just got a 1000 on 70-58 net essens, 100% guaranteed to be on the test, got it from another source.  My name is Peter my email is [email protected]

well here it is: 

 

Networking Essentials -  Test 70-058 

1.What must you specify when you want to copy a file from 1 computer to another by using a UNC name? (Choose 2.)

     A. share name

    B. domain name

    C. computer name

    D. workgroup name

 

2. Which type of server provides processing power to run programs for client computers? (Choose all that apply.)

    A. file-and-print server

    B. application server
 

3. Your network consists of 10 computers, which run Microsoft Windows 95. Which kind of access control can you use to control access to files and directories on the network? (Choose all that apply.)

    A. Specify users and groups who have access to each shared resource.

    B. Supply a password for each shared resource.

 

4. Your network consists of 10 computers, which run Microsoft Windows NT Workstation. Which kind of access control can you use to control access to files and directories on the network? (Choose all that apply.)

    A. Specify users and groups who have access to each shared resource.

    B. Supply a password for each shared resource.

 

5. What is a characteristic of a client/server networks?

    A. Any computer can make its resources available to any other computer on the network.

    B. Dumb terminals are connected to a central host computer that performs all processing.

    C. Any computer on the network can be both a client and a server.

    D. Client computers access a server that performs back-end services.
 

6. What is a characteristic of connection-oriented communication?

     A. It provides fast but unreliable delivery of datagrams.

    B. It provides assurance of packet delivery.

    C. It uses store-and-forward techniques to move datagrams between computers.

    D. It uses message-oriented communication for processing e-mail.

 

7. Barbara's remote computer can be accessed via dial-up telephone lines. The computer is 5 years old and uses TCP/IP as its only transport protocol. The data link communications protocol used by the computer cannot provide automatic IP addressing.

Which data link communications protocol is Barbara's computer using?

    A.  DLC

    B.  SLIP

    C.  PPP
 

8. Which data link communications protocol provides connections between computers via dial-up telephone lines? (Choose all that apply.)

    A.  SLIP

    B.  PPP
 

 

 

9. Match the description to the networking device.
 
 

OSI Model

Application
Presentation
Session
Transport
Network
Data Link
Physical

 

This device functions at or above the Transport layer of the OSI model. It acts as a translator between 2 computers that use different protocols or data formats.

    A. gateway

    B. bridge

    C. router

    D. repeater

 

10. What is a characteristic of the IEEE 802.3 10BaseT standard?

    A. It specifies RJ-11 connectors at the ends of each cable.

    B. It specifies UTP cable.

    C. It specifies BNC T-connectors for connecting computers to cables.

    D. It specifies 50-ohm terminators at the ends of each cable.

 

11. What is a characteristic of the IEEE 802.3 10Base2 standard?

    A. It specifies Category 3 DIP cable with a maximum cable length of 100 meters.

    B. It specifies RG-11 C/U coaxial cable with a maximum cable length of 500 meters.

    C. It specifies BNC T-connectors for connecting computers to cables.

    D. It specifies RJ-45 connectors at the ends of each cable.

 

12. What is a benefit of both NDIS and ODI?

    A. They allow network adapters to be used in any compliant computer.

    B. They allow network adapters to transmit information over a greater distance than noncompliant network adapters can.

    C. They allow network adapters to communicate with other compliant network adapters.

    D. They allow network adapters to be independent of any particular transport protocol.

 

13. What is a purpose of NDIS?

    A.  to allow any compliant transport protocol to pass data to any compliant network adapter

    B.  to allow any compliant transport protocol to pass data to any compliant network redirector
 
    C. to define the common signaling scheme that all vendors' adapters use when transmitting packets

    D. to define the voltage levels that must be applied to the pinouts on the network adapter's 15 pin AUI connector

 

14. You want to install a 100-Mbps backbone network that will connect 5 existing networks. Which media should you use?

    A. Category 3 UP cable

    B.  Category 4 UTP cable

    C.  Fiber-optic cable

    D.  RG-58 A/U coaxial cable
 

 
15.  You are designing a 100-Mbps Ethernet network for a building that has existing UTP cable. You test the existing cable and decide that it meets Category 3 specifications. Which media should you use?

