70-058 Networking Essential¸´Ï°¸ÅÒª
Free test

70-058 Networking Essentail¸´Ï°¸ÅÒª

Network Topology  

  1. Bus - A bus topology, also called a linear bus, consists of a single cable to which all computers in the segment are attached. The bus's cable is terminated at each end to prevent message transmissions form bouncing back and forth. Requires 50-ohm terminators.
  2. Star - In a star topology, all computers on the network are connected to one another using a central hub. Some advantages of the Star topology:
    1. If one computer goes down it will not disable the entire network.
    2. Easier to add computers or reconfigure the network.
  3. Ring - Commonly seen in Token Ring and FDDI (Fiber Optic) networks. In a physical ring topology the data line actually forms a logical ring to which all computer are attached. Ring topology uses Token passing. A computer can only send data when it has possession of the token.
  4. Star-Ring - Also known as as star-wire ring because the hub it self is wired to the ring. Looks Identical to a star topology on the surface, but the hub is wired as a logical ring. This topology is popular for Token Ring networks because its easier to implement.

Networking Architectures

Physical Mesh Topologies - Mesh topologies are distinguished by having redundant links between devices which enable data to be sent over several different paths. Reconfiguration, like installation, gets progressively more difficult as the number of devices increases. Most mesh topology networks are not true mesh networks. Rather they are hybrid mesh networks which contain some redundant links, but not all.

Networking Protocols
Protocols
are the agreed-upon way in which computer exchange information.
Microsoft-Supplied Network Protocols

The Protocol Suites or Stack

Other protocols you may encounter:

The Theoretical Network

  1. Protocols that work together to provide a layer or layers of the OSI model are known as a protocol stack or suite.
  2. Networks primarily send small chunks of data called packets.
  3. A packet is made up of tree components: the header, data and trailer.
  4. The process of moving data from one LAN to another is over one or more paths between LANs are called routing.
  5. Several protocols can be bound to the same card.
OSI LAYERS
Application Layer Provides services that directly support user applications.
Associated Devices and Services: Gateways
Presentation Layer Translates the data between the formats the network requires and the formats the computer expects. The presentation layer performs protocol conversion, data translation, compression and encryption. 
Associated Devices and Services: Gateways
Session Layer Allow applications on separate computers to share a connection called a session. This layer enables two programs to find each other and establish communication link. This layer places check points in the data stream, so if communications fail, only the data after the most recent checkpoint need be transmitted.
Associated Devices and Services: Gateways
Transport Layer Manages the flow control of data between parties across a network. Ensures that packets are delivered error free, in sequence and with no loses or duplications.
Associated Devices and Services: Advanced Cable Testers & Gateways
Network Layer Address messages for delivery, and translates logical network address and names into there physical equivalents. Makes routing decisions and forwards packets for devices that are farther than a single link away.
Associated Devices and Services: Advanced Cable Testers & Routers
Data Link Layer Handles special data frames between the Network layer and Physical layers. Provides for the flow of data over a single link from one device to another.

Associated Devices and Services: Advanced Cable Testers, NIC's & Bridges, Ethernet Switching Hub.

Logical Link Control (LLC)The LLC control provides (SAP's) that other computers can refer to and use to transfer information from the Logical Link control sub-layer.
Media Access Control (MAC) Provides for shared access to the network adapter card and communicates directly with the network adapter card.
Physical Layer Is simply responsible for sending bits from one computer to another. It

converts the bits into signals for out going massages.

Associated Devices and Services: TDR's, Oscilloscopes, Repeaters & Hubs

 

IEEE 802 physical layer Specifications
802.1 Internetworking
802.2 Logical Link Control (LLC)
802.3 The number of the IEEE standard for Carrier Sense with Multiple Access an Collision Detection (CSMA/CD, or Ethernet).
802.4 Token Passing or Bus LAN
802.5 Token Ring LAN
802.6 Metropolitan Area Network (MAN)
802.7 Broadband
802.8 Fiber Optic
802.9 Integrated Voice and Data Networks.
802.10 Network Security
802.11 Wireless Networks
802.12 Demand Priority Access LAN, 100BaseVG-AnyLAN

WAN (Wide Area Network)Technologies & Connectivity

ATM stands for Asynchronous Transfer Mode. ATM is an advanced implementation of packet switching that provides high-speed data transmission rates at about 155Mbps, but theoretically 1.2 gigabits per second is possible. ATM also supports simultaneous voice, video and data transmission.

ISDN (Integrated Services Digital Network) Primary goal was to integrate voice and data services by replacing analog telephone lines with digital equivalents. Can support data throughput as high as 115Kbps including compression. ISDN offers normal throughput of 64Kbps per channel, and most ISDN lines offer normal bandwidth of 128K, because channels are often used in pairs.

Frame Relay - Frame Relay is a packet switch network service that doesn't perform error checking. The error checking will be handled at the either end of the connection. It operates at at speeds between 56Kbps and 1.544Mbps. Customers can specify exactly the amount of bandwidth they want to pay for.

