1) you have a network with 10 workstations, all windows NT wks. You want to implement access control os users over some directries.
a) user level permissions *
b) share level permission
cuz NT wks, supports user level permssions on ntfs.
2) you have 2 LANs, one using ethernet and other using token ring. Both the lans are using NetBeui and Nwlink, You want to connect both the LANs and still want to use the BOTH protocols.
a) REPEATER
b) BRIDGE *
c) ROUTER
d) GATEWAY
Cuz router doesn't support netbui and you want both the protocols. Gateway is for protocol translation.
3) in your ethernet bus network, some clients, "some time" can NOT connect with the server. (an exhibit showing you the network and its configuration) what would you re-cofigure.
a) termintors
b) ground
c) cable break
d) reinstallation of client software *
e) change with 25 ohm terminator
the figure showed, that you have cable UNBREAKED, both ends terminated with 50 ohm & both grounded, so the last option is D
4) you have 10 NT server, 700 NT client computers. You want to segment the network with routers. What protocols can you use.
a) DLC
b) NETBIEU
c) NWLINK/IPX/SPX *
d) APPLETALK
e) TCP/IP *
NT supports only these ROUTEABLE protocols
5) your network has 8 NT servers. And 300 NT clients. Connected with routers and bridges. You r going to add more 300. User complain network lagging. What to do.
a) disable bridging on bridges
b) replace the protocols with tcp/ip
c) segment the network *
d) (Uhuppsss‘—..forGot!!!!)
6) you have a network where computers can communicate with each other by IP address but not with Netbios names. What to check.
a) DNS
b) Routers
c) WINS *
d) Repeaters
e) DHCP
f) Gateways
7) three lans in three buildings 1000 meter apart. Each on 2 floors. Want to connect (in the lan) computers with a centralized.
Req: faultfree proper networking
Optnal: easy to work and maintain Easy to add computer in future
Prop: install thinnet.
Produces req and all optional (three/four questions of the same kind)
8) an exihibit, you own a token ring network. Star bus topology. One server connected with one end in ONE star. Users complain slow network. You observe that on ONE star where the server exists, clients are transmitting extremely.
You want to DISTRIBUTE the servers responsibility and segment the network.
(this is adaptive question) Solution. Drag the bridge (from left-side column) and drop between the two STARs. And pick an application server (from the same place) and add it on the OTHER star.
9) in a network, one computer named CORP-1, DATA a directory on the same server containing some files of Human Resrc. Dept. the directory shared with the sam name; DATA. A group named HR has change permissions for that folder \CORP-1. No one else except the group has access to that folder. What kind of access permission will you apply.
a) File level
b) share level
c) user level *
d) hardware
10) you are introducing APPLICATION server to a firm. What should you say.
a) both application and file/print servers can store data *
b) application server processes server side as far as client side application process *
c) application server gives file/print services
d) (Uhuppsss‘—..forGot!!!!)
11) secrued delivery on Unreliable medium.
a) X.25 *
b) ISDN
c) ATM
d) T1
12) thre lans want to connect with one headquarter MAINFRME running token ring.
What wan technology works.
a) X.25 *
b) ISDN
c) T1
d) ATM
Cuz x.25 was used to connect mainframe and it uses PAD
13) the mainframe and pcs. Want to connect. What device used.
¡¡
Ans. Gateways
14) a lady (Uhuppsss‘—..forGot!!!!) using tcp/ip for 5 years. His dial up protocol doesn't support automatic IP address. Which protocol.
Ans. SLIP
15) 10 client computer with Win NT workstation. Which kind of access control and control access to file and directries on the network? Choose all that apply.
a) User & group access control to each shared resources *
b) Supply passwork for each shared resources.
¡¡
Twisted Pair Cat5 - running 180m what would you need? Repeater
Segmented Lans, How do you create them? Routers, Bridges
Which protocols are routable/not routable? Routable: XNS,OSI,IP,IPX,APPLTALK,DecNet Non-routable: DLC,LAT,NETBEUI, UDP
What do you use for Peer to Peer? no Netbeui, then IPX/SPX
Reading of 0 ohms on thinnet cable,Tconn, and terminator. Whats wrong?
Finding the available bandwidth?
Using the TDR, you get readings XYZ. What does it mean?
What do ODI and NDIS allow you to do?
Which supports compression and error control? PPP , not SLIP
Bridge, What OSI level?
Router, What OSI level?
Gateway, What OSI level(s)?
What diagnostic device examines packets?
Difference between share level and user level security/access?
Which can support 100Mbps?
Which is a feature of WinNT 4.0 WS? User level passwords
Which is a feature of Win95 WS? Share level passwords for resources
If upgrading to 100BaseTX, What else needs to be upgraded?
What IRQ's are used by what devices?
What is the terminator resistance for Thinnet? 50 ohm
What does an Application Server do?
What does a File/Print Server do?
Can you mix RG 58 A with RG 58 A/U in a 10Base2 network between terminals?
You have a 5 user Peer to Peer WFW network. Waht protocol do you use?
Which switching service would allow a WAN link of 100Mpbs?
Define what a Protocol Analyzer?
Define what a TDR does?
Define what a Packet analyzing tool do?
Define ATM.
Define Frame relay technology.
Define Gateway
Define Routers
Define Interconnectivity between Netware, Apple, and NT
Define the IPX frame size
Define the TCP window size
Know what a mesh technology network looks like. How do you check the cables?
Where does SMB reside?
Where does DLC reside?
Read page 176 in MS book
What does a multiplexer do?
Understand Ethernet Switches
what speed cna X.25 and Frame Relay Support?
What is a PAD?
Understand the Raid levels? How many are there?
How many characters are in a NetBIOS name? What are not allowed?
What kind of errors can a multimeter find?
What kind of errors can a Protocol Analyzer find?
What kind of errors can a Time Domain Reflectometer find?
What kind of errors can an Oscilliscope find?
What should you look at if using an IPX/SPX protocol and the WS is not seen?
What protocol is used to determine the number of hops to a destination?
What are the diffrences between 10base2 and 10baset?
