N10-004.pdf

Card Set Information

Author:
cutiepie0816
ID:
21497
Filename:
N10-004.pdf
Updated:
2010-06-01 20:48:17
Tags:
network
Folders:

Description:
NEtwork + cettifications studyguide
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user cutiepie0816 on FreezingBlue Flashcards. What would you like to do?


  1. You work as the network administrator at CertKiller.com. The CertKiller.com management wants
    you to connect the clients to a news server with a suitable protocol.
    What should you do?
    A.) You should consider using NNTP.
    B.) You should consider using NCP.
    C.) You should consider using SMTP.
    D.) You should consider using IMAP4.
    Answer: A

    • Explanation:
    • The Network News Transfer Protocol (NNTP) is the TCP/IP protocol used to access Usenet news
    • servers. Usenet news servers contain thousands of individual message boards known as
    • newsgroups. Each newsgroup is about a particular subject (cars, dating, computers, etc.).
    • Chances are, if you have an interest, there is a newsgroup about it. The details of the NNTP
    • protocol are specified in RFC 977.
  2. You work as the network administrator at CertKiller.com. You have received instruction to make
    use of a protocol to transmit usernames and passwords as cleartext.
    What should you do?

    A.) You should consider using SSH.
    B.) You should consider using RADIUS.
    C.) You should consider using PAP.
    D.) You should consider using CHAP.
    Answer: C

    • Explanation:
    • Of all the authentication schemes in use today, the Password Authentication Protocol (PAP) is
    • arguably the simplest. In PAP, pairs of usernames and passwords are used. When a client wants
    • to authentication to a server, for example, the client will send the username and password to the
    • server over the network. The username and password are sent in clear text, that is to say,
    • unencrypted. The server receives the username and password and compares them to an
    • encrypted, locally stored table of username-password pairs. If the username and password is a
    • match, the client is authenticated.
  3. You work as a network technician at CertKiller.com. The newly appointed CertKiller.com trainee
    wants to know which of the following forms part of the TCP/IP protocol suite.
    What should you reply?

    A. The UDP forms part of the TCP/IP protocol suite.
    B. The IPX forms part of the TCP/IP protocol suite.
    C. The NetBEUI forms part of the TCP/IP protocol suite.
    D. The SPX forms part of the TCP/IP protocol suite.
    Answer: A

    • Explanation:
    • The TCP/IP protocol stack has two Transport layer protocols: Transmission Control Protocol
    • (TCP) and User Datagram Protocol (UDP)
    • TCP is connection oriented, and UDP is connectionless. Some upper-layer protocols, such as FTP
    • and HTTP, require reliable connection-oriented service and, therefore, use TCP. Other upper-layer
    • protocols, such as Trivial File Transfer Protocol (TFTP) and Network File System (NFS), require
    • increased speed and will trade reliability for that speed. They, therefore, use UDP.
  4. You work as the network administrator at CertKiller.com. A new CertKiller.com technician wants to
    know which of the following a connectionoriented
    protocol is.
    What should you reply?

    A. The UDP can be class as a connectionoriented
    protocol.
    B. The SPX can be class as a connectionoriented
    protocol.
    C. The TCP can be class as a connectionoriented
    protocol.
    D. The IP can be class as a connectionoriented
    protocol.
    Answer: C

    • Explanation:
    • TCP is the Transport layer of the protocol and serves to ensure a reliable, verifiable data
    • exchange between hosts on a network. TCP breaks data into pieces, wraps the pieces with the
    • information needed to identify it as a piece of the original message, and allows the pieces to be
    • reassembled at the receiving end of the communications link. The wrapped and bundled pieces
    • are called datagrams. Datagrams are also referred to as segments for TCP due to the way it often
    • splits the original data into more manageable chunks.
  5. You work as the network administrator at CertKiller.com. A new CertKiller.com technician wants to
    know which protocols are needed for E-mail traffic.