T1 and T3 Lines - The most widely used type of all high speed digital lines. T1 is a point-to-point transmission technology that consists of 24 64kbps channels for a total transmission capability of 1.544 Mbps. Each of the channels my be used as a separate voice or data communication channel. T3 is equivalent of 28 T1 lines and handles a data rate of 44.736 Mbps. It is extremely expensive. T3 lines require fiber optic cables or microwave-transmission equipment. You can lease portions of a T-carrier line's bandwidth though services called Fractional T1 (FT1) and Fractional T3 (FT3).

SONET - Sonet is fiber optic WAN technology used to deliver voice data, and video at speeds of up to 622 Mbps and beyond.

Cabling and Interfaces

Coaxial Cable
Thinnet RG-58 A/U 50-ohms, wire-stand center conductor  
RG-58 /U 50-ohms, solid copper center conductor
RG-58 C/U military grade
Connectors that are characteristic of Thinnet are:
  1) BNC Connector
  2) BNC Barrel connectors
  3) 50-ohm Terminators
  4) T-connectors
Thicknet RG-8, 50-ohms
RG-11 50-ohms
Connectors that are characteristic of thicknet are: DIX or AUI connectors are used for connection to the network adapter card.
Cable TV RG-59 75-ohms, Broadband/Cable television
ARCnet RG-62 93 ohm,

Transceiver A can connect a thinnet cable to a thicknet cable. A transceiver cable is also called a drop cable. They can also switch the parallel data stream on a computers bus to a serial data stream used in the cables connection the computers.

Twisted Pair Cable - Twisted pair cable comes in two types Shielded (STP) and Unshielded (UTP). 

UTP Cable
Category 1 Older telephone networks
Category 2 less than 4 Mbps,
Category 3 Up to 16Mbps - The minimum UTP cable required for 10baseT
Category 4 Up to 20Mbps
Category 5 1 - 155Mbps most common rate is 10Mbps.

 

Ethernet Standards
10baseT 10Mbps data rate, baseband signaling over unshielded twisted pair (UTP). 10baseT segments may be up to 100 meters (328 feet) long, and a minimum cable length of 2.5 meters (about 8 feet). 1 node per segment 1,024 nodes per network.
100baseT 100baseT is regular Ethernet run at a faster data rate over category 5 UTP cable. 100baseT uses the same CSMA/CD protocol in a star wired bus as 10baseT. Also called fast Ethernet.
10base2
Thinnet
10Mbps data rate, baseband signaling, and a maximum segment length of 185 meters (610.5 Feet). Thinnet, which uses thin coaxial cable RG 58. - IEEE standard 802.3 30 Nodes per segment   90 per network. The total length of a thinnet network may not exceed 925 meters.  Based on the Bus topology.
10base5
Thicknet

(Also known as standard ethernet)
Typically 10Mbps data rate, baseband signaling, and a maximum segment length of 500 meters (1650 Feet). Thicknet, uses thick coaxial cable. RG-8 and RG-11. 100 Nodes per segment 300 nodes per network - IEEE standard 802.3. Maximum repeaters 4. Maximum Taps 100
10baseFL 2Gbps (typically 100Mbps)Mbps data rate, and baseband signaling over a fiber-optic cable. A 10baseFL network segment may be up to 2000 meters.

Ethernet uses a data format called frames. They can be between 64 to 1618 bits long. They contain preambles that mark the start of the frame.

100Mbps Ethernet specifications
100baseT4 4-pair Category 3, 4 or 5 UTP or STP
100baseTX 2-pair Category 5 UTP or STP
100baseFX 2-strand fiber-optic cable

 

Token Rink specifications
Type 1 cable The maximum number of workstations is 260 on type 1 or fiber optic cable at 16Mbps. The distance between MSAU's is 100 meters
Type 2 cable The maximum distance between MSAU's is 45 meters
Type 3 Cable The maximum number of workstations is 72 at 4Mbps.

A token Ring hub may also be referred to as a MAU MSAU, or SMAU.
Each ring can have 33 MSAU's

Connecting Networks

Component Function
Hub A hub is a device that connects multiple nodes to the network.
The three main types of hubs are:
   1) Passive - Don't require power, act merely as a physical connection.
   2) Active
- Require power, which they use to regenerate and strengthen signals passing though them.
   3) Intelligent
- Intelligent hubs can provide services such as packet switching and traffic routing.
Repeater Repeaters are used to strengthen the signal over distance. They are also used to counteract signal degradation and clean up the signal. Signal-regenerating repeaters create an exact duplicate of the incoming data, retransmitting only the desired data. Repeaters must use the same media access scheme. Resides on the Physical Layer of the OSI model.
Bridge Bridges are used to segment networks. Through address filtering, bridges can divide busy networks into segments and reduce network traffic. A bridge uses the physical address to determine where to pass the signal. Bridges cannot connect LAN's of different types (ex. an Ethernet segment cannot connect to a token Rink segment) They cannot distinguish one protocol from another. Bridges can connect dissimilar media. Resides on the MAC sub-layer of the Data Link Layer of the OSI model.
Router An intelligent connectivity device that routes using logical and physical address to connect two or more logically separate networks, Segment the network traffic. Routers can interconnect LAN's of different types (ex. Ethernet to Token Ring). Shares status and routing information to other routers to provide better traffic management and bypass slow connections. They also provide broadcast management. When packets are passed from router to router the data layer source and destination addresses are stripped of and then recreated. Resides on the Network Layer of the OSI model.
Routers use two type of addressing:
    1) Physical
    2) Logical
There are two types of Routing devices:
    1) Static - You must update the routing tables manually.
    2) Dynamic - Dynamic routers build and update there own routing tables.
Brouter A network connectivity device that can provide both bridge and router services. Operates at the Data Link Layer of the OSI model.
Gateway A network connectivity device that translates communication protocols between dissimilar LANs. Primarily operates at the Application Layer although they often fulfill certain functions at the Session layer and occasionally as low at the Network layer. For purposes of the exam consider the Gateway to work at or above the Transport layer .(note, I have read conflicting information regarding which layer a gateway resides on? )
Multiplexer A device that divides signals for transmission over a segment and reverses this process for multiplexed signals coming in from the segment. Multiplexers can mix both types of signal (voice and data) and places them on the same WAN link. Frequently shortened to MUX.
The following are methods of multiplexing.
  1. Frequency-division
  2. Time-division
  3. Statistical time division

