Home > Articles

Network Implementation

This chapter is from the book

Domain 3.0: Network Implementation

Objective 3.1: Identify the Basic Capabilities (Client Support, Interoperability, Authentication, File and Print Services, Application Support, and Security) of the Following Server Operating Systems: UNIX/Linux, NetWare, Windows, and Appleshare IP (Internet Protocol)

  1. You have been given the task of installing Samba on a Linux server. Which services does the product provide?

    1. File and print services

    2. Thin client services

    3. Web server services

    4. Proxy server services

  2. Which of the following is an advantage to formatting a Windows NT server drive as NTFS rather than FAT?

    1. NTFS permits the server to be used as a workstation.

    2. With NTFS, tape backups aren't needed.

    3. NTFS offers a higher degree of security.

    4. NTFS eliminates the need for multiple hard drives.

  3. NDS is proprietary to which of the following?

    1. NetWare

    2. Windows NT

    3. Windows 9x

    4. UNIX

  4. Which one of the following is the directory structure used with Novell NetWare?

    1. NTFS

    2. FAT

    3. NDS

    4. Root

  5. Which of the following network protocols can be run on a NetWare network?

    1. IPX

    2. NetBEUI

    3. AppleTalk

    4. MS-DOS

  6. Which of the following is an advantage to formatting a Windows NT server drive as NTFS rather than FAT?

    1. With NTFS, tape backups aren't needed.

    2. NTFS offers a higher degree of security.

    3. NTFS permits the server to be used as a workstation.

    4. NTFS eliminates the need for multiple hard drives.

  7. Which of the following is an advantage of NTFS over FAT?

    1. It permits the server to be used as both server and work- station.

    2. It alleviates the need for data backups.

    3. It utilizes the disk space far more efficiently than FAT.

    4. It directly accesses the system hardware.

  8. Which of the following is used to manage file systems on a NetWare server?

    1. NDS

    2. NFS

    3. DHCP

    4. WINS

  9. Which two of the following client operating systems are supported by Windows and NetWare?

    1. UNIX workstations

    2. Novell CAFS Client

    3. Windows NT Workstation

    4. MAC OS X

  10. The NetWare directory structure begins with ______.

    1. Directory

    2. Leaf

    3. Domain

    4. Root

  11. Which of the following network operating systems is associated with NDS?

    1. NetWare

    2. Windows NT

    3. Windows 9x

    4. UNIX

  12. What is the basis of Novell NetWare?

    1. X.25

    2. X.500

    3. V.34

    4. X.400

  13. Which of the following is an advantage of UNIX that's not offered by other network operating systems?

    1. Only UNIX supports TCP/IP.

    2. It's portable among different machine types.

    3. It's the only NOS that supports routable protocols.

    4. It doesn't require client addressing.

  14. What is the default network protocol on a UNIX server?

    1. IPX/SPX

    2. IPX

    3. TCP/IP

    4. NetBIOS

  15. Which network protocol is shipped with commercial versions of UNIX?

    1. TCP/IP

    2. IPX/SPX

    3. BGRP

    4. NWLink

  16. ______ supports 64-bit applications.

    1. AppleTalk

    2. Windows NT

    3. NetWare

    4. UNIX

  17. Which protocol is used with the Internet and UNIX?

    1. WINS

    2. NetBEUI

    3. IEEE 802.5

    4. TCP/IP

  18. Which of the following networking protocols does Linux use?

    1. TCP/IP

    2. AppleTalk

    3. IPX

    4. NWLink

  19. Three servers are scheduled for an upgrade. What do you do first?

    1. Install the upgrade on all three servers.

    2. Install the upgrade on a test server.

    3. Install the upgrade on one server and observe the effects on users.

    4. Don't perform the upgrade.

  20. In what type of network environment do individual computers maintain a list of user accounts describing passwords and access rights?

    1. Domain

    2. Standalone

    3. Workgroup

    4. Active Directory

  21. What type of network is share-level security often associated with?

    1. Peer-to-peer

    2. Server based

    3. WANs

    4. Centralized server

  22. Which of the following best describes the difference between user and share-level security?

    1. Share-level security is more restrictive.

    2. User-level security is more restrictive.

    3. There is no difference.

    4. User-level security can be set up in group accounts.

  23. Which of the following best describes folder replication?

    1. Attaching a tape unit to the hard drives of a server

    2. Copying the contents of a hard drive to another hard drive

    3. Copying a folder to another server or workstation

    4. Configuring a workstation for temporary use as a server

  24. The method used to back up server data is to copy the server files to another server. Which one of the following best describes this type of backup method?

