发信人: bok()
整理人: reynolds(2001-02-07 12:41:14), 站内信件
|
70-058 Braindump
1. Need to access IBM mainframe using a terminal emulator. What do u n eed?
A. Repeater
b. Bridge
c. Router
d. Gateway
2. What is the purpose of NDIS and ODI?
A. Connect netowrks and direct data
b. Segment network
c. Protocol conversion
d. Interface with multi protocols to single adaptor
3. 7 Computers in large room. Need to install network. Not allowed to do any wiring. No existing cabling. 6months time to do the job. which topology to use?
a. Mesh
b. Star
c. Bus
d. Ring
4. You want to segment your 200-node network into 3 subnets. The netwo rk uses TCP/IP.
Which device should you use?
A. repeater
B. bridge
C. router
D. gateway
5. You want to connect your Ethernet and token-ring networks. Both net works use NWLink IPX. You want to use IPX addressing to limit the amou nt of traffic between the 2 networks.
Which device should you use?
A. repeater
B. bridge
C. router
D. gateway
6. Which protocol is routable? (Choose 3.)
A. AppleTalk
B. TCP/IP
C. NWLink IPX
D. NetBEUI
7. You are designing a peer-to-peer network that consists of 5 Microso ft Windows 95 computers. Which protocol should you use?
A. DLC
B. NFS
C. NWLink IPX
D. XNS
8. You are designing a 100-Mbps Ethernet network for a building that h as existing UTP cable. You test the existing cable and decide that it meets Category 3 specifications. Which media should you use?
A. the existing cable
B. new Type 1 STP cable
C. new Category 4 UTP cable
D. new Category 5 UTP cable
9. You want to install a 100-Mbps backbone network that will connect 5 existing networks. Which media should you use?
A. Category 3 UP cable
B. Category 4 UTP cable
C. Fiber-optic cable
D. RG-58 A/U coaxial cable
10. Configuration of your client computer:
· SVGA card
· SCSI card, set at IRQ 15
· LPT1
· LPT2
· COM1
· COM2
. PS/2 mouse port
The computer runs Microsoft Windows NT Workstation.
You are installing a token-ring network adapter in the computer. You s et it
to use IRQ 3.
Which device could cause IRQ conflicts in the computer?
A. COM1
B. COM2
C. LPT1
D. LPT2
11. What are the characteristics of IEEE 802.3?
a. RJ11
b. UTP
c. BNC
d. 50 ohm terminator
12. Need the comunication to network to cntinue even after 1 HDD fails on the server. Most cost effective solution?
a. RAID 0
b. RAID 5
c. Duplexed HDD
d. Backup file server
13. Characteristics of a client/server architecture?
a. Any computer shares resources for others
b. Dumb terminal used with central processor
c. Any computer can act as a client and a server
d. Client comp accesses the server that performs back-end services
14. Need to access IBM mainframe using a terminal emulator. What do u need?
a. Repeater
b. Bridge
c. Router
d. Gateway
15. Your network has 250 client computers. The network uses both TCP/I P and NetBEUI. You want to segment the network into 3 subnets. You wan t to allow all of the computers to use both of the protocols to commun icate with computers on all 3 subnets.
Which device should you use?
A. repeater
B. brouter
C. router
D. gateway
16. Your l0BaseT Ethernet network uses NetBEUI. Users of your client c omputers need to access an IBM 3090 mainframe computer by using a 3270 terminal-emulation program.
Which device must you install?
A. bridge
B. gateway
C. router
D. brouter
17. You connect a client computer to a network that uses NWLink IPX. T he client computer is not able to access any network resources. After investigation, you decide that hardware is not causing the problem.
What is the most likely cause of the problem?
A. incorrect subnet mask on the client computer
B. incorrect IP address on the client computer
C. incorrect frame type on the client computer
D. corrupted WIN.INI file on the client computer
18. Situation
You are designing a NetBIOS naming scheme for all of the servers and c lient computers at your location. Within 2 years your company will ins tall a WAN that will connect all of its networks.