Connection Oriented Communication - A formal connection between two computers. Reliable
Connectionless oriented connection - Sending data across the network without guaranteeing receipt. fast but Unreliable
Crosstalk - Interference when two wires are laid against each other in parallel.
Attenuation - The degradation or distortion of an electronic signal as it travels from it's destination.

IRQ Common Use
3 Com 2 and 4
4 Com 1 and 3
5 Usually open, Lpt 2, or MIDI
7 Lpt 1

 

Network Adapter Cards (NIC)

Designing the Local Area Network

  1. If you have fewer than 50 people you will be able to run your network with one server.
  2. A network of more than 250 users will most likely be connected together with a high-speed backbone that runs between servers.
  3. With more than 1000 users it is best to break down the network into multiple connected networks that have different directory services.
  4. Wires that connect computers together in a LAN are sometimes called the physical plant.
Type of network to number of users
Peer-to-peer 2 - 10 users
Single Server 10 - 50 users
Multi Server 50 -200 users
Multi Server High Speed Backbone network 200 -1000 users
Enterprise 1000 or more users

Administering A Network

Fault Tolerance Systems
RAID Function
Level 0 (Striping) Increase disk performance, but does not make your server more fault tolerant
Level 1 (Mirroring) Makes an exact copy of your hard drive partition on a another hard drive partition in your system. Mirrors can contain the system and boot partitions in NT.
Level 5 (Striping with Parity) Protects you from failure of any one disk in your computer by spreading the information to be stored on disks and by including some error correction information on the disk. If any one of the striped disks fails, the operating system can recover the information. Requires at least three disks with partition of the same size, and each partition should be on a different drive. The parity is written across all disks.

Sector Sparing - is a fault tolerance system also called hot fixing. If bad sectors are found during disk input/output operations, the fault tolerance driver will attempt to move the data to a good sector and map out the bad sector. Only SCSI devices can perform sector sparing. (ESDI and IDE) cannot.

Broadband - Analog signals. The signal flow is unidirectional. Multiple communication channels may be used simultaneously.

Baseband - Digital signal sent over a cable without modulation.

Windows NT & Novell

  1. Back end - Server
  2. Front end - Client
  3. Peer-to-Peer - All computers can act as client and server. This type of network is suited for networks that have 10 or fewer computer. No centralized security.
  4. Client/Server - Tasks are divided between the backend (the server) which stores and distributes the data and the front end (the client) which request specific data.
  5. SLIP - Cannot provide automatic IP addressing. Dialup communication Protocol
  6. PPP - Can provide automatic IP addressing. Dialup communication Protocol
  7. User level Security - Passwords are provided on a user-by-user basis. Also provides a higher level of security than share level. Associated with NT and Novell
  8. Share Level Security - Security where each resource owner shares a resource and creates a password to control access to its resource. Associated with Window 95 and Window for workgroups 3.11.
  9. Password policies can be used to protect sensitive data.
  10. A username cannot be the same as any other username or group name on the server or network domain.
  11. Viruses are transmitted by bootable floppy disks and executable programs.
  12. The program that helps the administrator manage user accounts on a Windows NT Servers is called User Manager for Domains. On NT workstation it's called User Manager.
  13. The Windows NT Performance Monitor shows the utilization of system resources.
  14. NDIS and Novell's ODI provide a standard for network adapter card drivers to communicate.
  15. Redirector - On Netware Networks the redirector determines whether a file request is intended for a local machine or for a remote computer.
  16. Open Datalink interface (ODI) is a specification defined by Novell and Apple to support multiple protocols on a single network adapter card. It is similar to NDIS.
  17. NDIS allows multiple protocols to used a single network card.
  18. The computer name and the shared name are both included in the Universal Name Convention (UNC) \\computer_name\share_name
  19. Routing Information Protocol (RIP) is the default protocol NetWare uses for routing. RIP is used to determine the number of hop counts to a destination. A hop count is the number of intermediate routers a packet must cross to reach a particular device. RIP functions at network layer of the OSI model.

