Đề thi IT - FPT

1. You install File and Printer Sharing for Microsoft Networks. You share a folder and leave the password option blank. Who can gain access to the folder? A. Anyone who can gain access to your network and has a Microsoft redirector such as the Client for Microsoft Networks installed. B. Windows 98 will not allow a blank password in this field. C. Anyone with Internet Explorer installed. D. Only users that are members of the same workgroup as you. E. No one can gain access until a password is entered. Answer: A - File Sharing should be disabled unless you are using it to copy items from one PC to another, or to allow a known party to access files stored on your computer. References: | Microsoft Windows 2000 Server Documentation | Share a folder or drive with other people | File and Printer Sharing (NetBIOS) Fact and Fiction | 833442 - Settings for Client for Microsoft Networks and for File and Print Sharing for Microsoft Networks are linked in Windows XP and in Windows 2000 | Connection with a DOS-system |

doc10 trang | Chia sẻ: maiphuongtt | Lượt xem: 2024 | Lượt tải: 2download
Bạn đang xem nội dung tài liệu Đề thi IT - FPT, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
1. You install File and Printer Sharing for Microsoft Networks. You share a folder and leave the password option blank. Who can gain access to the folder? A. Anyone who can gain access to your network and has a Microsoft redirector such as the Client for Microsoft Networks installed. B. Windows 98 will not allow a blank password in this field. C. Anyone with Internet Explorer installed. D. Only users that are members of the same workgroup as you. E. No one can gain access until a password is entered. Answer: A - File Sharing should be disabled unless you are using it to copy items from one PC to another, or to allow a known party to access files stored on your computer. References: | Microsoft Windows 2000 Server Documentation | Share a folder or drive with other people | File and Printer Sharing (NetBIOS) Fact and Fiction | 833442 - Settings for Client for Microsoft Networks and for File and Print Sharing for Microsoft Networks are linked in Windows XP and in Windows 2000 | Connection with a DOS-system | 2. The figure below shows a typical Home Network Setup. Identify the network components marked in red. Answer: Click Here To View Answer. References: |Get Started with Home Networking | Home and Small Office Networking with Windows XP | Home networking tutorial with Microsoft Windows | Home Networking Guide - Set up a Home Network | 308007 - Troubleshooting home networking in Windows XP | Cable Modem Troubleshooting Tips | Broadband ? The 'bible' for Information on DSL, Cable and Other High Speed Internet Services | SpeedGuide.net :: Links | 3. Some protocols are considered to be technically non-routable. Which of the following statements best describes the most common reason why a protocol would be considered non-routable? A. It does not contain the appropriate Data Link layer information required by routers. B. It uses advanced Transport layer services to move across the Internet and avoids the routing overhead required by the more primitive networking protocols.  C. It defines Physical layer network addresses for internal routing. D. It does not specify the Network layer addresses required by routers. Answer: D - Non-routable protocols do not contain Network layer information, which means that routers cannot interpret their addresses. Routers are not concerned with Data Link layer information. Transport layer protocols require the services of a routing protocol to move data across an internetwork. Addresses are not definable at the Physical layer because data is in the form of a raw bit stream. Protocols can be categorized as follows: > Connection Oriented Protocol - A protocol that relies on establishment of a connection between two computers. Connection oriented protocols are considered to be reliable protocols since there is an integrity check to be sure the transmitted data was received. > Connectionless Protocol - Do not rely on a connection, therefore Considered to be an unreliable. > Routable Protocol - The protocol can be sent through a network router. > Non-routable Protocol - Cannot be sent through a network router. References: | 294945 - A Description of Windows 95 and Windows 98 Network Protocols | Shields UP! -- Internet Connection Security Analysis | The OSI Reference Model | 4. What is the binary network ID of the loopback IP address? A. 1 B. 10101010 C. 0 D. 1111111 E. 10000000 Answer: D - The Loopback address is a special IP address (127.0.0.1) that is designated for the software loopback interface of a machine. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The 127.0.0.1 IP address is otherwise known as 'localhost'. At the command prompt type C:\> ping localhost OR C:\> ping 127.0.0.1 . You will come up with exactly the same results! 127 represents the Network ID and is expressed as 1111111 in binary code.  