Visit
http://www.LearnQuick.ComEveryone,
Here is my personal dump. I'm going to refer to the list of questions (#1-#86) listed after the dotted line. These questions are a compilation of Dump questions from this site. I only listed complete (or mostly complete) questions with the possible answers.
The following questions from my list are of special interest. KnowhatImean?
#1, #2, #3, #5, #6, #7, #13, #22 (#22 read a little different, but the logic was the same), #23 (this question also read a little different), #25, #26, #27, #66, #81
I had several Router/Gateway questions, there are so many variations I couldn't tell you what they were exactly. The questions I had were always either a Router or Gateway and never a hub, a repeater, and a Brouter was never an option. The router questions mentioned using TCP/IP as the only protocol and the gateway questions always mentioned something regarding some type of translation.
Absolutely nothing came close to referring to the OSI model. Nothing. Zip.
Zilch. Nada... you get the picture.
Another question not in my list below-
You want to connect 9 Ethernet LANs that use UTP on 9 floors of an office building. What backbone do you use. You want it to be inexpensive. (The question did not mention if it was CAT 5 or CAT 3 wiring) a. fiber optic
b. UTP
c. STP1
d. Human Nerve Fibers (I forgot what it really was) A Coaxial backbone was not an option.
If you install a Net Card, what can conflict (choose all that apply)
a. COM2
b. LPT1
c. Mouse
d. Sound Card
One click and drag question. The question was something like- You are setting up a network. You want your computers to operate as efficiently as possible. Then they gave you the options of-
a. Application Server
b. File Server
c. Print Server
d. Client computer
and you match these with.... (these are not exact specs, but they are four distinctly different systems)
1. 450Mhz 128meg 12gig HD
2. 300mhz 64meg 4.2HD
3. 200mhz 32meg 3.1HD
4. 100mhz 16meg 1.2HD
(If you wanted to, you could make everything a File server, or a client, etc.)
Here comes my massive collection of questions - these were all found on this site. I just cleaned up some things and weeded out some others for ease of reading. Hope this helps. Remember, questions #1, #2, #3, #5, #6, #7, #13, #22, #23, #25, #26, #27, #66, #81 are of special interest.
--------------------------------------------------------------------------------------------------------------------------------------
#1 - You have a DHCP server and WINS server. Your are using TCP/IP You can
communicate with the network using the IP address, but not when using the
servers name.
What do you examine first?
A.DHCP server.
B.WINS server
C.Gateway
D.Router
#2 - You want to monitor and manage hubs, bridges and routers on the
network.
What do you use?
A.Performace Monitor
B.SNMP implementation
C.Protocol analyzer
D.TDR
#3 - You have a network using NetBEUI and TCP/IP. The server and client are
in different
subnets. The client can PING the server, but cannot access the server using
its
name.
A.Client and the server have the same IP address
B.Server has the wrong subnet mask.
C.Server's name not registered with the name server.
D.Client's name not registered with the name server.
#4 - Large network with 2000 users users notice that at various times in the
day network
time outs occur.
What is the reason?
A.Power fluctuations.
B.Malfunctioning net adapter on the router.
C.Terminated segement.
D.Logging of users.
#5 - You have a network that uses T1 and is connected to the internet. Which
backup
connection could you use to support e-mail in the event of failure.
A.T3
B.ATM
C.ISDN
D.?
#6 - Which data link communications protocol provides connections between
computers via dial-up telephone lines? (Choose all that apply)
A. SLIP.
B. PPP.
(Yes, only two options are given)
#7 - TCP/IP network, want to track how many users who connect to 15 NT
server machines and 5 routers, what utility do you use?
a.Performance Monitor
b.Server Manager
c.SNMP
d. Ipconfig utility
#8 - Network with NT server, win95 client, macintosh clients. Network is
using brouters and TCP/IP, Appletalk, and NetBEUI.
require: reduce broadcast storm and network trafffic 50%.
optional: minimize cost.
minimize administrative cost.
allow network continue to expand.
propose: Turn off bridging on brouter. Configure win95 client to use TCP/IP.
Configure all servers and brouters to use TCP/IP and Appletalk.
a.meet required and all optional.
b.meet required and only 1 optional.
c.meet required only.
d.doesn't meet any.
#9 - Which network topology provides guaranteed access for each computer on
the network?