    A.  the existing cable

    B.  new Type 1 STP cable

    C.  new Category 4 UTP cable

    D.  new Category 5 UTP cable
 
 

16. You are designing a 100-Mbps network. Which media should you use?

    A. RG-58 A/U coaxial cable

    B. spread-spectrum radio

    C. Category 5 UTP cable

    D. Type 1 STP cable

 

17. Exhibit

 
Which network topology is illustrated in the accompanying Exhibit?

    A. mesh

    B. ring

    C. bus

    D. star

 

18. You are designing a peer-to-peer network that consists of 5 Microsoft Windows 95 computers. Which protocol should you use?

    A. DLC

    B. NFS

    C. NWLink IPX

    D. XNS

 

19.  Which protocol is routable? (Choose 3.)

    A.  AppleTalk

    B.  TCP/IP

    C.  NWLink IPX

    D.  NetBEUI

    E.  DLC
 

20. You want to connect your Ethernet and token-ring networks. Both networks use NWLink IPX. You want to use IPX addressing to limit the amount of traffic between the 2 networks.

Which device should you use?

    A. repeater

    B. bridge

    C. router

    D. gateway

 

21. You want to segment your 200-node network into 3 subnets. The network uses TCP/IP.

Which device should you use?
 

    A. repeater

    B. bridge

    C. router

    D. gateway

 

22. Your network has 250 client computers. The network uses both TCP/IP and NetBEUI. You want to segment the network into 3 subnets. You want to allow all of the computers to use both of the protocols to communicate with computers on all 3 subnets.

Which device should you use?

    A. repeater

    B. brouter

    C. router

    D. gateway

 

23. Which networking device is used to translate protocols?

    A.  bridge

    B.  hub

    C.  gateway

    D.  repeater
 

24. Your l0BaseT Ethernet network uses NetBEUI. Users of your client computers need to access an IBM 3090 mainframe computer by using a 3270 terminal-emulation program.

Which device must you install?

    A.  bridge

    B.  gateway

    C.  router

    D.  brouter
 

25. You want to connect 2 computers by using l0BaseT Ethernet cable. The computers are located more than 300 meters apart.

Which device should you use?

    A. repeater

    B. amplifier

    C. multiplexer

    D. gateway

 

26. Which WAN connection service can provide transmission speed that is faster than 100 Mbps?

    A.  ISDN basic rate interface

    B.  X.25

    C.  T1

    D.  ATM
 

 

27. You want your WAN to allow simultaneous transmission of voice, video, and data. Which WAN connection service should you use?

    A. 56-Kbps digital line

    B. X.25

    C. Frame relay

    D. ATM

 

28. Which type of WAN connection service is intended to replace standard analog telephone service?

    A. ISDN basic rate interface

    B. X.25

    C. Frame relay

    D. 2.048-Mbps digital line
 
 

29.  You are designing a WAN that uses X.25. Which device should you include in the design?
 
    A.  gateway

    B.  packet assembler-disassembler (PAD)

    C.  multiple-layer interface driver (MLID)

    D.  multiplexer
 

30. Your company has an Ethernet network with 750 computers. The company is migrating to servers that run Microsoft Windows NT Server and to client computers that run Microsoft Windows 95. You want to protect sensitive network data, with a minimal amount of administration.

What should you include in your security plan?

    A. peer-to-peer file sharing, with user-level security on all shared resources

    B. peer-to-peer file sharing, with resource-password security on all shared resources

    C. centralized administration of user accounts, with user-level security on all shared resources

    D. centralized administration of user accounts, with resource-password security on all shared resources

 

31.  Situation
 
You are designing a security plan for your network. The following table summarizes the current network configuration.
 

Server  2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDC
Client Computers 100, which run Microsoft Windows 95
Network Type 10BaseT Ethernet

Required result:

You must have centralized control of access to shared resources.

Optional desired results:

You want to track all access and attempted access to shared resources.
You want to track attempts to guess user passwords.
You want to implement a method to protect user accounts from   password-breaking programs.