    1. Differential

    2. Folder replication

    3. Tape backup

    4. Incremental

  25. You are adding a Windows XP workstation to a network hosted by UNIX servers. There is also an Apple MAC workstation on the network. Which protocols must be loaded in the system to enable communications between all the computers in the network? (Select all that apply.)

    1. NWLINK

    2. AppleTalk

    3. TCP/IP

    4. NetBEUI

  26. You are setting up a Windows 2000 Professional computer in a network that contains Novell NetWare 4.11 servers. What client software do you need to install in the Windows machine to communicate with these servers?

    1. TCP/IP

    2. CSNW

    3. Netlink

    4. NWCT

  27. What items are required for a UNIX client to connect to an entirely UNIX-based network environment's network share using the host name?

    1. IP, Subnet Mask, WINS

    2. IP, Subnet Mask, LMHOSTS

    3. IP, Subnet Mask, HOSTS

    4. IP, DNS, WINS

  28. Which server stores information about resources in a Windows Server 2003 domain running Active Directory?

    1. Domain Master

    2. Domain Tree

    3. Domain Controller

    4. Domain Configurator

  29. Identify the hierarchical directory service.

    1. Windows NT domains

    2. Active Directory

    3. Linux Password files

    4. The NetWare Bindery

  30. A user cannot modify her username and password in Open Directory for Mac OS X server. Which of the following actions will best resolve this issue?

    1. Convert the user to give master configurator rights.

    2. Change the password from "Crypt" to "Open Directory."

    3. Establish Turbo Shell as the login shell.

    4. Modify the login to use "Key Chain" access rather than the login window.

  31. You have a Windows 2000 server-based domain with an Apple MAC client that is unable to see the server on the network. What items need to be installed to enable the client to communicate with the server?

    1. 802.11A

    2. NetBEUI

    3. Token Ring

    4. Appleshare

  32. When a user in a Linux environment wishes to authenticate using Kerberos, the request is processed and granted by a____.

    1. Kerberos Key Distribution Center

    2. Kerberos Password Distributor

    3. Secure Layer Protocol Server

    4. Kerberos Authentication Server

  33. Which Windows groups can share folders by default?

    1. Admin group only

    2. Admin and Power Users groups

    3. Admin and Share Users groups

    4. Admin and Guest groups

  34. Which of the following are true concerning NDS?

    1. Remote users cannot access network connections via dial-up connections.

    2. Mobile users do not require changing the NDS name context.

    3. Mobile users do not require a special object entry.

    4. There is no difference between mobile and remote users.

Objective 3.2: Identify the Basic Capabilities Needed for Client Workstations to Connect to and Use Network Resources (For Example: Media, Network Protocols, and Peer and Server Services)

  1. A workstation is being added to an Ethernet LAN. The NIC card has been installed, IRQ assigned along with an I/O range with no conflicts. What else must be done before the workstation can access the network resources?

    1. Convert the workstation to a server by installing server software.

    2. Install the client software.

    3. Connect the workstation to a router.

    4. Install the client software and add a cable to the NIC card.

  2. A user has been approved for an increase in the size of their home directory on the server. Which of the following must be changed?

    1. Permission

    2. Profile

    3. Right

    4. Password

  3. Before a client can receive a dynamic IP address from a server ______.

    1. DHCP must be running on the server

    2. DNS must be running on the server

    3. WINS must be running on the server

    4. a gateway must be installed on the server

  4. A network administrator is trying to decide whether to implement user-level or share-level security on a network. Which will be more time intensive?

    1. User level

    2. Share level

    3. Security levels are dictated by the NOS and not the administrator.

    4. There's no difference in the amount of administrative time.

  5. Which of the following best describes share-level access?

    1. Used to specify users or groups of users that have access to a network resource.

    2. Used to specify the depth of a security model.

    3. Used to specify password protection for each resource.

    4. Used to employ a public-key encryption scheme.

  6. Which of the following best describes user-level access?

    1. Used to specify the depth of a security model.

    2. Used to specify users or groups of users that have access to a network resource.

    3. Used to specify password protection for each resource.

    4. Used to employ a public-key encryption scheme.

  7. A network administrator assigns users to groups, all of which have similar levels of access. What type of security is being employed?

    1. User level

    2. Logon Account

    3. Server Level

    4. Group level

  8. When accessing a network share, you attempt to modify its contents, but you're unable to do so. What is the most likely reason for this?

    1. GPOs are typically pulled from cache memory.

    2. The files are in Read-Only mode because another user is using them.

    3. The files are being pulled from a backup resource.

    4. You only have Read, Write and Change permissions to the files.

  9. By interpreting baselines, you determine that the volume of network traffic on your network is reaching unacceptable levels. The network is a 10BASE-T system with hubs. Which of the following upgrade paths are you most likely to recommend?

