Visit http://www.LearnQuick.Com

Test Number 70-058

Networking Essentials - Test 70-058

1.What must you specify when you want to copy a file from 1 computer to another by using a UNC name? (Choose 2.)

A. share name

B. domain name

C. computer name

D. workgroup name

 

2. Which type of server provides processing power to run programs for client computers? (Choose all that apply.)

A. file-and-print server

B. application server

3. Your network consists of 10 computers, which run Microsoft Windows 95. Which kind of access control can you use to control access to files and directories on the network? (Choose all that apply.)

A. Specify users and groups who have access to each shared resource.

B. Supply a password for each shared resource.

 

4. Your network consists of 10 computers, which run Microsoft Windows NT Workstation. Which kind of access control can you use to control access to files and directories on the network? (Choose all that apply.)

A. Specify users and groups who have access to each shared resource.

B. Supply a password for each shared resource.

 

5. What is a characteristic of a client/server networks?

A. Any computer can make its resources available to any other computer on the network.

B. Dumb terminals are connected to a central host computer that performs all processing.

C. Any computer on the network can be both a client and a server.

D. Client computers access a server that performs back-end services.

 

6. What is a characteristic of connection-oriented communication?

A. It provides fast but unreliable delivery of datagrams.

B. It provides assurance of packet delivery.

C. It uses store-and-forward techniques to move datagrams between computers.

D. It uses message-oriented communication for processing e-mail.

 

7. Barbara's remote computer can be accessed via dial-up telephone lines. The computer is 5 years old and uses TCP/IP as its only transport protocol. The data link communications protocol used by the computer cannot provide automatic IP addressing.

Which data link communications protocol is Barbara's computer using?

A. DLC

B. SLIP

C. PPP

 

8. Which data link communications protocol provides connections between computers via dial-up telephone lines? (Choose all that apply.)

A. SLIP

B. PPP

 

9. Match the description to the networking device.

OSI Model

(Application/Presentation/Session/Transport/Network/Data Link/Physical) This device functions at or above the Transport layer of the OSI model. It acts as a translator between 2 computers that use different protocols or data formats.

A. gateway

B. bridge

C. router

D. repeater

 

10. What is a characteristic of the IEEE 802.3 10BaseT standard?

A. It specifies RJ-11 connectors at the ends of each cable.

B. It specifies UTP cable.

C. It specifies BNC T-connectors for connecting computers to cables.

D. It specifies 50-ohm terminators at the ends of each cable.

 

11. What is a characteristic of the IEEE 802.3 10Base2 standard?

A. It specifies Category 3 DIP cable with a maximum cable length of 100 meters.

B. It specifies RG-11 C/U coaxial cable with a maximum cable length of 500 meters.

C. It specifies BNC T-connectors for connecting computers to cables.

D. It specifies RJ-45 connectors at the ends of each cable.

 

12. What is a benefit of both NDIS and ODI?

A. They allow network adapters to be used in any compliant computer.

B. They allow network adapters to transmit information over a greater distance than noncompliant network adapters can.

C. They allow network adapters to communicate with other compliant network adapters.

D. They allow network adapters to be independent of any particular transport protocol.

 

13. What is a purpose of NDIS?

A. to allow any compliant transport protocol to pass data to any compliant network adapter

B. to allow any compliant transport protocol to pass data to any compliant network redirector

C. to define the common signaling scheme that all vendors' adapters use when transmitting packets

D. to define the voltage levels that must be applied to the pinouts on the network adapter's 15 pin AUI connector

 

14. You want to install a 100-Mbps backbone network that will connect 5 existing networks. Which media should you use?

A. Category 3 UP cable

B. Category 4 UTP cable

C. Fiber-optic cable

D. RG-58 A/U coaxial cable

 

15. You are designing a 100-Mbps Ethernet network for a building that has existing UTP cable. You test the existing cable and decide that it meets Category 3 specifications. Which media should you use?

A. the existing cable

B. new Type 1 STP cable

C. new Category 4 UTP cable

D. new Category 5 UTP cable

 

 16. You are designing a 100-Mbps network. Which media should you use?

A. RG-58 A/U coaxial cable

B. spread-spectrum radio

C. Category 5 UTP cable

D. Type 1 STP cable

 

17. Exhibit

<Picture>

Which network topology is illustrated in the accompanying Exhibit?

A. mesh

B. ring

C. bus

D. star

 

18. You are designing a peer-to-peer network that consists of 5 Microsoft Windows 95 computers. Which protocol should you use?