References: | Howstuffworks "What is an IP address?" | Abc of an IP Address | IP Addressing Architecture | TCP/IP Addressing | Learn To Subnet:  A Free, Lecture-Based Presentation on IP Addressing and Subnetting - Excellent Resource! | 5. You are the LAN administrator for your company. You have couple Windows 2000 Professional clients that dial in via PPP to the company network?s RAS server. You want the remote clients to be assigned dynamic IP addresses. You reserve a pool of class B addresses for these clients. Upon connecting, you find that the Windows 2000 computers are using a subnet mask of all 255s. What should you do? A. Run ipconfig with the /release and /renew switch on the client B. Run ipconfig with the /renew_all switch on the client C. Run winipcfg on the client D. Increase the lease time for this address pool E. Reconfigure the DHCP scope options F. Do nothing. This is normal G. None of the choices. Answer: F - The subnet mask corresponds to the standard mask associated with the standard class type of the given IP address.  Note that Windows 2000 clients use a subnet mask of 255.255.255.255 on PPP links. References: | Windows 2000 TCP/IP Resources | 6. You are configuring a router. According to the manual, you will need a transceiver to connect to the LAN ports of the router. What kind of physical interface does the router have? A. MSAU B. RJ-11 C. AUI D. BNC Answer: C - An AUI port is typically used to connect an external transceiver to a device such as a router. An MSAU is a type of network device used on Token Ring networks. RJ-11 is a connector type associated with telephone cable. BNC is a type of network connector used on coaxial networks. References: | What is AUI? - A Word Definition From the Webopedia Computer Dictionary | 7. Which of the following are connectionless protocols? (Choose the three best answers.) A. IP B. SPX C. IPX D. UDP Answer: A, C, D - UDP, IPX, and IP are all connectionless protocols. SPX is a connection-oriented protocol. References: | Windows XP Technical Overview | The OSI Reference Model | 8. How can Jim Herr, a client on an NT TCP/IP network see which remote hosts are currently connected using NBT? A. Use NBTSTAT B. Use NETSTAT C. Use NSLOOKUP D. Use IPCONFIG Answer: A - NetBIOS over TCP/IP can be referred to as NBT. NBTSTAT is the diagnostic tool that reports statistics and connections for NetBIOS over TCP/IP. References: | Network Troubleshooting Guide | Windows 2000 Resource Kits - TCP/IP Troubleshooting - How to identify and resolve TCP/IP networking problems. Diagnostic utilities included with Microsoft TCP/IP | Windows NT TCP/IP Network Administration | Windows 2000 Command Prompt Troubleshooting Tools | Simple Network Troubleshooting | Testing Connection using TCP/IP | 9. You are setting up a new Windows 98 workstation on your network, and your DHCP server provides all of the normal TCP/IP configuration information. What must you do to configure the IP address on the workstation after you add the TCP/IP protocol? A. The DHCP option is enabled automatically, and the server will auto-configure everything. B. Find out what the subnet mask on your network is, and add this information only. C. Manually enter an IP address that is not in use on the network. D. Put the address of the router in the default gateway, and put all 0s in the IP field. E. Use IPCONFIG with an inverted Subnet Mask to auto assign the address. Answer: A - The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for automating the configuration of computers that use TCP/IP. DHCP can be used to automatically assign IP addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and default router, and to provide other configuration information such as the addresses for printer, time and news servers. References: | Definition of DHCP| Microsoft's Windows 98 support page | More DHCP Resources | 10. Which of the following is considered a Network Attached Storage device? A. A 60 GB DAT tape drive attached to the Network Server B. A file server with special software that is at a separate location from the departmental file server C. In a Windows NT environment, it would be the Backup Domain Controller D. A high speed specialized sub-network attached to the enterprise Answer: B - Since the file server would have it's own IP address, and it is attached at a separate location from the department it serves and has the correct software installed, it does qualify as a NAS. While DAT tape drives are traditional backup devices, they are not Network Attached Storage devices because they do not have a separate IP address Although the BDC does have a separate IP address and has hard disk storage capabilities, it does not have the special software required by a NAS device. "A high speed specialized sub-network attached to the enterprise" is actually the definition of a Storage Area Network (SAN) rather than a NAS. 11. Credit card size, designed for notebooks, self-configuring, and non-OS dependent describes which PC bus architecture? A. PCI B. ISA C. EISA D. PCMCIA E. VL-BUS Answer: D - PCMCIA cards are also known as PC Cards. Designed for notebooks, these credit-card-size cards are self-configuring and non-operating system dependent. Type Details Number of bits Date of Inception ISA Industry Standard Architecture 8, 16 1980 MCA Micro Channel Architecture 16, 32 1987 EISA Extended Industry Standard Architecture 32 1988 Nu Bus New Bus Technology 32 1984 VESA Video Electronics Standard Association 32 Local Bus 1992 PDS Processor Direct Slot (Macintosh) 32 1993 PCI Peripheral Component Interconnect 32, 64 1993 PCMCIA Personal Computer Memory Card International Association 8,16,32 1992 References: | PC Bus standards | EE-Evaluation Engineering - "Which Bus Architecture Is Right for You?" | Personal Computer System Components | PCGuide - Ref - System Buses | 12. What protocol is used between E-Mail servers?  