Home > Articles > CompTIA > Network+

This chapter is from the book

Answers and Explanations

Objective 3.1

  1. Answer: A. Samba is a product that provides file and print services to Windows-based clients. Samba does not offer thin client services, web server services or Proxy server services.

  2. Answer: C. A Windows NT server hard drive may be formatted as NTFS and/or FAT. NTFS offers a wider range of services, including enhanced network security. The number of hard drives has nothing to do with the file structures NTFS or FAT; both can use multiple drives. Server backups are a normal and expected networking task no matter what type of file structure is used. Although the server can be used as a workstation (not recommended) NTFS does not provide this functionality.

  3. Answer: A. NDS is the NetWare Directory Service and is proprietary to Novell, although it’s based on the X.400 protocol. Windows NT and Windows 9x are Microsoft products. UNIX is nonproprietary.

  4. Answer: C. The directory structure used with Novell NetWare is called NDS. FAT is a file system associated with DOS and NTFS is a file system associated with Windows NT. The root file structure is normally associated with UNIX/Linux.

  5. Answer: A. IPX is a protocol associated with Novell NetWare. NetBEUI is associated with MS Windows and AppleTalk is associated with Mac OS networks. MS-DOS is not a network protocol.

  6. Answer: B. A Windows NT server hard drive may be formatted as NTFS and/or FAT. NTFS offers a wider range of services, including enhanced network security. The number of hard drives has nothing to do with the file structures NTFS or FAT; both can use multiple drives. Server backups are a normal and expected networking task no matter what type of file structure is used. Although the server can be used as a workstation (not recommended) NTFS does not provide this functionality.

  7. Answer: C. NTFS (New Technology File System) originated with the HPFS file system that Microsoft and IBM developed for the OS/2 operating system. It’s the recommended choice for Windows NT. NTFS is recommended over FAT because NTFS is the more secure of the two, and NTFS is not limited by the 2GB partition limit of FAT. NTFS also utilizes the disk space far more efficiently than FAT.

  8. Answer: B. Partitions and volumes are managed by two types of file services: Novell Storage Services (NSS), which first became available on version 5.0, and NetWare File System (NFS), which is the file service used on earlier versions of NetWare but is also available on version 5.0 and later.

  9. Answers: A, C. Microsoft is noted for client operating systems. Virtually all the Microsoft operating systems run on a NetWare network as well as on an NT/2000/XP network. Both Microsoft and Novell support implementations of UNIX, generally with the TCP/IP protocol suite.

  10. Answer: D. The Novell directory structure begins with a root. A root is the primary object from which the tree is built.

  11. Answer: A. The basis of the Novell directory and file organization scheme is the Novell Directory Service, or NDS.

  12. Answer: B. The basis of the Novell directory and file organization scheme is the Novell Directory Service, or NDS. NDS is based on the ITU (formerly known as CCITT) standard X.500.

  13. Answer: B. The UNIX operating system is portable. It is adaptable to different situations, particularly machine types and file structures.

  14. Answer: C. In contrast, NT and NetWare use some proprietary protocols that may not be compatible across networks. For example, UNIX uses the globally implemented TCP/IP as its networking protocol. In contrast, both NT and NetWare use proprietary networking protocols, NetBEUI and IPX, respectively, which poses some challenges for interconnectivity of networks.

  15. Answer: A. Windows NT and NetWare include a proprietary set of TCP/IP utilities. However, all commercial versions of UNIX ship with a complete package of TCP/IP.

  16. Answer: D. Windows NT and NetWare support only 32-bit applications. Because UNIX’s 64-bit capability has far superior performance applications, such as graphics and mathematical computations, it is invariably preferred over either NT or NetWare for such applications.

  17. Answer: D. In contrast, NT and NetWare use some proprietary protocols that may not be compatible across networks. For example, UNIX uses the globally implemented TCP/IP as its networking protocol. In contrast, both NT and NetWare use proprietary networking protocols, NetBEUI and IPX, respectively, which pose some challenges for interconnectivity of networks.

  18. Answer: A. For networking, Linux includes a complete set of TCP/IP protocols.

  19. Answer: B. In a server-based environment, up time is normally one of the primary objectives. Therefore, you should never test hop servers and workstations in a live environment if possible. You should install the upgrade on a test server for evaluation before loading it on a working network server.