 
Proposed solution:

Implement NTFS with user-level security on all servers. Set appropriate access-control security on all shared resources. Require users to change their passwords every 40 days. Implement disk striping with parity on all servers. Perform daily tape backups, and store tapes in a secure off-site location.

 

Which results does the proposed solution produce?

    A. the proposed solution produces the required result and produces all of the optional
        desired results.

    B. the proposed solution produces the required result and produces only 1 of the optional
        desired results.

    C. The proposed solution produces the required result but does not produce any of the optional desired results.

    D. the proposed solution does not produce the required result.

 

32. Situation:

You are designing a WAN that will connect 3 existing networks in Chicago, Atlanta, and Los Angeles.
 
Required result:

All of the computers on each of the 3 networks must be able to communicate with any other computer on the 3 networks.
 
The WAN links must be capable of transmitting data at a minimum speed of 1 Mbps.

 

Optional desired results:

You want to provide continued communications in the event of a single-link failure.

You want to provide continued communications at a minimum speed of 1 Mbps in the event of a single-link failure.

 

Proposed solution:

Connect the 3 networks by using 2 T1 links, as shown in the accompanying Exhibit.

 

Diagram of the proposed WAN.

Which results does the proposed solution produce?

     A. The proposed solution produces the required results and produces both of the optional desired results.

    B. The proposed solution produces the required results and produces only 1 of the optional desired results.

    C. The proposed solution produces the required results but does not produce any of the optional desired results.

    D. The proposed solution does not produce the required results.

 

33. Situation:

You are designing a WAN that will connect 3 existing networks in Chicago, Atlanta, and Los Angeles.

Required results:

All of the computers on each of the 3 networks must be able to communicate with any other computer on the 3 networks.

The WAN links must be capable of transmitting data at a minimum speed of I Mbps.

 

Optional desired results:

You want to provide continued communications in the event of a single-link failure.

You want to provide continued communications at a minimum speed of 1 Mbps in the event of a single-link failure.

 

Proposed solution:

Connect the 3 networks by using 3 T1 links, as shown in the accompanying Exhibit.

 

Diagram of the proposed WAN.


 

Which results does the proposed solution produce?

     A. the proposed solution produces the required results and produces both of the optional

        desired results.

     B. The proposed solution produces the required results and produces only 1 of the optional desired results.

     C. The proposed solution produces the required results but does not produce any of the optional desired results.

     D. the proposed solution does not produce the required results.
 
 

34. Situation:

You are designing a disaster prevention and recovery plan for your network. The following table

summarizes the current network configuration.
 

Server  2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDC
Client Computers 100, which run Microsoft Windows 95
Network Type 10BaseT Ethernet

You have done the following:

. Placed all confidential data on the servers

. Placed the servers in a locked room

. Implemented NTFS user-level security on the servers to allow only specific personnel to access the data

 

Required results:

You must protect the servers from hardware failure. However, periods of downtime of less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from loss

Optional desired results:

You want to track all accesses to the data files.

You want to put reasonable methods in place to protect network data from virus corruption.

 
Proposed solution:

Connect UPS to each server.
Set appropriate access-control security on all shared resources.
Implement disk striping with parity for each server's hard disks.
Do daily tape backups of the data, and store the tapes in a secure off-site location.
Implement virus scanning on all client computers and servers.
 

Which results do the proposed solution produced

    A. the proposed solution produces the required results and produces both of the optional
        desired results.

    B. The proposed solution produces the required results and produces only 1 of the optional desired results.

    C. The proposed solution produces the required results but does not produce either of the optional desired results.

    D. the proposed solution does not produce the required results.

 

35. Situation:

You are designing a disaster prevention and recovery plan for your network. The following table summarizes the current network configuration.
 

You have done the following:

. Placed all confidential data on the servers

. Placed the servers in a locked room

. Implemented NTFS user-level security on the servers to allow only specific personnel to access the data

 

Required results:

You must protect the servers from hardware failure. However, periods of downtime of less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from loss.
 

Optional desired results:

You want to track all accesses to the data files.

You want to put reasonable methods in place to protect network data from virus corruption.

 

Proposed solution:

- Connect UPS to each server.

- Set appropriate access-control security on all shared resources.

