You are on page 1of 20

Troy Technologies USA

MCSE
STUDY GUIDE
Networking Essentials
Exam 70-58

Congratulations!!
You have purchased one of the Troy Technologies USA MCSE Study Guides.

This study guide consists of a selection of questions and answers very, very
similar to the ones you will find on the official MCSE exam. All you need to do is
study and memorize the following questions and answers.....and you will be ready
to take the exam. Remember, we guarantee it!

Average study time is 10 to 12 hours. Then you are ready.

GOOD LUCK!

Guarantee

Should you use this study guide and still fail the appropriate MCSE exam, then
send your original of the official score notice, along with your mailing address to:

Troy Technologies USA


11134 Hunter Oaks
San Antonio, TX 78233

We will gladly refund the full cost of this study guide. However, you are not
going to need this guarantee if you follow the above instructions.

Ó Copyright 1998 Troy Technologies USA. All Rights Reserved.

Page 2 of 20
OSI MODEL
Layer Name Function
7 Application Layer Program-to-program communication.
6 Presentation Layer Manages data representation conversions.
For example, the Presentation Layer would be responsible for
converting from EBCDIC to ASCII.
5 Session Layer Responsible for establishing and maintaining communications
channels.
In practice, this layer is often combined with the Transport Layer.
4 Transport Layer Responsible for end-to-end integrity of data transmission.
3 Network Layer Routes data from one node to another.
2 Data Link Layer Responsible for physically passing data from one node to another.
1 Physical Layer Manages putting data onto the network media and taking the data off.

Mnemonic: All People Seems To Need Data Processing

OSI Model Banyan Vines MS NT LAN Manager Novell NetWare TCP/IP Unix

Application NetWare Core Network


Layer Vines Redirector Server Message Protocols Applications
Block (NCP)
(SMS)
Presentation Net Direct Socket
Layer RPC Socket Interface
Session Layer NetBIOS Named
Pipes
Transport Layer SPP & ICP NetBEUI SPX TCP UDP
Network Layer VINES IP ICP IPX IP ICMP
Data Link Layer ARP & RARP Vines NDIS ODI / NDIS ARP & RARP &
Drivers & NDIS NDIS
Network
Physical Layer Network Interface Network Interface Card Network Interface Interface Card
Card Card

IEEE 802.x Definitions

802.1 INTERNETWORKING
802.2 LOGICAL LINK CONTROL
802.3 CARRIER SENSE w/ MULTIPLE ACCESS & COLLISION DETECTION (CSMA/CD)
(ETHERNET)
802.4 TOKEN BUS LAN
802.5 TOKEN RING LAN
802.6 METROPOLITAN AREA NETWORK (MAN)
802.7 BROADBAND COMMUNICATION
802.8 FIBER OPTIC COMMUNICATION
802.9 INTEGRATED VOICE/DATA NETWORKS
802.10 NETWORK SECURITY
802.11 WIRELESS NETWORKS
802.12 DEMAND PRIORITY ACCESS METHOD FOR 100 MB OPERATION

Page 3 of 20
Networking Devices

Internetworking devices offer communication between local area network (LAN) segments.
There are five primary types of internetworking devices: repeaters, bridges, routers, brouters, and gateways.
These devices can be differentiated very generally by the Open System Interconnection (OSI) layer at which
they establish the LAN-to-LAN connection.
Each device offers the functionality found at its layer(s) of connection and uses the functionality of all lower
layers.

Device OSI Layer Description


A network device used to regenerate or replicate a signal.
Repeaters are used in transmission systems to regenerate analog or
digital signals distorted by transmission loss.
Analog repeaters frequently can only amplify the signal while
digital repeaters can reconstruct a signal to near its original quality.
Repeater Physical
In a data network, a repeater can relay messages between
subnetworks that use different protocols or cable types. Hubs can
operate as repeaters by relaying messages to all connected
computers. A repeater cannot do the intelligent routing performed
by bridges and routers.