Current Network Configuration for the Entire company
Server 328, Which run Microsoft Windows NT Server
Client Computers 20,000 which run Microsoft Windows 95
Network 40, each in a different city
WAN connections None
E-mail All users have e-mail to all other users in the company.
E-mail names All have 12 characters or fewer
Current Network Configuration for Your Location
Server 10, which run Microsoft Windows NT server
Client Computers 500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all serv ers and client computers at your location. The NetBIOS naming scheme a t your location must continue to work after the WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's dep artment or function.
You want each client computer's NetBIOS name to describe the computer' s primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of the first 8 charact ers of the server's department name, plus a 5-character location code, plus a 2-digit identifier to distinguish between multiple servers wit hin the department. Assign each client computer a NetBIOS name that co rresponds to the e-mail address of the computer's principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces bo th of the optional desired results.
B. The proposed solution produces the required results and produces on ly 1 of the optional desired results.
C. The proposed solution produces the required results but does not pr oduce either of the optional desired results.
D. The proposed solution does not produce the required results.
19. Situation:
You are designing a NetBIOS naming scheme for all of the servers and c lient computers at your location. Within 2 years your company will ins tall a WAN that will connect all of its networks.
Current Network Configuration for the Entire company
Server 328, Which run Microsoft Windows NT Server
Client Computers 20,000 which run Microsoft Windows 95
Network 40, each in a different city
WAN connections None
E-mail All users have e-mail to all other users in the company.
E-mail names All have 12 characters or fewer
Current Network Configuration for Your Location
Server 10, which run Microsoft Windows NT server
Client Computers 500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all serv ers and client computers at your location. The NetBIOS naming scheme a t your location must continue to work after the WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's dep artment or function.
You want each client computer's NetBIOS name to describe the computer' s primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of 15 characters that describe the location plus a 4-digit number that is unique to each ser ver. Assign each client computer a NetBIOS name that corresponds to th e e-mail address of the computer's principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces b oth of the optional desired results.
B. The proposed solution produces the required results and produces on ly 1 of the optional desired results.
C. The proposed solution produces the required results but does not pr oduce either of the optional desired results.
D. the proposed solution does not produce the required results.
20. Situation
You are designing a security plan for your network. The following tabl e summarizes the current network configuration.
Server 2 total - both run Microsoft Windows NT server, 1 is the PDC a nd 1 is the BDC
Client Computers 100, which run Microsoft Windows 95
Network Type 10BaseT Ethernet
Required result:
You must have centralized control of access to shared resources.
Optional desired results:
You want to track all access and attempted access to shared resources.
You want to track attempts to guess user passwords.
You want to implement a method to protect user accounts from passwor d-breaking programs.
Proposed solution:
Implement NTFS with user-level security on all servers. Set appropriat e access-control security on all shared resources. Require users to ch ange their passwords every 40 days. Implement disk striping with parit y on all servers. Perform daily tape backups, and store tapes in a sec ure off-site location.
Which results does the proposed solution produce?
A. the proposed solution produces the required result and produces all of the optional
desired results.
B. the proposed solution produces the required result and produces onl y 1 of the optional
desired results.
C. The proposed solution produces the required result but does not pro duce any of the optional desired results.
D. the proposed solution does not produce the required result.
21. Which WAN connection service can provide transmission speed that i s faster than 100 Mbps?
A. ISDN basic rate interface
B. X.25
C. T1
D. ATM
22. You want your WAN to allow simultaneous transmission of voice, vid eo, and data. Which WAN connection service should you use?
A. 56-Kbps digital line
B. X.25
C. Frame relay
D. ATM
23. Which type of WAN connection service is intended to replace standa rd analog telephone service?
A. ISDN basic rate interface
B. X.25
C. Frame relay
D. 2.048-Mbps digital line
24.Network with 5 NT Servers, 1 server DHCP, 1 server WINS, TCP/IP, ro uters Users can find eachother with IP adres, but not with names What do you check first?