- Implement disk mirroring for each server.

- Do daily tape backups of the data, and store the tapes in a secure off-site location.

- Implement virus scanning on all client computers and servers.

- Enable auditing on all shared files.

 

Which results does the proposed solution produce?

    A. The proposed solution produces the required results and produces both of the optional desired results.

    B. The proposed solution produces the required results and produces only 1 of the optional desired results.

    C. The proposed solution produces the required results but does not produce either of the optional desired results.

    D. The proposed solution does not produce the required results.

 

36. Configuration of your client computer:

� SVGA card
� SCSI card, set at IRQ 15
� LPT1
� LPT2
� COM1
� COM2
. PS/2 mouse port

The computer runs Microsoft Windows NT Workstation.

You are installing a token-ring network adapter in the computer. You set it to use IRQ 3.

Which device could cause IRQ conflicts in the computer?

    A. COM1

    B. COM2

    C. LPT1

    D. LPT2

 

37. You install an Ethernet network adapter in a client computer. The computer's network software is initialized successfully, but the computer is not able to communicate with other computers on the network. All other client computers on the network are able to communicate. What is the most likely cause of the problem?

    A. the transceiver setting of the network adapter is incorrect.

    B. the IO port address on the network adapter is incorrect.

    C. the cable segment is not properly terminated.

    D. the packet-size setting is incorrect.

 

38. Situation:

You are designing a NetBIOS naming scheme for all of the servers and client computers at your location. Within 2 years your company will install a WAN that will connect all of its networks.

  Current Network Configuration for the Entire company
 

Server  328, Which run Microsoft Windows NT Server
Client Computers 20,000 which run Microsoft Windows 95
Network 40, each in a different city
WAN connections None
E-mail All users have e-mail to all other users in the company.
E-mail names All have 12 characters or fewer

 
Current Network Configuration for Your Location

 

Server 10, which run Microsoft Windows NT server
Client Computers 500, which run Microsoft Windows 95

 

Required results:

You must successfully implement the NetBIOS naming scheme for all servers and client computers at your location.

The NetBIOS naming scheme at your location must continue to work after the WAN is connected.
 

Optional desired results:

You want the NetBIOS name for each server to describe the server's department or function.
You want each client computer's NetBIOS name to describe the computer's primary user or function.

 
Proposed solution:

Assign each server and client computer at all locations a unique 15-digit hexadecimal number to be used as that computer's NetBIOS name.

 

Which results does the proposed solution produce?

    A. The proposed solution produces the required results and produces both of the optional desired results.

    B. The proposed solution produces the required results and produces only 1 of the optional desired results.

    C. The proposed solution produces the required results but does not produce either of the
        optional desired results.

    D. The proposed solution does not produce the required results.

 

39. Situation:

You are designing a NetBIOS naming scheme for all of the servers and client computers at your location. Within 2 years your company will install a WAN that will connect all of its networks.

 
Current Network Configuration for the Entire company
 

Server  328, Which run Microsoft Windows NT Server
Client Computers 20,000 which run Microsoft Windows 95
Network 40, each in a different city
WAN connections None
E-mail All users have e-mail to all other users in the company.
E-mail names All have 12 characters or fewer

 
Current Network Configuration for Your Location

 

Server 10, which run Microsoft Windows NT server
Client Computers 500, which run Microsoft Windows 95

 

Required results:

You must successfully implement the NetBIOS naming scheme for all servers and client computers at your location. The NetBIOS naming scheme at your location must continue to work after the WAN is connected.
 

Optional desired results:

You want the NetBIOS name for each server to describe the server's department or function.
You want each client computer's NetBIOS name to describe the computer's primary user or function.
 

Proposed solution:

Assign each server a NetBIOS name that consists of 15 characters that describe the location plus a 4-digit number that is unique to each server. Assign each client computer a NetBIOS name that corresponds to the e-mail address of the computer's principal user.
 
 

Which results does the proposed solution produce?