A device that connects two local-area networks (LANs), or two


segments of the same LAN. The two LANs being connected can be
alike or dissimilar. For example, a bridge can connect an Ethernet
with a Token-Ring network.
Bridge Data Link
Unlike routers, bridges are protocol - independent. They simply
forward packets without analyzing and re-routing messages.
Consequently, they're faster than routers, but also less versatile.
A device that connects two LANs. Routers are similar to bridges,
but provide additional functionality, such as the ability to filter
messages and forward them to different places based on various
Router Network criteria.

The Internet uses routers extensively to forward packets from one


host to another.
Short for bridge router, a device that functions as both a router and
a bridge. A brouter understands how to route specific types of
packets, such as TCP/IP packets. Any other packets it receives are
Brouter Data Link/Network simply forwarded to other network(s) connected to the device (this
is the bridge function).

In networking, a combination of hardware and software that links


two different types of networks. Gateways between e-mail systems,
for example, allow users on different e-mail systems to exchange
Gateway Top 4 layers messages.

Page 4 of 20
Standard Topologies

Bus (active) a single cable (trunk) that connects all computers in a single line.
(delicate to interference; difficult in localizing errors)

Server
Laptop Client
Network cable
(media)

Printer

Client

Star (active) computers connect to a centralized hub via cable segments.


(easy to expand; additional hardware is necessary)

Server

Client Client

Hub
Client

Client

Laptop
Client

Ring (active) connects all computers on a single cable. Ends are not terminated,
but form a full loop connecting the last computer to the first computer.
( Errors are problematic to find; one broken NIC or cable segment
stoppes the whole net)

Client
Client

Client
Laptop

Laptop

Client

Client

Client

Mesh (active) connects all computers on a single cable. Ends are not terminated, but
form a full loop connecting the last computer to the first computer.

Client

Client Client

Client Client

Page 5 of 20
Access Methods

CSMA/CD Collision Detection; listens to cable prior to sending data. (EtherNet)


CSMA/CA Collision Avoidance; Announces intention to send data. (AppleTalk)
Token-Passing Token revolves around ring, computer which has token is permitted
to send the data. (Token Ring)

Cables

Type 10base2 10base5 10baseT 100baseT


Thinnet Thicknet
Wire Coaxial RG58-A/U Coaxial UTP Category 3,4,5 UTP Category 5
Distance 185m 500m 100m 100m
Connectors BNC AUI/DIX RJ-45 RJ-45

Fiber-Optic-Carries light pulse signals through glass core at speeds of between


100Mbps and 200,000Mbps.

Signal Transmission

Attenuation The degrading of a signal as it travels farther from its origination.


Crosstalk Signal overflow from one wire to another adjacent wire.
Jitter Instability in a signal wave; Caused by signal interference or an unbalanced
FDDI Ring or Token Ring.
Baseband Uses digital signaling over a single frequency. Transmits bidirectionally.
Broadband Uses analog signaling over a range of frequencies. Transmits unidirectionally. Uses
amplifiers for signal regeneration.

Hardware Interrupts

Interrupt registered for reference


0 System timer reserved
1 Keyboard standard for all PC’s
2 System I/O Reserved
3 Com2/4 standard for most PC’s
4 Com1/3 standard for most PC’s
5 LPT2 mostly available
6 Floppy Controller standard for all PC’s
7 LPT1 eventually other devices
8 real time clock reserved
9 diverted IRQ2 eventually available
10 free mostly available
11 free mostly available
12 free mostly available
13 FPU reserved, if required by the system
14 HD-Controller standard for all PC’s
15 Free mostly available

Page 6 of 20
Multitasking

Preemptive multitasking The system decides which task gets how much processor time
(Windows NT & Windows 95)
Cooperative multitasking The programs decide when to give processor time to other programs.
(Windows 3.x & Windows 95)

Protocol types
routable:
- DECnet
- IP
- IPX
- OSI
- XNS
- Apple Talk (DDP)
nonroutable:
- LAT (local area talk -DEC corp)
- NetBEUI
- DLC

Raid-level supported by Windows NT

Level Description Requires


RAID 0 Disk Striping ³ 3 HD's
RAID 1 Disk Mirroring 1 controller; 2 HD's
RAID 5 Stripe set with parity ³ 3 HD's

Page 7 of 20
QUESTIONS
EXAM 70-58
1. You install an Ethernet card on a client. The network software initialized properly but the computer
can not communicate with others on the network. All other computers can talk to the server.
What is most likely the problem?

