1 / 80

Q?: Which of the following are the valid combinations of backup methods (Choose all that apply)?

Q?: Which of the following are the valid combinations of backup methods (Choose all that apply)? A. Full + Incremental B. Full + Differential C. Full D. Incremental + Differential E. Incremental only F. Differential only. A,B,C.

alain
Télécharger la présentation

Q?: Which of the following are the valid combinations of backup methods (Choose all that apply)?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Q?: Which of the following are the valid combinations of backup methods (Choose all that apply)? A. Full + Incremental B. Full + Differential C. Full D. Incremental + Differential E. Incremental only F. Differential only A,B,C ANSWER:

  2. Q?: You are the Network Administrator for your company. You are configuring a device to direct data packets to all hosts on the LAN segment? A. Router B. Hub C. Repeater D. NIC E. Modem B ANSWER:

  3. Q?: You are the Network Administrator for your company. You are configuring a router. The router works at which of the OSI layers? A. Data link B. Transport C. Physical D. Session E. Network E ANSWER:

  4. Q?: A sudden flood of broadcast messages that clogs the transmission media is known as a _? A. Broadcast storm B. Blackout C. Brownout D. Ping A ANSWER:

  5. Q?: Disk striping without parity is know as RAID category _? A. 3 B. 4 C. 5 D. 0 E. 1 F. 2 D ANSWER:

  6. Q?: Which layer of the OSI model determines which path the data should take based on network conditions and priority of service? A. Session B. Transport C. Network D. DataLink C ANSWER:

  7. Q?: What layer of the OSI model ensures that packets are delivered error free, in correct sequence and without losses? A. Data Link B. Physical C. Transport D. Session E. Network C ANSWER:

  8. Q?: A unique number is hard-coded into the NIC card at the factory to identify the NIC card on the network. This number is called _? A. IP address B. MAC address C. Network address D. IPX address B ANSWER:

  9. Q?: On your server, you perform a full backup every Sunday evening and an incremental backup every 2 days. The system crashes immediately after the backup Saturday evening. To restore the system, you need: ? A. The last full backup and one incremental backup B. The last full backup only C. The last full backup and three incremental backups D. The last full backup and six incremental backups C ANSWER:

  10. Q?: Extend the network beyond the length of one cable segment. repeaters ANSWER:

  11. Q?: Can work at either 10Mbps or 100Mbps. Autosensing port ANSWER:

  12. Q?: The capability to send and receive from a switch at the same time. Full Duplex ANSWER:

  13. Q?: Which of the following cables is less susceptible to crosstalk than the others? A. Coaxial B. Fiber optic C. UTP D. STP E. None of the choices. B ANSWER:

  14. Q?: You are the Network Administrator for your company. You are configuring your network topology. Which of the following is used in this topology? A. CDMA B. None of the choices. C. CSMA D. Lightwave E. Token E ANSWER:

  15. Q?: The IEEE standard divides the OSI datalink layer into: A. MAC and LLC B. Mac and CSMA/CD C. LLC and MIC D. MAC and LIC E. MAC and PHP A ANSWER:

  16. Q?: Determining user needs and expectations is a job that should be done: A. as a continuous improvement effort B. Anytime in the network implementation C. after network implementation D. at the final review A ANSWER:

  17. Q?: You are the Network Administrator for your company. You are configuring your 10Base5 network. What cable should you use? A. Coaxial B. Wireless C. STP D. UTP E. Fiber A ANSWER:

  18. Q?: Disk mirroring requires a minimum of how many hard drives and hard disk controllers? A. 2 hard disk controllers B. 3 hard drives C. 2 hard drives D. 1 hard disk controller E. Minimum of 1 hard drive with 2 partitions F. 1 hard drive C,D ANSWER:

  19. Q?: Which of these is the RJ-11 Connector? A B C D C ANSWER:

  20. Q?: You are testing your network connection. Your computer is connected to a hub. Your NIC's light is not flashing. You switch to another port of the hub and the same problem still occurs. What should you do next? A. Replace the NIC B. Use a cable tester to test the cable C. Replace the HUB D. Reboot the computer and retry B ANSWER:

  21. Q?: Which of the following connector types has a center pin connected to the center cable conductor and a metal tube connected to the outer cable shield? A. RJ45 B. BNC C. ST D. RG58 E. SC F. RJ11 B ANSWER:

  22. Q?: Which of the following cable types is used by 10Base2's connector? A. Coaxial B. UTP C. Fiber D. STP A ANSWER:

  23. Q?: Which of the following correctly describe the BNC connector (Choose all that apply)? A. Also known as Bayonet Nut Connector B. Also known as British Naval Connector C. Also known as Bayonet Neill Concelman D. Used with coaxial cables A,B,C,D ANSWER:

  24. Q?: For this type of network cable, which of the following is a valid characteristic? A. Follows RG58 standard B. Uses fiber C. Uses untwisted wire pair D. Uses twisted wire pair D ANSWER:

