Network+ Questions

Started by certforumz, July 12, 2011, 09:03:49 PM

Previous topic - Next topic

Vijayb

Q4.Which of the following is a multicast address (Class D)?

         A.   127.0.0.1
         B.   10.10.19.1
         C.   226.12.14.112
         D.   204.16.1.36
Answer / Explanation: C

226.12.14.112/ The range of numbers from 224.0.0.0 to 239.255.255.255 is used for multicast packets. This is known as Class D address range.

Vijayb

Q5.What is the core administrative unit in Domain Name System (DNS) is called?

         A.   matrix
         B.   zone
         C.   domain
         D.   com
Answer / Explanation: B

The core administrative unit in DNS is called 'zone'. A zone is a physical file composed of resource records that define one or more domains. A domain is a node in the DNS namespace and all sub-domains below it.
In other words, a zone file is a text file that describes a hierarchical node of the Domain Name System (DNS) called a DNS zone. In a DNS Zone file, each line can hold only one record, and each DNS Zone file must start with the TTL (Time to Live), which specifies for how long the records should be kept in the DNS Server's cache. The other mandatory record for a DNS Zone file is the SOA (Start of Authority) record - it specifies the primary authoritative name server for the DNS Zone. Each line typically defines a single resource record.
A line begins with a domain name, but if left blank, defaults to the previously defined domain name. Following the domain name is the TTL, the class (which is almost always 'IN' for 'internet' and rarely included), the type of resource record (RR, such as A, MX, SOA, etc.), followed by type-specific data such as the IPv4 address for A records. Comments can be included by using a semicolon and lines can be continued by using parenthesis.

An example DNS file is given below:
$ORIGIN mydomain.com. ; designates the start of this zone file in the name space
$TTL 1h ; The default expiration time of a resource record without its own TTL value
mydomain.com. IN SOA ns.mydomain.com. root.mydomain.com. (
2008120710 ; serial number of this zone file
1d ; slave refresh (1 day)
1d ; slave retry time in case of a problem (1 day)
4w ; slave expiration time (4 weeks)
1h ; minimum caching time in case of failed lookups (1 hour) )

mydomain.com. NS dns1.hosting.com. ; ns.mydomain.com is the nameserver for example.com
mydomain.com. NS dns2.hosting.com. ; dns2.hosting.com is a backup nameserver for example.com
mydomain.com. MX 10 mx1.hosting.com; mail.example.com is the mailserver for mydomain.com
mydomain.com. A 209.25.134.47 ; ip address for 'mydomain.com'

Vijayb

Q6.Which utility should be used for copying files from a UNIX computer to your Windows computer working as client?
   
      A.   NFS
      B.   NTP
      C.   FTP
      D.   Telnet
Answer / Explanation: C

In OSI model, applications work at the top layer, called Applications Layer. Some of the applications layer protocols are NFS, NTP, FTP, and Telnet.
NFS (Short for Network File System): NFS allows a system to share directories and files with others over a network. By using NFS, users and programs can access files on remote systems almost as if they were local files.
NTP (Short for Network Time Protocol): NTP is an Internet protocol used to synchronize the clocks of computers to some time reference.
FTP: (Short for File Transfer Protocol): FTP is a protocol used to copy a file from one host to another over a TCP/IP-based network, such as the Internet. FTP is used with user-based password authentication or with anonymous user access.
Telnet: Telnet is a TCP/IP protocol used to connect to a server using a remote terminal over a network such as Internet or intranet. You work with a remote server as if you are directly connected. In other words, Telnet is a terminal emulation protocol that enables remote access to server resources.
One thing common with all these protocols are that they are built on client-server architecture and utilizes separate control and data connections between the client and server applications, which solves the problem of different end host configurations (i.e., Operating System, file names).

