Visit http://www.LearnQuick.Com

Everyone,

Here is my personal dump. I'm going to refer to the list of questions (#1-#86) listed after the dotted line. These questions are a compilation of Dump questions from this site. I only listed complete (or mostly complete) questions with the possible answers.

The following questions from my list are of special interest. KnowhatImean?

#1, #2, #3, #5, #6, #7, #13, #22 (#22 read a little different, but the logic was the same), #23 (this question also read a little different), #25, #26, #27, #66, #81 

I had several Router/Gateway questions, there are so many variations I couldn't tell you what they were exactly. The questions I had were always either a Router or Gateway and never a hub, a repeater, and a Brouter was never an option. The router questions mentioned using TCP/IP as the only protocol and the gateway questions always mentioned something regarding some type of translation.

Absolutely nothing came close to referring to the OSI model. Nothing. Zip.

Zilch. Nada... you get the picture.

Another question not in my list below-

You want to connect 9 Ethernet LANs that use UTP on 9 floors of an office building. What backbone do you use. You want it to be inexpensive. (The question did not mention if it was CAT 5 or CAT 3 wiring) a. fiber optic

b. UTP

c. STP1

d. Human Nerve Fibers (I forgot what it really was) A Coaxial backbone was not an option.

 

If you install a Net Card, what can conflict (choose all that apply)

a. COM2

b. LPT1

c. Mouse

d. Sound Card

 

One click and drag question. The question was something like- You are setting up a network. You want your computers to operate as efficiently as possible.   Then they gave you the options of-

a. Application Server

b. File Server

c. Print Server

d. Client computer

and you match these with.... (these are not exact specs, but they are four distinctly different systems)

1. 450Mhz 128meg 12gig HD

2. 300mhz 64meg 4.2HD

3. 200mhz 32meg 3.1HD

4. 100mhz 16meg 1.2HD

(If you wanted to, you could make everything a File server, or a client, etc.)

Here comes my massive collection of questions - these were all found on this site. I just cleaned up some things and weeded out some others for ease of reading. Hope this helps. Remember, questions #1, #2, #3, #5, #6, #7, #13, #22, #23, #25, #26, #27, #66, #81 are of special interest.

 

--------------------------------------------------------------------------------------------------------------------------------------

#1 - You have a DHCP server and WINS server. Your are using TCP/IP You can

communicate with the network using the IP address, but not when using the

servers name.

What do you examine first?

A.DHCP server.

B.WINS server

C.Gateway

D.Router

 

#2 - You want to monitor and manage hubs, bridges and routers on the

network.

What do you use?

A.Performace Monitor

B.SNMP implementation

C.Protocol analyzer

D.TDR

 

 

#3 - You have a network using NetBEUI and TCP/IP. The server and client are

in different

subnets. The client can PING the server, but cannot access the server using

its

name.

A.Client and the server have the same IP address

B.Server has the wrong subnet mask.

C.Server's name not registered with the name server.

D.Client's name not registered with the name server.

 

#4 - Large network with 2000 users users notice that at various times in the

day network

time outs occur.

What is the reason?

A.Power fluctuations.

B.Malfunctioning net adapter on the router.

C.Terminated segement.

D.Logging of users.

#5 - You have a network that uses T1 and is connected to the internet. Which

backup

connection could you use to support e-mail in the event of failure.

A.T3

B.ATM

C.ISDN

D.?

 

#6 - Which data link communications protocol provides connections between

computers via dial-up telephone lines? (Choose all that apply)

A. SLIP.

B. PPP.

(Yes, only two options are given)

#7 - TCP/IP network, want to track how many users who connect to 15 NT

server machines and 5 routers, what utility do you use?

a.Performance Monitor

b.Server Manager

c.SNMP

d. Ipconfig utility

 

#8 - Network with NT server, win95 client, macintosh clients. Network is

using brouters and TCP/IP, Appletalk, and NetBEUI.

require: reduce broadcast storm and network trafffic 50%.

optional: minimize cost.

minimize administrative cost.

allow network continue to expand.

propose: Turn off bridging on brouter. Configure win95 client to use TCP/IP.

Configure all servers and brouters to use TCP/IP and Appletalk.

a.meet required and all optional.

b.meet required and only 1 optional.

c.meet required only.

d.doesn't meet any.

 

 

#9 - Which network topology provides guaranteed access for each computer on

the network?

A. star.

B. bus.

C. ring.

D. linear.

 

#10 - Your company's network uses a 100Mbps backbone. Network traffic is

nearly at capacity. Users report that network time is slow. You are

planning to upgrade the network. Which WAN technology should you implement?

