CHAPTER 2
Question 1 :
Question: What will be generated when the first Ethernet station detects a collision?
NACK
CRC misalignment message
Reset broadcast
*Jam signal
Question 2 :
Question: What is used to alleviate congestion?
Install more hubs
Use an extended star
Use a bus topology
*Increase the bandwidth
Question 3 :
Question: Which represents the time it takes a frame to travel from its source station to its final destination on the network?
Hop count
Bits per second
*Latency
Tick time
Question 4 :
Question: What describes the time necessary to move a packet from the data link layer to the physical layer?
Packet delay
*Transmission time
Convergence
Queuing
Question 5 :
Question: Which Layer 1 device is used to extend the coverage area of a LAN segment?
Router
Switch
*Repeater
Gateway
Question 6 :
Question: Full duplex requires how many pairs of wires?
1
*2
3
4
Question 7 :
Question: What percentage of bandwidth is available in each direction when using full-duplex?
50%
75%
*100%
125%
Question 8 :
Question: Which of the following improves the performance of a shared media LAN?
*Segmenting the network
Moving the workstations closer together
Installing a more powerful server
Installing more servers and printers
Question 9 :
Question: Bridges learn about a network by building a table based on which of the following?
*MAC addresses
IP addresses
ARP requests
RIP requests
Question 10 :
Question: Which OSI layer does a router use to make its forwarding decisions?
1
2
*3
4
Question 11 :
Question: Which of the following is created by segmenting a LAN with a Layer 2 Switch?
*More collision domains
Less collision domains
More broadcast domains
Less broadcast domains
Question 12 :
Question: The implementation of switching technology helps to decrease congestion by reducing traffic and increasing which of the following?
Attenuation
*Available bandwidth
Routing protocols
Propagation
Question 13 :
Question: What is read by a switch to begin the forwarding process and reduce latency?
Frame trailer
*Destination MAC address
Source MAC address
Checksum
Question 14 :
Question: Which of the following does a switch use to make forwarding decisions?
Network layer information
Transport layer information
*A MAC address
An IP address
Question 15 :
Question: Switches on a LAN allow the network administrator to do which of the following?
Maintain a shared network segment
Decrease the number of collision domains
Prevent microsegmentation
*Increase the number of collision domains
Question 16 :
Question: What occurs each time a switch stores an address?
Checks the subnet mask
*Time stamps it
Places it in the routing table
Clears the routing table
Question 17 :
Question: A LAN switch allows many users to communicate in parallel through which of the following?
Routing tables
Multipoint protocols
Collision domains
*Virtual circuits
Question 18 :
Question: Which switch type provides connections between ports of like bandwidth?
Asymmetric
Port-centric
Programmable
*Symmetric
Question 19 :
Question: Which area of memory does the switch use to store destination and transmission data?
Storage partition
Delay queue
*Memory buffer
Memory queue
Question 20 :
Question: Switches that receive the entire frame before sending it, use what type of frame forwarding?
Cut-through
Receive and send
Copy and send
*Store-and-forward
Question 21 :
Question: What type of switching method is used when a switch only reads the destination address before forwarding the frame?
*Cut-through
Read and send
Copy and send
Store-and-forward
Question 22 :
Question: How do VLANs group network devices?
Physically
*Logically
Geographically
Topographically
Question 23 :
Question: What protocol is used to allow redundant paths in a switched/bridged network?
RIP
*Spanning Tree
IGRP
ISL
Question 24 :
Question: Which of the following is the default order of Spanning Tree Protocol states?