  20. Answer: C. A workgroup is a network of computers that can share access to each other’s resources. Each computer in the workgroup maintains a list of user accounts describing passwords and access rights.

  21. Answer: A. Share-level security involves password-protecting each shared resource on a workstation. It’s typically associated with workgroup or peer-to-peer LANs, but can also be applied to server-based networks.

  22. Answer: D. Once a group account has been set up, a user may be assigned to it. Essentially, groups are a tool that eases the management of user accounts. From an administrative perspective, they save time over setting security for each user (which is how it must be done with share-level access). The option to use group accounts is set at the workstation by specifying user-level access.

  23. Answer: C. Folders are replicated from one server to another. The machine that copies the folder to another machine is referred to as the export server, while the machine that receives the copy is called the import server. Folder replication, in addition to copying a file, automatically updates the copy when changes are made to the original.

  24. Answer: B. Folders are replicated from one server to another. The machine that copies the folder to another machine is referred to as the export server, while the machine that receives the copy is called the import server. Folder replication, in addition to copying a file, automatically updates the copy when changes are made to the original.

  25. Answer: B, C. If the MAC is an older workstation, AppleTalk will need to be enabled. However, with newer MACs, TCP/IP will be sufficient for all the machines to communicate.

  26. Answer: B. CSNW stands for Client Services for NetWare. It is used to connect NT clients to NetWare-based servers for access to file and print sharing.

  27. Answer: C. A UNIX client would require an IP address, a correct subnet mask, and a HOSTS file. WINS is used to resolve Windows-based NetBIOS names, and the LMHOST file is used to map out IP addresses with their relevant NetBIOS-named computers.

  28. Answer: C. The Domain Controller (DC) in a Windows Server 2003 environment is the server that clients log in to to receive their access rights to various resources throughout the domain. As a result, the Domain Controller has stored what resources are able to be accessed by what client.

  29. Answer: B. The Active Directory is a hierarchical directory service.

  30. Answer: D. Apple Keychain allows a user to store multiple logins and passwords on a single user login.

  31. Answer: D. Appleshare is used to allow Mac clients to communicate with Windows-based servers using the Apple File protocol (AFP). 802.11A is a wireless protocol.

  32. Answer: A. When a user in a Linux environment wants to authenticate using Kerberos, the request is processed and granted by a Kerberos Key Distribution Center.

  33. Answer: B. Both Admin and Power users groups are able to share folders by default.

  34. Answer: D. There is no difference between mobile users and remote users in the Novell environment.

Objective 3.2

  1. Answer: D. If the card is PnP compatible you can configure the card using software configuration. You must connect using coaxial or UTP cabling with either a BNC or RJ-45 connector, respectively. You should connect the cable first before installing the client software.

  2. Answer: B. When assigning individual user access, there are two terms to understand: rights and profiles. Rights refer to the authorized permission to perform specific actions on the network. Profiles are the configuration settings made for each user. For example, a profile may be created that places a user in a group. This group has been given certain rights to perform specific actions on the network.

  3. Answer: A. DHCP must be running on the server before a client can receive a dynamic IP address from a server.

  4. Answer: B. A share-level security model must be configured on each workstation in the network. Answer A, user-level security, is set up on a server. The administrator can manage all security accounts from a central location rather than visit each workstation each time a change must be made. The network operating system doesn’t directly determine the security model used on a network.

  5. Answer: C. Share-level access applies password protection to the folder level to control, read, and change access.

  6. Answer: B. User-level access applies to permissions assigned to a single user account or group account with similar needs to network resources.

  7. Answer: A. User-level security is more secure and requires a user to provide a login ID, usually a username and password combination to access network resources. Share-level security is not as secure as user-level security. Password level and Layered are not accepted terms for describing levels of security.

  8. Answer: B. Data that is being accessed by another user is placed in Read-Only mode, so that subsequent users accessing the same data at the same time cannot overwrite simultaneously the work being done by the first user.

  9. Answer: A. Replacing hubs with switches is a practical, economical, and very effective way to improve performance on twisted-pair networks. It is the accepted upgrade path in hub-based networks. Although implementing switches is a valid approach, the cost of doing so may be prohibitive, and it is not the best option of those given. Implementing a router is not the most likely approach and would require extensive reconfiguration of the network. Implementing a bridge is not the most likely approach.

