just got a 1000 on 70-58 net essens, 100% guaranteed to be on the test, got it from another source. My name is Peter my email is [email protected]
well here it is:
Networking Essentials - Test 70-058
1.What must you specify when you want to copy a file from 1 computer to another by using a UNC name? (Choose 2.)
A. share name
B. domain name
C. computer name
D. workgroup name
2. Which type of server provides processing power to run programs for client computers? (Choose all that apply.)
A. file-and-print server
B. application server
3. Your network consists of 10 computers, which run Microsoft Windows 95. Which kind of access control can you use to control access to files and directories on the network? (Choose all that apply.)
A. Specify users and groups who have access to each shared resource.
B. Supply a password for each shared resource.
4. Your network consists of 10 computers, which run Microsoft Windows NT Workstation. Which kind of access control can you use to control access to files and directories on the network? (Choose all that apply.)
A. Specify users and groups who have access to each shared resource.
B. Supply a password for each shared resource.
5. What is a characteristic of a client/server networks?
A. Any computer can make its resources available to any other computer on the network.
B. Dumb terminals are connected to a central host computer that performs all processing.
C. Any computer on the network can be both a client and a server.
D. Client computers access a server that performs
back-end services.
6. What is a characteristic of connection-oriented communication?
A. It provides fast but unreliable delivery of datagrams.
B. It provides assurance of packet delivery.
C. It uses store-and-forward techniques to move datagrams between computers.
D. It uses message-oriented communication for processing e-mail.
7. Barbara's remote computer can be accessed via dial-up telephone lines. The computer is 5 years old and uses TCP/IP as its only transport protocol. The data link communications protocol used by the computer cannot provide automatic IP addressing.
Which data link communications protocol is Barbara's computer using?
A. DLC
B. SLIP
C. PPP
8. Which data link communications protocol provides connections between computers via dial-up telephone lines? (Choose all that apply.)
A. SLIP
B. PPP
9. Match the description to the networking device.
OSI Model |
Application |
Presentation |
Session |
Transport |
Network |
Data Link |
Physical |
This device functions at or above the Transport layer of the OSI model. It acts as a translator between 2 computers that use different protocols or data formats.
A. gateway
B. bridge
C. router
D. repeater
10. What is a characteristic of the IEEE 802.3 10BaseT standard?
A. It specifies RJ-11 connectors at the ends of each cable.
B. It specifies UTP cable.
C. It specifies BNC T-connectors for connecting computers to cables.
D. It specifies 50-ohm terminators at the ends of each cable.
11. What is a characteristic of the IEEE 802.3 10Base2 standard?
A. It specifies Category 3 DIP cable with a maximum cable length of 100 meters.
B. It specifies RG-11 C/U coaxial cable with a maximum cable length of 500 meters.
C. It specifies BNC T-connectors for connecting computers to cables.
D. It specifies RJ-45 connectors at the ends of each cable.
12. What is a benefit of both NDIS and ODI?
A. They allow network adapters to be used in any compliant computer.
B. They allow network adapters to transmit information over a greater distance than noncompliant network adapters can.
C. They allow network adapters to communicate with other compliant network adapters.
D. They allow network adapters to be independent of any particular transport protocol.
13. What is a purpose of NDIS?
A. to allow any compliant transport protocol to pass data to any compliant network adapter
B. to allow any compliant transport protocol
to pass data to any compliant network redirector
C. to define the common signaling scheme that all
vendors' adapters use when transmitting packets
D. to define the voltage levels that must be applied to the pinouts on the network adapter's 15 pin AUI connector
14. You want to install a 100-Mbps backbone network that will connect 5 existing networks. Which media should you use?
A. Category 3 UP cable
B. Category 4 UTP cable
C. Fiber-optic cable
D. RG-58 A/U coaxial cable
15. You are designing a 100-Mbps Ethernet network for a building
that has existing UTP cable. You test the existing cable and decide that it meets Category
3 specifications. Which media should you use?
A. the existing cable
B. new Type 1 STP cable
C. new Category 4 UTP cable
D. new Category 5 UTP cable
16. You are designing a 100-Mbps network. Which media should you use?
A. RG-58 A/U coaxial cable
B. spread-spectrum radio
C. Category 5 UTP cable
D. Type 1 STP cable
17. Exhibit
Which network topology is illustrated in the accompanying Exhibit?