A: Transceiver on network adapter is wrong.

2. You have a NetWare network. Initialization of the client computer works, but client can not talk
to the server, other computers on network can.
What is most likely the problem?

A: Incorrect frame type.

3. What will be the answer for all questions on the EXAM that have ATM as one of the possible
choices?

A: ATM

4. What type of cable would you use for 802.3 100BaseT Fastnet?

A: Category 5 Unshielded Twisted Pair (UTP)

5. What type of cable would you use for 802.3 10BaseT Standard?

A: Category 3 Unshielded Twisted Pair (UTP)

6. What type of connectors would you use for 802.3 10Base2 Standard?

A: BNC/T connectors

7. You have a one story building with one foot of space above ceiling and a 100Mbps network.
What kind of cabling should you use?

A: Category 5 Unshielded Twisted Pair (UTP)

8. What type of protocol provides assurance of packet delivery?

A: Connection oriented

9. What type of connection protocol supports compression for TCP/IP data packets?

A: PPP

10. How do you view NETBIOS names on a Windows NT subnet?

A: WINS server

11. You want to connect two Ethernet LANs. They use NWLink and NETBEUI.
You want to filter data and cut down network traffic.
What device do you use?

A: Brouter

12. Your Company has Ethernet with 750 computer which are WFW, W95 and NT clients.
You want to protect sensitive network data with minimal downtime.
How?

A: Centralize administration of user accounts with resource password security on shared


resources.
Page 8 of 20
13. Repeaters are used to?

A: Regenerate digital signals.

14. What IRQ does COM1 and COM3 use?

A: IRQ 4

15. What IRQ does COM2 and COM4 use?

A: IRQ 3

16. What IRQ does LPT1 use?

A: IRQ 7

17. With which devices can you measure the bandwidth of a new installation site ?

A: Network Monitor

18. Which protocols are routable? (Choose all)

A: Choose everything except NETBEUI, DLC and LAT

19. Which of the following examines network packets?

A: Protocol Analyzer

20. Assume that a user must provide a username and password to gain access to a network resource.
Different levels of access privileges are assigned, depending on the user.
Which kind of network security is this an example of?

A: User-level security

21. What device works at the MAC sub-layer of Data Link layer of the OSI Model?

A: Bridge

22. Which of the following connection types support compression and error control?

A: PPP

23. You have a network with MS-DOS clients and UNIX clients. Recently, a NT server is added to the
network. Now the UNIX machines can access all shared resources except those on the NT server.
Why?

A: Protocol mismatch between server and UNIX clients.

24. Which WAN transmission method will support any available transmission speed?

A: ATM

25. What WAN transmission method transmits voice, data and video?

A: ATM

26. You have a 486 computer using COM1, COM2, LPT1, and VGA.
The Network Interface Card (NIC) is set for IRQ 3, I/O Base 300.
Which one would conflict with the NIC?

A: COM2
Page 9 of 20
27. Tom can logon to the network, but cannot connect to a server on another segment using that server's
NetBIOS name. What is wrong?

A: Tom's computer is not registered in the WINS server.

28. What is the name of the unique identifier encoded within the NIC?

A: MAC address

29. Your network cannot be down if one hard disk fails.


What kind of fault-tolerance can you implement with a limited budget?

A: RAID 5 (disk striping w/parity)

30. What do you use for measuring network performance over long period of time?

A: Logging with Performance Monitor

31. Which of the following would you use if you wanted a safe dialup connection?

A: PPP

32. What OSI level does a Router work at?

A: Network Layer

33. What OSI levels does a Gateway work at?

A: Application Layer (choose this if you can only select one)


Presentation Layer
Session Layer
Transport Layer

34. One of the workers in the company complained that her computer is slow.
What should you do to isolate this problem?

A: Use Network Monitor to monitor the network.

35. Which connectivity device works above the Transport layer?

A: Gateway

36. You need to run UTP Cat5 for 180 meters. What device would you need?

A: Repeater

37. You have an 200 node LAN using TCP/IP, and you want to segment it into 3 subnets.
What do you use?

A: Router

38. What connectivity device works at the Physical layer of the OSI model?

A: Repeater

39. You have an 200 node LAN using TCP/IP and NETBEUI.
After you segment it into 3 subnets you still want to be able to use both protocols.
What do you use?