What cable type is 802.3 refering to?
What protocols are not routable?
Which protocols are routable?
How does the OSI model pertain to hardware?
What can ATM and FDDI be used for?
Which can be used for at least 100Mbps?
What is Packet switching used for?
When and what do T1 lines used for?
How long can the cables be for the following: 10baset,10base2, 10base5, etc.?
What are the following cables used for: RG8,RG11, RG58, RG62?
What are the bandwidths of the following network services: ATM, X.25, ISDN,
Frame Relay, etc.?
Can you wire tap a FDDI line?
What are the followinf Acronyms: DHCP, WINS, NFS?
What kind of errors can a Sniffer find?
What would you use to resolve broadcast storms?
What RAID levels does NT support?
What is Hot-fixing or Sector sparing?
What is Jitter?
How does Crosstalk happen?
Who uses CSMA/CA?
What is a spanning tree Algorythm used for?
Is Decnet routable?
What What is the name of the "number sequence" you need for IP adresses?
You can ping a server by it's IP but not by its name, whats wrong?
You have a 4Mbps Tokenring connected to an Ethernet, A 5MB file takes
30 sec going from TR to Ether. It takes 2 min going from Ether to TR.
Why? (nightmare question)
(thank you Brave for this stuff)
Where is it important NOT to have equal Netbios names?
What is the UNC, and what is it for?
Using Performance Monitor, What can you do with it specifically?
What can transfer Video, Audio, and Data?
What happens if you try to mix Frame types on an Ethernet?
What are the I/O base memory and Base memory settings on a NIC for?
Does PPP or SLIP provide compression and error protection?
What is the difference between Broadband and Baseband?
What is the access point?
Never forget me (Brave)
What is the 5-4-3 rule?
What kind of security is provided by RAID 0?
What is a transciever and where would you find one?
Can you connect Thicknet to Thinnet with a transceiver?
If your CPU is at 100% usage , what should you do?
What is CSMA/CD?
How is a runt created?
What is a Jam and when is it created?
What is a heart beat and what should you do about?
What is an AUI / DIX used for?
¡¡
¡¡
¡¡
¡¡
¡¡
¡¡
¡¡
#1) You connect a client computer to the network that uses NWLink IPX. You cannot access network resources, and you conclude that it is not a hardware problem. What is the problem?
ANS: Incorrect Frame Type
#2) You have 3 servers that run NT Server, 75 client computers that use NetBEUI. You want the client computers to be able to access a UNIX computer. The UNIX computer uses NFS. You do not want to add any new software. What device should you use?
ANS: Gateway
#3) What is the benefit of NDIS and OSI?
ANS: They allow network adapters to be independent of any particular transport protocol.
#4) You want to implement a WAN for 3 existing networks in Chicago, Atlanta and Los Angeles.
REQ. Must be able to communicate with all other computers on the 3 networks and the WAN link must be capable of 1Mbps.
OPT. Provide continuous communication in case of a single link failure, and provide continuous communication at a minimum of 1Mbps in the event of a single link failure.
PROP. Connect the 3 networks by using two T1 links as shown in the diagram. (Diagram shows one T1 line between Chicago and Atlanta, the other between Chicago and Los Angeles)
ANS: The proposed solution provides the required result but neither of the optional results.
#5) You are designing a peer to peer network consisting of 5 Windows 95 computers. What protocol should you use?
ANS: NWLink IPX
#6) Your network uses NWLink IPX. You initialize a client computer and the network software appears to load successfully, but the client is not able to access the server. All other computers are able to access the computer. What is the problem?
ANS: Wrong frame type in the client computer.
#7) Match the following definition to the networking term.
A high level networking protocol that provides file sharing services on networks that use NetBIOS?
(Choose only one) *Not sure of the answer on this one, so here are your choices.
A. IPX/SPX
B. TCP/IP
C. DLC
D. SLIP
E. PPP
F. NetBEUI
G. SMB
H. RIP
I. AFP
J. NCP
#8) You need to implement a NetBIOS naming scheme. You will be connecting to a WAN in 2 years.
REQ. Successfully implement a NetBIOS naming scheme and the scheme must continue to work after the WAN is connected.
OPT. Name should describe the servers department or function, and client computer names should describe the primary user or function.
PROP. Assign a unique hexadecimal 15 digit number.
ANS. The proposed solution provides the required result but neither of the optional results.
#9) You want to connect an Ethernet and Token Ring. Both use NWLink IPX. You want to use IPX addressing to limit the amount of traffic between the 2 networks. What device should you use?
ANS. Router
#10) Exhibit: ox------+-----+-----+-----+-----xo
o= ground
x= 50ohm terminator
+= T connector to computer
Sometimes clients on the network are not able to access the server. What should you do to restore reliable network communication?
ANS. Ground the network properly.
#11) Which MS operating systems give access to shared resources, to any user who has the password assigned to that resource. (Choose all)
ANS. Windows for Workgroups, and Windows 95
#12) You install an Ethernet network adapter in a client computer. The network software is initialized successfully but the client computer is not able to communicate with other computers on the network. All other computers are able to communicate successfully. What is the problem?
ANS. The transceiver setting of the NIC is incorrect.
#13) You want to connect 2 Ethernet networks. You want to use both NetBEUI and NWLink IPX and limit the amount of traffic between the 2 networks. What device should you use?
ANS. Router (Brouter was not a choice)
#14) You just converted a network from NetBEUI to TCP/IP. The server and clients are on different subnets. >From the clients you can ping the server by using the IP address but you cannot access the server by using the server name. What is the problem?
ANS. Servers name is not registered with the name server.
#15) What must you specify using UNC? (Choose 2)
ANS. Share name, and Computer name
#16) You work for a large corporation. The corporation has multiple subsidiary's. The corporation uses a WAN to carry all data. The corporation wants to implement audio conferencing and video conferencing over the WAN. They also want to provide this to the subsidiary's. What technology should they use as the WAN backbone?