A. star.
B. bus.
C. ring.
D. linear.
#10 - Your company's network uses a 100Mbps backbone. Network traffic is
nearly at capacity. Users report that network time is slow. You are
planning to upgrade the network. Which WAN technology should you implement?
A. Ethernet
B. token-ring.
C. FDDI.
D. X.25.
E. ATM.
#11 - You manage a network that has 1 NetWare server and 25 Microsoft
Windows for Workgroup computers. The NetWare server and the client
computers are running IPX/SPX. The NetWare server runs your database. Which
type of networking is in use on this network? (Choose 2).
A. collaborative computing.
B. Microsoft NT Domain.
C. client/server.
D. peer to peer.
#12 - You want to manage Microsoft Windows NT server computers that are
located on remote subnet. All of these servers are configured in a single
Windows NT domain. You will manage these servers from another Windows NT
server computer that is located in your office. You want to use User
Manager and server Manager to manage the remote servers. What should you
install and configure to resolve the computer names of the servers? (Choose
2).
A. DNS server.
B. DHCP server.
C. WINS server.
D. LMHOSTS file.
E. RAS server.
#13 - You have Microsoft Windows Workstation 4.0 computer that runs TCP/IP.
This computer connects to the Internet by using a modem and a dial-up
connection. You want to connect your computer to an Ethernet network. You
install a network adapter card and connect the network adapter to the
physical network. Which type of network adapter driver must you install?
A. NDIS 2.0.
B. NDIS 3.0.
C. NDIS 3.1.
D. ODI.
#14 - Which 2 protocols use connection-oriented communication?
A. IPX
B. SPX
C. TCP
D. IP
E. UDP
#15 -What is a benefit of installing an application server to store and
manage a database?
A. An application server centrally manages all user accounts.
B. An application server stores more data than a file-and-print server does.
C. An application server transfers only the results of database queries to
client computers.
D. An application server transfers the entire database to client computers.
#16 - What is a benefit of using an application server instead of a
file-and-print server?
A. An application server retrieves data and sends data to client computers
more efficiently than a file-and-print server does.
B. An application server manages file and record locking more efficiently
than a file-and-print server does.
C. An application server manages user access to network resources.
D. An application server distributes processing among all client computers
on the network more efficiently than a file-and-print server does.
#17 - You are assigning a NetBIOS name to 10 of the client computers on your
network. Which is a valid NetBIOS name for this computer?
A. The name of a share on 1 of the network servers.
B. The computer name 1 of the network servers.
C. The name of a domain on the network.
D. The name of a workgroup on the network.
#18 - Which WAN faster than 100Mbps?
A. ISDN Basic rate interface.
B. X.25.
C. T1.
D. ATM.
#19 - Which device can you use to identify the defective network adapter?
A. protocol analyzer.
B. volt-ohmmeter.
C. optical time domain reflectometer (OTDR).
D. time domain reflectometer (TDR).
#20 - What is a characteristic of connection-oriented communication?
A. It provides fast but unreliable delivery of datagrams.
B. It provides assurance of packet delivery.
C. It uses store-and-forward techniques to move datagrams between computers.
D. It uses message-oriented communication for processing e-mail.
#21 - What must you ensure that a NetBIOS name does not duplicated?
A. Computer name on the same network.
B. Domain name on the same network.
C. Workgroup name on the same network.
D. Share name on the same network.
#22 - You are designing a peer-to-peer network that consists of 5 Microsoft
Windows 95 computers. Which protocol should you use?
A. DLC.
B. NFS.
C. NWLink IPX.
D. XNS.
#23 -What is a benefit of both NDIS and ODI?
A. They allow network adapters to be used in any compliant computer.
B. They allow network adapters to transmit information over a greater
distance than non-compliant network adapters can.
C. They allow network adapters to communicate with other compliant network
adapters.
D. They allow network adapters to be independent of any particular transport
protocol.
#24 - You want to connect your Ethernet and token-ring networks. Both
networks use NWLink IPX. You want to use IPX addressing to limit the amount
of traffic between the 2 networks. Which device should you use?
A. repeater.
B. bridge.
C. router.
D. gateway.
#25 -You are designing a security plan for your network. The following table
summarizes the current network
configuration.
Server: 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1
is the BDC.
Client Computers: 100, which run Microsoft Windows 95
Network Type: 10BaseT Ethernet
Required result:
You must have centralized control of access to shared resources.
