Net Ess
70-058

This is a Adaptive test now , which everybody knows now. I past this test

with a 639, required score to pass 552 this past Friday 10/16/98. I had 25

questions. I studied from the MS Network Essential book and this site.

Please know your IEEE 802 Specs, IRQ's, Networking Hardware, Networking

Troubleshooting Hardware, OSI Model, and Network Cable Types. Dump all of

this data to paper before you start your test, this will be a great asset

to your testing. Please find listed below the questions I had:

 

Networking Essentials -  Test 70-058

1.What must you specify when you want to copy a file from 1 computer to

another by using a UNC name? (Choose 2.)

     A. share name

    B. domain name

    C. computer name

    D. workgroup name

 

 

2. Your network consists of 10 computers, which run Microsoft Windows 95.

Which kind of access control can you use to control access to files and

directories on the network? (Choose all that apply.)

    A. Specify users and groups who have access to each shared resource.

   B. Supply a password for each shared resource.

 

 

3. What is a characteristic of a client/server networks?

    A. Any computer can make its resources available to any other computer

on the network.

    B. Dumb terminals are connected to a central host computer that

performs all processing.

    C. Any computer on the network can be both a client and a server.

   D. Client computers access a server that performs back-end services.

 

 

4. Barbara's remote computer can be accessed via dial-up telephone lines.

The computer is 5 years old and uses TCP/IP as its only transport protocol.

The data link communications protocol used by the computer cannot provide

automatic IP addressing.

Which data link communications protocol is Barbara's computer using?

    A.  DLC

   B.  SLIP

    C.  PPP

 

 

5. This device functions at or above the Transport layer of the OSI model.

It acts as a translator between 2 computers that use different protocols or

data formats.

   A. gateway

    B. bridge

    C. router

    D. repeater

 

 

6. What is a characteristic of the IEEE 802.3 10BaseT standard?

    A. It specifies RJ-11 connectors at the ends of each cable.

   B. It specifies UTP cable.

    C. It specifies BNC T-connectors for connecting computers to cables.

    D. It specifies 50-ohm terminators at the ends of each cable.

 

 

7. What is a characteristic of the IEEE 802.3 10Base2 standard?

    A. It specifies Category 3 DIP cable with a maximum cable length of 100

meters.

    B. It specifies RG-11 C/U coaxial cable with a maximum cable length of

500 meters.

   C. It specifies BNC T-connectors for connecting computers to cables.

    D. It specifies RJ-45 connectors at the ends of each cable.

 

 

8. What is a benefit of both NDIS and ODI?

    A. They allow network adapters to be used in any compliant computer.

    B. They allow network adapters to transmit information over a greater

distance than noncompliant network adapters can.

    C. They allow network adapters to communicate with other compliant

network adapters.

   D. They allow network adapters to be independent of any particular

transport protocol.

 

 

9. What is a purpose of NDIS?

   A.  to allow any compliant transport protocol to pass data to any

compliant network adapter

    B.  to allow any compliant transport protocol to pass data to any

compliant network redirector

    C. to define the common signaling scheme that all vendors' adapters use

when transmitting packets

    D. to define the voltage levels that must be applied to the pinouts on

the network adapter's 15 pin AUI connector

 

 

10. You want to install a 100-Mbps backbone network that will connect 5

existing networks. Which media should you use?

    A. Category 3 UP cable

    B.  Category 4 UTP cable

  C.  Fiber-optic cable

    D.  RG-58 A/U coaxial cable

 

 

11.  You are designing a 100-Mbps Ethernet network for a building that has

existing UTP cable. You test the existing cable and decide that it meets

Category 3 specifications. Which media should you use?

    A.  the existing cable

    B.  new Type 1 STP cable

    C.  new Category 4 UTP cable

   D.  new Category 5 UTP cable

 

 

12. You are designing a peer-to-peer network that consists of 5 Microsoft

Windows 95 computers. Which protocol should you use?