A. Ethernet

B. token-ring.

C. FDDI.

D. X.25.

E. ATM.

 

#11 - You manage a network that has 1 NetWare server and 25 Microsoft

Windows for Workgroup computers. The NetWare server and the client

computers are running IPX/SPX. The NetWare server runs your database. Which

type of networking is in use on this network? (Choose 2).

A. collaborative computing.

B. Microsoft NT Domain.

C. client/server.

D. peer to peer.

 

#12 - You want to manage Microsoft Windows NT server computers that are

located on remote subnet. All of these servers are configured in a single

Windows NT domain. You will manage these servers from another Windows NT

server computer that is located in your office. You want to use User

Manager and server Manager to manage the remote servers. What should you

install and configure to resolve the computer names of the servers? (Choose

2).

A. DNS server.

B. DHCP server.

C. WINS server.

D. LMHOSTS file.

E. RAS server.

#13 - You have Microsoft Windows Workstation 4.0 computer that runs TCP/IP.

This computer connects to the Internet by using a modem and a dial-up

connection. You want to connect your computer to an Ethernet network. You

install a network adapter card and connect the network adapter to the

physical network. Which type of network adapter driver must you install?

A. NDIS 2.0.

B. NDIS 3.0.

C. NDIS 3.1.

D. ODI.

 

#14 - Which 2 protocols use connection-oriented communication?

A. IPX

B. SPX

C. TCP

D. IP

E. UDP

 

#15 -What is a benefit of installing an application server to store and

manage a database?

A. An application server centrally manages all user accounts.

B. An application server stores more data than a file-and-print server does.

C. An application server transfers only the results of database queries to

client computers.

D. An application server transfers the entire database to client computers.

 

#16 - What is a benefit of using an application server instead of a

file-and-print server?

A. An application server retrieves data and sends data to client computers

more efficiently than a file-and-print server does.

B. An application server manages file and record locking more efficiently

than a file-and-print server does.

C. An application server manages user access to network resources.

D. An application server distributes processing among all client computers

on the network more efficiently than a file-and-print server does.

 

#17 - You are assigning a NetBIOS name to 10 of the client computers on your

network. Which is a valid NetBIOS name for this computer?

A. The name of a share on 1 of the network servers.

B. The computer name 1 of the network servers.

C. The name of a domain on the network.

D. The name of a workgroup on the network.

 

#18 - Which WAN faster than 100Mbps?

A. ISDN Basic rate interface.

B. X.25.

C. T1.

D. ATM.

 

#19 - Which device can you use to identify the defective network adapter?

A. protocol analyzer.

B. volt-ohmmeter.

C. optical time domain reflectometer (OTDR).

D. time domain reflectometer (TDR).

 

#20 - What is a characteristic of connection-oriented communication?

A. It provides fast but unreliable delivery of datagrams.

B. It provides assurance of packet delivery.

C. It uses store-and-forward techniques to move datagrams between computers.

D. It uses message-oriented communication for processing e-mail.

 

#21 - What must you ensure that a NetBIOS name does not duplicated?

A. Computer name on the same network.

B. Domain name on the same network.

C. Workgroup name on the same network.

D. Share name on the same network.

#22 - You are designing a peer-to-peer network that consists of 5 Microsoft

Windows 95 computers. Which protocol should you use?

A. DLC.

B. NFS.

C. NWLink IPX.

D. XNS.

 

#23 -What is a benefit of both NDIS and ODI?

A. They allow network adapters to be used in any compliant computer.

B. They allow network adapters to transmit information over a greater

distance than non-compliant network adapters can.

C. They allow network adapters to communicate with other compliant network

adapters.

D. They allow network adapters to be independent of any particular transport

protocol.

 

#24 - You want to connect your Ethernet and token-ring networks. Both

networks use NWLink IPX. You want to use IPX addressing to limit the amount

of traffic between the 2 networks. Which device should you use?

A. repeater.

B. bridge.

C. router.

D. gateway.

#25 -You are designing a security plan for your network. The following table

summarizes the current network

configuration.

Server: 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1

is the BDC.

Client Computers: 100, which run Microsoft Windows 95

Network Type: 10BaseT Ethernet

Required result:

You must have centralized control of access to shared resources.

Optional desired results:

You want to track all access and attempted access to shared resources.

You want to track attempts to guess user passwords.

You want to implement a method to protect user accounts from

password-breaking programs.

Proposed solution:

Implement NTFS with user-level security on all servers. Set appropriate

access-control security on all shared resources. Require users to change

their passwords every 40 days. Implement disk striping with parity on all

servers. Perform daily tape backups, and store tapes in a secure off-site

location.

Which results does the proposed solution produce?

A. The proposed solution produces the required result and produces all of

the optional desired results.

B. The proposed solution produces the required result and produces only 1 of

the optional desired results.

C. The proposed solution produces the required result but does not produce

any of the optional desired results.

