This chapter provides sample questions from the Network+ Exam with a focus on network implementation. Detailed answers will help you identify and strengthen weak points in preparations for the Network+ Exam. Show
This chapter is from the book Domain 3.0: Network ImplementationObjective 3.1: Identify the Basic Capabilities (Client Support, Interoperability, Authentication, File and Print Services, Application Support, and Security) of the Following Server Operating Systems: UNIX/Linux, NetWare, Windows, and Appleshare IP (Internet Protocol)
Objective 3.2: Identify the Basic Capabilities Needed for Client Workstations to Connect to and Use Network Resources (For Example: Media, Network Protocols, and Peer and Server Services)
Required Objective: Connect to the server Optional Objectives: Faster connection, easier access for users Proposed Solution: Replace the old NIC with a 100BASE-FX NIC Objective 3.3: Identify the Appropriate Tool for a Given Wiring Task (Wire Crimper, Media Tester/Certifier, Punch Down Tool or Tone Generator)
Objective 3.4: Given a Remote Connectivity Scenario Comprised of a Protocol, an Authentication Scheme, and Physical Connectivity, Configure the Connection for UNIX/Linux/MAC OS X Server, NetWare, Windows, and Appleshare IP
Objective 3.5: Identify the Purpose, Benefits, and Characteristics of Using a Firewall
Objective 3.6: Identify the Purpose, Benefits, and Characteristics of Using a Proxy Server
Objective 3.7: Given a Connectivity Scenario, Predict the Impact of a Particular Security Implementation on Network Functionality (Blocking Port Numbers, Authentication, Encryption, and so on)
Objective 3.8: Identify the Main Characteristics of VLANs
Objective 3.9: Identify the Main Characteristics and Purpose of Extranets and Intranets
Objective 3.10: Identify the Purpose, Benefits, and Characteristics of Using Antivirus Software
Objective 3.11: Identify the Purpose and Characteristics of Fault Tolerance
Objective 3.12: Identify the Purpose and Characteristics of Disaster Recovery
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used quizlet?Which of the following best explains how devices and information can be susceptible to unauthorized access in weak passwords are used? Un authorized individuals can deny services to a computing system by overwhelming the system with login attempts.
Which of the following is most likely to be a benefit to users of the application?Which of the following is most likely to be a benefit to users of the application? Users of the application may see health benefits as a result of the application encouraging them to exercise with each other.
Which of the following best describes a direct benefit in using redundant routing on the Internet quizlet?Which of the following best describes a direct benefit in using redundant routing on the Internet? Redundancy often allows messages to be sent on the network even if some network devices orconnections have failed.
Which of the following best describes a solution that uses crowdsourcing?Which of the following best describes a solution that uses crowdsourcing? The company allows individual players to endorse fellow players based on courteous interactions.
|