    1. Implement switches in place of the hubs.

    2. Implement 100BASE-T by replacing all the network cards and hubs with 100Mbps devices.

    3. Install a router to divide the network into two segments, thereby reducing the overall amount of network traffic.

    4. Implement a bridge.

  10. You have a workstation that is 153 meters from the server, there is no repeater, and it is using 10BASE-T wiring. You cannot connect to the network.

  11. Required Objective: Connect to the server

    Optional Objectives: Faster connection, easier access for users

    Proposed Solution: Replace the old NIC with a 100BASE-FX NIC

    1. This meets only the required objective.

    2. This meets the optional objectives.

    3. This meets the required and one of the optional objectives.

    4. This does not meet the required or optional objectives.

  12. You are the network administrator for a token ring network. A NIC in a system fails and you replace it with a new one. However, the system is unable to connect to the network. What is the most likely cause of the problem?

    1. The card is a 100Mbps card, and the ring is configured for only 10Mbps.

    2. The card is set to the wrong ring speed.

    3. The card is set to full duplex operation and the ring is running at only half-duplex.

    4. The card is faulty.

  13. As network administrator, you are given the task of integrating the existing network with a new network that will be located in another building. In total, there will be three network segments. The systems on the network are Windows 2000 and Novell NetWare servers and Windows 2000 workstations. You want to confine the network to a single protocol. Which two of the following network protocols might you consider using for the entire network?

    1. IPX/SPX

    2. TCP/IP

    3. PPP

    4. NetBEUI

Objective 3.3: Identify the Appropriate Tool for a Given Wiring Task (Wire Crimper, Media Tester/Certifier, Punch Down Tool or Tone Generator)

  1. You are experiencing problems with network connectivity and suspect that there is a break in the cable that connects two floors. The cable is a Category 5 twisted-pair cable. Which of the following tools can you use to locate the break in the cable?

    1. Wire tap

    2. Voltmeter

    3. Tone generator and locator

    4. Time domain reflectometer (TDR)

  2. What devices are sometimes referred to as "fox and hound" detectors?

    1. Tone generator and locator

    2. A time domain reflectometer (TDR)

    3. A voltmeter

    4. A cable chaser

    5. A wire tap

  3. Which of the following tools is used to interface a token ring adapter card to category 3 or category 5 UTP cable?

    1. A UDP adapter

    2. A crossover cable

    3. A token-ring media filter

    4. A NIC adapter

  4. A wire in a UTP cable is suspected of having a break. Which of the following would confirm connectivity of each wire in the cable?

    1. Link light

    2. Crossover cable

    3. Cable tester

    4. Network adapter card

  5. In a hardware loop back plug, which two wire numbers are connected?

    1. 2 and 6

    2. 1 and 2

    3. 1 and3

    4. 3 and 4

    5. 3 and 5

  6. What type of device is required to connect a workstation to a hub port labeled MDI?

    1. A fox and hound

    2. A crossover cable

    3. A hardware loopback cable

    4. A straight-through cable

    5. A wire tap

  7. Which of the following Windows NT tools will display many of the attributes of an IP packet?

    1. Network Monitor Audit

    2. WINS

    3. DHCP

    4. Network Monitor

  8. Your company is getting a new DSL connection and you have been asked to install the new connection equipment in the communication closet of your office building. What type of tool do you need to make these connections?

    1. A wirepuller

    2. A drill

    3. A punch down tool

    4. A line extender tool

  9. What type of network troubleshooting tool do you use to actually put test signal on the copper wire of a network connection?

    1. An OTDR

    2. A TDR

    3. A Line Tester

    4. A Multimeter

Objective 3.4: Given a Remote Connectivity Scenario Comprised of a Protocol, an Authentication Scheme, and Physical Connectivity, Configure the Connection for UNIX/Linux/MAC OS X Server, NetWare, Windows, and Appleshare IP

  1. A server has two NIC cards installed. The first one uses IRQ 10 and I/O range of B800-B81F. The second uses IRQ 10 and I/O range of D700-D80A. What action, if any, should be taken?

    1. No action is required.

    2. Locate any available IRQ to resolve the IRQ conflict that is present.

    3. Locate any available I/O range to resolve the I/O conflict.

    4. Change the I/O of the second NIC to B800-B81F.

  2. A server has two NIC cards installed. The first one uses IRQ10 and I/O range of B800–B81F. The second uses IRQ5 and I/O range of D700–D80A. What action, if any, should be taken?

    1. Locate any available IRQ to resolve the IRQ conflict that is present.

    2. No action is required.

    3. Locate any available I/O range to resolve the I/O conflict.

    4. Change the I/O of the second NIC to B800–B81F.

  3. While installing and configuring a new modem, you receive an error message that indicates there is a resource conflict. You are installing the modem on COM2. What is the most likely source of the conflict?