A. DLC

B. NFS

C. NWLink IPX

D. XNS

 

19. Which protocol is routable? (Choose 3.)

A. AppleTalk

B. TCP/IP

C. NWLink IPX

D. NetBEUI

E. DLC

20. You want to connect your Ethernet and token-ring networks. Both networks use NWLink IPX. You want to use IPX addressing to limit the amount of traffic between the 2 networks.

Which device should you use?

A. repeater

B. bridge

C. router

D. gateway

 

21. You want to segment your 200-node network into 3 subnets. The network uses TCP/IP.   Which device should you use?

A. repeater

B. bridge

C. router

D. gateway

 

22. Your network has 250 client computers. The network uses both TCP/IP and NetBEUI. You want to segment the network into 3 subnets. You want to allow all of the computers to use both of the protocols to communicate with computers on all 3 subnets.    Which device should you use?

A. repeater

B. brouter

C. router

D. gateway

 

 

23. Which networking device is used to translate protocols?

A. bridge

B. hub

C. gateway

D. repeater

 

24. Your l0BaseT Ethernet network uses NetBEUI. Users of your client computers need to access an IBM 3090 mainframe computer by using a 3270 terminal-emulation program.

Which device must you install?

A. bridge

B. gateway

C. router

D. brouter

 

25. You want to connect 2 computers by using l0BaseT Ethernet cable. The computers are located more than 300 meters apart.

Which device should you use?

A. repeater

B. amplifier

C. multiplexer

D. gateway

 

26. Which WAN connection service can provide transmission speed that is faster than 100 Mbps?

A. ISDN basic rate interface

B. X.25

C. T1

D. ATM

 

27. You want your WAN to allow simultaneous transmission of voice, video, and data. Which WAN connection service should you use?

A. 56-Kbps digital line

B. X.25

C. Frame relay

D. ATM

 

28. Which type of WAN connection service is intended to replace standard analog telephone service?

A. ISDN basic rate interface

B. X.25

C. Frame relay

D. 2.048-Mbps digital line

 

29. You are designing a WAN that uses X.25. Which device should you include in the design?

A. gateway

B. packet assembler-disassembler (PAD)

C. multiple-layer interface driver (MLID)

D. multiplexer

 

 30. Your company has an Ethernet network with 750 computers. The company is migrating to servers that run Microsoft Windows NT Server and to client computers that run Microsoft Windows 95. You want to protect sensitive network data, with a minimal amount of administration. What should you include in your security plan?

A. peer-to-peer file sharing, with user-level security on all shared resources

B. peer-to-peer file sharing, with resource-password security on all shared resources

C. centralized administration of user accounts, with user-level security on all shared resources

D. centralized administration of user accounts, with resource-password security on all shared resources

 

31. Situation

You are designing a security plan for your network. The following table summarizes the current network configuration.

Server 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDC, Client Computers - 100, which run Microsoft Windows 95, Network Type: 10BaseT Ethernet

Required result:

? You must have centralized control of access to shared resources.

Optional desired results:

? You want to track all access and attempted access to shared resources.

? You want to track attempts to guess user passwords.

? You want to implement a method to protect user accounts from password-breaking programs.

Proposed solution:

Implement NTFS with user-level security on all servers. Set appropriate access-control security on all shared resources. Require users to change their passwords every 40 days. Implement disk striping with parity on all servers. Perform daily tape backups, and store tapes in a secure off-site location.

Which results does the proposed solution produce?

A. the proposed solution produces the required result and produces all of the optional desired results.

B. the proposed solution produces the required result and produces only 1 of the optional desired results.

C. The proposed solution produces the required result but does not produce any of the optional desired results.

D. the proposed solution does not produce the required result.

 

  

 

32. Situation:

You are designing a WAN that will connect 3 existing networks in Dallas, Denver, and New Orleans.

Required result:

All of the computers on each of the 3 networks must be able to communicate with any other computer on the 3 networks.

The WAN links must be capable of transmitting data at a minimum speed of 1 Mbps.

Optional desired results:

You want to provide continued communications in the event of a single-link failure.

You want to provide continued communications at a minimum speed of 1 Mbps in the event of a single-link failure.

Proposed solution:

Connect the 3 networks by using 2 T1 links, as shown in the accompanying Exhibit.

Diagram of the proposed WAN.

<Picture>

Which results does the proposed solution produce?

A. The proposed solution produces the required results and produces both of the optional desired results.

B. The proposed solution produces the required results and produces only 1 of the optional desired results.

C. The proposed solution produces the required results but does not produce any of the optional desired results.

D. The proposed solution does not produce the required results.

33. Situation:

You are designing a WAN that will connect 3 existing networks in Dallas, Denver, and New Orleans.