Diagnostic Tools

  1. Advanced Cable Testers - A cable tester is an instrument used to test the integrity and strength of the cable. A cable tester can run test to determine if there is a cable break. It can also determine the cable's attenuation, resistance, message frame counts, . They can even monitor network for collisions, beaconing, traffic to and from a computer to see if a particular NIC card is is causing a problem. Some can even determine cable type.
  2. Time Domain Reflectors (TDR's) - TDR's work by emitting short pulses of know amplitudes that travel down a cable. A TDR analyzes the time delay associated with the resistance signal reflection. It can only detect shorts, breaks, imperfections in the network cable and tell you where they are.
  3. Digital Volt Meters (DVM's) - Digital volt meters can help you find a break or a short in a network cable by checking the voltage being carried across a network cable.
  4. Protocol Analyzers - A protocol analyzer monitors and logs network activity and provides guidelines for optimizing performance. They can analyze, capture and decode network packets, decode them, determine which components of a network are generating errors or traffic fluctuations and view the contents of a pack. You do not need to shut down the server or routers when trouble shooting problems. They work at the packet level. Also called a network analyzer.

 

Free test(104)

1.Broadband Transmission uses:

a. Bi-directional Digital signals, a range of frequencies to transmit data and use amplifiers to regenerate the signal.
b. Unidirectional analog signals, a range of frequencies to transmit data and use amplifiers to regenerate the signal.
c. Unidirectional digital signals, a range of frequencies to transmit data and use amplifiers to regenerate the signal.
d. Bi-directional Digital signals, a range of frequencies to transmit data and use repeaters to regenerate the signal.

 

2. Baseband Transmission uses:

a. Bi-directional Digital signals, a range of frequencies to transmit data and use amplifiers to regenerate the signal.
b. Unidirectional analog signals, a range of frequencies to transmit data and use amplifiers to regenerate the signal.
c. Unidirectional digital signals, a range of frequencies to transmit data and use amplifiers to regenerate the signal.
d. Bi-directional Digital signals, a single frequency to transmit data and use repeaters to regenerate the signal.

 

3. Project 802 defines standards for which layers of the OSI model?

a. Application and presentation layers.
b. Physical and Data Link layers
c. Network and Data Link layers
d. Transport and Network layers

 

4. Repeaters are used to:

a. Regenerate analog signals.
b. Regenerate digital signals.
c. Connect UTP to Fiber-Optic cable.
d. Connect ThinNet to Thicknet
e. Isolate broadcast traffic

 

5.  What is the maximum cable segment length for UTP (10BaseT) Ethernet?

a. 100 meters
b. 185 meters
c. 200 meters
d. 285 meters
e. 355 meters

 

6.  COM1+ 3 uses:

a. IRQ 2
b. IRQ 3
c. IRQ 4
d. IRQ 5
e. IRQ 6

 

7. COM2+4 uses:

a. IRQ 2
b. IRQ 3
c. IRQ 4
d. IRQ 6
e. IRQ 7

 

8. LPT 1 uses:

a. IRQ 2
b. IRQ 3
c. IRQ 4
d. IRQ 6
e. IRQ 7

 

9. Where do you need to be careful in not providing two equal NETBIOS names?

a. workgroup name
b. computer name
c. domain name
d. share name

  

10. With which devices can you measure the bandwidth of a new installation site ?

a. Volt meter
b. Network Monitor
c. TDR
d. Oscilloscope

 

11. Which protocols are routable?

a. XNS
b. OSI
c. IP
d. LAT
e. NetBEUI
f. IPX
g. AppleTalk
h. DECnet.

 

12. Which of the following examines packets?

a. performance monitor
b. TDR
c. Protocol Analyzer
D. SMPT

 

13. Which of the following should be used for at least 100mbps?

a. ATM
b. X25
c. 52kbps Digital line
d  X100

 

14. Which is a feature of Win NT Workstation?

a. Shared resources with passwords
b. User level passwords

 

15. Which is a feature of Win 95?

a. Shared resources with passwords
b. User level passwords

 

16. Assume that a user must provide a user name and password to gain access to a network resource. Different levels of access privileges are assigned, depending on the user. Which kind of network security is this an example of?

a. Share-level security
b. Partial-access security
c. User-level security
d. Password security

 

17. Why does a high number of broadcast messages adversely affect overall network performance?

a. Each broadcast message requires an acknowledgement packet from every computer on the network
b. No computer on the network can transmit data until each broadcast message has been acknowledged by every computer on the network
c. Broadcast messages are automatically routed to every segment of a LAN
d. Every computer on the network must process each broadcast message

 

18. Which layer of the OSI model are managed by a network protocol such as Microsoft NetBEUI?

a. Network
b. Physical
c. Transport
e. Media access control

 

19. Your company uses both Ethernet and token-ring LAN in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LAN's that use different protocols?

a. Bridge
b. Router
c. Gateway
d. Repeater

 

20. What device works at the MAC sub-layer of Data Link layer of the OSI Model?

a. Bridge
b. Router
c. Gateway
d. Repeater

 

21. What is the purpose of the token in a network that employs a media access control method on the IEEE 802.5 specification?

a. Token passing provides higher throughput than CSMA/CD when using twisted-pair wiring.
b. The station that holds the token is allowed to transmit a message on the network
c. The station that holds the token has the highest priority on the network
d. A token contains information that is used to route messages between rings

 

22. What does the MAC driver do?

a. It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes data to the application through the session layer interface.

b. It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions.

c. It supports communication between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services.

d. It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session.

