Which one of the following protocols is primarily used for communications with IBM mainframes?
Choice 1
SPX
Choice 2
SNA*
Choice 3
DECnet
Choice 4
TCP/IP
Choice 5
NetBEUI
Your organization has grown considerably. Upgrading each desktop's applications is becoming a nuisance. You have decided to implement an application server that distributes one application to all workstations.
What is the term for the process described above?
Choice 1
A software management system
Choice 2
A peer-to-peer network
Choice 3
Client/Server computing
Choice 4
Data warehousing
Choice 5
Data server computing
Network Technical Support, Question 2 of 40
Which one of the following protocols, if configured, will allow connection-oriented communication between hosts?
Choice 1
UDP
Choice 2
ICMP
Choice 3
DNS
Choice 4
SPX
Choice 5
NTP
Network Technical
Which one of the following protocols can end users employ to retrieve e-mail from a server?
Choice 1
SMTP
Choice 2
DNS
Choice 3
POP3
Choice 4
TCP/IP
Choice 5
MSGP
Which one of the following services must be running on a network to enable the resolution of hostnames to IP addresses?
Choice 1
RARP
Choice 2
ARP
Choice 3
DNS
Choice 4
SNMP
Choice 5
ICMP
Network Technical Support, Question 5 of 40
Which one of the following routing methods requires the administrator to manually configure hosts with routing information?
Choice 1
IGRP
Choice 2
BGP
Choice 3
OSPF
Choice 4
RIP
Choice 5
Static routing
Network Technical Support, Question 6 of 40
Which one of the following protocols is NOT routable?
Choice 1
IPX
Choice 2
SPX
Choice 3
TCP/IP
Choice 4
NetBEUI
Choice 5
UDP
Network Technical Support, Question 7 of 40
Image
Token Ring
|
|
?
|
Ethernet
Referring to the image above, which one of the following networking devices will enable you to interconnect the two networks?
Choice 1
Hub
Choice 2
Switch
Choice 3
Repeater
Choice 4
Router
Choice 5
Concentrator
Network Technical Support, Question 8 of 40
Take a 15 minute break AFTER this question (one per test)
Image
Internet
|
Firewall
|
Mailserver
|
protected network
Your firewall configuration is shown above. Internet users report that they CANNOT send mail to local users. You should ensure your firewall is allowing mail to pass from the Internet to the mail server via which one of the following ports?
Choice 1
Port 18
Choice 2
Port 25
Choice 3
Port 80
Choice 4
Port 110
Choice 5
Port 132
Network Technical Support, Question 9 of 40
Which one of the following types of DNS records maps a DNS name to an IP address?
Choice 1
SRV
Choice 2
PTR
Choice 3
A
Choice 4
MX
Choice 5
CNAME
Network Technical Support, Question 10 of 40
Take a 15 minute break AFTER this question (one per test
What is the name of the service that gives users and administrators transparent access to all network resources, including users, printers, and servers regardless of physical location of the resource?
Choice 1
Message Services
Choice 2
Database Services
Choice 3
Application Services
Choice 4
Directory Services
Choice 5
MAPI Services
Image
Drive1Drive2
File1File1
File2File2
File3File3
In the figure above, each drive contains complete copies of the files shown. Which one of the following types of fault tolerance strategies is illustrated?
Choice 1
Clustering
Choice 2
Redundant processing
Choice 3
Disk mirroring
Choice 4
Disk striping without parity
Choice 5
Disk striping with parity
Network Technical Support, Question 12 of 40
Take a 15 minute break AFTER this question (one per test)
Which one of the following devices operates at the OSI Data Link layer?
Choice 1
Transceiver
Choice 2
Hub
Choice 3
Bridge
Choice 4
Router
Choice 5
Repeater
Which one of the following utilities can you use to configure backup sessions for NetWare 5?