Required results:

All of the computers on each of the 3 networks must be able to communicate with any other computer on the 3 networks.

The WAN links must be capable of transmitting data at a minimum speed of I Mbps.

Optional desired results:

You want to provide continued communications in the event of a single-link failure.

You want to provide continued communications at a minimum speed of 1

Mbps in the event of a single-link failure.

Proposed solution:

Connect the 3 networks by using 3 T1 links, as shown in the accompanying Exhibit.

Diagram of the proposed WAN.

<Picture>

Which results does the proposed solution produce?

A. the proposed solution produces the required results and produces both of the optional desired results.

B. The proposed solution produces the required results and produces only 1 of the optional desired results.

C. The proposed solution produces the required results but does not produce any of the optional desired results.

D. the proposed solution does not produce the required results.

 

 34. Situation:

You are designing a disaster prevention and recovery plan for your network. The following table summarizes the current network configuration.

Server 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDCClient Computers - 100, which run Microsoft Windows 95, Network Type: 10BaseT Ethernet

You have done the following:

. Placed all confidential data on the servers

. Placed the servers in a locked room

. Implemented NTFS user-level security on the servers to allow only specific personnel to access the data

Required results:

You must protect the servers from hardware failure. However, periods of downtime of less than 2 hours are acceptable.

You must have reasonable controls in place to protect network data from loss

Optional desired results:

You want to track all accesses to the data files.

You want to put reasonable methods in place to protect network data from virus corruption.

Proposed solution:

Connect UPS to each server.

Set appropriate access-control security on all shared resources.

Implement disk striping with parity for each server's hard disks.

Do daily tape backups of the data, and store the tapes in a secure off-site location.

Implement virus scanning on all client computers and servers.

 

Which results do the proposed solution produced

A. the proposed solution produces the required results and produces both of the optional desired results.

B. The proposed solution produces the required results and produces only 1 of the optional desired results.

C. The proposed solution produces the required results but does not produce either of the optional desired results.

D. the proposed solution does not produce the required results.

 

 35. Situation:

You are designing a disaster prevention and recovery plan for your network. The following table summarizes the current network configuration.

You have done the following:

. Placed all confidential data on the servers

. Placed the servers in a locked room

. Implemented NTFS user-level security on the servers to allow only specific personnel to access the data

Required results:

You must protect the servers from hardware failure. However, periods of downtime of less than 2 hours are acceptable.

You must have reasonable controls in place to protect network data from loss.

Optional desired results:

You want to track all accesses to the data files.

You want to put reasonable methods in place to protect network data from virus corruption.

Proposed solution:

- Connect UPS to each server.

- Set appropriate access-control security on all shared resources.

- Implement disk mirroring for each server.

- Do daily tape backups of the data, and store the tapes in a secure off-site location.

- Implement virus scanning on all client computers and servers.

- Enable auditing on all shared files.

Which results does the proposed solution produce?

A. The proposed solution produces the required results and produces both of the optional desired results.

B. The proposed solution produces the required results and produces only 1 of the optional desired results.

C. The proposed solution produces the required results but does not produce either of the optional desired results.

D. The proposed solution does not produce the required results.

 

36. Configuration of your client computer:

· SVGA card

· SCSI card, set at IRQ 15

· LPT1

· LPT2

· COM1

· COM2

. PS/2 mouse port

The computer runs Microsoft Windows NT Workstation.

You are installing a token-ring network adapter in the computer. You set it to use IRQ 3.

Which device could cause IRQ conflicts in the computer?

A. COM1

B. COM2

C. LPT1

D. LPT2

 

 

37. You install an Ethernet network adapter in a client computer. The computer's network software is initialized successfully, but the computer is not able to communicate with other computers on the network.  All other client computers on the network are able to communicate. What is the most likely cause of the problem?

A. the transceiver setting of the network adapter is incorrect. – ???? ???? 128

B. the I/O port address on the network adapter is incorrect.

C. the cable segment is not properly terminated.

D. the packet-size setting is incorrect.

 

38. Situation:

You are designing a NetBIOS naming scheme for all of the servers and client computers at your location. Within 2 years your company will install a WAN that will connect all of its networks.

Current Network Configuration for the Entire company

Servers - 328, Which run Microsoft Windows NT Server. Client Computers - 20,000 which run Microsoft Windows 95. Network - 40, each in a different cityWAN connections – None. E-mail: All users can e-mail all other users in the company.E-mail namesAll have 12 characters or fewer Current Network Configuration for Your Location Servers - 10, which run Microsoft Windows NT serverClient Computers - 500, which run Microsoft Windows 95

Required results:

You must successfully implement the NetBIOS naming scheme for all servers and client computers at your location.