  10. Answer: D. A 100BASE-FX fiber-optic NIC will not work with 10BASE-T UTP copper cabling.

  11. Answer: B. When a new card is installed on a token ring network, the speed of the card has to be set to match the speed used by the network. Token ring networks operate at either 4Mbps or 16Mbps. Full-duplex connections are not used on token ring networks. Although it is possible, it is not the most likely that the card is faulty.

  12. Answers: A, B. Because there are multiple segments, a routable protocol is required. Both NetWare and Windows 2000 support the routable TCP/IP and IPX/SPX. The Point-to-Point protocol (PPP) is used for dial-up connections, not as a network transport protocol. NetBEUI is not a routable protocol, nor is it supported by NetWare. Therefore, it is not a suitable protocol for the given configuration.

Objective 3.3

  1. Answer: D. A time domain reflectometer can be used to find the exact location of a break in the cable. A voltmeter can be used to see whether there is continuity of a cable, but it will not tell you where the break is, if one exists. A tone generator and locator can be used to find a cable that is faulty, but it will not help you find the location of the break. Wire taps are used for taking a signal off a line for the purpose of eavesdropping.

  2. Answer: A. A tone generator and locator are two tools used for tracing cables. Collectively they are often referred to as the "fox and hound." A time domain reflectometer is a tool used to locate a break in the cable. A voltmeter is used to measure electrical connectivity and voltages. "Cable chaser" is not a commonly used term. Wire taps are used for taking a signal off a line for the purpose of eavesdropping.

  3. Answer: C. A token-ring media filter is used to interface a token-ring adapter card to a UTP cable.

  4. Answer: C. A cable tester may be equipped with LEDs that illuminate for each wire that isn’t broken, or it may emit a tone to indicate connectivity across the length of the cable.

  5. Answers: A, C. A hardware loopback plug connects the 2 and 6 wires and 1 and 3 wires to simulate a live network connection. The remaining possible answers are not correct for the cabling in a hardware loopback adapter.

  6. Answer: B. A crossover cable is required for this connection. The MDI connection indicates that the hub does not perform the crossover function internally.

  7. Answer: D. Network Monitor and Performance Monitor, both used with Windows NT, 2000, and 2003 operating systems, are examples. They have the advantage of displaying network-related information in both real-time (as it occurs) and in recorded-time (in a log file to be viewed at a later date).

  8. 8. Answer: C. A punch down tool will be required to make the connections in the company’s wiring closet between the incoming line (or lines) and the fan out of cables into the building.

  9. 9. Answers: B, C. A TDR can be used to place active signals on a copper cable for testing. This device measures the amount of time between when the signal is placed on the wire and the time it is reflected back to source. It uses this timing to determine such things as the distance to breaks in the line. The line tester is a simpler device that places signals on the wires and detects them through a loopback process, made possible by a special attachment that must be installed at the end of the cable.

Objective 3.4

  1. Answer: B. Because the same IRQ has been assigned to both NICs, locate any available IRQ to resolve the IRQ conflict. Changing the I/O of the second NIC to B800–B81F is incorrect because the I/O addresses must be unique. The IRQ 10 assigned to both NICs will create a hardware conflict. Locating any available I/O range to resolve the I/O conflict is incorrect because there is no I/O conflict.

  2. Answer: B. There is no apparent resource conflict associated with these settings. However, there could be conflicts with other installed devices. So if actual errors occur with these settings, the resource settings of the other devices in the system should be checked.

  3. Answer: B. Interrupt Request (IRQ) is a setting, assigned to each device in a computer, that’s used to get the attention of the microprocessor. All devices must be assigned unique IRQs so the processor can tell which device it’s servicing. IRQ3 is used on COM 2 or COM4.

  4. Answer: D. The following resources should be configured up for a modem installation: COM port, I/O Address, and Interrupt request settings.

  5. Answer: A. If you have a standalone modem connected to an ISP from your home, you connect to the ISP using the point-to-point (PPP) protocol.

  6. Answer: B. The correct access path to configure RAS on a Windows 2000 Server is Start, Programs, Administrative Tools, Routing, and Remote Access.

  7. Answer: B. If the user is able to access the Internet, then the problem isn’t with the Internet settings. The first thing to do is to attempt a reconnection of the VPN, which is used to allow remote users to access internal corporate resources with the proper credentials.

  8. Answer: C. SASL, or Simple Authentication and Security Layer, is what Apple servers use to determine what authentication protocol to use, if a service is not using Kerberos servers.

