Net Ess
70-058
This is a Adaptive test now , which everybody knows now. I past this test
with a 639, required score to pass 552 this past Friday 10/16/98. I had 25
questions. I studied from the MS Network Essential book and this site.
Please know your IEEE 802 Specs, IRQ's, Networking Hardware, Networking
Troubleshooting Hardware, OSI Model, and Network Cable Types. Dump all of
this data to paper before you start your test, this will be a great asset
to your testing. Please find listed below the questions I had:
Networking Essentials - Test 70-058
1.What must you specify when you want to copy a file from 1 computer to
another by using a UNC name? (Choose 2.)
A. share name
B. domain name
C. computer name
D. workgroup name
2. Your network consists of 10 computers, which run Microsoft Windows 95.
Which kind of access control can you use to control access to files and
directories on the network? (Choose all that apply.)
A. Specify users and groups who have access to each shared resource.
B. Supply a password for each shared resource.
3. What is a characteristic of a client/server networks?
A. Any computer can make its resources available to any other computer
on the network.
B. Dumb terminals are connected to a central host computer that
performs all processing.
C. Any computer on the network can be both a client and a server.
D. Client computers access a server that performs back-end services.
4. Barbara's remote computer can be accessed via dial-up telephone lines.
The computer is 5 years old and uses TCP/IP as its only transport protocol.
The data link communications protocol used by the computer cannot provide
automatic IP addressing.
Which data link communications protocol is Barbara's computer using?
A. DLC
B. SLIP
C. PPP
5. This device functions at or above the Transport layer of the OSI model.
It acts as a translator between 2 computers that use different protocols or
data formats.
A. gateway
B. bridge
C. router
D. repeater
6. What is a characteristic of the IEEE 802.3 10BaseT standard?
A. It specifies RJ-11 connectors at the ends of each cable.
B. It specifies UTP cable.
C. It specifies BNC T-connectors for connecting computers to cables.
D. It specifies 50-ohm terminators at the ends of each cable.
7. What is a characteristic of the IEEE 802.3 10Base2 standard?
A. It specifies Category 3 DIP cable with a maximum cable length of 100
meters.
B. It specifies RG-11 C/U coaxial cable with a maximum cable length of
500 meters.
C. It specifies BNC T-connectors for connecting computers to cables.
D. It specifies RJ-45 connectors at the ends of each cable.
8. What is a benefit of both NDIS and ODI?
A. They allow network adapters to be used in any compliant computer.
B. They allow network adapters to transmit information over a greater
distance than noncompliant network adapters can.
C. They allow network adapters to communicate with other compliant
network adapters.
D. They allow network adapters to be independent of any particular
transport protocol.
9. What is a purpose of NDIS?
A. to allow any compliant transport protocol to pass data to any
compliant network adapter
B. to allow any compliant transport protocol to pass data to any
compliant network redirector
C. to define the common signaling scheme that all vendors' adapters use
when transmitting packets
D. to define the voltage levels that must be applied to the pinouts on
the network adapter's 15 pin AUI connector
10. You want to install a 100-Mbps backbone network that will connect 5
existing networks. Which media should you use?
A. Category 3 UP cable
B. Category 4 UTP cable
C. Fiber-optic cable
D. RG-58 A/U coaxial cable
11. You are designing a 100-Mbps Ethernet network for a building that has
existing UTP cable. You test the existing cable and decide that it meets
Category 3 specifications. Which media should you use?
A. the existing cable
B. new Type 1 STP cable
C. new Category 4 UTP cable
D. new Category 5 UTP cable
12. You are designing a peer-to-peer network that consists of 5 Microsoft
Windows 95 computers. Which protocol should you use?
A. DLC
B. NFS
C. NWLink IPX
D. XNS
13. Your network has 250 client computers. The network uses both TCP/IP and
NetBEUI. You want to segment the network into 3 subnets. You want to allow
all of the computers to use both of the protocols to communicate with
computers on all 3 subnets.
Which device should you use?
A. repeater
B. brouter
C. router
D. gateway
14. Which networking device is used to translate protocols?
A. bridge
B. hub
C. gateway
D. repeater
15. Which WAN connection service can provide transmission speed that is
faster than 100 Mbps?
A. ISDN basic rate interface
B. X.25
C. T1
D. ATM
16. You want your WAN to allow simultaneous transmission of voice, video,
and data. Which WAN connection service should you use?
A. 56-Kbps digital line
B. X.25
C. Frame relay
D. ATM
17. Which type of WAN connection service is intended to replace standard
analog telephone service?
A. ISDN basic rate interface
B. X.25
C. Frame relay
D. 2.048-Mbps digital line
18. Your company has an Ethernet network with 750 computers. The company is
migrating to servers that run Microsoft Windows NT Server and to client
computers that run Microsoft Windows 95. You want to protect sensitive
network data, with a minimal amount of administration.
What should you include in your security plan?
A. peer-to-peer file sharing, with user-level security on all shared
resources
B. peer-to-peer file sharing, with resource-password security on all
shared resources
C. centralized administration of user accounts, with user-level security
on all shared resources
D. centralized administration of user accounts, with resource-password
security on all shared resources
19. Situation:
You are designing a WAN that will connect 3 existing networks in Chicago,
Atlanta, and Los Angeles.
