|
1 | | Which network model uses only truly dedicated servers? |
| | A) | Client/server |
| | B) | Peer-to-peer |
| | C) | Virtual private network |
| | D) | Virtual local area network |
|
|
2 | | Marcy is home sick, but she uses a VPN to connect
to her network at work and is able to access files
stored on the remote network just as if she were
physically in the office. Which protocols make it
possible for Marcy to receive an IP address from
the DHCP server at work? |
| | A) | PPTP |
| | B) | IDS |
| | C) | L2TP |
| | D) | IPS |
| | E) | Answers A and C |
|
|
3 | | What is one benefit of a VLAN? |
| | A) | It allows remote users to connect to a local network via the Internet. |
| | B) | It reduces broadcast traffic on a LAN. |
| | C) | It can create a WAN from multiple disjointed LANs. |
| | D) | It provides encryption services on networks that have no default encryption protocol. |
|
|
4 | | Rashan’s company has multiple FTP servers,
allowing remote users to download files. What
should Rashan implement on his FTP servers so
they appear as a single server with a guarantee
that no single FTP server is receiving more
requests than any other? |
| | A) | Load balancing |
| | B) | Port authentication |
| | C) | Port mirroring |
| | D) | Trunking |
|
|
5 | | Raul sits down at his computer, checks his
e-mail, edits a document on the server, and
shares a folder with other users on the network.
What kind of network is Raul on? |
| | A) | Client/server |
| | B) | Peer-to-peer |
| | C) | PPTP |
| | D) | Trunked |
|
|
6 | | Which of the following describes a VPN? |
| | A) | A remote connection using a secure tunnel across the Internet |
| | B) | Segmenting a local network into smaller networks without subnetting |
| | C) | A network that is protected from viruses |
| | D) | A protocol used to encrypt L2TP traffic |
|
|
7 | | To enable computers connected to different
switches to be members of the same VLAN, what
do the switches have to support? |
| | A) | Content switching |
| | B) | Port authentication |
| | C) | Port mirroring |
| | D) | Trunking |
|
|
8 | | What is true of a multilayer switch? |
| | A) | It can work at multiple OSI layers at the same time. |
| | B) | It can work with one of several OSI layers at a time, depending on its configuration mode. Working at a different layer requires making a configuration change and resetting the switch. |
| | C) | It can communicate with other switches that work at different OSI layers. |
| | D) | It has twice the ports of a standard switch because it contains two regular switches, one stacked on top of the other. |
|
|
9 | | Which statement about L2TP is true? |
| | A) | It is more secure than PPTP. |
| | B) | It was developed by Microsoft and is available by default on all Microsoft servers. |
| | C) | It lacks security features and, therefore, relies on other protocols or services to handle authentication and encryption. |
| | D) | It ensures router tables are kept synchronized across VLANs. |
|
|
10 | | What are the benefits of caching on a Web proxy? |
| | A) | Response time |
| | B) | Virus detection |
| | C) | Tracking |
| | D) | Authentication |
| | E) | Answers A and B |
|
|
11 | | Which are effective methods of implementing load balancing? |
| | A) | Content switching |
| | B) | DNS round robin |
| | C) | Traffic shaping |
| | D) | Proxy serving |
| | E) | Answers A and B |
|
|
12 | | Employees in the sales department complain
that the network runs slowly when employees
in the art department copy large graphics files
across the network. What solution might increase
network speed for the sales department? |
| | A) | DNS load balancing |
| | B) | Content switching |
| | C) | Traffic shaping |
| | D) | 802.1z |
|
|
13 | | How does an IPS compare to an IDS? |
| | A) | An IPS is more secure because it uses IPsec. |
| | B) | An IDS is more secure because it uses L2TP. |
| | C) | An IPS is more robust because it can react to attacks. |
| | D) | An IDS is more robust because it can react to attacks. |
|
|
14 | | A dynamic VLAN assigns VLANs to |
| | A) | IP addresses |
| | B) | MAC addresses |
| | C) | Ports |
| | D) | Trunks |
|
|
15 | | Novell NetWare was an example of what? |
| | A) | A dedicated client |
| | B) | A dedicated server |
| | C) | A multilayer VLAN switch |
| | D) | Intrusion detection system software |
|