Mattportfolio1995.weebly.com



NP-E1-35 On a bus segment, you have introduced a new workstation after which the entire segment collapses. What could be the possible cause/causes for the problem? Select 2 Your answer: C. Faulty cabling. Correct answer: A. Faulty NIC, B. Faulty termination The segment could collapse either due to faulty NIC that causes jabbering or due to faulty termination that leaves an open end. NP-E1-43 Which of the following is the least fault tolerant of all networking topologies? Your answer: D. mesh Correct answer: A. bus A bus network requires only a single cable per segment. If any device in the segment fails, then the whole segment crashes. NP-E1-42 Which of the following access security does Windows 2000 Server use on LANs? Your answer: C. IPsec Correct answer: D. Kerberos Windows 2000 uses the Kerberos protocol for access security. NP-E1-47 Which of the following is used to connect an external transceiver to a NIC? Your answer: E. RJ-45 Correct answer: C. AUI An AUI connector is used to connect a transceiver to a thick net cable that is often used as a trunk segment. NP-E1-53 If you were asked to subnet a network in such a way as to arrive at 6 network Ids you would need to borrow 2 bits. T/F? Your answer: A. True Correct answer: B. False borrowing 2 bits will give 4 Ids only. You need to borrow 3 bits here. NP-E1-32 A Windows client in your Netware network had a faulty NIC which got replaced. The workstation no longer connects to the network, even though the configuration of the NIC is completed successfully. What could the problem be? Your answer: C. OS configuration problem Correct answer: A. Frame type of the NIC is misconfigured For a client to communicate with the Netware server, the frame type on both of them should be same. NP-E1-61 A backbone is a trunk cable that________________. Your answer: B. Connects segments and helps communication between them. Correct answer: D. All of the above. A backbone is referred to in various ways in different network scenarios. It can act as a trunk cable that connects different nodes and devices or network segment or networks itself. NP-E1-25 Which of the interfaces on the router would be used by the switch, if the switch needs to connect to the router? Your answer: D. Ethernet Correct answer: C. Fast Ethernet In case you intend to connect a switch to the router you must connect it on the fast Ethernet port of the router. NP-E1-75 The ADS employs the flat domain structure. T/F? Your answer: A. True Correct answer: B. False The flat domain structure is employed by the NTDS. The ADS employs the hierarchical domain structure. NP-E1-30 Which of the following can be used to check for the transmission and reception ports on a NIC? Your answer: C. crossover cable Correct answer: D. hardware loopback A hardware loopback checks outgoing signals of a device. NP-E1-31 If you were to identify a NetBIOS name corresponding to an IP address, where would you look for it? Your answer: C. DNS cache Correct answer: D. NetBIOS name cache Not available NP-E1-79 Which of the following file systems is used by UNIX? Your answer: A. Netware File system Correct answer: B. Network file system UNIX uses Network File System (NFS) NP-E1-50 Which of the following is true regarding this representation of IP address?204.202.10.32/29 Your answer: D. None of the above Correct answer: C. 29 bits of the 32 bits are reserved for the network ID. The '/29' denotes the subnet mask bits, which means that 29 bits are reserved for network Id. NP-E1-70 In a Windows 2000 network, it is imperative that you must be physically connected to the printer into which you wish to fire a printout. T/F? Your answer: A. True Correct answer: B. False Windows 2000 supports Internet Printing Protocol (IPP) that allows users to print to a URL and hence you may select a printer based on its location and fire a print out. NP-E1-22 You have just connected a brand new dial-up modem that does not require drivers. You have configured the modem and shared it for your Peer-to-Peer network as per the instructions in the manual. Your system just refuses to recognize this PCI modem. What must you do next? Select 2 Your answer: C. Try restarting your computer. Correct answer: A. Change the slot., C. Try restarting your computer. The simplest solution would be to restart the computer once again. If that fails to help the situation, you may change the slot in which the PCI modem resides. NP-E1-64 Which of the following file systems is supported by Windows 2000 & above OS only? Your