    A. DLC

    B. NFS

  C. NWLink IPX

    D. XNS

 

 

 

13. Your network has 250 client computers. The network uses both TCP/IP and

NetBEUI. You want to segment the network into 3 subnets. You want to allow

all of the computers to use both of the protocols to communicate with

computers on all 3 subnets.

Which device should you use?

    A. repeater

  B. brouter

    C. router

    D. gateway

 

 

14. Which networking device is used to translate protocols?

    A.  bridge

    B.  hub

  C.  gateway

    D.  repeater

 

15. Which WAN connection service can provide transmission speed that is

faster than 100 Mbps?

    A.  ISDN basic rate interface

    B.  X.25

    C.  T1

  D.  ATM

 

 

 

16. You want your WAN to allow simultaneous transmission of voice, video,

and data. Which WAN connection service should you use?

    A. 56-Kbps digital line

    B. X.25

    C. Frame relay

  D. ATM

 

 

17. Which type of WAN connection service is intended to replace standard

analog telephone service?

  A. ISDN basic rate interface

    B. X.25

    C. Frame relay

    D. 2.048-Mbps digital line

 

 

18. Your company has an Ethernet network with 750 computers. The company is

migrating to servers that run Microsoft Windows NT Server and to client

computers that run Microsoft Windows 95. You want to protect sensitive

network data, with a minimal amount of administration.

What should you include in your security plan?

    A. peer-to-peer file sharing, with user-level security on all shared

resources

    B. peer-to-peer file sharing, with resource-password security on all

shared resources

  C. centralized administration of user accounts, with user-level security

on all shared resources

    D. centralized administration of user accounts, with resource-password

security on all shared resources

 

 

19. Situation:

You are designing a WAN that will connect 3 existing networks in Chicago,

Atlanta, and Los Angeles.

Required results:

All of the computers on each of the 3 networks must be able to communicate

with any other computer on the 3 networks.

The WAN links must be capable of transmitting data at a minimum speed of I

Mbps.

 

 

Optional desired results:

You want to provide continued communications in the event of a single-link

failure.

You want to provide continued communications at a minimum speed of 1 Mbps

in the event of a single-link failure.

 

 

 

Proposed solution:

Connect the 3 networks by using 3 T1 links, as shown in the accompanying

Exhibit.

 

 

Diagram of the proposed WAN.

<Picture>

 

Which results does the proposed solution produce?

   A. the proposed solution produces the required results and produces both

of the optional

        desired results.

     B. The proposed solution produces the required results and produces

only 1 of the optional desired results.

     C. The proposed solution produces the required results but does not

produce any of the optional desired results.

     D. the proposed solution does not produce the required results.

 

 

20. Situation:

You are designing a disaster prevention and recovery plan for your network.

The following table

summarizes the current network configuration.

 

Server 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1

is the BDCClient Computers100, which run Microsoft Windows 95Network

Type10BaseT Ethernet

You have done the following:

. Placed all confidential data on the servers

. Placed the servers in a locked room

. Implemented NTFS user-level security on the servers to allow only

specific personnel to access the data

 

 

Required results:

You must protect the servers from hardware failure. However, periods of

downtime of less than 2 hours are acceptable.

You must have reasonable controls in place to protect network data from

loss

Optional desired results:

You want to track all accesses to the data files.

You want to put reasonable methods in place to protect network data from

virus corruption.

 

Proposed solution:

Connect UPS to each server.

Set appropriate access-control security on all shared resources.

Implement disk striping with parity for each server's hard disks.

Do daily tape backups of the data, and store the tapes in a secure off-site

location.

Implement virus scanning on all client computers and servers.

 

Which results do the proposed solution produced

    A. the proposed solution produces the required results and produces

both of the optional

        desired results.

  B. The proposed solution produces the required results and produces only

1 of the optional desired results.

    C. The proposed solution produces the required results but does not

produce either of the optional desired results.