1. Learning
2. Disabled
3. Blocking
4. Listening
5. Forwarding
*3, 4, 1, 5, 2
4, 3, 1, 2, 5
2, 1, 4, 3, 5
1, 4, 3, 5, 2
CHAPTER 3
Question 1 :Question: A VLAN is based on which type of grouping?*Logical Physical Star Ethernet
Question 2 :Question: What is a VLAN used to create?Autonomous systems *Broadcast domains Network Sectors Virtual sections
Question 3 :Question: Users may be reassigned to different VLANs using which of the following?Hubs *Software Routers Bridges
Question 4 :Question: What is a benefit of using VLANs?Extended collision domains Increased administration Multiple cable runs *Tighter network security Question 5 :Question: What would be the preferred type of link of a VLAN backbone?slow serial low capacity 56 Kbps *High bandwidth Question 6 :Question: Which technique examines particular information about each frame?Latency Frame resolving *Frame filtering Store and forward
Question 7 :Question: According to the IEEE, what is the acceptable way to implement VLANs?Grouping Filtering Source bridging *Frame tagging
Question 8 :Question: Frame tagging functions at what OSI layer?*2 3 1 4
Question 9 :Question: Frame tagging places a unique identifier in the header of each frame as it is forwarded across the network __________.microsegment LAN *backbone WAN Question 10 :Question: Which of the following do VLANs use to make filtering and forwarding decisions?Packets *Frames Presentation header Network design
Question 11 :Question: What technique does 802.1q use to implement VLANs?Grouping Filtering Source bridging *Frame tagging Question 12 :Question: A VLAN makes up a switched network that is logically segmented by all of the following EXCEPT :*Collison domains Functions Applications Project teams Question 13 :Question: What term describes all nodes on the same VLAN ID that are attached to the same switched port?Dynamic Static *Port-centric Static-centric Question 14 :Question: What is the term used when ports on a switch are administratively assigned to a VLAN?Dynamic *Static Default Polled Question 15 :Question: Which of the following VLAN types require changes by the network administrator but are easy to configure, and straightforward to monitor?Dynamic *Static Cut-through Store-and-forward
Question 16 :Question: What is the term used when switch ports are automatically assigned to a VLAN?*Dynamic Static Port-centric Default
Question 17 :Question: Dynamic VLANs can be based on which of the following?MAC addresses Protocol type Logical addressing *All of the above Question 18 :Question: When logically segmenting your network with VLANs, what type of device do you need to ensure proper communication between the VLANs that are created?Switch Bridge Hub *Router
Question 19 :Question: What is an effective preventative measure used with segmentation to prevent broadcast related problems?*Firewalls LANs WANs Bridges Question 20 :Question: Which device is used to reduce or eliminate broadcast related problems?Bridges *Routers Passive hubs Active hubs
Question 21 :Question: VLANs, along with routers, establish which of the following?WANs LANs *Broadcast domains Collision domains
Question 22 :Question: The smaller the VLAN, the smaller the number of users that are affected by which of the following?Packet filtering Switch latency Framing *Broadcasts
Question 23 :Question: How can access be controlled on a secured VLAN?Station address Protocol types Application types *All of the above
Question 24 :Question: The individual ports of a non-intelligent hub can be assigned to how many VLAN(s)?Three Two *One None
CHAPTER 4
Question 1 :
Question: What is the first step in LAN design?
*Establish the design goals
Estimate the design cost
Determine the network users
Determine the physical size
Question 2 :
Question: What is the ability to expand the network without having to perform any major changes to the overall design?
Functionality
Manageability
Operability
*Scalability
Question 3 :
Question: What is the effect of a switch on bandwidth?
*Dedicates bandwidth
Shares bandwidth
Decreases bandwidth
Eliminates bandwidth
Question 4 :
Question: Where should workgroup servers be placed?
MDF
POP
VCC
*IDF
Question 5 :
Question: Which of the following is NOT a factor when configuring an intranet?
Type of data to be accessed
Server privileges
*Providing public access
Outfitting desktops with faster connectivity
Question 6 :
Question: Which of the following results from the use of bridges and switches for segmentation?
Multiple broadcast domains
A single collision domain
A larger overall network
*Multiple collision domains
Question 7 :
Question: Which of the following devices establishes a bandwidth domain also known as the collision domain?
Repeater
*Switch
Active hub
Passive hub
Question 8 :
Question: Which of the following devices is associated with one broadcast domain per port?
Switch
Active hub
*Router
Bridge
Question 9 :
Question: Which of the following is NOT a step in gathering and analyzing requirements for a LAN?
*Develop LAN topology
Track information flow
List applications in use
Address performance issues
Question 10 :
Question: Internetwork design seeks to provide the greatest availability for the least _________.
design time
*cost
network downtime
installation time
Question 11 :
Question: The star/extended star topology uses what type of standard?
Token ring
*Ethernet 802.3
Ethernet 802.5
ARCNET
Question 12 :
Question: What is the most important Layer 1 issue to consider when designing a network?
VLAN layout
*Physical cable plan
Router layout
Switch segmentation
Question 13 :
Question: In a star topology network, what is at the center point of the star?
IDF
Router
HCC
*MDF
Question 14 :
Question: What is the maximum recommended distance of a standard patch cord connecting the horizontal cross connect with switch ports?
