Networking Essentials - 70-58

I passed my Networking exam with 913 marks and the Braindumps which i found here helped me very much.I want to thank everybody who collaborated with questions and answers, which were very similar to my exam,

Here is a summary of the questions and answers that helped me pass the exam.

 

Good luck to everyone.

 

  1. Which of the following statements are true of client/server.
  1. All procesing occurs on the back end.
  2. All procesing occurs on the front end.
  3. Tasks are divided between the back end and the front end.
  4. The back end fulfills the requests made by the front end.

Ans: C and D.

  1. Which layer of the OSI model ensures messages are delivered error free?.
  1. Transport.
  2. Session.
  3. Network.
  4. Physical.

    Ans: A

    3- Which of the following statements about network troubleshooting are true?.

    A-A perfomance monitoring program such a Perfomance Monitor can be used to identify trends over time.

    B-Most network problems occur at the OSI Physical layer.

    C-Networks analyzers work at the physical layer because that is where most network problems occur.

    D-Networks protocols can mask network problems because they attempt to overcome faults.

    Ans: A,B and D.

    4-Network management includes planning, monitoring and troubleshooting. Which of the following statement about network troubleshooting are true?.

    A-Windows NT Perfomance Monitor can be used to identify trends over time and establish a baseline for troubleshooting.

    B-Most network problems occur at the physical layer of the OSI model.

    C-Network analyzers works at the physical layer because that is where most network problems occur.

    D-Advanced cable testers can be used to identify a wide range of problems including congestion errors.

    Ans: A,B and D.

    4-Which of the following are applications , utilities or programs that the administrator could use to gather information about different system components and functions?.

    A-Task Manager.

    B- Perfomance monitor.

    C- SNMP.

    D- Microsoft Systems Management Server.

    Ans: B,C and D.

    5- Which of the following statement are true of repetears?

    A-Repeaters can be used to solve the problem of crosstalk.

    B-Repeaters can be used to solve the problems of attenuation.

    C-Segments joined by a repeaters must use the same physical media.

    D-Segments joined by a repeater must use the same media access.

    Ans: B and D.

    6- Project 802 defines standards for which layers of the OSI model?.

    A-Physical and Data Link layers.

    B-Network and Data Link layers.

    C-Transport and Network layers.

    D-Application and Presentation layers.

    Ans: A.

    7- Which layer of the OSI model is responsible for data compresion?

    A-Application.

    B-Session.

    C-Network.

    D-Presentation.

    Ans:D.

    8-Which roles does the server play in a system that uses a client/server application architecture?.

    Ans: The server satisfies request from the client computer for data and processing resources.

    9-Which of the following are true of thinnet and thicknet?.

    A-Thinnet and thicknet are implementations of IEEE standard 802.3.

    B- The maximum cable segment lenght is 100 meters for thinnet and 500 meters for thicknet.

    C- Thicknet is associated with the 10Base2 topology.

  5. Because of their different sizes and construction, thicknet and thinnnet should not be used in the same network.

Ans: A and C.

10-Which of the following best describes frames relay techology?.

Ans:It is a point-to-point system that transmits variable-lenght frames at the Data Link layer throught the most cost-effective path.

11-You want to implement security on your Ethernet network, but you also want to minimize the amount of administration. Which of the following security models will you implement?.

A-Domain-level security.

B- Share-level security.

C- User-level security.

  1. Server-level security.

Ans: B.

12- Which of the following statements are true of data packets and frames?.

A-Ethernet breaks data down into packages called packets.

B-The ending delimiter on a packet tells it source.

C-A Token-Ring frame has a frame check sequence field that contains CRC error-checking.

D-In a Token-Ring frame the Access Control field indicates whether the frame is a Token frame or a data frame.

Ans: C and D.

13- Which sublayer of the Data Link layer comunicates directly with the network adapter card?.

Ans: Media Access Control Sublayer.

14- Which of the following tasks can be accomplished by a bridge?.

A-Translating networks protocols.

B-Segmenting network traffic.

C-Connecting a Token-Ring segment with Ethernet segment.

D-Connecting a 10BaseT segment with a 10Base5 segment.

Ans: B,C and D.

15- T1 is a widely used type of digital communication line. What does the T1 technology offer?.

A-Transmission speed of up to 1.544 Mbps.

B-Transmission speed of up to 45 Mbps.

C-Point to point. Full-duplex transmission.

D-Two 64-Kbps B channels and one 16-Kbps D channel per line.

Ans: A and C.

16-You are replacing the old Windows NT server on your network with a new Pentium Pro 200 system. What tools can you use to gather perfomance data for your new server?.

A-Windows NT Perfomance Monitor.

B-A protocol analyzer.

C-A time-domain reflectometer.

D-An osciloscope.

Ans: A and B.

