1. (p. 331) Why
is a server in a client/server model called dedicated?
A. A user can sit at the server keyboard and run applications.
B. It is a dedicated client.
C. It is dedicated to serving over the network.
D. A server can see clients that are sharing resources.
A. A user can sit at the server keyboard and run applications.
B. It is a dedicated client.
C. It is dedicated to serving over the network.
D. A server can see clients that are sharing resources.
2. (p. 330) Computers
that both serve and access data participate in which kind of network?
A. VPN
B. Client/Server
C. VLAN
D. Peer-to-peer
A. VPN
B. Client/Server
C. VLAN
D. Peer-to-peer
3. (p. 331) Which
of the following is an example of a network operating system in a classic
client/server network?
A. Windows for Workgroups
B. Windows 98
C. Microsoft Server operating systems
D. Novell NetWare
A. Windows for Workgroups
B. Windows 98
C. Microsoft Server operating systems
D. Novell NetWare
4. (p. 332) In
early Windows systems there were no user accounts, and permissions on a share
could be set to one of two levels. What were these two levels? (Select all
that apply)
A. File Scan
B. Read Only
C. Full Control
D. Write Only
E. Both B and C
A. File Scan
B. Read Only
C. Full Control
D. Write Only
E. Both B and C
5. (p. 333) What
acronym is used to refer to modern peer-to-peer applications?
A. P2P
B. PPTP
C. VPN
D. L2TP
A. P2P
B. PPTP
C. VPN
D. L2TP
6. (p. 334) What
types of networks supply a great deal of complexity, security, and power, and
are made possible through the use of advanced networking devices? (Select all
that apply.)
A. virtual private networks (VPNs)
B. Ethernet LANs
C. dial-up
D. virtual LANs
E. Both A and D
A. virtual private networks (VPNs)
B. Ethernet LANs
C. dial-up
D. virtual LANs
E. Both A and D
7. (p. 334) Using
an encrypted tunnel between a computer (or remote network) and a private
network is an example of using this type of network.
A. peer-to-peer
B. client/server
C. dial-up
D. virtual private network (VPN)
A. peer-to-peer
B. client/server
C. dial-up
D. virtual private network (VPN)
8. (p. 332) Which
of the following is a common example of an operating system designed for
peer-to-peer networking?
A. Linux
B. Windows 98
C. Microsoft Exchange Server
D. Novell NetWare
A. Linux
B. Windows 98
C. Microsoft Exchange Server
D. Novell NetWare
9. (p. 333) This
is one example of the many programs that use the BitTorrent file-sharing
protocol in modern peer-to-peer implementations.
A. µTorrent
B. IDS
C. IPS
D. PPTP
A. µTorrent
B. IDS
C. IPS
D. PPTP
10. (p. 335) What
two tunnel protocols enable tunnel endpoints to act like NICs on the same
network? (Select all that apply.)
A. VLAN
B. RRAS
C. PPTP
D. L2TP
E. Both C and D
A. VLAN
B. RRAS
C. PPTP
D. L2TP
E. Both C and D
11. (p. 335) On
the Windows side of a PPTP connection, you run "Create a New
Connection" with what result?
A. An RRAS server is created.
B. A DHCP server is created.
C. A dial-up connection is created.
D. A virtual NIC is created.
A. An RRAS server is created.
B. A DHCP server is created.
C. A dial-up connection is created.
D. A virtual NIC is created.
12. (p. 336) A
client using a PPTP VPN to connect to a private LAN will have an IP address of
that network, just as if it were directly connected to the LAN, right down to this
IP configuration setting, which will control where that client's packets with
destination addresses beyond the LAN will be sent.
A. DNS
B. default gateway
C. WINS
D. PPP
A. DNS
B. default gateway
C. WINS
D. PPP
13. (p. 337) IPSec
usually provides the security for this type of VPN.
A. PPTP
B. PPP
C. L2TP
D. VLAN
A. PPTP
B. PPP
C. L2TP
D. VLAN
14. (p. 337) Which
of the following are the two tunneling protocols used by the majority of VPNs?
(Select all that apply.)
A. PPTP
B. OpenVPN
C. L2TP
D. IPSec
E. Both A and C
A. PPTP
B. OpenVPN
C. L2TP
D. IPSec
E. Both A and C
15. (p. 337) What
type of advanced network device is used to create VLANs?
A. hub
B. switch
C. router
D. bridge
A. hub
B. switch
C. router
D. bridge
16. (p. 338) In
order to have a VLAN span two switches, you must configure a port on each
switch to carry all data, regardless of VLAN number, between the switches. What
is the term for this port?
A. logical port
B. trunk port
C. assigned port
D. port 0
A. logical port
B. trunk port
C. assigned port
D. port 0
17. (p. 339) This
trunk standard enables you to connect switches from different
manufacturers.