3 m
*6 m
9 m
10 m
Question 15 :
Question: When creating multiple wiring closets in a totally switched environment, what else is always created?
*Multiple catchment areas
Multiple broadcast domains
Multiple MDFs
Multiple LANs
Question 16 :
Question: What is the current standard for the bandwidth connecting MDF to IDF in Mbps?
1
10
*100
150
Question 17 :
Question: Which device is one of the most common Layer 2 devices?
*LAN switch
Active hub
Passive hub
Router
Question 18 :
Question: Which of the following is allowed by asymmetric switching?
Shared switching on a segment
*Connections of unlike bandwidth
Dedicated uplink connectivity
Like bandwidth connections
Question 19 :
Question: Which of the following results in network microsegmentation?
Using only hubs for connectivity
Removing bridges from the network
*Using switches for connectivity
Adding more computers on a single segment
Question 20 :
Question: In a pure LAN switch environment, what is the size of the collision domain?
All hosts
Four hosts
*Two hosts
The number of hosts in the broadcast domain
Question 21 :
Question: What type of network segmentation do routers allow?
Logical and Incremental
*Logical and Physical
Virtual and Physical
Virtual and Logical
Question 22 :
Question: What do VLANs provide?
Physical networks
Larger broadcast domains
Decreased security
*Broadcast containment
Question 23 :
Question: What can routers provide when used between VLANs?
*Communication
No services
Larger collision domains
Additional availability of MAC addresses
Question 24 :
Question: What is used to create multiple physical networks in a structured Layer 1 wiring scheme?
*Patching the horizontal and vertical cabling into an appropiate layer 2 switch
Using a router
Connecting the MDF to the IDF
Patching fiber optic cable to coaxial cable
Question 25 :
Question: Which of the following is NOT true about logical and physical network maps?
Give a snapshot of the network
Help troubleshoot
*Show which routing protocol is used
Show subnet mask and router name
CHAPTER 5
Question 1 :
Question: Which OSI layer is responsible for finding the best path through the internetwork?
1
2
*3
4
Question 2 :
Question: What is a router's main responsibility when routing packets?
Traffic control
Collision avoidance
Enforcing security
*Path determination
Question 3 :
Question: What do routers use to make forwarding decisions?
*Routing tables
VLANs
WAN connectivity
Proximity
Question 4 :
Question: Which of the following refers to the number of routers a packet must pass through?
Bandwidth
*Hop count
Tick count
Delay
Question 5 :
Question: What two parts can most protocol addressing schemes be broken down into?
TCP and IP
IPX and SPX
Network and broadcast
*Network and host
Question 6 :
Question: What allows a router to accept a packet on one interface and forward it to another interface?
Broadcast forwarding
*Switching function
Filter and control function
Path determination
Question 7 :
Question: What do routers use to communicate with other routers?
Broadcast forwarding
IP Tunneling
*Routing protocols
Routed protocols
Question 8 :
Question: Which routing protocols would most likely be found running on a multiprotocol router?
IPX/SPX and RIP
RIP and TCP/IP
AppleTalk and IGRP
*RIP and IGRP
Question 9 :
Question: Entries made by an administrator to manipulate a routing table are referred to as which of the following?
*Static routes
Dynamic routes
ARP tables
Routing tables
Question 10 :
Question: Distance-vector routing begins by identifying which directly connected entity?
Routers
Ports
Switches
*Networks
Question 11 :
Question: Which routing protocol is used to communicate between autonomous systems?
RIP
Ethernet
Token Ring
*Exterior routing protocols
Question 12 :
Question: Which of the following are primary goals of routing protocols?
1. Point-to-multipoint routing
2. Rapid convergence
3. Efficiency
4. Flexibility
5. Microsegmentation
1, 2, 3
*2, 3, 4
3, 4, 5
1, 3, 5
Question 13 :
Question: What causes routing loops?
Path determination is optimized
Hop count is set below 50
Convergence is present
*Routing tables have not converged
Question 14 :
Question: What type of information is automatically adjusted as topology changes occur?
Static routes
*Dynamic routes
ARP tables
RARP tables
Question 15 :
Question: What does dynamic routing rely on?
Maintenance of an ARP table
Accurate entry of static routes
*Accurate routing tables
Collision forwarding
Question 16 :
Question: For dynamic routing to work properly what must routers send to other routers?