17-In a client /server enviroment, tasks are divided between the client computer and the server. Which role does the server play in a client/server enviroment?.

Ans:The server satisfies request from the client computer for data and processing resources.

18-Frame relay is a form of packet switching technology that envolved from X.25.Which of the following best describes the frame relay technology?.

Ans: It transmits variable-lenght frames at the Data Link Layer throught the most cost-effective path.

18- Ethernet uses a special type of data format called frame. Which of the following statement is true of Ethernet frames?.

Ans:All Ethernet frames contain preambles that mark the start of the frame.

19- Networks interface card drivers that come with Windows95 conform to the NDIS standard. Which of the following is an advantage of using NDIS compliant drivers instead of non-compliant drivers?.

A-NDIS compliant drivers are required in order to use NetBEUI.

B-NDIS compliant drivers enable the interoperability of Token-Ring and Ethernet architectures.

C-NDIS complant drivers free transport protocol drivers developers from having to understand propietary API�s in the Media Access Control sublayer.

D-NDIS compliant drivers free application protocol driver developers from having to understand to understand propietary API�S in the logical link sublayer.

Ans: C.

20- A sliding windows size specifies how many packets can be received by a destination computer before an acknowledgment (ACK) is returned.Which of the following initial sliding windows relationships is recomended to provide the best network perfomance?.

A-The send windows size should be greater than the receive window size.

B-The receive windows size should be greater than the send windows size.

C-The send windows size should be the same as the receive windows size.

D-Perfomance will be the same regardless of the relationship between the send windows size and receive windows size.

Ans: A.

21-You can often improve client/server perfomance by reducing the number of network read and write operations per time period.Which of the following would most likely reduce the number of network reads and writes?.

A-Reducing the TCP windows size.

B-Increasing the network packet size.

C-Using Token-Ring instead of Ethernet.

D-Using TCP/IP instead of NetBEUI.

Ans: B.

 

22-Which of the following adjustments to a TCP window is the best way to improve perfomance on

a busy network?.

A-Increasing the send window size.

B-Increasing the receive window size.

C-Decreasing the send window size.

D-Decreasing the receive window size.

Ans: B.

23-78 Locations, 50 to 100 computers per site.Wfw and Windows 95 clients, among others.No metions of NT. What administrative plan to initiate?.

  1. Centralized users accounts, user level security.
  2. Centralized users accounts, resource level security.
  3. Peer to peer with share level passwords

Ans: C.

24-You have many offices, each with many people running Win95 peer to peer. High staff turnover.What do you do to increase security?.

A-Centralize accts, user-level passwords.

B-Centralize accts, share-level passwords.

C-Peer to peer, user level passwords.

D-Peer to peer, share-level passwords.

Ans: A.

25-You have 750 computers on a IPX network, one NT Server, and all the rest are win95 clients.

You want to minimize the amount of administration. What do you use?.

A-Peer to peer.

B-User-level.

Ans: B.

26-Which Operating Systems can assign SHARE level security?.Check all that apply.

A-Windows NT Workstation.

B-Windows95.

C-Windows for Workgroups 3.11

D-Windows NT Server.

Ans: A,B and C.

27- What OS allows you to share and user resource on them?. (Choose all)

A-WfW.

B-Windows95.

C-WinNT WS.

D-WinNT Server.

Ans: A,B,C and D.

 

28-Select all that only use a password on a shared resource:

A- WfW.

B- Windows95.

C-WinNT Wks.

D-WinNT Server.

Ans: A and B.

29-Win95 and NT Servers. What would you implement to minimize the administration required to protect network data?.

A-Centralized account administration with user level security on all shares.

B-Peer to peer with user-level security.

C-Peer to peer with resource level security.

D-Centralized account admi with resource level security.

Ans: A.

30-Can NOT have these duplicate NETBIOS names on this computer, choose all. ?????

A-Computer name.

B- Workgroup name.

C-Domain name.

D-Share name.

Ans: A,B and C.

31-Select all where can you use the same NETBIOS name:

  1. Workgroup name.
  2. Computer name.
  3. Domain name.
  4. Sharename.

Ans: A,C and D.

32-Win95 and NT servers.What would you implement to minimize the administration required to protect network data?.

  1. Centralized account administration with user level Security on all shares.
  2. Peer to peer with user-level security.
  3. Peer to peer with resource level security.
  4. Centralized account admin with resource level security.

Ans: A.

33-What High level of network protocol provides file-sharing on networks that uses NetBios.

  1. IPX/SPX.
  2. TCP/IP.
  3. DLC.
  4. SMB.
  5. RIP.
  6. PPP.
  7. NetBEUI.

Ans: A,B and G.

34-What NDIS and ODI designed to overcome?

Ans: The need for proprietary network interface drivers for each network OS and protocol.

35-You have a Workstation that cannot connect to the network. All other workstation can access all network resources. What is your first step in troubleshooting?.