A. mesh
B. ring
C. bus
D. star
18. You are designing a peer-to-peer network that consists of 5 Microsoft Windows 95 computers. Which protocol should you use?
A. DLC
B. NFS
C. NWLink IPX
D. XNS
19. Which protocol is routable? (Choose 3.)
A. AppleTalk
B. TCP/IP
C. NWLink IPX
D. NetBEUI
E. DLC
20. You want to connect your Ethernet and token-ring networks. Both networks use NWLink IPX. You want to use IPX addressing to limit the amount of traffic between the 2 networks.
Which device should you use?
A. repeater
B. bridge
C. router
D. gateway
21. You want to segment your 200-node network into 3 subnets. The network uses TCP/IP.
Which device should you use?
A. repeater
B. bridge
C. router
D. gateway
22. Your network has 250 client computers. The network uses both TCP/IP and NetBEUI. You want to segment the network into 3 subnets. You want to allow all of the computers to use both of the protocols to communicate with computers on all 3 subnets.
Which device should you use?
A. repeater
B. brouter
C. router
D. gateway
23. Which networking device is used to translate protocols?
A. bridge
B. hub
C. gateway
D. repeater
24. Your l0BaseT Ethernet network uses NetBEUI. Users of your client computers need to access an IBM 3090 mainframe computer by using a 3270 terminal-emulation program.
Which device must you install?
A. bridge
B. gateway
C. router
D. brouter
25. You want to connect 2 computers by using l0BaseT Ethernet cable. The computers are located more than 300 meters apart.
Which device should you use?
A. repeater
B. amplifier
C. multiplexer
D. gateway
26. Which WAN connection service can provide transmission speed that is faster than 100 Mbps?
A. ISDN basic rate interface
B. X.25
C. T1
D. ATM
27. You want your WAN to allow simultaneous transmission of voice, video, and data. Which WAN connection service should you use?
A. 56-Kbps digital line
B. X.25
C. Frame relay
D. ATM
28. Which type of WAN connection service is intended to replace standard analog telephone service?
A. ISDN basic rate interface
B. X.25
C. Frame relay
D. 2.048-Mbps digital line
29. You are designing a WAN that uses X.25. Which device should
you include in the design?
A. gateway
B. packet assembler-disassembler (PAD)
C. multiple-layer interface driver (MLID)
D. multiplexer
30. Your company has an Ethernet network with 750 computers. The company is migrating to servers that run Microsoft Windows NT Server and to client computers that run Microsoft Windows 95. You want to protect sensitive network data, with a minimal amount of administration.
What should you include in your security plan?
A. peer-to-peer file sharing, with user-level security on all shared resources
B. peer-to-peer file sharing, with resource-password security on all shared resources
C. centralized administration of user accounts, with user-level security on all shared resources
D. centralized administration of user accounts, with resource-password security on all shared resources
31. Situation
You are designing a security plan for your network. The following table
summarizes the current network configuration.
Server | 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDC |
Client Computers | 100, which run Microsoft Windows 95 |
Network Type | 10BaseT Ethernet |
Required result:
You must have centralized control of access to shared resources.
Optional desired results:
You want to track all access and attempted access to shared resources.
You want to track attempts to guess user passwords.
You want to implement a method to protect user accounts from
password-breaking programs.
Proposed solution:
Implement NTFS with user-level security on all servers. Set appropriate access-control security on all shared resources. Require users to change their passwords every 40 days. Implement disk striping with parity on all servers. Perform daily tape backups, and store tapes in a secure off-site location.
Which results does the proposed solution produce?
A. the proposed solution produces the required
result and produces all of the optional
desired results.
B. the proposed solution produces the required
result and produces only 1 of the optional
desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. the proposed solution does not produce the required result.
32. Situation:
You are designing a WAN that will connect 3 existing networks in
Chicago, Atlanta, and Los Angeles.
Required result:
All of the computers on each of the 3 networks must be able to
communicate with any other computer on the 3 networks.
The WAN links must be capable of transmitting data at a minimum speed of 1
Mbps.
Optional desired results:
You want to provide continued communications in the event of a single-link failure.
You want to provide continued communications at a minimum speed of 1 Mbps in the event of a single-link failure.
Proposed solution:
Connect the 3 networks by using 2 T1 links, as shown in the accompanying Exhibit.
Diagram of the proposed WAN.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both of the optional desired results.