ARP requests
RARP packets
Static routes
*Timely updates
Question 17 :
Question: Which of the following is another term for shortest path first routing algorithm?
Source bridging
Store-and-forward
Distance-vector
*Link state
Question 18 :
Question: Which of the options below gives two basic steps required when configuring a routing protocol?
1. Configure the interface
2. Enable the routing protocol
3. Disable routing updates
4. Add the network numbers
1, 2
2, 3
*2, 4
3, 4
Question 19 :
Question: What passes periodic copies of routing tables from router to router?
Link state
*Distance vector
Store-and-forward
Cut-through
Question 20 :
Question: Which of the following is a Cisco proprietary protocol?
*IGRP
RIP
OSPF
ISIS
Question 21 :
Question: Routers under a common administration are said to belong to what?
A WAN
A LAN
*An AS
An SNMP
Question 22 :
Question: Select the correct IOS command for configuring IGRP as the routing protocol.
Router#router igrp 100
Router(config-router)>router igrp 100
*Router(config)#router igrp 100
Router(config-if)#set router igrp 100
Question 23 :
Question: Which of the following occurs when a router tries to send information about a route back in the same direction it was received.
*Split horizon
Poison reverse update
Holddown
Routing loop
Question 24 :
Question: At what time interval does IGRP send routing updates?
120 seconds
30 seconds
60 seconds
*90 seconds
Question 25 :
Question: What is the maximum hop count associated with IGRP?
15
50
100
*255
CHAPTER 6
Question 1 :
Question: Which of the following must be configured on a router in order to deny packets based on specific tests?
*Access lists
RIP
IGRP
Source routing
Question 2 :
Question: When using a standard access list, which of the following criteria can routers use for filtering packets?
MAC address
Port numbers
Specific protocols
*Source address
Question 3 :
Question: Along with the packet type, Cisco IOS access lists also check what?
Physical layer headers
*Upper layer headers
Lower layer headers
Data link headers
Question 4 :
Question: What is a possible use of ACLs?
Increased network traffic
Decreased security
*Packet filtering
Decreased latency
Question 5 :
Question: Which order are the statements in an access list processed to determine whether packets should be processed or discarded?
From bottom of the list up
In random order
By prioritizing the incoming packets
*In sequential order
Question 6 :
Question: What happens to a packet that does not match any of the tests in an access list?
*It is discarded.
It is sent to the recipient.
It is stored until the access list is updated.
It is returned to the sender.
Question 7 :
Question: What is the final step in implementing an access list?
*Apply the access list to one or more interfaces.
Set the parameters for the access list tests.
Determine the state of the access list.
None of the above
Question 8 :
Question: Which type of access list uses the number range 100-199?
IPX standard
AppleTalk
IP standard
*IP extended
Question 9 :
Question: IP access lists use which of the following to determine which address bits are examined?
Subnet masks
Network masks
Host IDs
*Wildcard bits
Question 10 :
Question: A wildcard mask bit of "1" means that the corresponding bit must be ___________.
checked
*ignored
deleted
passed
Question 11 :
Question: What would the wildcard mask be to deny traffic only on network 195.67.52.0?
0.0.255.255
255.255.255.0
*0.0.0.255
255.255.0.0
Question 12 :
Question: In an access list, what word can replace 0.0.0.0 255.255.255.255?
Permit
Accept
*Any
All
Question 13 :
Question: When checking a specific address in an access list, you can abbreviate the address and mask 0.0.0.0 by entering the word ________.
permit
deny
any
*host
Question 14 :
Question: Which type of access list would permit or deny part of a protocol suite?
Standard
General
Specific
*Extended
Question 15 :
Question: Which command is used to keep track of how many packets were permitted or denied based on an access-list?
eq
establish
ack
*log
Question 16 :
Question: What does the following access list do?
access-list 1 deny host 172.16.4.13
access-list 1 permit 0.0.0.0 255.255.255.255
int e0
ip access-group 1
*Blocks packets originating from 172.16.4.13 from going out port E0, but permits all other traffic
Blocks packets originating from anywhere except 172.16.4.13 from going out port E0
Permits traffic originating from anywhere except 172.16.4.13 to send FTP packets into port E0
This is an invalid access list
Question 17 :
Question: Which wildcard mask would match the host range for the subnet 192.16.5.32 /27?