D. The proposed solution does not produce the required result.

 

#26 - Network monitoring shows that network utilization has grown from 30

percent to 70 percent of maximum capacity in the past year. You will add 24

client computers and 1 server within 3 months. You want to reduce network

utilization.

Required result:

You must reduce network utilization by 50 percent.

Optional desired results:

You want to allow for continued network growth.

You want to maintain the new network utilization levels even after the

planned additions to the network are implemented.

You want to minimize costs for the project.

Proposed solution:

Change the maximum packet size on all of the computers from 1,514 bytes to

576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable.

Increase TCP window size from 4,096 bytes to 16,384 bytes. Which results

does the proposed solution produce?

A. The proposed solution produces the required result and produces all of

the optional desired results.

B. The proposed solution produces the required result and produces only 2 of

the optional desired results.

C. The proposed solution produces the required result but does not produce

any of the optional desired results.

D. The proposed solution does not produce the required result.

 

#27 - What can enable client computers to browse NetBIOS names on all

subnets of the network?

A. WINS server.

B. DHCP server.

C. router.

D. NetBIOS broadcast.

 

#28 - You are designing a 100-Mbps network. Which media should you use?

A. RG-58 A/U coaxial cable

B. spread-spectrum radio

C. Category 5 UTP cable

D. Type 1 STP cable

#29 - You connect a client computer to a network that uses NWLink IPX. The

client computer is not able to access any network resources. After

investigation, you decide that hardware is not causing the problem. What is

the most likely cause of the problem?

A. incorrect subnet mask on the client computer

B. incorrect IP address on the client computer

C. incorrect frame type on the client computer

D. corrupted WIN.INI file on the client computer

 

#30 - What is the best way to create report that logs network activity.

a) Volt-ohmmeter

b) Oscilloscope

c) Protocol analyzer

d) TDR

 

#31 - 3 Windows NT Servers and 75 Clients using NetBEUI protocol. You want

to communicate these computers with UNIX that uses NFS file system. You

don't want to install new software. What is the best way to solve this

problem?

a) Bridge

b) Brouter

c) Router

d) Gateway

 

#32 - You installed a new network adaptor card. And supplied network

software initialized successfully. But you can not communicate with other

computers even though other computers operating successfully. What's the

reason?

a) Transceiver setting is incorrect

b) I/O port address is incorrect

c) Cable segment is not properly terminated

d) Packet size setting is incorrect

 

#33 - You suspect your network has been experiencing Broadcast storms.

Which

indicators would indicate broadcast storms: (choose all that apply)

a] network time-outs

b] bad ip address errors

c] network utilization is 100% for periods of time

d] can't remember something ridiculous

 

#34 - What upper level protocol is used for NetBios file services?

a]nwlink

b]tcp

d]decNet

e]ipx

f]spx

g]netBeui

h]smb

i]ncp

 

#35 - Your network is experiencong slow downs. You want to speed up the

network. You want to help the PDC out by adding devices to split the

functions of it: drag the devices on the left hand side to the ? mark:

 

<<...>>

 

 

#36 -What must you specify when you want to copy a file from 1 computer to

another by using a UNC name? (Choose 2.)

A. share name

B. domain name

C. computer name

D. workgroup name

 

#37 - What is a characteristic of a client/server networks?

A. Any computer can make its resources available to any other computer

on the network.

B. Dumb terminals are connected to a central host computer that performs

all processing.

C. Any computer on the network can be both a client and a server.

D. Client computers access a server that performs back-end services.

#38 -What is a characteristic of connection-oriented communication?

A. It provides fast but unreliable delivery of datagrams.

B. It provides assurance of packet delivery.

C. It uses store-and-forward techniques to move datagrams between

computers.

D. It uses message-oriented communication for processing e-mail.

 

#39 - This device functions at or above the Transport layer of the OSI

model. It acts as a translator between 2 computers that use different

protocols or data formats.

A. gateway

B. bridge

C. router

D. repeater

 

#40 - What is a characteristic of the IEEE 802.3 10BaseT standard?

A. It specifies RJ-11 connectors at the ends of each cable.

B. It specifies UTP cable.

C. It specifies BNC T-connectors for connecting computers to cables.

D. It specifies 50-ohm terminators at the ends of each cable.

 

#41 - What is a characteristic of the IEEE 802.3 10Base2 standard?

A. It specifies Category 3 DIP cable with a maximum cable length of 100

meters.

B. It specifies RG-11 C/U coaxial cable with a maximum cable length of

500 meters.

C. It specifies BNC T-connectors for connecting computers to cables.

D. It specifies RJ-45 connectors at the ends of each cable.

 

#42 - What is a purpose of NDIS?