The NetBIOS naming scheme at your location must continue to work after the WAN is connected.

Optional desired results:

You want the NetBIOS name for each server to describe the server's department or function.

You want each client computer's NetBIOS name to describe the computer's primary user or function.

Proposed solution:

Assign each server and client computer at all locations a unique 15-digit hexadecimal number to be used as that computer's NetBIOS name.

Which results does the proposed solution produce?

A. The proposed solution produces the required results and produces both of the optional desired results.

B. The proposed solution produces the required results and produces only 1 of the optional desired results.

C. The proposed solution produces the required results but does not produce either of the optional desired results.

D. The proposed solution does not produce the required results.

 

  

39. Situation:

You are designing a NetBIOS naming scheme for all of the servers and client computers at your location. Within 2 years your company will install a WAN that will connect all of its networks.

Current Network Configuration for the Entire company Server - 328, Which run Microsoft Windows NT Server. Client Computers - 20,000 which run Microsoft Windows 95. Networks - 40, each in a different cityWAN connections: None. E-mail - All users e-mail all other users in the company.E-mail namesAll have 12 characters or fewer Current Network Configuration for Your Location Sever10, which run Microsoft Windows NT serverClient Computers500, which run Microsoft Windows 95

Required results:

You must successfully implement the NetBIOS naming scheme for all servers and client computers at your location. The NetBIOS naming scheme at your location must continue to work after the WAN is connected.

Optional desired results:

You want the NetBIOS name for each server to describe the server's department or function.

You want each client computer's NetBIOS name to describe the computer's primary user or function.

Proposed solution:

Assign each server a NetBIOS name that consists of 15 characters that describe the location plus a 4-digit number that is unique to each server. Assign each client computer a NetBIOS name that corresponds to the e-mail address of the computer's principal user.

Which results does the proposed solution produce?

A. The proposed solution produces the required results and produces both of the optional desired results.

B. The proposed solution produces the required results and produces only 1 of the optional desired results.

C. The proposed solution produces the required results but does not produce either of the optional desired results.

D. the proposed solution does not produce the required results.

 

  

40. Situation

You are designing a NetBIOS naming scheme for all of the servers and client computers at your location. Within 2 years your company will install a WAN that will connect all of its networks.

Current Network Configuration for the Entire company Servers - 328, Which run Microsoft Windows NT Server. Client Computers - 20,000 which run Microsoft Windows 95. Network - 40, each in a different city. WAN connections: None. E-mail: All users have e-mail to all other users in the company.E-mail names All have 12 characters or fewer

Current Network Configuration for Your Location

Servers - 10, which run Microsoft Windows NT server. Client Computers - 500, which run Microsoft Windows 95

Required results:

You must successfully implement the NetBIOS naming scheme for all servers and client computers at your location. The NetBIOS naming scheme at your location must continue to work after the WAN is connected.

Optional desired results:

You want the NetBIOS name for each server to describe the server's department or function.

You want each client computer's NetBIOS name to describe the computer's primary user or function.

Proposed solution:

Assign each server a NetBIOS name that consists of the first 8 characters of the server's department name, plus a 5-character location code, plus a 2-digit identifier to distinguish between multiple servers within the department. Assign each client computer a NetBIOS name that corresponds to the e-mail address of the computer's principal user.

 

Which results does the proposed solution produce?

A. The proposed solution produces the required results and produces both of the optional desired results.

B. The proposed solution produces the required results and produces only 1 of the optional desired results.

C. The proposed solution produces the required results but does not produce either of the optional desired results.

D. The proposed solution does not produce the required results.

 

41. Which device should you use to monitor the amount of network traffic over time?

A. time domain reflectometer (TDR)

B. cable tracer

C. protocol analyzer

D. medium attachment unit

 

42. The servers on your network run Microsoft Windows NT Server. The client computers run Microsoft Windows 95. You want to monitor network activity and evaluate network communications at the packet level.

Which tool should you use?

A. Performance Monitor

B. protocol analyzer

C. oscilloscope

D. volt-ohmmeter

 

 43. Which tool should you use to create a report that logs network activity?

A. volt-ohmmeter

B. oscilloscope

C. protocol analyzer

D. time domain reflectometer (TDR)

 

44. Your network uses NWLink IPX. Initialization of your client computer's network software appears to be successful, but your client computer is not able to access the server. All of the other computers are able to access the server. What is the most likely cause of the problem?