A: Brouter

Page 10 of 20
40. What do you use to connect a Ethernet LAN to IBM mainframe?

A: Gateway

41. A company has 120 computers running Windows 95 and Windows for Workgroups and has a
problem
with employee turnover.
With security in mind, what would you implement?

A: User-level security (if you have an NT server) or Share-level security (If you do not)

42. You test your RG-58A/U(10base2) cable and get the following resistance readings:

cable = 0 to infinity
T-connector = infinity
terminator = 50

What do you need to do?

A: Replace the cable

43. You have been given the task of installing cables for an Ethernet network in your office. The
building is
an older one, and you have limited workspace. In addition, the network cable will have to share the
existing conduit with telephone cable and cable segments will be up to 135 meters in length.
Which cable is best suited to this installation?

A: Thicknet coaxial (Thinnet/10base2 the best choice, but not one of the answers)

44. What is the minimum category of UTP cable required to meet Ethernet 10BaseT standard?

A: Category 3

45. What do you need to know to copy a shared file from one computer to another?

A: Share name

46. Tom attempts to log onto the system and he is unsuccessful because he cannot get an IP address.
Which dial-up protocol is Tom probably using?

A: SLIP

47. The company is having problems with their network. They have problems with attenuation.
What would you do to solve the problem?

EXHIBIT

PC1

RG-58 A/U Cable

PC2 PC3 (grounded)

O=50 ohm Terminator

A: Rearrange the cables so there are only two terminators.

Page 11 of 20
48. The company is using 10Base2, RG-58 A/U cabling for a bus topology in one of their classrooms.
The computers are receiving garbage information. They have hired you to fix the problem.
What would you do?

EXHIBIT

PC2 PC3

PC1 (grounded)
PC4 (grounded)

o=50 ohm Terminator

A: Ground the terminators properly (only one terminator should be grounded).

49. You have set up two computers to connect into the network. All components IRQ's are set to default
value. You have set up both network cards with the following settings:

MAC address = 0114AS558957


IRQ = 5
I/O Base Address = 300

The computers are not able to communicate on the network. What should you do?

A: Change MAC address to manufacturers default

50. You can successfully ping a server using it's IP address, but you cannot send it a message using it's
NetBIOS name. What is the possible problem?

A: The server's name is not registered in the WINS server.

51. You are installing a new network.


You want an inexpensive way to provide a transmission speed of 100Mbps.
What cable type should you use?

A: Category 5 UTP cable

52. In a system that uses a client-server application, what does the server do ?

A: The server stores data and performs all of the data processing, the client performs as a
display device.

53. What device translates protocols above the Data link layer?

A: Router

54. You have a large office on a single floor, the lease does not allow installation of cable in the walls.
You need to setup 7 computers in a network and keep cost to a minimum.
What type of topology would you use?

A: Bus

Page 12 of 20
55. What wide area network service can provide reliable connection over unreliable switched circuits?

A: X.25

56. You just installed a network adapter card in a PC on IPX (NWLink) network. The network drivers
load OK, but the PC can't talk to server. All the other PC's can talk to the server without problems?

A: Frame type setting incorrect


57. Christina's computer WAS WORKING and now can NOT connect to network server. All other
computers on network can.
Why?

A: Network cable is loose

58. Ethernet BUS topology is described in what IEEE standard?

A: 802.3

59. Token Ring topology is described in what IEEE standard?

A: 802.5

60. Select all that only use a PASSWORD on a shared resource for security?

A: Windows for Workgroups


Windows 95

61. Select all where you CAN use a duplicate NETBIOS name?

A: workgroup name
domain name
sharename

62. What type of network topology would have every node connected directly to every other node on the
network? (Question will be an exhibit)

A: Mesh Topology

63. What type of software would you use to help manage your network by checking hubs, routers and
bridges?

A: SNMP

64. You install a network card and your computer no longer boots.
What is the most likely cause?

A: IRQ Conflict

65. You need to install a cheap 19.2 kbps connection to be available 24 hours a day.
What would be your best bet?

A: A Leased Analog connection.