Choice 1
NBACKUP
Choice 2
SBACKUP
Choice 3
NWBACK32
Choice 4
QMAN
Choice 5
ADMTOOL
Network Technical Support, Question 14 of 40
Which one of the following programs migrates user and group data from a NetWare server to a Windows NT server?
Choice 1
NWMIGRATE.EXE
Choice 2
NWCONVERT.EXE
Choice 3
MIGRATE.EXE
Choice 4
NWMIGR.EXE
Choice 5
NWCONV.EXE
Network Technical Support, Question 15 of 40
Scenario
You suspect a bad Ethernet card on your Unix machine and want to check the number of errors that have occurred on that interface.
Referring to the above scenario, which one of the following commands can you use to view this and other information about your card?
Choice 1
nbtstat
Choice 2
ipcon
Choice 3
configip
Choice 4
netstat
Choice 5
tcpconfig
Which one of the following Cisco IOS commands can you use to display all EIGRP and RIP paths in an IPX network?
Choice 1
show ipx destinations
Choice 2
show ipx route
Choice 3
show ipx eigrp topology
Choice 4
debug ipx routing
Choice 5
debug ipx eigrp route
Network Technical Support, Question 17 of 40
Take a 15 minute break AFTER this question (one per test)
An important aspect of RAID 3 is the addition of the parity drive. This feature provides an added level of data integrity. What does the parity drive do?
Choice 1
It works as a file allocation table, ensuring that data can be accessed easily across the drives.
Choice 2
It allows data to be read one bit at a time across the drives, utilizing all the drive heads, thus improving performance.
Choice 3
It adds another drive to be included in the pairing process of mirroring drives with RAID 3.
Choice 4
It stores information about the data stored on the other drives, so that if one drive fails, the missing data can be rebuilt.
Choice 5
It stores deleted files, so that users can recover files deleted by accident.
You need to set up two separate websites with different domain names on a single server. The two sites should appear completely separate to users of all browser versions.
Which one of the following methods should you use to implement the system described above?
Choice 1
Domain segregation
Choice 2
Host indirection
Choice 3
Reverse DNS
Choice 4
Host headers
Choice 5
Virtual servers
Network Technical Support, Question 19 of 40
Scenario
You are attempting to configure a peer-to-peer network. When you connect two computers directly, they communicate properly. However, when you attempt to connect them through a hub, communications fail. You have replaced the hub several times, but replacing it has NOT solved the problem.
Referring to the scenario above, which one of the following circumstances could have caused this problem?
Choice 1
Different cables are required for hubs and direct connections.
Choice 2
The MTU has been exceeded by the addition of the hub.
Choice 3
You have incorrectly configured the frame type.
Choice 4
Hubs cannot be used in this scenario
Choice 5
Adding a hub increases the hop count and exceeds the network TTL.
Network Technical Support, Question 20 of 40
Referring to the figure above, at what layer of the OSI model does ASCII conversion occur?
Choice 1
Transport layer
Choice 2
Presentation layer
Choice 3
Session layer
Choice 4
Physical layer
Choice 5
Network layer
Network Technical Support, Question 21 of 40
Take a 15 minute break AFTER this question (one per test)
Which one of the following IEEE documents defines the standards for Token Ring networks?
Choice 1
802.2
Choice 2
802.3
Choice 3
802.5
Choice 4
802.9
Choice 5
802.11
Network Technical Support, Question 22 of 40
Which one of the following is NOT a valid NetBIOS session state?
Choice 1
Abnormal End
Choice 2
Pending Listen
Choice 3
Pending Synchronization
Choice 4
Pending Call
Choice 5
Session Established
Network Technical Support, Question 23 of 40
Take a 15 minute break AFTER this question (one per test)
What process determines if inactive SPX sessions should be closed?
Choice 1
Recycler
Choice 2
Sanitation
Choice 3
Watchdog
Choice 4
Buffer
Choice 5
Threader
What is the minimum number of disks required to implement disk striping without parity?