    1. IRQ2

    2. IRQ3

    3. IRQ5

    4. 3FD

  4. Which of the following system resources should be configured in a modem installation?

    1. FTP number, DMA channel, IRQ channel

    2. MAC address, I/O Address, DMA Channel

    3. COM port, Interrupt request channel, IP address

    4. COM port, I/O Address, Interrupt request channel

  5. When an ISP elects to use DHCP, which one of the following must the subscriber set up?

    1. PPP

    2. SMB

    3. IPX

    4. SLIP

  6. What is the correct procedure for configuring RAS in a Windows 2000 server?

    1. Start, Settings, Control Panel, Network

    2. Start, Programs, Administrative Tools, Routing, and Remote Access

    3. System, Services, Networking, Dial In

    4. Control Panel, Network, Dial In, Remote Services

  7. A remote user calls your help desk and complains that she is unable to access internal corporate network resources from her home. The user states she can access the Internet. How can the user restore her connection to the corporate network?

    1. Disconnect from the Internet

    2. Re-establish the VPN connection

    3. Re-establish the Dial-up Networking (DUN) connection

    4. Change the VPN connection to use IPsec instead of MS-CHAP

  8. The Open Directory Authentication in Mac OS X can authenticate non-Kerberized services using _______.

    1. Cleartext passwords

    2. SSH authentication

    3. SASL

    4. NTP authentication

Objective 3.5: Identify the Purpose, Benefits, and Characteristics of Using a Firewall

  1. Your manager has given you the task of setting up a shared Internet connection for all the users on the network. She is concerned about security and has asked you to recommend a solution that will protect the internal network. What kind of server are you likely to install to address her security concern?

    1. Install a Linux server

    2. Install a firewall server

    3. Install a secure browser on each workstation that will have Internet access

    4. Install a Proxy server

  2. On a network, where is a system 'acting as a firewall' typically located?

    1. Between the internal network and the Internet access point

    2. Between two internal networks

    3. Between the Internet access point and the Internet

    4. Between the client systems and the servers

  3. Consider the following situation, and then select the best security practice from the list that follows: A network consisting of 500 users is to be modified so that all users will be able to access the Internet. All IP addresses are assigned from a list maintained in NT servers. The list of IP addresses is well known outside the network.

    1. All messages intended for the Internet are encrypted.

    2. All users are assigned a unique password for accessing the Internet.

    3. The share-level security model is selectively applied to each user.

    4. A firewall is installed at the Internet ports.

  4. What is the basic purpose of a firewall system?

    1. It protects one network from another by acting as an intermediary system.

    2. It caches commonly used Web pages, thereby reducing the bandwidth demands on an Internet connection.

    3. It allows hostnames to be resolved to IP addresses.

    4. It provides a single point of access to the Internet.

  5. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server. Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?

    1. A firewall system at the connection point to the Internet

    2. A more secure password policy

    3. File-level encryption

    4. Kerberos authentication

  6. Which of the following is not a commonly implemented feature of a firewall system?

    1. Packet filtering

    2. NAS

    3. Proxy

    4. NAT

  7. Which of the following best describes the purpose of a firewall?

    1. To prevent external intruders from accessing a network

    2. To prevent network users from accessing the Internet

    3. To prevent network users from virus attack

    4. To detect protocol conflicts

  8. A packet filtering firewall performs at which levels of the OSI model?

    1. Network and Data

    2. Network and Transport

    3. Transport and Session

    4. Physical and Data

Objective 3.6: Identify the Purpose, Benefits, and Characteristics of Using a Proxy Server

  1. Your manager has given you the task of installing a caching Proxy server. Which three of the following are the benefits of using a Proxy server system?

    1. It provides faster page retrieval for commonly used Web pages.

    2. It provides centralized Internet access.

    3. It provides automatic assignment of IP addresses to workstations.

    4. It provides protection of the internal network from attack by outside sources.

  2. Your manager has given you the task of installing a caching Proxy server. Which two of the following are the benefits of using a Proxy server system?

    1. Increasing demands on Internet connection bandwidth

    2. Centralizing Internet access

    3. Preventing network workstation IP addresses from being advertised on the Internet

    4. Automatically assigning IP addresses to workstations

  3. A network consisting of 500 users is to be modified so that all users will be able to access the Internet. All IP addresses are assigned from a list maintained in NT servers. The list of IP addresses is well known outside the network. Which of the following is the best security practice for this network?

