Professional Documents
Culture Documents
MCSE
STUDY GUIDE
Networking Essentials
Exam 70-58
Congratulations!!
You have purchased one of the Troy Technologies USA MCSE Study Guides.
This study guide consists of a selection of questions and answers very, very
similar to the ones you will find on the official MCSE exam. All you need to do is
study and memorize the following questions and answers.....and you will be ready
to take the exam. Remember, we guarantee it!
GOOD LUCK!
Guarantee
Should you use this study guide and still fail the appropriate MCSE exam, then
send your original of the official score notice, along with your mailing address to:
We will gladly refund the full cost of this study guide. However, you are not
going to need this guarantee if you follow the above instructions.
Page 2 of 20
OSI MODEL
Layer Name Function
7 Application Layer Program-to-program communication.
6 Presentation Layer Manages data representation conversions.
For example, the Presentation Layer would be responsible for
converting from EBCDIC to ASCII.
5 Session Layer Responsible for establishing and maintaining communications
channels.
In practice, this layer is often combined with the Transport Layer.
4 Transport Layer Responsible for end-to-end integrity of data transmission.
3 Network Layer Routes data from one node to another.
2 Data Link Layer Responsible for physically passing data from one node to another.
1 Physical Layer Manages putting data onto the network media and taking the data off.
OSI Model Banyan Vines MS NT LAN Manager Novell NetWare TCP/IP Unix
802.1 INTERNETWORKING
802.2 LOGICAL LINK CONTROL
802.3 CARRIER SENSE w/ MULTIPLE ACCESS & COLLISION DETECTION (CSMA/CD)
(ETHERNET)
802.4 TOKEN BUS LAN
802.5 TOKEN RING LAN
802.6 METROPOLITAN AREA NETWORK (MAN)
802.7 BROADBAND COMMUNICATION
802.8 FIBER OPTIC COMMUNICATION
802.9 INTEGRATED VOICE/DATA NETWORKS
802.10 NETWORK SECURITY
802.11 WIRELESS NETWORKS
802.12 DEMAND PRIORITY ACCESS METHOD FOR 100 MB OPERATION
Page 3 of 20
Networking Devices
Internetworking devices offer communication between local area network (LAN) segments.
There are five primary types of internetworking devices: repeaters, bridges, routers, brouters, and gateways.
These devices can be differentiated very generally by the Open System Interconnection (OSI) layer at which
they establish the LAN-to-LAN connection.
Each device offers the functionality found at its layer(s) of connection and uses the functionality of all lower
layers.
Page 4 of 20
Standard Topologies
Bus (active) a single cable (trunk) that connects all computers in a single line.
(delicate to interference; difficult in localizing errors)
Server
Laptop Client
Network cable
(media)
Printer
Client
Server
Client Client
Hub
Client
Client
Laptop
Client
Ring (active) connects all computers on a single cable. Ends are not terminated,
but form a full loop connecting the last computer to the first computer.
( Errors are problematic to find; one broken NIC or cable segment
stoppes the whole net)
Client
Client
Client
Laptop
Laptop
Client
Client
Client
Mesh (active) connects all computers on a single cable. Ends are not terminated, but
form a full loop connecting the last computer to the first computer.
Client
Client Client
Client Client
Page 5 of 20
Access Methods
Cables
Signal Transmission
Hardware Interrupts
Page 6 of 20
Multitasking
Preemptive multitasking The system decides which task gets how much processor time
(Windows NT & Windows 95)
Cooperative multitasking The programs decide when to give processor time to other programs.
(Windows 3.x & Windows 95)
Protocol types
routable:
- DECnet
- IP
- IPX
- OSI
- XNS
- Apple Talk (DDP)
nonroutable:
- LAT (local area talk -DEC corp)
- NetBEUI
- DLC
Page 7 of 20
QUESTIONS
EXAM 70-58
1. You install an Ethernet card on a client. The network software initialized properly but the computer
can not communicate with others on the network. All other computers can talk to the server.
What is most likely the problem?
2. You have a NetWare network. Initialization of the client computer works, but client can not talk
to the server, other computers on network can.
What is most likely the problem?
3. What will be the answer for all questions on the EXAM that have ATM as one of the possible
choices?
A: ATM
4. What type of cable would you use for 802.3 100BaseT Fastnet?
5. What type of cable would you use for 802.3 10BaseT Standard?
6. What type of connectors would you use for 802.3 10Base2 Standard?
A: BNC/T connectors
7. You have a one story building with one foot of space above ceiling and a 100Mbps network.
What kind of cabling should you use?
A: Connection oriented
9. What type of connection protocol supports compression for TCP/IP data packets?
A: PPP
A: WINS server
11. You want to connect two Ethernet LANs. They use NWLink and NETBEUI.
You want to filter data and cut down network traffic.
