Home > Articles

Network Implementation

  • Print
  • + Share This
This chapter is from the book

Quick Check Answer Key

Objective 3.1: Identify the Basic Capabilities (Client Support, Interoperability, Authentication, File and Print Services, Application Support, and Security) of the Following Server Operating Systems: UNIX/Linux, NetWare, Windows, and Appleshare IP (Internet Protocol)

  1. A

  2. C

  3. A

  4. C

  5. A

  6. B

  7. C

  8. B

  9. A, C

  10. D

  11. A

  12. B

  13. B

  14. C

  15. A

  16. D

  17. D

  18. A

  19. B

  20. C

  21. A

  22. D

  23. C

  24. B

  25. B, C

  26. B

  27. C

  28. C

  29. B

  30. D

  31. D

  32. A

  33. B

  34. D

Objective 3.2: Identify the Basic Capabilities Needed for Client Workstations to Connect to and Use Network Resources (For Example: Media, Network Protocols and Peer and Server Services)

  1. D

  2. B

  3. A

  4. B

  5. C

  6. B

  7. A

  8. B

  9. A

  10. D

  11. B

  12. A, B

Objective 3.3: Identify the Appropriate Tool for a Given Wiring Task (Wire Crimper, Media Tester/Certifier, Punch Down Tool or Tone Generator)

  1. D

  2. A

  3. C

  4. C

  5. A, C

  6. B

  7. D

  8. C

  9. B, C

Objective 3.4: Given a Remote Connectivity Scenario Comprised of a Protocol, an Authentication Scheme, and Physical Connectivity, Configure the Connection for UNIX/Linux/MAC OS X Server, NetWare, Windows, and Appleshare IP

  1. B

  2. B

  3. B

  4. D

  5. A

  6. B

  7. B

  8. C

Objective 3.5: Identify the Purpose, Benefits, and Characteristics of Using a Firewall

  1. B

  2. A

  3. D

  4. A

  5. A

  6. B

  7. A

  8. B

Objective 3.6: Identify the Purpose, Benefits, and Characteristics of Using a Proxy Server

  1. A, B, D

  2. C

  3. D

  4. C

  5. A

  6. C

  7. A

Objective 3.7: Given a Scenario, Predict the Impact of a Particular Security Implementation on Network Functionality (Blocking Port Numbers, Encryption, and so on)

  1. A

  2. C

  3. B

  4. A

  5. C

  6. C

  7. B

  8. A

  9. C

  10. A

  11. A

  12. D

  13. D

  14. A

  15. C

  16. A

Objective 3.8: Identify the Main Characteristics of VLANs

  1. A, B, D

  2. B

  3. A, C, D

  4. C

  5. C

  6. A

  7. D

Objective 3.9: Identify the Main Characteristics and Purpose of Extranets and Intranets

  1. C

  2. B

  3. B

  4. B

  5. D

  6. D

  7. B

  8. C

  9. B

  10. C

  11. A

Objective 3.10: Identify the Purpose, Benefits, and Characteristics of Using Antivirus Software

  1. A

  2. A

  3. A

  4. B

  5. B

  6. B

  7. D

  8. C

  9. D

Objective 3.11: Identify the Purpose and Characteristics of Fault Tolerance

  1. A

  2. D

  3. B

  4. A, C, D

  5. B

  6. A, B, C

  7. A

  8. D

  9. A

  10. B

  11. D

  12. D

  13. A, B, C

  14. A

  15. B

  16. B

  17. A

  18. D

  19. D

  20. C

Objective 3.12: Identify the Purpose and Characteristics of Disaster Recovery

  1. A, B

  2. C

  3. D

  4. B

  5. B

  6. B

  7. A

  8. B

  9. D

  10. A, B

  11. B

  12. C

  13. D

  14. A

  15. D

  16. B

  17. C

  • + Share This
  • 🔖 Save To Your Account