Vijayb

Q7.Match the following:

      A. Repeaters       1. Data Link Layer
      B. Bridges            2. Network Layer
      C. Routers           3. Physical Layer

    a)    A --->2, B--->3, C--->1
    b)    A--->3, B---->1, C---->2
    c)    A--->3,B----->2, C---->1
    d)    A---->1, B---->2, C---->3

Answer / Explanation:   b

The most frequently used network devices may be categorized as repeaters, hubs, switches, and routers. These devices let you connect computers, printers, and other devices to communicate with each other.The medium that is used for communication is usually cable (optical or copper) and air (Wifi, bluetooth, etc.).
A repeater is a basic device that simply amplifies the input signals and retransmits. It is used to extend the range of a network segment.
For example, the range of a 10BaseT network segment is 100meters by default.If the end devices are at a distance more than 100 meters, you will require a repeater so that the transmitted signals are received at the destination device without losing any information.
A bridge/switch essentially forwards the frames that come from one port to other ports.A switch is used to connect two or more network segments. A switch learns the physical addresses of sending devices by reading the MAC address and mapping it to the port number through which the frame had arrived.
This way, it will quickly learn which MAC address belongs to which switch port, and stores the information in a table (called MAC table). Then onwards, it will send aframe only to the port that connects to the destination device (as specified in the frame). MAC addressesare layer-2 addresses. Because a switch works on MAC addresses, we can classify switches as Layer-2 devices.
A router is used to route packets by connecting two or more networks together.They work at layer-3 of the OSI model.They route packets based on the IP addresses where as a switch forwards packets based on the MAC addresses. A router needs to disseminate an incoming packet down to its IP address and route it to destination based on information available in its routing table.
Switches maintain a MAC table where as routers maintain a routing table. When a switch sends a packet (usually called a frame when sent by a switch) it iscalled forwarding.A router reads the destination IP address of the incoming packet, finds out which interface it needs to go to reach desired destination (which may be several hops away) and routes the packet appropriately.


Vijayb

Q8.Which parameter uniquely identifies a wireless network?

       A.   IP address
       B.   MAC address
       C.   SSID
       D.   Network number
Answer / Explanation:  C

SSID (short for Service Set IDentifier) is a 32-character unique identifier attached to the header of packets when a host connects to a Wireless LAN. The SSID differentiates one WLAN (short for Wireless LAN) from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. An SSID is also referred to as a network name because essentially it is a name that identifies a wireless network.
IP address is a logical address and used for routing packets over an IP network. MAC address is assigned to the NIC (Network Interface Card), which sits on a workstation (host) and connects to a LAN, and identifies the resource physically. Network number is not a relevant option.

Vijayb

Q9.Which of the following are routing protocols?

         A.   RIP,TCP
         B.   TCP,OSPF
         C.   OSPF,IP
         D.   RIP,OSPF
Answer / Explanation:  D

RIP,OSPF / Routing protocols job is to maintain routing tables and route packets appropriately. Examples of routing protocols are RIP, IGRP,EIGRP,OSPF. Routers can support multiple independent routing protocols and can update and maintain routing tables for each protocol independently.Routed protocols are used to transport user traffic from source node to destination node. Examples of routed protocols are IP, IPX, AppleTalk.

Vijayb

Q10.Which of the following is the standard adopted for Ethernet CSMA/CD by IEEE Committee?

          A.   802.2
          B.   802.3
          C.   802.1d
          D.   802.5
Answer / Explanation: B

IEEE 802.1d defines Spanning-Tree Protocol (STP), a link management protocol that provides path redundancy while preventing undesirable loops in a network consisting of bridges or layer-2 switches. STP ensures that there are no loops and maintains data on available backup paths in the event the primary path becomes unreachable.
IEEE 802.2 standard corresponds to Logic Link Control (LLC) and specifies an implementation of the LLC sublayer of the data link layer. IEEE 802.2 LLC is used in IEEE802.3 (Ethernet) and IEEE802.5 (Token Ring).
802.3 is a standard specification for Ethernet, and specifies the physical media and the working characteristics of Ethernet.
IEEE 802.5 defines Token ring LAN protocol where all stations are connected in a ring and each station can directly hear transmissions only from its immediate neighbor. Permission to transmit is granted by a message (token) that circulates around the ring.

JessicaOl

I mean it might work....

But really, I dont get why you need this. Its going to make it so any computer you buy in the future needs to have an adapter to connect to your network, when 99.9 of modern devices with an Ethernet port have gig/E. Your file-server isnt going to connect to your wireless router if you have one via fiber, so it wont be able to serve up files to wireless devices at full speed.

Basically, I dont see the point of the added complexity and cost, not only for your current devices but for future devices you might own, of doing this vs. just getting a good gigabit Ethernet router and gig/E adapters on the computers that need them.

Additional Comment:

Also if you ever want to hook up more than one computer to the file server via fiber youre going to need a switch, and quality fiber switches are VERY expensive.