Networking – Flashcards

Unlock all answers in this set

Unlock answers
question
What is the Ethernet frame type that is used by TCP/IP?
answer
Ethernet II
question
When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?
answer
switch
question
TCP establishes a connection with the destination device using which process?
answer
three-way handshake
question
What type of wireless technology is used for 802.11b /g /n networks?
answer
spread-spectrum radio
question
What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand?
answer
6
question
When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?
answer
attenuation
question
The last 64 bits of an IPv6 address are the interface identifier. Where is that number derived from?
answer
the MAC address
question
Which layer has been subdivided into the Logical Link Control sublayer and the Media Access Control sublayer?
answer
Data Link
question
You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?
answer
PCI-Express
question
What is the main disadvantage of cable modem networking?
answer
It uses a bus topology.
question
Each interface on a router must have an IP address and what else to be able to communicate on the network?
answer
MAC address
question
What is the hexadecimal number F equal to in binary?
answer
1111
question
What is the best way to eliminate the possibility of collisions in a network?
answer
Both a and c
question
When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?
answer
100 meters
question
What is the decimal equivalent to the hexadecimal number D?
answer
4-byte frame check sequence
question
What is the media access method used by Ethernet?
answer
CSMA/CD
question
Which of the following is NOT an advantage of a physical star?
answer
provides redundancy and fault tolerance
question
What type of logical topology does a Wireless LAN use?
answer
logical bus
question
What is the decimal equivalent to the hexadecimal number D?
answer
13
question
How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the host ID is 64 bits?
answer
16
question
When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?
answer
router on a stick
question
A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?
answer
It's the organizationally unique identifier for the manufacturer of the device.
question
You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
answer
peer-to-peer network
question
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
answer
net view
question
Which layer is responsible for determining the best path a packet should travel across an internetwork?
answer
Network
question
What is the main advantage of a point-to-point topology?
answer
data travels on a dedicated link
question
In wireless networks, what type of media access control is used?
answer
CSMA/CA
question
Which of the following is not a form of electromagnetic interference, or EMI?
answer
rain/fog
question
What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?
answer
structured cabling
question
Which is the strongest form of wireless security?
answer
WPA2
question
Why would you need to use a repeater?
answer
You need to add a group of computers to your network, and the distance is too far for normal means of communication.
question
Airwaves are an example of what type of network component?
answer
network medium
question
What is the maximum cable length for both category 5e and category 6 UTP cable?
answer
100 m
question
When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode?
answer
ad hoc
question
In what layer does the NIC operate?
answer
Network Access
question
At which layer would you find errors that were caused by EMI?
answer
Physical
question
The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?
answer
demarcation point
question
Which layer is responsible for the encoding of signals?
answer
1
question
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?
answer
ARP
question
One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called?
answer
access control
question
You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem?
answer
Network layer device
question
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
answer
wardriver
question
The Transport layer segments data into smaller chunks, the size of which is determined by which of the following?
answer
MTU
question
Which of the following connections might require a crossover cable?
answer
switch to switch
question
When discussing Ethernet standards, what does the XBaseY terminology refer to?
answer
the transmission speed, the type of transmissions, and the length or type of cabling
question
What type of wiring should be used for a high-speed connection between two buildings?
answer
fiber-optic cabling
question
How does a switch "learn" MAC addresses?
answer
The switch reads each frame and makes a note of where each MAC address came from.
question
What does a switch store in its switching table?
answer
the source MAC address of a frame and the port it was received on
question
A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?
answer
hub
question
Which of the following is not an Application layer protocol?
answer
TCP
question
What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device?
answer
sequence number
question
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?
answer
encapsulation
question
What is a PDU?
answer
It is the name given to the unit of information used by each layer.
question
What is the purpose of the default route?
answer
It's where the router sends all packets with destinations of which it has no knowledge.
question
Which of the following is the fastest switching mode?
answer
cut-through
question
What component of the computer provides it with a MAC address?
answer
NIC
question
You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address?
answer
PAT
question
In a token ring network, what is the central device called?
answer
multistation access unit
question
What information would you find in the header of a Transport layer PDU?