A. WINS
B. DHCP
C. router
D. bridge
25. Which 2 protocols use connection-oriented communication?
A. IPX
B. SPX
C. TCP
D. IP
26. What is protocol binding?
A. Protocol binding send data between Network layer and Data Link laye r
B. Protocol binding enables communication between computers that do no t use the same
transport protocol
C. It disassembles and reassembles packets that are send between 2 com puters on different
networks
D. It establishes the communication between a protocol driver and a ne twork adapter
27. You manage a network that has 10 Windows NT Server and 2,000 Windo ws NT Workstation. They are in a single domain. Eachday from 7:00 AMto 10:00 AM, the network utilization is 100%. What is the reason?
A. broadcast storm
B. malfunction adapter
C. malfunction router
D. heavy domain logon traffic
28. What WAN service can provide reliable connection over unreliable s witched circuits.
A. ISDN
B. X.25
C. Frame Relay
D. ATM
29. You are designing a WAN that uses X.25. Which device should you i nclude in the design?
A. gateway
B. packet assembler-disassembler (PAD)
C. multiple-layer interface driver (MLID)
D. multiplexer
30. Your company has an Ethernet network with 750 computers. The compa ny is migrating to servers that run Microsoft Windows NT Server and to client computers that run Microsoft Windows 95. You want to protect s ensitive network data, with a minimal amount of administration.
What should you include in your security plan?
A. peer-to-peer file sharing, with user-level security on all shared r esources
B. peer-to-peer file sharing, with resource-password security on all s hared resources
C. centralized administration of user accounts, with user-level securi ty on all shared resources
D. centralized administration of user accounts, with resource-password security on all shared resources
31. Which device should you use to monitor the amount of network traff ic
over time?
A. time domain reflectometer (TDR)
B. cable tracer
C. protocol analyzer
D. medium attachment unit
32. Which tool should you use to create a report that logs network act ivity?
A. volt-ohmmeter
B. oscilloscope
C. protocol analyzer
D. time domain reflectometer (TDR)
33.Your network uses NWLink IPX. Initialization of your client compute r's network software appears to be successful, but your client compute r is not able to access the server. All of the other computers are abl e to access the server. What is the most likely cause of the problem?
A. the wrong network-adapter driver is installed in your client comput er.
B. your client computer has insufficient extended memory.
C. the network adapter in your client computer is configured to use th e wrong I/O port address.
D. the network adapter in your client computer is configured to use th e wrong frame type.
34.You connect a client computer to a network that uses NWLink IPX. Th e client computer is not able to access any network resources. After i nvestigation, you decide that hardware is not causing the problem. Wha t is the most likely cause of the problem?
A. incorrect subnet mask on the client computer
B. incorrect IP address on the client computer
C. incorrect frame type on the client computer
D. corrupted WIN.INI file on the client computer
35. Which WAN connection service can provide transmission speed that i s faster than 100 Mbps?
A. ISDN basic rate interface
B. X.25
C. T1
D. ATM
36. You want your WAN to allow simultaneous transmission of voice, vid eo, and data. Which WAN connection service should you use?
A. 56-Kbps digital line
B. X.25
C. Frame relay
D. ATM
37. Which type of WAN connection service is intended to replace standa rd analog telephone service?
A. ISDN basic rate interface
B. X.25
C. Frame relay
D. 2.048-Mbps digital line
38. You want to connect 2 computers by using l0BaseT Ethernet cable. T he computers are located more than 300 meters apart.
Which device should you use?
A. repeater
B. amplifier
C. multiplexer
D. gateway
39. Which protocol is routable? (Choose 3.)
A. AppleTalk
B. TCP/IP
C. NWLink IPX
D. NetBEUI
E. DLC
40. In the past year, you have added 55 client computers to your l0Ba seT Ethernet network. Users of the network report that network respons e is slow during peak hours of usage.