answer: D. FAT 32 Correct answer: B. NTFS 5 NTFS 5 is a newer version of NTFS 4 that is supported purely by Windows 2000 and above operating systems only. NP-E1-69 Kerberos is ideally meant for_____________. Your answer: B. Authenticating WAN users Correct answer: A. Authenticating LAN users Kerberos is a security type used to authenticating LAN users. For securing the WAN users' authentication you would require IPSec. NP-E1-4 Which of the following functions is a firewall capable of? Choose two Your answer: A. Block traffic, D. Authenticate internal users Correct answer: A. Block traffic, B. Permit traffic Depending upon the criteria of the configuration, the firewall will block or permit traffic matching the list in the configuration. NP-E1-2 Which of the following is an ideal location for storing a tape into which you have just finished backing up? Your answer: C. In the communication room Correct answer: D. in a locked safe at on offsite location The purpose of a tape backup is to use it in case of data loss. If it were to be stored in the same location as the live data, during fire or theft the tape backup is as susceptible as the live data itself. Hence it is best to store it off site. NP-E1-51 Provide the broadcast address for the following:IP Address: 221.240.224.121Subnet mask: 255.255.255.248. Your answer: B. 221.240.224.255 Correct answer: A. 221.240.224.127 256-248 = 8. All subnet Ids will be multiples of 8. Hence here the subnet Id is 120, considering which the next subnet Id is 128. Therefore broadcast address for subnet Id 120 is 127. Therefore 221.240.224.127 is the broadcast Id here. NP-E1-78 Which of the following allows fault tolerance for user authentication in a Windows 2000 network? Your answer: C. Mirror servers Correct answer: A. Multi master replication the ADS allows for multi-master replication across locations, to ensure there is atleast one server on the network that contains user information for the user waiting to be authenticated. NP-E1-20 You are connecting an Windows workstation to a NetWare 4.11 server. The workstation is unable to connect to the server, but it is able to connect to the Internet. Which two are possible problems? (Choose two.) Your answer: A. The server is not running NetBEUI Correct answer: A. The server is not running NetBEUI, C. The workstation is not running IPX/SPX A common protocol is a must for any communication. Either the server needs NetBEUI or the client needs IPX/SPX. NP-E1-3 Which of the following are services of a proxy server? (Choose three.) Your answer: D. Cached DNS information Correct answer: A. Cached e-mail, B. Cached client files, C. Cached web pages A proxy server can cache e-mail, client files, or web pages. Caching DNS information is the function of a DNS server itself. NP-E1-37 Metro is a small company that is using static IP addressing scheme in its network. After a merger with a larger company Cosmo, which uses dynamic IP addressing and DNS for name resolution, the servers of Metro were moved to the server farm of Cosmo and their addressing schemes and resolutions were changed accordingly. After this change in the network structure the servers that were moved to the server farm are no longer reachable. What should you do to correct the problem? Your answer: B. Correct the LMHOSTS file Correct answer: A. Delete the HOSTS file Since the servers before being moved were using static IP scheme, they must have been using hosts file for resolution. This hosts file must be pointing to the old IP addresses for the clients and preventing them from reaching out to the current IP. Deleting this hosts file will ensure resolution takes place from the DNS end. NP-E1-48 Which of the following connector is used in a 10BASE2 Bus topology? Your answer: E. RJ-45 Correct answer: C. BNC BNC connectors are used to connect computers to a 10Base2 cable. NP-E1-8 Which of the following protocols is supported by Windows 2000 Server for the purpose of dial-up? Choose two Your answer: C. TCP/IP Correct answer: A. PPP, B. SLIP Windows 2000 Servers supports PPP and SLIP. SLIP can be used only for outgoing traffic. NP-E1-34 Exhibit Identify the command that yields the output displayed in the exhibit Your answer: A. nbtstat Correct answer: C. netstat -a This command shows the state of all sockets. The -a option tells netstat to show you the status of all open sockets on a machine. NP-E1-21 You have just upgraded your Dial-up server on the network. This server was used to share internet connections to the entire network. Users are unable