CertCities.com -- The Ultimate Site for Certified IT Professionals
Free CertCities.com Newsletter via E-mail Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Pop Quiz ..Pop Quiz Article Tuesday: December 20, 2011


CompTIA Exam: Network+
6 questions. Answers can be found at the end of the quiz.


courtesy of   Transcender LLC

Questions

1. How should you use the Ping utility to determine whether the NIC in your local computer is functioning properly? (Select all choices that are correct.)

a. You should ping the local loopback address.

b. You should ping your local Internet Protocol (IP) address.

c. You should ping a node on your network.

d. You should ping a node on a remote network.

 

2. Which layer of the Open Systems Interconnection (OSI) model supports server message blocks (SMBs)? (Select the best choice.)

a. the Physical layer

b. the Network layer

c. the Session layer

d. the Application layer

 

3. Which technologies can use time division multiplexing (TDM)? (Select all choices that are correct.)

a. baseband

b. broadband

c. Ethernet

d. Fast Ethernet

e. IDE

 

4. Which protocol allows hosts on a TCP/IP network to communicate using either parallel or serial connections? (Select the best choice.)

a. DHCP

b. PPP

c. SLIP

d. TCP

 

5. Which of the following statements describe share-level security? (Select all choices that are correct.)

a. Each user has a user name.

b. Each user has a password.

c. Each resource has a password.

d. It is used on a peer-to-peer network.

 

6. Which of the following devices are used to connect the computers to the network in the graphic, below? (Select the best choice.)

Network Image for Question 6

a. MAUs

b. hubs

c. routers

d. default gateways

 

Answers:

1) Only choices b, c and d are correct. You should use the Ping utility to ping the IP address of your local computer, a node on your network or a node on a remote network to determine whether the computer's NIC is functioning properly. If these troubleshooting steps do not work, then you can try either reinstalling TCP/IP or installing a new NIC in the computer. If you use the Ping utility to ping the local loopback address of 127.0.0.1, then you can determine whether the TCP/IP stack is properly configured on the local computer. Reference: NCSG, Chapter 5, Troubleshooting with TCP/IP Utilities, pp. 210-214.

2) Choice d is correct. The Application layer of the OSI model supports SMBs. Microsoft network redirectors use the SMB protocol to direct data either to the local computer or to the network. The NetWare Core Protocol (NCP), which is used in Novell redirectors, also resides at the Application layer of the OSI model. The Application layer of the OSI model controls the use of the network. The Physical layer of OSI model defines network interface card (NIC) specifications and cable specifications. This layer is responsible for sending data over the physical medium. The Network layer of the OSI model is responsible for routing, addressing and managing network traffic. The Session layer of the OSI model synchronizes computers that are communicating over the network and allows two computers that are linked to a network to establish a session, or communication channel. Reference: NCSG, Chapter 1, SMB and Novell NCP, pp. 28-29.

3) Only choices a, b, c and d are correct. Baseband technologies can use time division multiplexing (TDM) to transmit data signals more efficiently. In TDM, signals are allowed to use the network medium for a certain block of time. When this block of time has expired, then the signal must give up the network medium to another signal. Blocks of time are rotated from one signal to the next in round-robin fashion. TDM can also be used with frequency division multiplexing (FDM) in broadband communications to further divide the separate bandwidth regions into blocks of time. Ethernet and Fast Ethernet are baseband communications technologies. An Ethernet network normally transmits at 10 megabits per second (Mbps). A Fast Ethernet network normally transmits at 100 Mbps. Broadband communications technology uses FDM. A broadband technology uses only a portion of the bandwidth of the network medium. A baseband technology uses all of the bandwidth that is available on the network medium. FDM is the process of dividing a cable into separate bandwidth regions and then sending data signals through the individual bandwidths. Integrated Drive Electronics (IDE) is a hard disk technology that cannot use TDM. Reference: NSG, Chapter 1, Signaling Methods, p. 25; NSG, Chapter 2, Physical Layer Concepts, pp. 43-44.

4) Choice b is correct. Point-to-Point Protocol (PPP) allows hosts to communicate by using TCP/IP over serial or parallel links. PPP is easy to configure because, when a PPP client connects to a router, the router uses the Dynamic Host Configuration Protocol (DHCP) to assign the client computer an Internet Protocol (IP) address, a subnet mask and a default gateway. PPP is more processor-intensive than its predecessor, Serial Line Internet Protocol (SLIP). As the name suggests, SLIP is capable of serial communications only. TCP/IP communications can be either connection-oriented or connectionless. Connection-oriented communications, which guarantee packet delivery, are performed by Transmission Control Protocol (TCP). User Datagram Protocol (UDP) provides connectionless communications, which are faster but are not guaranteed to transmit successfully. Reference: NSG, Chapter 6, Remote Access Protocols, pp. 266-270; NSG, Chapter 2, The TCP/IP Protocol, p. 70; NSG, Chapter 4, Dynamic Host Configuration Protocol, p. 156.

