微软认证模拟试题:NetworkingEssentials
来源:优易学  2011-12-3 10:01:03   【优易学:中国教育考试门户网】   资料下载   IT书店

 

  Q21.. What must you ensure that a NetBIOS name does not duplicated?

    A. Computer name on the same network.

    B. Domain name on the same network.

    C. Workgroup name on the same network.

    D. Share name on the same network.

    Q22. You are designing a peer-to-peer network that consists of 5 Microsoft Windows 95 computers. Which protocol should you use?

    A. DLC.

    B. NFS.

    C. NWLink IPX.

    D. XNS.

    Q23.. You configure your RAS Server to use DHCP to assign TCP/IP addresses. The Windows NT Workstation Computers are configured to receive IP addresses from de-server. Which additional configuration setting or settings for the workstations can you manage?

    A. Default gateway addresses.

    B. Default FTP addresses.

    C. DNS addresses.

    D. WINS server addresses.

    E. Mail server addresses.

    Q24. What is a benefit of both NDIS and ODI?

    A. They allow network adapters to be used in any compliant computer.

    B. They allow network adapters to transmit information over a greater distance than non-compliant network adapters can.

    C. They allow network adapters to communicate with other compliant network adapters.

    D. They allow network adapters to be independent of any particular transport protocol.

    Q25. You are designing a security plan for your network. The following table summarizes the current network configuration.

    Server: 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDC.

    Client Computers: 100, which run Microsoft Windows 95

    Network Type: 10BaseT Ethernet

    Required result:

    You must have centralized control of access to shared resources.

    Optional desired results:

    You want to track all access and attempted access to shared resources.

    You want to track attempts to guess user passwords.

    You want to implement a method to protect user accounts from password-breaking programs.

    Proposed solution:

    Implement NTFS with user-level security on all servers. Set appropriate access-control security on all shared resources. Require users to change their passwords every 40 days. Implement disk striping with parity on all servers. Perform daily tape backups, and store tapes in a secure off-site location.

    Which results does the proposed solution produce?

    A. The proposed solution produces the required result and produces all of the optional desired results.

    B. The proposed solution produces the required result and produces only 1 of the optional desired results.

    C. The proposed solution produces the required result but does not produce any of the optional desired results.

    D. The proposed solution does not produce the required result.

  Q26.. You want to connect your Ethernet and token-ring networks. Both networks use NWLink IPX. You want to use IPX addressing to limit the amount of traffic between the 2 networks. Which device should you use?

    A. repeater.

    B. bridge.

    C. router.

    D. gateway.

 
    Q27. Network monitoring shows that network utilization has grown from 30 percent to 70 percent of maximum capacity in the past year. You will add 24 client computers and 1 server within 3 months. You want to reduce network utilization.

    Required result:

    You must reduce network utilization by 50 percent.

    Optional desired results:

    You want to allow for continued network growth.

    You want to maintain the new network utilization levels even after the planned additions to the network are implemented.

    You want to minimize costs for the project.

    Proposed solution:

    Change the maximum packet size on all of the computers from 1,514 bytes to 576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable. Increase TCP window size from 4,096 bytes to 16,384 bytes.

    Which results does the proposed solution produce?

    A. The proposed solution produces the required result and produces all of the optional desired results.

    B. The proposed solution produces the required result and produces only 2 of the optional desired results.

    C. The proposed solution produces the required result but does not produce any of the optional desired results.

    D. The proposed solution does not produce the required result.

    Q28.. Which data link communications protocol provides connections between computers via dial-up telephone lines? (Choose all that apply)

    A. SLIP.

    B. PPP.

    Q29. What can enable client computers to browse NetBIOS names on all subnets of the network?

    A. WINS server.

    B. DHCP server.

    C. router.

    D. NetBIOS broadcast.

    Q30. You are designing a 100-Mbps network. Which media should you use?

    A. RG-58 A/U coaxial cable

    B. spread-spectrum radio

    C. Category 5 UTP cable

    D. Type 1 STP cable

    Q31.. You connect a client computer to a network that uses NWLink IPX. The client computer is not able to access any network resources. After investigation, you decide that hardware is not causing the problem. What is the most likely cause of the problem?

    A. incorrect subnet mask on the client computer

    B. incorrect IP address on the client computer

    C. incorrect frame type on the client computer

    D. corrupted WIN.INI file on the client computer

    Q32. Barbara's remote computer can be accessed via dial-up telephone lines. The computer is 5 years old and uses TCP/IP as its only transport protocol. The data link communications protocol used by the computer cannot provide automatic IP addressing. Which data link communications protocol is Barbara's computer using?

    A. DLC.

    B. SLIP.

    C. PPP.

上一页  [1] [2] 

责任编辑:小草

文章搜索:
 相关文章
热点资讯
热门课程培训