17.20

ITESS 2 CHAPTER 8

1
What is the default method of authentication used by Telnet in a Windows 2000 environment?
plain text
> NTLM
kerberos
ND5
.net passport

2
Which two of the following statements about passwords are correct? (Choose two.)
No two users should have the same password.
> Passwords should be at least five characters long.
> Passwords should contain at least one non-alphabetic character.
Passwords should be easy to remember such as a favorite sports team.

3
Which two of the following tasks are performed before the Setup wizard stage of a Windows 2000 installation? (Choose two.)
> reconfigure hard disk partitions if necessary
enter the product registration key
> format the disk
configure networking

4
An administrator needs an account that can be used to manage all the computers in a domain. What is the name of the group that Windows 2000 provides to allow the administrator to perform this function?
Root
Admin
> Domain Admins
Enterprise Admins
Administrator

5
What is the purpose of the user's full name in the New User account box?
> It is informational only.
It authenticates the username.
It allows the user to logon.
It matches the user to permissions.

6
A network administrator is setting up a web presence for a small company. The company plans to use the address www.thecompany.com but has not created a DNS entry for the server yet. The administrator has set up a new web server on a networked machine with the IP address 111.111.111.111. What should the administrator initially do to determine if the web server is functioning?
> Run a web browser on the server machine and enter the address http://127.0.0.1.
Run a web browser on a host connected to the same network and enter the address http://111.111.111.111.
Ask someone outside the organization to try to access the website using the address http://111.111.111.111.
Ask someone outside the organization to try to access the website using the address http://www.thecompany.com.
Run a web browser on a host connected to the same network and enter the address http://www.thecompany.com.

7
An administrator has written a script in VBScript and saved the file. What must the administrator do to ensure that WSH is aware that this is a VBScript file?
The first line of the script file must be VBS.
The WSH configuration file needs to be updated with the name of the new script file.
> The file must have the extension .vbs.
WSH must be informed that it is a VBScript file when it is loaded.

8
An administrator has just finished setting up a Windows 2000 PC. What should the administrator do first to ensure that the NIC has been correctly configured?
run the ifconfig -a command
> run the ipconfig /all command
ping the local host
ping the default gateway

9
Which component of Windows 2000 accommodates many types of scripting languages?
VBScript
JScript
> WSH
ShellScript

10
In Windows 2000, what is the name of the HTTP web service located in the Administrative Tools menu?
Default FTP Site
> Default Web Site
Default Web Service
Default Internet Information Service

11
Which two statements about computer names in Windows 2000 are correct? (Choose two.)
A computer name is optional.
> The maximum length for a computer name is 15 characters.
The maximum length for a computer name is
255 characters.
> There is a default computer name based on the organization name.
Computer names on a network do not need to be unique if they have unique IP addresses.

12
Which command can be used in Windows 2000 to capture the output from a printer port and redirect it to a network printer?
> net use
capture
lpt1 > net
netprint

13
Which method should an administrator use to provide for securely sharing files on a larger network?
arrange for each host on the network to share files with the other hosts on the network to distribute the load
only allow clients used by trusted users to share files with others on the network
> require users to map to a network drive on a network file server on the LAN
set up an area on a web server that can then be accessed from anywhere through web browsers

14
When installing Windows 2000 Professional on a new machine, what must you do to boot from the CD?
Nothing, it will automatically boot from the CD.
Select the correct install device option from the menu.
> Enter the CMOS setup and set the boot sequence to boot from the CD-ROM drive first.
Insert the Windows 2000 CD in the CD-ROM drive and press Enter.

15
Which Windows tool allows an administrator to easily view or navigate a file system?
Internet Explorer
> Windows Explorer
WinNT Explorer
File Explorer

16
Which three of the following groups can be created in Windows 2000? (Choose three.)
> local groups
> global groups
> domain local groups
domain global groups
audit groups

17
In Windows 2000, which of the following is a required field when creating a new user account?
the full name
the password
> the user
name
the description

18
In the Windows 2000 NOS, which tools must be loaded to run FTP services?
FTP Services
Network Services
> Internet Information Services
Site Services

19
What are three desirable characteristics of a print server? (Choose three.)
good graphics
> fast processor
> adequate RAM
> adequate disk space
adequate tape backup

20
What is the main reason that NTFS is the preferred file system for a Windows 2000 partition?
It is the only file system that is available to a Windows 2000 administrator.
It cannot be accessed by Linux systems.
It supports a bigger file system than any of the alternatives.
> It offers better security than any of the alternatives.
Most Windows 2000 administrators are trained to use NTFS.

21
In Windows 2000, what is the best way to restore a deleted user account?
Select undelete from the popup menu.
Create a new account with the same user name.
Select undo from the Edit menu.
> Delete cannot be undone.

22
What must a Windows 2000 client do in order to assign a logical drive letter to a shared folder on a network file server?
> map to the network drive
link to the file server
share the network folder
create a path to the file server

***nilai : 100%***

17.09

ITESS 2 CHAPTER 7

1
What must be done when setting up a RAID array in Linux?
All the disks must be partitioned as primary partitions.
All the partitions need an extended partition.
> The disks must be mounted using LVM.
The disks must be formatted using NFS.

2
ext3 introduced journaling capabilities to Linux file systems. What is an advantage of a journaling file system?
> It reduces the time spent recovering a file system after a crash.
It allows administrators to determine the owners of files created on the system.
It keeps file clusters attached to the files to which they are allocated.
It enables Linux systems to interoperate with Windows systems.

3
Most NOSs will only run on certain hardware configurations. For which four items are minimum requirements specified? (Choose four.)
> CPU speed
> CPU type
> RAM
CD-ROM drive
> hard disk space
NIC

4
Linux systems typically dedicate an entire partition to virtual memory. What is this partition called?
the RAM partition
> the swap partition
the pagefile partition
the page partition
the memory partition

5
What are two valid file systems for a Linux partition? (Choose two.)
ext1
> ext2
> ext3
HFS
boot
FAT

6
Which Windows file performs the same function as the Linux LILO files?
HAL
> NTLDR
NTDETECT
NTOSKRNL

7
When setting up a hard disk, what are the three possible types of partitions?
primary, secondary, and logical
> primary, logical, and extended
C, D, and E
boot, program, and data

8
A technician is trying to configure a PC to dual boot with Windows XP and Linux. XP has already been installed and configured in one partition. Linux has been installed in another partition. The technician wishes to replace the LILO loader with grub but is having problems. What is the most likely cause of the problem?
> The technician did not remove the LILO files first.
Grub will not work with XP.
Linux should have been loaded first.
The technician did not run /sbin/grub-install.

9
How is the root partition identified in Linux?
?
Root
/root
> /

10
The figure shows a section of the display from Device Manager. What does it show about the laser printer?
The network cable is unplugged.
> Windows recognized the device but could not locate a suitable driver.
Windows does not know the proper name of the device.
Windows could not locate the device in the expected location.

11
What is the first step every computer will perform when it is turned on, regardless of the operating system?
boot
RAM
> POST
SCSI

12
Which Windows utility can be used to perform a hardware inventory?
Administrative Tools
ScanDisk
Windows Explorer
> Device Manager

13
What is the best source of hardware compatibility information?
> the World Wide Web
a hardware manual
a software manual
the CD-ROM readme document

14
How many partitions can an MS-DOS-type partition table describe?
one
two
> four
eight

15
Which of the following Windows file systems is the most appropriate for a network file server?
FAT16
FAT32
> NTFS
HFS

16
The ping command is used to test network connectivity. What is the best IP address to ping for this test?
the DNS address
the loopback address
the local NIC address
> the default gateway address

17
Which task should be performed before installing a NOS?
Change the system hardware and peripherals before beginning.
> Verify that the NOS supports all application software that will run on the server.
Run the evaluator software prior to loading to establish hardware settings.
Be familiar with the NOS so configuration questions can be ignored.

18
Which four items of information are required for TCP/IP network configuration? (Choose four.)
> IP address of host
> subnet mask
MAC address
> IP address of default gateway
> IP address of DNS server
host name

***nilai : 95.0%***

16.26

ITESS 2 CHAPTER 6

1
Which one of the following office tools is available for both Linux and Windows?
ClarisWorks
ApplixWare
Lyx
> StarOffice

2
Which of the following criteria must software meet in order to display the Open Source Initiative trademark?
It must be easily altered and adapted to all major operating systems and source code must be limited.
It must be compatible with third party add-ons and use standard source code.
It must be provided in multiple languages and cost must be minimal.
> It must be freely distributed without restriction and the source code must be available.

3
What are two important features provided by security on a NOS?
> authentication and encryption
reliable performance and account management
virus protection and prevention from spamming
processor balance and sustained work load

4
Which of the following is a better choice than Telnet for Remote Login Servers on a Linux system?
SSL
> SSH
Kerberos
Remote Access

5
A user account on a server enables the server to do which of the following?
automatically download appropriate applications and print queues to that user
> authenticate that user and allocate those resources the user is allowed to access
assign a specific IP and MAC address to the user's workstation
assign the user to a specific domain and user group

6
Why might the administrator of a small company choose Windows 2000 Server instead of Windows 2000 Professional?
The operating system is to run on a dual-processor system.
> The system is to act as a DNS server.
The company needs an intranet based on a small web server.
The server will be accessed by up to ten simultaneous users.

7
Which client/server file system is used by most varieties of Linux file servers?
FAT32
> NFS
NT
SMB

8
How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment?
> 1
2
4
9

9
Which of the following is open source?
all versions of UNIX
Windows 2000
all versions of NetWare
> Linux

10
Which program, running on a Linux server, allows Windows-based clients to see the Linux file system without installing client software?
NFS
Apache
> Samba
KDE

11
Which type of authentication security does Windows 2000 Professional support?
Secure Socket Layer
> Kerberos
Samba
Apache

12
Which statement accurately describes the Slackware Linux distribution?
It is designed for Linux novices.
It has a range of user interfaces and uses RPM.
> It is designed for advanced users and uses text-based configuration tools.
It is intended solely for non-profit organizations and uses the Debian package manager.

13
What are two popular Desktop Environments that run on Linux?
> GNOME and KDE
Apache and Samba
Xfree86 and GNOME
Apache and KDE

14
What are two benefits of having more than one processor in a system?
support for remote locations and automatic job queuing
> faster speeds and increased work capacity
reduced need for IP addresses and decreased boot time
reduced need for IP addresses and increased manageability

15
How is redundancy built into a server system?
> by including additional hardware components that can take over if other components fail
by including a tape back-up system to preserve data
by adding redundancy software to the system
by keeping duplicates of all data

16
Which Linux distribution was built solely for nonprofit uses?
> Debian GNU/Linux
Caldera eDesktop and eServer
SuSE Linux
LinuxPPC

17
What are three important considerations when selecting a Linux distribution? (Choose three.)
> whether the computer will be used as a client or a server
whether or not the computer will be connected to a network
whether or not a GUI interface is required
> whether or not a command line user interface is required
> the experience level of the user

18
In a Windows NT environment, what is the meaning of the term domain?
a dedicated server containing the database of all IP and MAC addresses on the network
a group of computers located in a specific physical or geographic region
the OU that contains all user accounts
> groups of computers, users, and resources that form an administrative boundary

19
Windows 2000 Professional supports plug-and-play technology. What is one of the major advantages of this technology?
An administrator can add devices from any manufacturer to the system and they will work.
Devices no longer need software drivers to interact with the system.
Components will interact with the system if plugged in prior to system boot.
> An administrator or user can easily add components to the system without manual configuration.

***nilai : 97,4%***

16.17

ITESS 2 CHAPTER 5

1
Which syntax is invalid for opening an FTP connection?
> ftp connect hostname
ftp
ftp 192.127.34.219
ftp computer.company.com

2
Which protocol was designed for file sharing on the Internet?
HTTP
> FTP
SMTP
TCP

3
Which version of Directory Service does Linux use?
NDS
> NIS

NFS
NDAP

4
Which statement correctly describes an NIS slave?
An NIS slave is another name for an NIS client.
An NIS slave is where the NIS database is maintained.
An NIS slave is where the NIS database is created.
> An NIS slave contains a copy of the NIS database.
An NIS slave contains the portions of the NIS database needed by the clients it serves.

5
Which of the following is a list of popular scripting languages?
X Window script, vi script, Gnome script
XML script, Sequel, Gnomepad
UNIX shell script, pico script, EmacsScript
> VBScript, Linux shell script, JavaScript

6
What are three characteristics of an intranet? (Choose three.)
communication with outside business partners
> firewalls
> multiple networks across the company
public access
local area network only
> web servers

7
Which TCP/IP protocol is responsible for file sharing?
DNS
> NFS
UDP
IPX

8
Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)
ASP
FTP
HTML
> HTTP
> HTTPS
IP

9
What is the purpose of a directory service?
It increases the need for redundant logins.
> It provides administrators with centralized control of users and resources across the network.
It impairs network security and must therefore be used with a firewall.
It keeps track of the home addresses and phone numbers of all users.

10
What is the default order in which print jobs are processed when using a FIFO queue?
The last job placed in the queue is the first to be printed.
> The oldest job in the queue is printed first.
Smaller jobs are printed before larger jobs.
Larger jobs are printed before smaller jobs.
The network administrator determines which jobs are printed first.

11
What are two common uses of scripting languages? (Choose two.)
automate administrative tasks, such as cycling log files
> provide user interaction with a compiled program
> run scheduled tasks at user login
deliver files to remote users on request
download required drivers to printers

12
Which of the following is a list of common FTP commands?
> get, put, cd, bye
download, upload, dir, chdir, exit
send, receive, dir, cd, exit
transfer [from | to], list, dir, exit

13
Which popular web server software is only available for Windows operating systems?
Apache
Firefox
Internet Explorer
> Internet Information Server
Netscape Server
Opera

14
A network administrator is operating in the GNOME desktop environment. Which application would the administrator start in order to establish a command line session with a remote server?
gFTP
Mozilla
Star Office
> xterm

15
Where do print jobs wait to be printed?
print list
> print queue
wait list
print job roster

16
Which protocol controls web page transmission?
FTP
> HTTP
SMTP
DNS

17
Which scripting language can be used on a Linux server to notify users that a print job is complete?
batch script
JavaScript
JScript
> shell script
VBScript

***nilai : 97,1%***

18.39

ITESS 2 CHAPTER 4

1
Which IP address range, as indicated by the first octet, is reserved for testing, and includes the loopback address?
> 127.x.x.x
168.x.x.x
255.x.x.x
192.x.x.x

2
Which service is used to enable individual computers to automatically obtain an IP address?
WINS
DNS
ARP
> DHCP

3
How many octets are contained in an IP address?
1
2
> 4
8

4
Which address class contains the IP address 168.12.0.0?
A
> B
C
D

5
Which Linux command is used to temporarily change the default gateway of a host?
arp
ifconfig
netstat
> route
ping

6
What is the range of numbers that can be used in the first octet of a Class A network?
> 1-126
128-191
192-223
1-255

7
Which of the following rely on ICMP?
> sending an Echo Request
logging in to a remote host
mapping an IP address to a MAC address
resolving a host name

8
In which layer of the TCP/IP model does ICMP operate?
Application
Transport
> Internet
Network Access

9
Which classes of IP addresses are used by commercial organizations for host addressing?
A,C,D
B,C,D
C,D,E
> A,B,C

10
The performance of a network has dropped. Which command should an administrator use in a Linux system to determine which routers are causing the problem?
ping
> traceroute
tracert
route
ifconfig

11
What is the primary function of NAT?
convert a MAC address to a domain name
> translate between a local IP address and a global IP address
allocate IP addresses to commercial organizations
determine the best route through a network

12
Which utility is used in Windows and Linux to view network connections and protocol statistics?
arp
> netstat
nbstat
ipconfig

13
What is the range of numbers in the first octet of a Class C address?
1-127
> 192-223
128-191
224-255

14
Which service does ARP provide?
It resolves a physical address to a TCP port number.
It resolves a broadcast address to an IP address.
> It resolves an IP address to a MAC address.
It resolves a URL to a MAC address.

15
Which protocol is used to translate a domain name into an IP address?
ARP
> DNS
UDP
NetBIOS

16
What is subnetting?
> dividing large networks into smaller ones using the same network number
allowing several small networks to communicate over the common carrier infrastructure
combining several networks into a single larger network
allowing separate companies to share an IP address by taking turns using it

17
A technician needs to log into a remote Linux PC to perform some maintenance. Which application layer protocol could be used?
> Telnet
FTP
HTTP
SNMP

18
What must a computer have when connected to a network?
one unique name per function
one unique address per service
> one unique address per connection point
one unique network

19
How would a technician permanently change the IP address of an Ethernet card on a Red Hat Linux PC to 192.168.34.4?
use the command ifconfig eth0 192.168.34.4
use the command route add default IP 192.168.34.4 dev eth0
use the command ping 192.168.34.4
> edit the IPADDRESS line in the file /etc/sysconfig/network-scripts/ifcfg-eth0

20
What is a unique characteristic of the IP addressing scheme?
flat addressing
> hierarchical addressing
internetwork addressing
single-octet addressing

***nilai : 100%***




17.48

ITESS 2 CHAPTER 3

1
How many bits are in an IP address?
16
64
> 32
48

2
Which of the following devices is used to segment a network into different broadcast domains?
switch
active hub
bridge
> router

3
Which three of the following items can a DHCP server provide to a host computer? (Choose three.)
> subnet mask
MAC address
> default gateway
> IP address
DHCP server address

4
Which list contains important considerations when selecting a NIC to use on a network?
type of network, type of RAM, type of system bus
type of media, type of system bus, type of RAM
> type of network, type of media, type of system bus
type of system bus, processor speed, type of media

5
What is the most commonly used architecture in Ethernet LANs?
bus
> star
mesh
ring

6
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
> DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.

7
Which of the following options correctly describes APIPA?
APIPA allows a privately addressed host to assign itself a public IP address in order to access a remote network.
> APIPA enables a computer to assign itself an IP address if it cannot contact a DHCP server.
APIPA is fault-tolerant feature that allows a server to mirror another server on a local network.
APIPA enables a computer to translate domain names into IP addresses if it cannot contact a DNS server.

8
What are the two most common wireless networking technologies? (Choose two.)
> radio frequency
microwave
laser
> infrared
satellite wavelength

9
Which term refers to the path that signals take from one point on a network to another?
address resolution
> logical topology
dynamic host configuration
physical topology

10
What is a major disadvantage of the bus topology?
It is expensive.
It requires a lot of cabling.
> A break in any one part of the cable brings down the entire network.
All computers must be placed in a straight line.

11
What is the purpose of the twists in Category 5/5e UTP cable?
to prevent the cable from breaking
to make the cable easier to install and terminate properly
to make the cable cheaper to produce
> to limit signal degradation caused by cross talk

12
Which two of the following statements accurately describe a default gateway? (Choose two.)
A default gateway is used when a host transfers data to another host on the same network segment.
> A default gateway is the IP address assigned to the near-side router interface.
> A default gateway is the IP address assigned to the near-side switch interface.
A default gateway is used when a host transfers data to a host on another network segment.

13
What are three options for assigning logical addresses to hosts? (Choose three.)
> static
> dynamic
negotiation
> automatic
holistic

14
Which list indicates advantages associated with fiber-optic cable?
capable of running long distances, inexpensive to install, not susceptible to electromagnetic interference
not susceptible to electromagnetic interference, expensive to install, lower data rates
> not susceptible to electromagnetic interference, higher data rates, capable of running long distances
lower data rates, inexpensive to install, capable of running long distances

15
What is the function of a DHCP server?
It stores websites that are used frequently.
> It dynamically assigns IP addresses to hosts.
It determines the subnet mask of a network.
It serves as a "first line of defense" firewall.

16

Which data link layer device can segment a network into different collision domains?
a router
> a switch
a gateway
a transceiver

17
What are three important considerations when selecting a NIC? (Choose three.)
> network type
operating system
> system bus
> network media
number of network users

18
Which two devices are at the core of wireless communications? (Choose two.)
satellites
light emitting diodes
> transmitters
> receivers
modulators

19
What is the main function of the DNS?
to scan the network for viruses
> to translate computer names to their corresponding IP addresses
to assign IP addresses to nodes on the network
to provide names to all the nodes on a network

20
What are two advantages of using dynamic address assignment instead of manual address assignment? (Choose two.)
> On a large network, manually assigning addresses can be very time consuming.
Manual address assignment requires network administrators to understand physical addressing.
Dynamic address assignment can help segment a large network.
> Manual address assignment requires network administrators to understand logical addressing.

***nilai : 100%***