What device do you use?
A: Brouter
12. Your Company has Ethernet with 750 computer which are WFW, W95 and NT clients.
You want to protect sensitive network data with minimal downtime.
How?
A: IRQ 4
A: IRQ 3
A: IRQ 7
17. With which devices can you measure the bandwidth of a new installation site ?
A: Network Monitor
A: Protocol Analyzer
20. Assume that a user must provide a username and password to gain access to a network resource.
Different levels of access privileges are assigned, depending on the user.
Which kind of network security is this an example of?
A: User-level security
21. What device works at the MAC sub-layer of Data Link layer of the OSI Model?
A: Bridge
22. Which of the following connection types support compression and error control?
A: PPP
23. You have a network with MS-DOS clients and UNIX clients. Recently, a NT server is added to the
network. Now the UNIX machines can access all shared resources except those on the NT server.
Why?
24. Which WAN transmission method will support any available transmission speed?
A: ATM
25. What WAN transmission method transmits voice, data and video?
A: ATM
26. You have a 486 computer using COM1, COM2, LPT1, and VGA.
The Network Interface Card (NIC) is set for IRQ 3, I/O Base 300.
Which one would conflict with the NIC?
A: COM2
Page 9 of 20
27. Tom can logon to the network, but cannot connect to a server on another segment using that server's
NetBIOS name. What is wrong?
28. What is the name of the unique identifier encoded within the NIC?
A: MAC address
30. What do you use for measuring network performance over long period of time?
31. Which of the following would you use if you wanted a safe dialup connection?
A: PPP
A: Network Layer
34. One of the workers in the company complained that her computer is slow.
What should you do to isolate this problem?
A: Gateway
36. You need to run UTP Cat5 for 180 meters. What device would you need?
A: Repeater
37. You have an 200 node LAN using TCP/IP, and you want to segment it into 3 subnets.
What do you use?
A: Router
38. What connectivity device works at the Physical layer of the OSI model?
A: Repeater
39. You have an 200 node LAN using TCP/IP and NETBEUI.
After you segment it into 3 subnets you still want to be able to use both protocols.
What do you use?
A: Brouter
Page 10 of 20
40. What do you use to connect a Ethernet LAN to IBM mainframe?
A: Gateway
41. A company has 120 computers running Windows 95 and Windows for Workgroups and has a
problem
with employee turnover.
With security in mind, what would you implement?
A: User-level security (if you have an NT server) or Share-level security (If you do not)
42. You test your RG-58A/U(10base2) cable and get the following resistance readings:
cable = 0 to infinity
T-connector = infinity
terminator = 50
43. You have been given the task of installing cables for an Ethernet network in your office. The
building is
an older one, and you have limited workspace. In addition, the network cable will have to share the
existing conduit with telephone cable and cable segments will be up to 135 meters in length.
Which cable is best suited to this installation?
A: Thicknet coaxial (Thinnet/10base2 the best choice, but not one of the answers)
44. What is the minimum category of UTP cable required to meet Ethernet 10BaseT standard?
A: Category 3
45. What do you need to know to copy a shared file from one computer to another?
A: Share name
46. Tom attempts to log onto the system and he is unsuccessful because he cannot get an IP address.
Which dial-up protocol is Tom probably using?
A: SLIP
47. The company is having problems with their network. They have problems with attenuation.
What would you do to solve the problem?
EXHIBIT
PC1
Page 11 of 20
48. The company is using 10Base2, RG-58 A/U cabling for a bus topology in one of their classrooms.
The computers are receiving garbage information. They have hired you to fix the problem.
What would you do?
EXHIBIT
PC2 PC3
PC1 (grounded)
PC4 (grounded)
49. You have set up two computers to connect into the network. All components IRQ's are set to default
value. You have set up both network cards with the following settings:
The computers are not able to communicate on the network. What should you do?
50. You can successfully ping a server using it's IP address, but you cannot send it a message using it's
NetBIOS name. What is the possible problem?
52. In a system that uses a client-server application, what does the server do ?
A: The server stores data and performs all of the data processing, the client performs as a
display device.
53. What device translates protocols above the Data link layer?
A: Router
54. You have a large office on a single floor, the lease does not allow installation of cable in the walls.
You need to setup 7 computers in a network and keep cost to a minimum.
What type of topology would you use?
A: Bus
Page 12 of 20
55. What wide area network service can provide reliable connection over unreliable switched circuits?
A: X.25
56. You just installed a network adapter card in a PC on IPX (NWLink) network. The network drivers
load OK, but the PC can't talk to server. All the other PC's can talk to the server without problems?