ANS. ATM
¡¡
<±âÃâ ¹®Á¦ ¸ðÀ½>
visit http://www.LearnQuick.Com
Everyone,
Here is my personal dump. I'm going to refer to the list of questions (#1-#86) listed after the dotted line. These questions are a compilation of Dump questions from this site. I only listed complete (or mostly complete) questions with the possible answers.
The following questions from my list are of special interest. KnowhatImean?
#1, #2, #3, #5, #6, #7, #13, #22 (#22 read a little different, but the logic was the same), #23 (this question also read a little different), #25, #26, #27, #66, #81
I had several Router/Gateway questions, there are so many variations I couldn't tell you what they were exactly. The questions I had were always either a Router or Gateway and never a hub, a repeater, and a Brouter was never an option. The router questions mentioned using TCP/IP as the only protocol and the gateway questions always mentioned something regarding some type of translation.
Absolutely nothing came close to referring to the OSI model. Nothing. Zip.
Zilch. Nada... you get the picture.
Another question not in my list below-
You want to connect 9 Ethernet LANs that use UTP on 9 floors of an office building. What backbone do you use. You want it to be inexpensive. (The question did not mention if it was CAT 5 or CAT 3 wiring) a. fiber optic
b. UTP
c. STP1
d. Human Nerve Fibers (I forgot what it really was) A Coaxial backbone was not an option.
¡¡
If you install a Net Card, what can conflict (choose all that apply)
a. COM2
b. LPT1
c. Mouse
d. Sound Card
¡¡
One click and drag question. The question was something like- You are setting up a network. You want your computers to operate as efficiently as possible. Then they gave you the options of-
a. Application Server
b. File Server
c. Print Server
d. Client computer
and you match these with.... (these are not exact specs, but they are four distinctly different systems)
1. 450Mhz 128meg 12gig HD
2. 300mhz 64meg 4.2HD
3. 200mhz 32meg 3.1HD
4. 100mhz 16meg 1.2HD
(If you wanted to, you could make everything a File server, or a client, etc.)
Here comes my massive collection of questions - these were all found on this site. I just cleaned up some things and weeded out some others for ease of reading. Hope this helps. Remember, questions #1, #2, #3, #5, #6, #7, #13, #22, #23, #25, #26, #27, #66, #81 are of special interest.
¡¡
--------------------------------------------------------------------------------------------------------------------------------------
#1 - You have a DHCP server and WINS server. Your are using TCP/IP You can
communicate with the network using the IP address, but not when using the
servers name.
What do you examine first?
A.DHCP server.
B.WINS server
C.Gateway
D.Router
¡¡
#2 - You want to monitor and manage hubs, bridges and routers on the
network.
What do you use?
A.Performace Monitor
B.SNMP implementation
C.Protocol analyzer
D.TDR
¡¡
¡¡
#3 - You have a network using NetBEUI and TCP/IP. The server and client are
in different
subnets. The client can PING the server, but cannot access the server using
its
name.
A.Client and the server have the same IP address
B.Server has the wrong subnet mask.
C.Server's name not registered with the name server.
D.Client's name not registered with the name server.
¡¡
#4 - Large network with 2000 users users notice that at various times in the
day network
time outs occur.
What is the reason?
A.Power fluctuations.
B.Malfunctioning net adapter on the router.
C.Terminated segement.
D.Logging of users.
#5 - You have a network that uses T1 and is connected to the internet. Which
backup
connection could you use to support e-mail in the event of failure.
A.T3
B.ATM
C.ISDN
D.?
¡¡
#6 - Which data link communications protocol provides connections between
computers via dial-up telephone lines? (Choose all that apply)
A. SLIP.
B. PPP.
(Yes, only two options are given)
#7 - TCP/IP network, want to track how many users who connect to 15 NT
server machines and 5 routers, what utility do you use?
a.Performance Monitor
b.Server Manager
c.SNMP
d. Ipconfig utility
¡¡
#8 - Network with NT server, win95 client, macintosh clients. Network is
using brouters and TCP/IP, Appletalk, and NetBEUI.
require: reduce broadcast storm and network trafffic 50%.
optional: minimize cost.
minimize administrative cost.
allow network continue to expand.
propose: Turn off bridging on brouter. Configure win95 client to use TCP/IP.
Configure all servers and brouters to use TCP/IP and Appletalk.
a.meet required and all optional.
b.meet required and only 1 optional.
c.meet required only.
d.doesn't meet any.
¡¡
¡¡
#9 - Which network topology provides guaranteed access for each computer on
the network?
A. star.
B. bus.
C. ring.
D. linear.
¡¡
#10 - Your company's network uses a 100Mbps backbone. Network traffic is
nearly at capacity. Users report that network time is slow. You are
planning to upgrade the network. Which WAN technology should you implement?
A. Ethernet
B. token-ring.
C. FDDI.
D. X.25.
E. ATM.
¡¡
#11 - You manage a network that has 1 NetWare server and 25 Microsoft
Windows for Workgroup computers. The NetWare server and the client
computers are running IPX/SPX. The NetWare server runs your database. Which
type of networking is in use on this network? (Choose 2).
A. collaborative computing.
B. Microsoft NT Domain.
C. client/server.
D. peer to peer.
¡¡
#12 - You want to manage Microsoft Windows NT server computers that are
located on remote subnet. All of these servers are configured in a single
Windows NT domain. You will manage these servers from another Windows NT
server computer that is located in your office. You want to use User
Manager and server Manager to manage the remote servers. What should you
install and configure to resolve the computer names of the servers? (Choose
2).
A. DNS server.
B. DHCP server.
C. WINS server.
D. LMHOSTS file.
E. RAS server.
#13 - You have Microsoft Windows Workstation 4.0 computer that runs TCP/IP.
This computer connects to the Internet by using a modem and a dial-up
connection. You want to connect your computer to an Ethernet network. You
install a network adapter card and connect the network adapter to the
physical network. Which type of network adapter driver must you install?
A. NDIS 2.0.
B. NDIS 3.0.
C. NDIS 3.1.
D. ODI.
¡¡
#14 - Which 2 protocols use connection-oriented communication?