Optional desired results:
You want to track all access and attempted access to shared resources.
You want to track attempts to guess user passwords.
You want to implement a method to protect user accounts from
password-breaking programs.
Proposed solution:
Implement NTFS with user-level security on all servers. Set appropriate
access-control security on all shared resources. Require users to change
their passwords every 40 days. Implement disk striping with parity on all
servers. Perform daily tape backups, and store tapes in a secure off-site
location.
Which results does the proposed solution produce?
A. The proposed solution produces the required result and produces all of
the optional desired results.
B. The proposed solution produces the required result and produces only 1 of
the optional desired results.
C. The proposed solution produces the required result but does not produce
any of the optional desired results.
D. The proposed solution does not produce the required result.
#26 - Network monitoring shows that network utilization has grown from 30
percent to 70 percent of maximum capacity in the past year. You will add 24
client computers and 1 server within 3 months. You want to reduce network
utilization.
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the
planned additions to the network are implemented.
You want to minimize costs for the project.
Proposed solution:
Change the maximum packet size on all of the computers from 1,514 bytes to
576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable.
Increase TCP window size from 4,096 bytes to 16,384 bytes. Which results
does the proposed solution produce?
A. The proposed solution produces the required result and produces all of
the optional desired results.
B. The proposed solution produces the required result and produces only 2 of
the optional desired results.
C. The proposed solution produces the required result but does not produce
any of the optional desired results.
D. The proposed solution does not produce the required result.
#27 - What can enable client computers to browse NetBIOS names on all
subnets of the network?
A. WINS server.
B. DHCP server.
C. router.
D. NetBIOS broadcast.
#28 - You are designing a 100-Mbps network. Which media should you use?
A. RG-58 A/U coaxial cable
B. spread-spectrum radio
C. Category 5 UTP cable
D. Type 1 STP cable
#29 - You connect a client computer to a network that uses NWLink IPX. The
client computer is not able to access any network resources. After
investigation, you decide that hardware is not causing the problem. What is
the most likely cause of the problem?
A. incorrect subnet mask on the client computer
B. incorrect IP address on the client computer
C. incorrect frame type on the client computer
D. corrupted WIN.INI file on the client computer
#30 - What is the best way to create report that logs network activity.
a) Volt-ohmmeter
b) Oscilloscope
c) Protocol analyzer
d) TDR
#31 - 3 Windows NT Servers and 75 Clients using NetBEUI protocol. You want
to communicate these computers with UNIX that uses NFS file system. You
don't want to install new software. What is the best way to solve this
problem?
a) Bridge
b) Brouter
c) Router
d) Gateway
#32 - You installed a new network adaptor card. And supplied network
software initialized successfully. But you can not communicate with other
computers even though other computers operating successfully. What's the
reason?
a) Transceiver setting is incorrect
b) I/O port address is incorrect
c) Cable segment is not properly terminated
d) Packet size setting is incorrect
#33 - You suspect your network has been experiencing Broadcast storms.
Which
indicators would indicate broadcast storms: (choose all that apply)
a] network time-outs
b] bad ip address errors
c] network utilization is 100% for periods of time
d] can't remember something ridiculous
#34 - What upper level protocol is used for NetBios file services?
a]nwlink
b]tcp
d]decNet
e]ipx
f]spx
g]netBeui
h]smb
i]ncp
#35 - Your network is experiencong slow downs. You want to speed up the
network. You want to help the PDC out by adding devices to split the
functions of it: drag the devices on the left hand side to the ? mark:
<<...>>
#36 -What must you specify when you want to copy a file from 1 computer to
another by using a UNC name? (Choose 2.)
A. share name
B. domain name
C. computer name
D. workgroup name
#37 - What is a characteristic of a client/server networks?
A. Any computer can make its resources available to any other computer
on the network.
B. Dumb terminals are connected to a central host computer that performs
all processing.
C. Any computer on the network can be both a client and a server.
D. Client computers access a server that performs back-end services.
#38 -What is a characteristic of connection-oriented communication?
A. It provides fast but unreliable delivery of datagrams.
B. It provides assurance of packet delivery.
C. It uses store-and-forward techniques to move datagrams between
computers.
D. It uses message-oriented communication for processing e-mail.
#39 - This device functions at or above the Transport layer of the OSI
model. It acts as a translator between 2 computers that use different
protocols or data formats.
