Blog literacki, portal erotyczny - seks i humor nie z tej ziemi
Checkpoint MCSE
Networking Essentials
Sammy
I just finished the Netorking Essentials test a few hours ago and
scored
a perfect 1000 . (This was the 30 question non-adaptive)
I used the Microsoft Press kit & EXAM CRAM & TRANSCENDOR practice
test
(And of course the many internet braindump sights)
I had 2 pick & place questions and about 6 required and proposed
solution q's
1. Which type of server provides processing power to run programs
for client
computers? (Choose all that apply.)
A. file-and-print server
B. application server
Ans:B
2. Your network consists of 10 computers, which run Microsoft
Windows NT
Workstation. Which kind of access control can you use to control
access to files and directories on the network? (Choose all that
apply.)
A. Specify users and groups who have access to each shared
resource.
B. Supply a password for each shared resource.
Ans:A
3. What is a characteristic of a client/server networks?
A. Any computer can make its resources available to any other
computer on the network.
B. Dumb terminals are connected to a central host computer that
performs all
processing.
C. Any computer on the network can be both a client and a server.
D. Client computers access a server that performs back-end
services.
Ans:D
4. What is a characteristic of connection-oriented communication?
A. It provides fast but unreliable delivery of datagrams.
B. It provides assurance of packet delivery.
C. It uses store-and-forward techniques to move datagrams between
computers.
D. It uses message-oriented communication for processing e-mail.
Ans:B
5. Which datalink communications protocol provides connections
between
computers via dial-up telephone lines? (Choose all that apply.)
A. SLIP
B. PPP
Ans:AB
6. What is a characteristic of the IEEE 802.3 10Base2 standard?
A. It specifies Category 3 DIP cable with a maximum cable length
of 100 meters.
B. It specifies RG-11 C/U coaxial cable with a maximum cable
length of 500
meters.
C. It specifies BNC T-connectors for connecting computers to
cables.
D. It specifies RJ-45 connectors at the ends of each cable.
Ans:C
7. What is a purpose of NDIS?
A. to allow any compliant transport protocol to pass data to
any compliant
network adapter
B. to allow any compliant transport protocol to pass data to any
compliant
network redirector
C. to define the common signaling scheme that all vendors'
adapters use when
transmitting packets
D. to define the voltage levels that must be applied to the
pinouts on the
network adapter's 15 pin AUI connector
Ans:A
8. You are designing a 100-Mbps Ethernet network for a building
that has
existing UTP cable. You test the existing cable and decide that it
meets
Category 3 specifications. Which media should you use?
A. the existing cable
B. new Type 1 STP cable
C. new Category 4 UTP cable
D. new Category 5 UTP cable
Ans:D
9. You are designing a peer-to-peer network that consists of 5
Microsoft
Windows 95 computers. Which protocol should you use?
A. DLC
B. NFS
C. NWLink IPX
D. XNS
Ans:C
10. Which WAN connection service can provide transmission speed
that is faster
than 100 Mbps?
A. ISDN basic rate interface
B. X.25
C. T1
D. ATM
Ans:D
11. You want your WAN to allow simultaneous transmission of voice,
video, and
data. Which WAN connection service should you use?
A. 56-Kbps digital line
B. X.25
C. Frame relay
D. ATM
Ans:D
12. Which type of WAN connection service is intended to replace
standard
analog telephone service?
A. ISDN basic rate interface
B. X.25
C. Frame relay
D. 2.048-Mbps digital line
Ans:A
13.You are designing a security plan for your network. The
following table
summarizes the current network configuration. Server 2 total -
both run
Microsoft Windows NT server, 1 is the PDC and 1 is the BDC Client
Computers
100, which run Microsoft Windows 95 Network Type 10BaseT Ethernet.
Required result:
You must have centralized control of access to shared resources.
Optional desired results:
You want to track all access and attempted access to shared
resources.
You want to track attempts to guess user passwords.
You want to implement a method to protect user accounts from
password-breaking programs.
Proposed solution:
Implement NTFS with user-level security on all servers. Set
appropriate
access-control security on all shared resources. Require users to
change their
passwords every 40 days. Implement disk striping with parity on
all servers.
Perform daily tape backups, and store tapes in a secure off-site
location.
Which results does the proposed solution produce?
A. the proposed solution produces the required result and produces
all of the
optional desired results.
B. the proposed solution produces the required result and produces
only 1 of the optional desired results.
C. The proposed solution produces the required result but does
not produce any of the optional desired results.
D. the proposed solution does not produce the required result.
Ans:C
14. You are designing a WAN that will connect 3 existing networks
in Dallas,
Denver, and New Orleans.
Required result:
All of the computers on each of the 3 networks must be able to
communicate
with any other computer on the 3 networks. The WAN links must be
capable of
transmitting data at a minimum speed of 1 Mbps.
Optional desired results:
You want to provide continued communications in the event of a
single-link
failure.
You want to provide continued communications at a minimum speed of
1 Mbps in the event of a single-link failure.
Proposed solution:
Connect the 3 networks by using 2 T1 links, as shown in the
accompanying
Exhibit.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and
produces both of the optional desired results.
B. The proposed solution produces the required results and
produces only 1 of
the optional desired results.
C. The proposed solution produces the required results but does
not produce any of the optional desired results.
D. The proposed solution does not produce the required results.
Ans:C
15. You are designing a disaster prevention and recovery plan for
your network.
The following table summarizes the current network configuration.
Server 2 total -both run Microsoft Windows NT server, 1 is the PDC and 1 is the
BDC Client
computers 100, which run Microsoft Windows 95 Network Type 10BaseT
Ethernet.
You have done the following:
- Placed all confidential data on the servers
- Placed the servers in a locked room
- Implemented NTFS user-level security on the servers to allow
only specific personnel to access the data.
Required results:
You must protect the servers from hardware failure. However,
periods of downtime of less than 2 hours are acceptable. You must
have reasonable
controls in place to protect network data from loss.
Optional desired results:
You want to track all accesses to the data files.
You want to put reasonable methods in place to protect network
data from virus
corruption.
Proposed solution:
Connect UPS to each server.
Set appropriate access-control security on all shared resources.
Implement disk striping with parity for each server's hard disks.
Do daily tape backups of the data, and store the tapes in a secure
off-site
location.
Implement virus scanning on all client computers and servers.
Which results do the proposed solution produced ?
A. the proposed solution produces the required results and
produces both of the optional desired results.
B. The proposed solution produces the required results and
produces only 1 of the optional desired results.
C. The proposed solution produces the required results but does
not produce
either of the optional desired results.
D. the proposed solution does not produce the required results.
Ans:B
16. The computer runs Microsoft Windows NT Workstation. You are
installing a
token-ring network adapter in the computer. You set it to use IRQ
3. Which
device could cause IRQ conflicts in the computer?
A. COM1
B. COM2
C. LPT1
D. LPT2
Ans:B
17. You install an Ethernet network adapter in a client computer.
The computer's network software is initialized successfully, but
the computer is not able to communicate with other computers on
the network. All other client computers on the network are able to
communicate. What is the most likely cause of the problem?
A. the transceiver setting of the network adapter is incorrect.
B. the IO port address on the network adapter is incorrect.
C. the cable segment is not properly terminated.
D. the packet-size setting is incorrect.
Ans:A
18. You are designing a NetBIOS naming scheme for all of the
servers and client computers at your location. Within 2 years your
company will install a WAN that will connect all of its networks.
Current Network Configuration for the Entire company Server 328,
Which run Microsoft Windows NT Server Client Computers 20,000
which run Microsoft Windows 95 Network 40, each in a different
city WAN connections None E-mail All users have e-mail to all
other users in the company.
E-mail names All have 12 characters or fewer Current Network
Configuration for Your Location Server 10, which run Microsoft
Windows NT server Client Computers 500, which run Microsoft
Windows 95.
Required results:
You must successfully implement the NetBIOS naming scheme for all
servers and client computers at your location. The NetBIOS naming
scheme at your location must continue to work after the WAN is
connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's
department
or function.
You want each client computer's NetBIOS name to describe the
computer's
primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of the first 8
characters of the server's department name, plus a 5-character
location code, plus a 2-digit
identifier to distinguish between multiple servers within the
department. Assign
each client computer a NetBIOS name that corresponds to the e-mail
address of the computer's principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and
produces both of the optional desired results.
B. The proposed solution produces the required results and
produces only 1 of
the optional desired results.
C. The proposed solution produces the required results but does
not produce
either of the optional desired results.
D. The proposed solution does not produce the required results.
Ans:A
19. Which device should you use to monitor the amount of network
traffic over
time?
A. time domain reflectometer (TDR)
B. cable tracer
C. protocol analyzer
D. medium attachment unit
Ans:C
20. Which tool should you use to create a report that logs network
activity?
A. volt-ohmmeter
B. oscilloscope
C. protocol analyzer
D. time domain reflectometer (TDR)
Ans:C
21. Your network includes servers that run Microsoft Windows NT
Server, client
computers that run Microsoft MS-DOS, and UNIX client computers.
You add a
new server that runs Microsoft Windows NT Server. All of the
MS-DOS
computers can access all shared network resources. The UNIX
computers can
access all shared network resources except the new server.
What is the most likely cause of the problems
A. faulty network adapters in the UNIX computers
B. incorrect binding order on the server
C. protocol mismatch between the server and the UNIX computers
D. incorrect frame type on the server
Ans:C
22. User reports slow network response on your 500-computer
Ethernet
network. After investigation, you suspect that a network adapter
is generating a
continuous and meaningless transmission. Which device can you use
to identify
the defective network adapter ?
A. protocol analyzer
B. volt-ohmmeter
C. optical time domain reflectometer (OTDR)
D. time domain reflectometer (TDR)
Ans:A
23.Configuration of your network:
Servers 9, Which run Microsoft Windows NT Server
Client Computers 200.
Network Type 10BaseT Ethernet.
Protocol NetBEUI.
Bridges None.
Routers None.
Users on your network report poor network performance. After
investigation, you
decide that broadcast storms are causing the problem. What should
you do to
resolve the broadcast storms?
A. Segment the network by using a router.
B. Segment the network by using a repeater.
C. Replace NetBEUI with DLC, and then segment the network by using
a bridge.
D. Replace NetBEUI with TCP/IP, and then segment the network by
using a
router.
Ans:D
24. Your network has 35 client computers and 1 server. The server
runs
Microsoft Windows NT Server. Network performance is steadily
decreasing as
new client computers are added to the network. You run Performance
Monitor on
the server and obtain the following statistics:
Counter:
Average % Processor Time: 8
Page Faults/sec: 2
% Disk Time: 25
What should you do to improve network performance?
A. Replace the server with a multiprocessor computer.
B. Install additional RAM in the server.
C. Install disk striping with parity on the server
D. Segment the network by adding another network adapter to the
server.
Ans:D
25. In the past year, you have added 55 client computers to your
l0BaseT
Ethernet network. Users of the network report that network
response is slow
during peak hours of usage. Which solution is the most economical?
A. Replace all Ethernet adapters with FDDI adapters.
B. Replace all Ethernet concentrators with Ethernet switches.
C. Replace all Ethernet components with 100-Mbps ATM equivalents.
D. Replace all Ethernet components with 16-Mbps token-ring
equivalents.
Ans:B
Thanks to all others who submitted braindumps!
Sean