to connect to the Internet now. What could be the likely cause of the problem? Your answer: A. IP address of the Dial-up server might have changed. Correct answer: B. The DNS server could have failed to start right services. The upgrade process most likely had to be followed by patches or application which did not get done. As a result probably the right services may not have started on this server. NP-E1-63 Which of the following are some commonalities between Windows NT and Windows 2000? Your answer: C. They both require DNS for basic operation. Correct answer: A. They are both based on NT kernel. Although both Windows NT and Windows 2000 are based on NT kernel, It is only Windows 2000 that is meant for Internetworking and needs DNS for its basic operations. NP-E1-39 You have heard that HTTPS is the most secure way to access a web server. You have decided to upgrade your web server's HTTP service to HTTPS. Although your intranet users are still able to access this web server, it is no longer accessible to the rest. You know it is the upgrade that caused this situation. But what of the following could be the specific cause? Your answer: C. Your firewall is blocking HTTP service port . Correct answer: D. Your firewall is blocking HTTPS service port. The firewall would have been thus far configured to allow connections for the HTTP service. Now it needs to be configured similarly for HTTPS service. NP-E1-52 How many maximum subnet IDs are possible in this situation?Class C network 221.222.162.0 255.255.255.0, subnet by borrowing 5 bits, Your answer: C. 22 subnet IDs Correct answer: A. 30 subnet IDs 2^5 = 32. First subnet of all 0s not considered and last subnet of all 1s not considered.Hence 32-2 = 30 subnets are possible. NP-E1-74 Into which of the following does the ADS store its information? Select all that apply Your answer: B. AD log files, C. Shared system volume. Correct answer: A. AD database, B. AD log files, C. Shared system volume. The database is the actual directory, log files will store changes to the database that can be used for roll back situations as well, system volume will contain policies that are applied on the objects. NP-E1-10 You wish to segregate your sales department logically in terms of the products that they deal with. There are 3 such groups. The data intended for Product 1 must not reach Product 2 and 3 and so on. Which of the following would be an ideal solution for this situation? Your answer: C. Routing Correct answer: B. VLANs VLANs are capable of grouping ports under a specific ID and allowing communication between only users connected to those ports. NP-E1-33 You have introduced a fully configured workstation into your network. Your network is IP based and uses static IP addressing. Everytime the new workstation connects to the network, another existing computer generates an error message and stops connecting. What could the problem be? Your answer: C. Duplicate gateways have not been assigned Correct answer: D. Duplicate IP addresses have been assigned. Static IP addressing if not well planned and organized can lead to IP address duplication very often. NP-E1-55 Which of the following devices is required to complete a VLAN set up successfully? Your answer: A. Hub Correct answer: B. Router After VLAN segmentation has been done, to enable communication between the two divisions you require a router. NP-E1-14 You have just performed a backup on one of the most critical servers on your network. This server is accessed most frequently and hosts maximum amount of network data. Which of the following must you do now? Your answer: B. Keep it onsite for as long as it takes to verify the backup. Correct answer: D. Verify the backup on a test server immediately and then dispatch the tape to be stored in an offsite location. It is very essential to verify a full backup by restoring it immediately on a dedicated machine before comfortably storing it for future use. NP-E1-18 You just installed an application onto your Win2k workstation from the network and restarted it. It is no longer able to connect to the network, how will you roll back to the old setup before installing the software? Your answer: B. Use safe mode to boot up Correct answer: C. Use last known good configuration The last known good configuration on all NT based systems will allow to roll back to the previous good configuration before the problem occurred. NP-E1-36 Which of the following media access scheme does the token ring network use? Your answer: D. None of the above Correct answer: A. Token passing CSMA/CA and CSMA?CD are Ethernet media access schemes. Token ring uses token passing NP-E1-45 _________________ is used to propagate VLAN information across a trunked link. Your answer: D. None of the above Correct answer: B. Virtual Trunk Protocol` VTP is the protocol that helps to propagate VLAN information NP-E1-77 Which of the following makes the DNS environment a backbone of the Windows 2000 network? Your answer: A. DHCP Correct answer: B. DDNS DNS in the Windows 200 network is a dynamic service that interacts with the clients/ servers as well as DHCP to record the changes occurring in the IP based network to help immediate connection with the required resource. Hence the Dynamic DNS (DDNS) can easily be considered the back bone of the Windows 2000 network. NP-E1-49 Which IEEE standard describes the specifications for a ring topology? Your answer: B. 802.2 Correct answer: E. 802.5 802.5 is the Standard for Token ring networks. NP-E1-9 You are configuring a dial-up connection for your network to connect with a remote server. Which of the following protocols must you configure to secure your authentication in terms of encryption? (Choose two.) Your answer: B. TFTP (Trivial File Transfer Protocol) Correct answer: C. PPTP (Point-to-point Tunneling Protocol), D. TCP/IP (Transmission Control Protocol and Internet Protocol) Although PPTP provides tunneling and security functionality for authentication, you can configure PPTP only when you have configured TCP/IP. NP-E1-6 It is required that you block UDP ports on your firewall for security reasons. Which of the following services may be affected? Your answer: C. HTTP Correct answer: B. NTP NTP uses UDP port 123. The rest of them use TCP ports. NP-E1-40 Which of the following is used to map Network-layer protocol address to DLCIs? Your answer: C. ARP Correct answer: B. Inverse ARP Frame relay uses inverse arp to map network layer protocol addresses to their respective DLCI. NP-E1-41 Which of the following commands will help to create a static route from a router Router A to destination network 172.12.0.0? Your answer: A. ip static 172.12.7.0 255.255.0.0 0.0.0.0 Correct answer: B. ip route 172.12.0.0 255.255.0.0 172.12.8.1 The correct syntax to configure static ip route is: ip route destination_network subnetmask next hop router in the destination path NP-E1-7 You have just created an internal network that has address 172.16.0.0/16. Which of the following will be the subnet mask you assign for this network? Your answer: A. 255.0.0.0 Correct answer: D. 255.255.0.0 A 172.17.0.0/16 network uses a 16-bit network mask which is expressed as 255.255.0.0. NP-E1-1 Which of the following permissions would be appropriate for Unix/Linux file system? (Choose three) Your answer: C. Change (c) Correct answer: A. Read (r), B. Write (w), D. Execute (x) The UNIX/Linux file systems have read, write and execute file permissions. NP-E1-68 PPTP is a protocol that is ideally meant for _____. Your answer: B. LAN connections Correct answer: C. VPNs PPTP is a tunneling protocol that helps with the security and encapsulation required by VPNs. NP-E1-15 Which of the following is a non-routable protocol? Your answer: A. Apple talk Correct answer: D. NetBEUI NetBEUI is a proprietary Microsoft LAN protocol and cannot be routed. NP-E1-73 Linux is a __________ operating system. Your answer: B. 48 bit Correct answer: A. 32 bit Linux is a 32 bit, open source operating system. NP-E1-56 Which of the following statements about bridges is true? Your answer: A. Bridges are useful for network layer routing. Correct answer: B. Bridges are more efficient than repeaters. Bridges do not simply rebroadcast like repeaters NP-E1-23 You are configuring a small home network. The main system has workgroup name 'elle' and the client has workgroup name 'ELLE' will the connection work? Your answer: C. Maybe Correct answer: B. No NetBIOS name are case sensitive, this connection will not work. NP-E1-65 Which of the following file systems are not supported by Windows NT 4.0? Select 2 Your answer: A. NTFS 4 Correct answer: B. NTFS 5, D. FAT 32 Windows NT 4 supports only the legacy FAT 16 file system and the NTFS 4 with which it was introduced. NP-E1-5 Which of the following are used for increasing fault toleranace? Choose three Your answer: C. RAID disk storage Correct answer: A. Tape backup, B. Mirrored servers, C. RAID disk storage o Backup - Fault tolerance o Mirrored servers - Fault tolerance" RAID (for example RAID-5) disks - fault tolerance " An off-site data archive - disaster recovery, not for fault tolerance. NP-E1-58 Bridges operate at physical layer . T/F? Your answer: A. True Correct answer: B. False Bridges operate at data link layer (layer2). NP-E1-27 After building a small network and connecting it to your ISP you notice that the clients are unable to browse the Internet. You call your ISP and he asks for the information configured on your router. You present the required information to him. He says the information is as it should be. You browse the net from the computer directly connected to your DSL modem and you are able to do so. What could the problem be? Your answer: C. DNS server not set on the DHCP server Correct answer: D. Default gateway not set on the workstations The problem appears to be on the workstation end. NP-E1-67 Plug and play technology allows you to add devices to the computer without having to turn it off. T/F? Your answer: A. True Correct answer: B. False Hot pluggable technology allows you to add devices to the computer without having to turn it off. PnP just allows an ease of configuration. NP-E1-29 You are configuring a leased line for your network with the help of your service provider. You are now testing for the loop. The modem does not detect a dial tone but responds to the off-hook. What is a possible cause for this dial back-up failure? Your answer: B. Cable Correct answer: A. Router Since the loop is tested for and the modem also responds to the command to go off-hook, the problem is likely to be with the other router. NP-E1-12 Which of the following protocols does Network Attached Storage (NAS) use? (Choose two.) Your answer: B. ATM Correct answer: A. IPX, C. TCP/IP NAS supports IPX and TCP/IP. ATM and frame relay are technology and not protocols. NP-E1-76 Administrative authority is delegated to Administrators in Windows 2000 networks. T/F? Your answer: A. True Correct answer: B. False Administrative authority is delegated to container objects called Organization Units in Windows 2000 networks. NP-E1-28 You are a traveling user who connects to the remote site from your laptop whenever you visit that site. Today when you connect your laptop to the network, you are unable to login. You check your IP configuration and your IP address is 0.0.0.0. What is the likely cause for the problem? Your answer: D. The workstation has become unplugged from the network. Correct answer: B. The DHCP server is not reachable. The IP address 0.0.0.0 indicates an IP configuration problem. The DHCP server cannot be reached. NP-E1-60 Routing Information Protocol (RIP) by default has_____________ number of hops. Your answer: B. 16 Correct answer: A. 15 Routing Information Protocol (RIP) is by default configured for a maximum 15 hops, and the 16th hop will be considered as infinity. NP-E1-19 Your present network uses HOSTS file for IP to host name resolution. You are planning on adding a DNS server and moving a few servers to a remote site with different IP address. Which of the following will hold true? Your answer: B. Users will be able to connect if a WINS server is added to the affected network segments. Correct answer: C. Users will be able to connect if a DNS server is enabled and the HOSTS file is deleted. Using Internet searches, list the definitions for the computer and networking certifications below (plus 3 more you discover), what they cover, and which company offers the training:AcronymDefinition and What's CoveredWho Offers ItCNA?A common Novell Certification for IT professionals who need to provide organizations with direct support for software users in various networked environments including professional offices and small businesses, work groups or departments, and corporate information services (IS).?Introduction to NetWare 5 and NDSUsing a WorkstationSetting Up and Managing Network Access for UsersPrinting with Novell Distributed Print ServicesManaging the File SystemManaging File System SecurityCreating and Managing Login ScriptsManaging NDS SecurityDistributing and Managing Network Applications with Z.E.N.worksManaging Worstation in an NDS Environment with Z.E.N.worksManaging Resources in a Multicontext EnvironmentInstalling NetWare 5CNEA certification similar to the CNA but requiring the passing of more tests. It is aimed at people interested in installing and planning the rollout of Novell NetWare- based networks, with day-to-day operations just a part of the certification.Introduction to NetWare 5 and NDSUsing a WorkstationSetting Up and Managing Network Access for UsersPrinting with Novell Distributed Print ServicesManaging the File SystemManaging File System SecurityCreating and Managing Login ScriptsManaging NDS SecurityDistributing and Managing Network Applications with Z.E.N.worksManaging Worstation in an NDS Environment with Z.E.N.worksManaging Resources in a Multicontext EnvironmentInstalling NetWare 5CCNACCNA?is a popular certification in computer networking developed by Cisco Systems. Cisco created the CCNA to recognize basic competency in installation and support of medium-sized networks.LAN?and?WAN?design (including the?OSI model)IP?addressingRouters?and routing?protocols?