 

23. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and you have limited workspace. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 100 meters in length. Which cable is best suited to this installation?

a. Fiber-optic
b. Category 1 UTP
c. Category 3 UTP
d. Thicknet coaxial

 

24. What is the minimum category of UTP cable required to meet Ethernet 10BaseT standard?

a. Category 1
b. Category 2
c. Category 3
d. Category 5

 

25. Which of the following can not be duplicated when using NetBIOS?

a. Workgroup name
b. Domain name
c. Computer name
d. Share name

 

26. What does the transport protocol do?

a. It defines how data should be presented to the next receiving layer, packages the data accordingly, ad then passes data to the application though the session layer interface.

b. It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions

c. It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services

d. It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session

 

 

27. Which of the following supports compression and error control?

a. PPP
b. SLIP
c. DLC
d.SMPT

 

28. Your company has decided to implement a WAN in the near future. You are required to design a Net BIOS naming scheme. At the present time your company consist of:

20,000 Computers using TCP/IP
850 Servers using Windows NT & NetWare
2500 HP LaserJet printers
Each employee has their own e-mail address

Required result:
The naming scheme should work after the company implements the WAN.

Optional desired results:
Naming scheme should show department, location and define the user.

Proposed solution:
Implement a 16 characters NetBIOS naming scheme. The first 6 characters would show the department, 5 characters would show the location, and the other 5 characters will have part of the e-mail address for each user.

a. The proposed solution produces the required result and produces both of the optional desired results.
b. The proposed solution produces the required result and produces only 1 of the optional desired results.
c. The proposed solution produces the required result but does not produce any of the optional desired results.
d. The proposed solution does not produce the required result.

 

29. Your company is implementing a WAN. You want to connect three locations in Atlanta, New York and Los Angeles.

Required results:
They need to have communication of at least 1 Mbps at all times.

Desired optional results:
They need to have continued communication between all cities at 1 Mbps even if one line breaks.

Proposed solution:
Connect a T1 line between New York and Los Angeles and Los Angeles and Atlanta.

a. The proposed solution produces the required result and produces both of the optional desired results.
b. The proposed solution produces the required result and produces only 1 of the optional desired results.
c. The proposed solution produces the required result but does not produce any of the optional desired results.
d. The proposed solution does not produce the required result

 

30. Your company is implementing a WAN. You want to connect three locations in Atlanta, New York and Los Angeles. 

Required results:
They need to have communication of at least 1 Mbps at all times.

Desired optional results:
They need to have continued communication between all cities at 1 Mbps even if one line breaks.

Proposed solution:
Connect 3 T1 lines between each of the three cities.

a. The proposed solution produces the required result and produces both of the optional desired results.
b. The proposed solution produces the required result and produces only 1 of the optional desired results.
c. The proposed solution produces the required result but does not produce any of the optional desired results.
d. The proposed solution does not produce the required result.

 

31. You have a network with MS-DOS clients and Unix clients. Recently, an NT server is added to the network. Now the Unix machines can access all shared resources except those on the NT server. why?

a. protocol mismatch between server and Unix clients
b. incorrect binding order of protocols on the server

 

 32. You have a network in which network utilization has increased from 30% to 70% in one year. You plan to add another server and 30 clients within 12 months.

Required Result:
Reduce network utilization by 50%

Optional results:
allow for future expansion
minimize costs
maintain network utilization at its present lower level

Proposed solution:
Change the packet size from 1514 bytes to 576 bytes and increase the TCP window from 4096 bytes to 16384 bytes

a. The proposed solution produces the required result and produces both of the optional desired results.
b. The proposed solution produces the required result and produces only 1 of the optional desired results.
c. The proposed solution produces the required result but does not produce any of the optional desired results.
d. The proposed solution does not produce the required result.

 

33. You're network has started to slow down. You run performance monitor and it shows the following: 

%processor time = 8 (average)
%pagefaults/sec = 2 (average)
%disk_time=25 (average)

Based on this, what should to restore performance.

a. add more ram
b. introduce disk striping with parity
c. get multiprocessor system
d. segment the network

 

34. You've got 'x' number of servers and PC's using a mixture of routable and non-routable protocols including TCP/IP, SPX/IPX and NetBEUI. You've got 4 brouters. And the network performance is being seriously compromised by network broadcast traffic.

Required:
Cut broadcast traffic by 50%

Optional Desired Results:
keep costs to a minimum
allow for further expansion

Proposed Solution:
Convert all the computers to NWLink and disable the bridging

a. The proposed solution produces the required result and produces both of the optional desired results.
b. The proposed solution produces the required result and produces only 1 of the optional desired results.
c. The proposed solution produces the required result but does not produce any of the optional desired results.
d. The proposed solution does not produce the required result.