66. What do you call the weakening or degrading of a signal as it travels farther from it’s point of
origin?

A: Attenuation

67. What do you call signal overflow from an adjacent wire or cable?

A: Crosstalk
Page 13 of 20
68. What reading would you get from an ARCNET terminator?

A: 93ohms.

69. Your friend has used TV cable (RG-58U) and network cable (RG-58 A/U) for his network and it is
not working correctly.
What is wrong?

A: Must use all RG-58A/U cable

70. What purpose does a WINS Server perform?

A: Resolves NetBIOS names to IP addresses.

71. What purpose does a DHCP Server perform?

A: Automatically assigns IP addresses to clients.

72. What tool do you use to test a CAT 5 UTP cable’s full bandwidth capability ?

A: Protocol Analyzer

73. What testing tool would you use to test a router, bridge and a repeater?

A: Protocol Analyzer

74. If you have a question on the exam and Protocol Analyzer is one of the answers, what should you do?

A: Choose it! (except for #30 above)

75. What can a network with 10 Windows NT Workstations implement to share/protect files?

A: User-Level Security

76. What can a network with 10 Windows 95 clients implement to share/protect files?

A: Share-Level Security

77. You have a 10BaseT network that is 300 meters. What device do you need to make this possible?

A: Repeater

78. What type of communication connection can and will eventually replace standard phone lines?

A: ISDN

79. Barbara is using a modem that is 5 years old. The connection will not provide compression.
Which communication protocol is Barbara's PC using?

A: SLIP

80. What software measures hops between routers to determine the best paths between locations on
a network?

A: Routing Information Protocol (RIP)

81. If your resistance measurement for a RG58A/U cable is 0, what action should you take?

A: Replace cable

Page 14 of 20
82. How many grounded cables can a 10base 2 network have?

A: One

83. A server which performs processing for client computers is called?

A: An application server

84. You have a small 5-10 computer network. Which protocol would you use?

A: IPX/SPX or NWLink (NETBEUI was not a choice)

85. You use a ohmmeter to measure the resistance on a coax cable. You receive a reading of 75 ohms.
What should you do?

A: Change terminator

86. Any question you have that refers to improving Processor performance should be answered?

A: Add Memory

87. In what layer of the OSI model does SMB reside?

A: Presentation Layer

88. In what layer of the OSI model does DLC operate?

A: Session Layer

89. Can you wiretap a FDDI network like you can a Ethernet network?

A: No

90. What is the standard resistance for a Thinnet terminator?

A: 50 ohms

91. What device can be installed in your network to resolve a broadcast storm?

A: Router

92. What is the IRQ that LPT2 uses?

A: IRQ 5

93. What is another name for RAID 1?

A: Disk duplexing

94. If you have a question about what is the cheapest form of fault tolerance you can implement,
the answer will be?

A: Stripe set/w parity (RAID5)

95. Your company moves into a new building, they will not staying long, no lease.
Which network topology would you implement?
A: Bus

96. What high level protocol supports NETBIOS to allow file sharing?

A: SMB

Page 15 of 20
97. What purpose does NDIS and ODI serve?

A: Provides the interface for compliant protocols to communicate with a compliant NIC card.

98. When upgrading your network to 100baseTX what must you replace?

A: All networking hardware, including adapter cards and hubs

99. When can use User-level security on Windows 95?

A: If there is a NT or Novell server on the Network from which the Windows 95 workstation can
obtain the user list.

100. If you have a question on UNC (universal naming convention). The answer will be?

A: \\Computername\sharename

101. You have Windows95 computers running NETBEUI on a network segment and you want to be able
to connect to UNIX computer on NFS network. What do you use?

A: Gateway

102. Which datalink communication protocols provide connection between computers via DialUp
telephone lines?

A: PPP & SLIP

103. Which statement best describes Broadband Transmission?

A: Unidirectional Analog signals, a range of frequencies to transmit data and uses amplifiers
to regenerate the signal.

104. Which statement best describes Baseband Transmission?

A: Bidirectional digital signals, a single frequency to transmit data and uses repeaters
regenerate the signal.

