Home > Articles

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Domain 3 Practice Questions

Objective 3.1

3.1 Identify the basic capabilities (For example: client support, interoperability, authentication, file and print services, application support and security) of the following server operating systems to access network resources: UNIX / Linux / Mac OS X Server, Netware, Windows, Appleshare IP (Internet Protocol).
  1. What service would you install to allow Microsoft clients access to Linux resources?

    1. Samba

    2. SMB

    3. AFP

    4. Printer Services for UNIX

  2. Where would you go to add a user account in Windows 2000 Server?

    1. Routing and Remote Access

    2. Server Manager

    3. User Manager for Domains

    4. Active Directory Users and Computers

  3. By default, what highest-level permission does the Everyone group have?

    1. Read-only

    2. Hidden

    3. Full control

    4. Encrypted

  4. Which service would be the best solution if you needed to connect 500 Windows 2000 clients to a NetWare resource?

    1. GSNW

    2. Printer Services for Macintosh

    3. Novell Client 4.91

    4. CSNW

  5. Which service would be the best solution to allow Novell clients access to Microsoft resources?

    1. GSNW

    2. FPNW

    3. File and Printer Sharing

    4. CSNW

Objective 3.2

3.2 Identify the basic capabilities needed for client workstations to connect to and use network resources (For example: media, network protocols and peer and server services).
  1. What are the two main services in Windows 2000 Professional and Server? (Select two.)

    1. Workstation

    2. Messenger

    3. Server

    4. Redirector

  2. What command will display the services that are running on a remote machine?

    1. netstat

    2. ping

    3. arp

    4. nbtstat

  3. Which console window will give you information on all of the various services?

    1. RRAS

    2. Active Directory Users and Computers

    3. Computer Management

    4. Device Manager

  4. Which option of nbtstat will show the remote computer's name table given its IP address?

    1. –a

    2. –r

    3. –R

    4. –A

  5. Which hexadecimal number identifies the Server service?

    1. <20>

    2. <03>

    3. <1f>

    4. <00>

Objective 3.3

3.3 Identify the appropriate tool for a given wiring task (For example: wire crimper, media tester / certifier, punch down tool or tone generator).
  1. What type of connector do you punch down to on a 568B patch panel?

    1. 110 IDC

    2. 66 connector

    3. USB

    4. Screw terminal

  2. Which device will test a 568B twisted pair cable run from the patch panel to the RJ-45 jack? Select the best answer.

    1. Patch tester

    2. TDR

    3. Continuity tester

    4. Wire stripper

  3. Which is the more common wiring standard?

    1. 568A

    2. 568B

    3. 619A

    4. 568C

  4. Which device will aid you in connecting cables to a patch panel?

    1. Crimper

    2. RJ-45 patch tester

    3. Punch down tool

    4. TDR

  5. What is a common mistake when wiring patch panels?

    1. Reversed pair

    2. RJ-45 plug is upside down

    3. Punched down too many times

    4. Crimped the plug too hard

Objective 3.4

3.4 Given a remote connectivity scenario comprised of a protocol, an authentication scheme, and physical connectivity, configure the connection. includes connection to the following servers: UNIX / Linux / MAC OS X Server, Netware, Windows, Appleshare IP (Internet Protocol).
  1. Which would be considered a more secure VPN connection?

    1. PPTP

    2. L2TP

    3. L2TP with IPSec

    4. IPSec

  2. What port would you open on your SOHO router if you wanted to connect to your home network remotely?

    1. 3389

    2. 1723

    3. 80

    4. 23

  3. What path would you type in the browser's address bar if you wanted to request a secure certificate from the server on your LAN?

    1. http://www.verisign.com

    2. https://servername

    3. http://certificateserver

    4. http://servername/certsrv

  4. L2TP works on which layer of the OSI model?

    1. Network

    2. Application

    3. Data link

    4. Session

  5. What do you need to turn on the server to allow L2TP to function properly?

    1. IP security policy

    2. Auditing

    3. NTFS permissions

    4. IPSec

Objectives 3.5–3.9

3.5 Identify the purpose, benefits and characteristics of using a firewall.3.6 Identify the purpose, benefits and characteristics of using a proxy service.3.7 Given a connectivity scenario, determine the impact on network functionality of a particular security implementation (For example: port blocking / filtering, authentication and encryption).3.8 Identify the main characteristics of VLANs (Virtual Local Area Networks).3.9 Identify the main characteristics and purpose of extranets and intranets.
  1. If you wanted to close port 25, which service would you shut off?

    1. NNTP

    2. SMTP

    3. SNMP

    4. SMB

  2. Which port number is used by L2TP?

    1. 1723

    2. 1724

    3. 1700

    4. 1701

  3. Which of these devices would be known as multi-homed machines? (Select two.)

    1. Router

    2. IP proxy

    3. Domain controller

    4. WINS Server

  4. If you were staying at a hotel and wanted to VPN to your home network, which of the following would you have to enable on your SOHO router?

    1. Port triggering

    2. DMZ

    3. Port forwarding

    4. Port replication

  5. Which of these is the most common type of VLAN?

    1. Router based

    2. Port based

    3. MAC based

    4. Protocol based

Objectives 3.10–3.12

3.10 Identify the purpose, benefits and characteristics of using antivirus software.3.11 Identify the purpose and characteristics of fault tolerance: Power, Link redundancy, Storage, Services.3.12 Identify the purpose and characteristics of disaster recovery: Backup / restore, Offsite storage, Hot and cold spares, Hot, warm and cold sites.
  1. Which fault tolerant method uses two disks only?

    1. RAID 0

    2. RAID 1

    3. RAID 5

    4. Striped volumes

  2. Which of the following will protect you against viruses?

    1. Firewall

    2. UPS

    3. Line conditioner

    4. AV software

  3. Which of these disperses resource usage among multiple computers?

    1. Fail-over clustering

    2. RAID 5

    3. True clustering

    4. RAID 1

  4. Which program allows you to back up the system state?

    1. RAID 1

    2. RRAS

    3. nbtstat –a

    4. ntbackup

  5. Which fault-tolerant method stripes data and parity across multiple disks?

    1. RAID 0

    2. RAID 1

    3. Disk duplexing

    4. RAID 5

  • + Share This
  • 🔖 Save To Your Account