This chapter provides sample questions from the Network+ Exam with a focus on network implementation. Detailed answers will help you identify and strengthen weak points in preparations for the Network+ Exam.
This chapter is from the book
Domain 3.0: Network Implementation
Objective 3.1: Identify the Basic Capabilities (Client Support, Interoperability, Authentication, File and Print Services, Application Support, and Security) of the Following Server Operating Systems: UNIX/Linux, NetWare, Windows, and Appleshare IP (Internet Protocol)
You have been given the task of installing Samba on a Linux server. Which services does the product provide?
File and print services
Thin client services
Web server services
Proxy server services
Which of the following is an advantage to formatting a Windows NT server drive as NTFS rather than FAT?
NTFS permits the server to be used as a workstation.
With NTFS, tape backups aren't needed.
NTFS offers a higher degree of security.
NTFS eliminates the need for multiple hard drives.
NDS is proprietary to which of the following?
NetWare
Windows NT
Windows 9x
UNIX
Which one of the following is the directory structure used with Novell NetWare?
NTFS
FAT
NDS
Root
Which of the following network protocols can be run on a NetWare network?
IPX
NetBEUI
AppleTalk
MS-DOS
Which of the following is an advantage to formatting a Windows NT server drive as NTFS rather than FAT?
With NTFS, tape backups aren't needed.
NTFS offers a higher degree of security.
NTFS permits the server to be used as a workstation.
NTFS eliminates the need for multiple hard drives.
Which of the following is an advantage of NTFS over FAT?
It permits the server to be used as both server and work- station.
It alleviates the need for data backups.
It utilizes the disk space far more efficiently than FAT.
It directly accesses the system hardware.
Which of the following is used to manage file systems on a NetWare server?
NDS
NFS
DHCP
WINS
Which two of the following client operating systems are supported by Windows and NetWare?
UNIX workstations
Novell CAFS Client
Windows NT Workstation
MAC OS X
The NetWare directory structure begins with ______.
Directory
Leaf
Domain
Root
Which of the following network operating systems is associated with NDS?
NetWare
Windows NT
Windows 9x
UNIX
What is the basis of Novell NetWare?
X.25
X.500
V.34
X.400
Which of the following is an advantage of UNIX that's not offered by other network operating systems?
Only UNIX supports TCP/IP.
It's portable among different machine types.
It's the only NOS that supports routable protocols.
It doesn't require client addressing.
What is the default network protocol on a UNIX server?
IPX/SPX
IPX
TCP/IP
NetBIOS
Which network protocol is shipped with commercial versions of UNIX?
TCP/IP
IPX/SPX
BGRP
-
NWLink
______ supports 64-bit applications.
AppleTalk
Windows NT
NetWare
UNIX
Which protocol is used with the Internet and UNIX?
WINS
NetBEUI
IEEE 802.5
TCP/IP
Which of the following networking protocols does Linux use?
TCP/IP
AppleTalk
IPX
NWLink
Three servers are scheduled for an upgrade. What do you do first?
Install the upgrade on all three servers.
Install the upgrade on a test server.
Install the upgrade on one server and observe the effects on users.
Don't perform the upgrade.
In what type of network environment do individual computers maintain a list of user accounts describing passwords and access rights?
Domain
Standalone
Workgroup
Active Directory
What type of network is share-level security often associated with?
Peer-to-peer
Server based
WANs
Centralized server
Which of the following best describes the difference between user and share-level security?
Share-level security is more restrictive.
User-level security is more restrictive.
There is no difference.
User-level security can be set up in group accounts.
Which of the following best describes folder replication?
Attaching a tape unit to the hard drives of a server
Copying the contents of a hard drive to another hard drive
Copying a folder to another server or workstation
Configuring a workstation for temporary use as a server
The method used to back up server data is to copy the server files to another server. Which one of the following best describes this type of backup method?
Differential
Folder replication
Tape backup
Incremental
You are adding a Windows XP workstation to a network hosted by UNIX servers. There is also an Apple MAC workstation on the network. Which protocols must be loaded in the system to enable communications between all the computers in the network? (Select all that apply.)