    What should you tell him? (Choose THREE)

    A. You should inform the technician that he can use POP3.
    B. You should inform the technician that he can use SNMP.
    C. You should inform the technician that he can use SMTP.
    D. You should inform the technician that he can use NTP.
    E. You should inform the technician that he can use TFTP.
    F. You should inform the technician that he can use IMAP4.
    G. You should inform the technician that he can use SSH.
    Answer: A,C,F

    • Explanation:
    • POP3: Post Office Protocol (POP) provides a storage mechanism for incoming mail; the latest
    • version of the standard is known as POP3. When a client connects to a POP3 server, all the
    • CompTIA N10-004: Practice Exam
    • "Pass Any Exam. Any Time." - www.actualtests.com 3
    • ActualTests.com
    • messages addressed to that client are downloaded; there is no way to download messages
    • selectively. Once the messages are downloaded, the user can delete or modify messages without
    • further interaction with the server. In some locations, POP3 is being replaced by another standard,
    • IMAP.
    • SMTP: Simple Mail Transfer Protocol (SMTP) allows for a simple e-mail service and is responsible
    • for moving messages from one e-mail server to another. The e-mail servers run either Post Office
    • Protocol (POP) or Internet Mail Access Protocol (IMAP) to distribute e-mail messages to users.
    • IMAP4: Internet Message Access Protocol (IMAP) allows users to download mail selectively, look
    • at the message header, and download just a part of a message, store messages on the e-mail
    • server in a hierarchical structure, and link to documents and Usenet newsgroups. Search
    • commands are also available so that users can locate messages based on their subject, header or
    • content. IMAP has strong authentication features and supports the Kerberos authentication
    • scheme originally developed at MIT. The current version of IMAP is version 4.
  6. You work as a network technician at CertKiller.com. A CertKiller.com user named Mia Hamm has
    the following complain. She has pinged the following: 127.0.0.1 and received the following
    message: Unable to contact IP driver, error code 2.
    What should you do?
    A. You should consider flushing the DNS Cache.
    B. You should consider installing the NetBEUI.
    C. You should consider releasing the IP address.
    D. You should consider installing the TCP/IP protocol.
    Answer: D

    • Explanation:
    • A value of exactly 127, while technically in the Class A range, is reserved as a software loopback
    • test address. If you send an echo request to 127.0.0.1, the ping doesn't actually generate any
    • network traffic. It does, however, test that TCP/IP is installed correctly.
    • If you didn't get reply and received error code than check the driver of TCP/IP stack.
  7. You work as the network administrator at CertKiller.com. CertKiller.com uses different operating
    systems in the company. You have given the instruction to use a protocol to authenticate
    resources which will include computers, users and printers.
    What should you do?

    A. You should consider using the LDAP protocol.
    B. You should consider using the SMTP protocol.
    C. You should consider using the TCP protocol.
    D. You should consider using the UDP protocol.
    Answer: A

    • Explanation:
    • In large networks, most administrators have set up some kind of directory that keeps track users
    • and resources (e.g., NDS, Active Directory). In order to have a standard method of accessing
    • directories, the Lightweight Directory Access Protocol (LDAP) was developed. It allows clients to
    • perform object lookups with a directory using a standard method. LDAP was originally specified as
    • RFCs 1487 (version 1) and 1777 (version 2), with RFC 3377 proposing the commonly used third
    • version, which fixes a number of shortcomings in the protocol.
  8. Which of the following statements is TRUE regarding a small remote office network unable to
    access the home office network which requires the clients to obtain IP addresses by selecting the
    protocol which should be enabled?

    A. You should have the Simple Mail Transfer Protocol (SMTP) protocol enabled.
    B. You should have the Trivial File Transfer Protocol (TFTP) protocol enabled.
    C. You should have the Dynamic Host Configuration Protocol (DHCP) enabled.
    D. You should have the Secure Socket Layer (SSL) extensions enabled.
    Answer: C

    • Explanation:
    • A protocol used on a TCP/IP network to send configuration data, including TCP/IP address,
    • default gateway, subnet mask, and DNS configuration, to clients. See also default gateway,
    • Domain Name Service, subnet mask, Transmission Control Protocol/Internet Protocol.
  9. You work as the network administrator at CertKiller.com. A new CertKiller.com technician wants to
    know which authentication protocols can be uses to transmit plain text passwords over the
    internet.
    What should you reply?
    A. You should consider using RADIUS.
    B. You should consider using PAP.
    C. You should consider using CHAP.
    D. You should consider using Kerberos.
    Answer: B