Choice 1
1 disk
Choice 2
2 disks
Choice 3
3 disks
Choice 4
4 disks
Choice 5
5 disks
Network Technical Support, Question 25 of 40
Referring to the figure above, which layer of the OSI model coordinates acknowledgements and retransmissions?
Choice 1
Transport layer
Choice 2
Data link layer
Choice 3
Network layer
Choice 4
Application layer
Choice 5
Physical layer
Network Technical Support, Question 26 of 40
Which one of the following services allows an organization to present a single IP address to the outside world while maintaining a large number of addresses on their internal network?
What is the minimum number of disks required to implement disk striping with parity?
Choice 1
1 disk
Choice 2
2 disks
Choice 3
3 disks
Choice 4
4 disks
Choice 5
5 disks
Network Technical Support, Question 29 of 40
Take a 15 minute break AFTER this question (one per test)
Scenario
You have been assigned a Class C IP address and are configuring subnets for it. You wish to allow for the maximum number of subnets with each containing up to 16 hosts.
Which one of the following subnet masks meets the requirements of the scenario above?
Choice 1
255.255.0.0
Choice 2
255.255.255.0
Choice 3
255.255.255.64
Choice 4
255.255.255.128
Choice 5
255.255.255.224
Network Technical Support, Question 30 of 40
Which one of the following features do both the IPX and SPX protocols use in network address creation?
Choice 1
IP Address
Choice 2
Isolation Level
Choice 3
CPU Identifier
Choice 4
MAC Address
Choice 5
Random Seed
Network Technical Support, Question 31 of 40
If you configure bind on a Unix system, for which one of the following services are you adding support?
Choice 1
DNS
Choice 2
HTTP
Choice 3
FTP
Choice 4
SMTP
Choice 5
NFS
Network Technical Support, Question 32 of 40
Take a 15 minute break AFTER this question (one per test)
Which one of the following technologies extends Microsoft's OLE client/server architecture to the Internet?
Choice 1
CGI
Choice 2
OLE
Choice 3
CORBA
Choice 4
Java
Choice 5
ActiveX
Network Technical Support, Question 33 of 40
Image
You are configuring a Windows NT Workstation on your LAN to access the Internet. Your router has two NICs, an internal one (10.74.13.51) and an external one (129.74.18.142). Which value should you place in the red box above?
You are responsible for designing and configuring a WAN connection between two offices. The link type you choose must be capable of at least 1 mbps throughput.
Which one of the following link types meets the requirements of the scenario above at the lowest cost?
Choice 1
T-3
Choice 2
T-1
Choice 3
POTS
Choice 4
OC-3
Choice 5
ISDN BRI
Network Technical Support, Question 36 of 40
You are configuring a network of five computers for a small group of users that only occasionally needs to access resources on other machines.
Referring to the scenario above, which one of the following types of networks meets the group's requirements with the least administrative overhead?
Choice 1
Client/Server
Choice 2
Binary
Choice 3
WAN
Choice 4
Domain
Choice 5
Peer-to-Peer
Network Technical Support, Question 37 of 40
Scenario
Your organization maintains two offices in different parts of the city, and you need to select a networking solution to connect them. The network is a private network, and no connections outside of the company are required. The corporate IT department needs to maintain end-to-end control.
Which one of the following link types meets the requirements of the scenario above?
Choice 1
Frame relay
Choice 2
Leased line
Choice 3
T-1
Choice 4
T-3
Choice 5
Dial-up ISP
Network Technical Support, Question 38 of 40
Image
?
&&
a&HUBHUB&efgh
bcd
& - connection
Referring to the image above, which one of the following networking devices should you place in the box marked "?" to ensure that A & E are in separate broadcast domains?
Choice 1
Repeater
Choice 2
Router
Choice 3
Firewall
Choice 4
Hub
Choice 5
Terminator
Network Technical Support, Question 39 of 40
Image
NT Client
|
(network)
|
Router
|
(network)
|
Router
|
Unix popserver
Referring to the network above, in order for the client to access the POP server, which one of the following protocols must be configured to run on the client?