NWLINK
AppleTalk
TCP/IP
NetBEUI
You are setting up a Windows 2000 Professional computer in a network that contains Novell NetWare 4.11 servers. What client software do you need to install in the Windows machine to communicate with these servers?
TCP/IP
CSNW
Netlink
NWCT
What items are required for a UNIX client to connect to an entirely UNIX-based network environment's network share using the host name?
IP, Subnet Mask, WINS
IP, Subnet Mask, LMHOSTS
IP, Subnet Mask, HOSTS
IP, DNS, WINS
Which server stores information about resources in a Windows Server 2003 domain running Active Directory?
Domain Master
Domain Tree
Domain Controller
Domain Configurator
Identify the hierarchical directory service.
Windows NT domains
Active Directory
Linux Password files
The NetWare Bindery
A user cannot modify her username and password in Open Directory for Mac OS X server. Which of the following actions will best resolve this issue?
Convert the user to give master configurator rights.
Change the password from "Crypt" to "Open Directory."
Establish Turbo Shell as the login shell.
Modify the login to use "Key Chain" access rather than the login window.
You have a Windows 2000 server-based domain with an Apple MAC client that is unable to see the server on the network. What items need to be installed to enable the client to communicate with the server?
802.11A
NetBEUI
Token Ring
Appleshare
When a user in a Linux environment wishes to authenticate using Kerberos, the request is processed and granted by a____.
Kerberos Key Distribution Center
Kerberos Password Distributor
Secure Layer Protocol Server
Kerberos Authentication Server
Which Windows groups can share folders by default?
Admin group only
Admin and Power Users groups
Admin and Share Users groups
Admin and Guest groups
Which of the following are true concerning NDS?
Remote users cannot access network connections via dial-up connections.
Mobile users do not require changing the NDS name context.
Mobile users do not require a special object entry.
There is no difference between mobile and remote users.
Objective 3.2: Identify the Basic Capabilities Needed for Client Workstations to Connect to and Use Network Resources (For Example: Media, Network Protocols, and Peer and Server Services)
A workstation is being added to an Ethernet LAN. The NIC card has been installed, IRQ assigned along with an I/O range with no conflicts. What else must be done before the workstation can access the network resources?
Convert the workstation to a server by installing server software.
Install the client software.
Connect the workstation to a router.
Install the client software and add a cable to the NIC card.
A user has been approved for an increase in the size of their home directory on the server. Which of the following must be changed?
Permission
Profile
Right
Password
Before a client can receive a dynamic IP address from a server ______.
DHCP must be running on the server
DNS must be running on the server
WINS must be running on the server
a gateway must be installed on the server
A network administrator is trying to decide whether to implement user-level or share-level security on a network. Which will be more time intensive?
User level
Share level
Security levels are dictated by the NOS and not the administrator.
There's no difference in the amount of administrative time.
Which of the following best describes share-level access?
Used to specify users or groups of users that have access to a network resource.
Used to specify the depth of a security model.
Used to specify password protection for each resource.
Used to employ a public-key encryption scheme.
Which of the following best describes user-level access?
Used to specify the depth of a security model.
Used to specify users or groups of users that have access to a network resource.
Used to specify password protection for each resource.
Used to employ a public-key encryption scheme.
A network administrator assigns users to groups, all of which have similar levels of access. What type of security is being employed?
User level
Logon Account
Server Level
Group level
When accessing a network share, you attempt to modify its contents, but you're unable to do so. What is the most likely reason for this?
GPOs are typically pulled from cache memory.
The files are in Read-Only mode because another user is using them.
The files are being pulled from a backup resource.
You only have Read, Write and Change permissions to the files.
By interpreting baselines, you determine that the volume of network traffic on your network is reaching unacceptable levels. The network is a 10BASE-T system with hubs. Which of the following upgrade paths are you most likely to recommend?
Implement switches in place of the hubs.