Objective 3.5

  1. Answer: B. A firewall server acts to prevent users on external networks from accessing the internal network. You can use any of the popular operating systems as a base for running a firewall application. Browser security does not secure the network itself. A Proxy server system does not actually offer any security, although the proxy functionality is combined with firewall functionality in some products.

  2. Answer: A. Firewall systems protect a network from attack by outside sources. They are placed at the edge of the private network, so they can control traffic from a single point. Although firewalls can be placed at any point on the network, they are not normally placed between two internal networks or between client systems and servers. Firewalls normally reside at the edge of the private network boundary, not outside it.

  3. Answer: D. Because the IP addresses have been made public—or can be deduced from a company’s public presence on the Internet—they are ready targets for intruders. The key point in the question is to determine a means of thwarting outsiders from accessing the network. From the selections, only a firewall filters those whose source IP can be authenticated.

  4. Answer: A. The purpose of the firewall system is to protect one network from another. One of the most common places to see a firewall is to protect a private network from a public one such as the Internet. Although a firewall can provide a single point of access, this is not its primary purpose. A Proxy server allows hostnames to be resolved to IP addresses. A DNS server provides a single point of access to the Internet.

  5. Answer: A. To prevent unauthorized access into a private network from the Internet, you can use a firewall server to restrict outside access. Implementing a more secure password policy may be a good idea, but it is not the best choice of those available. Implementing a file level encryption system may be a good idea, but it is not the best choice of those available. Kerberos is an authentication system, not a method to prevent unauthorized access to the system.

  6. Answer: B. A firewall can provide several different services to the network, including Network Address Translation (NAT), proxy and packet filtering. NAS is Network Attached Storage and is not a function of a firewall server.

  7. Answer: A. A firewall is software or hardware that’s specifically used to prevent intruders from entering a network.

  8. Answer: B. Packet filtering firewalls operate at the network and transport layers.

Objective 3.6

  1. Answers: A, B, D. Using a caching Proxy server allows Internet access to be centralized. Caching Proxy servers reduce the demand on the Internet connection because commonly used Web pages are retrieved from the cache rather than being retrieved from the Internet directly. It is faster to retrieve commonly used Web pages from a cache than from the Internet directly. Automatic assignment of IP addresses to workstations is the function of a DHCP server. Protection of the internal network from attack by outside sources is a function of a firewall system.

  2. Answer: C. A Proxy server is used to prevent network workstation IP addresses from being advertised on the Internet. The Proxy server performs all packet filtering. In addition, the proxy will replace a workstation IP address with a proxy IP address and may also authenticate users via a password for connecting to the Internet.

  3. Answer: D. For traffic inbound from the Internet, the firewall may be configured to prevent any Internet application such as FTP uploads or email. In addition, the firewall may reject all packets that are broadcast to all workstations connected to the Internet. This prevents the network workstations from being a target or unwitting accomplice in attacks against the network.

  4. Answer: C. The purpose of a proxy is to prevent an outsider from learning IP addresses of workstations and servers with the network. Because the outsider doesn’t know the IP address of any device on the network, the physical location of the device can’t be learned, either.

  5. Answer: A. A proxy server caches web pages, so that pages that tend to be frequently accessed overtime will instead be handled by the proxy server, resulting in fewer times that web pages have to be accessed over the Internet, resulting in less bandwidth requirements.

  6. Answer: C. A Proxy server resolves hostnames to IP addresses and replaces workstation IP addresses with proxy IP addresses. The purpose of the firewall system is to protect one network from another. One of the most common places to see a firewall is to protect a private network from a public one such as the Internet. Although a firewall can provide a single point of access, this is not its primary purpose.

  7. Answer: A. A proxy server operates at the application layer of the OSI model.

Objective 3.7

  1. Answer: A. Passwords should not be included in documentation because doing so represents a security risk. Ensuring that passwords are not reused, making sure that users use only "strong" passwords that are a certain length, and changing passwords on a periodic basis are valid procedures that should be included in a password policy.

  2. Answer: C. PaSsWoRd1 contains a mix of upper-and lowercase letters, as well as a number. All other answers contain limited choices that an intruder must attempt when guessing a password. Note that PASSWORD1 is less secure than PaSsWoRd1 because PASSWORD1 contains all uppercase letters.