Required results:
All of the computers on each of the 3 networks must be able to communicate
with any other computer on the 3 networks.
The WAN links must be capable of transmitting data at a minimum speed of I
Mbps.
Optional desired results:
You want to provide continued communications in the event of a single-link
failure.
You want to provide continued communications at a minimum speed of 1 Mbps
in the event of a single-link failure.
Proposed solution:
Connect the 3 networks by using 3 T1 links, as shown in the accompanying
Exhibit.
Diagram of the proposed WAN.
<Picture>
Which results does the proposed solution produce?
A. the proposed solution produces the required results and produces both
of the optional
desired results.
B. The proposed solution produces the required results and produces
only 1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce any of the optional desired results.
D. the proposed solution does not produce the required results.
20. Situation:
You are designing a disaster prevention and recovery plan for your network.
The following table
summarizes the current network configuration.
Server 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1
is the BDCClient Computers100, which run Microsoft Windows 95Network
Type10BaseT Ethernet
You have done the following:
. Placed all confidential data on the servers
. Placed the servers in a locked room
. Implemented NTFS user-level security on the servers to allow only
specific personnel to access the data
Required results:
You must protect the servers from hardware failure. However, periods of
downtime of less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from
loss
Optional desired results:
You want to track all accesses to the data files.
You want to put reasonable methods in place to protect network data from
virus corruption.
Proposed solution:
Connect UPS to each server.
Set appropriate access-control security on all shared resources.
Implement disk striping with parity for each server's hard disks.
Do daily tape backups of the data, and store the tapes in a secure off-site
location.
Implement virus scanning on all client computers and servers.
Which results do the proposed solution produced
A. the proposed solution produces the required results and produces
both of the optional
desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the optional desired results.
D. the proposed solution does not produce the required results.
21. Configuration of your client computer:
� SVGA card
� SCSI card, set at IRQ 15
� LPT1
� LPT2
� COM1
� COM2
. PS/2 mouse port
The computer runs Microsoft Windows NT Workstation.
You are installing a token-ring network adapter in the computer. You set it
to use IRQ 3.
Which device could cause IRQ conflicts in the computer?
A. COM1
B. COM2
C. LPT1
D. LPT2
22. You install an Ethernet network adapter in a client computer. The
computer's network software is initialized successfully, but the computer
is not able to communicate with other computers on the network. All other
client computers on the network are able to communicate. What is the most
likely cause of the problem?
A. the transceiver setting of the network adapter is incorrect.
B. the IO port address on the network adapter is incorrect.
C. the cable segment is not properly terminated.
D. the packet-size setting is incorrect.
23. Situation:
You are designing a NetBIOS naming scheme for all of the servers and client
computers at your location. Within 2 years your company will install a WAN
that will connect all of its networks.
Current Network Configuration for the Entire company
Server 328, Which run Microsoft Windows NT ServerClient Computers20,000
which run Microsoft Windows 95Network40, each in a different cityWAN
connectionsNoneE-mailAll users have e-mail to all other users in the
company.E-mail namesAll have 12 characters or fewer
Current Network Configuration for Your Location
Server10, which run Microsoft Windows NT serverClient Computers500, which
run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all servers
and client computers at your location.
The NetBIOS naming scheme at your location must continue to work after the
WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
Proposed solution:
Assign each server and client computer at all locations a unique 15-digit
hexadecimal number to be used as that computer's NetBIOS name.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces
both of the optional desired results.
B. The proposed solution produces the required results and produces
only 1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the
optional desired results.
D. The proposed solution does not produce the required results.
24. Which tool should you use to create a report that logs network
activity?
A. volt-ohmmeter
B. oscilloscope
C. protocol analyzer
D. time domain reflectometer (TDR)
25. Configuration of 2 of the client computers on your 10BaseT Ethernet
network:
VGA adapter: Default settings
IDE controller: Default settings
Floppy disk drive controller: Default settings
LPT1: Default settings
COM1: Default settings
COM2: Default settings
Ethernet network adapter See settings below:
MAC hardware address: 1 0C805000000
IRQ: 5
IO port address: 300
Transceiver: RJ-45
DMA None
Memory address: None
Neither computer is able to access the network. You run diagnostic tests on
the network adapters in both computers. Configuration of both adapters is
identical:
Which change must you make on both Ethernet network adapters to allow the 2
client computers to access the network?
A. Change the MAC (hardware) addresses to factory settings.
B. Change the IRQ settings to 3.
C. Change the IO port addresses to 320.
D. Change the transceiver types to BNC.
*******************Internet Email Confidentiality Footer*******************
Privileged/Confidential Information may be contained in this message. If
you are not the addressee indicated in this message (or responsible for
delivery of the message to such person), you may not copy or deliver this
message to anyone. In such case, you should destroy this message, and
notify us immediately. If you or your employer does not consent to Internet
email messages of this kind, please advise us immediately. Opinions,
conclusions and other information expressed in this message are not given
or endorsed by my firm or employer unless otherwise indicated by an
authorized representative independent of this message.