    1. All messages intended for the Internet are encrypted.

    2. All users are assigned a unique password for accessing the Internet.

    3. The share-level security model is selectively applied to each user.

    4. A firewall is installed at the Internet ports.

  4. What is the purpose of using a proxy IP?

    1. To provide all workstations with the same IP address

    2. To eliminate the need for TCP/IP

    3. To secure actual workstation IP addresses from intruders

    4. To map IP addresses to MAC addresses

  5. Computer users are reporting slow Internet access. Which of the following actions could be taken to improve their browsing?

    1. Install a Proxy server

    2. Install a Web server

    3. Set up a subnet

    4. Install a Terminal server

  6. You are in charge of installing your company's new network structure. You have asked one of your assistants to install a proxy server for the new environment. They ask you if the proxy server is the same as a firewall. What should you tell them?

    1. A proxy server is used to protect one network from another by preventing IP addresses from passing between the networks.

    2. A Proxy server resolves hostnames to IP addresses and replaces workstation IP addresses with a proxy IP address.

    3. A proxy server is used to provide a single point of access to the LAN by filtering the IP addresses presented to the network.

    4. A proxy server holds the Security Access List for the network and prevents unauthorized users from gaining access to the network resources.

  7. A Proxy server operates at which OSI level?

    1. Application

    2. Network

    3. Transport

    4. Session

Objective 3.7: Given a Connectivity Scenario, Predict the Impact of a Particular Security Implementation on Network Functionality (Blocking Port Numbers, Authentication, Encryption, and so on)

  1. You are designing a password policy for your company. Which of the following measures are you least likely to recommend?

    1. Include passwords in system documentation

    2. Ensure that passwords are not reused

    3. Make sure that users use only "strong" passwords that are a certain length

    4. Change passwords on a periodic basis

  2. Which of the following represents the most secure password?

    1. PASSWORD1

    2. password

    3. PaSsWoRd1

    4. PASSWORD

  3. A peer-to-peer network is to be upgraded to a server-based network. Before performing the upgrade, which one of the following should be done first?

    1. Configure a default gateway

    2. Commit to an administrator password

    3. Install the NOS

    4. Assign IP addresses to all workstations

  4. You have been told to set up a firewall for the company network that will filter TCP ports 100–200. What network services will this action affect?

    1. POP3 incoming mail service

    2. FTP service

    3. SMTP outgoing mail service

    4. World Wide Web (WWW) access

  5. After several passwords have been compromised in your organization, you have been asked to implement a network-wide password policy. Which of the following represents the most practical and secure password policy?

    1. Daily password changes

    2. Weekly password changes

    3. Monthly password changes

    4. Password changes only after an account has been compromised

  6. What directory system does a UNIX server use to resolve names?

    1. NDS

    2. DNS

    3. HOSTS

    4. DHCP

  7. Your manager has asked you to implement security on your peer-to-peer network. Which of the following security models offers the highest level of security?

    1. Share level

    2. User level

    3. Password level

    4. Layered

  8. You are working on a Linux system and are having problems trying to ping a remote system by its hostname. DNS resolution is not configured for the system. What file might you examine to begin troubleshooting the resolution problem?

    1. hosts

    2. staticdns

    3. passwd

    4. resolv

  9. Which of the following is not a valid file permission on a Linux system?

    1. Execute

    2. Read

    3. Attribute

    4. Write

  10. How often should passwords be changed?

    1. No less than monthly

    2. No less than weekly

    3. No less than annually

    4. No less than biannually

  11. What does a secure password policy require?

    1. Passwords must be changed on a random basis.

    2. Passwords must be changed at a scheduled time-interval.

    3. A random length for passwords.

    4. A prescribed length to passwords.

  12. The network administrator sends email to all users explaining that passwords must be changed on a monthly basis. This is a departure from the current system of passwords never changing. Which of the following must be changed?

    1. Groups

    2. Profiles

    3. Rights

    4. Policy

  13. After creating a new secure page for your Web site, external users complain that they cannot access it, but they can access other areas of the site. When you try to access it from a workstation internally, everything seems fine. What is the most likely explanation of the problem?

    1. Your firewall is blocking all traffic.

    2. Your firewall is blocking port 80.

    3. Your firewall is blocking port 110.

    4. Your firewall is blocking port 443.

  14. You have just set up a filter on your network router and SMTP operations have stopped responding. What is the likely cause of this problem?

    1. Port 25 is closed.

    2. Port 110 is closed.

    3. Port 80 is closed.

    4. Port 443 is closed.

  15. You have installed a new firewall in your network and users are complaining that now they can't access the Web. What action should you take to restore their Web access?