  3. Answer: B. It implies that a network must be planned before any implementation efforts are made. All other answers are incorrect because they involve activities that should occur after the planning stage.

  4. Answer: A. POP3 operates on Port 110. While there are other services between ports 100 and 200, the other options listed are FTP = 20 and 21, SMTP = 25 and HTTP = 80.

  5. Answer: C. Changing passwords too frequently is not practical and represents a security risk. Monthly password changes are typically adequate for most environments. Changing passwords too frequently can cause problems as users may have trouble remembering passwords and use passwords that are too similar. Although passwords should be changed if they are compromised, they should also be changed periodically.

  6. Answer: C. UNIX/Linux uses the HOSTS file to resolve logical names with their corresponding IP addresses.

  7. Answer: B. User-level security is more secure and requires a user to provide a login ID, usually a username and password combination to access network resources. Share-level security is not as secure as user-level security. Password level and Layered are not accepted terms for describing levels of security.

  8. Answer: A. The HOSTS file is used to manually configure host name resolution and if there is a problem with host name resolution, entries in this file must be checked. Resolv and staticdns are not used on a Linux system. The passwd file is used to store user account information.

  9. Answer: C. The Attribute file permission is not a valid Linux file permission. The rest of possible answers are all valid file permissions on a Linux system.

  10. Answer: A. Users should be given the option of changing passwords whenever they want. If this isn’t possible, establish a policy that forces them to do so at least once a month. Normally, a notice pops up when the monthly time limit approaches, say 10 to 15 days before. Users then have two weeks to make the change. If they don’t, they’ll be prohibited from logging on when the password expires. This is a good system because it incorporates randomness into password changes. If all users change passwords on the same day at the same time, it won’t be too difficult for a hacker to be in the right place at that specific time to catch the new password. Randomness makes it far more difficult for this to happen.

  11. Answer: A. Users should be given the option to change passwords whenever they want. If this isn’t possible, establish a policy that forces them to do so at least once a month. Normally, a notice pops up when the monthly time limit approaches, say 10 to 15 days before. Users then have two weeks to make the change. If they don’t, they’ll be prohibited from logging on when the password expires. This is a good system because it incorporates randomness into password changes. If all users change passwords on the same day at the same time, it won’t be too difficult for a hacker to be in the right place at that specific time to catch the new password. Randomness makes it far more difficult for this to happen.

  12. Answer: D. Users should be given the option of changing passwords whenever they want. If this isn’t possible, establish a policy that forces them to do so at least once a month. Normally, a notice pops up when the monthly time limit approaches, say 10 to 15 days before. Users then have two weeks to make the change. If they don’t, they’ll be prohibited from logging on when the password expires. This is a good system because it incorporates randomness into password changes.

  13. Answer: D. Secure web pages are viewed using HTTPS. HTTPS uses port 443, which is different from a normal web page that uses HTTP over port 80. Therefore, in this scenario, the most likely explanation is that port 443 is being blocked by the firewall, preventing people from accessing any pages that use HTTPS. Standard web pages use HTTP, which uses port 80 by default. Because users can access other areas of the website, this is not the problem. Port 110 is used by POP3, an email retrieval protocol, and is therefore unrelated to this problem. Because users still can access other areas of the website, it does not block all traffic.

  14. Answer: A. SMTP operations reside on port 25. If the firewall has not been configured to allow data on that port, SMTP operations will be blocked, legitimate or not.

  15. Answer: C. Accessing web pages qualifies as HTTP operations, which reside on port 80. If the firewall has not been configured to allow data on that port, all web page access will be blocked, legitimate or not.

  16. Answer: A. A security policy should include keeping user names and passwords at or below eight characters so as to avoid errors when entering, and also to reduce the likelihood of the user forgetting them. Because most password encryption schemes are case-sensitive, the password should include a mix of upper- and lowercase letters as well as numerals and special characters.

Objective 3.8

  1. Answers: A, B, D. VLANs can be created using the IP address, the switch port assignment, or the MAC address of the connected devices. Computer names are associated with NetBIOS and are not used to create VLANs.

  2. Answer: B. VLANS are implemented on a switch to create multiple separate networks. A Proxy server is used to control access to the Internet. Subnet masking is not a valid method of creating separate networks. Network Attached Storage (NAS) describes storage devices that are attached directly to the network media.

  3. Answers: A, C, D. VLANs can be created using the IP address, the switch port assignment, or the MAC address of the connected devices. Computer names are associated with NetBIOS and are not used to create VLANs.