  1. Run diagnostics on the Worksation�s NIC
  2. Run diagnostics on the Server NIC.
  3. Make sure the Network is properly terminated.
  4. Re-install the Workstation�s network client software.

Ans: A.

36-A Network with 27 servers and 750 clients running NetBEUI, IPX, TCP/IP.

A client running NWLink IPX is installed which is not able to access some shared network resources.All others are able to access. Cause?.

  1. Subnet mask setting on client incorrect.
  2. Protocol mismatch between new client and inaccessible shared resources.
  3. NetBIOS names duplicated.
  4. Cable fsilure between client and inaccessible resource.

Ans: B.

37-What does the MAC driver do?

Ans:It provides low-level access to network adapters by providing data transmittion support and some basic adapter management funtions.

38- What does the transport protocol do?.

Ans:It defines how data should be presented to the next receiving layer, packages the data accordingly, and the passes data to the aplication thought the session layer interface.

39-What�s the purpose of NDIS?.

Ans: Allow network cards to be independent of the protocols.

40- Your company has 78 locations, with 50 to 100 computers in each location. The client computers run various operating systems, including Microsoft Windows for Workgroup and Microsoft Windows95. The employee turnaround rate is high.

  1. Centralized administration of user accounts, with user-level security on all shared resources.
  2. Centralized administration of user accounts, with resource �Vpassword security on all shared resources..
  3. Peer to peer file sharing, with resource-password security on all shared resources
  4. Peer to peer file sharing, with user-level security on all shared resources.

Ans: C.

41- A higher level protocol which allows files sharing.

  1. TCP/IP
  2. DLC
  3. IPX/SPX
  4. NerBEUI.
  5. SMB
  6. AFT (appletalk file).

Ans: E.

42-What do NDIS and ODI give you?

Ans: NICs idependent from protocol.

43--Can you tap an FDDI network?

Ans: Nope.

44- What works at transport and above layer of the OSI?

Ans: Gateway.

45-Mixed Dos, Unix, NT. New NT server is added, but Only the Unix system cannot see it.

Ans:Protocol mimatch.

45-One storey building, bunch of computers to hook up and no pre-installed cable in the building.You have 1 meter of ceiling space. Which would you install? (No mention of cost)

A-Coax.

B-Fiber.

C-UTP.

D-STP.

Ans: A

46-Connect Netbeui on network segment to UNIX on NFS. What do you use?.

Ans:Gateway.

47-A new client is introduced running NWLink IPX protocol and it can�t see some shared resources. What could be wrong?.

A-Subnet mask is wrong on client.

B-Protocol mismatch.

C-NetBIOS name duplication.

D-Physical cable failure.

Ans: C.

48-.You measure a thinnet reading will you get?

Ans: 25 Ohmios. (Inpedancias acopladas en paralelo).

49-You have offices in Atlanta, New York, and Los Angeles.You want to connect the 3 offices in a WAN.

Required Results: They must have comunication of at least 1 Mbps.

Optional Desired Results: They must be able to communicate at 1Mbps even if one link fails.

 

Solution: Put a RAS server at each site and have 6 28.8 Kbps lines going between all 3 sites.

Ans: The proposed solution does not produce the required result.

50-You have a one-story building and a bunch of computers to hook up with no pre-installed cable in the building.You have 1 meter of ceiling space.Which would you install?. (No mention of cost).

A-Coax (plenum).

B-Fiber.

C-UTP.

D-STP.

Ans: A.

51-You plan to install a 100Mbps network with 95 users and 1 server which will be housed in the cable room.The building has a suspended ceiling with 1 metre ceiling space. What cabling would you use?.Cost should be kept to a minimum.

A-Coax.

B-Fibre Optic.

C-UTP.

D-STP.

Ans: C.

52-There are a couple of servers in the wiring closet of a building with a 1 meter "overhead" ceiling. Which type of cable should you use for the network if you have to support 1Mbps speeds and keep cost to a minimum.

A-Coax.

B-STP.

C-Fibre Optic.

D-UTP.

Ans: A.

53- You want to connect two Ethernet LANS that use NWLink and NetBEUI and want to filter data and cut down the traffic.What device?.

Ans: Brouter

54-Netbios Scheme 1.

Required- the scheme will work when WAN introduced.

Opt1-Identify Servers by Location, Departament, Number.

Opt2-Workstations by principal user.

Proposed-Unique 15 Hex for Netbios Name.

Ans: Meets required but no optional.

55-Netbios Scheme 2.

Opt1-Identify Servers by Location, Departament, Number.

Opt2-Workstations by principal user.

Proposed-Server 58 digit location code, 5 digit departament code and 2 digit number to differntiate between multiple departamental servers.Workstations by 15 digit email address of principal user.