answer
window size
question
In an MDI device, on which two pins does the device use to transmit?
answer
1 and 2
question
Which layer of the OSI model is responsible for encryption and decryption?
answer
Presentation
question
What does the frame trailer consist of in an Ethernet frame?
answer
cyclic redundancy check
question
Which part of the network communication process is responsible for sending and receiving data to and from the network media?
answer
NIC driver
question
Which layer is responsible for establishing a connection between the source and destination?
answer
Session
question
What does it usually mean when the activity light on a switch is blinking?
answer
It is communicating with the network.
question
Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?
answer
physical ring
question
What is the IEEE standard governing wireless networking?
answer
802.11
question
A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once. 1—backbone cabling 2—entrance facility 3—equipment room 4—horizontal wiring 5—telecommunications closet 6—work area
answer
2, 1, 3, 1, 5, 4, 6
question
An IP address consists of four octets separated by periods. Which part of this address denotes its class?
answer
first octet
question
Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP?
answer
RTS
question
Why is the use of a switch preferred over a hub?
answer
All of the above.
question
The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?
answer
convergence
question
Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID?
answer
subnet mask
question
What type of routing protocol are RIP and RIPv2?
answer
distance-vector protocol
question
Which of the following is not a true statement regarding the function of a switch?
answer
It determines the path used based on the destination IP address.
question
In Windows, you can start the Task Manager by simply right-clicking the taskbar and choosing Start Task Manager.
answer
True
question
What directory service protocol used in Linux systems is also supported by Windows?
answer
LDAP
question
What is a partial copy of a VM that is used to restore it to a previous state? Answer
answer
snapshot
question
Virtualization is designed for testing and development purposes only.
answer
False
question
Which of the following virtualization products provides hosted virtualization?
answer
VMware Workstation
question
Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU's time until the process had completed its own task?
answer
cooperative
question
What storage solution involves a third-party company that provides off-site hosting of data?
answer
cloud-based storage
question
One critical difference between a client OS and a server OS is the addition of directory services on some server OSs.
answer
True
question
Which of the following is not a function typically provided by the centralized management of a server-based network?
answer
protocol analysis
question
You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation?
answer
host-only
question
Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?
answer
Datacenter Edition
question
What are the chunks called into which the available storage space on a disk drive is broken?
answer
sectors
question
When a disk is formatted, it is impossible to recover the data that was on the disk.. Answer
answer
False
question
smallest unit of software that can be scheduled
answer
thread
question
a program that is loaded into memory
answer
process
question
hypervisor installed in a general-purpose OS
answer
hosted virtualization
question
the process of granting or denying access to a user
answer
authorization
question
two or more threads being executed simultaneously
answer
multiprocessing
question
partial copy of a virtual machine
answer
snapshot
question
identifying who has access to network
answer
authentication
question
creates and monitors the guest operating systems
answer
hypervisor
question
runs in the background
answer
service
question
hypervisor installed directly onto the server
answer
bare-metal virtualization
question
What method does the CPU use to divide its computing cycles between more than one process?
answer
time slicing
question
What is the native file-sharing protocol in Linux?
answer
NFS
question
In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems?
answer
system monitor
question
Windows Server 2008 R2 can be installed only on a 64-bit system
answer
True
question
If you need to limit the amount of data users can store on a volume, you would implement which of the following?
answer
disk quotas
question
Windows can be installed on an extended partition that has been formatted with the NTFS file system.
answer
False
question
When a file is encrypted, what color does the file name appear in Windows Explorer?
answer
green
question
What tool would you use to view error messages that are generated by system services or applications?
answer
Event Viewer
question
What is RAID level 1 also called?
answer
disk mirroring
question
You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned?
answer
User must change password at next logon.
question
In Linux, what is the command for viewing a file's contents onscreen?
answer
cat
question
can be used to create a RAID
answer
dynamic disk
question
if the primary server fails, the secondary server takes over
answer
failover cluster
question
can be divided in up to four primary partitions
answer
basic disk
question
defines a user's environment
answer
local profile
question
multiple servers acting as a single server
answer
load-balancing cluster
question
power device that provides fault tolerance through battery backup
answer
power device that provides fault tolerance through battery backup
question
partition that contains the boot loader
answer
system partition
question
action that a user can perform on a computer
answer
right
question
can be made the active partition
answer
primary partition
question
can only be divided into logical drives
answer
extended partition
question
A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.