 

 

35. You have 750 computers on an IPX network, one NT server, and all the rest are win95 clients. You want to MINIMIZE the amount of administration, what do you use:

a. Peer-peer
b. User level.

 

36. Which WAN transmission will support any available transmission speed?

a. Frame relay
b. ATM

 

37. What WAN link transmits voice, data and video?

a. ATM
b. RAS
c. T1
d. ISDN

 

38. What is a characteristic of assured delivery?

a. Connection Oriented
b. Connection-less Oriented

 

39. You have a 486 computer using COM1, COM2, LPT1, and VGA. NIC is set for IRQ 3, I/O Base 300. Which one is conflicting with the NIC?

a. COM1
b. COM2
c. LPT1
d. VGA

 

40. Your network is using multiple protocols (AppleTalk, NetBEUI, TCP/IP, NWLink,...) for MACS, NetWare, Unix, PCs. There is excessive network traffic and poor performance. How can you reduce network traffic and improve performance. Choose only one protocol for the network. There should be minimal degradation of machine functionality as a result of the protocol change.

a. AppleTalk
b. NetBEUI
c. TCP/IP
d. NWLink

 

41. What resource can you use to check hubs, routers, and bridges on your network?

a. SNMP
b. TDR
c. Network Monitor 

 

42. Which Operating Systems support share-level access?

a. Windows for Workgroups
b. Windows 95
c. Win NT Workstation
d. Win NT Server

 

43. Tom can log on to the network but cannot connect to a server on another segment using that server's NetBIOS name. What is wrong?

a. Tom's computer is not registered in the WINS server
b. The remote server is not registered in the WINS server.

 

44. What is the name of the unique identifier encoded in the NIC?

a. MAC address
b. IP address.

 

45. Your network cannot be down if one hard disk fails. What kind of fault-tolerance can you implement with a limited budget.

a. RAID level 5 (disk striping w/parity)
b. Disk duplexing
c. Backup server

 

46. You come in Monday morning and find that all computers on one segment of the network are having problems communicating. You suspect that it is caused by a broadcast storm. You have determined that it is not a hardware problem. What is your first action to resolve the problem? Choices as best as I remember were:

a. disconnect all routers
b. Power down and restart the server
c. Use a TDR to analyze the problem
d. Use a Network Analyzer to determine the source of the storm

 

47. You have offices in Atlanta, New York, and LA You want to connect the 3 offices in a WAN.

 Required result: They must have communication of at least 1 Mbps

 Optional desired result: They must be able to communicate at 1 Mbps even if one link fails.

Solution: Install 2 T1 links (New York to Atlanta, Atlanta to LA)
Install dial-up connections of 28.8 Kbps between all 3 sites.

a. The proposed solution produces the required result and produces the optional desired result.
b. The proposed solution produces the required result but does not produce optional desired result.
c. The proposed solution does not produce the required result.

 

 

48. You have offices in Atlanta, New York, and LA You want to connect the 3 offices in a WAN.

Required result: They must have communication of at least 1 Mbps

Optional desired result: They must be able to communicate at 1 Mbps even if one link fails.

Solution: put a RAS server at each site and have 6 28.8 Kbps lines going between all 3 sites.

a. The proposed solution produces the required result and produces the optional desired result.
b. The proposed solution produces the required result but does not produce optional desired result.
c. The proposed solution does not produce the required result.

 

 

49. You have a number of computers in a 10Base2 network and it has reached 70% of capacity. You will be adding some more computers later.

Required result: Increase speed by 50% and reduce % of capacity to ? (I think 30).

Optional desired results: Maintain the level of operation after adding the additional computers and Minimal change to operation

 Solution: Install fiber optic cable and FDDI adapters

a. The proposed solution produces the required result and produces the optional desired result.
b. The proposed solution produces the required result but does not produce optional desired result.
c. The proposed solution does not produce the required result.

 

50. What do you use for measuring network performance over long period of time?

a. Time domain reflectometer
b. Protocol Analyzer
c. Logging with Performance Monitor

 

51. Which of the following would you use if you wanted a safe dialup connection?

a. SLIP
b. PPP

 

52. Which of the following supports compression and error control?

a. PPP
b. SLIP

 

53. What OSI level does a router work at?

a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
e. Network Layer
f. Data Link Layer
g. Physical Layer

 

54. What OSI level does a gateway work at?

a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
e. Network Layer
f. Data Link Layer
g. Physical Layer

 

55. What OSI level does a bridge work at?

a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
e. Network Layer
f. Data Link Layer
g. Physical Layer

 

56. One of the workers in the company complained that her computer is slow. What should you do to isolate this problem?

a. Use network monitor to monitor the network
b. Shut down all routers in that segment
c. Shut down the server in that segment of the network.

 

57. Which connectivity device works above the transport layer?

a. repeater
b. bridge
c. router
d. gateway
e. brouter

 

58. You need to run Twisted Pair Cat5 180m. What would you need?

a. repeater
b. bridge
c. router
d. gateway
e. brouter

 

59. What do you use to create a segmented LAN?

a. repeater
b. bridge
c. router
d. gateway
e. brouter

 

60. You have an 200 node LAN using TCP/IP, and you want to segment it into 3 sub-nets. What do you use?

a. repeater
b. bridge
c. router
d. gateway
e. brouter.