0.0.0.32
0.0.0.63
0.0.63.255
*0.0.0.31
Question 18 :
Question: What type of access list would you use to permit or deny specific protocols within the IP suite?
*Extended
Protocol suite
Specific
Standard
Question 19 :
Question: Which port number is used for DNS?
21
33
52
*53
Question 20 :
Question: Which extended ACL parameter allows you to set the acknowledgement bit?
eq
ack
*established
bit set
Question 21 :
Question: Which ACL would permit everyone to telnet to router 192.168.5.2?
router-a(config)#access-list 102 permit ip any host 192.168.5.2 eq 23
router-a#access-list 102 permit ip any host 192.168.5.2 eq 23
*router-a(config)#access-list 102 permit tcp any host 192.168.5.2 eq 23
router-a#access-list 102 permit tcp any host 192.168.5.2 eq 23
Question 22 :
Question: Where should standard access lists be set?
Close to the source
*Close to the destination
On any router in the network
Midway between source and destination
Question 23 :
Question: Access lists can be applied to traffic flowing in which direction?
Inbound only
*Both inbound and outbound
Outbound only
Serial only
Question 24 :
Question: Which Cisco IOS command allows you to view the placement of an access list?
show access list
show access-group
*show ip interface
show interface
CHAPTER 7
Question 1 :
Question: What type of protocol is IPX?
Connection-oriented
*Connectionless
Nonroutable
Connection like
Question 2 :
Question: Which of the following is NOT a part of the Novell IPX Protocol Suite?
Service Advertising Protocol (SAP)
Network Core Protocol (NCP)
*Transmission Control Protocol (TCP)
Sequence Packet Exchange (SPX)
Question 3 :
Question: What does IPX use in the host portion of an address to eliminate the use of ARP requests?
SAP
SPX
*MAC
RARPs
Question 4 :
Question: How do you obtain an IPX network address?
Apply to InterNIC
Use DHCP
Add the address with the subnet mask
*Obtain it from the network administrator
Question 5 :
Question: What is not a valid Cisco IPX Ethernet encapsulation type?
ARPA
Novell-ether
SNAP
*802.3
Question 6 :
Question: What is the encapsulation type on a router for a Novell network running version 3.12?
Novell-ether
ARPA
SNAP
*SAP
Question 7 :
Question: Which frame types are compatible with the Cisco IOS name Novell-ether?
Ethernet_II
Ethernet_802.2
Ethernet_SNAP
*Ethernet_802.3
Question 8 :
Question: What is correct regarding the node number using Novell's IPX addressing scheme?
80 bits long
Written in decimal
*Same as the MAC address
Number assigned by an administrator
Question 9 :
Question: Which metrics does Novell RIP use?
Bandwidth and delay
*Ticks and hop count
Distance and cost
Size and throughput
Question 10 :
Question: Which of the following occurs when a router running Novell RIP has two equal paths to a network?
Selects the route with the lowest hop count.
Discards the packet.
Forwards the packet out the default route.
*Implements load sharing.
Question 11 :
Question: What is the default type of routing protocol used by Novell NetWare?
Link-state
*Distance vector
Hybrid
OSPF
Question 12 :
Question: What do routers do with SAP packets?
*Build a SAP table
Discard the SAP packets
Forward the SAP packets
Send them to a SAP server
Question 13 :
Question: Where are SAP tables stored?
On workstations and servers
*On routers and servers
On routers and workstations
On routers only
Question 14 :
Question: What do NetWare clients use to find NetWare servers?
*GNS packets
SAP packets
RIP packets
SPX packets
Question 15 :
Question: Where does the response to a GNS request come from if there is both a Cisco router and a NetWare server on the same LAN?
Router
*Local NetWare server
Local SAP server
Switch
Question 16 :
Question: When using multiple encapsulations on an interface, what must be assigned?
Multiple protocols
*Multiple network numbers
Multiple subnet masks
Multiple SAP types
Question 17 :
Question: Why would you use the command IPX maximum-paths?
To define the maximum hops
To specify the number of routes available
*To provide load sharing
To increase the tick count
Question 18 :
Question: When configuring interfaces for IPX, what must be assigned to each interface?
IP address
Host address
*Network number
Subnet mask
Question 19 :
Question: Which of the following commands enables IPX routing?
ipx maximum-paths
*ipx routing
ipx network
router novell-rip
Question 20 :
Question: Which configuration command is used to set the number of routes used for load sharing?
ipx routing
ipx networks
*ipx maximum-paths
router rip
Question 21 :
Question: Which command is used to display IPX routing tables?
show ipx servers
*show ipx route
show ipx traffic
show ipx interface
Question 22 :
Question: What is the default WAN tick metric for IPX networks?