answer
False
question
In regards to a user account, what does a white circle with a black arrow indicate?
answer
The account is disabled.
question
You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?
answer
global
question
Which of the following is NOT a Linux file system?
answer
SFS
question
A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
answer
mandatory
question
The partition that contains the Windows OS files is known as the what type of partition?
answer
boot
question
How many disks are needed to implement a RAID 1 + 0?
answer
4
question
A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?
answer
dynamic
question
An event log entry that is an error is marked with a red circle with a white exclamation point in the center.
answer
True
question
In Linux, every user that is created automatically belongs to a default group named Users.
answer
False
question
Group accounts make it easier for an administrator to manage user rights and permissions.
answer
True
question
Where are the waiting print jobs stored until they can be sent to the print device?
answer
print queue
question
Which of the following should not be a concern when discerning the level of security that is required in a network?
answer
how difficult it would be to enforce a password policy
question
What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?
answer
NAT
question
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
answer
rootkit
question
If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
answer
network policy and access services
question
What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?
answer
malware
question
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
answer
spyware
question
You don't need to physically secure your servers as long as you use a good strong password for your accounts.
answer
False
question
What is a policy that defines the methods involved when a user logs on to the network called?
answer
authentication
question
Which protocol is used to encrypt data as it travels a network?
answer
IPSec
question
When using to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
answer
USB key mode
question
Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
answer
Port
question
A security policy should clearly state the desired rules, even if they cannot be enforced
answer
False
question
A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.
answer
True
question
A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
answer
False
question
In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.
answer
True
question
The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
answer
WPA2
question
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
answer
preshared key
question
Which VPN implementation needs no additional configuration to be allowed access through a firewall?
answer
SSTP
question
When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
answer
USB key mode
question
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
answer
smurf attack
question
If the minimum password length on a Windows system is set to zero, what does that mean?
answer
The user can use a blank password.
question
Which one of the following passwords meets Windows password complexity requirement?
answer
N3tworking1O1
question
In Windows 7, what is the maximum length that a password can be?
answer
128
question
the Linux native file sharing protocol
answer
NFS
question
agreement regarding the use of an application
answer
EULA
question
how much something costs when intangibles are factored in
answer
TCO
question
VPN connection between two routers
answer
gateway-to-gateway
question
the process by which a router forwards a request for a TCP or UDP port to a specified computer.
answer
port forwarding
question
a file sharing option in Windows 7
answer
HomeGroup
question
the Linux file sharing protocol that is compatible with Windows
answer
Samba
question
software designed to help business owners
answer
CRM
question
connection between a desktop and a VPN device
answer
client-to-gateway
question
a device designed specifically for file sharing
answer
NAS
question
Which of the following is a new file-sharing option that can be used on the network if all the computers have Windows 7 installed?
answer
HomeGroup
question
What is CRM software?
answer
software that is used to keep track of customer information, including contact information and appointments
question
Which of the following is not a feature that you should consider when choosing a new switch for a small business?
answer
VPN support
question
If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain the OS and applications?
answer
1
question
Which of the following should you consider when choosing a wireless network instead of a wired network?
answer
the ability of unauthorized users to receive a signal
question
Which of the following is not a requirement for most small business networks?
answer
complex WAN environment
question
You have been contracted to set up a network for a small business. The company currently has 100 users, and they are looking to expand. They want to use Microsoft Exchange Server for their e-mail and shared calendar feature What version of Windows Server would you suggest that they purchase?
answer
Windows Essential Business Server
question
If your company has a Web site that customers need to access, you will need to allow unsolicited communications from outside the network. In this situation, you need to install a router that supports what type of forwarding?
answer
port
question
If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain data?
answer
5
question
When purchasing new equipment for a small business it is a good idea to invest in expandability features that will meet the company's needs for the next 10 to 15 years.
answer
False
question
After you have set up a network for a small business, you may need to access the network remotely to provide support for the users. Which remote access option should not be used unless a secure connection can be established first?