    A. The proposed solution produces the required results and produces both of the optional desired results.

    B. The proposed solution produces the required results and produces only 1 of the optional desired results.

    C. The proposed solution produces the required results but does not produce either of the optional desired results.

    D. the proposed solution does not produce the required results.

 

40.  Situation

You are designing a NetBIOS naming scheme for all of the servers and client computers at your location. Within 2 years your company will install a WAN that will connect all of its networks.
 

Current Network Configuration for the Entire company
 

Server  328, Which run Microsoft Windows NT Server
Client Computers 20,000 which run Microsoft Windows 95
Network 40, each in a different city
WAN connections None
E-mail All users have e-mail to all other users in the company.
E-mail names All have 12 characters or fewer

 
Current Network Configuration for Your Location

 

Server 10, which run Microsoft Windows NT server
Client Computers 500, which run Microsoft Windows 95

 

Required results:

You must successfully implement the NetBIOS naming scheme for all servers and client computers at your location. The NetBIOS naming scheme at your location must continue to work after the WAN is connected.

Optional desired results:

You want the NetBIOS name for each server to describe the server's department or function.
You want each client computer's NetBIOS name to describe the computer's primary user or function.

Proposed solution:

Assign each server a NetBIOS name that consists of the first 8 characters of the server's department name, plus a 5-character location code, plus a 2-digit identifier to distinguish between multiple servers within the department. Assign each client computer a NetBIOS name that corresponds to the e-mail address of the computer's principal user.
 

Which results does the proposed solution produce?

    A. The proposed solution produces the required results and produces both of the optional desired results.

    B. The proposed solution produces the required results and produces only 1 of the optional desired results.

    C. The proposed solution produces the required results but does not produce either of the optional desired results.

    D. The proposed solution does not produce the required results.
 
 

41.  Which device should you use to monitor the amount of network traffic over time?
 
    A.  time domain reflectometer (TDR)

    B.  cable tracer

    C.  protocol analyzer

    D.  medium attachment unit
 

42. The servers on your network run Microsoft Windows NT Server. The client computers run Microsoft Windows 95. You want to monitor network activity and evaluate network communications at the packet level.

Which tool should you use?

    A. Performance Monitor

    B. protocol analyzer

    C. oscilloscope

    D. volt-ohmmeter
 
 

43. Which tool should you use to create a report that logs network activity?

    A. volt-ohmmeter

    B. oscilloscope

    C. protocol analyzer

    D. time domain reflectometer (TDR)

 

44. Your network uses NWLink IPX. Initialization of your client computer's network software appears to be successful, but your client computer is not able to access the server. All of the other computers are able to access the server. What is the most likely cause of the problem?
 

    A. the wrong network-adapter driver is installed in your client computer.

    B. your client computer has insufficient extended memory.

    C. the network adapter in your client computer is configured to use the wrong I/O port
        address.

    D. the network adapter in your client computer is configured to use the wrong frame type.

 

45. You connect a client computer to a network that uses NWLink IPX. The client computer is not able to access any network resources. After investigation, you decide that hardware is not causing the problem.

What is the most likely cause of the problem?

    A.  incorrect subnet mask on the client computer
 
    B.  incorrect IP address on the client computer

    C.  incorrect frame type on the client computer

    D.  corrupted WIN.INI file on the client computer
 

46. Your network includes servers that run Microsoft Windows NT Server, client computers that run Microsoft MS-DOS, and UNIX client computers. You add a new server that runs Microsoft Windows NT Server. All of the MS-DOS computers can access all shared network resources. The UNIX computers can access all shared network resources except the new server.

What is the most likely cause of the problems

    A. faulty network adapters in the UNIX computers

    B. incorrect binding order on the server

    C. protocol mismatch between the server and the UNIX computers

    D. incorrect frame type on the server

 

47. Current network configuration:
 

Server 27, which run Microsoft Windows NT server
Client Computers 750
Protocols: NetBEUI, NWLink IPX,  TCP/IP

You install a new client computer, which uses NWLink IPX. You are not able to access some of the shared network resources from this new computer. All of the other computers on the network are able to access all shared network resources.

What is the most likely cause of the problem?