A. gateway
B. bridge
C. router
D. repeater
#40 - What is a characteristic of the IEEE 802.3 10BaseT standard?
A. It specifies RJ-11 connectors at the ends of each cable.
B. It specifies UTP cable.
C. It specifies BNC T-connectors for connecting computers to cables.
D. It specifies 50-ohm terminators at the ends of each cable.
#41 - What is a characteristic of the IEEE 802.3 10Base2 standard?
A. It specifies Category 3 DIP cable with a maximum cable length of 100
meters.
B. It specifies RG-11 C/U coaxial cable with a maximum cable length of
500 meters.
C. It specifies BNC T-connectors for connecting computers to cables.
D. It specifies RJ-45 connectors at the ends of each cable.
#42 - What is a purpose of NDIS?
A. to allow any compliant transport protocol to pass data to any
compliant network adapter
B. to allow any compliant transport protocol to pass data to any
compliant network redirector
C. to define the common signaling scheme that all vendors' adapters use
when transmitting packets
D. to define the voltage levels that must be applied to the pinouts on
the network adapter's 15 pin AUI connector
#43 - You want to install a 100-Mbps backbone network that will connect 5
existing networks. Which media should you use?
A. Category 3 UP cable
B. Category 4 UTP cable
C. Fiber-optic cable
D. RG-58 A/U coaxial cable
#44 - You are designing a 100-Mbps Ethernet network for a building that has
existing UTP cable. You test the existing cable and decide that it meets
Category 3 specifications. Which media should you use?
A. the existing cable
B. new Type 1 STP cable
C. new Category 4 UTP cable
D. new Category 5 UTP cable
#45 - You are designing a 100-Mbps network. Which media should you use?
A. RG-58 A/U coaxial cable
B. spread-spectrum radio
C. Category 5 UTP cable
D. Type 1 STP cable
#46 - Which protocol is routable? (Choose 3.)
A. AppleTalk
B. TCP/IP
C. NWLink IPX
D. NetBEUI
E. DLC
#47 - You want to segment your 200-node network into 3 subnets. The network
uses TCP/IP.
Which device should you use?
A. repeater
B. bridge
C. router
D. gateway
#48 - Your network has 250 client computers. The network uses both TCP/IP
and NetBEUI. You want to segment the network into 3 subnets. You want to
allow all of the computers to use both of the protocols to communicate with
computers on all 3 subnets.
Which device should you use?
A. repeater
B. brouter
C. router
D. gateway
#49 - Which networking device is used to translate protocols?
A. bridge
B. hub
C. gateway
D. repeater
#50 - Your l0BaseT Ethernet network uses NetBEUI. Users of your client
computers need to access an IBM 3090 mainframe computer by using a 3270
terminal-emulation program.
Which device must you install?
A. bridge
B. gateway
C. router
D. brouter
#51 - You want to connect 2 computers by using l0BaseT Ethernet cable. The
computers are located more than 300 meters apart.
Which device should you use?
A. repeater
B. amplifier
C. multiplexer
D. gateway
#52 - You want your WAN to allow simultaneous transmission of voice, video,
and data. Which WAN connection
service should you use?
A. 56-Kbps digital line
B. X.25
C. Frame relay
D. ATM
#53 - Which type of WAN connection service is intended to replace standard
analog telephone service?
A. ISDN basic rate interface
B. X.25
C. Frame relay
D. 2.048-Mbps digital line
#54 - You are designing a WAN that uses X.25. Which device should you
include in the design?
A. gateway
B. packet assembler-disassembler (PAD)
C. multiple-layer interface driver (MLID)
D. multiplexer
#55 - Your company has an Ethernet network with 750 computers. The company
is migrating to servers that run Microsoft Windows NT Server and to client
computers that run Microsoft Windows 95. You want to protect sensitive
network data, with a minimal amount of administration. What should you
include in your security plan?
A. peer-to-peer file sharing, with user-level security on all shared
resources
B. peer-to-peer file sharing, with resource-password security on all
shared resources
C. centralized administration of user accounts, with user-level security
on all shared resources
D. centralized administration of user accounts, with resource-password
security on all shared resources
#56 - Situation:
You are designing a disaster prevention and recovery plan for your network.
The following table summarizes the current network configuration.
Server
2 total - both run Microsoft Windows NT
server, 1 is the PDC and 1 is the BDC
Client Computers
100, which run Microsoft Windows 95
Network Type
10BaseT Ethernet
You have done the following:
. Placed all confidential data on the servers
. Placed the servers in a locked room
. Implemented NTFS user-level security on the servers to allow only specific
personnel to access the data
Required results:
You must protect the servers from hardware failure. However, periods of
downtime of less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from loss
Optional desired results:
You want to track all accesses to the data files.
You want to put reasonable methods in place to protect network data from
virus corruption.
Proposed solution:
Connect UPS to each server.
Set appropriate access-control security on all shared resources.
Implement disk striping with parity for each server's hard disks.
Do daily tape backups of the data, and store the tapes in a secure off-site
location.
Implement virus scanning on all client computers and servers.
Which results do the proposed solution produced
A. the proposed solution produces the required results and produces both
of the optional
desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the optional desired results.
D. the proposed solution does not produce the required results.
#57 - Situation:
You are designing a disaster prevention and recovery plan for your network.
The following table summarizes the current network configuration.
You have done the following:
. Placed all confidential data on the servers
. Placed the servers in a locked room
. Implemented NTFS user-level security on the servers to allow only specific
personnel to access the data
Required results:
You must protect the servers from hardware failure. However, periods of
downtime of less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from
loss.
Optional desired results:
You want to track all accesses to the data files.
You want to put reasonable methods in place to protect network data from
virus corruption.
Proposed solution:
- Connect UPS to each server.
- Set appropriate access-control security on all shared resources.
- Implement disk mirroring for each server.
- Do daily tape backups of the data, and store the tapes in a secure
off-site location.
- Implement virus scanning on all client computers and servers.
- Enable auditing on all shared files.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both
of the optional desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the optional desired results.
D. The proposed solution does not produce the required results.
#58 - Define signal interference from an adjacent wire
a. attenuation
b. crosstalk
c. mumbling
d. beaconing
#59 - Configuration of your client computer:
· SVGA card
· SCSI card, set at IRQ 15
· LPT1
· LPT2
· COM1
· COM2
. PS/2 mouse port
The computer runs Microsoft Windows NT Workstation.
You are installing a token-ring network adapter in the computer. You set it
to use IRQ 3.
Which device could cause IRQ conflicts in the computer?
A. COM1
B. COM2
C. LPT1
D. LPT2
#60 - You install an Ethernet network adapter in a client computer. The
computer's network software is initialized successfully, but the computer is
not able to communicate with other computers on the network. All other
client computers on the network are able to communicate. What is the most
likely cause of the problem?
A. the transceiver setting of the network adapter is incorrect.
B. the IO port address on the network adapter is incorrect.
C. the cable segment is not properly terminated.
D. the packet-size setting is incorrect.
#61 - Situation:
You are designing a NetBIOS naming scheme for all of the servers and client
computers at your location. Within 2 years your company will install a WAN
that will connect all of its networks.
Current Network Configuration for the Entire company
Server
328, Which run Microsoft Windows NT
Server
Client Computers
20,000 which run Microsoft Windows 95
Network
40, each in a different city
WAN connections
None
All users have e-mail to all other users in the
company.
E-mail names
All have 12 characters or fewer
Current Network Configuration for Your Location
Server
10, which run Microsoft Windows NT server
Client Computers
500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all servers
and client computers at your location.
The NetBIOS naming scheme at your location must continue to work after the
WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
Proposed solution:
Assign each server and client computer at all locations a unique 15-digit
hexadecimal number to be used as that computer's NetBIOS name.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both
of the optional desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the
optional desired results.
D. The proposed solution does not produce the required results.
#62 - Situation:
You are designing a NetBIOS naming scheme for all of the servers and client
computers at your location. Within 2 years your company will install a WAN
that will connect all of its networks.
Current Network Configuration for the Entire company
Server
328, Which run Microsoft Windows NT
Server
Client Computers
20,000 which run Microsoft Windows 95
Network
40, each in a different city
WAN connections
None
All users have e-mail to all other users in the
company.
E-mail names
All have 12 characters or fewer
Current Network Configuration for Your Location
Server
10, which run Microsoft Windows NT server
Client Computers
500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all servers
and client computers at your location.
The NetBIOS naming scheme at your location must continue to work after the
WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of 15 characters that
describe the location plus a 4-digit number that is unique to each server.
Assign each client computer a NetBIOS name that corresponds to the e-mail
address of the computer's principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both
of the optional desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the optional desired results.