answer
Telnet
question
Which of the following is a VPN mode that is usually implemented to give mobile users access to the network?
answer
client-to-gateway
question
In most cases, you can install a small business network and move on to the next job, leaving the company's IT staff to support the network.
answer
False
question
In a small business network, the router usually takes on the responsibilities of many roles, which include a firewall as well as a DHCP server.
answer
True
question
For a computer to connect to a HomeGroup, it must have certain features enabled or configured correctly. Which of the following is not necessary to join a HomeGroup?
answer
DHCP
question
Which of the following is not included in any edition of Windows Small Business Server?
answer
support for up to 500 users
question
Most small businesses require a high level of security including encryption technologies and complex network connections.
answer
False
question
If your network consists mostly of computers with Linux operating systems, which file-sharing system can you use that is native to Linux?
answer
NFS
question
Which of the following installations of Windows can be used to create a HomeGroup?
answer
Windows 7 Home Premium
question
The creator of a HomeGroup has the ability to change the randomly generated password to a more user-friendly password.
answer
True
question
Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean?
answer
1.54 Mbps is the guaranteed minimum transmission rate.
question
Which one of the following is NOT a typical SONET data rate?
answer
OC-9001
question
Which of the following is something X.25 does NOT offer?
answer
144 Mbps maximum throughput
question
T-Carrier lines only require a CSU/DSU on the customer's side of the connection.
answer
False
question
an ISDN version that provides two 64 Kbps B-Channels
answer
Basic Rate Interface (BRI)
question
a remote access protocol that supports many protocols and is used to carry data over a variety of network connections
answer
point-to-point protocol
question
a logical sequence of connections with bandwidth allocated for a specific transmission pathway
answer
virtual circuit
question
an ISDN version that provides 23 64-Kbps B-channels
answer
Primary Rate Interface (PRI)
question
the device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem
answer
Data Circuit-terminating Equipment (DCE)
question
a device computers use to convert digital signals to analog signals
answer
modem
question
a point-to-point permanent virtual circuit (PVC) technology that offers WAN communications over a fast, reliable, digital packet-switching network
answer
frame relay
question
a guaranteed minimum transmission rate offered by the service provider
answer
Committed Information Rate (CIR)
question
the device that passes data from the customer LAN to the DCE, usually a router.
answer
Data Terminal Equipment (DTE)
question
a high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links.
answer
Synchronous Optical Network (SONET)
question
Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an important distinction between the two technologies?
answer
T1 uses point to point, while frame relay makes use of virtual circuits.
question
Which statement about Multiprotocol Label Switching (MPLS) is true?
answer
MPLS works with any network layer protocol.
question
Packet switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level.
answer
True
question
Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?
answer
hosted platforms
question
What is the signaling method used to allocate time slots for each channel in a T-carrier line called?
answer
Time Division Multiplexing (TDM)
question
You're the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?
answer
reduced physical plant costs
question
Part of SONET's flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?
answer
fault tolerant bus
question
The plain old telephone service is a good example of what kind of WAN technology?
answer
circuit switched
question
You have been asked to install a VPN remote access solution using Windows Server.What do you need to install?
answer
Routing and Remote Access Service (RRAS)
question
What would an Asynchronous Transfer Mode (ATM) network be best suited for?
answer
carrying voice data and time-sensitive information
question
Select the true statement regarding analog and digital signals.
answer
Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.
question
Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.
answer
True
question
You are a network architect for an IT consulting company. One of your clients needs a WAN connection and has asked you about the disadvantage of a packet-switched WAN method. Which of the following is a disadvantage that applies?
answer
shared bandwidth
question
Which of the following protocols is NOT used for Windows 7 VPN connections?
answer
SMTP
question
The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?
answer
Basic Rate Interface (BRI)
question
When would you most likely NOT choose to use a leased line connection?
answer
when a nondedicated link is needed for backups
question
What is the local loop, or last mile?
answer
the connection between the demarcation point and the CO
question
Which cloud computing category allows a company to quickly provision additional disk space?
answer
hosted infrastructure
question
Which cloud computing category refers to the use of software hosted on a service provider's network, and is usually subscription based?