A. to allow any compliant transport protocol to pass data to any

compliant network adapter

B. to allow any compliant transport protocol to pass data to any

compliant network redirector

C. to define the common signaling scheme that all vendors' adapters use

when transmitting packets

D. to define the voltage levels that must be applied to the pinouts on

the network adapter's 15 pin AUI connector

#43 - You want to install a 100-Mbps backbone network that will connect 5

existing networks. Which media should you use?

A. Category 3 UP cable

B. Category 4 UTP cable

C. Fiber-optic cable

D. RG-58 A/U coaxial cable

 

#44 - You are designing a 100-Mbps Ethernet network for a building that has

existing UTP cable. You test the existing cable and decide that it meets

Category 3 specifications. Which media should you use?

A. the existing cable

B. new Type 1 STP cable

C. new Category 4 UTP cable

D. new Category 5 UTP cable

 

#45 - You are designing a 100-Mbps network. Which media should you use?

A. RG-58 A/U coaxial cable

B. spread-spectrum radio

C. Category 5 UTP cable

D. Type 1 STP cable

 

#46 - Which protocol is routable? (Choose 3.)

A. AppleTalk

B. TCP/IP

C. NWLink IPX

D. NetBEUI

E. DLC

#47 - You want to segment your 200-node network into 3 subnets. The network

uses TCP/IP.

Which device should you use?

 

A. repeater

B. bridge

C. router

D. gateway

 

#48 - Your network has 250 client computers. The network uses both TCP/IP

and NetBEUI. You want to segment the network into 3 subnets. You want to

allow all of the computers to use both of the protocols to communicate with

computers on all 3 subnets.

Which device should you use?

A. repeater

B. brouter

C. router

D. gateway

 

#49 - Which networking device is used to translate protocols?

A. bridge

B. hub

C. gateway

D. repeater

 

#50 - Your l0BaseT Ethernet network uses NetBEUI. Users of your client

computers need to access an IBM 3090 mainframe computer by using a 3270

terminal-emulation program.

Which device must you install?

A. bridge

B. gateway

C. router

D. brouter

 

#51 - You want to connect 2 computers by using l0BaseT Ethernet cable. The

computers are located more than 300 meters apart.

Which device should you use?

A. repeater

B. amplifier

C. multiplexer

D. gateway

 

#52 - You want your WAN to allow simultaneous transmission of voice, video,

and data. Which WAN connection

service should you use?

A. 56-Kbps digital line

B. X.25

C. Frame relay

D. ATM

 

#53 - Which type of WAN connection service is intended to replace standard

analog telephone service?

A. ISDN basic rate interface

B. X.25

C. Frame relay

D. 2.048-Mbps digital line

 

#54 - You are designing a WAN that uses X.25. Which device should you

include in the design?

 

A. gateway

B. packet assembler-disassembler (PAD)

C. multiple-layer interface driver (MLID)

D. multiplexer

 

#55 - Your company has an Ethernet network with 750 computers. The company

is migrating to servers that run Microsoft Windows NT Server and to client

computers that run Microsoft Windows 95. You want to protect sensitive

network data, with a minimal amount of administration. What should you

include in your security plan?

A. peer-to-peer file sharing, with user-level security on all shared

resources

B. peer-to-peer file sharing, with resource-password security on all

shared resources

C. centralized administration of user accounts, with user-level security

on all shared resources

D. centralized administration of user accounts, with resource-password

security on all shared resources

 

#56 - Situation:

You are designing a disaster prevention and recovery plan for your network.

The following table summarizes the current network configuration.

 

Server

2 total - both run Microsoft Windows NT

server, 1 is the PDC and 1 is the BDC

Client Computers

100, which run Microsoft Windows 95

Network Type

10BaseT Ethernet

You have done the following:

. Placed all confidential data on the servers

. Placed the servers in a locked room

. Implemented NTFS user-level security on the servers to allow only specific

personnel to access the data

Required results:

You must protect the servers from hardware failure. However, periods of

downtime of less than 2 hours are acceptable.

You must have reasonable controls in place to protect network data from loss

 

Optional desired results:

You want to track all accesses to the data files.

You want to put reasonable methods in place to protect network data from

virus corruption.

Proposed solution:

Connect UPS to each server.

Set appropriate access-control security on all shared resources.

Implement disk striping with parity for each server's hard disks.

Do daily tape backups of the data, and store the tapes in a secure off-site

location.

Implement virus scanning on all client computers and servers.

Which results do the proposed solution produced

A. the proposed solution produces the required results and produces both

of the optional

desired results.

B. The proposed solution produces the required results and produces only

1 of the optional desired results.

C. The proposed solution produces the required results but does not

produce either of the optional desired results.

D. the proposed solution does not produce the required results.

#57 - Situation:

You are designing a disaster prevention and recovery plan for your network.