 

61. What connectivity device works at the physical layer of the OSI model?

a. repeater
b. bridge
c. router
d. gateway
e. brouter.

 

62. You have an 200 node LAN using TCP/IP and NetBEUI and after you segment it into 3 subnets it is still able to use both protocols. What do you use?

a. repeater
b. bridge
c. router
d. gateway
e. brouter.

 

63. What do you use to connect a Ethernet LAN to IBM mainframe?

a. repeater
b. bridge
c. router
d. gateway
e. brouter

 

64. Two of your clients encounter problems accessing the network most of the time. All others have the same problem occasionally. You have 2 networks together using TCP/IP & NetBEUI protocols. The cables you are using are RG-58 A/U and RG 58 U.

After running diagnostics you get the following readings:

CABLE reads INFINITY
BNC T connectors read INFINITY

What would you do?

a. Replace all BNC T connectors.
b. Replace all 16 bit network cards with 32 bit.
c. Replace all RG-58 A/U cable with RG-58 U.
d. Set the transceiver settings to the manufacturer defaults.

 

65. A company has 120 computers, with Windows 95 and Windows for Workgroups and has a problem with employee turnover. You implement:

a. User-level security
b. share-level with passwords for resources.

 

 

66. Configurations for 2 NICs on your network are identical, why can't they participate in the network?

a. Base I/O conflict
b. IRQ conflict
c. Incorrect frame type
d. MAC address conflict.

 

67. You want to implement a WAN and you want to use the fastest transfer speed, What do you use?

a. T1
b. ATM
c. Switched 56k
d. ISDN

 

68. You test your RG-58 cable and get the following readings:

end 0 to infinity
t-connector infinity
terminator 50

a. replace terminator with a 75 ohm terminator
b. replace the cable
c. replace the t-connector

 

69. Which WAN link will provide increased bandwidth as needed?

a. X.25
b. Frame Relay
c. DLC
d. ATM

 

70. What would be used to connect two twisted pair category 5 wiring cable lengths into a 180 meter run?

a. repeater
b. bridge
c. router
d. gateway
e. brouter

 

71. What device is used to segment a LAN to isolate network traffic?

a. repeater
b. bridge
c. router
d. gateway
e. brouter

 

72. Which of the following should be used for at least 100mbps?

a. X25
b. 52kbps
c. Digital line [ATM]

 

73. Assume that a user must provide a user name and password to gain access to a network resource. Different levels of access privileges are assigned, depending on the user. Which kind of network security is this an example of?

a. Share-level security
b. Partial-access security
c. User-level security
d. Password security

 

74. Which layers of the OSI model are managed by a network protocol such as Microsoft NetBEUI?

a. Network and transport
b. Physical and data link
c. Transport and session
d. Media access control and logical link control

 

75. Your company uses both Ethernet and token-ring LAN in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LANs that use different protocols?

a. Bridge
b. Router
c. Gateway
d. Repeater

 

76. What is the purpose of the token in a network that employs a media access control method on the IEEE 802.5 specification?

a. Token passing provides higher throughput than CSMA/CD when using twisted-pair wiring.
b. The station that holds the token is allowed to transmit a message on the network
c. The station that holds the token has the highest priority on the network
d. A token contains information that is used to route messages between rings

 

77. Which of the following will support a WAN link of 100Mbps?

a. Frame Relay
b. T1
c. -X.25
d. Frame Relay
e. ATM

 

78. Which limitation are NDIS and Novell ODI designed to overcome?

a. The need to dynamically bind a single protocol to multiple MAC drivers in order to support more than one network operating system.

b. The need for proprietary network interface drivers for each network operating system and protocol.

c. Monolithic protocols do not conform to the OSI model

d. Monolithic protocols cannot be loaded into the upper memory area

 

 

79. What does the MAC driver do?

 a. It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes data to the application through the session layer interface.

 b. It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions.

 c. It supports communication between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services

 d. It is responsible for establishing logical names on the network, establishing connectionsbetween two logical names on the network, and supporting reliable data transfer between computers that have established a session

 

80. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and you have limited workspace. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?

a. Fiber-optic
b. Category 1 UTP
c. Category 3 UTP
e. Thicknet coaxial

 

81. What is the minimum category of UTP cable required to meet Ethernet 10BaseT standard?

a. Category 1
b. Category 2
c. Category 3
e. Category 5

 

82. You have two networks, one uses NetBEUI and ones uses NWLink. Which device is required so that these networks can communicate?

a. Router
b. Brouter
c. Bridge
d. Repeater

 

83. What does the transport protocol do?

a. It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes data to the application though the session layer interface.

b. It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions.

c. It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services.

d. It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session.