A. HTTP B. POP3 C. SNMP D. SMTP E. FTP Answer: D - Simple Mail Transport Protocol (SMTP) defines message format and the methods to store and forward mail throughout the Internet to servers that provide message storage for incoming mail. References: | What is SMTP? - A Word Definition From the Webopedia Computer Dictionary | POP3 | The IMAP Connection -- What is IMAP? | 13. When installing a manually configured adapter, what information must you know to avoid resource conflicts? A. IRQ B. Number of bits C. Base I/O port address D. Base Memory address E. Operating System Answer: A, C & D - Configurable options that often must be set are the IRQ, the base I/O address, the base memory address, and transceiver settings. References: | Network Diagnostics Tools Feature Overview | Windows XP 3C509 and NE2000 non-Plug&Play | PC Hell: Explanation of IRQ's, DMA's, and Conflicts | 14. Which of the following OSI layers is responsible for identifying communications partners? A. Application B. Session C. Network D. Presentation Answer: A - Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. References: | Internetworking Basics | OSI Reference Model - Print ! | Microsoft's Implementation of The OSI Reference Model | 15. A broadcast message is an example of which dialog control method? A. Half duplex B. Baseband C. Broadband D. Simplex E. Full duplex Answer: D - Refers to transmission in only one direction. Note the difference between simplex and half-duplex. Half-duplex refers to two-way communications where only one party can transmit at a time. Simplex refers to one-way communications where one party is the transmitter and the other is the receiver. An example of simplex communications is a simple radio, which you can receive data from stations but can't transmit data. Broadband Transmission  is a type of data transmission in which a single medium (wire) can carry several channels at once. Cable TV, for example, uses broadband transmission. In contrast, baseband transmission allows only one signal at a time. Most communications between computers, including the majority of local-area networks, use baseband communications. 16. Which of the following are used to resolve Windows NetBIOS names to IP addresses? (Choose all that apply) A. DNS B. WINS C. LMhosts file D. Hosts file Answer: B,C - WINS (Windows Internet Naming Service) and LMhosts files are used to resolve Windows NetBIOS names to IP addresses. WINS is dynamic while an LMhosts file is a static method. DNS (Domain Name Service) is used to resolve fully qualified domain names to IP addresses . In the event that a DNS server is unavailable, a hosts file can be used to store these address mappings. Windows Internet Naming Service (WINS), part of the Microsoft Windows NT and 2000 Servers, manages the association of workstation names and locations with Internet Protocol addresses (IP addresses) without the user or an administrator having to be involved in each configuration change. WINS automatically creates a computer name-IP address mapping entry in a table, ensuring that the name is unique and not a duplicate of someone else's computer name. When a computer is moved to another geographic location, the subnet part of the IP address is likely to change. Using WINS, the new subnet information will be updated automatically in the WINS table. WINS complements the NT Server's Dynamic Host Configuration Protocol (DHCP), which negotiates an IP address for any computer (such as your workstation) when it is first defined to the network. If you're a computer user on a network connected to a Windows NT/2000 Server, you may find WINS mentioned in some of your network-related programs or system messages. References: | Microsoft Windows NT Server 4.0 & WINS | Microsoft Windows 2000 & WINS | Windows XP Network Troubleshooting | 314366 - Cannot join Windows XP-Professional-based computer to a Windows NT 4.0-based domain | Using the Firewall for Internet Connections in Windows XP | Tips for Networking Windows XP | 17. What is a router? A. A hardware device that connects dissimilar networks, such as Cat 5 cabling and FDDI B. A network host that reads the source and destination addresses in the packet header and makes decisions about where to forward the packet C. A network host that can forward LAN-based email messages onto the Internet, after repackaging them into the SMTP format D. A software system that can translate between dissimilar networks such as Ethernet and Token Ring Answer: B - Some routers also perform gateway functions. References: | Definition of Router | A TechTarget Definition | 18. Which of the following are required for basic TCP/IP communication outside of your local network? (Choose all that apply) A. IP address B. Default Gateway C. DNS Server D. Subnet Mask Answer: A,B,D - In order for TCP/IP communications to work, you need an IP address and a Subnet Mask. In order