A. IPX
B. SPX
C. TCP
D. IP
E. UDP
¡¡
#15 -What is a benefit of installing an application server to store and
manage a database?
A. An application server centrally manages all user accounts.
B. An application server stores more data than a file-and-print server does.
C. An application server transfers only the results of database queries to
client computers.
D. An application server transfers the entire database to client computers.
¡¡
#16 - What is a benefit of using an application server instead of a
file-and-print server?
A. An application server retrieves data and sends data to client computers
more efficiently than a file-and-print server does.
B. An application server manages file and record locking more efficiently
than a file-and-print server does.
C. An application server manages user access to network resources.
D. An application server distributes processing among all client computers
on the network more efficiently than a file-and-print server does.
¡¡
#17 - You are assigning a NetBIOS name to 10 of the client computers on your
network. Which is a valid NetBIOS name for this computer?
A. The name of a share on 1 of the network servers.
B. The computer name 1 of the network servers.
C. The name of a domain on the network.
D. The name of a workgroup on the network.
¡¡
#18 - Which WAN faster than 100Mbps?
A. ISDN Basic rate interface.
B. X.25.
C. T1.
D. ATM.
¡¡
#19 - Which device can you use to identify the defective network adapter?
A. protocol analyzer.
B. volt-ohmmeter.
C. optical time domain reflectometer (OTDR).
D. time domain reflectometer (TDR).
¡¡
#20 - What is a characteristic of connection-oriented communication?
A. It provides fast but unreliable delivery of datagrams.
B. It provides assurance of packet delivery.
C. It uses store-and-forward techniques to move datagrams between computers.
D. It uses message-oriented communication for processing e-mail.
¡¡
#21 - What must you ensure that a NetBIOS name does not duplicated?
A. Computer name on the same network.
B. Domain name on the same network.
C. Workgroup name on the same network.
D. Share name on the same network.
#22 - You are designing a peer-to-peer network that consists of 5 Microsoft
Windows 95 computers. Which protocol should you use?
A. DLC.
B. NFS.
C. NWLink IPX.
D. XNS.
¡¡
#23 -What is a benefit of both NDIS and ODI?
A. They allow network adapters to be used in any compliant computer.
B. They allow network adapters to transmit information over a greater
distance than non-compliant network adapters can.
C. They allow network adapters to communicate with other compliant network
adapters.
D. They allow network adapters to be independent of any particular transport
protocol.
¡¡
#24 - You want to connect your Ethernet and token-ring networks. Both
networks use NWLink IPX. You want to use IPX addressing to limit the amount
of traffic between the 2 networks. Which device should you use?
A. repeater.
B. bridge.
C. router.
D. gateway.
#25 -You are designing a security plan for your network. The following table
summarizes the current network
configuration.
Server: 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1
is the BDC.
Client Computers: 100, which run Microsoft Windows 95
Network Type: 10BaseT Ethernet
Required result:
You must have centralized control of access to shared resources.
Optional desired results:
You want to track all access and attempted access to shared resources.
You want to track attempts to guess user passwords.
You want to implement a method to protect user accounts from
password-breaking programs.
Proposed solution:
Implement NTFS with user-level security on all servers. Set appropriate
access-control security on all shared resources. Require users to change
their passwords every 40 days. Implement disk striping with parity on all
servers. Perform daily tape backups, and store tapes in a secure off-site
location.
Which results does the proposed solution produce?
A. The proposed solution produces the required result and produces all of
the optional desired results.
B. The proposed solution produces the required result and produces only 1 of
the optional desired results.
C. The proposed solution produces the required result but does not produce
any of the optional desired results.
D. The proposed solution does not produce the required result.
¡¡
#26 - Network monitoring shows that network utilization has grown from 30
percent to 70 percent of maximum capacity in the past year. You will add 24
client computers and 1 server within 3 months. You want to reduce network
utilization.
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the
planned additions to the network are implemented.
You want to minimize costs for the project.
Proposed solution:
Change the maximum packet size on all of the computers from 1,514 bytes to
576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable.
Increase TCP window size from 4,096 bytes to 16,384 bytes. Which results
does the proposed solution produce?
A. The proposed solution produces the required result and produces all of
the optional desired results.
B. The proposed solution produces the required result and produces only 2 of
the optional desired results.
C. The proposed solution produces the required result but does not produce
any of the optional desired results.
D. The proposed solution does not produce the required result.
¡¡
#27 - What can enable client computers to browse NetBIOS names on all
subnets of the network?
A. WINS server.
B. DHCP server.
C. router.
D. NetBIOS broadcast.
¡¡
#28 - You are designing a 100-Mbps network. Which media should you use?
A. RG-58 A/U coaxial cable
B. spread-spectrum radio
C. Category 5 UTP cable
D. Type 1 STP cable
#29 - You connect a client computer to a network that uses NWLink IPX. The
client computer is not able to access any network resources. After
investigation, you decide that hardware is not causing the problem. What is
the most likely cause of the problem?
A. incorrect subnet mask on the client computer
B. incorrect IP address on the client computer
C. incorrect frame type on the client computer
D. corrupted WIN.INI file on the client computer
¡¡
#30 - What is the best way to create report that logs network activity.
a) Volt-ohmmeter
b) Oscilloscope
c) Protocol analyzer
d) TDR
¡¡
#31 - 3 Windows NT Servers and 75 Clients using NetBEUI protocol. You want
to communicate these computers with UNIX that uses NFS file system. You
don't want to install new software. What is the best way to solve this
problem?
a) Bridge
b) Brouter
c) Router
d) Gateway
¡¡
#32 - You installed a new network adaptor card. And supplied network
software initialized successfully. But you can not communicate with other
computers even though other computers operating successfully. What's the
reason?
a) Transceiver setting is incorrect
b) I/O port address is incorrect
c) Cable segment is not properly terminated
d) Packet size setting is incorrect
¡¡
#33 - You suspect your network has been experiencing Broadcast storms.