D. the proposed solution does not produce the required results.
#63 - Situation
You are designing a NetBIOS naming scheme for all of the servers and client
computers at your location. Within 2 years your company will install a WAN
that will connect all of its networks.
Current Network Configuration for the Entire company
Server
328, Which run Microsoft Windows NT
Server
Client Computers
20,000 which run Microsoft Windows 95
Network
40, each in a different city
WAN connections
None
All users have e-mail to all other users in the
company.
E-mail names
All have 12 characters or fewer
Current Network Configuration for Your Location
Server
10, which run Microsoft Windows NT server
Client Computers
500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all servers
and client computers at your location.
The NetBIOS naming scheme at your location must continue to work after the
WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of the first 8 characters of
the server's department name, plus a 5-character location code, plus a
2-digit identifier to distinguish between multiple servers within the
department.
Assign each client computer a NetBIOS name that corresponds to the e-mail
address of the computer's principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both
of the optional desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the optional desired results.
D. The proposed solution does not produce the required results.
#64 - Which device should you use to monitor the amount of network traffic
over time?
A. time domain reflectometer (TDR)
B. cable tracer
C. protocol analyzer
D. medium attachment unit
#65 - Which tool should you use to create a report that logs network
activity?
A. volt-ohmmeter
B. oscilloscope
C. protocol analyzer
D. time domain reflectometer (TDR)
#66 - Your network uses NWLink IPX. Initialization of your client computer's
network software appears to be successful, but your client computer is not
able to access the server. All of the other computers are able to access the
server. What is the most likely cause of the problem?
A. the wrong network-adapter driver is installed in your client
computer.
B. your client computer has insufficient extended memory.
C. the network adapter in your client computer is configured to use the
wrong I/O port
address.
D. the network adapter in your client computer is configured to use the
wrong frame type.
#67 - You connect a client computer to a network that uses NWLink IPX. The
client computer is not able to access any network resources. After
investigation, you decide that hardware is not causing the problem. What
is the most likely cause of the problem?
A. incorrect subnet mask on the client computer
B. incorrect IP address on the client computer
C. incorrect frame type on the client computer
D. corrupted WIN.INI file on the client computer
#68 - Your network includes servers that run Microsoft Windows NT Server,
client computers that run Microsoft MS-DOS, and UNIX client computers. You
add a new server that runs Microsoft Windows NT Server. All of the MS-DOS
computers can access all shared network resources. The UNIX computers can
access all shared network resources except the new server.
What is the most likely cause of the problems
A. faulty network adapters in the UNIX computers
B. incorrect binding order on the server
C. protocol mismatch between the server and the UNIX computers
D. incorrect frame type on the server
#69 - Current network configuration:
Server
27, which run Microsoft Windows NT server
Client Computers
750
Protocols:
NetBEUI, NWLink IPX, TCP/IP
You install a new client computer, which uses NWLink IPX. You are not able
to access some of the shared network resources from this new computer. All
of the other computers on the network are able to access all shared network
resources.
What is the most likely cause of the problem?
A. the subnet-mask setting on the new client computer is incorrect.
B. There is a protocol mismatch between the new client computer and the
inaccessible shared network resources.
C. the NetBIOS names for the new client computer and for the
inaccessible shared network resources are duplicates.
D. There is a cable failure between the new client computer and the
inaccessible shared network resources.
#70 - A client computer on your Ethernet network is not able to access the
server. Initialization of the client computer's network software was
successful. All other client computers are able to access the server. After
investigation, you decide that hardware is not causing the problem.
What is the most likely cause of the problem?
A. There is insufficient extended memory in the affected client
computer.
B. The network adapter in the server is configured to use the wrong
transceiver.
C. the network adapter in the affected client computer is configured to
use the wrong transceiver.
D. An excessive number of collisions is occurring on the media.
#71 - Configuration of 2 of the client computers on your 10BaseT Ethernet
network:
VGA adapter: Default settings
IDE controller: Default settings
Floppy disk drive controller: Default settings
LPT1: Default settings
COM1: Default settings
COM2: Default settings
Ethernet network adapter See settings below:
MAC hardware address: 1 0C805000000
IRQ: 5
IO port address: 300
Transceiver: RJ-45
DMA None
Memory address: None
Neither computer is able to access the network. You run diagnostic tests on
the network adapters in both computers. Configuration of both adapters is
identical:
Which change must you make on both Ethernet network adapters to allow the 2
client computers to access the network?