A. the wrong network-adapter driver is installed in your client computer.

B. your client computer has insufficient extended memory.

C. the network adapter in your client computer is configured to use the wrong I/O port address.

D. the network adapter in your client computer is configured to use the wrong frame type.

 

45. You connect a client computer to a network that uses NWLink IPX. The client computer is not able to access any network resources. After investigation, you decide that hardware is not causing the problem. What is the most likely cause of the problem?

A. incorrect subnet mask on the client computer

B. incorrect IP address on the client computer

C. incorrect frame type on the client computer

D. corrupted WIN.INI file on the client computer

 

46. Your network includes servers that run Microsoft Windows NT Server, client computers that run Microsoft MS-DOS, and UNIX client computers.

You add a new server that runs Microsoft Windows NT Server. All of the MS-DOS computers can access all shared network resources. The UNIX computers can access all shared network resources except the new server.  What is the most likely cause of the problems

A. faulty network adapters in the UNIX computers

B. incorrect binding order on the server

C. protocol mismatch between the server and the UNIX computers

D. incorrect frame type on the server

 

47. Current network configuration:

Servers - 27, which run Microsoft Windows NT server. Client Computers – 750. Protocols: NetBEUI, NWLink IPX, TCP/IP

You install a new client computer, which uses NWLink IPX. You are not able to access some of the shared network resources from this new computer. All of the other computers on the network are able to access all shared network resources.  What is the most likely cause of the problem?

A. the subnet-mask setting on the new client computer is incorrect.

B. There is a protocol mismatch between the new client computer and the inaccessible shared network resources.

C. the NetBIOS names for the new client computer and for the inaccessible shared network resources are duplicates.

D. There is a cable failure between the new client computer and the inaccessible shared network resources.

 

 48. A client computer on your Ethernet network is not able to access the server. Initialization of the client computer's network software was successful. All other client computers are able to access the server.  After investigation, you decide that hardware is not causing the problem.   What is the most likely cause of the problem?

A. There is insufficient extended memory in the affected client computer.

B. The network adapter in the server is configured to use the wrong transceiver.

C. the network adapter in the affected client computer is configured to use the wrong transceiver.

D. An excessive number of collisions is occurring on the media.

 

49. Configuration of 2 of the client computers on your 10BaseT Ethernet network:

VGA adapter: Default settings

IDE controller: Default settings

Floppy disk drive controller: Default settings

LPT1: Default settings

COM1: Default settings

COM2: Default settings

Ethernet network adapter See settings below:

MAC hardware address: 1 0C805000000

IRQ: 5

IO port address: 300

Transceiver: RJ-45

DMA None

Memory address: None

 

Neither computer is able to access the network. You run diagnostic tests on the network adapters in both computers. Configuration of both adapters is identical:

Which change must you make on both Ethernet network adapters to allow the 2 client computers to access the network?

A. Change the MAC (hardware) addresses to factory settings.

B. Change the IRQ settings to 3.

? - C. Change the IO port addresses to 320.

D. Change the transceiver types to BNC.

 

 

50. Network Diagram.

<Picture>

 

Client computers on your Ethernet network are not able to access the server. You use a volt-ohmmeter to measure the resistance between the center wire and the shield on the cable, on the T-connectors, and on the terminators. You obtain the following resistance readings:

RG-58 A/U coaxial cable: 0 ohms

Both T-connector: ? (Infinity) ohms

Both terminators: 50 ohms

What should you do to repair the network?

A. Replace the 50-ohm terminators with 25-ohm terminators.

B. Replace the 50-ohm terminators with 100-ohm terminators.

C. Install replacement T-connectors.

D. Install replacement RG-58 A/U coaxial cable.

 

 

51. You are the administrator of a 20-computer Ethernet network. Sometimes 1 or 2 computers are not able to access network resources. The problem has affected every computer at random times. Some of the network cable is RG-58 /U solid-core coaxial cable, and some of the cable is RG-58 A/U stranded-core coaxial cable. You use a volt-ohmmeter to measure the resistance between the center wire and the shield on the cables and on the parts connected to them. You obtain the following readings:

All cables: ? (Infinity) ohms

Both terminators: 50 ohms

All T-connectors: ? (infinity) ohms

What must you do to repair the network?

A. Replace the 5O-ohm terminators with 25-ohm terminators.

B. Replace all RG-58 /U coaxial cables with RG-58 A/U coaxial cables.

C. Replace all cables with RG-62 /U coaxial cables.

D. Replace all T-connectors with new ones.

 

52. A user reports slow network response on your 500-computer Ethernet network. After investigation, you suspect that a network adapter is generating a continuous and meaningless transmission.