    D. the proposed solution does not produce the required results.

 

 

21. Configuration of your client computer:

� SVGA card

� SCSI card, set at IRQ 15

� LPT1

� LPT2

� COM1

� COM2

. PS/2 mouse port

The computer runs Microsoft Windows NT Workstation.

You are installing a token-ring network adapter in the computer. You set it

to use IRQ 3.

Which device could cause IRQ conflicts in the computer?

    A. COM1

  B. COM2

    C. LPT1

    D. LPT2

 

 

22. You install an Ethernet network adapter in a client computer. The

computer's network software is initialized successfully, but the computer

is not able to communicate with other computers on the network. All other

client computers on the network are able to communicate. What is the most

likely cause of the problem?

  A. the transceiver setting of the network adapter is incorrect.

    B. the IO port address on the network adapter is incorrect.

    C. the cable segment is not properly terminated.

    D. the packet-size setting is incorrect.

 

 

23. Situation:

You are designing a NetBIOS naming scheme for all of the servers and client

computers at your location. Within 2 years your company will install a WAN

that will connect all of its networks.

  Current Network Configuration for the Entire company

 

Server 328, Which run Microsoft Windows NT ServerClient Computers20,000

which run Microsoft Windows 95Network40, each in a different cityWAN

connectionsNoneE-mailAll users have e-mail to all other users in the

company.E-mail namesAll have 12 characters or fewer

 

Current Network Configuration for Your Location

 

 

Server10, which run Microsoft Windows NT serverClient Computers500, which

run Microsoft Windows 95

 

 

Required results:

You must successfully implement the NetBIOS naming scheme for all servers

and client computers at your location.

The NetBIOS naming scheme at your location must continue to work after the

WAN is connected.

 

Optional desired results:

You want the NetBIOS name for each server to describe the server's

department or function.

You want each client computer's NetBIOS name to describe the computer's

primary user or function.

 

Proposed solution:

Assign each server and client computer at all locations a unique 15-digit

hexadecimal number to be used as that computer's NetBIOS name.

 

 

Which results does the proposed solution produce?

    A. The proposed solution produces the required results and produces

both of the optional desired results.

    B. The proposed solution produces the required results and produces

only 1 of the optional desired results.

   C. The proposed solution produces the required results but does not

produce either of the

       optional desired results.

    D. The proposed solution does not produce the required results.

 

 

24. Which tool should you use to create a report that logs network

activity?

    A. volt-ohmmeter

    B. oscilloscope

  C. protocol analyzer

    D. time domain reflectometer (TDR)

 

 

 

25. Configuration of 2 of the client computers on your 10BaseT Ethernet

network:

VGA adapter: Default settings

IDE controller: Default settings

Floppy disk drive controller: Default settings

LPT1: Default settings

COM1: Default settings

COM2: Default settings

 

Ethernet network adapter See settings below:

MAC hardware address: 1 0C805000000

IRQ: 5

IO port address: 300

Transceiver: RJ-45

DMA None

Memory address: None

 

Neither computer is able to access the network. You run diagnostic tests on

the network adapters in both computers. Configuration of both adapters is

identical:

Which change must you make on both Ethernet network adapters to allow the 2

client computers to access the network?

  A. Change the MAC (hardware) addresses to factory settings.

    B. Change the IRQ settings to 3.

    C. Change the IO port addresses to 320.

    D. Change the transceiver types to BNC.

 

 

 

 

*******************Internet Email Confidentiality Footer*******************

Privileged/Confidential Information may be contained in this message. If

you are not the addressee indicated in this message (or responsible for

delivery of the message to such person), you may not copy or deliver this

message to anyone. In such case, you should destroy this message, and

notify us immediately. If you or your employer does not consent to Internet

email messages of this kind, please advise us immediately. Opinions,

conclusions and other information expressed in this message are not given

or endorsed by my firm or employer unless otherwise indicated by an

authorized representative independent of this message.