B. The proposed solution produces the required results and produces only 1 of the optional desired results.
C. The proposed solution produces the required results but does not produce any of the optional desired results.
D. The proposed solution does not produce the required results.
33. Situation:
You are designing a WAN that will connect 3 existing networks in Chicago, Atlanta, and Los Angeles.
Required results:
All of the computers on each of the 3 networks must be able to communicate with any other computer on the 3 networks.
The WAN links must be capable of transmitting data at a minimum speed of I Mbps.
Optional desired results:
You want to provide continued communications in the event of a single-link failure.
You want to provide continued communications at a minimum speed of 1 Mbps in the event of a single-link failure.
Proposed solution:
Connect the 3 networks by using 3 T1 links, as shown in the accompanying Exhibit.
Diagram of the proposed WAN.
Which results does the proposed solution produce?
A. the proposed solution produces the required results and produces both of the optional
desired results.
B. The proposed solution produces the required results and produces only 1 of the optional desired results.
C. The proposed solution produces the required results but does not produce any of the optional desired results.
D. the proposed solution does not produce the
required results.
34. Situation:
You are designing a disaster prevention and recovery plan for your network. The following table
summarizes the current network configuration.
Server | 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDC |
Client Computers | 100, which run Microsoft Windows 95 |
Network Type | 10BaseT Ethernet |
You have done the following:
. Placed all confidential data on the servers
. Placed the servers in a locked room
. Implemented NTFS user-level security on the servers to allow only specific personnel to access the data
Required results:
You must protect the servers from hardware failure. However, periods of
downtime of less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from
loss
Optional desired results:
You want to track all accesses to the data files.
You want to put reasonable methods in place to protect network data from virus corruption.
Proposed solution:
Connect UPS to each server.
Set appropriate access-control security on all shared resources.
Implement disk striping with parity for each server's hard disks.
Do daily tape backups of the data, and store the tapes in a secure
off-site location.
Implement virus scanning on all client computers and servers.
Which results do the proposed solution produced
A. the proposed solution produces the required
results and produces both of the optional
desired results.
B. The proposed solution produces the required results and produces only 1 of the optional desired results.
C. The proposed solution produces the required results but does not produce either of the optional desired results.
D. the proposed solution does not produce the required results.
35. Situation:
You are designing a disaster prevention and recovery plan for your
network. The following table summarizes the current network configuration.
You have done the following:
. Placed all confidential data on the servers
. Placed the servers in a locked room
. Implemented NTFS user-level security on the servers to allow only specific personnel to access the data
Required results:
You must protect the servers from hardware failure. However, periods of
downtime of less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from
loss.
Optional desired results:
You want to track all accesses to the data files.
You want to put reasonable methods in place to protect network data from virus corruption.
Proposed solution:
- Connect UPS to each server.
- Set appropriate access-control security on all shared resources.
- Implement disk mirroring for each server.
- Do daily tape backups of the data, and store the tapes in a secure off-site location.
- Implement virus scanning on all client computers and servers.
- Enable auditing on all shared files.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both of the optional desired results.
B. The proposed solution produces the required results and produces only 1 of the optional desired results.
C. The proposed solution produces the required results but does not produce either of the optional desired results.
D. The proposed solution does not produce the required results.
36. Configuration of your client computer:
� SVGA card
� SCSI card, set at IRQ 15
� LPT1
� LPT2
� COM1
� COM2
. PS/2 mouse port
The computer runs Microsoft Windows NT Workstation.
You are installing a token-ring network adapter in the computer. You set it to use IRQ 3.
Which device could cause IRQ conflicts in the computer?
A. COM1
B. COM2
C. LPT1
D. LPT2
37. You install an Ethernet network adapter in a client computer. The computer's network software is initialized successfully, but the computer is not able to communicate with other computers on the network. All other client computers on the network are able to communicate. What is the most likely cause of the problem?
A. the transceiver setting of the network adapter is incorrect.
B. the IO port address on the network adapter is incorrect.
C. the cable segment is not properly terminated.
D. the packet-size setting is incorrect.
38. Situation:
You are designing a NetBIOS naming scheme for all of the servers and client computers at your location. Within 2 years your company will install a WAN that will connect all of its networks.