  25. Q?: Identifythe names of the OSI layers on the right to the corresponding network devices on the leftNot all OSI layers will be used. A B C D E F G B,C,A ANSWER:

  26. Q?: You are the Network Administrator for your company. You just completed a weekly server backup. Where should you keep your tapes? A. Offsite location B. Onsite locked location C. Offsite locked location D. Onsite location C ANSWER:

  27. Q?: Which of the following protocols provide OSI network layer addressing? A. SPX B. TCP C. UDP D. FTP E. HTTP F. IP F ANSWER:

  28. Q?: Which of the following topologies has the largest number of connections per node on a large network? A. Token Bus B. Ring C. Token Ring D. Bus E. Mesh F. None of the choices. G. Star E ANSWER:

  29. Q?: This device is likely to be used with which of the following network topology? A. WAN B. MESH C. BUS D. STAR E. MAN C ANSWER:

  30. Q?: This device is likely to be used in which of the following types of networks? A. 100BaseT B. BUS C. 100BaseFX D. STAR E. MESH F. 10BaseT B ANSWER:

  31. Q?: You cannot connect to a network server. The light in the back of the NIC card is not flashing. You change the patch cable and it is still not flashing. You go into the wiring closet and switch the connector from one connection on the hub to another. You check the NIC light and it is now blinking. Which of the following conclusions is safe? A. the cable is way too long B. the patch cable is not stable C. there might be a problem with the port on the hub D. the NIC is not stable C ANSWER:

  32. Q?: What type of network cable is most resistant to EMI? A. Shielded Twisted Pair B. Fiber optic C. Twisted Pair D. Coaxial B ANSWER:

  33. Q?: At what layer of the OSI model the Bridge operates? A. Datalink B. Physical C. Presentation D. Session E. Transport F. Network A ANSWER:

  34. Q?: What network topology is the most fault tolerant and has the most redundancy? A. Hybrid B. Mesh C. Star D. Ring B ANSWER:

  35. Q?: As the signal travels down the cable segment it gets weaker. This is known as _? A. Degradation B. Crosstalk C. Resistance D. Attenuation E. Line Noise D ANSWER:

  36. Q?: You are troubleshooting a token ring network. Each node on the network is connected to the MAU (multistation access unit) by a dedicated cable segment. What physical topology is used on your network? A. Peer-to-Peer B. Bus C. Ring D. Star E. Mesh D ANSWER:

  37. Q?: Disk striping without parity is know as RAID category _? A. 3 B. 4 C. 5 D. 0 E. 1 F. 2 D ANSWER:

  38. Q?: In the exhibit the link lights on A of the Router and B of the Hub are not lit. All other link lights are lit.Which component could NOT have caused this problem? A. Router B. Modem C. Hub D. Patch cord B ANSWER:

  39. Q?: What layer of the OSI model is responsible for the physical addressing (MAC addresses) A. Network B. Session C. Physical D. Datalink D ANSWER:

  40. Q?: Which type of network cable would be most susceptible to electromagnetic interference (EMI)? A. UTP B. Thicknet C. STP D. Fiber A ANSWER:

  41. Q?: Which hub boosts the signal strength? A. Active B. Token ring C. Passive D. Hybrid A ANSWER:

  42. Q?: What type of physical topology is shown on the picture? A. Ring B. Bus C. Mesh D. Tree E. Star B ANSWER:

  43. Q?: What 2 backup methods clear the archive attribute of the files that are being backed up? A. Full B. Incremental C. Differential D. Daily A,B ANSWER:

  44. Q?: The Data Link layer is divided into what two sublayers? (Choose 2) A. Network B. MAC C. UDP D. LLC E. TCP B,D ANSWER:

  45. Q?: What cable type is used on a 10BaseT network? A. Thicknet B. UTP C. Thinnet D. STP B ANSWER:

  46. Q?: Network cable's resistance to current is called _? A. Attenuation B. Degradation C. Flow D. Impendence E. Capacitating D ANSWER:

  47. Q?: Thinnet network can use what kind of cable? (Choose 2) A. RJ-58 B. RG-58 A/U C. RG-58 A D. RG-59 E. RJ-58/U F. RG-58/U G. RJ-11 H. RJ-58 A I. RJ-45 B,F ANSWER:

  48. Q?: Disk duplexing is also known as a RAID category _? A. Category 1 B. Category 4 C. Category 3 D. Category 2 E. Category 5 F. Category 0 A ANSWER:

  49. Q?: Which of the following cable types are Thicknet cables? (Choose 2) A. RG-58 /U B. RJ-11 C. RG-5 D. RJ-45 E. RG-58 A/U F. RG-8 G. RG-11 F,G ANSWER:

  50. Q?: The OSI model DataLink layer__: (pick all that apply) A. Packages bits from the Physical layer into frames for the Network layer B. Bridges and switches operate at this layer C. Responsible for IP addressing D. Includes the MAC sublayer E. Includes LLC sublayer F. Provides data encryption services A,B,D,E ANSWER:

More Related