 

 

84. What protocol counts hops from router to router to find the shortest path?

a. DHCP
b. RIP
c. SNMP
d. IP
e. DLC

 

85. Which WAN link will provide increased bandwidth as needed?

a. X.25
b. Frame Relay
c. DLC
d. ATM

 

86. Which connectivity device works at the network layer and is capable of selecting multiple data paths?

a. Bridge
b. Repeater
c. Router
d. Hub

 

87. What do you need to know to copy a shared file from one computer to another?

a. Workgroup name
b. Share name
c. Domain name
d. Computer name

 

 

88. What is a characteristics of IEEE 802.3 10Base2 specification?

a. UTP
b. RG-62
c. BNC T Connector
d. RJ 45

 

89. Tom attempts to log onto the system and he is unsuccessful because he cannot get an IP address. Which dial-up protocol is Tom using?

a. PPP
b. SLIP

 

90. From the following, choose a WAN link of 100Mbps.

a. T1
b. ATM
c. X.25
d. Frame Relay

 

91. What is a characteristic of IEEE 802.3 10BaseT specification?

a. RJ-11
b. BNC T connector
c. UTP
d. Coaxial cable

 

92. EXHIBIT

                        O
                       X-|
                           |

O-X--------------------|-----------------------X-O (Grounded)

RG-58 A/U Cable

O=50 ohm Terminator
X=Computer

The company is having problems with their network. They have problems with attenuation. What would you do to solve the problem?

a. Change the 50 ohm terminators to 25 ohm
b. Ground one of the other terminators
c. Rearrange the cables so there are only two terminators
d. Add a repeater

 

 

93. EXHIBIT

 

O-X---------------X-----------------X---------------X-O
+                                                         +

O=50 ohm Terminator
+=Ground
X=Computer

 The company is using 10Base2, RG-58 A/U cabling for a bus topology in one of their classrooms. The computers are receiving garbage information. They have hired you to fix the problem. What would you do?

a. Replace all the cable with RG-58 /U
b. Ground the terminators properly
c. Change terminators to 25 ohms
d. Add a repeater to boost the signal

 

 

94. You have set up two computers to connect into the network. All components IRQ's are set to default value. You have set up both network cards with the following:

MAC address = 0114AS558957
IRQ = 5
I/O Base Address = 300

The computers are not able to communicate on the network. What should you do?

a. Change IRQ5 to IRQ3
b. Change MAC address to manufacturers default
c. Change I/O Base address to 320
d. Check for loose connections

 

 

95. You have an Ethernet network and a Token Ring network connected by a bridge. When you send a file from the Token Ring network to the Ethernet network, it takes 2 minutes. When you send the same file from the Ethernet network to the Token Ring network it takes 30 seconds. What could be the cause of the problem?

a. The Ethernet packet size is larger than the Token Ring packet size.
b. The Token Ring packet size is larger than the Ethernet packet size.

 

 

96. You can successfully ping a server using it's IP address, but you cannot send it a message using it's NetBIOS name. What is the possible problem?

a. The server's name is not registered in the WINS server.
b. Your station's name is not registered in the WINS server.

 

97. You are installing a new network. You want an inexpensive way to provide 100Mbps. What should you use?

a. Category 5 UTP cable
b. Category 4 UTP cable
c. Category 3 UTP cable 

 

98. Your company has decided to implement a WAN in the near future. You are required to design a Net BIOS naming scheme. At the present time your company consist of:

20,000 Computers using TCP/IP
850 Servers using Windows NT & NetWare
2500 HP LaserJet printers
Each employee has their own e-mail address

Required result:
The naming scheme should work after the company implements the WAN.

Optional desired results:
Naming scheme should show department, location and define the user.

Proposed solution:
Implement a 15 characters NetBIOS naming scheme. The first 5 characters would show the department, 5 characters would show the location, and the other 5 characters will have part of the e-mail address for each user.

a. The proposed solution produces the required result and produces both of the optional desired results.
b. The proposed solution produces the required result and produces only 1 of the optional desired results.
c. The proposed solution produces the required result but does not produce any of the optional desired results.
d. The proposed solution does not produce the required result.

 

99. In a system that uses a client-server application, what does the server do ?

a. The server fills requests from the client computer for data and processing resources.
b. The server stores data for the client, but all data processing occurs on the client computer.
c. The client stores data for the server, but all data processing occurs on the server computer.
c. The server stores data and performs all of the data processing, the client performs as a display device.

 

100. What is the maximum cable segment length for thinnet Ethernet?

a. 100 meters
b. 185 meters
c. 200 meters
d. 285 meters
e. 355 meters

 

101. What device translates protocols above the data link layer?

a. Bridge
b. Repeater
c. Router
d. Hub
e. Gateway

 

102. You have a large office with a single floor, the lease does not allow installation of cable in walls. You need to setup 7 computers in a network and keep cost to a minimum. What type of topology would you use?

a. Star
b. Bus
c. Mesh
d. Fiber-optic

 

103. What wide area network service can provide reliable connection over unreliable switched circuits?

a. ISDN
b. X.25
c. Frame Relay
d. ISDN

 

104. You just installed a network adapter card in a PC on IPX network. The network drivers load ok but the PC can't talk to server. All the other PC's can talk to the server without problems.

a. Incorrect transceiver setting
b. Memory address conflict
c. Segment improperly terminated
d. Frame type setting incorrect

d