Saturday, 21 April 2018

Why is a server in a client/server model called dedicated?

1. (p. 331) Why is a server in a client/server model called dedicated?
A. A user can sit at the server keyboard and run applications.
B. It is a dedicated client.
C. It is dedicated to serving over the network.
D. A server can see clients that are sharing resources.

2. (p. 330) Computers that both serve and access data participate in which kind of network?
A. VPN
B. Client/Server
C. VLAN
D. Peer-to-peer

3. (p. 331) Which of the following is an example of a network operating system in a classic client/server network?
A. Windows for Workgroups
B. Windows 98
C. Microsoft Server operating systems
D. Novell NetWare

4. (p. 332) In early Windows systems there were no user accounts, and permissions on a share could be set to one of two levels. What were these two levels? (Select all that apply)
A. File Scan
B. Read Only
C. Full Control
D. Write Only
E. Both B and C

5. (p. 333) What acronym is used to refer to modern peer-to-peer applications?
A. P2P
B. PPTP
C. VPN
D. L2TP

6. (p. 334) What types of networks supply a great deal of complexity, security, and power, and are made possible through the use of advanced networking devices? (Select all that apply.)
A. virtual private networks (VPNs)
B. Ethernet LANs
C. dial-up
D. virtual LANs
E. Both A and D

7. (p. 334) Using an encrypted tunnel between a computer (or remote network) and a private network is an example of using this type of network.
A. peer-to-peer
B. client/server
C. dial-up
D. virtual private network (VPN)

8. (p. 332) Which of the following is a common example of an operating system designed for peer-to-peer networking?
A. Linux
B. Windows 98
C. Microsoft Exchange Server
D. Novell NetWare

9. (p. 333) This is one example of the many programs that use the BitTorrent file-sharing protocol in modern peer-to-peer implementations.
A. µTorrent
B. IDS
C. IPS
D. PPTP

10. (p. 335) What two tunnel protocols enable tunnel endpoints to act like NICs on the same network? (Select all that apply.)
A. VLAN
B. RRAS
C. PPTP
D. L2TP
E. Both C and D

11. (p. 335) On the Windows side of a PPTP connection, you run "Create a New Connection" with what result?
A. An RRAS server is created.
B. A DHCP server is created.
C. A dial-up connection is created.
D. A virtual NIC is created.

12. (p. 336) A client using a PPTP VPN to connect to a private LAN will have an IP address of that network, just as if it were directly connected to the LAN, right down to this IP configuration setting, which will control where that client's packets with destination addresses beyond the LAN will be sent.
A. DNS
B. default gateway
C. WINS
D. PPP

13. (p. 337) IPSec usually provides the security for this type of VPN.
A. PPTP
B. PPP
C. L2TP
D. VLAN

14. (p. 337) Which of the following are the two tunneling protocols used by the majority of VPNs? (Select all that apply.)
A. PPTP
B. OpenVPN
C. L2TP
D. IPSec
E. Both A and C

15. (p. 337) What type of advanced network device is used to create VLANs?
A. hub
B. switch
C. router
D. bridge

16. (p. 338) In order to have a VLAN span two switches, you must configure a port on each switch to carry all data, regardless of VLAN number, between the switches. What is the term for this port?
A. logical port
B. trunk port
C. assigned port
D. port 0

17. (p. 339) This trunk standard enables you to connect switches from different manufacturers.
A. IEEE 802.1X
B. IEEE 802.11
C. IEEE 802.1Q
D. IEEE 802.3

18. (p. 339) If a switch contains a Web page that you must connect to in order to configure it, then the switch must also have this type of address for accessing that Web page.
A. MAC address
B. VLAN number
C. IP address
D. well-known port address

19. (p. 340) What is the common term for a VLAN based on MAC addresses?
A. static vlan
B. routed vlan
C. dynamic vlan
D. managed vlan

20. (p. 341) What is the Cisco term for a feature in a special switch that will provide routing between VLANs?
A. virtual routing
B. InterVLAN routing
C. VLAN-VLAN routing
D. trunking

21. (p. 342) What is another term for a Layer 3 switch?
A. concentrator
B. router
C. hub
D. bridge

22. (p. 344) In this type of load balancing, one domain name is assigned to many servers, using different IP addresses.
A. DNS load balancing
B. round robin
C. content switching
D. proxy

23. (p. 345) A popular option for load balancing is to hide all the Web servers behind a single IP address using a special multilayer switch that performs these two types of operations. (Select all that apply.)
A. NAT
B. port forwarding
C. tunneling
D. round robin
E. both A and B

24. (p. 346) CompTIA uses this term to refer to routers and switches that can perform traffic shaping.
A. traffic routers
B. quality of service routers
C. bandwidth shapers
D. port blockers

25. (p. 347) This system adds the capability to react to an attack detected by another component.
A. intrusion detection system (IDS)
B. host-based IDS (HIDS)
C. intrusion prevention system (IPS)
D. network-based IDS (NIDS)

26. (p. 347) Some advanced switches have this ability to mirror data from any or all physical ports to a single physical port in order to monitor traffic.
A. port blocking
B. port mirroring
C. load balancing
D. port authentication

27. (p. 340) Some IDS/IPS products will use this advanced switch capability so that administrators can examine all the packet traffic for certain ports.
A. port blocking
B. port mirroring
C. proxying
D. port authentication

28. (p. 348) This is the most common type of proxy server.
A. HTTP
B. DNS
C. FTP
D. Gopher

29. (p. 345) How are QoS policies often implemented?
A. trunking
B. traffic shaping
C. port mirroring
D. content switching

30. (p. 348) When configuring a Web client to use a proxy server, you must tell the Web client not to use the usual DNS resolution, and give it this setting.
A. backup DNS server IP address
B. proxy server IP address
C. automatic IP configuration
D. port mirroring address

31. (p. 337) The two most common types of SSL VPNs are: (Select all that apply.)
A. SSL portal VPNs
B. TLS portal VPNs
C. IPsec tunnel VPNs
D. SSL tunnel VPNs
E. Both A and D

32. (p. 341) Which of the following is NOT a state that VLAN Trunk Protocol (VTP) uses?
A. transparent
B. server
C. master
D. client

33. (p. 337) Which of the following types of VPNs is used to connect two LANs separated by a WAN or the cloud?
A. SSL VPN
B. site-to-site VPN
C. client/server VPN
D. L2F VPN

34. (p. 337) In which type of VPN does the client browser run an active control, such as Java or Flash?
A. site-to-site
B. proxy
C. SSL tunnel
D. SSL portal


35. (p. 336) Which of the following was a Cisco proprietary protocol that was replaced by L2TP?
A. L2F
B. PPTP
C. PPP
D. IPsec

No comments:

Post a Comment