无忧首页企业系统我的无忧
无忧服务:
兼职活动培训
娱乐交友:
交友社区资讯
全职实习:
实习暑假寒假
微信号:school51
扫一下,立即关注
加关注
在线支付,立省10元
下载新版APP
===大学生成长生活平台===

微软认证模拟试题:NetworkingEssentials

2012-12-26来源/作者:卫凯点击次数:508

    Q1. You have a DHCP server and and WINS server.Your are using TCP/IP,You can communicate with the network using the IP address, but not when using the servers name.

    What do you examine first?


    DHCP server.

    WINS server

    Gateway

    Router

    Q2. Required: Reduce the utilization by 50%

    Options:

    Continue growth

    Maintain new network utilization.

    Minimize costs.
 
    Proposal: Reduce the packet size from 1514 to 576 bytes. Increase the TCP/IP window size from 4096 to 16384. Replace the Cat 3 cables with Cat 5.

    Required plus all options.

    Required plus 2 of the options.

    Required plus none of the options.

    Not the required.

    Q3. You want to monitor and manage hubs, bridges and routers on the network.
 
    What do you use?

    Performace Monitor

    SNMP implementation

    Protocol analyzer

    TDR


    Q4. 3 Servers using NT. 75 Clients using NetBEUI. You want to connect a UNIX network that uses NFS.

    Bridge

    Brouter

    Router

    Gateway


    Q5. You have a network using NetBEUI and TCP/IP. The server and client are in different subnets. The client can PING the server, but cannot access the server using its name.

    Client and the server have the same IP address

    Server has the wrong subnet mask.

    Server’s name not registered with the name server.

    Client’s name not registered with the name server. 

    Q6. You have a network that uses T1 and is connected to the internet. Which backup connection could you use to support e-mail in the event of failure.

    T3

    ATM

    ISDN

    Q7. You have 3 branches that you want to connect to the main office. The branches will need 150 meters of cable and the distance between the main office and the branches is 20 miles.

    The solution was to install UTP in the offices and use fiber optic cable between the office and the branches.

    I chose would not provide the required result.


    Q8. Which network topology provides guaranteed access for each computer on the network?

    A. star.

    B. bus.

    C. ring.

    D. linear.


    Q9. Your company's network uses a 100Mbps backbone. Network traffic is nearly at capacity. Users report that network time is slow. You are planning to upgrade the network. Which WAN technology should you implement?

    A. Ethernet

    B. token-ring.

    C. FDDI.

    D. X.25.

    E. ATM.


    Q10. You manage a network that has 1 NetWare server and 25 Microsoft Windows for Workgroup computers. The NetWare server and the client computers are running IPX/SPX. The NetWare server runs your database. Which type of networking is in use on this network? (Choose 2).

    A. collaborative computing.

    B. Microsoft NT Domain.

    C. client/server.

    D. peer to peer.

    Q11. You want to manage Microsoft Windows NT server computers that are located on remote subnet. All of these servers are configured in a single Windows NT domain. You will manage these servers from another Windows NT server computer that is located in your office. You want to use User Manager and server Manager to manage the remote servers. What should you install and configure to resolve the computer names of the servers? (Choose 2).

    A. DNS server.

    B. DHCP server.

    C. WINS server.

    D. LMHOSTS file.

    E. RAS server.

    Q12. You have Microsoft Windows Workstation 4.0 computer that runs TCP/IP. This computer connects to the Internet by using a modem and a dial-up connection. You want to connect your computer to an Ethernet network. You install a network adapter card and connect the network adapter to the physical network. Which type of network adapter driver must you install?

    A. NDIS 2.0.

    B. NDIS 3.0.

    C. NDIS 3.1.

    D. ODI.

    Q13. Which 2 protocols use connection-oriented communication?

    A. IPX
    B. SPX
    C. TCP
    D. IP
    E. UDP
 
    Q14. What is a benefit of installing an application server to store and manage a database?

    A. An application server centrally manages all user accounts.

    B. An application server stores more data than a file-and-print server does.

    C. An application server transfers only the results of database queries to client computers.

    D. An application server transfers the entire database to client computers.

    Q15. What is a benefit of using an application server instead of a file-and-print server?

    A. An application server retrieves data and sends data to client computers more efficiently than a file-and-print server does.

    B. An application server manages file and record locking more efficiently than a file-and-print server does.

    C. An application server manages user access to network resources.

    D. An application server distributes processing among all client computers on the network more efficiently than a file-and-print server does.

    Q16. This question was long, but it was Select and Place question (Drag & Drop) about token-ring network that uses NWLink protocol.

    Repeater.

    Bridge.

    Router. Drag it to the right.

    Gateway.

    Server. Drag it to the left.

    Q17.. You are assigning a NetBIOS name to 10 of the client computers on your network. Which is a valid NetBIOS name for this computer?

    A. The name of a share on 1 of the network servers.

    B. The computer name 1 of the network servers.

    C. The name of a domain on the network.

    D. The name of a workgroup on the network.
 
    Q18. Which WAN faster than 100Mbps?

    A. ISDN Basic rate interface.

    B. X.25.

    C. T1.

    D. ATM.

    Q19. Which device can you use to identify the defective network adapter?