Which
indicators would indicate broadcast storms: (choose all that apply)
a] network time-outs
b] bad ip address errors
c] network utilization is 100% for periods of time
d] can't remember something ridiculous
¡¡
#34 - What upper level protocol is used for NetBios file services?
a]nwlink
b]tcp
d]decNet
e]ipx
f]spx
g]netBeui
h]smb
i]ncp
¡¡
#35 - Your network is experiencong slow downs. You want to speed up the
network. You want to help the PDC out by adding devices to split the
functions of it: drag the devices on the left hand side to the ? mark:
¡¡
<<...>>
¡¡
¡¡
#36 -What must you specify when you want to copy a file from 1 computer to
another by using a UNC name? (Choose 2.)
A. share name
B. domain name
C. computer name
D. workgroup name
¡¡
#37 - What is a characteristic of a client/server networks?
A. Any computer can make its resources available to any other computer
on the network.
B. Dumb terminals are connected to a central host computer that performs
all processing.
C. Any computer on the network can be both a client and a server.
D. Client computers access a server that performs back-end services.
#38 -What is a characteristic of connection-oriented communication?
A. It provides fast but unreliable delivery of datagrams.
B. It provides assurance of packet delivery.
C. It uses store-and-forward techniques to move datagrams between
computers.
D. It uses message-oriented communication for processing e-mail.
¡¡
#39 - This device functions at or above the Transport layer of the OSI
model. It acts as a translator between 2 computers that use different
protocols or data formats.
A. gateway
B. bridge
C. router
D. repeater
¡¡
#40 - What is a characteristic of the IEEE 802.3 10BaseT standard?
A. It specifies RJ-11 connectors at the ends of each cable.
B. It specifies UTP cable.
C. It specifies BNC T-connectors for connecting computers to cables.
D. It specifies 50-ohm terminators at the ends of each cable.
¡¡
#41 - What is a characteristic of the IEEE 802.3 10Base2 standard?
A. It specifies Category 3 DIP cable with a maximum cable length of 100
meters.
B. It specifies RG-11 C/U coaxial cable with a maximum cable length of
500 meters.
C. It specifies BNC T-connectors for connecting computers to cables.
D. It specifies RJ-45 connectors at the ends of each cable.
¡¡
#42 - What is a purpose of NDIS?
A. to allow any compliant transport protocol to pass data to any
compliant network adapter
B. to allow any compliant transport protocol to pass data to any
compliant network redirector
C. to define the common signaling scheme that all vendors' adapters use
when transmitting packets
D. to define the voltage levels that must be applied to the pinouts on
the network adapter's 15 pin AUI connector
#43 - You want to install a 100-Mbps backbone network that will connect 5
existing networks. Which media should you use?
A. Category 3 UP cable
B. Category 4 UTP cable
C. Fiber-optic cable
D. RG-58 A/U coaxial cable
¡¡
#44 - You are designing a 100-Mbps Ethernet network for a building that has
existing UTP cable. You test the existing cable and decide that it meets
Category 3 specifications. Which media should you use?
A. the existing cable
B. new Type 1 STP cable
C. new Category 4 UTP cable
D. new Category 5 UTP cable
¡¡
#45 - You are designing a 100-Mbps network. Which media should you use?
A. RG-58 A/U coaxial cable
B. spread-spectrum radio
C. Category 5 UTP cable
D. Type 1 STP cable
¡¡
#46 - Which protocol is routable? (Choose 3.)
A. AppleTalk
B. TCP/IP
C. NWLink IPX
D. NetBEUI
E. DLC
#47 - You want to segment your 200-node network into 3 subnets. The network
uses TCP/IP.
Which device should you use?
¡¡
A. repeater
B. bridge
C. router
D. gateway
¡¡
#48 - Your network has 250 client computers. The network uses both TCP/IP
and NetBEUI. You want to segment the network into 3 subnets. You want to
allow all of the computers to use both of the protocols to communicate with
computers on all 3 subnets.
Which device should you use?
A. repeater
B. brouter
C. router
D. gateway
¡¡
#49 - Which networking device is used to translate protocols?
A. bridge
B. hub
C. gateway
D. repeater
¡¡
#50 - Your l0BaseT Ethernet network uses NetBEUI. Users of your client
computers need to access an IBM 3090 mainframe computer by using a 3270
terminal-emulation program.
Which device must you install?
A. bridge
B. gateway
C. router
D. brouter
¡¡
#51 - You want to connect 2 computers by using l0BaseT Ethernet cable. The
computers are located more than 300 meters apart.
Which device should you use?
A. repeater
B. amplifier
C. multiplexer
D. gateway
¡¡
#52 - You want your WAN to allow simultaneous transmission of voice, video,
and data. Which WAN connection
service should you use?
A. 56-Kbps digital line
B. X.25
C. Frame relay
D. ATM
¡¡
#53 - Which type of WAN connection service is intended to replace standard
analog telephone service?
A. ISDN basic rate interface
B. X.25
C. Frame relay
D. 2.048-Mbps digital line
¡¡
#54 - You are designing a WAN that uses X.25. Which device should you
include in the design?
¡¡
A. gateway
B. packet assembler-disassembler (PAD)
C. multiple-layer interface driver (MLID)
D. multiplexer
¡¡
#55 - Your company has an Ethernet network with 750 computers. The company
is migrating to servers that run Microsoft Windows NT Server and to client
computers that run Microsoft Windows 95. You want to protect sensitive
network data, with a minimal amount of administration. What should you
include in your security plan?
A. peer-to-peer file sharing, with user-level security on all shared
resources
B. peer-to-peer file sharing, with resource-password security on all
shared resources
C. centralized administration of user accounts, with user-level security
on all shared resources
D. centralized administration of user accounts, with resource-password
security on all shared resources
¡¡
#56 - Situation:
You are designing a disaster prevention and recovery plan for your network.
The following table summarizes the current network configuration.
¡¡
Server
2 total - both run Microsoft Windows NT
server, 1 is the PDC and 1 is the BDC
Client Computers
100, which run Microsoft Windows 95
Network Type
10BaseT Ethernet
You have done the following:
. Placed all confidential data on the servers
. Placed the servers in a locked room
. Implemented NTFS user-level security on the servers to allow only specific
personnel to access the data
Required results:
You must protect the servers from hardware failure. However, periods of
downtime of less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from loss
¡¡
Optional desired results:
You want to track all accesses to the data files.