Which device can you use to identify the defective network adapter?

A. protocol analyzer

B. volt-ohmmeter

C. optical time domain reflectometer (OTDR)

D. time domain reflectometer (TDR)

53. Situation:

Your company's rapid growth has caused an increase in the number of computers on your network. There were 300 computers at the beginning of the year, and there are 1,000 now. Broadcast storms are occurring with increasing frequency on the network. You want to reduce the number of broadcast storms. The following table summarizes your current network configuration.

Servers - 25, Which run Microsoft Windows NT Server. Client Computers - 600 which run Microsoft Windows 95, and 300 Macintosh Computer that run System 7.x. 75 UNIX computers. Network Type: 10BaseT Ethernet.

Protocols: NetBEUI, TCP/IP with DHCP and WINS, NWLink IPX, AppleTalk.

Cable: Category 3 UTP. Brouters: 4 with bridging enabled.

Required result:

You must reduce the number of broadcast storms by at least 50 percent while minimizing changes in functionality for the client computers.

Optional desired results:

Minimize hardware costs needed to produce the reduction in broadcast storms.

Minimize ongoing administrative costs after the changes are made.

Allow for continued expansion of the network.

Proposed solution:

Turn off bridging on all of the brouters. Configure all of the computers and brouters to use only NWLink IPX.

Which results does the proposed solution produce?

A. The proposed solution produces the required result and produces all of the optional desired results.

B. The proposed solution produces the required result and produces only 1 of the optional desired results.

C. The proposed solution produces the required result but does not produce any of the optional desired results.

D. The proposed solution does not produce the required result.

 

54. Situation

Configuration of your network:

Servers - 9, Which run Microsoft Windows NT Server. Client Computers – 200. Network Type: 10BaseT Ethernet. Protocols – NetBEUI. Bridges: None.

Routers: None.

Users on your network report poor network performance. After investigation, you decide that broadcast storms are causing the problem. What should you do to resolve the broadcast storms?

A. Segment the network by using a router.

B. Segment the network by using a repeater.

C. Replace NetBEUI with DLC, and then segment the network by using a bridge.

D. Replace NetBEUI with TCP/IP, and then segment the network by using a router.

 

55. Your network has 35 client computers and 1 server. The server runs Microsoft Windows NT Server. Network performance is steadily decreasing as new client computers are added to the network. You run Performance Monitor on the server and obtain the following statistics:

Counter Average

% Processor Time: 8

Page Faults/sec: 2

% Disk Time: 25

What should you do to improve network performance?

A. Replace the server with a multiprocessor computer.

B. Install additional RAM in the server.

C. Install disk striping with parity on the server

D. Segment the network by adding another network adapter to the server.

 

 

56. Situation:

Network monitoring shows that network utilization has grown from 30 percent to 70 percent of maximum capacity in the past year. You will add 24 client computers and 1 server within 3 months. You want to reduce network utilization.

Required result:

? You must reduce network utilization by 50 percent.

Optional desired results:

? You want to allow for continued network growth.

? You want to maintain the new network utilization levels even after the planned additions to the network are implemented.

? You want to minimize costs for the project.

Proposed solution:

Change the maximum packet size on all of the computers from 1,514 bytes to 576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable. Increase TCP window size from 4,096 bytes to 16,384 bytes.

Which results does the proposed solution produce?

A. the proposed solution produces the required result and produces all of the optional desired results.

B. the proposed solution produces the required result and produces only 2 of the optional desired results.

C. The proposed solution produces the required result but does not produce any of the optional desired results.

D. the proposed solution does not produce the required result.

 

 

57. Situation:

Network monitoring shows that network utilization has grown from 30 percent to 70 percent of maximum capacity in the past year. You will add 24 client computers and 1 server within 3 months. You want to reduce network utilization. The following table summarizes your current network configuration.

 

Servers3Client Computers120 evenly distributed among the 3 serversNetwork Type10BaseT EthernetProtocolTCP/IPCableCategory 3 UTPRoutersNoneBridgesNone

Required result:

You must reduce network utilization by 50 percent.

Optional desired results:

You want to allow for continued network growth.

You want to maintain the new network utilization levels even after the planned additions to the network are implemented.

You want to minimize costs for the project.

Proposed solution:

Replace all 10BaseT hubs with 100BaseT hubs. Replace all Category 3 UTP cable with Category 5 UTP cable. Replace all 10BaseT network adapters with 100BaseT network adapters.