The following table summarizes the current network configuration.

You have done the following:

. Placed all confidential data on the servers

. Placed the servers in a locked room

. Implemented NTFS user-level security on the servers to allow only specific

personnel to access the data

Required results:

You must protect the servers from hardware failure. However, periods of

downtime of less than 2 hours are acceptable.

You must have reasonable controls in place to protect network data from

loss.

Optional desired results:

You want to track all accesses to the data files.

You want to put reasonable methods in place to protect network data from

virus corruption.

 

Proposed solution:

- Connect UPS to each server.

- Set appropriate access-control security on all shared resources.

- Implement disk mirroring for each server.

- Do daily tape backups of the data, and store the tapes in a secure

off-site location.

- Implement virus scanning on all client computers and servers.

- Enable auditing on all shared files.

Which results does the proposed solution produce?

A. The proposed solution produces the required results and produces both

of the optional desired results.

B. The proposed solution produces the required results and produces only

1 of the optional desired results.

C. The proposed solution produces the required results but does not

produce either of the optional desired results.

D. The proposed solution does not produce the required results.

 

#58 - Define signal interference from an adjacent wire

a. attenuation

b. crosstalk

c. mumbling

d. beaconing

#59 - Configuration of your client computer:

· SVGA card

· SCSI card, set at IRQ 15

· LPT1

· LPT2

· COM1

· COM2

. PS/2 mouse port

The computer runs Microsoft Windows NT Workstation.

You are installing a token-ring network adapter in the computer. You set it

to use IRQ 3.

Which device could cause IRQ conflicts in the computer?

A. COM1

B. COM2

C. LPT1

D. LPT2

 

#60 - You install an Ethernet network adapter in a client computer. The

computer's network software is initialized successfully, but the computer is

not able to communicate with other computers on the network. All other

client computers on the network are able to communicate. What is the most

likely cause of the problem?

A. the transceiver setting of the network adapter is incorrect.

B. the IO port address on the network adapter is incorrect.

C. the cable segment is not properly terminated.

D. the packet-size setting is incorrect.

 

#61 - Situation:

You are designing a NetBIOS naming scheme for all of the servers and client

computers at your location. Within 2 years your company will install a WAN

that will connect all of its networks.

Current Network Configuration for the Entire company

 

Server

328, Which run Microsoft Windows NT

Server

Client Computers

20,000 which run Microsoft Windows 95

Network

40, each in a different city

WAN connections

None

E-mail

All users have e-mail to all other users in the

company.

E-mail names

All have 12 characters or fewer

 

Current Network Configuration for Your Location

Server

10, which run Microsoft Windows NT server

Client Computers

500, which run Microsoft Windows 95

Required results:

You must successfully implement the NetBIOS naming scheme for all servers

and client computers at your location.

The NetBIOS naming scheme at your location must continue to work after the

WAN is connected.

 

Optional desired results:

You want the NetBIOS name for each server to describe the server's

department or function.

You want each client computer's NetBIOS name to describe the computer's

primary user or function.

Proposed solution:

Assign each server and client computer at all locations a unique 15-digit

hexadecimal number to be used as that computer's NetBIOS name.

 

Which results does the proposed solution produce?

A. The proposed solution produces the required results and produces both

of the optional desired results.

B. The proposed solution produces the required results and produces only

1 of the optional desired results.

C. The proposed solution produces the required results but does not

produce either of the

optional desired results.

D. The proposed solution does not produce the required results.

 

#62 - Situation:

You are designing a NetBIOS naming scheme for all of the servers and client

computers at your location. Within 2 years your company will install a WAN

that will connect all of its networks.

 

Current Network Configuration for the Entire company

Server

328, Which run Microsoft Windows NT

Server

Client Computers

20,000 which run Microsoft Windows 95

Network

40, each in a different city

WAN connections

None

E-mail

All users have e-mail to all other users in the

company.

E-mail names

All have 12 characters or fewer

Current Network Configuration for Your Location

Server

10, which run Microsoft Windows NT server

Client Computers

500, which run Microsoft Windows 95

Required results:

You must successfully implement the NetBIOS naming scheme for all servers

and client computers at your location.

The NetBIOS naming scheme at your location must continue to work after the

WAN is connected.

 

Optional desired results:

You want the NetBIOS name for each server to describe the server's

department or function.

You want each client computer's NetBIOS name to describe the computer's

primary user or function.

 

Proposed solution:

Assign each server a NetBIOS name that consists of 15 characters that

describe the location plus a 4-digit number that is unique to each server.

Assign each client computer a NetBIOS name that corresponds to the e-mail

address of the computer's principal user.

Which results does the proposed solution produce?

A. The proposed solution produces the required results and produces both

of the optional desired results.