    A. the subnet-mask setting on the new client computer is incorrect.

    B. There is a protocol mismatch between the new client computer and the inaccessible shared network resources.

    C. the NetBIOS names for the new client computer and for the inaccessible shared network resources are duplicates.

    D. There is a cable failure between the new client computer and the inaccessible shared network resources.

 

48. A client computer on your Ethernet network is not able to access the server. Initialization of the client computer's network software was successful. All other client computers are able to access the server. After investigation, you decide that hardware is not causing the problem.

What is the most likely cause of the problem?

    A. There is insufficient extended memory in the affected client computer.

    B. The network adapter in the server is configured to use the wrong transceiver.

    C. the network adapter in the affected client computer is configured to use the wrong transceiver.

    D. An excessive number of collisions is occurring on the media.

 

49. Configuration of 2 of the client computers on your 10BaseT Ethernet network:

VGA adapter: Default settings

IDE controller: Default settings

Floppy disk drive controller: Default settings

LPT1: Default settings

COM1: Default settings

COM2: Default settings
 

Ethernet network adapter See settings below:

MAC hardware address: 1 0C805000000

IRQ: 5

IO port address: 300

Transceiver: RJ-45

DMA None

Memory address: None

 
Neither computer is able to access the network. You run diagnostic tests on the network adapters in both computers. Configuration of both adapters is identical:

Which change must you make on both Ethernet network adapters to allow the 2 client computers to access the network?

    A. Change the MAC (hardware) addresses to factory settings.

    B. Change the IRQ settings to 3.

    C. Change the IO port addresses to 320.

    D. Change the transceiver types to BNC.

 

50. Network Diagram.

 
Client computers on your Ethernet network are not able to access the server. You use a volt-ohmmeter to measure the resistance between the center wire and the shield on the cable, on the T-connectors, and on the terminators. You obtain the following resistance readings:
 

RG-58 A/U coaxial cable: 0 ohms

Both T-connector: ? (Infinity) ohms

Both terminators: 50 ohms
 

What you do to repair the network?

    A. Replace the 50-ohm terminators with 25-ohm terminators.

    B. Replace the 50-ohm terminators with 100-ohm terminators.

    C. Install replacement T-connectors.

    D. Install replacement RG-58 A/U coaxial cable.  

51. You are the administrator of a 20-computer Ethernet network. Sometimes 1 or 2 computers are not able to access network resources. The problem has affected every computer at random times. Some of the network cable is RG-58 /U solid-core coaxial cable, and some of the cable is RG-58 A/U stranded-core coaxial cable. You use a volt-ohmmeter to measure the resistance between the center wire and the shield on the cables and on the parts connected to them. You obtain the following readings:

All cables: ? (Infinity) ohms

Both terminators: 50 ohms

All T-connectors: ? (infinity) ohms
 

What must you do to repair the network?

    A. Replace the 5O-ohm terminators with 25-ohm terminators.

    B. Replace all RG-58 /U coaxial cables with RG-58 A/U coaxial cables.

    C. Replace all cables with RG-62 /U coaxial cables.

    D. Replace all T-connectors with new ones.

 

52. User reports slow network response on your 500-computer Ethernet network. After investigation, you suspect that a network adapter is generating a continuous and meaningless transmission.

Which device can you use to identify the defective network adapter?

    A. protocol analyzer

    B. volt-ohmmeter

    C. optical time domain reflectometer (OTDR)

    D. time domain reflectometer (TDR)

 

53. Situation:

Your company's rapid growth has caused an increase in the number of computers on your network. There were 300 computers at the beginning of the year, and there are 1,000 now. Broadcast storms are occurring with increasing frequency on the network. You want to reduce the number of broadcast storms. The following table summarizes your current network configuration.
 

Server 25, Which run Microsoft Windows NT Server
Client Computers 600 which run Microsoft Windows 95, and
  300 Macintosh Computer that run System 7.x
  75 UNIX computer
Network Types 10BaseT Ethernet
Protocols NetBEUI, TCP/IP with DHCP and WINS, NWLink IPX, AppleTalk
Cable Category 3 UTP
Brouters 4, with bridging enabled

 

Required result:

You must reduce the number of broadcast storms by at least 50 percent while minimizing changes in functionality for the client computers.
 

