Visit http://www.LearnQuick.Com
Networking Essentials 70-058
Hi. I am rikker and I passed the adaptive exam last Dec/02/98. I hardly believe the survey has straight relationship with the type of exam. I did not have any questions about subjects that I did not mark in the survey. So watch out.
1. What is a benefit of installing an application server to store and manage a database?
A. An application server centrally manages all user accounts.
B. An application server stores more data than a file-and-print server does.
C. An application server transfers only the results of database queries to client computers.
D. An application server transfers the entire database to client computers.
2. What is a benefit of using an application server instead of a file-and-print server?
A. An application server retrieves data and sends data to client computers more efficiently than a file-and-print server does.
B. An application server manages file and record locking more efficiently than a file-and-print server does.
C. An application server manages user access to network resources.
D. An application server distributes processing among all client computers on the network more efficiently than a file-and-print server does.
3. You have two explain to a customer two advantages about Application servers and File and Print servers (choose 2).
I don't remember the options.
4. Which device can you use to identify the defective network adapter?
A. protocol analyzer.
B. volt-ohmmeter.
C. optical time domain reflectometer (OTDR).
D. time domain reflectometer (TDR).
5. What is a characteristic of connection-oriented communication?
A. It provides fast but unreliable delivery of datagrams.
B. It provides assurance of packet delivery.
C. It uses store-and-forward techniques to move datagrams between computers.
D. It uses message-oriented communication for processing e-mail.
6. You are designing a peer-to-peer network that consists of 5 Microsoft Windows 95 computers. Which protocol should you use?
A. DLC.
B. NFS.
C. NWLink IPX.
D. XNS.
7. What is a benefit of both NDIS and ODI?
A. They allow network adapters to be used in any compliant computer.
B. They allow network adapters to transmit information over a greater distance than non-compliant network adapters can.
C. They allow network adapters to communicate with other compliant network adapters.
D. They allow network adapters to be independent of any particular transport protocol.
8. You are designing a security plan for your network. The following table summarizes the current network configuration.
Server: 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDC.
Client Computers: 100, which run Microsoft Windows 95
Network Type: 10BaseT Ethernet
Required result:
You must have centralized control of access to shared resources.
Optional desired results:
You want to track all access and attempted access to shared resources.
You want to track attempts to guess user passwords.
You want to implement a method to protect user accounts from password-breaking programs.
Proposed solution:
Implement NTFS with user-level security on all servers. Set appropriate access-control security on all shared resources. Require users to change their passwords every 40 days. Implement disk striping with parity on all servers. Perform daily tape backups, and store tapes in a secure off-site location.
Which results does the proposed solution produce?
A. The proposed solution produces the required result and produces all of the optional desired results.
B. The proposed solution produces the required result and produces only 1 of the optional desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. The proposed solution does not produce the required result.
9. You want to connect your Ethernet and token-ring networks. Both networks use NWLink IPX and NetBEUI. You want to connect both LANs and still
want to use the BOTH protocols.
A. repeater.
B. bridge.
C. router.
D. gateway.
10. You connect a client computer to a network that uses NWLink IPX. The client computer is not able to access any network resources. After investigation, you decide that hardware is not causing the problem. What is the most likely cause of the problem?
A. incorrect subnet mask on the client computer
B. incorrect IP address on the client computer
C. incorrect frame type on the client computer
D. corrupted WIN.INI file on the client computer
11. You have a network using NetBEUI and TCP/IP. The server and client are in different subnets. The client can PING the server, but cannot access the server using its name.
A. Client and the server have the same IP address
B. Server has the wrong subnet mask.
C. Server's name not registered with the name server.
D. Client's name not registered with the name server.
12. Upgrading token ring. 1 IBM 3090 computer and 10 dump terminals that they are comunicating using by IBM native protocol. You want to add 20 NT Work Station computers and 1 Printer. The printer will be connected to the network directly (HP JetPrinter) and Work Station will be communicate with IBM. What protocol you must install to NT?
a) DLC
b) TCP/IP
c) NWLink IPX
d) NetBEUI
13. 3 Windows NT Servers and 75 Clients using NetBEUI protocol. You want to communicate these computers with UNIX that uses NFS file system. You don't want to install new software. What is the best way to solve this problem?
a) Bridge
b) Brouter
c) Router
d) Gateway
14. You installed a new network adapter card. And supplied network software initialized
successfully. But you can not communicate with other computers even though other
computers operating successfully. What's the reason?
a) Transceiver setting is incorrect
b) I/O port address is incorrect
c) Cable segment is not properly terminated
d) Packet size setting is incorrect
15. NWLink IPX network. Network software initialization successful but can not access
the server. Other computers can access the server. What is the problem?
a) Wrong network adaptor driver is installed
b) Client has insufficient extended memory
c) I/O Port address is wrong
d) Wrong frame type
16. 10 client computers with WinNT workstation. Which kind of access control
and control access to file and directories on the network? Choose all that apply.
a) User & group access control to each shared resources
b) Supply passwork for each shared resources.
17. You just converted a network from NetBEUI to TCP/IP. The server and clients are on different subnets. From the clients you can ping the server by using the IP address but you cannot access the server by using the server name. What is the problem?
a) Server name is not registered with the name server.
b) Client name is not registered with the name server.
c) Incorrect IP addresses
d) Incorrect Protocols
18. What must you specify using UNC? (Choose 2)
a) Share name
b) Domain name
c) Server name
d) Computer name
19. You add a client computer named Computer2. Computer2 is able to communicate with some servers, but not others. All client computers on the network are able to communicate with all servers. What is the problem?
A. Invalid entry on the LMHosts file on Computer2.
B. Invalid entry on the Hosts file on Computer2.
C. Computer2 is not using all appropriate transport protocols.
D. NDIS driver on Computer2 is incorrect version.
20. You have a Dec Alpha system running Windows NT. The NT has 2 partitions, one is Active. What is the best security for protecting the data?
1. Both Partitions with NTFS
2. NTFS (as active) with FAT
3. FAT(as active) with NTFS
4. Both with FAT.
21. You have a main office and 3 branches. Each branch has 2 floors. Each floor
has a cable length requirement up to 150 meters. Each branch is 20 miles away
from main office. Your job is to link the main office and 3 branches together.
Required result: LAN or LANs can talk to each other within a branch. LAN or
LANs can talk to the main office.
Optional result: Must be inexpensive. Installation is easy.
Proposed solution: Link each branch to main office with thiknet. On each floor use
repeaters with thinnet cable.
A. The proposed solution produces the required result and produces all of the optional desired results.
B. The proposed solution produces the required result and produces only 1 of the optional desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. The proposed solution does not produce the required result.
22. A Drag and Place question. You want to segment your currently network in two: Network A and Network B. You are going to use diferent subnet ID between NetA and NetB and you will connect NetB to a Mainframe.
You have to select the correct connectivity devices and place them into the squeme.
GOOD LUCK.
Rikker