B. The proposed solution produces the required results and produces only

1 of the optional desired results.

C. The proposed solution produces the required results but does not

produce either of the optional desired results.

D. the proposed solution does not produce the required results.

 

#63 - Situation

You are designing a NetBIOS naming scheme for all of the servers and client

computers at your location. Within 2 years your company will install a WAN

that will connect all of its networks.

Current Network Configuration for the Entire company

Server

328, Which run Microsoft Windows NT

Server

Client Computers

20,000 which run Microsoft Windows 95

Network

40, each in a different city

WAN connections

None

E-mail

All users have e-mail to all other users in the

company.

E-mail names

All have 12 characters or fewer

Current Network Configuration for Your Location

Server

10, which run Microsoft Windows NT server

Client Computers

500, which run Microsoft Windows 95

Required results:

You must successfully implement the NetBIOS naming scheme for all servers

and client computers at your location.

The NetBIOS naming scheme at your location must continue to work after the

WAN is connected.

Optional desired results:

You want the NetBIOS name for each server to describe the server's

department or function.

You want each client computer's NetBIOS name to describe the computer's

primary user or function.

Proposed solution:

Assign each server a NetBIOS name that consists of the first 8 characters of

the server's department name, plus a 5-character location code, plus a

2-digit identifier to distinguish between multiple servers within the

department.

Assign each client computer a NetBIOS name that corresponds to the e-mail

address of the computer's principal user.

 

Which results does the proposed solution produce?

A. The proposed solution produces the required results and produces both

of the optional desired results.

B. The proposed solution produces the required results and produces only

1 of the optional desired results.

C. The proposed solution produces the required results but does not

produce either of the optional desired results.

D. The proposed solution does not produce the required results.

 

#64 - Which device should you use to monitor the amount of network traffic

over time?

 

A. time domain reflectometer (TDR)

B. cable tracer

C. protocol analyzer

D. medium attachment unit

#65 - Which tool should you use to create a report that logs network

activity?

A. volt-ohmmeter

B. oscilloscope

C. protocol analyzer

D. time domain reflectometer (TDR)

 

#66 - Your network uses NWLink IPX. Initialization of your client computer's

network software appears to be successful, but your client computer is not

able to access the server. All of the other computers are able to access the

server. What is the most likely cause of the problem?

 

A. the wrong network-adapter driver is installed in your client

computer.

B. your client computer has insufficient extended memory.

C. the network adapter in your client computer is configured to use the

wrong I/O port

address.

D. the network adapter in your client computer is configured to use the

wrong frame type.

 

#67 - You connect a client computer to a network that uses NWLink IPX. The

client computer is not able to access any network resources. After

investigation, you decide that hardware is not causing the problem. What

is the most likely cause of the problem?

A. incorrect subnet mask on the client computer

B. incorrect IP address on the client computer

C. incorrect frame type on the client computer

D. corrupted WIN.INI file on the client computer

 

#68 - Your network includes servers that run Microsoft Windows NT Server,

client computers that run Microsoft MS-DOS, and UNIX client computers. You

add a new server that runs Microsoft Windows NT Server. All of the MS-DOS

computers can access all shared network resources. The UNIX computers can

access all shared network resources except the new server.

What is the most likely cause of the problems

A. faulty network adapters in the UNIX computers

B. incorrect binding order on the server

C. protocol mismatch between the server and the UNIX computers

D. incorrect frame type on the server

 

#69 - Current network configuration:

 

Server

27, which run Microsoft Windows NT server

Client Computers

750

Protocols:

NetBEUI, NWLink IPX, TCP/IP

You install a new client computer, which uses NWLink IPX. You are not able

to access some of the shared network resources from this new computer. All

of the other computers on the network are able to access all shared network

resources.

What is the most likely cause of the problem?

A. the subnet-mask setting on the new client computer is incorrect.

B. There is a protocol mismatch between the new client computer and the

inaccessible shared network resources.

C. the NetBIOS names for the new client computer and for the

inaccessible shared network resources are duplicates.

D. There is a cable failure between the new client computer and the

inaccessible shared network resources.

 

#70 - A client computer on your Ethernet network is not able to access the

server. Initialization of the client computer's network software was

successful. All other client computers are able to access the server. After

investigation, you decide that hardware is not causing the problem.

What is the most likely cause of the problem?

A. There is insufficient extended memory in the affected client

computer.

B. The network adapter in the server is configured to use the wrong

transceiver.

C. the network adapter in the affected client computer is configured to

use the wrong transceiver.