Ans: Meets required and both optionals.

56-Had a scenario where there were say 3 servers and 200 total computers running TCP/IP.No bridges or routers.Utilizations at 70%.

Required: _Cut to 50%.

Options least cost.

Provide for future additions.

Solution: Was whole FDDI thing at 100 Mbps.

Ans: Met required and one option.

57-Connect NetBEUI on network segment to UNIX on NFS. What do you use?.

Ans: Gateway.

58-Tom can log on to the network but cannot connect to a server on another segment using that server�s netbios name. What is wrong?.

A-Tom�s computer in not registred in the network naming server.

B-The server is not registred in the network naming server.

Ans: A.

59-You are installing a network in a building with 1foot space in a suspended ceiling. What kind of cable should you use?.

A-STP

B-Coax.

C-Fiber Optic.

D-UTP.

Ans: B.

 

60-Which WAN link makes the customers to be able to send any type of transmission?.

A-ISDN.

B-ATM.

C-Frame Relay.

D-X.25

Ans: C.

61-A LAN is experiencing a heavy broadcast traffic.

Required: To reduce the broadcast traffic by 50%.

Optional: To eliminate the broadcast.

Allow the segment be able to extended.

Rectify any signal attenuation.

Proposed Solution: Use a Bridge to segment the network.

Ans: The proposed solution doesn�t produce the required result.

Bridge don�t stop the broadcast.

 

62-Which runs at or above Transport layer?.

Ans: Gateway.

63-Large LAN using Macs+PCs running NetBIOs TCP/IP, SPX/IPX and Appletalk Win NT servers with brouters.

Problem is broadcast storm.

Required Result: Cut broadcast by 50%.

Optional results:

1-Minimum hardware costs in proposed solution.

2-Achieve minimum maintenance cost after change.

3-Allow for continued expansion of network.

Solution.

Disable NetBIOS in Brouter and set all Windows PCs to run on TCP/IP.Configure all servers to run Appletalk and TCP/IP.

Ans: Yes it meets the required result and all of the optional results.

64-You have a workstation that can NO LONGER access the network. Which is most likely the problem?.

A-The frame type on the workstation�s NIC is incorrectly configured.

B-The network cabling to the workstation�s NIC is loose or disconnected.

C-The workstation is running the wrong network comunication protocol.

D-The workstation�s RAM is defective.

Ans: B.

65-When running WINS to resolve NetBIOS computer names, which is it important?.Check all that apply.

A-To make sure that no computers on the network has the same name.

B-To make sure that no computer has the same name as a domain on the network.

C-To make sure that no computer has the same name as a workgroup on the network.

D-To make sure that no computer has the same as a server on the network.

Ans: A,B and D.

NOTES.

-Bridges cannot recognize network hardware adresses..

-Peer to peer network is a special type of client/server network.

-10BaseT and 100BaseX networks use a Star bus topology.

-Bridge are less expensive with a Brouters.

-T3 Lines are more expensive whith T1 lines.

-ATP use information stored in routing tables.

-EIA/TIA category 5 is UTP.

-An Ethernet switching hub works at the Media Access Control (MAC) sublayer much like a bridge.The first packet destined for a particular address causes a dedicated circuit to be set up throught which subsequest packets are routed.

-NetBIOS broadcasts are only received by computers on the local subnet.

-A local HOSTS file can be used as a local DNS equivalent.

-The Microsoft Systems Management Server (SMS) are provided remote control of client machines.

-Set the frame type only if the network uses more than one frame.

-Brouters will allow the broadcast to pass throught if the brinding is enables, if disabled will only allow the protocol to pass throught and no broadcast.. ( Remember NetBEUI in non-routable).

Jitter= Instability in a signal wave form over time that could be caused by signal interference or an unbalanced ring in FDDI or Token Ring enviroments.

 

-Q about replacing 10BaseT with FDDI and all the adapters�XFullfills req�d and only 1 optional�X(doesn�t fulfill ��low cost��).

-Q about turning off the routers function on the brouters as the cheapest soluction.

-Changing packet size from 1514 bytes to 576 bytes?. My research states opposite. You can often improve client/server perfomance by reducing the number of network read and write operations per time period by increasing the network packet size.

-Increase TCP windows from 4096 to 16384?. My research indicates that adjustments to a TCP window is the best way to improve perfomance on a busy network by increasing the receive windows size.

-Which link is not switcheable?---T1.

-RG-58 /U=Solid copper core- 50ohm impedance.

-RG-58 A/U=Stranded wire core.

-Brouters will allow the broadcast to pass throught if the brinding is enables, if disabled will only allow routing protocol to pass throught and no broadcast. (remember NetBEUI is non-routable).

-Redirector:Detemine the level of sharing betwwen network rsources and intercept request and forward the computer.

-Client/server=Client makes request, server does back end processing.