Implement 100BASE-T by replacing all the network cards and hubs with 100Mbps devices.
Install a router to divide the network into two segments, thereby reducing the overall amount of network traffic.
Implement a bridge.
You have a workstation that is 153 meters from the server, there is no repeater, and it is using 10BASE-T wiring. You cannot connect to the network.
This meets only the required objective.
This meets the optional objectives.
This meets the required and one of the optional objectives.
This does not meet the required or optional objectives.
You are the network administrator for a token ring network. A NIC in a system fails and you replace it with a new one. However, the system is unable to connect to the network. What is the most likely cause of the problem?
The card is a 100Mbps card, and the ring is configured for only 10Mbps.
The card is set to the wrong ring speed.
The card is set to full duplex operation and the ring is running at only half-duplex.
The card is faulty.
As network administrator, you are given the task of integrating the existing network with a new network that will be located in another building. In total, there will be three network segments. The systems on the network are Windows 2000 and Novell NetWare servers and Windows 2000 workstations. You want to confine the network to a single protocol. Which two of the following network protocols might you consider using for the entire network?
IPX/SPX
TCP/IP
PPP
NetBEUI
Required Objective: Connect to the server
Optional Objectives: Faster connection, easier access for users
Proposed Solution: Replace the old NIC with a 100BASE-FX NIC
Objective 3.3: Identify the Appropriate Tool for a Given Wiring Task (Wire Crimper, Media Tester/Certifier, Punch Down Tool or Tone Generator)
You are experiencing problems with network connectivity and suspect that there is a break in the cable that connects two floors. The cable is a Category 5 twisted-pair cable. Which of the following tools can you use to locate the break in the cable?
Wire tap
Voltmeter
Tone generator and locator
Time domain reflectometer (TDR)
What devices are sometimes referred to as "fox and hound" detectors?
Tone generator and locator
A time domain reflectometer (TDR)
A voltmeter
A cable chaser
A wire tap
Which of the following tools is used to interface a token ring adapter card to category 3 or category 5 UTP cable?
A UDP adapter
A crossover cable
A token-ring media filter
A NIC adapter
A wire in a UTP cable is suspected of having a break. Which of the following would confirm connectivity of each wire in the cable?
Link light
Crossover cable
Cable tester
Network adapter card
In a hardware loop back plug, which two wire numbers are connected?
2 and 6
1 and 2
1 and3
3 and 4
3 and 5
What type of device is required to connect a workstation to a hub port labeled MDI?
A fox and hound
A crossover cable
A hardware loopback cable
A straight-through cable
A wire tap
Which of the following Windows NT tools will display many of the attributes of an IP packet?
Network Monitor Audit
WINS
DHCP
Network Monitor
Your company is getting a new DSL connection and you have been asked to install the new connection equipment in the communication closet of your office building. What type of tool do you need to make these connections?
A wirepuller
A drill
A punch down tool
A line extender tool
What type of network troubleshooting tool do you use to actually put test signal on the copper wire of a network connection?
An OTDR
A TDR
A Line Tester
A Multimeter
Objective 3.4: Given a Remote Connectivity Scenario Comprised of a Protocol, an Authentication Scheme, and Physical Connectivity, Configure the Connection for UNIX/Linux/MAC OS X Server, NetWare, Windows, and Appleshare IP
A server has two NIC cards installed. The first one uses IRQ 10 and I/O range of B800-B81F. The second uses IRQ 10 and I/O range of D700-D80A. What action, if any, should be taken?
No action is required.
Locate any available IRQ to resolve the IRQ conflict that is present.
Locate any available I/O range to resolve the I/O conflict.
Change the I/O of the second NIC to B800-B81F.
A server has two NIC cards installed. The first one uses IRQ10 and I/O range of B800–B81F. The second uses IRQ5 and I/O range of D700–D80A. What action, if any, should be taken?
Locate any available IRQ to resolve the IRQ conflict that is present.
No action is required.
Locate any available I/O range to resolve the I/O conflict.