Which solution is the most economical?
A. Replace all Ethernet adapters with FDDI adapters.
B. Replace all Ethernet concentrators with Ethernet switches.
C. Replace all Ethernet components with 100-Mbps ATM equivalents.
D. Replace all Ethernet components with 16-Mbps token-ring equivalents .
41. Situation: Network monitoring shows that network utilization has g rown from 30 percent to 70 percent of maximum capacity in the past yea r. You will add 24 client computers and 1 server within 3 months. You want to reduce network utilization.
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the planned additions to the network are implemented.
You want to minimize costs for the project.
Proposed solution:
Change the maximum packet size on all of the computers from 1,514 byte s to 576 bytes. Replace all Category 3 UTP cable with Category 5 UTP c able. Increase TCP window size from 4,096 bytes to 16,384 bytes.
Which results does the proposed solution produce?
A. the proposed solution produces the required result and produces all of the optional
desired results.
B. the proposed solution produces the required result and produces onl y 2 of the optional
desired results.
C. The proposed solution produces the required result but does not pro duce any of the optional desired results.
D. the proposed solution does not produce the required result.
42. Situation :Configuration of your network:
Servers 9, Which run Microsoft Windows NT Server
Client Computers 250
Network Type 10BaseT Ethernet
Protocol NetBEUI
Bridges None
Routers None
Users on your network report poor network performance. After investiga tion, you decide that broadcast storms are causing the problem. What s hould you do to resolve the broadcast storms?
A. Segment the network by using a router.
B. Segment the network by using a repeater.
C. Replace NetBEUI with DLC, and then segment the network by using a b ridge.
D. Replace NetBEUI with TCP/IP, and then segment the network by using a router.
43. Configuration of 2 of the client computers on your 10BaseT Etherne t network:
VGA adapter: Default settings
IDE controller: Default settings
Floppy disk drive controller: Default settings
LPT1: Default settings
COM1: Default settings
COM2: Default settings
Ethernet network adapter See settings below:
MAC hardware address: 1 0C805000000
IRQ: 5
IO port address: 300
Transceiver: RJ-45
DMA None
Memory address: None
Neither computer is able to access the network. You run diagnostic tes ts on the network adapters in both computers. Configuration of both ad apters is identical:
Which change must you make on both Ethernet network adapters to allow the 2 client computers to access the network?
A. Change the MAC (hardware) addresses to factory settings.
B. Change the IRQ settings to 3.
C. Change the IO port addresses to 320.
D. Change the transceiver types to BNC.
44. Situation: You are designing a NetBIOS naming scheme for all of th e servers and client computers at your location. Within 2 years your c ompany will install a WAN that will connect all of its networks.
Current Network Configuration for the Entire company Server 328, Whic h run Microsoft Windows NT Server
Client Computers 20,000 which run Microsoft Windows 95
Network 40, each in a different city
WAN connections None
E-mail All users have e-mail to all other users in the company.
E-mail names All have 12 characters or fewer
Current Network Configuration for Your Location
Server 10, which run Microsoft Windows NT server
Client Computers 500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all serv ers and client computers at your location.
The NetBIOS naming scheme at your location must continue to work after the WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's dep artment or function.
You want each client computer's NetBIOS name to describe the computer' s primary user or function.
Proposed solution:
Assign each server and client computer at all locations a unique 15-di git hexadecimal number to be used as that computer's NetBIOS name.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces bo th of the optional desired results.
B. The proposed solution produces the required results and produces on ly 1 of the optional desired results.
C. The proposed solution produces the required results but does not pr oduce either of the
optional desired results.
D. The proposed solution does not produce the required results.
45. Situation: You are designing a NetBIOS naming scheme for all of th e servers and client computers at your location. Within 2 years your c ompany will install a WAN that will connect all of its networks.
