Chapter 8
Question 1:
A peer-to-peer network is also known as what type of network?
Question 2:
What is your first step in the troubleshooting process?
Question 3:
Risks associated with working on the inside of a computer can be reduced by doing which of the following?
Question 4:
Which of the following is
NOT
associated with a peer-to-peer network?
Question 5:
Which of the following is the most critical component of good network administration?
Question 6:
What is the recommended maximum number of users in a peer-to-peer network?
Question 7:
Which network operating system supports multi-user, multitasking, primarily uses NFS security, and is kernel based?
Question 8:
Which of the following is
NOT
used as a baseline measure?
Question 9:
Which of the following would
NOT
be found on security documentation?
Question 10:
What controls the resources and management of a client-server network?
Question 11:
Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks?
Question 12:
What is the reason magnetic tape is used to backup data?
Question 13:
Which type of backup stores all files that have been created and modified since the last full backup?
Question 14:
Which of the following is a program that spreads across computers and usually reproduces copies of itself in a computer's memory?
Question 15:
Which command will test the loopback function on the NIC?
Question 16:
Which of the following refers to documentation that outlines what is and what is not permissible on the network?
Question 17:
What is a solution to the problem of EMI/RFI effecting performance on your network?
Question 18:
Which of the following reports would be used to determine what programs are installed on a particular computer?
Question 19:
Network troubleshooting is defined as what type of process?
Question 20:
Which of the following is included in MDF and IDF documentation?
Question 21:
Which of the following is used to keep a list of equipment repairs?
Question 22:
Which device controls voltage spikes and HF noise?
Question 23:
Which of the following is a program that usually has a negative effect on executable programs?
Question 24:
What is the least implemented component of network administration?
Question 25:
What criteria should be used to select network passwords?