Change the I/O of the second NIC to B800–B81F.
While installing and configuring a new modem, you receive an error message that indicates there is a resource conflict. You are installing the modem on COM2. What is the most likely source of the conflict?
IRQ2
IRQ3
IRQ5
3FD
Which of the following system resources should be configured in a modem installation?
FTP number, DMA channel, IRQ channel
MAC address, I/O Address, DMA Channel
COM port, Interrupt request channel, IP address
COM port, I/O Address, Interrupt request channel
When an ISP elects to use DHCP, which one of the following must the subscriber set up?
PPP
SMB
IPX
SLIP
What is the correct procedure for configuring RAS in a Windows 2000 server?
Start, Settings, Control Panel, Network
Start, Programs, Administrative Tools, Routing, and Remote Access
System, Services, Networking, Dial In
Control Panel, Network, Dial In, Remote Services
A remote user calls your help desk and complains that she is unable to access internal corporate network resources from her home. The user states she can access the Internet. How can the user restore her connection to the corporate network?
Disconnect from the Internet
Re-establish the VPN connection
Re-establish the Dial-up Networking (DUN) connection
Change the VPN connection to use IPsec instead of MS-CHAP
The Open Directory Authentication in Mac OS X can authenticate non-Kerberized services using _______.
Cleartext passwords
SSH authentication
SASL
NTP authentication
Objective 3.5: Identify the Purpose, Benefits, and Characteristics of Using a Firewall
Your manager has given you the task of setting up a shared Internet connection for all the users on the network. She is concerned about security and has asked you to recommend a solution that will protect the internal network. What kind of server are you likely to install to address her security concern?
Install a Linux server
Install a firewall server
Install a secure browser on each workstation that will have Internet access
Install a Proxy server
On a network, where is a system 'acting as a firewall' typically located?
Between the internal network and the Internet access point
Between two internal networks
Between the Internet access point and the Internet
Between the client systems and the servers
Consider the following situation, and then select the best security practice from the list that follows: A network consisting of 500 users is to be modified so that all users will be able to access the Internet. All IP addresses are assigned from a list maintained in NT servers. The list of IP addresses is well known outside the network.
All messages intended for the Internet are encrypted.
All users are assigned a unique password for accessing the Internet.
The share-level security model is selectively applied to each user.
A firewall is installed at the Internet ports.
What is the basic purpose of a firewall system?
It protects one network from another by acting as an intermediary system.
It caches commonly used Web pages, thereby reducing the bandwidth demands on an Internet connection.
It allows hostnames to be resolved to IP addresses.
It provides a single point of access to the Internet.
While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server. Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?
A firewall system at the connection point to the Internet
A more secure password policy
File-level encryption
Kerberos authentication
Which of the following is not a commonly implemented feature of a firewall system?
Packet filtering
NAS
Proxy
NAT
Which of the following best describes the purpose of a firewall?
To prevent external intruders from accessing a network
To prevent network users from accessing the Internet
To prevent network users from virus attack
To detect protocol conflicts
A packet filtering firewall performs at which levels of the OSI model?
Network and Data
Network and Transport
Transport and Session
Physical and Data
Objective 3.6: Identify the Purpose, Benefits, and Characteristics of Using a Proxy Server
Your manager has given you the task of installing a caching Proxy server. Which three of the following are the benefits of using a Proxy server system?
It provides faster page retrieval for commonly used Web pages.
It provides centralized Internet access.
It provides automatic assignment of IP addresses to workstations.
It provides protection of the internal network from attack by outside sources.
Your manager has given you the task of installing a caching Proxy server. Which two of the following are the benefits of using a Proxy server system?
Increasing demands on Internet connection bandwidth
Centralizing Internet access
Preventing network workstation IP addresses from being advertised on the Internet
Automatically assigning IP addresses to workstations
A network consisting of 500 users is to be modified so that all users will be able to access the Internet. All IP addresses are assigned from a list maintained in NT servers. The list of IP addresses is well known outside the network. Which of the following is the best security practice for this network?