Which results do the proposed solution produced?

A. The proposed solution produces the required result and produces all of the optional desired results.

B. The proposed solution produces the required result and produces only 2 of the optional desired results.

C. The proposed solution produces the required result but does not produce any of the optional desired results.

D. The proposed solution does not produce the required result.

 

58. In the past year, you have added 55 client computers to your l0BaseT Ethernet network. Users of the network report that network response is slow during peak hours of usage.

Which solution is the most economical?

A. Replace all Ethernet adapters with FDDI adapters.

B. Replace all Ethernet concentrators with Ethernet switches.

C. Replace all Ethernet components with 100-Mbps ATM equivalents.

D. Replace all Ethernet components with 16-Mbps token-ring equivalents.

 

59. You want to implement a "fast ethernet" network, what should you use?

A. Coaxial thinnet cable

B. Type 3 UTP

C. Type 5 UTP

D. Fiber optic cable

 

60. you want to implement a dial up protocol which supports compression…

A. SLIP

B. DLC

C. TCP/IP

D. PPP

 

61. Which numerical value explains to the system how to interpret the IP Address?

A. The default gateway

B. The DHCP scope

C. The netbios lana number

D. The subnet mask

 

 

62. Which is the core protocol which enables elementary transactions between Microsoft computers?

A. Netbios

B. Nwlink

C. TCP/IP

D. DLC

E. AppleTalk

F. PPP

G. SMB

H. IPX/SPX

I. DHCP

J. Netbeui

 

63. You wish to implement Netbios name resolution in your routed network, what must you do?

A. Use client b-node broadcasts

B. Use WINS server

C. Use the HOST static file on each workstation in the network

D. Bind the netbeui protocol first in the binding list

 

64. You would like to check how much network bandwidth is used during peak usage hours…

A. Use performance monitor

B. Use a protocol analyzer

C. Use Server manager

D. Use Microsoft diagnostics

 

65. You have been given the task of monitoring network hardware such as bridges routers brouters and hubs. What must you do prior to the actual monitoring task?

A. You needn’t do anything, simply use network monitor to view the required objects

B. Install SNMP services

C. Install DHCP relay agent

D. Install messenger service

 

66. Your network has three sites: New York, Boston and Chicago. You want to implement a WAN link that will connect the three LANs required results:

The WAN link must enable transmissions of over 1 Mbps

Optional results:

Communications must continue even if a single link breaks

Communications must continue at speeds of over 1 Mbps even if one WAN link breaks

Proposed solution:

Implemant a 16-port RAS server on each site and use 28,800bps modems so that there are 8 ports connecting each site to the remaining two sites

What does the proposed solution acomplish

A. The required and both optional results

B. Only the required result

C. The required and only one optional result

D. Not even the required result

 

67. You would like to implement a WAN connection between two sites. Which advenced WAN technology would you use if you want assurance of packet delivery?

A. Frame relay

B. ATM

C. X-25

D. ISDN

 

68.your network is experiencing rapid growth due to which communications are slow.

Required: Reduce the utilization by 50%

Options:

1.Continue growth

2.Maintain new network utilization.

3.Minimize costs.

Proposal:

Reduce the packet size from 1514 to 576 bytes. Increase the TCP/IP window size from 4096 to 16384. Replace the Cat 3 cables with Cat 5.

A.Required plus all options.

B.Required plus 2 of the options.

C.Required plus none of the options.

D.Not the required.

 

69. Youre network consists of Servers using NT. 75 Clients using NetBEUI. You want to connect a UNIX network that uses NFS. Which device should acomplish the task?

A.Bridge

B.Brouter

C.Router

D.Gateway

 

70. TCP/IP network, want to track how many users who connect to 15 NT server machines and 5 routers, what utility do you use?

a.Performance Monitor

b.Server Manager

c.network monitor

d. Ipconfig utility

 

71. Network with NT server, win95 client, macintosh clients. Network is using brouters, TCP/IP, Appletalk, and NetBEUI.

Required result: reduce broadcast storm and network trafffic 50%.

Optional results: minimize cost.

minimize administrative cost.

allow network to continue to expand.

Proposed solution: Turn off bridging on brouter. Configure win95 client to use TCP/IP. Configure all servers and brouters to use TCP/IP and Appletalk.

a.meet required and all optional.

b.meet required and only 1 optional.

c.meet required only.

d.doesn't meet any.

 

  

72. Which WAN isfaster than 100Mbps?

A. ISDN Basic rate interface.

B. X.25.

C. T1.

D.ATM.