A: 802.3
A: 802.5
60. Select all that only use a PASSWORD on a shared resource for security?
61. Select all where you CAN use a duplicate NETBIOS name?
A: workgroup name
domain name
sharename
62. What type of network topology would have every node connected directly to every other node on the
network? (Question will be an exhibit)
A: Mesh Topology
63. What type of software would you use to help manage your network by checking hubs, routers and
bridges?
A: SNMP
64. You install a network card and your computer no longer boots.
What is the most likely cause?
A: IRQ Conflict
65. You need to install a cheap 19.2 kbps connection to be available 24 hours a day.
What would be your best bet?
66. What do you call the weakening or degrading of a signal as it travels farther from it’s point of
origin?
A: Attenuation
67. What do you call signal overflow from an adjacent wire or cable?
A: Crosstalk
Page 13 of 20
68. What reading would you get from an ARCNET terminator?
A: 93ohms.
69. Your friend has used TV cable (RG-58U) and network cable (RG-58 A/U) for his network and it is
not working correctly.
What is wrong?
72. What tool do you use to test a CAT 5 UTP cable’s full bandwidth capability ?
A: Protocol Analyzer
73. What testing tool would you use to test a router, bridge and a repeater?
A: Protocol Analyzer
74. If you have a question on the exam and Protocol Analyzer is one of the answers, what should you do?
75. What can a network with 10 Windows NT Workstations implement to share/protect files?
A: User-Level Security
76. What can a network with 10 Windows 95 clients implement to share/protect files?
A: Share-Level Security
77. You have a 10BaseT network that is 300 meters. What device do you need to make this possible?
A: Repeater
78. What type of communication connection can and will eventually replace standard phone lines?
A: ISDN
79. Barbara is using a modem that is 5 years old. The connection will not provide compression.
Which communication protocol is Barbara's PC using?
A: SLIP
80. What software measures hops between routers to determine the best paths between locations on
a network?
81. If your resistance measurement for a RG58A/U cable is 0, what action should you take?
A: Replace cable
Page 14 of 20
82. How many grounded cables can a 10base 2 network have?
A: One
A: An application server
84. You have a small 5-10 computer network. Which protocol would you use?
85. You use a ohmmeter to measure the resistance on a coax cable. You receive a reading of 75 ohms.
What should you do?
A: Change terminator
86. Any question you have that refers to improving Processor performance should be answered?
A: Add Memory
A: Presentation Layer
A: Session Layer
89. Can you wiretap a FDDI network like you can a Ethernet network?
A: No
A: 50 ohms
91. What device can be installed in your network to resolve a broadcast storm?
A: Router
A: IRQ 5
A: Disk duplexing
94. If you have a question about what is the cheapest form of fault tolerance you can implement,
the answer will be?
95. Your company moves into a new building, they will not staying long, no lease.
Which network topology would you implement?
A: Bus
96. What high level protocol supports NETBIOS to allow file sharing?
A: SMB
Page 15 of 20
97. What purpose does NDIS and ODI serve?
A: Provides the interface for compliant protocols to communicate with a compliant NIC card.
98. When upgrading your network to 100baseTX what must you replace?
A: If there is a NT or Novell server on the Network from which the Windows 95 workstation can
obtain the user list.
100. If you have a question on UNC (universal naming convention). The answer will be?
A: \\Computername\sharename
101. You have Windows95 computers running NETBEUI on a network segment and you want to be able
to connect to UNIX computer on NFS network. What do you use?
A: Gateway
102. Which datalink communication protocols provide connection between computers via DialUp
telephone lines?
A: Unidirectional Analog signals, a range of frequencies to transmit data and uses amplifiers
to regenerate the signal.
A: Bidirectional digital signals, a single frequency to transmit data and uses repeaters
regenerate the signal.
105. Project 802 defines standards for which layers of the OSI model?
106. What is the maximum cable segment length for UTP (10BaseT) Ethernet?
A: 100 meters
107. Why does a high number of broadcast messages adversely affect overall network performance?
108. What is the purpose of the token in a network that employs a media access control method defined
by the IEEE 802.5 specification?
A: The station that holds the token is allowed to transmit a message on the network
A: It provides low-level access to network adapters by providing data transmission support and
some basic adapter management functions.
Page 16 of 20
110. What does a transport protocol do?
A: It defines how data should be presented to the next receiving layer, packages the data
according , and then passes data to the application though the session layer interface.
111. Your network is using multiple protocols (AppleTalk, NetBEUI, TCP/IP, NWLink,...) for MACS,
NetWare, Unix, PCs. There is excessive network traffic and poor performance.
How can you reduce network traffic and improve performance. Choose only one protocol for the
network. There should be minimal degradation of machine functionality as a result of the protocol
change.
Which would you choose?
A: TCP/IP
112: You come in Monday morning and find that all computers on one segment of the network are having
problems communicating. You suspect that it is caused by a broadcast storm. You have determined
that it is not a hardware problem. What is your first action to resolve the problem?