  4. Answer: C. Virtual Private Network (VPN) is a technology that allows a secure tunnel to be created across a network such as the Internet. VPNs can be used to secure a dial-up connection for a remote user or link two sites. 802.11b is an IEEE standard for wireless networking. Virtual LANs (VLANs) are a technology implemented in network switches that allow areas of the network to be segregated from each other using a variety of criteria. A time domain reflectometer (TDR) is a tool that allows you to locate a break in a length of cable.

  5. Answer: C. A VLAN is able to separate a larger network into smaller logical networks. These smaller networks could potentially lower total bandwidth usage.

  6. Answer: A. VLANs require the use of a router to communicate with each other.

  7. Answer: D. Pinging the VPN host will allow you to determine if the VPN is operational or not. If it is not, bringing the VPN back to functionality will fix the problem.

Objective 3.9

  1. Answer: C. The model of two companies working together to share data across the internet can be accomplished via an extranet. An extranet is a private network that supports Internet applications and uses the public telecommunications system to share company information with users, customers, and partners.

  2. Answer: B. An intranet is a private network that supports Internet applications and doesn’t use the public telecommunications system to connect users.

  3. Answer: B. An intranet is a private network that supports Internet applications and doesn’t use the public telecommunications system to connect users, which offers the best security.

  4. Answer: B. An intranet is a private network that supports Internet applications (such as email and web browsing) but does not use the public telecommunications system to connect users. The web server in an intranet may be used only for an internal website that isn’t accessible from the public Internet.

  5. Answer: D. An intranet is a network built on the TCP/IP protocol that belongs to a single organization. It is, in essence, a private Internet. Like the Internet, intranets are designed to share information and services but they are accessible only to the organization’s members with authorization. In an intranet system, a local web server provides Internet applications, such as email, FTP, and web browsing for the network without using the public telephone system.

  6. Answer: D. A hardware or software firewall is typically employed to block unauthorized, outside users from accessing the intranet site.

  7. Answer: B. The Internet, not an intranet, is designed to be publicly available.

  8. Answer: C. An extranet is a private network that supports Internet applications and uses the public telecommunications system to share company information with users, customers, and partners.

  9. Answer: B. An extranet is a private network that supports Internet applications and uses the public telecommunications system to share company information with users, customers, and partners. Essentially, an extranet extends an intranet to the public Internet. Parts of an extranet remain private and separate from the Internet, while other parts of it are accessible from the Internet.

  10. Answer: C. An extranet is a private network that supports Internet applications and uses the public telecommunications system to share company information with users, customers, and partners.

  11. Answer: A. An extranet is a private network that supports Internet applications and uses the public telecommunications system to share company information with users, customers, and partners. Essentially, an extranet extends an intranet to the public Internet. Parts of an extranet remain private and separate from the Internet, while other parts of it are accessible from the Internet.

Objective 3.10

  1. Answer: A. Antivirus software can stop Trojan programs. However, other software would have to be installed to effectively deal with the problems posed by spam, pop-up ads, and spyware.

  2. Answer: A. A computer virus is an unwanted software program that can attach itself to another program on a disk or hide in a computer’s memory, and can multiply from one system to another.

  3. Answer: A. All workstations should have antivirus software installed including an email server. Email received from the Internet is the most common source of viruses.

  4. Answer: B. Proxy servers represent a potential hole through which intruders may enter a network. Since a proxy server receives all HTTP responses from web servers, it may also be a source for viruses. The best protection against web server viruses is to install antivirus software on all proxy servers along with all client workstations.

  5. Answer: B. For an antivirus software package to be most effective across a network, one guideline to follow is before installing a new application, the user should deactivate the antivirus scanner.

  6. Answer: B. All email attachments should be scanned before opening them because email is the most common carrier of viruses from the Internet.

  7. Answer: D. For users that have an FTP client, you should ensure that FTP files are scanned for viruses when opened, before being saved to a disk, and before being executed.

  8. Answer: C. You should update virus signatures on a monthly basis (at a minimum), and more often for recent virus attacks.

  9. Answer: D. When receiving code from a third party, be sure to scan it for viruses before using it.

Objective 3.11

  1. Answer: A. Disk striping with parity (RAID 5) uses a minimum of three disks. With two disks, the only fault-tolerant RAID level that can be implemented is RAID 1 (disk mirroring). There are no fault-tolerant configurations that only use a single disk. With four disks, it is possible to implement RAID 5, although only three disks are actually required.