105. Project 802 defines standards for which layers of the OSI model?

A: Physical and Data Link layers

106. What is the maximum cable segment length for UTP (10BaseT) Ethernet?

A: 100 meters

107. Why does a high number of broadcast messages adversely affect overall network performance?

A: Every computer on the network must process each broadcast message.

108. What is the purpose of the token in a network that employs a media access control method defined
by the IEEE 802.5 specification?

A: The station that holds the token is allowed to transmit a message on the network

109. What does the MAC driver do?

A: It provides low-level access to network adapters by providing data transmission support and
some basic adapter management functions.

Page 16 of 20
110. What does a transport protocol do?

A: It defines how data should be presented to the next receiving layer, packages the data
according , and then passes data to the application though the session layer interface.

111. Your network is using multiple protocols (AppleTalk, NetBEUI, TCP/IP, NWLink,...) for MACS,
NetWare, Unix, PCs. There is excessive network traffic and poor performance.
How can you reduce network traffic and improve performance. Choose only one protocol for the
network. There should be minimal degradation of machine functionality as a result of the protocol
change.
Which would you choose?

A: TCP/IP

112: You come in Monday morning and find that all computers on one segment of the network are having
problems communicating. You suspect that it is caused by a broadcast storm. You have determined
that it is not a hardware problem. What is your first action to resolve the problem?

A: Use a Network/Protocol Analyzer to determine the source of the storm.

113. Which layers of the OSI model are managed by a network protocol such as Microsoft NETBEUI?

A: Transport and Network

114. Your company uses both Ethernet and token-ring LANs in the same building. Users need access to
resources and the ability to transmit data between the LAN's. Which device would you use to enable
communications between dissimilar LANs?

A: Bridge

115. You have an Ethernet network and a Token Ring network connected by a bridge. When you send a
file from the Token Ring network to the Ethernet network, it takes 2 minutes. When you send the
same file from the Ethernet network to the Token Ring network it takes 30 seconds.
What could be the cause of the problem?

A: The Token Ring packet size is larger than the Ethernet packet size.

116. What is the maximum cable segment length for Thinnet (10base2) Ethernet?

A: 185 meters

117. What type of communication method will give you a consistent connection?

A: X.25

118. Which network communication link is not switchable.

A: T1

119. Which tool is used to measure bandwidth of network cabling?

A: Protocol Analyze

120. What is used to translate emails from dissimilar LANs?

A: Message Handling Service (MHS)

121. What does the T in 10baseT stand for?

A: Twisted Pair

Page 17 of 20
122. Which limitation are NDIS and Novell ODI designed to overcome?

A: The need for proprietary network interface drivers for each network operating system and
protocol.

123. What portion of a IP address determines a computer's location?

A: Subnet mask.

124. You have a network in which network utilization has increased from 30% to 70% in one year.
You plan to add another server and 30 clients within 12 months.

Required Result: Reduce network utilization by 50%

Optional Results: Allow for future expansion


Minimize costs
Maintain network utilization at its present lower level

Proposed Solution: Change the packet size from 1514 bytes to 576 bytes and increase the
TCP
window from 4096 bytes to 16384 bytes

A: The proposed solution does not produce the required result.

125. (Same as above)

Proposed solution: Change all Ethernet concatenators(hubs) to Ethernet switches.

A: The proposed solution produces the required and all optional results.

126. You've got 'X' number of servers and PC's using a mixture of routable and non-routable protocols
including TCP/IP, SPX/IPX and NetBEUI. You've got 4 brouters. And the network performance is
being seriously compromised by network broadcast traffic.

Required Results: Cut broadcast traffic by 50%

Optional Results: Keep costs to a minimum


Allow for further expansion

Proposed Solution: Convert all the computers to NWLink (IPX) and disable the bridging.

A: The proposed solution produces the required result and produces both of the optional
desired results.

127. You've got 'X' number of servers and workstations using a mixture of routable and non-routable
protocols including TCP/IP, SPX/IPX, NetBEUI and Appletalk . You've got 4 brouters. And the
network performance is being seriously compromised by network broadcast traffic.