Current Network Configuration for the
Entire company
Server | 328, Which run Microsoft Windows NT Server |
Client Computers | 20,000 which run Microsoft Windows 95 |
Network | 40, each in a different city |
WAN connections | None |
All users have e-mail to all other users in the company. | |
E-mail names | All have 12 characters or fewer |
Server | 10, which run Microsoft Windows NT server |
Client Computers | 500, which run Microsoft Windows 95 |
Required results:
You must successfully implement the NetBIOS naming scheme for all servers and client computers at your location.
The NetBIOS naming scheme at your location must continue to work after
the WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
Proposed solution:
Assign each server and client computer at all locations a unique 15-digit hexadecimal number to be used as that computer's NetBIOS name.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both of the optional desired results.
B. The proposed solution produces the required results and produces only 1 of the optional desired results.
C. The proposed solution produces the required
results but does not produce either of the
optional desired results.
D. The proposed solution does not produce the required results.
39. Situation:
You are designing a NetBIOS naming scheme for all of the servers and client computers at your location. Within 2 years your company will install a WAN that will connect all of its networks.
Current Network Configuration for the Entire company
Server | 328, Which run Microsoft Windows NT Server |
Client Computers | 20,000 which run Microsoft Windows 95 |
Network | 40, each in a different city |
WAN connections | None |
All users have e-mail to all other users in the company. | |
E-mail names | All have 12 characters or fewer |
Server | 10, which run Microsoft Windows NT server |
Client Computers | 500, which run Microsoft Windows 95 |
Required results:
You must successfully implement the NetBIOS naming scheme for all
servers and client computers at your location. The NetBIOS naming scheme at your location
must continue to work after the WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of 15 characters that
describe the location plus a 4-digit number that is unique to each server. Assign each
client computer a NetBIOS name that corresponds to the e-mail address of the computer's
principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both of the optional desired results.
B. The proposed solution produces the required results and produces only 1 of the optional desired results.
C. The proposed solution produces the required results but does not produce either of the optional desired results.
D. the proposed solution does not produce the required results.
40. Situation
You are designing a NetBIOS naming scheme for all of the servers and
client computers at your location. Within 2 years your company will install a WAN that
will connect all of its networks.
Current Network Configuration for the Entire company
Server | 328, Which run Microsoft Windows NT Server |
Client Computers | 20,000 which run Microsoft Windows 95 |
Network | 40, each in a different city |
WAN connections | None |
All users have e-mail to all other users in the company. | |
E-mail names | All have 12 characters or fewer |
Server | 10, which run Microsoft Windows NT server |
Client Computers | 500, which run Microsoft Windows 95 |
Required results:
You must successfully implement the NetBIOS naming scheme for all servers and client computers at your location. The NetBIOS naming scheme at your location must continue to work after the WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of the first 8
characters of the server's department name, plus a 5-character location code, plus a
2-digit identifier to distinguish between multiple servers within the department. Assign
each client computer a NetBIOS name that corresponds to the e-mail address of the
computer's principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both of the optional desired results.
B. The proposed solution produces the required results and produces only 1 of the optional desired results.
C. The proposed solution produces the required results but does not produce either of the optional desired results.
D. The proposed solution does not produce the
required results.
41. Which device should you use to monitor the amount of network
traffic over time?
A. time domain reflectometer (TDR)
B. cable tracer
C. protocol analyzer
D. medium attachment unit
42. The servers on your network run Microsoft Windows NT Server. The client computers run Microsoft Windows 95. You want to monitor network activity and evaluate network communications at the packet level.
Which tool should you use?
A. Performance Monitor
B. protocol analyzer
C. oscilloscope
D. volt-ohmmeter
43. Which tool should you use to create a report that logs network activity?
A. volt-ohmmeter
B. oscilloscope
C. protocol analyzer
D. time domain reflectometer (TDR)
44. Your network uses NWLink IPX. Initialization of your client
computer's network software appears to be successful, but your client computer is not able
to access the server. All of the other computers are able to access the server. What is
the most likely cause of the problem?
A. the wrong network-adapter driver is installed in your client computer.
B. your client computer has insufficient extended memory.
C. the network adapter in your client computer is
configured to use the wrong I/O port
address.
D. the network adapter in your client computer is configured to use the wrong frame type.
45. You connect a client computer to a network that uses NWLink IPX. The client computer is not able to access any network resources. After investigation, you decide that hardware is not causing the problem.
What is the most likely cause of the problem?