5) Only choices c and d are correct. Share-level security is implemented by assigning each resource a password on a peer-to-peer network. This type of security is suitable for a network that has a few resources and a small number of trustworthy and somewhat computer-savvy users. In other words, share-level security relies on the abilities, discipline and honesty of the network users. Users are expected to remember the passwords to each resource, but they are also expected to refrain from sharing passwords with users who do not need access to particular resources. Users preferably should not keep a written list of passwords, or if they do, then they should keep the list in a secure place. Thus, share-level security has many potential pitfalls that make it inappropriate for all large networks and perhaps most small ones. User names and user passwords are characteristics of client/server networks that have implemented user-level security. Users need only remember one password. Access to resources is the responsibility of the network administrator, not the individual users. The network administrator implements resource access through the configuration of Access Control Lists (ACLs). Reference: NSG, Chapter 9, Network Resource Sharing Security Models, pp. 362-363.

6) Choice a is correct. In the graphic, Multistation Access Units (MAUs) are used to connect the computers to the network. Token Ring networks use MAUs to connect computers in a physical star topology, and the MAUs route data packets through the network in a logical ring topology. You can determine that these devices are MAUs because the ring-in port of one MAU is connected to the ring-out port of the other MAU. Hubs are used to connect some Ethernet networks, such as a 10BaseT Ethernet, in a physical star topology. The hub then broadcasts data in a logical bus. Routers and default gateways are computers that route data on a network. A router sends packets from one network to another. A default gateway is a router that computers use if they cannot find the node that they are attempting to contact on the local network and they do not know the address of the router to use to contact the receiving computer's network. Reference: NSG, Chapter 2, The Multistation Access Unit (MAU), pp. 49-50.

These questions and answers are provided by Transcender Corporation. Order the full version of this exam simulation online at www.transcender.com, phone 615-726-8779, 8 a.m. - 6 p.m., (CST), M - F, fax 615-726-8884, or mail to Transcender LLC, 565 Marriott Drive, Suite 300, Nashville, TN 37214.


More Pop Quiz:


There are 20 CertCities.com user Comments for “CompTIA Exam: Network+”
Page 2 of 2
7/24/03: javad from nourjamali says: informaion id password
8/11/03: Anonymous says: whoever wrote the "you either get it or you don't" piece is a complete moron. Basically all he says is he can shmooze and BS management. Wouldn't want to work with someone like that. No integrity at all.
1/14/04: Jimmy777 from stl says: I have been in the industry for eight years. Some of the things that "you get or you don't says are true, however the time for paper certified IT personal and IT leachers is coming to and end. Personality, and people skills are valuable assets to have, but a real education allows you to have leaverage, and provides a spring-board to excel. Keep it real!
1/27/04: yournt4guy from Tempe says: Question #3 is ambiguous. There is a huge difference between what is possible and what is! IMHO the correct answer is a - baseband. There is a possibility that a broadband circuit could use TDM to increase data thruput, but name me one brand/model of equipment that actually combines FDM (broadband) and TDM. Then the two ethernet options...remember that ethernet protocol is defined and documented by standards - adding any sort of FDM and/or TDM makes the resultant not ethernet. Therefore the only correct answer for this questions worded this way is: "a".
3/16/05: george from egypt says: cop tia
4/7/05: Anonymous says: Hey,"you either get it or you don't.You better start lookin' for another job, 'cause your day is gonna come sooner than you think(if it hasn't already.) You can only bull**** your way through life for so long.
7/11/05: Dick Stroker from Texas says: "you either get it or you don't" is right. Comparing two instructors I had in MCSE school, on was a great teacher who challenged the students and made them think, and said what he thought and refused to kiss ass...the other was a poor instructor who often showed up late and had no content in his teaching, but sucked the boss's unit pretty good. Who do you think succeeded?? Get a clue, boys. Life is what it is, not what you want it to be in your dreams. Learn the answers to these arcane questions, memorize and cheat all you can, pass the test, and forget about most of it as it has little application in the real world.
10/10/05: Anonymous from md says: sweet. Im attending trainingcamp.com 's A plus/Net plus accelerated training course in 7 days. I have never even heard of an MAU until this test, lol. This is gonna be fun. But Im sure I will pass cause like what the last guy said, you need to learn what you need to know. Thats about it. The rest you can learn at critical time when your boss demands it. If you're suitable for the IT field at all, you know how to learn how to understand computers, and from that you can learn anything. Peace.
12/29/06: Anonymous says: Well good luck to you... Hope you find the answers in time when you're all alone and the server crashes...
11/27/11: Linx from nFLcjwfDRduO says: Yup, that'll do it. You have my appreacition.
First Page   Previous Page     Last Page
Your comment about: “CompTIA Exam: Network+”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top