1) You have 3 servers that run NT Server, 75 client computers that use NetBEUI. You want the client computers to be able to access a UNIX computer. The UNIX computer uses NFS. You do not want to add any new software. What device should you use?
ANS: Gateway
2) You are designing a peer to peer network consisting of 5 Windows 95 computers. What protocol should you use?
ANS: NWLink IPX
3) You add a client computer named Computer2. Computer2 is able to communicate with some servers, but not others. All client computers on the network are able to communicate with all servers. What is the problem? (Not positive of the answer, so here are the choices)
A. Invalid entry on the LMHosts file on Computer2.
B. Invalid entry on the Hosts file on Computer2.
C. Computer2 is not using all appropriate transport protocols.
D. NDIS driver on Computer2 is incorrect version
4) You Install an Ethernet card (of course card not COW). The network software
intialized prop. but can not connect
to netowork, others can..so what is the problem ? ( bed weather, prob rain )
a packet size wrong
b I/O address wrong
c Trancevier on the net card wrong
d can not remember
5. TCP/IP network, want to track how many users who connect to 15 NT
server machines and 5 routers, what utility do you use?
* I am not too sure about answer, I choose C
a.Performance Monitor
b.Server Manager
c.SNMP
d. Ipconfig utility
6).What must you specify when you want to copy a file from 1 computer to
another by using a UNC name? (Choose 2.)
A. share name
B. domain name
C. computer name
D. workgroup name
7). You are designing a peer-to-peer network that consists of 5 Microsoft
Windows 95 computers. Which protocol should you use?
A. DLC
B. NFS
C. NWLink IPX
D. XNS
8) What is a characteristic of connection-oriented communication?
A. It provides fast but unreliable delivery of datagrams.
B. It provides assurance of packet delivery.
C. It uses store-and-forward techniques to move datagrams between computers.
D. It uses message-oriented communication for processing e-mail.
9) What is a characteristic of the IEEE 802.3 10Base2 standard?
A. It specifies Category 3 DIP cable with a maximum cable length of 100 meters.
B. It specifies RG-11 C/U coaxial cable with a maximum cable length of 500 meters.
C. It specifies BNC T-connectors for connecting computers to cables.
D. It specifies RJ-45 connectors at the ends of each cable.
10) What is a benefit of both NDIS and ODI?
A. They allow network adapters to be used in any compliant computer.
B. They allow network adapters to transmit information over a greater distance than noncompliant network adapters can.
C. They allow network adapters to communicate with other compliant network adapters.
D. They allow network adapters to be independent
of any particular transport protocol.
11) Which WAN connection service can provide transmission speed that is faster than 100 Mbps?
A. ISDN basic rate interface
B. X.25
C. T1
D. ATM
12) Situation:
You are designing a disaster prevention and recovery plan for your network. The following table
summarizes the current network configuration.
Server
2
total - both run Microsoft Windows NT server, 1 is the
PDC
and 1 is the BDC
Client Computers
100,
which run Microsoft Windows 95
Network Type
10BaseT
Ethernet
You have done the following:
. Placed all confidential data on the servers
. Placed the servers in a locked room
. Implemented NTFS user-level security on the servers to allow only specific personnel
to access the data
Required result:
You must protect the servers from hardware failure. However, periods of downtime of
less than 2 hours are acceptable.
You must have reasonable controls in place to protect network data from loss
Optional desired results:
You want to track all accesses to the data files.
You want to put reasonable methods in place to protect network data from virus
corruption.
Proposed solution:
Connect UPS to each server.
Set appropriate access-control security on all shared resources.
Implement disk striping with parity for each server's hard disks.
Do daily tape backups of the data, and store the tapes in a secure off-site location.
Implement virus scanning on all client computers and servers.
Which results do the proposed solution produced
A. the proposed solution produces the required results and produces
both of the optional
desired results.
B. The proposed solution produces the required results and produces only 1 of the optional desired results.
C. The proposed solution produces the required results but does not produce either of the optional desired results.
D. the proposed solution does not produce the required results.
13. You install an Ethernet network adapter in a client computer. The computer's network software is initialized successfully, but the computer is not able to communicate with other computers on the network. All other client computers on the network are able to communicate. What is the most likely cause of the problem?
A. the transceiver setting of the network adapter is incorrect.
B. the IO port address on the network adapter is incorrect.
C. the cable segment is not properly terminated.
D. the packet-size setting is incorrect.
14). Your network uses NWLink IPX. Initialization of your client computer's network
software appears to be successful, but your client computer is not able to access the
server. All of the other computers are able to access the server. What is the most likely
cause of the problem?
A. the wrong network-adapter driver is installed in your client computer.
B. your client computer has insufficient extended memory.
C. the network adapter in your client computer is configured to use
the wrong I/O port
address.
D. the network adapter in your client computer is configured to use the wrong frame type.
15) A client computer on your Ethernet network is not able to access the server. Initialization of the client computer's network software was successful. All other client computers are able to access the server. After investigation, you decide that hardware is not causing the problem.
What is the most likely cause of the problem?
A. There is insufficient extended memory in the affected client computer.
B. The network adapter in the server is configured to use the wrong transceiver.
C. the network adapter in the affected client computer is configured to use the wrong transceiver.
D. An excessive number of collisions is occurring on the media.
16. Situation:
Network monitoring shows that network utilization has grown from 30 percent to 70
percent of maximum capacity in the past year. You will add 24 client computers and 1
server within 3 months. You want to reduce network utilization.
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the planned additions
to the network are implemented.
You want to minimize costs for the project.
Proposed solution:
Change the maximum packet size on all of the computers from 1,514 bytes to 576 bytes.
Replace all Category 3 UTP cable with Category 5 UTP
cable. Increase TCP window size from 4,096 bytes to 16,384 bytes.
Which results does the proposed solution produce?
A. the proposed solution produces the required result and produces
all of the optional
desired results.
B. the proposed solution produces the required result and produces
only 2 of the optional
desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. the proposed solution does not produce the required result.