All messages intended for the Internet are encrypted.
All users are assigned a unique password for accessing the Internet.
The share-level security model is selectively applied to each user.
A firewall is installed at the Internet ports.
What is the purpose of using a proxy IP?
To provide all workstations with the same IP address
To eliminate the need for TCP/IP
To secure actual workstation IP addresses from intruders
To map IP addresses to MAC addresses
Computer users are reporting slow Internet access. Which of the following actions could be taken to improve their browsing?
Install a Proxy server
Install a Web server
Set up a subnet
Install a Terminal server
You are in charge of installing your company's new network structure. You have asked one of your assistants to install a proxy server for the new environment. They ask you if the proxy server is the same as a firewall. What should you tell them?
A proxy server is used to protect one network from another by preventing IP addresses from passing between the networks.
A Proxy server resolves hostnames to IP addresses and replaces workstation IP addresses with a proxy IP address.
A proxy server is used to provide a single point of access to the LAN by filtering the IP addresses presented to the network.
A proxy server holds the Security Access List for the network and prevents unauthorized users from gaining access to the network resources.
A Proxy server operates at which OSI level?
Application
Network
Transport
Session
Objective 3.7: Given a Connectivity Scenario, Predict the Impact of a Particular Security Implementation on Network Functionality (Blocking Port Numbers, Authentication, Encryption, and so on)
You are designing a password policy for your company. Which of the following measures are you least likely to recommend?
Include passwords in system documentation
Ensure that passwords are not reused
Make sure that users use only "strong" passwords that are a certain length
Change passwords on a periodic basis
Which of the following represents the most secure password?
PASSWORD1
password
PaSsWoRd1
PASSWORD
A peer-to-peer network is to be upgraded to a server-based network. Before performing the upgrade, which one of the following should be done first?
Configure a default gateway
Commit to an administrator password
Install the NOS
Assign IP addresses to all workstations
You have been told to set up a firewall for the company network that will filter TCP ports 100–200. What network services will this action affect?
POP3 incoming mail service
FTP service
SMTP outgoing mail service
World Wide Web (WWW) access
After several passwords have been compromised in your organization, you have been asked to implement a network-wide password policy. Which of the following represents the most practical and secure password policy?
Daily password changes
Weekly password changes
Monthly password changes
Password changes only after an account has been compromised
What directory system does a UNIX server use to resolve names?
NDS
DNS
HOSTS
DHCP
Your manager has asked you to implement security on your peer-to-peer network. Which of the following security models offers the highest level of security?
Share level
User level
Password level
Layered
You are working on a Linux system and are having problems trying to ping a remote system by its hostname. DNS resolution is not configured for the system. What file might you examine to begin troubleshooting the resolution problem?
hosts
staticdns
passwd
resolv
Which of the following is not a valid file permission on a Linux system?
Execute
Read
Attribute
Write
How often should passwords be changed?
No less than monthly
No less than weekly
No less than annually
No less than biannually
What does a secure password policy require?
Passwords must be changed on a random basis.
Passwords must be changed at a scheduled time-interval.
A random length for passwords.
A prescribed length to passwords.
The network administrator sends email to all users explaining that passwords must be changed on a monthly basis. This is a departure from the current system of passwords never changing. Which of the following must be changed?
Groups
Profiles
Rights
Policy
After creating a new secure page for your Web site, external users complain that they cannot access it, but they can access other areas of the site. When you try to access it from a workstation internally, everything seems fine. What is the most likely explanation of the problem?
Your firewall is blocking all traffic.
Your firewall is blocking port 80.
Your firewall is blocking port 110.
Your firewall is blocking port 443.
You have just set up a filter on your network router and SMTP operations have stopped responding. What is the likely cause of this problem?
Port 25 is closed.
Port 110 is closed.
Port 80 is closed.
Port 443 is closed.
You have installed a new firewall in your network and users are complaining that now they can't access the Web. What action should you take to restore their Web access?