A. IEEE 802.1X
B. IEEE 802.11
C. IEEE 802.1Q
D. IEEE 802.3
A. IEEE 802.1X
B. IEEE 802.11
C. IEEE 802.1Q
D. IEEE 802.3
18. (p. 339) If
a switch contains a Web page that you must connect to in order to configure it,
then the switch must also have this type of address for accessing that Web
page.
A. MAC address
B. VLAN number
C. IP address
D. well-known port address
A. MAC address
B. VLAN number
C. IP address
D. well-known port address
19. (p. 340) What
is the common term for a VLAN based on MAC addresses?
A. static vlan
B. routed vlan
C. dynamic vlan
D. managed vlan
A. static vlan
B. routed vlan
C. dynamic vlan
D. managed vlan
20. (p. 341) What
is the Cisco term for a feature in a special switch that will provide routing
between VLANs?
A. virtual routing
B. InterVLAN routing
C. VLAN-VLAN routing
D. trunking
A. virtual routing
B. InterVLAN routing
C. VLAN-VLAN routing
D. trunking
21. (p. 342) What
is another term for a Layer 3 switch?
A. concentrator
B. router
C. hub
D. bridge
A. concentrator
B. router
C. hub
D. bridge
22. (p. 344) In
this type of load balancing, one domain name is assigned to many servers, using
different IP addresses.
A. DNS load balancing
B. round robin
C. content switching
D. proxy
A. DNS load balancing
B. round robin
C. content switching
D. proxy
23. (p. 345) A
popular option for load balancing is to hide all the Web servers behind a
single IP address using a special multilayer switch that performs these two
types of operations. (Select all that apply.)
A. NAT
B. port forwarding
C. tunneling
D. round robin
E. both A and B
A. NAT
B. port forwarding
C. tunneling
D. round robin
E. both A and B
24. (p. 346) CompTIA
uses this term to refer to routers and switches that can perform traffic
shaping.
A. traffic routers
B. quality of service routers
C. bandwidth shapers
D. port blockers
A. traffic routers
B. quality of service routers
C. bandwidth shapers
D. port blockers
25. (p. 347) This
system adds the capability to react to an attack detected by another
component.
A. intrusion detection system (IDS)
B. host-based IDS (HIDS)
C. intrusion prevention system (IPS)
D. network-based IDS (NIDS)
A. intrusion detection system (IDS)
B. host-based IDS (HIDS)
C. intrusion prevention system (IPS)
D. network-based IDS (NIDS)
26. (p. 347) Some
advanced switches have this ability to mirror data from any or all physical
ports to a single physical port in order to monitor traffic.
A. port blocking
B. port mirroring
C. load balancing
D. port authentication
A. port blocking
B. port mirroring
C. load balancing
D. port authentication
27. (p. 340) Some
IDS/IPS products will use this advanced switch capability so that
administrators can examine all the packet traffic for certain ports.
A. port blocking
B. port mirroring
C. proxying
D. port authentication
A. port blocking
B. port mirroring
C. proxying
D. port authentication
28. (p. 348) This
is the most common type of proxy server.
A. HTTP
B. DNS
C. FTP
D. Gopher
A. HTTP
B. DNS
C. FTP
D. Gopher
29. (p. 345) How
are QoS policies often implemented?
A. trunking
B. traffic shaping
C. port mirroring
D. content switching
A. trunking
B. traffic shaping
C. port mirroring
D. content switching
30. (p. 348) When
configuring a Web client to use a proxy server, you must tell the Web client
not to use the usual DNS resolution, and give it this setting.
A. backup DNS server IP address
B. proxy server IP address
C. automatic IP configuration
D. port mirroring address
A. backup DNS server IP address
B. proxy server IP address
C. automatic IP configuration
D. port mirroring address
31. (p. 337) The
two most common types of SSL VPNs are: (Select all that apply.)
A. SSL portal VPNs
B. TLS portal VPNs
C. IPsec tunnel VPNs
D. SSL tunnel VPNs
E. Both A and D
A. SSL portal VPNs
B. TLS portal VPNs
C. IPsec tunnel VPNs
D. SSL tunnel VPNs
E. Both A and D
32. (p. 341) Which
of the following is NOT a state that VLAN Trunk Protocol (VTP) uses?
A. transparent
B. server
C. master
D. client
A. transparent
B. server
C. master
D. client
33. (p. 337) Which
of the following types of VPNs is used to connect two LANs separated by a WAN
or the cloud?
A. SSL VPN
B. site-to-site VPN
C. client/server VPN
D. L2F VPN
A. SSL VPN
B. site-to-site VPN
C. client/server VPN
D. L2F VPN
34. (p. 337) In
which type of VPN does the client browser run an active control, such as Java
or Flash?
A. site-to-site
B. proxy
C. SSL tunnel
D. SSL portal
A. site-to-site
B. proxy
C. SSL tunnel
D. SSL portal
35. (p. 336) Which
of the following was a Cisco proprietary protocol that was replaced by
L2TP?
A. L2F
B. PPTP
C. PPP
D. IPsec
A. L2F
B. PPTP
C. PPP
D. IPsec
No comments:
Post a Comment