Just Came back form the NetEss Exam this morning. Managed to slip through with 699. Passing score was 552. I only got 25 questions, though. I thought that if you didn't score well on the first questions, you'd get some more. I only got the minimum number of questions.

Anyway, since I got 120 mins to take the exam, I've written every question and my answers down. Please :
    CHECK EVERY ANSWER !!!

I only got a 699 out of 1000, so not every answer is correct !!


Here goes :

1. You have a token ring network with 1 IBM 3090 and 10 terminals communicating using their native protocol. You want to add 20 NT Workstations and 1 HP Printer using a JetDirect card to this configuration. Which protocol do you need to install on the NT Workstations ?
    * DLC
    - TCP/IP
    - NWLink/IPX
    - NETBEUI

2. Which protocols provide connectionless communication ? (Choose 2)
    - IPX
    - SPX
    - TCP
    * DLC
    * UDP

3. You have a network uding TCP/IP and SPX/IPX. Which could be responsible for broadcast storms ? (Choose 3)
    - RIP
    * SAP
    * OSPF
    * ARP
    - TCP
    - SPX
    - HTTP

4. You have a workstation with an ethernet network interface card with both BNC and AUI connectors. You use the BNC connector. The network software initializes OK. You cannot connect to any server on the network, although all the other PCs can. Whhat could be the problem ?
    - You have not selected to use the onboard tranceiver
    - You are on a cable segment that is not properly terminated
    - You have an interrupt conflict with another device
    * You have an I/O conflict with another device

(By now I started to panic. Four questions, and already three on which I had no clue... and that I've never seen anywhere else on the braindumps)

5. You have an ethernet network with two NT Servers and 200 NT Workstations. There are three segments, divided by two routers. Which two protocols do you install ?
    - NetBeui
    * NWLink/IPX
    - DLC
    - AppleTalk
    * TCP

6. There are 25 NT stations and 25 users. Only 1 user on the network has her PC set up with a shared folder. There are multiple subfolders in the shared folder. This user specifies who has access to which shared folder. What type of security is this ?
    - File level security
    - Share level security
    * User level security
    - Hardware security

7. You want to give a NetBios name to one PC on your network. What would be a valid name ?
    * The name of a share on one of the servers
    - The computer name of one of the servers
    - the domain name of the network
    - the name of a workgroup on the network

8. You have 10 NT Servers and 2000 NT Workstations in one domain. You notice that during 7.00AM and 9.00AM network utilization reaches 100% frequently. What could be the cause ?
    - Broadcast storms
    - a malfunctioning NIC
    - a malfunctioning router
    * heavy domain logon trafic

9. TCP/IP is the only protocol on your one-segment network. Which NT Tools could you use to monitor network utilization ? (Choose 2)
    - Event Viewer
    - NT Diagnostics
    - Server Manager
    * Performance monitor
    * Network Monitor

10. Situation : Main office, three branches an max. 20 miles from the main office. Each branch is a two floor building. Each floor stretches to a maximum of 150m.
Required :
    - Implement a WAN that connects all the PCs within each branch as a LAN or LANs.
    - Connect each branch to the main office.
Optional Results :
    - Must be cheap
    - Must be simple
Proposed solution :
    - 1 LAN in each branch using UTP
    - 1 Active Hub on each floor connected to each other
    - A Fiber optic backbone between the branches and the main office

    - Meets Req + both Options
    - meets req + 1 option
    - meets req + no option
    * Does not meet required

11. Network monitor tells you that over the past year, network utilization has grown from 30% to 70%. Within three months, you plan to add 1 server and 24 clients.
    Current situation :
    - 3 NT Servers
    - 120 Clients, evenly distributed among all servers
    - 10BaseT Ethernet
    - TCP/IP
    - Cat. 3 UTP cabling
    - No routers or bridges
Required :
    - reduce network utilization by 50%
Optional :
    - Allow for continuous growth
    - maintain utilization levels after planned upgrade
    - must be cheap
Proposed solution :
    - Change maximum packet size on all PCs from 1514 to 576
    - replace Cat.3 cabling by Cat.5 cabling
    - increase TCP Window size from 4096 to 16384

    - Meets Req + all opt
    - meets req + 2 opt
    - meets req + 0 opt
    * does not meet req

12. Which WAN Technology provides a connection service with reliable delivery even when using unreliable switched connections ?
    - ISDN
    * X.25
    - Frame Relay
    - ATM

13. What is a characteristic of connection oriented communication ?
    - Fast and unreliable
    * assurance of delivery
    - store-and-forward
    - message oriented

14. You have an NT Server, TCP/IP and routers. What enables clients to browse NETBios names on all subnets ?
    * Wins
    - DHCP
    - Router
    - NetBios Broadcast

15. You set up a peer-to-peer network for 5 Windows95 computers. What protocol do you use ?
    - DLC
    - NFS
    * NWLink/IPX
    - XNS

16. You run NWLink/IPX. Your client network software seems to initialize ok. Your client cannot access the server. All other clients can access the server. What is most likely the cause of these problems ?
    - Wrong NIC driver
    - insufficient extended memory
    - wrong I/O address
    * wrong frame type

17. What is a high level protocol that provides file sharing services on NetBios networks ?
    - IPX/SPX
    - TCP/IP
    - DLC
    - SLIP
    - PPP
    * NetBeui
    - SMB
    - RIP
    - AFP
    - NCP

18. You have 25 NT Servers with at least 2Gb HDDs in one partition. 1200 Clients, 1 domain, TCP/IP, Network is located in 5 floors of one building.
Required :
    - Centralized control of access to shared resources
Optional :
    - track all file access and attempts at file access
    - track logon failures
    - implement protection from password-breaking programs
Proposed solution :
    - NTFS with user level security
    - access control on shares
    - Password changes every 40 days
    - Disk striping with parity
    - Daily backups with tapes stored at a secure off-site location.

    - meets req + all opt
    - meets req + 1 opt
    - meets req + 0 opt
    * does not meet req

19. You want to limit trafic between two ethernets which use NetBeui and NWLink/IPX. Which device do you use ?
    - Repeater
    * Bridge
    - Router
    - Gateway

20. You run NWLink/IPX. Hardware seems to be ok, but your client cannot access the network.
    - Incorrect subnet mask
    - incorrect IP address
    * incorrect frame type
    - corrupted WIN.INI

21. Barbara uses TCP/IP on her 5 year old PC. She wants to use Dial-up networking. The software she uses cannot provide automatic IP address.
    - DLC
    * SLIP
    - PPP

22. What do you use to manage and monitor Hubs, bridges and routers ?
    - Performance monitor
    * SNMP
    - Protocol Analyzer
    - Time Domain Reflector (TDR)

23. You have 3 NT Servers, 75 Clients running NetBeui. The 75 clients need to connect to a Unix network using NFS. You do not want to install additional software. Which device do you implement ?
    - Bridge
    - Router
    - Brouter
    * Gateway

24. You switched over from NetBeui to TCP/IP. Your server and the clients are on different subnets. From the client, you can ping the server using its IP address, but you cannot ping the server using the servers name. What is most likely the problem ?
    - Client and server have the same IP address.
    - The server has a wrong subnet mask
    * The servername is not registered with the name server
    - The client name is not registered with the name server

25. You have 10 NT Workstations. Which kind of access control can you use to control access to files and directories ? (Choose all applicable)
    * Specify users and groups who have access to each resource
    - supply a password for each resource.

As I said, check all answers with other braindumps, an official manual or something.

JDI wishes you good luck !