Q26.. You want to connect your Ethernet and token-ring networks. Both networks use NWLink IPX. You want to use IPX addressing to limit the amount of traffic between the 2 networks. Which device should you use?
A. repeater.
B. bridge.
C. router.
D. gateway.
Q27. Network monitoring shows that network utilization has grown from 30 percent to 70 percent of maximum capacity in the past year. You will add 24 client computers and 1 server within 3 months. You want to reduce network utilization.
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the planned additions to the network are implemented.
You want to minimize costs for the project.
Proposed solution:
Change the maximum packet size on all of the computers from 1,514 bytes to 576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable. Increase TCP window size from 4,096 bytes to 16,384 bytes.
Which results does the proposed solution produce?
A. The proposed solution produces the required result and produces all of the optional desired results.
B. The proposed solution produces the required result and produces only 2 of the optional desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. The proposed solution does not produce the required result.
Q28.. Which data link communications protocol provides connections between computers via dial-up telephone lines? (Choose all that apply)
A. SLIP.
B. PPP.
Q29. What can enable client computers to browse NetBIOS names on all subnets of the network?
A. WINS server.
B. DHCP server.
C. router.
D. NetBIOS broadcast.
Q30. You are designing a 100-Mbps network. Which media should you use?
A. RG-58 A/U coaxial cable
B. spread-spectrum radio
C. Category 5 UTP cable
D. Type 1 STP cable
Q31.. You connect a client computer to a network that uses NWLink IPX. The client computer is not able to access any network resources. After investigation, you decide that hardware is not causing the problem. What is the most likely cause of the problem?
A. incorrect subnet mask on the client computer
B. incorrect IP address on the client computer
C. incorrect frame type on the client computer
D. corrupted WIN.INI file on the client computer
Q32. Barbara's remote computer can be accessed via dial-up telephone lines. The computer is 5 years old and uses TCP/IP as its only transport protocol. The data link communications protocol used by the computer cannot provide automatic IP addressing. Which data link communications protocol is Barbara's computer using?
A. DLC.
B. SLIP.
C. PPP.