Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Network General 1T6-521 Exam - Cheat-Test.com

Free 1T6-521 Sample Questions:

Q: 1 One component in an application turn is __________.
A. Server response time
B. Network process time
C. Application response time
D. Client acknowledgement time
Answer: A

Q: 2 When creating a filter in the Sniffer to select only the traffic to or from the client for a particular conversation, the best approach is to focus on a __________.
A. TCP well known port number
B. TCP unknown port number
C. TCP ephemeral port number
D. TCP port number in the range 512-1024
Answer: C

Q: 3 When using Application Intelligence, Server Time may be defined as __________.
A. The total time required to send a request and receive a response
B. The total time packets are on the network for a particular flow
C. The total time it takes for a packet to travel from client to server based on TCP handshakes
D. The net time for the server to respond to a client request
Answer: D

Q: 4 A large Window size used by a client could cause __________.
A. The server to consume more resources
B. Increased number of ACKs to be sent
C. Increased delay when frames are lost
D. None of the above
Answer: D

Q: 5 _______ is the amount of time, based on the engineering of the network, to complete a task.
A. Throughput
B. Delay
C. Access time
D. Latency
Answer: B

Q: 6 __________ is a protocol used to perform Control and Signaling functions in a VoIP conversation.
A. Session Initiation Protocol
B. Real-Time Streaming Protocol
C. Cisco Skinny Client Control Protocol
D. All of the above
Answer: D

Q: 7 When reviewing trace data in a multi-tier application, application server requests can be associated with database responses using __________.
A. TCP port numbers
B. Request ID
C. Raw data in the database response
D. Formatted data in the application response
Answer: A

Q: 8 An application that is sensitive to Jitter is primarily sensitive to __________.
A. Network congestion
B. Bandwidth latency
C. Distance latency
D. Application turns
Answer: A

Q: 9 What does a Window value of 8760 in a TCP header mean?
A. The sender is confirming the 8760 bytes have been sent
B. The sender has 8760 bytes in its buffer
C. The sender has received a total of 8760 bytes
D. The sender has buffer space for 8760 more bytes
Answer: D

Q: 10 The TCP 4-way handshake is used to __________.
A. Indicate the start of a flow of data
B. Identify the client request parameters
C. End a connection
D. Establish a connection
Answer: C

Q: 11 When using Application Intelligence, End-to-End Response Time may be defined as __________.
A. The total time required to send a request and receive a response
B. The total time packets are on the network for a particular flow
C. The total time it takes for a packet to travel from client to server based on TCP handshakes
D. The net time for the server to respond to a client request
Answer: A

Q: 12 To accurately calculate __________ we must know the slowest link speed in the path between client and server
A. Distance latency
B. Congestion delay
C. Bandwidth latency
D. Round-trip time
Answer: C

Q: 13 VoIP communications statistics displayed in the Sniffer Expert Session layer and based on __________ frames represent the perspective of the Sniffer.
A. Real-time Transport Protocol
B. Session Initiation Protocol
C. Cisco Skinny Client Control Protocol
D. Real-time Transport Control Protocol
Answer: A

Q: 14 Which of the following statements is true regarding the Real-time Transport Protocol?
A. Used by several protocols to provide end-to-end transmission of real-time data
B. Uses a proxy agent for client-server communications
C. Operates as a client-server protocol
D. Keep-alive messages provide status information
Answer: A

Q: 15 When capturing data in a multi-tier environment, attach the Sniffer to the application server using __________. (Choose all that apply)
A. A full duplex interface
B. A tap on the server connection
C. A mirror on the server switch port
D. A mirror on the database switch port
E. Two Sniffer network analyzers
Answer: B, C

Q: 16 The well-known port used by FTP servers to establish a Data connection is:
A. 10
B. 20
C. 21
D. Variable
Answer: C

Q: 17 The slowest component on a server will be _______.
A. Random Access Memory (RAM)
B. Disk I/O
C. Central Processing Unit (CPU)
D. The constraint (bottleneck)
Answer: D

Q: 18 When using Application Intelligence to isolate traffic distribution we should focus on __________.
A. Throughput
B. Number of packets
C. Total number of bytes
D. All of the above
Answer: D

Q: 19 Which of the following may contribute to poor application performance? (Choose all that apply)
A. Client processing of incoming requests
B. Server processing of incoming requests
C. Queuing of frames on an intermediate router
D. Efficient use of TCP/IP protocols
E. Inefficient configuration of TCP
Answer: B, C, E

Q: 20 The __________ type of application usually does not have any request/reply interactions after the initial session is established.
A. Interactive
B. Throughput-oriented
C. Transaction-oriented
D. Streaming
Answer: D

Q: 21 Distance latency can be improved by __________. (Choose all that apply.)
A. Relocating client computers to the same switch as the server
B. Relocating the server to the client location
C. Increasing the bandwidth on the slowest link
D. Reducing the amount of data transmitted across the network
E. Upgrading the interconnecting devices (routers and switches) between the client and the server
Answer: A, B

Q: 22 In VoIP communications we can evaluate the Call Setup process through the analysis of __________.
A. Response codes and error messages
B. Network latency
C. Jitter
D. Packet loss
Answer: A

Q: 23 Application sensitivity refers to the performance impact incurred by an application measured by _________.
A. Network delay and server delay
B. Bandwidth latency and congestion delay
C. Distance latency and number of application turns
D. All of the above
Answer: C

Q: 24 __________ refers to the communication phase used by an application to locate a remote device and exchange session parameters.
A. Control and Signaling
B. Data Transfer
C. QoS
D. Session Management
Answer: A

Q: 25 We can calculate bandwidth latency for an entire file transfer if we know __________. (Choose all that apply)
A. How many data bytes were transmitted
B. The total number of bits transmitted
C. The fastest link speed between the client and the server
D. The slowest link speed between the client and the server
E. The distance between the client and the server
Answer: B, D

Q: 26 The number of application turns involved in an FTP data transfer where the window size is 64240 and the data transmitted is 642,400 bytes would be __________.
A. 1
B. 10
C. 100
D. .1
Answer: B

Q: 27 If our application is using TCP/IP over a fast Ethernet network, we can improve response time performance by __________:
A. Increasing the TCP window size
B. Decreasing the TCP window size
C. Optimizing application efficiency
D. Reducing overall network congestion
Answer: D

Q: 28 __________ refers to the communication phase performed by the Real-Time Transport Protocol.
A. Control and Signaling
B. Data Transfer
C. QoS
D. Session Management
Answer: B

Q: 29 Typically, Transaction-oriented applications are primarily sensitive to __________ problems.
A. Network congestion
B. Bandwidth latency
C. Distance latency
D. Application turns
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved