Like what you see? Get it in one document for easy printing!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

NEW! Network+ N11-003 2005 Beta Exam Study Guide - Just $9!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Network+
 9  Appendix A: Answers to Success Questions and Real World Exam Questions
      9  Chapter 1010: Real World Exam Answers

Previous Topic/Section
Chapter 1010: Real World Exam Answers
Previous Page
Pages in Current Topic/Section
1
Next Page
Answers to Questions 6-10
Next Topic/Section

Answers to Questions 1-5

1. What type of network requires a MAU?

A. Ethernet

B. ArcNet

C. Windows95

D. Token Ring

E. 10BaseT

 

Explanation: Token Ring uses a Multistation Access Unit for passing and controlling token movement across the LAN.

& Domain 1.1: Recognize the following logical or physical network topologies given a schematic diagram or description: Star/ hierarchal, bus, mesh, ring, wireless.

& Domain 1.2: Specify the main features of 802.2 (LLC), 802.3 (Ethernet) 802.5 (token ring), 802.11 (wireless) and FDDI networking technologies, including: Speed, Access, Method, Topology, Media.

& Domain 4.10: In a troubleshooting scenario involving a network with a particular physical topology (i.e., bus, Star/hierarchal, mesh, ring, and wireless) and including network diagram, identify the network area affected and the cause the problem.


 

2. What network topology implements at least two paths to and from each node?

A. Bus

B. Ring

C. Star

D. Mesh

E. Token Ring

Explanation: The mesh topology is the most redundant and complex of all topologies. It is also the most secure in terms of connectivity. The idea behind it is to provide a way to maintain all connections in the event of a break between any two computers. These are usually used in institutions where data is ultra-critical like banks.

& Domain 1.1: Recognize the following logical or physical network topologies given a schematic diagram or description: Star/ hierarchal, bus, mesh, ring, wireless.


 

3. Which of the following uses TDM (Time Domain Multiplexing)?

A. Ultra DMA

B. Baseband

C. Wideband

D. NIC

E. Broadband

Explanation: Knowing the differences between the different "bands" will allow you to answer any questions similar to this one. Visit the web link definitions listed for complete descriptions. Broadband has the ability to carry several channels of data at once, each having a special frequency. This is the definition of FDM. Wideband can have many meanings depending how it's used; often, is it used simply to differentiate from narrowband. Baseband carries just one channel of data at a time and is most commonly used between PCs for items such sending print jobs.

& Domain 1.2: Specify the main features of 802.2 (LLC), 802.3 (Ethernet) 802.5 (token ring), 802.11 (wireless) and FDDI networking technologies, including: Speed, Access, Method, Topology, Media.


 

4. Disk Mirroring is also known as what?

A. RAID 5

B. RAID 0

C. RAID 3

D. RAID 1

E. RAID 4

Explanation: RAID 1 has two flavors: Disk Mirroring and Disk Duplexing. Disk Duplexing provides the most redundancy of the two and requires two controllers, one for each disk. Raid 5 actually IS Disk Striping with Parity. Disk Striping without Parity is known as RAID 0, and provides no fault tolerance.

& Domain 1.1: Recognize the following logical or physical network topologies given a schematic diagram or description: Star/ hierarchal, bus, mesh, ring, wireless.


 

5. What process hides multiple IP addresses behind a single IP address?

A. Spoofing

B. OSPF

C. NAT

D. Routing

E. Bridging

Explanation: NAT (network address translation) allows a series of internal LAN addresses to share a single external internet address.

& Domain 2.10: identify the differences between public vs. private networks.

& Domain 3.1: Identify the basic capabilities (i.e., client support, interoperability, authentication, file and print services, application support, and Security: Unix/Linux, NetWare, Windows, Macintosh. 3.10 Given a scenario, predict the impact of a particular security implementation on Network functionality) e.g. blocking port numbers, encryption, etc.).


Previous Topic/Section
Chapter 1010: Real World Exam Answers
Previous Page
Pages in Current Topic/Section
1
Next Page
Answers to Questions 6-10
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Network+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Network+ (http://www.CertiGuide.com/netplus/) on CertiGuide.com
Version 1.0 - Version Date: November 7, 2004

Adapted with permission from a work created by Tcat Houser and Helen O’Boyle.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.