    1. Reconfigure DNS

    2. Configure DHCP for the firewall

    3. Open port 80

    4. Configure the router to work with the firewall

  16. Choose the most secure password from the following list.

    1. Db3Tu$L

    2. klsrmoa

    3. NeW UseR

    4. harold

Objective 3.8: Identify the Main Characteristics of VLANs

  1. Which properties can be used to define a VLAN?

    1. IP addresses

    2. Port assignments

    3. Computer names

    4. MAC addresses

  2. Which of the following technologies can be implemented on a switch to create multiple separate networks?

    1. Subnet masking

    2. VLAN

    3. NAS

    4. Proxy

  3. Which three of the following properties can be used to define a VLAN?

    1. IP addresses

    2. Computer names

    3. MAC addresses

    4. Port assignments

  4. Your company has two offices in different locations. You need to establish a secure link between the two. You want to use the Internet as a communication mechanism to keep the costs down. Which of the following technologies might you consider using?

    1. VLAN

    2. 802.11b

    3. VPN

    4. TDR

  5. A VLAN can be used to:

    1. Create a network without using any cables

    2. Create a network at the cost of using more bandwidth

    3. Separate networks into smaller logical networks

    4. Re-use IP addresses

  6. Your company has recently merged with another company and each has its own VLAN. Users on both VLANs need to communicate with each other. What needs to be installed to make this possible?

    1. A router

    2. A switch

    3. Matching protocols

    4. A bridge

  7. You have several remote salespeople who routinely connect to your office via a VPN. However, today they can no longer connect, and are unable to access the login. However, they are still able to access the Internet. What action should be taken to determine the scope of this problem?

    1. Reconfigure the VPN setup

    2. Re-enter their usernames and passwords

    3. Call your broadband service provider

    4. Ping the VPN host

Objective 3.9: Identify the Main Characteristics and Purpose of Extranets and Intranets

  1. A company producing medicine is sharing production data with another company that outsources shipping via a VPN. In return, the shipping company is sharing some of its real-time updated logistics schedules with the medical company, also using a VPN. What type of networking arrangement is involved?

    1. A token ring network

    2. An intranet

    3. An extranet

    4. A local area network (LAN)

  2. Which of the following best describes an intranet?

    1. A global public network that uses an infrastructure consisting of network access points, a commercial backbone and service providers

    2. A private network that supports Internet applications and that doesn't use the public telecommunications system to connect users

    3. A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public

    4. A network in which data packets sent over the public Internet and are encapsulated in a protocol that provides for data encapsulation as well as encryption of the user data

  3. Which of the following provides the best protection against network intruders?

    1. The Internet

    2. An intranet

    3. An extranet

    4. A VPN

  4. Which of the following types of network can a company use to allow data sharing internally only, without the use of the public telephone system?

    1. Internet

    2. Intranet

    3. Extranet

    4. VPN

  5. An intranet is ______, typically established by an organization for the purpose of running an exclusive site not open to the public.

    1. A local area network (LAN)

    2. An internal extranet network

    3. A wide area network (WAN)

    4. A Web-based network

  6. A ______ is used to block unauthorized outside users from accessing an intranet site.

    1. Hub

    2. Router

    3. Gateway

    4. Firewall

  7. Which one of the following characteristics of an intranet is incorrect?

    1. An intranet can be a part of a Local Area Network (LAN).

    2. An intranet is designed to be publicly available.

    3. An intranet can work with Wide Area Networks (WAN).

    4. An intranet may be restricted to a community of users.

  8. Which of the following best describes an extranet?

    1. A global public network that uses an infrastructure consisting of network access points, a commercial backbone and service providers

    2. A private network that supports Internet applications and that doesn't use the public telecommunications system to connect users

    3. A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public

    4. A network in which data packets are sent over the public Internet and are encapsulated in a protocol that provides for data encapsulation as well as encryption of the user data

  9. Your company is set up to use the Internet to do business with your business partners who are scattered across the country; this is an example of ______.

    1. Intranet

    2. Extranet

    3. Internet

    4. Virtual Private Network (VPN)

  10. To set up a secure network that will enable your customers to view your current production schedule, you would set up ______.

    1. An intranet

    2. A wide area network

    3. An extranet

    4. A Virtual Private Network

  11. Your company wants to make its internal product information accessible to selected customers from anywhere in the world. Which type of network environment should you create for this scenario?