    A. protocol analyzer.

    B. volt-ohmmeter.

    C. optical time domain reflectometer (OTDR).

    D. time domain reflectometer (TDR).

    Q20. What is a characteristic of connection-oriented communication?

    A. It provides fast but unreliable delivery of datagrams.

    B. It provides assurance of packet delivery.

    C. It uses store-and-forward techniques to move datagrams between computers.

    D. It uses message-oriented communication for processing e-mail.

    Q21.. What must you ensure that a NetBIOS name does not duplicated?

    A. Computer name on the same network.

    B. Domain name on the same network.

    C. Workgroup name on the same network.

    D. Share name on the same network.

    Q22. You are designing a peer-to-peer network that consists of 5 Microsoft Windows 95 computers. Which protocol should you use?

    A. DLC.

    B. NFS.

    C. NWLink IPX.

    D. XNS.

    Q23.. You configure your RAS Server to use DHCP to assign TCP/IP addresses. The Windows NT Workstation Computers are configured to receive IP addresses from de-server. Which additional configuration setting or settings for the workstations can you manage?

    A. Default gateway addresses.

    B. Default FTP addresses.

    C. DNS addresses.

    D. WINS server addresses.

    E. Mail server addresses.

    Q24. What is a benefit of both NDIS and ODI?

    A. They allow network adapters to be used in any compliant computer.

    B. They allow network adapters to transmit information over a greater distance than non-compliant network adapters can.

    C. They allow network adapters to communicate with other compliant network adapters.

    D. They allow network adapters to be independent of any particular transport protocol.

    Q25. You are designing a security plan for your network. The following table summarizes the current network configuration.

    Server: 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDC.

    Client Computers: 100, which run Microsoft Windows 95

    Network Type: 10BaseT Ethernet

    Required result:

    You must have centralized control of access to shared resources.

    Optional desired results:

    You want to track all access and attempted access to shared resources.

    You want to track attempts to guess user passwords.

    You want to implement a method to protect user accounts from password-breaking programs.

    Proposed solution:

    Implement NTFS with user-level security on all servers. Set appropriate access-control security on all shared resources. Require users to change their passwords every 40 days. Implement disk striping with parity on all servers. Perform daily tape backups, and store tapes in a secure off-site location.

    Which results does the proposed solution produce?

    A. The proposed solution produces the required result and produces all of the optional desired results.

    B. The proposed solution produces the required result and produces only 1 of the optional desired results.

    C. The proposed solution produces the required result but does not produce any of the optional desired results.

    D. The proposed solution does not produce the required result.

    Q26.. You want to connect your Ethernet and token-ring networks. Both networks use NWLink IPX. You want to use IPX addressing to limit the amount of traffic between the 2 networks. Which device should you use?

    A. repeater.

    B. bridge.

    C. router.

    D. gateway.

 
    Q27. Network monitoring shows that network utilization has grown from 30 percent to 70 percent of maximum capacity in the past year. You will add 24 client computers and 1 server within 3 months. You want to reduce network utilization.

    Required result:

    You must reduce network utilization by 50 percent.

    Optional desired results:

    You want to allow for continued network growth.

    You want to maintain the new network utilization levels even after the planned additions to the network are implemented.

    You want to minimize costs for the project.

    Proposed solution:

    Change the maximum packet size on all of the computers from 1,514 bytes to 576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable. Increase TCP window size from 4,096 bytes to 16,384 bytes.

    Which results does the proposed solution produce?

    A. The proposed solution produces the required result and produces all of the optional desired results.

    B. The proposed solution produces the required result and produces only 2 of the optional desired results.

    C. The proposed solution produces the required result but does not produce any of the optional desired results.

    D. The proposed solution does not produce the required result.

    Q28.. Which data link communications protocol provides connections between computers via dial-up telephone lines? (Choose all that apply)

    A. SLIP.

    B. PPP.

    Q29. What can enable client computers to browse NetBIOS names on all subnets of the network?

    A. WINS server.

    B. DHCP server.

    C. router.

    D. NetBIOS broadcast.

    Q30. You are designing a 100-Mbps network. Which media should you use?

    A. RG-58 A/U coaxial cable

    B. spread-spectrum radio

    C. Category 5 UTP cable

    D. Type 1 STP cable

    Q31.. You connect a client computer to a network that uses NWLink IPX. The client computer is not able to access any network resources. After investigation, you decide that hardware is not causing the problem. What is the most likely cause of the problem?

    A. incorrect subnet mask on the client computer

    B. incorrect IP address on the client computer

    C. incorrect frame type on the client computer

    D. corrupted WIN.INI file on the client computer

    Q32. Barbara's remote computer can be accessed via dial-up telephone lines. The computer is 5 years old and uses TCP/IP as its only transport protocol. The data link communications protocol used by the computer cannot provide automatic IP addressing. Which data link communications protocol is Barbara's computer using?

    A. DLC.

    B. SLIP.

    C. PPP.





相关阅读



关于我们 | 联系我们 | 用户指南 | 网站地图 | 意见建议 | 会员注册 | 用户协议 | 隐私政策