Reconfigure DNS
Configure DHCP for the firewall
Open port 80
Configure the router to work with the firewall
Choose the most secure password from the following list.
Db3Tu$L
klsrmoa
NeW UseR
harold
Objective 3.8: Identify the Main Characteristics of VLANs
Which properties can be used to define a VLAN?
IP addresses
Port assignments
Computer names
MAC addresses
Which of the following technologies can be implemented on a switch to create multiple separate networks?
Subnet masking
VLAN
NAS
Proxy
Which three of the following properties can be used to define a VLAN?
IP addresses
Computer names
MAC addresses
Port assignments
Your company has two offices in different locations. You need to establish a secure link between the two. You want to use the Internet as a communication mechanism to keep the costs down. Which of the following technologies might you consider using?
VLAN
802.11b
VPN
TDR
A VLAN can be used to:
Create a network without using any cables
Create a network at the cost of using more bandwidth
Separate networks into smaller logical networks
Re-use IP addresses
Your company has recently merged with another company and each has its own VLAN. Users on both VLANs need to communicate with each other. What needs to be installed to make this possible?
A router
A switch
Matching protocols
A bridge
You have several remote salespeople who routinely connect to your office via a VPN. However, today they can no longer connect, and are unable to access the login. However, they are still able to access the Internet. What action should be taken to determine the scope of this problem?
Reconfigure the VPN setup
Re-enter their usernames and passwords
Call your broadband service provider
Ping the VPN host
Objective 3.9: Identify the Main Characteristics and Purpose of Extranets and Intranets
A company producing medicine is sharing production data with another company that outsources shipping via a VPN. In return, the shipping company is sharing some of its real-time updated logistics schedules with the medical company, also using a VPN. What type of networking arrangement is involved?
A token ring network
An intranet
An extranet
A local area network (LAN)
Which of the following best describes an intranet?
A global public network that uses an infrastructure consisting of network access points, a commercial backbone and service providers
A private network that supports Internet applications and that doesn't use the public telecommunications system to connect users
A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public
A network in which data packets sent over the public Internet and are encapsulated in a protocol that provides for data encapsulation as well as encryption of the user data
Which of the following provides the best protection against network intruders?
The Internet
An intranet
An extranet
A VPN
Which of the following types of network can a company use to allow data sharing internally only, without the use of the public telephone system?
Internet
Intranet
Extranet
VPN
An intranet is ______, typically established by an organization for the purpose of running an exclusive site not open to the public.
A local area network (LAN)
An internal extranet network
A wide area network (WAN)
A Web-based network
A ______ is used to block unauthorized outside users from accessing an intranet site.
Hub
Router
Gateway
Firewall
Which one of the following characteristics of an intranet is incorrect?
An intranet can be a part of a Local Area Network (LAN).
An intranet is designed to be publicly available.
An intranet can work with Wide Area Networks (WAN).
An intranet may be restricted to a community of users.
Which of the following best describes an extranet?
A global public network that uses an infrastructure consisting of network access points, a commercial backbone and service providers
A private network that supports Internet applications and that doesn't use the public telecommunications system to connect users
A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public
A network in which data packets are sent over the public Internet and are encapsulated in a protocol that provides for data encapsulation as well as encryption of the user data
Your company is set up to use the Internet to do business with your business partners who are scattered across the country; this is an example of ______.
Intranet
Extranet
Internet
Virtual Private Network (VPN)
To set up a secure network that will enable your customers to view your current production schedule, you would set up ______.
An intranet
A wide area network
An extranet
A Virtual Private Network
Your company wants to make its internal product information accessible to selected customers from anywhere in the world. Which type of network environment should you create for this scenario?
An extranet
An intranet
A WAN
A VPN
Objective 3.10: Identify the Purpose, Benefits, and Characteristics of Using Antivirus Software
From what items do antivirus software packages protect computers?
Trojans
SPAM
Pop-up ads
Spyware
What is an unwanted software program that can multiply from one system to another?
