Site hosted by Angelfire.com: Build your free website today!

Chapter 8

Question 1:
A peer-to-peer network is also known as what type of network?

A.   Client-server
B.   Thin client
C.   Workgroup
D.   Home office


Question 2:
What is your first step in the troubleshooting process?

A.   Analyze data
B.   Undo previous network changes
C.   Gather data
D.   Ignore the call


Question 3:
Risks associated with working on the inside of a computer can be reduced by doing which of the following?

A.   Using a grounding strap
B.   Standing on synthetic carpet
C.   Turning the power on
D.   Wearing leather shoes


Question 4:
Which of the following is NOT associated with a peer-to-peer network?

A.   Easily shared resources
B.   No additional software is required
C.   Requires a dedicated server
D.   Less expensive to create


Question 5:
Which of the following is the most critical component of good network administration?

A.   Security
B.   Performance
C.   Documentation
D.   Backbone


Question 6:
What is the recommended maximum number of users in a peer-to-peer network?

A.   5
B.   10
C.   15
D.   20


Question 7:
Which network operating system supports multi-user, multitasking, primarily uses NFS security, and is kernel based?

A.   Netware 4.11
B.   Unix
C.   Windows NT 4.0
D.   Netware 5.0


Question 8:
Which of the following is NOT used as a baseline measure?

A.   Bandwidth utilization
B.   Collision count
C.   Broadcast traffic
D.   Configuration errors


Question 9:
Which of the following would NOT be found on security documentation?

A.   User rights
B.   Firewall support
C.   Software listings
D.   Physical access to the network


Question 10:
What controls the resources and management of a client-server network?

A.   Server
B.   Network operating system (NOS)
C.   Host
D.   Client


Question 11:
Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks?

A.   RAID 0
B.   RAID 1
C.   RAID 4
D.   RAID 5


Question 12:
What is the reason magnetic tape is used to backup data?

A.   Speed
B.   Easily locate data
C.   Cost
D.   Tape never needs replacing


Question 13:
Which type of backup stores all files that have been created and modified since the last full backup?

A.   Incremental
B.   Hierarchical
C.   Copy
D.   Daily


Question 14:
Which of the following is a program that spreads across computers and usually reproduces copies of itself in a computer's memory?

A.   CRC error
B.   SAP updates
C.   Worm
D.   BDU's


Question 15:
Which command will test the loopback function on the NIC?

A.   Ping 127.0.0.1
B.   Telnet 127.0.0.1
C.   Ping 127.0.0.0
D.   Telnet 127.0.0.0

Question 16:
Which of the following refers to documentation that outlines what is and what is not permissible on the network?

A.   User policies
B.   Internet guidelines
C.   Group restrictions
D.   Workstation permissions


Question 17:
What is a solution to the problem of EMI/RFI effecting performance on your network?

A.   Running cable along power lines
B.   Using STP cable
C.   Using fluorescent lighting
D.   Use generators to power switches in MDF


Question 18:
Which of the following reports would be used to determine what programs are installed on a particular computer?

A.   Software
B.   Server
C.   Network
D.   Workstation


Question 19:
Network troubleshooting is defined as what type of process?

A.   An applied science
B.   A systematic process
C.   A skill
D.   An applied theory


Question 20:
Which of the following is included in MDF and IDF documentation?

A.   POP specifications
B.   Rack mount locations
C.   Name of administrator
D.   Server cost


Question 21:
Which of the following is used to keep a list of equipment repairs?

A.   Security record
B.   Software record
C.   Maintenance record
D.   Policy record


Question 22:
Which device controls voltage spikes and HF noise?

A.   Surge Suppressor
B.   Isolating transformer
C.   Regulator
D.   Wall outlet


Question 23:
Which of the following is a program that usually has a negative effect on executable programs?

A.   Trojan Horse
B.   Virus
C.   Worm
D.   Infection


Question 24:
What is the least implemented component of network administration?

A.   Security
B.   Performance
C.   Documentation
D.   Baselining


Question 25:
What criteria should be used to select network passwords?

A.   Specific family names
B.   Birth dates
C.   Mother's maiden name
D.   Network policy