    • Explanation:
    • Of all the authentication schemes in use today, the Password Authentication Protocol (PAP) is
    • arguably the simplest. In PAP, pairs of usernames and passwords are used. When a client wants
    • to authentication to a server, for example, the client will send the username and password to the
    • server over the network. The username and password are sent in clear text, that is to say,
    • unencrypted. The server receives the username and password and compares them to an
    • encrypted, locally stored table of username-password pairs. If the username and password is a
    • match, the client is authenticated.
  10. Which of the following statements describes the TCP/IP configuration of a Windows XP
    Professional computer that has a TCP/IP address of 169.254.1.37?

    A. The computer has been configured with a static address of 169.254.1.37.
    B. The computer is set for DHCP, but no DHCP server is available on the network.
    C. The computer received the address from a DHCP server on the network.
    D. The computer received the address from a BootP server on the network.
    Answer: B

    • Explanation:
    • IP address 169.254.1.37 is a self-assigned Automatic Private IP Addressing (APIPA) address. It is
    • automatically assigned to a Windows-based DHCP client that fails to obtain a valid lease from a
    • DHCP server.
  11. You work as a network technician at CertKiller.com. The newly appointed CertKiller.com trainee
    wants to know which network protocol has the ability to recover from lost/corrupted network
    packets during transmission.
    What would your reply be?
    A. You should inform the trainee that the Internet Protocol Security (IPSec) protocol has the ability.
    B. You should inform the trainee that the Internetwork Packet Exchange (IPX) protocol has the
    ability.
    C. You should inform the trainee that the Kerberos protocol has the ability.
    D. You should inform the trainee that the Transmission Control Protocol (TCP) protocol has the
    ability.
    Answer: D

    • Explanation:
    • The private address spaces listed with each class description are specified in RFC
    • 1918 as being available to anyone who wants to use IP addressing on a private network but does
    • not want to connect these networks directly to the Internet. Private addresses are those addresses
    • that are not permitted to be routed by Internet routers. In fact, ISPs can be fined for passing traffic
    • with these addresses as source or destination. Conversely, public addresses are those IP
    • addresses that are allowed to be passed by Internet routers. Examples of Class C networks are
    • the 256 private networks ranging from 192.168.0.0 to 192.168.255.0.
  12. Which of the following can be used to automatically assign IP (Internet Protocol) configuration to
    host computers?

    A. DNS (Domain Name Service)
    B. SNMP (Simple Network Management Protocol)
    C. SMTP (Simple Mail Transfer Protocol)
    D. DHCP (Dynamic Host Configuration Protocol)
    Answer: D

    • Explanation:
    • DHCP is used to automate the assignment of IP configurations to host computers which are then
    • called DHCP clients.
  13. Which of the following statements is TRUE regarding the protocol which makes use of Domain
    Name Resolution (DNS) to find addresses?

    A. The Transmission Control Protocol / Internet Protocol (TCP/IP) makes use of DNS to find
    addresses.
    B. The Trivial File Transfer Protocol (TFTP) protocol makes use of DNS to find addresses.
    C. The Kerberos protocol makes use of DNS to find addresses.
    D. The Internetwork Packet Exchange / Sequence Packet Exchange (IPX/SPX) protocol makes
    use of DNS to find addresses.
    • Answer: A
    • Explanation:
    • The abbreviation DNS stands for Domain Name Service. You use DNS to translate host names
    • and domain names to IP addresses, and vice versa, by means of a standardized lookup table that
    • the network administrator defines and configures. The system works just like a giant telephone
    • directory.
    • Suppose you are using your browser to surf the Web and you enter the URL
    • http://www.microsoft.com to go to the Microsoft home page. Your web browser then asks the
    • TCP/IP protocol to ask the DNS server for the IP address of www.microsoft.com. When your web
    • browser receives this address, it connects to the Microsoft web server and downloads the home
    • page. DNS is an essential part of any TCP/IP network because it simplifies the task of
    • remembering addresses; all you have to do is simply remember the host name and domain name.
  14. You work as a network technician at CertKiller.com. The newly appointed CertKiller.com trainee
    wants to know which protocol has the ability to access files on a remote server.
    What should you reply?
    A. The ARP protocols can access files on a remote server.
    B. The SIP protocols can access files on a remote server.
    C. The FTP protocols can access files on a remote server.
    D. The NTP protocols can access files on a remote server.
    Answer: C