  2. Answer: D. Striping with parity means that data is written in stripes of bits, or bytes, usually across multiple hard drives. Parity refers to a section allotted on the drive that’s used to regenerate lost data. Striping enhances drive performance; whereas parity provides for fault tolerance. Tape backup provides for fault tolerance only, but doesn’t address performance. Mirroring provides for fault tolerance but doesn’t necessarily boost performance because writes to the drive must be duplicated to the mirror drive (it typically improves reads from the drive, however). Striping without parity addresses performance but not fault tolerance.

  3. Answer: B. Duplexing is used to provide a dedicated drive controller to each hard drive. This directly addresses fault tolerance and network reliability by providing redundancy. Parity is a reference to using a portion of a drive to regenerate lost data. Striping refers to improving hard drive performance and doesn’t address fault tolerance. SNMP (Simple Network Management Protocol) has nothing to do with dedicated controller cards.

  4. Answers: A, C, D. Disk mirroring (RAID 1) requires two hard disks and a single hard disk controller. Disk duplexing, which is a variation of RAID 1, uses two hard disks connected to two separate disk controllers. Although not a fault-tolerant implementation, RAID 0 uses disk striping to provide increased performance. Two disks are required to implement RAID 0. Disk striping with parity (RAID 5) requires a minimum of three disks. Disk shadowing is not a valid RAID implementation.

  5. Answer: B. An Uninterruptible Power Supply (UPS) is connected in series with a server. The server receives all power from the UPS. A stand-by power supply is used when the main power fails, causing the supply to switch to the SPS. An SPS always has a delay factor that may cause a loss of data during the switching time. Note that both a UPS and an SPS are alternative power supplies. The key to choosing correctly for this question is the hint in the question, "true, continuous power." Only a UPS provides this.

  6. Answers: A, B, C. With two hard disks and two controllers you can implement RAID 0, RAID 1, and disk duplexing. RAID 5 (disk striping with parity), requires a minimum of three disks to be implemented. RAID 10 is a combination of RAID 1 (disk mirroring) and RAID 0 (disk striping). It requires a minimum of four disks.

  7. Answer: A. A RAID 5 array consists of at least three hard disks and stripes parity information across all disks in the array.

  8. Answer: D. Fault tolerance promotes data availability by eliminating a single point of failure. It may reduce the reliance on backups, but they should still be performed. A fault-tolerant system does not help a system be brought back on line more quickly. Fault tolerance does not protect data from accidental deletion.

  9. Answer: A. Striping means that a block of data is separated and alternately written to sectors on each of the three disks. For example, suppose a 48KB file is written to the disks. RAID 0 will write 16KB to the first drive, 16KB to the second drive, and 16KB to the third drive. In other words, data blocks are striped across the fixed disks.

  10. Answer: B. RAID 0 doesn’t provide for redundancy; therefore, it has no fault tolerance attributes. RAID 0 provides improved throughput without parity. Parity is used with the other levels as a means for regenerating data, if it’s lost on any of the fixed disks. If a fixed disk is lost in a RAID 0 system, all data is lost, and there is no means of recovering it; that is, it has no parity for data recovery.

  11. Answer: D. A technique for avoiding this possibility is to duplex RAID 1 by using separate disk controllers for each fixed disk. Duplexing refers to the practice of using a separate disk controller for each fixed disk.

  12. Answer: D. RAID 1, in which data on a primary disk is copied to a mirror disk. Mirroring is a RAID term meaning simply that all data written to one hard drive is simultaneously written to a backup—or mirror—hard drive.

  13. Answers: A, B, C. Installing a UPS, a RAID system, and a mirror server all represent steps aimed at keeping the system going when something breaks down. Performing a backup is an activity designed for disaster recovery instead of continuation.

  14. Answer: A. Duplexing the RAID 1 system by adding an additional controller removes the controller as a single point of failure.

  15. Answer: B. Striping with parity means that data is written in stripes of bits, or bytes, usually across multiple hard drives. Parity refers to a section allotted on the drive that’s used to regenerate lost data. Striping enhances drive performance; whereas parity provides for fault tolerance. Tape backup provides for fault tolerance only, but doesn’t address performance. Mirroring provides for fault tolerance but doesn’t necessarily boost performance because writes to the drive must be duplicated to the mirror drive (it typically improves reads from the drive, however). Striping without parity addresses performance but not fault tolerance.