A. Change the MAC (hardware) addresses to factory settings.
B. Change the IRQ settings to 3.
C. Change the IO port addresses to 320.
D. Change the transceiver types to BNC.
#72 - Network Diagram.
Client computers on your Ethernet network are not able to access the server.
You use a volt-ohmmeter to measure the resistance between the center wire
and the shield on the cable, on the T-connectors, and on the terminators.
You obtain the following resistance readings:
RG-58 A/U coaxial cable: 0 ohms
Both T-connector: ? (Infinity) ohms
Both terminators: 50 ohms
What you do to repair the network?
A. Replace the 50-ohm terminators with 25-ohm terminators.
B. Replace the 50-ohm terminators with 100-ohm terminators.
C. Install replacement T-connectors.
D. Install replacement RG-58 A/U coaxial cable.
#73 - You are the administrator of a 20-computer Ethernet network. Sometimes
1 or 2 computers are not able to access network resources. The problem has
affected every computer at random times. Some of the network cable is RG-58
/U solid-core coaxial cable, and some of the cable is RG-58 A/U
stranded-core coaxial cable. You use a volt-ohmmeter to measure the
resistance between the center wire and the shield on the cables and on the
parts connected to them. You obtain the following readings:
All cables: ? (Infinity) ohms
Both terminators: 50 ohms
All T-connectors: ? (infinity) ohms
What must you do to repair the network?
A. Replace the 5O-ohm terminators with 25-ohm terminators.
B. Replace all RG-58 /U coaxial cables with RG-58 A/U coaxial cables.
C. Replace all cables with RG-62 /U coaxial cables.
D. Replace all T-connectors with new ones.
#74 - User reports slow network response on your 500-computer Ethernet
network. After investigation, you suspect that a network adapter is
generating a continuous and meaningless transmission.
Which device can you use to identify the defective network adapter?
A. protocol analyzer
B. volt-ohmmeter
C. optical time domain reflectometer (OTDR)
D. time domain reflectometer (TDR)
#75 - Situation:
Your company's rapid growth has caused an increase in the number of
computers on your network. There were 300 computers at the beginning of the
year, and there are 1,000 now. Broadcast storms are occurring with
increasing frequency on the network. You want to reduce the number of
broadcast storms. The following table summarizes
your current network configuration.
Server
25, Which run Microsoft Windows NT Server
Client Computers
600 which run Microsoft Windows 95, and
300 Macintosh Computer that run System 7.x
75 UNIX computer
Network Types
10BaseT Ethernet
Protocols
NetBEUI, TCP/IP with DHCP and WINS,
NWLink IPX, AppleTalk
Cable
Category 3 UTP
Brouters
4, with bridging enabled
Required result:
You must reduce the number of broadcast storms by at least 50 percent while
minimizing changes in functionality for the client computers.
Optional desired results:
Minimize hardware costs needed to produce the reduction in broadcast storms.
Minimize ongoing administrative costs after the changes are made.
Allow for continued expansion of the network.
Proposed solution:
Turn off bridging on all of the brouters. Configure all of the computers and
brouters to use only NWLink IPX.
Which results does the proposed solution produce?
A. The proposed solution produces the required result and produces all
of the optional desired results.
B. The proposed solution produces the required result and produces only
1 of the optional desired results.
C. The proposed solution produces the required result but does not
produce any of the optional desired results.
D. The proposed solution does not produce the required result.
#76 - Situation
Configuration of your network:
Servers
9, Which run Microsoft Windows NT Server
Client Computers
200
Network Type
10BaseT Ethernet
Protocol
NetBEUI
Bridges
None
Routers
None
Users on your network report poor network performance. After investigation,
you decide that broadcast storms are causing the problem. What should you do
to resolve the broadcast storms?
A. Segment the network by using a router.
B. Segment the network by using a repeater.
C. Replace NetBEUI with DLC, and then segment the network by using a
bridge.
D. Replace NetBEUI with TCP/IP, and then segment the network by using a
router.
#77 - Your network has 35 client computers and 1 server. The server runs
Microsoft Windows NT Server. Network performance is steadily decreasing as
new client computers are added to the network. You run Performance Monitor
on the server and obtain the following statistics:
Counter Average
% Processor Time: 8
Page Faults/sec: 2
% Disk Time: 25
What should you do to improve network performance?