    1. An extranet

    2. An intranet

    3. A WAN

    4. A VPN

Objective 3.10: Identify the Purpose, Benefits, and Characteristics of Using Antivirus Software

  1. From what items do antivirus software packages protect computers?

    1. Trojans

    2. SPAM

    3. Pop-up ads

    4. Spyware

  2. What is an unwanted software program that can multiply from one system to another?

    1. Virus

    2. Spam

    3. Spyware

    4. Cookies

  3. Which of the following should always be installed on an email server?

    1. Antivirus software

    2. Popup blocker

    3. Spyware blocker

    4. The SSL protocol

  4. How can proxy servers provide an opening for viruses to enter a network?

    1. The proxy server uses the IP address of the remote server.

    2. The proxy receives HTTP responses that might contain viruses.

    3. The proxy server receives telnet data that might have viruses.

    4. The proxy receives IP acknowledgements that might have viruses.

  5. What action should always be taken before installing new application software?

    1. Check the system for viruses

    2. Deactivate the antivirus software

    3. Verify that all the system's virus protection is active

    4. Check the application installation media for viruses

  6. Why should all email originating from the Internet be scanned for viruses?

    1. Because Windows operating systems are known for viruses.

    2. Because the Internet is the largest source of viruses.

    3. Because email floods can cripple a server.

    4. Because not all email is encrypted.

  7. A client that has FTP access should also have ______.

    1. a port 21 firewall block

    2. an encrypted link to the FTP server

    3. email access

    4. antivirus software installed

  8. Normally, antivirus software needs to be updated on a(n) ______ basis.

    1. quarterly

    2. bi-annual

    3. monthly

    4. annual

  9. What needs to be done before using a file obtained from a third party?

    1. Scan the file for pop-ups

    2. Scan the file for worms

    3. Scan the file for spyware

    4. Scan the file for viruses

Objective 3.11: Identify the Purpose and Characteristics of Fault Tolerance

  1. After a hard disk failure that took a number of hours from which to recover, your manager has instructed you to implement a fault-tolerant solution to reduce the amount of downtime if the same thing happens again. After researching the various options available to you, you decide to use disk striping with parity. What is the minimum number of disks required to implement this solution?

    1. 3

    2. 2

    3. 1

    4. 4

  2. To combine hard drive fault tolerance with good read/write performance, which of the following should be used?

    1. Striping without parity

    2. Tape backup

    3. Mirroring

    4. Striping with parity

  3. Each hard drive in a server has a dedicated disk controller. What is this practice called?

    1. Striping

    2. Duplexing

    3. Parity

    4. SNMP

  4. Your manager has given you the task of implementing a RAID solution on the server. You have two hard disk controllers and two hard disks. Which three of the following RAID levels could you implement?

    1. Disk mirroring

    2. Disk striping with parity

    3. Disk striping

    4. Disk duplexing

    5. Disk shadowing

  5. To provide true, continuous power to a server, which of the following should be used?

    1. BNC

    2. UPS

    3. SPS

    4. Generator

  6. You have been asked to implement a RAID solution on one of your company's servers. You have two hard disks and two hard disk controllers. Which three of the following RAID levels could you implement?

    1. RAID 0

    2. RAID 1

    3. Disk duplexing

    4. RAID 10

    5. RAID 5

  7. Which of the following statements best describes RAID 5?

    1. A RAID 5 array consists of at least three drives and distributes parity information across all the drives in the array.

    2. A RAID 5 array consists of at least two drives. Parity information is written across both drives to provide fault tolerance.

    3. A RAID 5 array consists of at least three drives and stores the parity information on a single drive.

    4. A RAID 5 array consists of at least four drives. The first and last drives in the array are used to store parity information.

  8. What is the purpose of implementing fault tolerance?

    1. It protects data from accidental deletion.

    2. It eliminates the amount of time the administrator spends performing backups.

    3. It allows systems to be bought back online more quickly.

    4. It promotes data availability by eliminating a single point of failure.

  9. Writing data in blocks across multiple hard drives is called ______.

    1. Striping

    2. RAID 0

    3. Mirroring

    4. Parity

  10. Which RAID level does not incorporate fault tolerance?

    1. RAID 1

    2. RAID 0

    3. RAID 5

    4. RAID 3

  11. Each hard drive in a server has a dedicated disk controller. What is this practice called?

    1. SNMP

    2. Striping

    3. Parity

    4. Duplexing

  12. Which RAID level relies on mirroring for fault tolerance?

    1. RAID 0

    2. RAID 3

    3. RAID 5

    4. RAID 1

  13. Which of the following represent fault tolerance measures? (Select all that apply.)

    1. Installing a UPS

    2. Installing a RAID system

    3. Installing a mirror server

    4. Performing a daily backup

  14. Which of the following techniques improves the fault tolerance of a RAID 1 arrangement so that the system can remain functional if the disk controller fails?

    1. Duplex the RAID 1 subsystem by adding a second controller

    2. Mirroring the RAID 1 subsystem by adding an additional drive and controller

    3. Striping the RAID 1 system using an additional drive for parity

    4. Add a tape backup system to the drive subsystem

  15. Which of the following provides fault tolerance and the best read/write performance?

    1. Duplexing

    2. Striping with parity

    3. RAID 0

    4. Striping without parity

  16. One of your servers is configured for RAID 1 operation with duplexing. If it loses one of its RAID controllers, what will happen to the disk data and performance?