You want to put reasonable methods in place to protect network data from
virus corruption.
Proposed solution:
Connect UPS to each server.
Set appropriate access-control security on all shared resources.
Implement disk striping with parity for each server's hard disks.
Do daily tape backups of the data, and store the tapes in a secure off-site
location.
Implement virus scanning on all client computers and servers.
Which results do the proposed solution produced
A. the proposed solution produces the required results and produces both
of the optional
desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the optional desired results.
D. the proposed solution does not produce the required results.
#57 - Situation:
You are designing a disaster prevention and recovery plan for your network.
The following table summarizes the current network configuration.
You have done the following:
. Placed all confidential data on the servers
. Placed the servers in a locked room
. Implemented NTFS user-level security on the servers to allow only specific
personnel to access the data
Required results:
You must protect the servers from hardware failure. However, periods of
downtime of less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from
loss.
Optional desired results:
You want to track all accesses to the data files.
You want to put reasonable methods in place to protect network data from
virus corruption.
¡¡
Proposed solution:
- Connect UPS to each server.
- Set appropriate access-control security on all shared resources.
- Implement disk mirroring for each server.
- Do daily tape backups of the data, and store the tapes in a secure
off-site location.
- Implement virus scanning on all client computers and servers.
- Enable auditing on all shared files.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both
of the optional desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the optional desired results.
D. The proposed solution does not produce the required results.
¡¡
#58 - Define signal interference from an adjacent wire
a. attenuation
b. crosstalk
c. mumbling
d. beaconing
#59 - Configuration of your client computer:
· SVGA card
· SCSI card, set at IRQ 15
· LPT1
· LPT2
· COM1
· COM2
. PS/2 mouse port
The computer runs Microsoft Windows NT Workstation.
You are installing a token-ring network adapter in the computer. You set it
to use IRQ 3.
Which device could cause IRQ conflicts in the computer?
A. COM1
B. COM2
C. LPT1
D. LPT2
¡¡
#60 - You install an Ethernet network adapter in a client computer. The
computer's network software is initialized successfully, but the computer is
not able to communicate with other computers on the network. All other
client computers on the network are able to communicate. What is the most
likely cause of the problem?
A. the transceiver setting of the network adapter is incorrect.
B. the IO port address on the network adapter is incorrect.
C. the cable segment is not properly terminated.
D. the packet-size setting is incorrect.
¡¡
#61 - Situation:
You are designing a NetBIOS naming scheme for all of the servers and client
computers at your location. Within 2 years your company will install a WAN
that will connect all of its networks.
Current Network Configuration for the Entire company
¡¡
Server
328, Which run Microsoft Windows NT
Server
Client Computers
20,000 which run Microsoft Windows 95
Network
40, each in a different city
WAN connections
None
All users have e-mail to all other users in the
company.
E-mail names
All have 12 characters or fewer
¡¡
Current Network Configuration for Your Location
Server
10, which run Microsoft Windows NT server
Client Computers
500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all servers
and client computers at your location.
The NetBIOS naming scheme at your location must continue to work after the
WAN is connected.
¡¡
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
Proposed solution:
Assign each server and client computer at all locations a unique 15-digit
hexadecimal number to be used as that computer's NetBIOS name.
¡¡
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both
of the optional desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the
optional desired results.
D. The proposed solution does not produce the required results.
¡¡
#62 - Situation:
You are designing a NetBIOS naming scheme for all of the servers and client
computers at your location. Within 2 years your company will install a WAN
that will connect all of its networks.
¡¡
Current Network Configuration for the Entire company
Server
328, Which run Microsoft Windows NT
Server
Client Computers
20,000 which run Microsoft Windows 95
Network
40, each in a different city
WAN connections
None
All users have e-mail to all other users in the
company.
E-mail names
All have 12 characters or fewer
Current Network Configuration for Your Location
Server
10, which run Microsoft Windows NT server
Client Computers
500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all servers
and client computers at your location.
The NetBIOS naming scheme at your location must continue to work after the
WAN is connected.
¡¡
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
¡¡
Proposed solution:
Assign each server a NetBIOS name that consists of 15 characters that
describe the location plus a 4-digit number that is unique to each server.
Assign each client computer a NetBIOS name that corresponds to the e-mail
address of the computer's principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both
of the optional desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the optional desired results.
D. the proposed solution does not produce the required results.
¡¡
#63 - Situation
You are designing a NetBIOS naming scheme for all of the servers and client
computers at your location. Within 2 years your company will install a WAN
that will connect all of its networks.
Current Network Configuration for the Entire company
Server
328, Which run Microsoft Windows NT
Server
Client Computers
20,000 which run Microsoft Windows 95
Network
40, each in a different city
WAN connections
None
All users have e-mail to all other users in the
company.
E-mail names
All have 12 characters or fewer
Current Network Configuration for Your Location
Server
10, which run Microsoft Windows NT server
Client Computers
500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all servers
and client computers at your location.
The NetBIOS naming scheme at your location must continue to work after the
WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department or function.
You want each client computer's NetBIOS name to describe the computer's
primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of the first 8 characters of
the server's department name, plus a 5-character location code, plus a
2-digit identifier to distinguish between multiple servers within the
department.
Assign each client computer a NetBIOS name that corresponds to the e-mail
address of the computer's principal user.
¡¡
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces both
of the optional desired results.
B. The proposed solution produces the required results and produces only
1 of the optional desired results.
C. The proposed solution produces the required results but does not
produce either of the optional desired results.
D. The proposed solution does not produce the required results.
¡¡
#64 - Which device should you use to monitor the amount of network traffic
over time?
¡¡
A. time domain reflectometer (TDR)
B. cable tracer
C. protocol analyzer
D. medium attachment unit
#65 - Which tool should you use to create a report that logs network
activity?