A. incorrect subnet mask on the client
computer
B. incorrect IP address on the client computer
C. incorrect frame type on the client computer
D. corrupted WIN.INI file on the client
computer
46. Your network includes servers that run Microsoft Windows NT Server, client computers that run Microsoft MS-DOS, and UNIX client computers. You add a new server that runs Microsoft Windows NT Server. All of the MS-DOS computers can access all shared network resources. The UNIX computers can access all shared network resources except the new server.
What is the most likely cause of the problems
A. faulty network adapters in the UNIX computers
B. incorrect binding order on the server
C. protocol mismatch between the server and the UNIX computers
D. incorrect frame type on the server
47. Current network configuration:
Server | 27, which run Microsoft Windows NT server |
Client Computers | 750 |
Protocols: | NetBEUI, NWLink IPX, TCP/IP |
You install a new client computer, which uses NWLink IPX. You are not able to access some of the shared network resources from this new computer. All of the other computers on the network are able to access all shared network resources.
What is the most likely cause of the problem?
A. the subnet-mask setting on the new client computer is incorrect.
B. There is a protocol mismatch between the new client computer and the inaccessible shared network resources.
C. the NetBIOS names for the new client computer and for the inaccessible shared network resources are duplicates.
D. There is a cable failure between the new client computer and the inaccessible shared network resources.
48. A client computer on your Ethernet network is not able to access the server. Initialization of the client computer's network software was successful. All other client computers are able to access the server. After investigation, you decide that hardware is not causing the problem.
What is the most likely cause of the problem?
A. There is insufficient extended memory in the affected client computer.
B. The network adapter in the server is configured to use the wrong transceiver.
C. the network adapter in the affected client computer is configured to use the wrong transceiver.
D. An excessive number of collisions is occurring on the media.
49. Configuration of 2 of the client computers on your 10BaseT Ethernet network:
VGA adapter: Default settings
IDE controller: Default settings
Floppy disk drive controller: Default settings
LPT1: Default settings
COM1: Default settings
COM2: Default settings
Ethernet network adapter See settings below:
MAC hardware address: 1 0C805000000
IRQ: 5
IO port address: 300
Transceiver: RJ-45
DMA None
Memory address: None
Neither computer is able to access the network. You run diagnostic tests
on the network adapters in both computers. Configuration of both adapters is identical:
Which change must you make on both Ethernet network adapters to allow the 2 client computers to access the network?
A. Change the MAC (hardware) addresses to factory settings.
B. Change the IRQ settings to 3.
C. Change the IO port addresses to 320.
D. Change the transceiver types to BNC.
50. Network Diagram.
Client computers on your Ethernet network are not able to access the
server. You use a volt-ohmmeter to measure the resistance between the center wire and the
shield on the cable, on the T-connectors, and on the terminators. You obtain the following
resistance readings:
RG-58 A/U coaxial cable: 0 ohms
Both T-connector: ? (Infinity) ohms
Both terminators: 50 ohms
What you do to repair the network?
A. Replace the 50-ohm terminators with 25-ohm terminators.
B. Replace the 50-ohm terminators with 100-ohm terminators.
C. Install replacement T-connectors.
D. Install replacement RG-58 A/U coaxial cable.
51. You are the administrator of a 20-computer Ethernet network. Sometimes 1 or 2 computers are not able to access network resources. The problem has affected every computer at random times. Some of the network cable is RG-58 /U solid-core coaxial cable, and some of the cable is RG-58 A/U stranded-core coaxial cable. You use a volt-ohmmeter to measure the resistance between the center wire and the shield on the cables and on the parts connected to them. You obtain the following readings:
All cables: ? (Infinity) ohms
Both terminators: 50 ohms
All T-connectors: ? (infinity) ohms
What must you do to repair the network?
A. Replace the 5O-ohm terminators with 25-ohm terminators.
B. Replace all RG-58 /U coaxial cables with RG-58 A/U coaxial cables.
C. Replace all cables with RG-62 /U coaxial cables.
D. Replace all T-connectors with new ones.
52. User reports slow network response on your 500-computer Ethernet network. After investigation, you suspect that a network adapter is generating a continuous and meaningless transmission.
Which device can you use to identify the defective network adapter?