D. An excessive number of collisions is occurring on the media.

 

#71 - Configuration of 2 of the client computers on your 10BaseT Ethernet

network:

VGA adapter: Default settings

IDE controller: Default settings

Floppy disk drive controller: Default settings

LPT1: Default settings

COM1: Default settings

COM2: Default settings

Ethernet network adapter See settings below:

MAC hardware address: 1 0C805000000

IRQ: 5

IO port address: 300

Transceiver: RJ-45

DMA None

Memory address: None

 

Neither computer is able to access the network. You run diagnostic tests on

the network adapters in both computers. Configuration of both adapters is

identical:

Which change must you make on both Ethernet network adapters to allow the 2

client computers to access the network?

A. Change the MAC (hardware) addresses to factory settings.

B. Change the IRQ settings to 3.

C. Change the IO port addresses to 320.

D. Change the transceiver types to BNC.

 

#72 - Network Diagram.

 

Client computers on your Ethernet network are not able to access the server.

You use a volt-ohmmeter to measure the resistance between the center wire

and the shield on the cable, on the T-connectors, and on the terminators.

You obtain the following resistance readings:

RG-58 A/U coaxial cable: 0 ohms

Both T-connector: ? (Infinity) ohms

Both terminators: 50 ohms

What you do to repair the network?

A. Replace the 50-ohm terminators with 25-ohm terminators.

B. Replace the 50-ohm terminators with 100-ohm terminators.

C. Install replacement T-connectors.

D. Install replacement RG-58 A/U coaxial cable.

 

#73 - You are the administrator of a 20-computer Ethernet network. Sometimes

1 or 2 computers are not able to access network resources. The problem has

affected every computer at random times. Some of the network cable is RG-58

/U solid-core coaxial cable, and some of the cable is RG-58 A/U

stranded-core coaxial cable. You use a volt-ohmmeter to measure the

resistance between the center wire and the shield on the cables and on the

parts connected to them. You obtain the following readings:

All cables: ? (Infinity) ohms

Both terminators: 50 ohms

All T-connectors: ? (infinity) ohms

What must you do to repair the network?

A. Replace the 5O-ohm terminators with 25-ohm terminators.

B. Replace all RG-58 /U coaxial cables with RG-58 A/U coaxial cables.

C. Replace all cables with RG-62 /U coaxial cables.

D. Replace all T-connectors with new ones.

 

#74 - User reports slow network response on your 500-computer Ethernet

network. After investigation, you suspect that a network adapter is

generating a continuous and meaningless transmission.

Which device can you use to identify the defective network adapter?

A. protocol analyzer

B. volt-ohmmeter

C. optical time domain reflectometer (OTDR)

D. time domain reflectometer (TDR)

 

#75 - Situation:

Your company's rapid growth has caused an increase in the number of

computers on your network. There were 300 computers at the beginning of the

year, and there are 1,000 now. Broadcast storms are occurring with

increasing frequency on the network. You want to reduce the number of

broadcast storms. The following table summarizes

your current network configuration.

 

Server

25, Which run Microsoft Windows NT Server

Client Computers

600 which run Microsoft Windows 95, and

300 Macintosh Computer that run System 7.x

75 UNIX computer

Network Types

10BaseT Ethernet

Protocols

NetBEUI, TCP/IP with DHCP and WINS,

NWLink IPX, AppleTalk

Cable

Category 3 UTP

Brouters

4, with bridging enabled

Required result:

You must reduce the number of broadcast storms by at least 50 percent while

minimizing changes in functionality for the client computers.

 

Optional desired results:

Minimize hardware costs needed to produce the reduction in broadcast storms.

Minimize ongoing administrative costs after the changes are made.

Allow for continued expansion of the network.

Proposed solution:

Turn off bridging on all of the brouters. Configure all of the computers and

brouters to use only NWLink IPX.

Which results does the proposed solution produce?

A. The proposed solution produces the required result and produces all

of the optional desired results.

B. The proposed solution produces the required result and produces only

1 of the optional desired results.

C. The proposed solution produces the required result but does not

produce any of the optional desired results.

D. The proposed solution does not produce the required result.

#76 - Situation

Configuration of your network:

Servers

9, Which run Microsoft Windows NT Server

Client Computers

200

Network Type

10BaseT Ethernet

Protocol

NetBEUI

Bridges

None

Routers

None

 

Users on your network report poor network performance. After investigation,

you decide that broadcast storms are causing the problem. What should you do

to resolve the broadcast storms?

A. Segment the network by using a router.

B. Segment the network by using a repeater.

C. Replace NetBEUI with DLC, and then segment the network by using a

bridge.

D. Replace NetBEUI with TCP/IP, and then segment the network by using a

router.

 

#77 - Your network has 35 client computers and 1 server. The server runs

Microsoft Windows NT Server. Network performance is steadily decreasing as

new client computers are added to the network. You run Performance Monitor

on the server and obtain the following statistics:

Counter Average

% Processor Time: 8

Page Faults/sec: 2

% Disk Time: 25

What should you do to improve network performance?