    1. The data will be lost but the drive subsystem performance will not be affected.

    2. The data will be safe, but the drive subsystem performance will be decreased.

    3. Half of the data will be lost, but the drive subsystem performance will not be affected.

    4. The data and the performance level will remain unchanged.

  17. You have a 3-drive RAID system where one drive is used for the operating system and the other two drives are used for data in a stripe set. The drives are hot swappable. One of the data drives fails. What needs to be done to correct the failure?

    1. Replace the drive and restore the contents from backup.

    2. Hot swap the drive with the system active, and it will automatically rebuild the contents of the drive.

    3. Shut down the system, replace the drive, restart the system, and let it rebuild the missing drive.

    4. Use a warm spare to replace the drive. It already contains the data and will make it available when the drive is activated.

  18. Which RAID type offers best fault tolerance with the least overhead for a system that has one controller and six drives?

    1. Duplexing

    2. Striping

    3. Mirroring

    4. Striping with Parity

  19. What fault tolerant system requires the least amount of overhead?

    1. RAID 0

    2. RAID 1

    3. Mirroring

    4. RAID 5

  20. A NetWare server uses four hard drives. Which of the following technologies divides the hard drives so that it provides the most data storage space?

    1. Duplexing

    2. Striping

    3. Volume

    4. Partition

Objective 3.12: Identify the Purpose and Characteristics of Disaster Recovery

  1. Which two of the following backup methods clear the archive bit from files that have been backed up?

    1. Incremental

    2. Full

    3. Differential

    4. Periodic

  2. In a GFS rotation, what does the GFS refer to?

    1. Weekly, monthly, and yearly backups

    2. The frequency of RAID rebuilds

    3. Daily, weekly, and monthly backups

    4. The replacement of tapes with new ones in a backup cycle

  3. Which of the following occurs during a normal server backup?

    1. All workstation files are backed up

    2. Only files that have changed since the last backup are backed up

    3. Only those files that have changed since the last differential backup are backed up

    4. All files are backed up

  4. What type of backup is being performed on a server when only files that have changed are backed up?

    1. Full

    2. Incremental

    3. Differential

    4. Tape

  5. Which of the following backup types use the fewest number of tapes?

    1. Weekly normal-daily incremental

    2. Daily normal

    3. Weekly normal-daily differential

    4. Weekly differential-daily incremental

  6. How often should a full backup of server data be scheduled?

    1. Every three months

    2. Once a week

    3. Once a month

    4. Once a year

  7. A server uses a backup strategy in which backups occur three times a week. The first backup is a full backup. The second backup copies files that have changed since the first backup, and the third backup copies all files that were changed since the first backup. What type of strategy does this describe?

    1. Differential

    2. Normal

    3. Incremental

    4. Full

  8. A server is backed up each day using a normal backup. Backup times using this method have become too long and an alternative plan that allows a full backup on weekends but a short backup during the weekdays is needed. Which of the following represents the best plan?

    1. Weekly normal backup and daily differential backups

    2. Weekly normal backups and daily incremental backups

    3. Weekly incremental backups

    4. Daily full backup

  9. Why should a backup strategy include provisions for off-site storage of data tapes?

    1. So the server can be moved to the off-site location

    2. So users won't be able to access server data

    3. So all server data can be copied to a backup server

    4. So the server data will be protected from environmental disasters

  10. Which two of the following backup methods clears the archive bit?

    1. Full

    2. Incremental

    3. Differential

    4. Sequential

  11. Which of the following backup types takes the longest time to operate?

    1. Incremental

    2. Normal

    3. Differential

    4. Sequential

  12. Which of the following backup methods will back up the files regardless of the state of the archive bit?

    1. Incremental

    2. Differential

    3. Full

    4. Sequential

  13. During a normal server backup ________.

    1. only those files that have changed since the last differential backup are backed up

    2. only files that have changed since the last backup are backed up

    3. all files are backed up

    4. all workstation files are backed up

  14. What is the most common backup method used with servers?

    1. Tape

    2. Floppy disk

    3. Removable media

    4. Windows Backup

  15. The backup of a server is set to perform daily backups of all files that have changed since the last complete backup of the server, regardless of whether they have changed since the backup on the previous day. What type of backup is being used?

    1. Tape

    2. Incremental

    3. Full

    4. Differential

  16. A backup strategy in which only files that have changed since the last full or incremental backup is called a ________.

    1. Differential

    2. Incremental

    3. Full

    4. Normal

  17. What is the standard method of verifying that a backup copy is valid?

    1. Verify the archive bit status

    2. Check the backup tape integrity

    3. Restore the backup to a machine

    4. Run the system state data backup test

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020