Virus
Spam
Spyware
Cookies
Which of the following should always be installed on an email server?
Antivirus software
Popup blocker
Spyware blocker
The SSL protocol
How can proxy servers provide an opening for viruses to enter a network?
The proxy server uses the IP address of the remote server.
The proxy receives HTTP responses that might contain viruses.
The proxy server receives telnet data that might have viruses.
The proxy receives IP acknowledgements that might have viruses.
What action should always be taken before installing new application software?
Check the system for viruses
Deactivate the antivirus software
Verify that all the system's virus protection is active
Check the application installation media for viruses
Why should all email originating from the Internet be scanned for viruses?
Because Windows operating systems are known for viruses.
Because the Internet is the largest source of viruses.
Because email floods can cripple a server.
Because not all email is encrypted.
A client that has FTP access should also have ______.
a port 21 firewall block
an encrypted link to the FTP server
email access
antivirus software installed
Normally, antivirus software needs to be updated on a(n) ______ basis.
quarterly
bi-annual
monthly
annual
What needs to be done before using a file obtained from a third party?
Scan the file for pop-ups
Scan the file for worms
Scan the file for spyware
Scan the file for viruses
Objective 3.11: Identify the Purpose and Characteristics of Fault Tolerance
After a hard disk failure that took a number of hours from which to recover, your manager has instructed you to implement a fault-tolerant solution to reduce the amount of downtime if the same thing happens again. After researching the various options available to you, you decide to use disk striping with parity. What is the minimum number of disks required to implement this solution?
3
2
1
4
To combine hard drive fault tolerance with good read/write performance, which of the following should be used?
Striping without parity
Tape backup
Mirroring
Striping with parity
Each hard drive in a server has a dedicated disk controller. What is this practice called?
Striping
Duplexing
Parity
SNMP
Your manager has given you the task of implementing a RAID solution on the server. You have two hard disk controllers and two hard disks. Which three of the following RAID levels could you implement?
Disk mirroring
Disk striping with parity
Disk striping
Disk duplexing
Disk shadowing
To provide true, continuous power to a server, which of the following should be used?
BNC
UPS
SPS
Generator
You have been asked to implement a RAID solution on one of your company's servers. You have two hard disks and two hard disk controllers. Which three of the following RAID levels could you implement?
RAID 0
RAID 1
Disk duplexing
RAID 10
RAID 5
Which of the following statements best describes RAID 5?
A RAID 5 array consists of at least three drives and distributes parity information across all the drives in the array.
A RAID 5 array consists of at least two drives. Parity information is written across both drives to provide fault tolerance.
A RAID 5 array consists of at least three drives and stores the parity information on a single drive.
A RAID 5 array consists of at least four drives. The first and last drives in the array are used to store parity information.
What is the purpose of implementing fault tolerance?
It protects data from accidental deletion.
It eliminates the amount of time the administrator spends performing backups.
It allows systems to be bought back online more quickly.
It promotes data availability by eliminating a single point of failure.
Writing data in blocks across multiple hard drives is called ______.
Striping
RAID 0
Mirroring
Parity
Which RAID level does not incorporate fault tolerance?
RAID 1
RAID 0
RAID 5
RAID 3
Each hard drive in a server has a dedicated disk controller. What is this practice called?
SNMP
Striping
Parity
Duplexing
Which RAID level relies on mirroring for fault tolerance?
RAID 0
RAID 3
RAID 5
RAID 1
Which of the following represent fault tolerance measures? (Select all that apply.)
Installing a UPS
Installing a RAID system
Installing a mirror server
Performing a daily backup
Which of the following techniques improves the fault tolerance of a RAID 1 arrangement so that the system can remain functional if the disk controller fails?
Duplex the RAID 1 subsystem by adding a second controller
Mirroring the RAID 1 subsystem by adding an additional drive and controller
Striping the RAID 1 system using an additional drive for parity
Add a tape backup system to the drive subsystem
Which of the following provides fault tolerance and the best read/write performance?