? What must you ensure that a NetBIOS name does not duplicate? (choose 3)

A. Computer name on the same network.

B. Domain name on the same network.

C. Workgroup name on the same network.

D. Share name on the same network.

 

73. What is a benefit of both NDIS and ODI?

A. They allow network adapters to be used in any compliant computer.

B. They allow network adapters to transmit information over a greater distance than non-compliant network adapters can.

C. They allow network adapters to communicate with other compliant network adapters.

D. They allow network adapters to be independent of any particular transport protocol.

 

74. you have 2 LANs, one using ethernet and other using token ring. Both the lans are using NetBeui and Nwlink, You want to connect both the LANs and still want to use the BOTH protocols.

a) REPEATER

b) BRIDGE

c) ROUTER

d) GATEWAY

75. Exhibit: ox------+-----+-----+-----+-----xo

o= ground

x= 50ohm terminator

+= T connector to computer

Sometimes clients on the network are not able to access the server.

What should you do to restore reliable network communication?

ANS. Ground the network properly.

 

76. Which MS operating systems give access to shared resources, to any user who has the password assigned to that resource. (Choose all)

ANS. Windows for Workgroups, and Windows 95

 

77. You just converted a network from NetBEUI to TCP/IP. The server and clients are on different subnets. >From the clients you can ping the server by using the IP address but you cannot access the server by using the server name. What is the problem?

ANS. Servers name is not registered with the name server.

78. The devices function at above Transport layer of the OSI. IT acts as translator between 2 dissimilar protocols.

Diagram shown an OSI layer.

a) gateway b ) bridge c) Router d) repeater

80. Which technology would you use that can accommodate different speeds?

A. ATM

B. Frame relay

C. ISDN

D. X-25

 

81. You would like to create a temporary network for eight computers I the same room. Which topology would you use?

A. Bus

B. Star

C. Ring

D. Mesh

 

82.Situation:

You have a growing 10baseT network with growing bandwidth utilization.  At the beginning of the year only 30% of bandwidth was utilized, now 70% is used.

Required result:

Upgrade network capacity

Optional results:

Allow continued network growth

Minimize the upgrade cost

Proposed solution: Change all network adapter cards to FDDI adapters, change all cable to fiber optic cable.

What does this accomplish?

Answer: The required and one optional result (this is not cheep).

83. Two computers on your network

84. Question with exhibit showing a bus 10base2 network that looks like a "T", with three terminators, one on each end of the "T". the question states that communications are poor, and asks how to remedy this.

Answer: configure the network to use two terminators.

 

85. What is a switch also known as?

smart hub

dumb hub

passive hub

stagnant hub

 

86. simultaneous voice,video and data

ANS atm

netbios can only have 15 characters!!!

 

87. Which type of WAN connection service is intended to replace standard analog telephone service?

A. ISDN basic rate interface

B. X.25

C. Frame relay

D. 2.048-Mbps digital line

 

88. You are designing a WAN that uses X.25. Which device should you include in the design?

A. gateway

B. packet assembler-disassembler (PAD)

C. multiple-layer interface driver (MLID)

D. multiplexer

 

89. Christina’s computer WAS working properly and NOW cannot connect to the server. All other computers can - what's the problem?

a. wrong transceiver type

b. network connection at her computer

c. NIC conflict with the Dynamic Interface Computer Keyboard (DICK)

d. incorrect frame type

 

90. What was intended to replace standard phone lines (PSTN)?

a. SLIP/PPP

b. Basic Rate ISDN

c. Primary Rate ISDN

d. Secondary Rate ISDN

 

91. What would be the cheapest way to implement fault tolerance that would allow for a maximum downtime of 2 hours?

a. Raid Level 0

b. Raid Level 5

c. Disk Duplexing

d. Tape Backup

 

92. You have a growing 10baseT network with growing network utilization required result:

? upgrade network performance by 50%

optional results:

? prove space for continued network growth

? minimize the projects cost

proposed solution:

replace all cables with fiber optic cable, replace all netwirk adapters with FDDI adaptors.  What does the proposed solution provide?

Answer: the required result but only one optional result (this is not cheap).

 

93. Why does information running from an ethernet network to a token ring network take 30 seconds while the same information passing from token ring to ethernet takes 5 minutes?

Answer: token ring packets are larger than ethernet packets. (and they must be fragmented by the router and then reassembled by the receiving computer).

? Beware of the RAS question about providing over 1 Mbps when using a 16 port RAS server with each port containing a 28,800bps modem – does not provide the required result…