Current Network Configuration for the Entire company
Server 328, Which run Microsoft Windows NT Server
Client Computers 20,000 which run Microsoft Windows 95
Network 40, each in a different city
WAN connections None
E-mail All users have e-mail to all other users in the company.
E-mail names All have 12 characters or fewer
Current Network Configuration for Your Location
Server 10, which run Microsoft Windows NT server
Client Computers 500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all serv ers and client computers at your location. The NetBIOS naming scheme a t your location must continue to work after the WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's dep artment or function.
You want each client computer's NetBIOS name to describe the computer' s primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of 15 characters that describe the location plus a 4-digit number that is unique to each ser ver. Assign each client computer a NetBIOS name that corresponds to th e e-mail address of the computer's principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces bo th of the optional desired results.
B. The proposed solution produces the required results and produces on ly 1 of the optional desired results.
C. The proposed solution produces the required results but does not pr oduce either of the optional desired results.
D. the proposed solution does not produce the required results.
46. Situation :You are designing a NetBIOS naming scheme for all of t he servers and client computers at your location. Within 2 years your company will install a WAN that will connect all of its networks.
Current Network Configuration for the Entire company
Server 328, Which run Microsoft Windows NT Server
Client Computers 20,000 which run Microsoft Windows 95
Network 40, each in a different city
WAN connections None
E-mail All users have e-mail to all other users in the company.
E-mail names All have 12 characters or fewer
Current Network Configuration for Your Location
Server 10, which run Microsoft Windows NT server
Client Computers 500, which run Microsoft Windows 95
Required results:
You must successfully implement the NetBIOS naming scheme for all serv ers and client computers at your location. The NetBIOS naming scheme a t your location must continue to work after the WAN is connected.
Optional desired results:
You want the NetBIOS name for each server to describe the server's dep artment or function.
You want each client computer's NetBIOS name to describe the computer' s primary user or function.
Proposed solution:
Assign each server a NetBIOS name that consists of the first 8 charact ers of the server's department name, plus a 5-character location code, plus a 2-digit identifier to distinguish between multiple servers wit hin the department. Assign each client computer a NetBIOS name that co rresponds to the e-mail address of the computer's principal user.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces bo th of the optional desired results.
B. The proposed solution produces the required results and produces on ly 1 of the optional desired results.
C. The proposed solution produces the required results but does not pr oduce either of the optional desired results.
D. The proposed solution does not produce the required results.
47. Situation:You are designing a WAN that will connect 3 existing net works in Dallas, Denver, and New Orleans.
Required result:
All of the computers on each of the 3 networks must be able to communi cate with any other computer on the 3 networks.
The WAN links must be capable of transmitting data at a minimum speed of 1 Mbps.
Optional desired results:
You want to provide continued communications in the event of a single- link failure.
You want to provide continued communications at a minimum speed of 1 M bps in the event of a single-link failure.
Proposed solution:
Connect the 3 networks by using 2 T1 links, as shown in the accompanyi ng Exhibit.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produces bo th of the optional desired results.
B. The proposed solution produces the required results and produces on ly 1 of the optional desired results.
C. The proposed solution produces the required results but does not pr oduce any of the optional desired results.
D. The proposed solution does not produce the required results.
48. Situation: You are designing a WAN that will connect 3 existing ne tworks in Dallas, Denver, and New Orleans.
Required results:
All of the computers on each of the 3 networks must be able to communi cate with any other computer on the 3 networks.
The WAN links must be capable of transmitting data at a minimum speed of I Mbps.
Optional desired results:
You want to provide continued communications in the event of a single- link failure.
You want to provide continued communications at a minimum speed of 1 M bps in the event of a single-link failure.
Proposed solution:
Connect the 3 networks by using 3 T1 links, as shown in the accompanyi ng Exhibit.