to communicate outside of your network, you need a default gateway. All traffic that is not destined for your network will be sent to the default gateway which is usually a router of some sort. DNS servers are used to resolve names to IP addresses but are not required to communicate by TCP/IP. References: | TCP/IP basics | TCP/IP - Transmission Control Protocol / Internet Protocol | Windows NT: Basic Steps to Troubleshooting TCP/IP | Basic TCP/IP Communication in LabVIEW - Tutorial - Development Library - National Instruments | Get IT Done: Troubleshoot network problems using basic TCP/IP commands | TCP/IP | Free TCP/IP Tutorials and Resources, freeprogrammingresources.com | ExpertRating - Online Certification and Skill Testing | 19. What transport does PPTP use? A. SLIP B. PPP C. TCP/IP D. LLC Answer: C - PPTP uses the TCP/IP protocol as the transportation protocol between the ends of the tunnel. SLIP does not support PPTP. PPP encapsulates PPTP packets when one end of the tunnel is an asynchronous connection. The LLC is part of the OSI Data Link layer that controls access to the network medium. 20. Which of the following network classes is reserved for multicast addresses only? A. Class A B. Class B C. Class C D. Class D E. Class E Answer: D - Class D networks are reserved for multicast addresses. Class A, B, and C networks contain assignable addresses, and Class E networks are reserved for future and experimental use as well as for broadcasts. References: | Internet Protocols (IP) | 164015 - Understanding TCP/IP Addressing and Subnetting Basics | WRQ Tutorials - IP Addressing Fundamentals | Daryl's TCP/IP Primer | The TCP/IP LAN - A Hands-on How-to | 21. Which of the following statements describes a star topology? A. Less reliable than a ring topology B. All network computers get equal network access through the use of CSMA/CD C. Requires more cabling than a bus topology D. More difficult to troubleshoot than a ring topology Answer: C - In a ring topology, a single cable break halts the entire network, which makes ring networks less reliable than star networks. CSMA/CD does not guarantee equal access to all network users, rather it depends on detecting collisions and random back-off before retry to regulate traffic (only token-based networks guarantee equal access). Star topologies are connected through a central hub, and each computer requires a direct link to the hub, which uses more cabling than a bus topology where computers are connected in a series, or to a common cable. In a ring topology, a single cable break halts the entire network, which makes ring networks more difficult to troubleshoot than star networks. References: | What is topology? - A Word Definition From the Webopedia Computer Dictionary | Data Network Cabling-Star Topology |Guide to network topology - how computers get connected | 22. What three network protocols are offered to you by default during the installation of NT? A. NWLink B. DLC C. TCP/IP D. Appletalk E. NetBEUI Answer(s): A, C, E  - References: | Windows 2000 Networking: Basic Networking Resources | Articles: How to install network protocols in Windows 2000 | Adding Windows XP to an Existing Network | 301041 - HOW TO: Install NetBEUI on Windows XP | Installing network protocols in Windows XP - ZDNet UK Insight | First looks at Windows XP Networking | 23. What network access method should be implemented to provide centralized control of network transmissions? A. CSMA/CA B. CSMA/CD C. Demand priority D. Token passing Answer: C - Computers using CSMA/CA send signals that broadcast their intent to transmit information, without using centralized control. With CSMA/CD, computers monitor the network cable and only send messages when no other computer is transmitting information. No centralized control is involved. With demand priority, communications only occur between a sending computer, the hub, and a receiving computer, where all transmissions are under the hub's control. Demand-priority access method provides a round-robin arbitration method to provide LAN access based on message priority level. Token passing relies on distributed control, not centralized control, since only the station that holds the token is permitted to transmit. Token-passing is a media access technique in which a small set of bits called the token is passed between network devices. Each device receives the token and passes it on to a neighbor. On receipt of the token, a device is allowed to transmit data onto the network. The Token must then be released to allow other devices the opportunity to transmit. Token-passing therefore forces a form of time-division multiplexing on the network and is a more orderly access technique than carrier-sense multiple access/collision detection (CSMA/CD). Token passing can be implemented on bus local area networks (LANs), but is most commonly implemented on ring topologies. References: | What is IEEE 802 standards? - A Word Definition From the Webopedia Com

Các file đính kèm theo tài liệu này:

  • docFHR-2004 IT.doc
  • docDE-QTM-DNT.DOC
  • docFDC-Can bo Software.doc
  • docFOX INF.doc
  • docFSS IT-MAN QA 2005.doc
  • docgeneral-IT-knowledge.doc
  • docKien-thuc-coban-ve-IT.doc
  • docKS-TIN.DOC
  • docthietke-web-fox.DOC
Tài liệu liên quan