A. volt-ohmmeter
B. oscilloscope
C. protocol analyzer
D. time domain reflectometer (TDR)
¡¡
#66 - Your network uses NWLink IPX. Initialization of your client computer's
network software appears to be successful, but your client computer is not
able to access the server. All of the other computers are able to access the
server. What is the most likely cause of the problem?
¡¡
A. the wrong network-adapter driver is installed in your client
computer.
B. your client computer has insufficient extended memory.
C. the network adapter in your client computer is configured to use the
wrong I/O port
address.
D. the network adapter in your client computer is configured to use the
wrong frame type.
¡¡
#67 - You connect a client computer to a network that uses NWLink IPX. The
client computer is not able to access any network resources. After
investigation, you decide that hardware is not causing the problem. What
is the most likely cause of the problem?
A. incorrect subnet mask on the client computer
B. incorrect IP address on the client computer
C. incorrect frame type on the client computer
D. corrupted WIN.INI file on the client computer
¡¡
#68 - Your network includes servers that run Microsoft Windows NT Server,
client computers that run Microsoft MS-DOS, and UNIX client computers. You
add a new server that runs Microsoft Windows NT Server. All of the MS-DOS
computers can access all shared network resources. The UNIX computers can
access all shared network resources except the new server.
What is the most likely cause of the problems
A. faulty network adapters in the UNIX computers
B. incorrect binding order on the server
C. protocol mismatch between the server and the UNIX computers
D. incorrect frame type on the server
¡¡
#69 - Current network configuration:
¡¡
Server
27, which run Microsoft Windows NT server
Client Computers
750
Protocols:
NetBEUI, NWLink IPX, TCP/IP
You install a new client computer, which uses NWLink IPX. You are not able
to access some of the shared network resources from this new computer. All
of the other computers on the network are able to access all shared network
resources.
What is the most likely cause of the problem?
A. the subnet-mask setting on the new client computer is incorrect.
B. There is a protocol mismatch between the new client computer and the
inaccessible shared network resources.
C. the NetBIOS names for the new client computer and for the
inaccessible shared network resources are duplicates.
D. There is a cable failure between the new client computer and the
inaccessible shared network resources.
¡¡
#70 - A client computer on your Ethernet network is not able to access the
server. Initialization of the client computer's network software was
successful. All other client computers are able to access the server. After
investigation, you decide that hardware is not causing the problem.
What is the most likely cause of the problem?
A. There is insufficient extended memory in the affected client
computer.
B. The network adapter in the server is configured to use the wrong
transceiver.
C. the network adapter in the affected client computer is configured to
use the wrong transceiver.
D. An excessive number of collisions is occurring on the media.
¡¡
#71 - Configuration of 2 of the client computers on your 10BaseT Ethernet
network:
VGA adapter: Default settings
IDE controller: Default settings
Floppy disk drive controller: Default settings
LPT1: Default settings
COM1: Default settings
COM2: Default settings
Ethernet network adapter See settings below:
MAC hardware address: 1 0C805000000
IRQ: 5
IO port address: 300
Transceiver: RJ-45
DMA None
Memory address: None
¡¡
Neither computer is able to access the network. You run diagnostic tests on
the network adapters in both computers. Configuration of both adapters is
identical:
Which change must you make on both Ethernet network adapters to allow the 2
client computers to access the network?
A. Change the MAC (hardware) addresses to factory settings.
B. Change the IRQ settings to 3.
C. Change the IO port addresses to 320.
D. Change the transceiver types to BNC.
¡¡
#72 - Network Diagram.
¡¡
Client computers on your Ethernet network are not able to access the server.
You use a volt-ohmmeter to measure the resistance between the center wire
and the shield on the cable, on the T-connectors, and on the terminators.
You obtain the following resistance readings:
RG-58 A/U coaxial cable: 0 ohms
Both T-connector: ? (Infinity) ohms
Both terminators: 50 ohms
What you do to repair the network?
A. Replace the 50-ohm terminators with 25-ohm terminators.
B. Replace the 50-ohm terminators with 100-ohm terminators.
C. Install replacement T-connectors.
D. Install replacement RG-58 A/U coaxial cable.
¡¡
#73 - You are the administrator of a 20-computer Ethernet network. Sometimes
1 or 2 computers are not able to access network resources. The problem has
affected every computer at random times. Some of the network cable is RG-58
/U solid-core coaxial cable, and some of the cable is RG-58 A/U
stranded-core coaxial cable. You use a volt-ohmmeter to measure the
resistance between the center wire and the shield on the cables and on the
parts connected to them. You obtain the following readings:
All cables: ? (Infinity) ohms
Both terminators: 50 ohms
All T-connectors: ? (infinity) ohms
What must you do to repair the network?
A. Replace the 5O-ohm terminators with 25-ohm terminators.
B. Replace all RG-58 /U coaxial cables with RG-58 A/U coaxial cables.
C. Replace all cables with RG-62 /U coaxial cables.
D. Replace all T-connectors with new ones.
¡¡
#74 - User reports slow network response on your 500-computer Ethernet
network. After investigation, you suspect that a network adapter is
generating a continuous and meaningless transmission.
Which device can you use to identify the defective network adapter?
A. protocol analyzer
B. volt-ohmmeter
C. optical time domain reflectometer (OTDR)
D. time domain reflectometer (TDR)
¡¡
#75 - Situation:
Your company's rapid growth has caused an increase in the number of
computers on your network. There were 300 computers at the beginning of the
year, and there are 1,000 now. Broadcast storms are occurring with
increasing frequency on the network. You want to reduce the number of
broadcast storms. The following table summarizes
your current network configuration.
¡¡
Server
25, Which run Microsoft Windows NT Server
Client Computers
600 which run Microsoft Windows 95, and
300 Macintosh Computer that run System 7.x
75 UNIX computer
Network Types
10BaseT Ethernet
Protocols
NetBEUI, TCP/IP with DHCP and WINS,
NWLink IPX, AppleTalk
Cable
Category 3 UTP
Brouters
4, with bridging enabled
Required result:
You must reduce the number of broadcast storms by at least 50 percent while
minimizing changes in functionality for the client computers.
