Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Network General 1T6-520 Exam - Cheat-Test.com

Free 1T6-520 Sample Questions:

Q: 1 When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency of 95% or more should result in __________:
A. Significantly increased response time
B. Significantly decreased response time
C. Significantly increased network utilization
D. None of the above
Answer: D

Q: 2 We can calculate __________ for a file transfer by dividing file size by link speed.
A. Bandwidth latency
B. Application efficiency
C. Congestion delay
D. Throughput
Answer: A

Q: 3 To accurately calculate bandwidth latency we must know __________. (Choose all that apply)
A. The fastest link speed in the path between client and server
B. The slowest link speed in the path between client and server
C. The link speed between the client and the firewall
D. The distance between the client and the server (based on .66 the speed of light)
E. All of the above
Answer: B

Q: 4 Round-trip distance latency between Phoenix and Singapore (9,081 miles or 14,529 km) is __________.
A. About 165 milliseconds
B. About 270 milliseconds
C. About 500 milliseconds
D. About 1 second
Answer: A

Q: 5 If the predictive analysis results in response time that is slightly more than what users are experiencing, what action should we take?
A. Review the parameters used in the predictive analysis, this should not happen
B. Analyze the network, it can not be the application
C. Analyze the network then the application, it may be either one
D. Nothing, this is normal
Answer: D

Q: 6 Distance latency can be improved by __________.
A. Relocating client computers to the same switch as the server
B. Relocating the server to the client location
C. Increasing the bandwidth on the slowest link
D. Reducing the amount of data transmitted across the network
E. Upgrading the interconnecting devices (routers and switches) between the client and the server
Answer: A, B

Q: 7 Output from the predictive analysis model should match data in the __________.
A. Sniffer Statistics tab
B. Application Profile
C. Ping command
D. All of the above
Answer: B

Q: 8 Predictive analysis describes the worst case performance of an application based on the design and configuration of the network.
A. TRUE
B. FALSE
Answer: B

Q: 9 0.002.750.000, as a measure of time, can also be represented as __________.
A. 27 ?milliseconds
B. 2.75 microseconds
C. 2.75 milliseconds
D. 2.75 nanoseconds
Answer: C

Q: 10 If we do not know the speed of all of the links between the client and the server, we can __________ to calculate bandwidth delay.
A. Use our network diagram
B. Estimate based on the 3-way handshake
C. Use the speed of the link nearest the server
D. Use the Line Speed displayed in the Sniffer
Answer: A

Q: 11 When conducting a predictive analysis, one of the input parameters to the model is the user task time in seconds. If you do not know this value you can estimate how long the task took (round up to whole seconds) to get a fairly accurate prediction for the task.
A. TRUE
B. FALSE
Answer: B

Q: 12 The Predictive Analysis Model requires __________ to be documented as part of the application profile.
A. Task duration and application turns
B. Application turns and Relative time
C. Cumulative bytes and number of tasks
D. File size and total time
Answer: A

Q: 13 The __________ type of application usually does not have any request/reply interactions after the initial session is established.
A. Interactive
B. Throughput-oriented
C. Transaction-oriented
D. Streaming
Answer: D

Q: 14 _______ is the amount of time, based on the physical nature of the network, to complete a task.
A. Throughput
B. Delay
C. Access time
D. Latency
Answer: D

Q: 15 When capturing data for the application profile, it is best to capture __________, when possible.
A. Just the traffic for this application
B. Only the traffic going to or from the server
C. Only the traffic going to or from the client
D. All of the traffic on the network segment
Answer: D

Q: 16 Application protocols must be identified to the Sniffer by __________:
A. IP address and UDP port (socket)
B. Name and the appropriate listening port number
C. The UDP well-known port
D. IP address and TCP port (socket)
Answer: B

Q: 17 Bandwidth latency can be calculated for an individual frame.
A. TRUE
B. FALSE
Answer: A

Q: 18 To ensure that you have captured all of the task data, it is recommended that you use __________.
A. The largest capture buffer possible
B. A restrictive filter
C. Frame slicing
D. The capture panel window
Answer: D

Q: 19 A bandwidth consumption graph can help us determine __________.
A. The total amount of data sent by the client
B. The total amount of data sent by the server
C. The total amount of bandwidth available to operate the application
D. The average amount of bandwidth available to operate the application
Answer: C

Q: 20 In a multi-tier application environment, the application server maintains the data store.
A. TRUE
B. FALSE
Answer: B

Q: 21 A well documented application profile may be used to _________.
A. Identify constraints in the design of the network
B. Document how an application will perform on the network
C. Identify the constraints (bottlenecks) that will affect application performance
D. All of the above
Answer: D

Q: 22 An application profile should be created in collaboration with network technicians, application programmers, and end users.
A. TRUE
B. FALSE
Answer: A

Q: 23 An application profile process involves _________. (Choose all that apply)
A. Identification and documentation of specific user tasks that are commonly performed for an application
B. The correct placement of the Sniffer near connecting devices and then the capture of trace data for individual tasks
C. An analysis of the collected data to identify bandwidth consumption and traffic flow
D. Documentation of total task time to create a baseline for troubleshooting
E. Graphs and reports that can be used to improve network performance
Answer: A, B, C, D

Q: 24 The constraint (bottleneck) that impacts server performance could be_______. (Choose all that apply)
A. Random Access Memory (RAM)
B. Disk I/O
C. Central Processing Unit (CPU)
D. Bandwidth latency
E. All of the above
Answer: A, B, C

Q: 25 The number of application turns involved in a conversation where the window size is 64240 and the data transmitted is 642,400 bytes would be __________.
A. 1
B. 10
C. 100
D. .1
Answer: B

Q: 26 The well-known port used by FTP servers to establish a Data connection is:
A. 10
B. 20
C. 21
D. 25
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved