs to know the NetBIOS (Network Basic Input / Output System) name of the serverthat they are connected to, which of the following utilities will provide this information?

    a. nbtstat

    b. tracertc. nslookup

    d. netstat

    212. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol)scope from one week to one day. What affect will this have on the end users?

    a. The users will have to re-login every day now.

    b. The users will have to manually release and renew their IP (Internet Protocol) addresses tocontinue working on the network.

    c. The users will not be affected by the change.

    d. The users will have to shut their computers down for the duration of the lease to obtain a newlease.

    213. What is a MAC (Media Access Control) address?a. It is an address assigned to enable routing over a WAN (Wide Area Network).

    b. It is an address assigned to a TCP (Transmission Control Protocol) port.c. It is an address assigned to a DNS (Domain Name Service) entry.

    d. It is an address assigned to a NIC (Network Interface Card).

    214. On an Apple File Service share point configured in Mac OS X Server 10.3, the permissions for

    new files and folders can be set to default to:a. CIFS (Common Internet File System) permissions.

    b. NTFS (New Technology File System) permissions.

    c. MAC OS 9 permissions.d. Standard UNIX permissions.

    215. A network gateway is required to share a printer for users and has been implemented by thesystems administrator. An account was created called NTGATEWAY on the Windows server and

    the NetWare server and users have been assigned gateway privileges. How are accounts assigned to

    limit certain users from having more privileges than others to modify print jobs?

    a. There is only one account created on each server and all users have the same rights, so thisrequest cannot be fulfilled.

    b. Each user must have individual accounts set up on the Novell server to allow specific printer

    rights.c. Each user must have individual accounts set up on the Windows server to allow specific printer

    rights.

    d. Separate print queues must be created for each Windows user to manage rights levels.

    216. All of the following are valid WEP (Wired Equivalent Privacy) key lengths EXCEPT:

    a. 32 bit.

    b. 40 bit.c. 64 bit.

    d. 128 bit.

  • 7/28/2019 2008 Network+ Sample Questions

    35/43

    217. A node on the network appears to be dropping packets. Which utility will help verify the problem?a. ipconfig

    b. Ping

    c. netstatd. nbtstat

    218. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server, but

    cannot browse to www.comptia.org. What is the FIRST item to troubleshoot?a. The physical connection

    b. User account on server

    c. WINS (Windows Internet Name Service) server settingsd. DNS (Domain Name Service) server settings

    219. The DHCP (Dynamic Host Configuration Protocol) server in Subnet A is removed. The DHCP(Dynamic Host Configuration Protocol) server in Subnet B is set with a DHCP (Dynamic Host

    Configuration Protocol) scope for Subnet A. After that, users in Subnet A still cannot receive IP

    (Internet Protocol) addresses. What needs to be done to correct this problem?a. Install a proxy server on Subnet A

    b. Install a DHCP (Dynamic Host Configuration Protocol) relay agent on a server in Subnet Bc. Install a DHCP (Dynamic Host Configuration Protocol) relay agent on the DHCP (Dynamic

    Host Configuration Protocol) server in Subnet Bd. Install a DHCP (Dynamic Host Configuration Protocol) relay agent on a server in Subnet A

    220. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?a. 5 GHz (Gigahertz) interference

    b. High number of wireless users

    c. 900 MHz (Megahertz) interferenced. A long length of antenna extension cable

    221. Which type of connector would a cable have if it were supplied with a splitter and a cable modemfor Internet access?

    a. F-Type

    b. RJ-45 (Registered Jack)

    c. RJ-11 (Registered Jack)d. IEEE 1394 (Institute of Electrical and Electronics Engineers)

    222. Disk mirroring is also known as RAID (Redundant Array of Independent Disks):a. 0

    b. 1

    c. 2

    d. 5

    http://www.comptia.org/http://www.comptia.org/
  • 7/28/2019 2008 Network+ Sample Questions

    36/43

    223. A workstation on a TCP / IP (Transmission Control Protocol / Internet Protocol) network cannotlog on to a server located at another subnet. Which of the following tasks will help determine the

    cause of the problem?

    a. Ask a user on a remote segment to try to connect, replace the NIC (Network Interface Card) inthe workstation, and run nbtstat at the command prompt

    b. Ask a user on the same segment to try to connect, ask a user on a remote segment to try to

    connect, and ping the server

    c. Ask a user on the same segment to try to connect, ask a user on a remote segment to try toconnect, and run nbtstat at the command prompt

    d. Ping the server, replace the NIC (Network Interface Card) in the workstation, and run nbtstat at

    the command prompt

    224. A valid MAC (Media Access Control) address is how many bytes long?

    a. 2b. 4

    c. 6

    d. 8

    225. Which one of the following authentication protocols requires the use of an NTP (Network TimeProtocol) server to synchronize the workstations date and time with the server?

    a. Kerberosb. RADIUS (Remote Authentication Dial-In User Service)

    c. PAP (Password Authentication Protocol)

    d. MS-CHAP (Microsoft Challenge Handshake Authentication Protocol)

    226. An administrator is configuring a companys Microsoft Exchange server for e-mail services. The

    Exchange server needs to sent e-mail to a partner company that uses a Novell GroupWise e-mailserver. What protocol is needed to send e-mail between the two servers?

    a. CSNW (Client Services for NetWare)

    b. SMTP (Simple Mail Transfer Protocol)c. IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange)

    d. POP3 (Post Office Protocol version 3)

    227. A user complains that they are unable to connect to a new server, but they can connect to all otherservers on the network. The user can ping the static IP (Internet Protocol) address of the server but

    cannot connect by its NetBIOS (Network Basic Input/ Output System) name. Which of the following

    explains the situation?a. The server has an incorrect subnet mask.

    b. The server has an outdated LMHOST file.

    c. The client has an incorrect subnet mask.

    d. The client has an outdated LMHOST file.

    228. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber

    optic standard?a. 1000BASE-TX

    b. 10 GBASE-LR

    c. 1000BASE-CXd. 10BASE-T

  • 7/28/2019 2008 Network+ Sample Questions

    37/43

    229. An administrator is unsuccessful when attempting to ping a network device on a remote site with a

    firewall in between. In order for the administrator to be successful, what protocol needs to beallowed through the firewall?

    a. SNMP (Simple Network Management Protocol)

    b. UDP (User Datagram Protocol)c. ICMP (Internet Control Message Protocol)

    d. IGMP (Internet Group Multicast Protocol)

    230. A computer on the network is able to access file shares from other computers on the LAN (LocalArea Network) but not on the LANs (Local Area Network) server. The computer can access other

    services on the server. What is the problem?

    a. The computer did not log on to the servers domain.b. The computer has the wrong gateway.

    c. The computer does not have DNS (Domain Name Service) installed.

    d. The computer has the wrong subnet mask.

    231. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of

    Independent Disks)?a. 1

    b. 2c. 3

    d. 4

    232. What enables remote network servers to handle multiple incoming requests, such as FTP (File

    Transfer Protocol), HTTP (Hypertext Transfer Protocol), Telnet, DNS (Domain Name Service), etc.,from a single IP (Internet Protocol) address?

    a. Different services

    b. Routersc. Multihoming

    d. Different ports

    233. In order to assure fault tolerance in the event of a disk controller failure, which level of RAID

    (Redundant Array of Independent Disks) should be implemented?

    a. 0

    b. 1c. 3

    d. 5

  • 7/28/2019 2008 Network+ Sample Questions

    38/43

    234. When placing a new AV (Anti-Virus) program onto a Novell 5.0 server, the administrator mustplace the definition files into a globally accessible folder. Which folder in the default directory is

    designed for this purpose and is globally accessible by default?

    a. Sys:usersb. Sys:apps

    c. Sys:system

    d. Sys:shared

    235. A network administrator is in charge of a large corporate network containing a DNS (Domain

    Name Service) server, DHCP (Dynamic Host Configuration Protocol) server, and an internal web

    server. One particular subnet is experiencing trouble with Internet connectivity and is a wireless onlysubnet. The network administrator begins troubleshooting the wireless subnet and notices that there

    is a mixture of static and dynamic addresses, and a mixture of ad-hoc and infrastructure mode

    wireless settings. Some of the wireless clients can also access the corporate web server, while otherscannot. What must the administrator do to enable all wireless clients to access the Internet and all

    corporate servers?

    a. Enable infrastructure mode and statically set the default gateway to the routers interface on thewireless subnet on all clients

    b. Enable ad-hoc mode and obtain the IP (Internet Protocol) address automatically on all clientsc. Enable ad-hoc mode and statically set the default gateway to the routers interface on the wireless

    subnet on all clientsd. Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all

    clients

    236. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is

    running on a particular server. On what port number should a Telnet session be established?

    a. 20b. 21

    c. 23

    d. 25

    237. Which of the following environments is BEST suited to provide more radio coverage using an

    omnidirectional antenna?

    a. Closed office areas with wallsb. Open office areas with cubicles

    c. Hallways

    d. Outdoors

    238. A Mac OS X 10.3 Kerberos user experiences an authentication failure when trying to access a

    kerberized service provided by Mac OS X Server 10.3. Which of these steps might resolve the issue?

    a. Install Kerberos client software for Mac OS X 10.3 on the user's computer.b. Synchronize all Kerberos principals' clocks using a network time server.

    c. Ensure that the key distribution center is running on the user's computer.

    d. Change the IP address of the user's computer to allow the user to access the service.

  • 7/28/2019 2008 Network+ Sample Questions

    39/43

    239. After creating a print queue object in the NDS (NetWare Directory Services) tree, the systemsadministrator creates the printer object. Users are unable to connect to the printer. What is the likely

    cause?

    a. A profile object must be created for each user.b. Container objects must be associated with the printer object.

    c. The print queue must be associated with the printer object.

    d. The global bin script must be associated with the printer object.

    240. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology.

    Workstation 1 fails. How can the network administrator remove Workstation 1 for service without

    moving the other workstations?a. Connect Workstation 6 and Workstation 2 using a barrel connector

    b. Add a 75 ohm terminator to Workstation 6 and Workstation 2

    c. Connect Workstation 6 and 2 using an RJ-45 (Registered Jack) couplerd. Add a 50 ohm terminator to Workstation 6 and Workstation 2

    241. A star network that uses several cable types must use which hub type in order to accommodate allclient machines?

    a. Active hubb. Passive hub

    c. Multiport repeater hubd. Hybrid hub

    242. An ICS (Internet Connection Sharing) network has been setup as follows: Clients 1 and 2 cannotaccess the Internet. What is the problem?

    a. Windows 98 Second Edition does not support ICS (Internet Connection Sharing).

    b. A second NIC (Network Interface Card) needs to be Installed on the ICS (Internet ConnectionSharing) host.

    c. Windows 95B does not support ICS (Internet Connection Sharing).

    d. A second NIC (Network Interface Card) needs to be installed on Clients 1