Which results does the proposed solution produce?
A. the proposed solution produces the required results and produces bo th of the optional desired results.
B. The proposed solution produces the required results and produces on ly 1 of the optional desired results.
C. The proposed solution produces the required results but does not pr oduce any of the optional desired results.
D. the proposed solution does not produce the required results.
49. Barbara's remote computer can be accessed via dial-up telephone li nes. The computer is 5 years old and uses TCP/IP as its only transport protocol. The data link communications protocol used by the computer cannot provide automatic IP addressing.
Which data link communications protocol is Barbara's computer using?
A. DLC
B. SLIP
C. PPP
D. TCP
50. Which of the following access methods checks for network traffic b efore sending data?
A. polling
B. CSMA/CA
C. token passing
D. CSMA/CD
51. Which protocols are NOT routable?
A. TCP/IP
B. IPX/SPX
C. NetBEUI
D. LAT
E. Apple Talk
52. What do you use against Broadcaststorms?
A. Repeater
B. Bridge
C. Router
D. Protocol Analyzer
53. Which of the following are programs or applications that the admin istrator could use to gather information about different system compon ents and functions?
A. Windows NT Performance Monitor
B. Microsoft Systems Management Server
C. Task Manager
D. SNMP
54. A Brouter combines the qualities of bridges and routers. Brouters can route selected routable protocols and bridge nonroutable protocols . At which two layers of the OSI model does a Brouter work?
A. Network layer
B. Data Link layer
C. Application layer
D. Session layer
55. At which layer of the OSI model does a Router work?
A. Presentatation layer
B. Transport layer
C. Network layer
D. Physical layer
56. What does the network ID identify in the IP address?
A. A specific computer on the network
B. Whether the destination host is local or remote
C. All host on the same network
D. A specific host on the destination network
57. Which type of multitasking allows the operating sytem to take cont rol of the processor without the task's cooperation?
A. Cooperative
B. Non-peemptive
C. Preemptive
D. Time-Slicing
58. How does the binding order affect the performance of NT Sever?
A. The binding order has no affect at all
B. The most frequently used protocol is processed first
C. The first protocol listed is processed first
D. The fastest protocol is processed first
59. As you increase the length of cable on your network, what type of problem is most likely to occur?
A. crosstalk
B. attenuation
C. jitter
D. beaconing
60. Which of the following is an example of client/server computing?
A. a workstation application accessing information in a remote databas e
B. a terminal accessing information in a mainframe database
C. a workstation application processing information obtained from a lo cal database
D. a workstation application accessing information in a database on th e local hard drive
61. Which layer of the OSI model packages raw data bits into data fram es?
A. the Data Link layer
B. the Presentation layer
C. the Physical layer
D. the Network layer
62. A sliding window size specifies how many packets can be received b y a destination computer before an acknowledgment (ACK) is returned. W hich of the following initial sliding window relationships is recommen ded to provide the best network performance?
A. the send window size should be greater than the receive window size
B. the receive window size should be greater than the send window size
C. the send window size should be the same as the receive window size
D. performance will be the same regardless of the relationship between the send window size and receive window size
1 -D
2 -D
3 -C
4 -C
5 -C
6 -A+B+C
7 -C
8 -D
9 -C
10-B
11-B
12-B
13-D
14-D
15-B
16-B
17-C
18-A
19-D
20-B
21-C+D
22-D
23-A
24-A
25-B+C
26-D
27-D
28-B
29-B
30-C
31-C
32-C
33D
34-C
35-C
36-D
37-A
38-A
39-A+B+C
40-B
41-D
42-D
43-A
44-C
45-D
46-A
47-C
48-A
49-B
50-D
51-C+D
52-C
53-B
54-A+B
55-C
56-C
57-A
58-C
59-B
60-A
61-A
62-A
-- ※ 来源:.月光软件站 http://www.moon-soft.com.[FROM: 210.77.160.100]
|
|