    • Explanation:
    • File Transfer Protocol (FTP) provides a mechanism for single or multiple file transfers between
    • computer systems; when written in lowercase as "ftp," it is also the name of the client software
    • used to access the FTP server running on the remote host. The FTP package provides all the
    • tools needed to look at files and directories, change to other directories, and transfer text and
    • binary files from one system to another. FTP uses TCP to actually move the files.
  15. You work as a network technician at CertKiller.com. The newly appointed CertKiller.com trainee
    wants to know which transfer methods transfer files with the use of User Datagram Protocol
    (UDP).
    What would your reply be?
    A. You should know that the IPSec protocol would use the UDP protocol.
    B. You should know that the Trivial File Transfer Protocol (TFTP) would use the UDP protocol.
    C. You should know that the Kerberos protocol would make use of the UDP protocol.
    D. You should know that the File Transfer Protocol (FTP) protocol would use the UDP protocol.
    • Answer: B
    • Explanation: Like the IPX/SPX protocol stack, the TCP/IP protocol stack has two Transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) TCP is connection oriented, and UDP is connectionless. Some upper-layer protocols, such as FTP and HTTP, require reliable connection-oriented service and, therefore, use TCP. Other upper-layer protocols, such as Trivial File Transfer Protocol (TFTP) and Network File System (NFS), require increased speed and will trade reliability for that speed. They, therefore, use UDP.
  16. You work as a network technician at CertKiller.com. The newly appointed CertKiller.com trainee
    wants to know which protocol is used by the UDP ports.
    What should you reply?
    A. RIPv2 is used for the UDP ports.
    B. HTTP is used for the UDP ports.
    C. HTTPS is used for the UDP ports.
    D. TFTP is used for the UDP ports.
    Answer: D

    • Explanation:
    • Trivial File Transfer Protocol (TFTP) is a "stripped down" version of FTP, primarily used to boot
    • diskless workstations and to transfer boot images to and from routers. It uses a reduced feature
    • set (fewer commands and a smaller overall program size). In addition to its reduced size, it also
    • uses UDP instead of TCP, which makes for faster transfers but with no reliability.
  17. You work as a network technician at CertKiller.com. A CertKiller.com sales representative uses his
    operating system at home which is connected to the Internet 24/7. During a meeting at work, he
    contacted you because he was unable to connect to his computer at home that has an IP address
    of 192.168.1.125.
    What could be the cause?
    A. The outgoing connects of CertKiller.com is blocked by a firewall.
    B. The computer at work does not have FTP client installed.
    C. The computer at the sales representative's house does not have the FTP server installed.
    D. The computer at home does not have a routable IP address across the Internet.
    Answer: D

    • Explanation:
    • Application Layer is the highest layer; applications such as FTP, Telnet, and others interact
    • through this layer.
  18. You work as a network technician at CertKiller.com. The newly appointed CertKiller.com trainee
    wants to know the highest level of fault tolerance after reconfiguring
    a server to facilitate DNS
    requests.
    What should you reply?

    A. He should consider adding a Kerberos server.
    B. He should consider configuring traffic shaping.
    C. He should consider configuring the WEP.
    D. He should consider adding a second NIC.
    Answer: D