Required Results: Cut broadcast traffic by 50%

Optional Results: Keep costs to a minimum


Allow for further expansion

Proposed Solution: Convert all the computers to NWLink (IPX) and disable the bridging.

A: The proposed solution does not produces the required results (Macintoshes cannot use IPX).

Page 18 of 20
128. Your company has decided to implement a WAN in the near future. You are required to design a
NetBIOS naming scheme. At the present time your company consist of:

20,000 Computers using TCP/IP


850 Servers using Windows NT & NetWare
2500 HP LaserJet printers
Each employee has their own email address

Required Result: The naming scheme should work after the company implements the
WAN.

Optional Results: Naming scheme should show department, location and define the user.
Naming scheme should work when company expands.

Proposed Solution: Implement a 15 hexadecimal NetBIOS naming scheme.

A: The proposed solution produces the required result and one of he optional results.

129. (Same as above)

Proposed Solution: Implement a 15 characters NetBIOS naming scheme. The first 5


characters would show the department, the next 5 characters would show
the location, and the other 5 characters will have part of the email
address for each user.

A: The proposed solution produces the required result and produces both of the optional desired
results.

130. You have a network with the data on the servers in a separate room. It is unacceptable for your
network to be down more than 2 hours.

Required Result: You have to assure data protection and fault-tolerance.

Optional Results: Protect against viruses


implement data access tracking.

Proposed Solution: Perform backups, grant user-access, install virus-scans and implement
RAID 5.

A: The proposed solution produces the required result and one of the optional desired results
(no auditing).

131. (Same as above)

Proposed Solution: Perform backups, grant user-access, install virus-scans, implement RAID
5 and enable auditing
A: The proposed solution produces the required result and both of the optional desired results.

132. You've got 'X' number of servers and workstations using a mixture of routable and non-routable
protocols including TCP/IP, SPX/IPX, NetBEUI and Appletalk . You've got 4 brouters. And the
network performance is being seriously compromised by network broadcast traffic.

Required Results: Cut broadcast traffic by 50%

Optional Results: Keep costs to a minimum


Allow for further expansion

Proposed Solution: Configure PC clients to use TCP/IP, disable bridging and configure
brouters
to accept only TCP/IP and appletalk.

A: The proposed solution produces the required result and optional results.
Page 19 of 20
133. You will see scenario questions about connecting 3 offices via a WAN. The answer will depend on
how the variables are worded. There are 3 basic requirements that need to be accomplished.

1) Provide 1 Mbps communication speed


2) Provide for communication redundancy if one line should fail
3) Provide 1 Mbps speed if one line should fail

These requirements may be identified as REQUIRED or OPTIONAL on the exam.


Below are some of the proposed solutions you will see.

Proposed Solutions will be:

Install TWO T1 lines (City1 to City 2 and City 2 to City 3)


* This will provide 1 Mbps communication speed only

Install THREE T1 lines (City 1 to City 2, City 2 to City3 and City3 to City 1)
* This will provide 1 Mbps communication speed
* Redundancy if one link fails
* Maintain 1 Mbps speed if one T1 line fails

Install TWO T1 lines (City1 to City 2 and City 2 to City 3)and a 9600bps modem between all three
cities
* This will provide 1 Mbps communication speed
* Redundancy if one link fails

Install RAS server with 8 28.8 modem lines between all 3 cities
* Redundancy if one link fails

134: If you had to connect three buildings on your network, with a distance between each building of
around 1000 meters. What cabling would you use?

A: Fiber Optic cable.

135: You have Token Ring with NWLink and Ethernet with NWLink, what device may be used to link
these subnets and to reduce traffic?

A: Bridge

136: How do you segment a NetBEUI LAN?

A: The answer is that you can't, you would have to change to a routable protocol.

137: What other purpose does NDIS and ODI serve?

A: Allows the binding of more than 1 protocol to a network card.

138: You measure a thinnet cable via the T connector.


What reading will you get?

A: 25ohms.

139: You monitor your server and receive the following readings:
CPU 8%, page faults 2 per sec. and Disk 25%.
What can you do to improve performance?

A: Implement disk striping w/parity

140: What type of cable can you use as a support backbone for a 10base5 network?

A: Fiber optic

Page 20 of 20

You might also like