Duplexing
Striping with parity
RAID 0
Striping without parity
One of your servers is configured for RAID 1 operation with duplexing. If it loses one of its RAID controllers, what will happen to the disk data and performance?
The data will be lost but the drive subsystem performance will not be affected.
The data will be safe, but the drive subsystem performance will be decreased.
Half of the data will be lost, but the drive subsystem performance will not be affected.
The data and the performance level will remain unchanged.
You have a 3-drive RAID system where one drive is used for the operating system and the other two drives are used for data in a stripe set. The drives are hot swappable. One of the data drives fails. What needs to be done to correct the failure?
Replace the drive and restore the contents from backup.
Hot swap the drive with the system active, and it will automatically rebuild the contents of the drive.
Shut down the system, replace the drive, restart the system, and let it rebuild the missing drive.
Use a warm spare to replace the drive. It already contains the data and will make it available when the drive is activated.
Which RAID type offers best fault tolerance with the least overhead for a system that has one controller and six drives?
Duplexing
Striping
Mirroring
Striping with Parity
What fault tolerant system requires the least amount of overhead?
RAID 0
RAID 1
Mirroring
RAID 5
A NetWare server uses four hard drives. Which of the following technologies divides the hard drives so that it provides the most data storage space?
Duplexing
Striping
Volume
Partition
Objective 3.12: Identify the Purpose and Characteristics of Disaster Recovery
Which two of the following backup methods clear the archive bit from files that have been backed up?
Incremental
Full
Differential
Periodic
In a GFS rotation, what does the GFS refer to?
Weekly, monthly, and yearly backups
The frequency of RAID rebuilds
Daily, weekly, and monthly backups
The replacement of tapes with new ones in a backup cycle
Which of the following occurs during a normal server backup?
All workstation files are backed up
Only files that have changed since the last backup are backed up
Only those files that have changed since the last differential backup are backed up
All files are backed up
What type of backup is being performed on a server when only files that have changed are backed up?
Full
Incremental
Differential
Tape
Which of the following backup types use the fewest number of tapes?
Weekly normal-daily incremental
Daily normal
Weekly normal-daily differential
Weekly differential-daily incremental
How often should a full backup of server data be scheduled?
Every three months
Once a week
Once a month
Once a year
A server uses a backup strategy in which backups occur three times a week. The first backup is a full backup. The second backup copies files that have changed since the first backup, and the third backup copies all files that were changed since the first backup. What type of strategy does this describe?
Differential
Normal
Incremental
Full
A server is backed up each day using a normal backup. Backup times using this method have become too long and an alternative plan that allows a full backup on weekends but a short backup during the weekdays is needed. Which of the following represents the best plan?
Weekly normal backup and daily differential backups
Weekly normal backups and daily incremental backups
Weekly incremental backups
Daily full backup
Why should a backup strategy include provisions for off-site storage of data tapes?
So the server can be moved to the off-site location
So users won't be able to access server data
So all server data can be copied to a backup server
So the server data will be protected from environmental disasters
Which two of the following backup methods clears the archive bit?
Full
Incremental
Differential
Sequential
Which of the following backup types takes the longest time to operate?
Incremental
Normal
Differential
Sequential
Which of the following backup methods will back up the files regardless of the state of the archive bit?
Incremental
Differential
Full
Sequential
During a normal server backup ________.
only those files that have changed since the last differential backup are backed up
only files that have changed since the last backup are backed up
all files are backed up
all workstation files are backed up
What is the most common backup method used with servers?
Tape
Floppy disk
Removable media
Windows Backup
The backup of a server is set to perform daily backups of all files that have changed since the last complete backup of the server, regardless of whether they have changed since the backup on the previous day. What type of backup is being used?
Tape
Incremental
Full
Differential
A backup strategy in which only files that have changed since the last full or incremental backup is called a ________.
Differential
Incremental
Full
Normal
What is the standard method of verifying that a backup copy is valid?
Verify the archive bit status
Check the backup tape integrity
Restore the backup to a machine
Run the system state data backup test