(including OSPF, EIGRP and RIP)VLAN (virtual LAN) and?WLAN?(wireless LAN)network security and management (including ACLs)CCIECCIE (Cisco Certified Internetwork Expert)?is the most advanced level of networking certification available from?Cisco Systems. The CCIE certification is highly prestigious and renowned for its difficulty.Routing and SwitchingSecurityService ProviderStorage NetworkingVoiceWirelessMCSECertification given by Microsoft that indicates the recipient has gone through a specific training course and is knowledgeable in Microsoft systems, including the design of infrastructures, installing,?configuring?and?administering?Microsoft systems and migrating those systems to later services.Managing and Maintaining a Microsoft Windows Server 2003 EnvironmentInstalling, Configuring and Administering Microsoft Windows XP ProfessionalDesigning Security for a Microsoft Windows Server 2003 Network.A+ A certification developed by the Computing Technology Industry Association (CompTIA) to validate vendor-neutral skills for entry-level computer technicians.Identify physical partsMotherboardFirmwarePower supplyStorage devicesMemory (physical vs. cache)Portable storage devicesNetwork cards and network cablesPrintersIdentify IRQ, I/O and DMA settingsLegacy devicesIdentify port typesSerialParallelInfraredWirelessSCSIRAID (0,1,5)Server+A certification that focuses on?server-specific hardware and?operating systems, and certifies technical knowledge in areas such as?RAID,?SCSI, and multiple?CPUs, as well as capabilities with server issues, including disaster recovery.General Server HardwareInstallation,?Configuration,?Upgrading,?Proactive Maintenance,?Environment Troubleshooting Problem DeterminationSecurity+A certification dealing with?computer security?topics such as?cryptography?and?access control, as well as business-related topics such as?disaster recovery?and?risk work security,Compliance and operational security,threats and vulnerabilities application data host security access control identity management cryptographyInet+ A certification deals with basic knowledge of Internet,?intranet,?extranet, and?electronic commerce?technologies.distinguishing between server-side and client-side scripting, basic networking via command line, e-commerce e-business security via?digital signatures copyright?licenses (including the?GPL) basic?HTML?codingNetwork +.A certification that is used to measure skill as a network technician: understanding of network hardware, installation, and?troubleshooting.?network hardware, connections, software, the OSI Reference model different protocols used in?local area networks?(LANs) ?Wide area networks?(WANs).PDI +An entry-level, vendor-neutral certification proving competence in basic maintenance of printers, scanners, copiers and fax machines. The certification is recognized by several industry leaders, including Canon, Sharp and Xerox, as a benchmark certification for professionals that service and support document imaging devices.Basic electromechanical components and tools, print enginescan processes and components color theory Connectivity and networking.CTP+A international, vendor-neutral exam that validates the core knowledge and skills IT professionals need to sell and service convergent technologies. CompTIA offers this exam in conjunction with Certification Partners, LLC, who created the original CTP exam.?Basic requirements analysisImplementation and management of basic data components voice and multimedia applications Basic problem analysis and resolution for convergent technologies.Project +A certification showing that one has the knowledge needed to?manage projects. CompTIA claims that Project+ is a globally recognized project management certification that provides validation of fundamental project management skills.project life cycle from initiation planning through executionacceptancesupport closure ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download