A. Replace the server with a multiprocessor computer.

B. Install additional RAM in the server.

C. Install disk striping with parity on the server

D. Segment the network by adding another network adapter to the server.

 

#78 - Situation:

Network monitoring shows that network utilization has grown from 30 percent

to 70 percent of maximum capacity in the past year. You will add 24 client

computers and 1 server within 3 months. You want to reduce network

utilization.

 

Required result:

You must reduce network utilization by 50 percent.

 

Optional desired results:

You want to allow for continued network growth.

You want to maintain the new network utilization levels even after the

planned additions to the network are implemented. You want to minimize

costs for the project.

 

Proposed solution:

Change the maximum packet size on all of the computers from 1,514 bytes to

576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable.

Increase TCP window size from 4,096 bytes to 16,384 bytes.

 

Which results does the proposed solution produce?

A. the proposed solution produces the required result and produces all

of the optional

desired results.

B. the proposed solution produces the required result and produces only

2 of the optional

desired results.

C. The proposed solution produces the required result but does not

produce any of the optional desired results.

D. the proposed solution does not produce the required result.

 

#79 - Situation:

Network monitoring shows that network utilization has grown from 30 percent

to 70 percent of maximum capacity in the past year. You will add 24 client

computers and 1 server within 3 months. You want to reduce network

utilization. The following table summarizes your current network

configuration.

 

Servers

3

Client Computers

120 evenly distributed among the 3 servers

Network Type

10BaseT Ethernet

Protocol

TCP/IP

Cable

Category 3 UTP

Routers

None

Bridges

None

 

Required result:

You must reduce network utilization by 50 percent.

 

Optional desired results:

You want to allow for continued network growth.

You want to maintain the new network utilization levels even after the

planned additions to the network are implemented. You want to minimize

costs for the project.

 

Proposed solution:

Replace all 10BaseT hubs with 100BaseT hubs. Replace all Category 3 UTP

cable with Category 5 UTP cable.

Replace all 10BaseT network adapters with 100BaseT network adapters.

Which results do the proposed solution produced?

A. The proposed solution produces the required result and produces all

of the optional desired results.

B. The proposed solution produces the required result and produces only

2 of the optional desired results.

C. The proposed solution produces the required result but does not

produce any of the optional desired results.

D. The proposed solution does not produce the required result.

#80 - The Performance Monitor on an NT network gives the following readings:

% Processor: 8

Pages Fault / Sec: 2

Disk %: 25

What would you implement to improve network performance? :

a.add more ram

b.increase processor speed

c.disk striping with parity

d.segment the network

 

#81 - Match the following definition to the networking term. A high level

networking protocol that provides file sharing services on networks that use

NetBIOS?

(Choose only one)

A. IPX/SPX

B. TCP/IP

C. DLC

D. SLIP

E. PPP

F. NetBEUI

G. SMB

H. RIP

I. AFP

J. NCP

 

#82 - You add a client computer named Computer2. Computer2 is able to

communicate with some servers, but not others. All client computers on the

network are able to communicate with all servers. What is the problem?

A. Invalid entry on the LMHosts file on Computer2.

B. Invalid entry on the Hosts file on Computer2.

C. Computer2 is not using all appropriate transport protocols.

D. NDIS driver on Computer2 is incorrect version.

 

#83 - You are creating a peer to peer network that will have 6 computers.

You will run Windows for Workgroups on 3. On the other 3 you will run MS

DOS and MS Net. You want to use the least possible amount of RAM on all 6

computers. Which transport protocol should you install?

A. TCP/IP

B. NetBEUI

C. XNS

D. IPX/SPX

 

#84 - You are integrating a NetWare server into an MS NT server network.

You install TCP/IP on all computers on

the network including the NetWare server. The NT server cannot connect to

the NetWare server. What additional

protocol should you install on the NT server? (And the choices are....)

A. NWLink IPX

B. DLC

C. NCP

D. SMB

 

#85 - You manage 4 NT servers directly connected to the internet. All 4 are

configured in a single NT domain. You manage the 4 servers from another NT

server located in your office. The server in your office connects to the

internet using dial-up connection. You want to use Server Manager and User

Manager to manage the 4 servers. What should you install and configure to

resolve the computer names of the servers? (Here are your choices)

A. DNS server on internet.

B. WINS server in your office with only dynamic mapping.

C. DHCP server on the internet.

D. LMHosts file on the server in your office.

#86 - You have a Dec Alpha system running Windows NT. The NT has 2

partitions, one is Active. What is the best security for protecting the

data.

1. NTFS

2. NTFS with FAT

3. FAT with NTFS

4. All FAT.