113. Which layers of the OSI model are managed by a network protocol such as Microsoft NETBEUI?
114. Your company uses both Ethernet and token-ring LANs in the same building. Users need access to
resources and the ability to transmit data between the LAN's. Which device would you use to enable
communications between dissimilar LANs?
A: Bridge
115. You have an Ethernet network and a Token Ring network connected by a bridge. When you send a
file from the Token Ring network to the Ethernet network, it takes 2 minutes. When you send the
same file from the Ethernet network to the Token Ring network it takes 30 seconds.
What could be the cause of the problem?
A: The Token Ring packet size is larger than the Ethernet packet size.
116. What is the maximum cable segment length for Thinnet (10base2) Ethernet?
A: 185 meters
117. What type of communication method will give you a consistent connection?
A: X.25
A: T1
A: Protocol Analyze
A: Twisted Pair
Page 17 of 20
122. Which limitation are NDIS and Novell ODI designed to overcome?
A: The need for proprietary network interface drivers for each network operating system and
protocol.
A: Subnet mask.
124. You have a network in which network utilization has increased from 30% to 70% in one year.
You plan to add another server and 30 clients within 12 months.
Proposed Solution: Change the packet size from 1514 bytes to 576 bytes and increase the
TCP
window from 4096 bytes to 16384 bytes
A: The proposed solution produces the required and all optional results.
126. You've got 'X' number of servers and PC's using a mixture of routable and non-routable protocols
including TCP/IP, SPX/IPX and NetBEUI. You've got 4 brouters. And the network performance is
being seriously compromised by network broadcast traffic.
Proposed Solution: Convert all the computers to NWLink (IPX) and disable the bridging.
A: The proposed solution produces the required result and produces both of the optional
desired results.
127. You've got 'X' number of servers and workstations using a mixture of routable and non-routable
protocols including TCP/IP, SPX/IPX, NetBEUI and Appletalk . You've got 4 brouters. And the
network performance is being seriously compromised by network broadcast traffic.
Proposed Solution: Convert all the computers to NWLink (IPX) and disable the bridging.
A: The proposed solution does not produces the required results (Macintoshes cannot use IPX).
Page 18 of 20
128. Your company has decided to implement a WAN in the near future. You are required to design a
NetBIOS naming scheme. At the present time your company consist of:
Required Result: The naming scheme should work after the company implements the
WAN.
Optional Results: Naming scheme should show department, location and define the user.
Naming scheme should work when company expands.
A: The proposed solution produces the required result and one of he optional results.
A: The proposed solution produces the required result and produces both of the optional desired
results.
130. You have a network with the data on the servers in a separate room. It is unacceptable for your
network to be down more than 2 hours.
Proposed Solution: Perform backups, grant user-access, install virus-scans and implement
RAID 5.
A: The proposed solution produces the required result and one of the optional desired results
(no auditing).
Proposed Solution: Perform backups, grant user-access, install virus-scans, implement RAID
5 and enable auditing
A: The proposed solution produces the required result and both of the optional desired results.
132. You've got 'X' number of servers and workstations using a mixture of routable and non-routable
protocols including TCP/IP, SPX/IPX, NetBEUI and Appletalk . You've got 4 brouters. And the
network performance is being seriously compromised by network broadcast traffic.
Proposed Solution: Configure PC clients to use TCP/IP, disable bridging and configure
brouters
to accept only TCP/IP and appletalk.
A: The proposed solution produces the required result and optional results.
Page 19 of 20
133. You will see scenario questions about connecting 3 offices via a WAN. The answer will depend on
how the variables are worded. There are 3 basic requirements that need to be accomplished.
Install THREE T1 lines (City 1 to City 2, City 2 to City3 and City3 to City 1)
* This will provide 1 Mbps communication speed
* Redundancy if one link fails
* Maintain 1 Mbps speed if one T1 line fails
Install TWO T1 lines (City1 to City 2 and City 2 to City 3)and a 9600bps modem between all three
cities
* This will provide 1 Mbps communication speed
* Redundancy if one link fails
Install RAS server with 8 28.8 modem lines between all 3 cities
* Redundancy if one link fails
134: If you had to connect three buildings on your network, with a distance between each building of
around 1000 meters. What cabling would you use?
135: You have Token Ring with NWLink and Ethernet with NWLink, what device may be used to link
these subnets and to reduce traffic?
A: Bridge
A: The answer is that you can't, you would have to change to a routable protocol.
A: 25ohms.
139: You monitor your server and receive the following readings:
CPU 8%, page faults 2 per sec. and Disk 25%.
What can you do to improve performance?
140: What type of cable can you use as a support backbone for a 10base5 network?
A: Fiber optic
Page 20 of 20