  16. Answer: B. Because the drive subsystem is duplexed, the drives will remain intact and will operate from the remaining controller. However, the performance will decrease because now only one channel is open for data movement.

  17. Answer: A. Because the data drives are striped without any sort of parity, when one drive fails, both drives are rendered inoperable. There is no ability to rebuild the drives, so one would have to replace the drive and restore the contents from backup.

  18. Answer: D. Striping offers no fault tolerance. Mirror and duplexing both require that half the hard drives be used for data redundancy. Striping with parity takes one hard drive’s worth of data and uses it for parity purposes.

  19. Answer: D. RAID 0 offers no fault tolerance. RAID 1 and mirroring both require that half the hard drives be used for data redundancy. Striping with parity takes the equivalent of one hard drive’s worth of space and distributes it across all the drives for parity purposes.

  20. Answer: C. A volume is used to subdivide partitions into smaller units. With four allowable partitions on each disk, you can have up to eight volumes on a disk. Whereas a partition is limited to a single disk, a volume can span multiple disks. A volume is organized into logical groupings, such as user directories for various departments (for example, sales, production, and so on). A volume can also be created to contain application software available across the network.

Objective 3.12

  1. Answers: A, B. In an incremental and a full backup, files that are copied to the backup media have the archive bit cleared. A differential backup does not clear the archive bit. Periodic is not an accepted backup method.

  2. Answer: C. Grandfather, Father, Son (GFS) is a backup rotation system that incorporates daily, weekly, and monthly backups. RAID rebuilds are only performed on an as- and a when-needed basis. Tapes should be replaced in a backup cycle periodically, although there is no accepted standard for this action.

  3. Answer: D. A normal backup, also called a full backup, is used to copy all files on a server or workstation, or files that have been selected for copy.

  4. Answer: B. An incremental backup is performed only on files that have changed since the last backup. A full backup is used to back up all selected files, regardless of whether they have changed. Differential is incorrect because this method will back up files that have changed since the last backup as well as all other files that have changed since the last full backup. Differential backups are cumulative, whereas incremental backups are selective. A tape backup is a backup technique rather than a backup method.

  5. Answer: B. A daily normal backup can use as little as one tape. The single tape is used each day to perform a full backup of the server data.

  6. Answer: B. Although this is subjective, note that as a general rule, a full backup occurs on a weekly basis.

  7. Answer: A. Differential is used to back up files on a server. The advantage is that it is easier to restore from this because you only need the last full and the latest differential. It is also less time consuming during backups than repeatedly performing full backups. The disadvantage is that with each differential backup, more tape space is needed progressively closer to the requirements of a full backup.

  8. Answer: B. A weekly normal backup provides a full backup to the server. The daily incremental backups are short because only files that have changed since the last incremental backup are copied.

  9. Answer: D. Environmental disasters include fire, theft, flooding, or a crash of the server hard drive.

  10. Answers: A, B. Both the full and incremental backup methods clear the archive bit. This indicates which data does and does not need to be backed up. In a differential backup, the archive bit is not cleared. Sequential is not a type of backup.

  11. Answer: B. Normal backup, also called a full backup, means that all data on a hard drive is backed up, regardless of the state of the archive bit. Because all data from the hard drive is backed up this backup takes the longest.

  12. Answer: C. Sometimes a full backup is needed —perhaps once a week—but it should be augmented with more efficient planning.

  13. Answer: D. Normal backup, also called a full backup, means that all data on a hard drive is backed up, regardless of the state of the archive bit.

  14. Answer: A. Servers and workstations employ data backups in the event of a disaster that may destroy crucial data. The most common method used to back up data is tape. A tape backup system is used to back up the data stored on fixed disks.

  15. Answer: D. A differential backup occurs for all files that have changed since the last full backup, regardless of whether they changed since the last differential backup. The archive bit is set to 1 when the file is modified and not reset after the backup.

  16. Answer: B. Incremental backup occurs only on files that have changed since the last full backup. A change to a file will set the archive bit to 1, thus flagging it for the backup.

  17. Answer: C. The only reliable way to be certain that a backup system will perform correctly in the event of a failure is to actually perform a Restore operation in a test environment when no actual problem exists.

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020