Five
*Six
Seven
Eight
Question 23 :
Question: Which IPX routing command is used to show the number and type of packets received and transmitted by the router?
show ipx servers
show ipx route
*show ipx traffic
show ipx interface
Question 24 :
Question: Select the command that you would use to check IPX routing updates.
show ipx routing updates
show ipx routing activity
*debug ipx routing activity
debug ipx rip
Question 25 :
Question: Which Cisco IOS command is used to check IPX SAP updates?
show sap routing updates
show sap routing activity
*debug ipx sap activity
debug sap routing activity
CHAPTER 8
Question 2 :
Question: What is the least implemented component of network administration?
Security
Performance
*Documentation
Baselining
Question 3 :
Question: Which of the following is included in MDF and IDF documentation?
POP specifications
*Rack mount locations
Name of administrator
Server cost
Question 4 :
Question: Which of the following reports would be used to determine what programs are installed on a particular computer?
*Software
Server
Network
Workstation
Question 5 :
Question: Which of the following is used to keep a list of equipment repairs?
Security record
Software record
*Maintenance record
Policy record
Question 6 :
Question: Which of the following would NOT be found on security documentation?
User rights
Firewall support
*Software listings
Physical access to the network
Question 7 :
Question: Which of the following refers to documentation that outlines what is and what is not permissible on the network?
*User policies
Internet guidelines
Group restrictions
Workstation permissions
Question 8 :
Question: What criteria should be used to select network passwords?
Specific family names
Birth dates
Mother's maiden name
*Network policy
Question 9 :
Question: What is the reason magnetic tape is used to backup data?
Speed
Easily locate data
*Cost
Tape never needs replacing
Question 10 :
Question: Which type of backup stores all files that have been created and modified since the last full backup?
*Incremental
Hierarchical
Copy
Daily
Question 11 :
Question: Which of the following redundancy techniques uses disk striping with parity and requires a minimum of three disks?
RAID 0
RAID 1
RAID 4
*RAID 5
Question 12 :
Question: Risks associated with working on the inside of a computer can be reduced by doing which of the following?
*Using a grounding strap
Standing on synthetic carpet
Turning the power on
Wearing leather shoes
Question 13 :
Question: Which device controls voltage spikes and HF noise?
Surge Suppressor
*Isolating transformer
Regulator
Wall outlet
Question 14 :
Question: What is a solution to the problem of EMI/RFI effecting performance on your network?
Running cable along power lines
*Using STP cable
Using fluorescent lighting
Use generators to power switches in MDF
Question 15 :
Question: Which of the following is a program that spreads across computers and usually reproduces copies of itself in a computer's memory?
CRC error
SAP updates
*Worm
BDU's
Question 16 :
Question: Which of the following is a program that usually has a negative effect on executable programs?
Trojan Horse
*Virus
Worm
Infection
Question 17 :
Question: Which of the following is NOT used as a baseline measure?
Bandwidth utilization
Collision count
Broadcast traffic
*Configuration errors
Question 18 :
Question: A peer-to-peer network is also known as what type of network?
Client-server
Thin client
*Workgroup
Home office
Question 19 :
Question: What is the recommended maximum number of users in a peer-to-peer network?
5
*10
15
20
Question 20 :
Question: Which of the following is NOT associated with a peer-to-peer network?
Easily shared resources
No additional software is required
*Requires a dedicated server
Less expensive to create
Question 21 :
Question: Which network operating system supports multi-user, multitasking, primarily uses NFS security, and is kernel based?
Netware 4.11
*Unix
Windows NT 4.0
Netware 5.0
Question 22 :
Question: What controls the resources and management of a client-server network?
Server
*Network operating system (NOS)
Host
Client
Question 23 :
Question: Network troubleshooting is defined as what type of process?
An applied science
*A systematic process
A skill
An applied theory
Question 24 :
Question: What is your first step in the troubleshooting process?
Analyze data
Undo previous network changes
*Gather data
Ignore the call
Question 25 :
Question: Which command will test the loopback function on the NIC?
*Ping 127.0.0.1
Telnet 127.0.0.1
Ping 127.0.0.0
Telnet 127.0.0.0