    • Explanation:
    • The first is the active NIC (the device that responds to network requests), and the second is the
    • failover NIC. The failover NIC is an exact duplicate of the active NIC. The failover NIC monitors the
    • active NIC and its condition by using what is known as a heartbeat. A Heartbeat is a signal that
    • comes from the active NIC at a specified interval. If the failover NIC doesn't receive a heartbeat
    • from the active NIC in the specified interval, the failover NIC considers the active NIC inactive, and
    • the failover NIC comes online (becomes active) and is now the active NIC.
  19. You work as a network technician at CertKiller.com. You have been given the instruction to use a
    connectionless state protocol that does not use acknowledgements.
    What should you do?
    A. You should consider using POP3.
    B. You should consider using UDP.
    C. You should consider using NTP.
    D. You should consider using TCP.
    • Answer: B
    • Explanation: User Datagram Protocol (UDP) is a Transport layer connectionless protocol that does not provide the reliability (acknowledge) services available with TCP but instead provides best effort transmission services to application protocols. UDP gives applications a direct interface with IP and the ability to address a specific application protocol running on a host via a port number without setting up an end-to-end virtual circuit or connection. UDP, like TCP, uses IP to deliver its packets.
  20. You work as a network technician at CertKiller.com. The CertKiller.com user wants to know which
    protocol/protocols has the fastest file transfers.
    What would your reply be?
    A. The Simple Mail Transfer Protocol (SMTP) protocol has the fastest file transfers.
    B. The Password Authentication Protocol (PAP) protocol has the fastest file transfers.
    C. The Secure File Transfer Protocol (SFTP) protocol has the fastest file transfers.
    D. The Trivial File Transfer Protocol (TFTP) protocol has the fastest file transfers.
    • Answer: D
    • Explanation:
    • Trivial File Transfer Protocol (TFTP) is a "stripped down" version of FTP, primarily used to boot
    • diskless workstations and to transfer boot images to and from routers. It uses a reduced feature
    • set (fewer commands and a smaller overall program size). In addition to its reduced size, it also
    • uses UDP instead of TCP, which makes for faster transfers but with no reliability.
  21. You work as a network technician at CertKiller.com. The newly appointed CertKiller.com trainee
    wants to know takes place at the application layer of the OSI model.
    What should you reply?

    A. UDP takes place at the application layer of the OSI model.
    B. FTP takes place at the application layer of the OSI model.
    C. TCP takes place at the application layer of the OSI model.
    D. SPX takes place at the application layer of the OSI model.
    Answer: B