Optional desired results:

Minimize hardware costs needed to produce the reduction in broadcast storms.

Minimize ongoing administrative costs after the changes are made.

Allow for continued expansion of the network.

 
Proposed solution:

Turn off bridging on all of the brouters. Configure all of the computers and brouters to use only NWLink IPX.

 

Which results does the proposed solution produce?

    A. The proposed solution produces the required result and produces all of the optional desired results.

    B. The proposed solution produces the required result and produces only 1 of the optional desired results.

    C. The proposed solution produces the required result but does not produce any of the optional desired results.

    D. The proposed solution does not produce the required result.

 
54. Situation

Configuration of your network:
 
 

Servers 9, Which run Microsoft Windows NT Server
Client Computers 200
Network Type 10BaseT Ethernet
Protocol NetBEUI
Bridges None
Routers None

 
Users on your network report poor network performance. After investigation, you decide that broadcast storms are causing the problem. What should you do to resolve the broadcast storms?

    A. Segment the network by using a router.

    B. Segment the network by using a repeater.

    C. Replace NetBEUI with DLC, and then segment the network by using a bridge.

    D. Replace NetBEUI with TCP/IP, and then segment the network by using a router.

 

55. Your network has 35 client computers and 1 server. The server runs Microsoft Windows NT Server. Network performance is steadily decreasing as new client computers are added to the network. You run Performance Monitor on the server and obtain the following statistics:

Counter                   Average
% Processor Time:         8
Page Faults/sec:             2
% Disk Time:                 25

What should you do to improve network performance?

    A. Replace the server with a multiprocessor computer.

    B. Install additional RAM in the server.

    C. Install disk striping with parity on the server

    D. Segment the network by adding another network adapter to the server.

 

56. Situation:

Network monitoring shows that network utilization has grown from 30 percent to 70 percent of maximum capacity in the past year. You will add 24 client computers and 1 server within 3 months. You want to reduce network utilization.
 

Required result:

You must reduce network utilization by 50 percent.
 

Optional desired results:

You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the planned additions to the network are implemented.
You want to minimize costs for the project.
 

Proposed solution:

Change the maximum packet size on all of the computers from 1,514 bytes to 576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable. Increase TCP window size from 4,096 bytes to 16,384 bytes.
 

Which results does the proposed solution produce?

    A. the proposed solution produces the required result and produces all of the optional
        desired results.

    B. the proposed solution produces the required result and produces only 2 of the optional
        desired results.

    C. The proposed solution produces the required result but does not produce any of the optional desired results.

    D. the proposed solution does not produce the required result.

 

57. Situation:

Network monitoring shows that network utilization has grown from 30 percent to 70 percent of maximum capacity in the past year. You will add 24 client computers and 1 server within 3 months. You want to reduce network utilization. The following table summarizes your current network configuration.
 
 

Servers 3
Client Computers 120 evenly distributed among the 3 servers
Network Type 10BaseT Ethernet
Protocol TCP/IP
Cable Category 3 UTP
Routers None
Bridges None

 

Required result:

You must reduce network utilization by 50 percent.
 

Optional desired results:

You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the planned additions to the network are implemented.
You want to minimize costs for the project.
 

Proposed solution:

Replace all 10BaseT hubs with 100BaseT hubs. Replace all Category 3 UTP cable with Category 5 UTP cable. Replace all 10BaseT network adapters with 100BaseT network adapters.

 

Which results do the proposed solution produced?

    A. The proposed solution produces the required result and produces all of the optional desired results.

    B. The proposed solution produces the required result and produces only 2 of the optional desired results.

    C. The proposed solution produces the required result but does not produce any of the optional desired results.

    D. The proposed solution does not produce the required result.

 

58. In the past year, you have added 55 client computers to your l0BaseT Ethernet network. Users of the network report that network response is slow during peak hours of usage.

Which solution is the most economical?

    A. Replace all Ethernet adapters with FDDI adapters.

    B. Replace all Ethernet concentrators with Ethernet switches.

    C. Replace all Ethernet components with 100-Mbps ATM equivalents.

    D. Replace all Ethernet components with 16-Mbps token-ring equivalents.