A. Replace the server with a multiprocessor computer.
B. Install additional RAM in the server.
C. Install disk striping with parity on the server
D. Segment the network by adding another network adapter to the server.
#78 - Situation:
Network monitoring shows that network utilization has grown from 30 percent
to 70 percent of maximum capacity in the past year. You will add 24 client
computers and 1 server within 3 months. You want to reduce network
utilization.
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the
planned additions to the network are implemented. You want to minimize
costs for the project.
Proposed solution:
Change the maximum packet size on all of the computers from 1,514 bytes to
576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable.
Increase TCP window size from 4,096 bytes to 16,384 bytes.
Which results does the proposed solution produce?
A. the proposed solution produces the required result and produces all
of the optional
desired results.
B. the proposed solution produces the required result and produces only
2 of the optional
desired results.
C. The proposed solution produces the required result but does not
produce any of the optional desired results.
D. the proposed solution does not produce the required result.
#79 - Situation:
Network monitoring shows that network utilization has grown from 30 percent
to 70 percent of maximum capacity in the past year. You will add 24 client
computers and 1 server within 3 months. You want to reduce network
utilization. The following table summarizes your current network
configuration.
Servers
3
Client Computers
120 evenly distributed among the 3 servers
Network Type
10BaseT Ethernet
Protocol
TCP/IP
Cable
Category 3 UTP
Routers
None
Bridges
None
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the
planned additions to the network are implemented. You want to minimize
costs for the project.
Proposed solution:
Replace all 10BaseT hubs with 100BaseT hubs. Replace all Category 3 UTP
cable with Category 5 UTP cable.
Replace all 10BaseT network adapters with 100BaseT network adapters.
Which results do the proposed solution produced?
A. The proposed solution produces the required result and produces all
of the optional desired results.
B. The proposed solution produces the required result and produces only
2 of the optional desired results.
C. The proposed solution produces the required result but does not
produce any of the optional desired results.
D. The proposed solution does not produce the required result.
#80 - The Performance Monitor on an NT network gives the following readings:
% Processor: 8
Pages Fault / Sec: 2
Disk %: 25
What would you implement to improve network performance? :
a.add more ram
b.increase processor speed
c.disk striping with parity
d.segment the network
#81 - Match the following definition to the networking term. A high level
networking protocol that provides file sharing services on networks that use
NetBIOS?
(Choose only one)
A. IPX/SPX
B. TCP/IP
C. DLC
D. SLIP
E. PPP
F. NetBEUI
G. SMB
H. RIP
I. AFP
J. NCP
#82 - You add a client computer named Computer2. Computer2 is able to
communicate with some servers, but not others. All client computers on the
network are able to communicate with all servers. What is the problem?
A. Invalid entry on the LMHosts file on Computer2.
B. Invalid entry on the Hosts file on Computer2.
C. Computer2 is not using all appropriate transport protocols.
D. NDIS driver on Computer2 is incorrect version.
#83 - You are creating a peer to peer network that will have 6 computers.
You will run Windows for Workgroups on 3. On the other 3 you will run MS
DOS and MS Net. You want to use the least possible amount of RAM on all 6
computers. Which transport protocol should you install?
A. TCP/IP
B. NetBEUI
C. XNS
D. IPX/SPX
#84 - You are integrating a NetWare server into an MS NT server network.
You install TCP/IP on all computers on
the network including the NetWare server. The NT server cannot connect to
the NetWare server. What additional
protocol should you install on the NT server? (And the choices are....)
A. NWLink IPX
B. DLC
C. NCP
D. SMB
#85 - You manage 4 NT servers directly connected to the internet. All 4 are
configured in a single NT domain. You manage the 4 servers from another NT
server located in your office. The server in your office connects to the
internet using dial-up connection. You want to use Server Manager and User
Manager to manage the 4 servers. What should you install and configure to
resolve the computer names of the servers? (Here are your choices)
A. DNS server on internet.
B. WINS server in your office with only dynamic mapping.
C. DHCP server on the internet.
D. LMHosts file on the server in your office.
#86 - You have a Dec Alpha system running Windows NT. The NT has 2
partitions, one is Active. What is the best security for protecting the
data.
1. NTFS
2. NTFS with FAT
3. FAT with NTFS
4. All FAT.