answer
hosted applications
question
Which of the following protocols is NOT used for Windows 7 VPN connections?
answer
SMTP
question
Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?
answer
ipconfig /all
question
You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swarm of help desk support requests, all originating from one specific floor in your building. After a few minutes on the phone with those affected, you determine that no one has indicator lights active on their NICs. What is most likely the problem?
answer
A network switch has not been powered on.
question
Following a massive infection of your network by a virus, you have been tasked with developing preventive measures for keeping the network infection free. What would be an effective preventive measure?
answer
Install an enterprise-based anti-virus solution.
question
an industry-standard protocol used for network management and monitoring
answer
Simple Network Management Protocol (SNMP)
question
specialized software that gathers network data and provides statistics to a network management console
answer
remote monitoring (RMON)
question
copies all files changed since the last full or incremental backup and marks files as backed up
answer
incremental backup
question
copies all files changed the day the backup is made; doesn't mark files as backed up
answer
daily backup
question
part of the SNMP structure loaded on to each device to be monitored
answer
software agents
question
a set of objects containing information about a networking device that SNMP uses to manage that device
answer
management information base (MIB)
question
software that monitors network traffic and gathers information about packet types, errors, and packet traffic to and from each computer
answer
network monitors
question
a network troubleshooting device that can determine whether there's a break or short in the cable, and, if so, approximately how far down the cable it's located
answer
time-domain reflectometer (TDR)
question
a backup that copies all selected files to the selected media and marks files as backed up; also called a normal backup
answer
full backup
question
part of an upgrade plan that provides instructions on how to undo the upgrade if problems occur during or after the upgrade
answer
rollback plan
question
The trial-and-error method should NOT be used under which of the following situations?
answer
The server is your public Web server and is currently hosting all of your business.
question
If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.
answer
False
question
Which of the following is NOT a good practice for performing upgrades?
answer
ignoring updates to new releases
question
What does the ping message "Destination net unreachable" mean?
answer
A router in the path from the source to the destination determined that the destination network does not exist.
question
Traceroute would be best suited for which of the following tasks?
answer
locating bottlenecks in a network
question
Your current backup schedule involves differential backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
answer
The last full backup should be restored first, followed by the last successful differential backup prior to the drive failure.
question
Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down at a machine and try to ping a well-known website, which fails. You then try to ping a known-public IP address, which succeeds. What is most likely the issue?
answer
DNS settings are incorrect
question
Most SNMP managers allow the configuration of thresholds for generating alert messages to network administrators when those thresholds are exceeded.
answer
True
question
What does the ping message "Destination host unreachable" message mean?
answer
The pinged IP address is on the same network, but an ARP reply was not received.
question
A junior network administrator tells you that he can ping a DNS server successfully, but he has not tested domain name lookups. What utility on the command line would you suggest your colleague use next?
answer
nslookup
question
You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?
answer
incorrectly configured gateway address
question
The ping command is used to determine the path between two devices.
answer
False
question
A protocol analyzer, such as Wireshark, gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa..
answer
True
question
In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
answer
False
question
Your current backup schedule involves incremental backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
answer
The full backup must be restored first, followed by all incremental backups in sequential order leading up to the day of failure.
question
You are currently troubleshooting a network issue with your ISP's customer support agent. The agent requests that you open up command prompt and type "ping 127.0.0.1". What does this accomplish?
answer
tests that the local IP stack is functioning
question
Which of the following statistics should a network baseline report include?
answer
hard drive utilization
question
Which statement is true regarding differential / incremental backups?
answer
Incremental backups copy all files changed since the last full or incremental backup and marks files as backed up.
question
You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue, you receive several more phone calls from other co-workers. Using the problem-solving process, what must be done first to effectively troubleshoot the issue?
answer
Determine what the problem is, and then figure out who has been affected on your network.
question
Select the utility inside of Windows that allows the user to recover a previous system state. This utility monitors drives and partitions, as well as registry settings and system files.
answer
System Restore
question
What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
answer
protocol analyzer
question
When using tape backup, what should be done to ensure that the backups are viable?
answer
Verify data can be restored.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New