background image
676
Appendix A
Practice Exam
Answers to Practice Exam
1.
Steps should be performed in this order: B, D, G, H, C, F, E (if needed),
then A .
2.
D. All three methods are effective methods for problem isolation.
Depending on where the problem is, one method may be faster than
the others, but all are effective.
3.
A, B, C, D. These are the four characteristics that should be present in
a good action plan.
4.
A, B, C, D. Device passwords do not affect network problems, nor do
they contribute to providing information on the state of the network.
5.
C. The standard name is Novell 802.3; however, Cisco refers to it as
Novell-Ether.
6.
A, D. These frame types are identical--the term Novell uses is
Ethernet II, while Cisco uses the term ARPA.
7.
D.
8.
C. Tokens contain control information about which station has
the token as well as additional control information.
9.
C, D, E, F, G. NetWare corresponds to the top five layers of the
OSI model.
10.
A, D. FDDI and Token Ring both use tokens to control transmission
on the ring.
11.
C. You will need to place the analyzer on the same segment as the one
where the problem is occurring. If you connect remotely you will not
be able to capture the data of interest. None of the other options are
feasible or effective.
12.
A. TDRs specialize in locating the fault, not just identifying it. Other
cable testers cannot determine fault location. OTDRs must be used on
optic cable.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com