A. protocol analyzer
B. volt-ohmmeter
C. optical time domain reflectometer (OTDR)
D. time domain reflectometer (TDR)
53. Situation:
Your company's rapid growth has caused an increase in the number of
computers on your network. There were 300 computers at the beginning of the year, and
there are 1,000 now. Broadcast storms are occurring with increasing frequency on the
network. You want to reduce the number of broadcast storms. The following table summarizes
your current network configuration.
Server | 25, Which run Microsoft Windows NT Server |
Client Computers | 600 which run Microsoft Windows 95, and |
300 Macintosh Computer that run System 7.x | |
75 UNIX computer | |
Network Types | 10BaseT Ethernet |
Protocols | NetBEUI, TCP/IP with DHCP and WINS, NWLink IPX, AppleTalk |
Cable | Category 3 UTP |
Brouters | 4, with bridging enabled |
Required result:
You must reduce the number of broadcast storms by at least 50 percent
while minimizing changes in functionality for the client computers.
Optional desired results:
Minimize hardware costs needed to produce the reduction in broadcast storms.
Minimize ongoing administrative costs after the changes are made.
Allow for continued expansion of the network.
Proposed solution:
Turn off bridging on all of the brouters. Configure all of the computers and brouters to use only NWLink IPX.
Which results does the proposed solution produce?
A. The proposed solution produces the required result and produces all of the optional desired results.
B. The proposed solution produces the required result and produces only 1 of the optional desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. The proposed solution does not produce the required result.
54. Situation
Configuration of your network:
Servers | 9, Which run Microsoft Windows NT Server |
Client Computers | 200 |
Network Type | 10BaseT Ethernet |
Protocol | NetBEUI |
Bridges | None |
Routers | None |
A. Segment the network by using a router.
B. Segment the network by using a repeater.
C. Replace NetBEUI with DLC, and then segment the network by using a bridge.
D. Replace NetBEUI with TCP/IP, and then segment the network by using a router.
55. Your network has 35 client computers and 1 server. The server runs Microsoft Windows NT Server. Network performance is steadily decreasing as new client computers are added to the network. You run Performance Monitor on the server and obtain the following statistics:
Counter
Average
% Processor Time: 8
Page
Faults/sec: 2
% Disk
Time:
25
What should you do to improve network performance?
A. Replace the server with a multiprocessor computer.
B. Install additional RAM in the server.
C. Install disk striping with parity on the server
D. Segment the network by adding another network adapter to the server.
56. Situation:
Network monitoring shows that network utilization has grown from 30
percent to 70 percent of maximum capacity in the past year. You will add 24 client
computers and 1 server within 3 months. You want to reduce network utilization.
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the
planned additions to the network are implemented.
You want to minimize costs for the project.
Proposed solution:
Change the maximum packet size on all of the computers from 1,514 bytes
to 576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable. Increase TCP
window size from 4,096 bytes to 16,384 bytes.
Which results does the proposed solution produce?
A. the proposed solution produces the required
result and produces all of the optional
desired results.
B. the proposed solution produces the required
result and produces only 2 of the optional
desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. the proposed solution does not produce the required result.
57. Situation:
Network monitoring shows that network utilization has grown from 30
percent to 70 percent of maximum capacity in the past year. You will add 24 client
computers and 1 server within 3 months. You want to reduce network utilization. The
following table summarizes your current network configuration.
Servers | 3 |
Client Computers | 120 evenly distributed among the 3 servers |
Network Type | 10BaseT Ethernet |
Protocol | TCP/IP |
Cable | Category 3 UTP |
Routers | None |
Bridges | None |
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the
planned additions to the network are implemented.
You want to minimize costs for the project.
Proposed solution:
Replace all 10BaseT hubs with 100BaseT hubs. Replace all Category 3 UTP cable with Category 5 UTP cable. Replace all 10BaseT network adapters with 100BaseT network adapters.
Which results do the proposed solution produced?
A. The proposed solution produces the required result and produces all of the optional desired results.
B. The proposed solution produces the required result and produces only 2 of the optional desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. The proposed solution does not produce the required result.
58. In the past year, you have added 55 client computers to your l0BaseT Ethernet network. Users of the network report that network response is slow during peak hours of usage.
Which solution is the most economical?
A. Replace all Ethernet adapters with FDDI adapters.
B. Replace all Ethernet concentrators with Ethernet switches.
C. Replace all Ethernet components with 100-Mbps ATM equivalents.
D. Replace all Ethernet components with 16-Mbps
token-ring equivalents.