    • Explanation:
    • File Transfer Protocol (FTP) provides a mechanism for single or multiple file transfers between
    • computer systems; when written in lowercase as "ftp," it is also the name of the client software
    • used to access the FTP server running on the remote host. The FTP package provides all the
    • tools needed to look at files and directories, change to other directories, and transfer text and
    • binary files from one system to another. FTP uses TCP to actually move the files.
  22. You work as a network technician at CertKiller.com. You have received instruction from
    management to map the names to IP address.
    What should you do?
    A. He should consider using IMAP4.
    B. He should consider using DHCP.
    C. He should consider using DNS.
    D. He should consider using Telnet.
    • Answer: C
    • Explanation: The abbreviation DNS stands for Domain Name Service. You use DNS to translate host names and domain names to IP addresses, and vice versa, by means of a standardized lookup table that the network administrator defines and configures. The system works just like a giant telephone directory. Suppose you are using your browser to surf the Web and you enter the URL http://www.microsoft.com to go to the Microsoft home page. Your web browser then asks the TCP/IP protocol to ask the DNS server for the IP address of www.microsoft.com. When your web browser receives this address, it connects to the Microsoft web server and downloads the home page. DNS is an essential part of any TCP/IP network because it simplifies the task of remembering addresses; all you have to do is simply remember the host name and domain name.
  23. Which of the following statements is TRUE regarding the network protocol which makes use of the
    File Transfer Protocol (FTP) protocol?
    A. The Transmission Control Protocol / Internet Protocol (TCP/IP) would make use of the protocol.
    B. You should know that the IPSec protocol would make use of the File Transfer Protocol (FTP)
    protocol.
    C. You should know that the Kerberos protocol also make use of the FTP protocol.
    D. You should know that the Network Basic Extended User Interface (NetBEUI)
  24. Answer: A
    • Explanation:
    • Like the IPX/SPX protocol stack, the TCP/IP protocol stack has two Transport layer protocols:
    • Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
    • TCP is connection oriented, and UDP is connectionless. Some upper-layer protocols, such as FTP
    • and HTTP, require reliable connection-oriented service and, therefore, use TCP. Other upper-layer
    • protocols, such as Trivial File Transfer Protocol (TFTP) and Network File System (NFS), require
    • increased speed and will trade reliability for that speed. They, therefore, use UDP.
  25. You work as a network technician at CertKiller.com. You have received instruction from
    management to allow the users to use a FQDN as a replacement for the IP address.
    What should you do?
    A. You should consider using the DNS protocol.
    B. You should consider using the WINS protocol.
    C. You should consider using the IMAP4protocol.
    D. You should consider using the FTP protocol.
  26. Answer: A
    • Explanation:
    • A Fully Qualified Domain Name (FQDN) is the type of name that you use when surfing the Web. It
    • consists of a top-level domain name, such as .com, for example, preceded by a second-level
    • domain name, such as comptia, preceded by a server name or subdomain string, such as www.
    • For FQDN-to-IP address resolution, TCP/IP uses Domain Name Service (DNS). Many operating
    • systems use DNS for name resolution, but Unix (whose networking is based on TCP/IP) uses
    • DNS almost exclusively, and today, so does Microsoft Windows
  27. You work as a network technician at CertKiller.com. The newly appointed CertKiller.com trainee
    wants to know which protocol at the transport layer of the OSI model is the best choice for a
    delivery method.
    What should you reply?
    A. The UDP protocol.
    B. The HTTP protocol.
    C. The TCP protocol.
    D. The FTP protocol.
  28. Answer: A
    • Explanation:
    • User Datagram Protocol (UDP) is a Transport layer connectionless protocol that does not provide
    • the reliability (acknowledge) services available with TCP but instead provides best effort
    • transmission services to application protocols. UDP gives applications a direct interface with IP
    • and the ability to address a specific application protocol running on a host via a port number
    • without setting up an end-to-end virtual circuit or connection. UDP, like TCP, uses IP to deliver its
    • packets.
  29. You work as a network technician at CertKiller.com. The newly appointed CertKiller.com trainee
    wants to know which of the following forms part of the TCP/IP protocol suite.
    What should you reply?
    A. The UDP forms part of the TCP/IP protocol suite.
    B. The IPX forms part of the TCP/IP protocol suite.
    C. The NetBEUI forms part of the TCP/IP protocol suite.
    D. The SPX forms part of the TCP/IP protocol suite.
  30. Given the following output, which utility was used?
    Interface 10.10.10.1 on Interface 0x1000004
    Internet Address Physical Address Type
    10.10.10.5 00-e0-29-62-0d-de dynamic
    10.10.10.11 00-00-08-fd-97-fa static
    A. arp
    B. traceroute
    C. ping
    D. ipconfig
  31. Answer: A
    • Explanation:
    • arp translates IP addresses to MAC addresses. It is primarily used for resolving duplicate IP
    • addresses and displays a list of IP addresses and their corresponding MAC addresses as shown
    • in the output above.
  32. You have a network that is connected to the Internet for only maintenance purposes. You place a
    firewall between your network and they Internet. You configure the firewall to permit only UDP
    traffic. Which network file transfer protocol will be able to pass through the firewall?
    A. NNTP
    B. IRTF
    C. SNMP
    D. TFTP
    Answer: D

    • Explanation:
    • The Trivial File Transfer Protocol transfers files and use UDP
  33. You work as a network technician at CertKiller.com. You have received complaints from the
    CertKiller.com users that they have difficulty accessing the Internet. However, they can connect to
    the E-mail server. You need to use a command to display the MAC address.
    What should you do?
    A. You should consider using ipconfig.
    B. You should consider using arps.
    C. You should consider using arpa.
    D. You should consider using nbtstat R.
    Answer: C

    • Explanation:
    • The Address Resolution Protocol, or ARP, is part of the Transmission Control Protocol/Internet
    • Protocol (TCP/IP) protocol stack; it is used to translate TCP/IP addresses to MAC (media access
    • control) addresses using broadcasts. When a machine running TCP/IP wants to know which
    • machine on an Ethernet network uses a particular IP address, it will send an ARP broadcast that
    • says, in effect, "Hey! Who is IP address xxx.xxx.xxx.xxx ?" The machine that owns the specific
    • address will respond with its own MAC address. The machine that made the inquiry then adds that
    • information to its own ARP table. In addition to the normal usage, the ARP designation refers to a
    • utility in Windows that you can use to manipulate and view the local workstation's ARP table. To
    • display the entire current ARP table, use the
    • Arp command with the -a switch, like this:
    • arp -a

What would you like to do?

Home > Flashcards > Print Preview