¡¡
Optional desired results:
Minimize hardware costs needed to produce the reduction in broadcast storms.
Minimize ongoing administrative costs after the changes are made.
Allow for continued expansion of the network.
Proposed solution:
Turn off bridging on all of the brouters. Configure all of the computers and
brouters to use only NWLink IPX.
Which results does the proposed solution produce?
A. The proposed solution produces the required result and produces all
of the optional desired results.
B. The proposed solution produces the required result and produces only
1 of the optional desired results.
C. The proposed solution produces the required result but does not
produce any of the optional desired results.
D. The proposed solution does not produce the required result.
#76 - Situation
Configuration of your network:
Servers
9, Which run Microsoft Windows NT Server
Client Computers
200
Network Type
10BaseT Ethernet
Protocol
NetBEUI
Bridges
None
Routers
None
¡¡
Users on your network report poor network performance. After investigation,
you decide that broadcast storms are causing the problem. What should you do
to resolve the broadcast storms?
A. Segment the network by using a router.
B. Segment the network by using a repeater.
C. Replace NetBEUI with DLC, and then segment the network by using a
bridge.
D. Replace NetBEUI with TCP/IP, and then segment the network by using a
router.
¡¡
#77 - Your network has 35 client computers and 1 server. The server runs
Microsoft Windows NT Server. Network performance is steadily decreasing as
new client computers are added to the network. You run Performance Monitor
on the server and obtain the following statistics:
Counter Average
% Processor Time: 8
Page Faults/sec: 2
% Disk Time: 25
What should you do to improve network performance?
A. Replace the server with a multiprocessor computer.
B. Install additional RAM in the server.
C. Install disk striping with parity on the server
D. Segment the network by adding another network adapter to the server.
¡¡
#78 - Situation:
Network monitoring shows that network utilization has grown from 30 percent
to 70 percent of maximum capacity in the past year. You will add 24 client
computers and 1 server within 3 months. You want to reduce network
utilization.
¡¡
Required result:
You must reduce network utilization by 50 percent.
¡¡
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the
planned additions to the network are implemented. You want to minimize
costs for the project.
¡¡
Proposed solution:
Change the maximum packet size on all of the computers from 1,514 bytes to
576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable.
Increase TCP window size from 4,096 bytes to 16,384 bytes.
¡¡
Which results does the proposed solution produce?
A. the proposed solution produces the required result and produces all
of the optional
desired results.
B. the proposed solution produces the required result and produces only
2 of the optional
desired results.
C. The proposed solution produces the required result but does not
produce any of the optional desired results.
D. the proposed solution does not produce the required result.
¡¡
#79 - Situation:
Network monitoring shows that network utilization has grown from 30 percent
to 70 percent of maximum capacity in the past year. You will add 24 client
computers and 1 server within 3 months. You want to reduce network
utilization. The following table summarizes your current network
configuration.
¡¡
Servers
3
Client Computers
120 evenly distributed among the 3 servers
Network Type
10BaseT Ethernet
Protocol
TCP/IP
Cable
Category 3 UTP
Routers
None
Bridges
None
¡¡
Required result:
You must reduce network utilization by 50 percent.
¡¡
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the
planned additions to the network are implemented. You want to minimize
costs for the project.
¡¡
Proposed solution:
Replace all 10BaseT hubs with 100BaseT hubs. Replace all Category 3 UTP
cable with Category 5 UTP cable.
Replace all 10BaseT network adapters with 100BaseT network adapters.
Which results do the proposed solution produced?
A. The proposed solution produces the required result and produces all
of the optional desired results.
B. The proposed solution produces the required result and produces only
2 of the optional desired results.
C. The proposed solution produces the required result but does not
produce any of the optional desired results.
D. The proposed solution does not produce the required result.
#80 - The Performance Monitor on an NT network gives the following readings:
% Processor: 8
Pages Fault / Sec: 2
Disk %: 25
What would you implement to improve network performance? :
a.add more ram
b.increase processor speed
c.disk striping with parity
d.segment the network
¡¡
#81 - Match the following definition to the networking term. A high level
networking protocol that provides file sharing services on networks that use
NetBIOS?
(Choose only one)
A. IPX/SPX
B. TCP/IP
C. DLC
D. SLIP
E. PPP
F. NetBEUI
G. SMB
H. RIP
I. AFP
J. NCP
¡¡
#82 - You add a client computer named Computer2. Computer2 is able to
communicate with some servers, but not others. All client computers on the
network are able to communicate with all servers. What is the problem?
A. Invalid entry on the LMHosts file on Computer2.
B. Invalid entry on the Hosts file on Computer2.
C. Computer2 is not using all appropriate transport protocols.
D. NDIS driver on Computer2 is incorrect version.
¡¡
#83 - You are creating a peer to peer network that will have 6 computers.
You will run Windows for Workgroups on 3. On the other 3 you will run MS
DOS and MS Net. You want to use the least possible amount of RAM on all 6
computers. Which transport protocol should you install?
A. TCP/IP
B. NetBEUI
C. XNS
D. IPX/SPX
¡¡
#84 - You are integrating a NetWare server into an MS NT server network.
You install TCP/IP on all computers on
the network including the NetWare server. The NT server cannot connect to
the NetWare server. What additional
protocol should you install on the NT server? (And the choices are....)
A. NWLink IPX
B. DLC
C. NCP
D. SMB
¡¡
#85 - You manage 4 NT servers directly connected to the internet. All 4 are
configured in a single NT domain. You manage the 4 servers from another NT
server located in your office. The server in your office connects to the
internet using dial-up connection. You want to use Server Manager and User
Manager to manage the 4 servers. What should you install and configure to
resolve the computer names of the servers? (Here are your choices)
A. DNS server on internet.
B. WINS server in your office with only dynamic mapping.
C. DHCP server on the internet.
D. LMHosts file on the server in your office.
#86 - You have a Dec Alpha system running Windows NT. The NT has 2
partitions, one is Active. What is the best security for protecting the
data.
1. NTFS
2. NTFS with FAT
3. FAT with NTFS
4. All FAT.
¡¡
¡¡