Which of the following is not an effective way to reduce LAN network demand:
a. move files to client computers
b. use disk caching on the client...
Breaking a network into smaller parts is called network:
Breaking a network into smaller parts is called network:
a. fragmentation
b. segmentation
c. localization
d. allocation
e. mitigation
Answer:...
Which of the following can provide fault tolerance for the storage space on a server?
Which of the following can provide fault tolerance for the storage space on a server?
a. RAID
b. SCSI
c. IDE
d. USB
e. EIDE
Answer:...
Traditional Ethernet is a _______________ technology, meaning that manufacturers are no longer creating new products.
Traditional Ethernet is a _______________ technology, meaning that manufacturers are no longer creating new products.
a. host
b. legacy
c. caching
d....
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.
a. multipoint
b....
Which of the following is not true about switched Ethernet?
Which of the following is not true about switched Ethernet?
a. The switch has a physical bus topology.
b. It uses a switch instead of a hub.
c....
Switched Ethernet:
Switched Ethernet:
a. always has a lower capacity than shared Ethernet.
b. operates at 50% of capacity before performance becomes a problem.
c. operates...
Which of the following is not true about layer-2 switched Ethernet?
Which of the following is not true about layer-2 switched Ethernet?
a. A switch replaces the hub.
b. The physical topology is the same as the physical...
A switch uses a _____________ that is very similar to a routing table used in a router.
A switch uses a _____________ that is very similar to a routing table used in a router.
a. cable plan
b. forwarding table
c. network server
d....
Which of the following is not true about CSMA/CD?
Which of the following is not true about CSMA/CD?
a. The acronym refers to Carrier Sense Multiple Access with Collision Detection
b. It is used...
A logical bus topology:
A logical bus topology:
a. is always used by token ring protocol LANs
b. has all computers connected to each other in point-to-point connections
c....
The type of logical topology that Ethernet uses is a:
The type of logical topology that Ethernet uses is a:
a. ring
b. bus
c. star
d. mesh
e. interconnected
Answer:...
________ is how the network works conceptually.
________ is how the network works conceptually.
a. Physical topology
b. Logical topology
c. Network topology
d. Ethernet
e. Media access control
Answer:...
Ethernet LAN was developed by:
Ethernet LAN was developed by:
a. IBM
b. ARPANET
c. DEC, Xerox, and Intel
d. University of Minnesota
e. CERN laboratory in Geneva
Answer:...
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access...
________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
a....
The server version of the Network Operating System does not:
The server version of the Network Operating System does not:
a. provide the software that performs the functions associated with the physical...
_______ is the software that controls the network.
_______ is the software that controls the network.
a. Network Operating System
b. Client Operating System
c. Embedded Operating System
d. Network...
Which of the following is not a basic LAN component?
Which of the following is not a basic LAN component?
a. client
b. PAD
c. server
d. network interface card
e. network operating system
Answer:...
A peer-to-peer LAN:
A peer-to-peer LAN:
a. has more capability than a dedicated server
b. supports a higher number of computers than a dedicated server
c. is generally...
_________ refers to one computer legally sharing a software package, such as Microsoft Word, with other computers on the network to save costs.
_________ refers to one computer legally sharing a software package, such as Microsoft Word, with other computers on the network to save costs.
a....
_____ refers to having users access the same data files, exchange information via electronic mail, or search the Internet for information.
_____ refers to having users access the same data files, exchange information via electronic mail, or search the Internet for information.
a. Resource...
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing...
The ping command uses the most basic interior routing protocol on the Internet, which is the:
The ping command uses the most basic interior routing protocol on the Internet, which is the:
a. Border Gateway Protocol
b. Internet Control...
One drawback to dynamic routing is:
One drawback to dynamic routing is:
a. Routing usually does not reflect changing network conditions, such as computers that are overloaded...
_________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.
_________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers...
An advantage of centralized routing is:
An advantage of centralized routing is:
a. routing does reflect changing network conditions, such as computers that are overloaded by many...
The three fundamental approaches to routing are:
The three fundamental approaches to routing are:
a. circuitous, flat, and direct routing
b. connectionless, static, and connection-oriented
c....
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists...
The _____________ is used by a computer to determine how messages will travel through the network.
The _____________ is used by a computer to determine how messages will travel through the network.
a. routing table
b. configuration listing
c....
_________ is the process of determining the path that a message will travel from sending computer to receiving computer.
_________ is the process of determining the path that a message will travel from sending computer to receiving computer.
a. Routing
b. Addressing
c....
Server name resolution is done using the:
Server name resolution is done using the:
a. Address Resolution Protocol
b. Border Gateway Protocol
c. Internet Control Message Protocol
d. Routing...
_______ is the translation of application layer addresses into IP addresses.
_______ is the translation of application layer addresses into IP addresses.
a. Network interface card reversal
b. IPv6
c. Server name resolution
d....
Dynamic addressing:
Dynamic addressing:
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated...
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
a....
A(n) ________ refers to a group of computers that are logically grouped together by IP number.
A(n) ________ refers to a group of computers that are logically grouped together by IP number.
a. IPv6 group
b. subnet
c. data link group
d....
IPv4 uses ________ bytes per Internet address.
IPv4 uses ________ bytes per Internet address.
a. 4
b. 32
c. 8
d. 24
e. 16
Answer:...
IPv6 will be based upon _________ -byte addresses.
IPv6 will be based upon _________ -byte addresses.
a. 32
b. 24
c. 4
d. 16
e. 8
Answer:...
A client computer is assigned a data link layer address is by:
A client computer is assigned a data link layer address is by:
a. hardware manufacturers
b. software manufacturers
c. middleware manufacturers
d....
An application layer address using TCP/Ipv4 looks like:
An application layer address using TCP/Ipv4 looks like:
a. 128.192.78.5
b. www.cba.uga.edu
c. user@cba.uga.edu
d. 00-0F-00-81-14-00
e. Building...
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
a. transport
b. network
c....
______ routing is a method of routing in which each packet makes its own way through the network.
______ routing is a method of routing in which each packet makes its own way through the network.
a. Frequency division
b. Connection-oriented
c....
A special packet called a(n) ______ packet is sent to the receiver requesting the establishment of a connection.
A special packet called a(n) ______ packet is sent to the receiver requesting the establishment of a connection.
a. ACK
b. NAK
c. SYN
d. ARQ
e. FIN
Answer:...
A virtual circuit is established in the ___________ routing method.
A virtual circuit is established in the ___________ routing method.
a. asynchronous
b. connection-oriented
c. frequency division
d. application...
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
a. bits
b. bytes
c....
The newer form of IP, version 6 (Ipv6) is:
The newer form of IP, version 6 (Ipv6) is:
a. running out of address space to support the growth of the Internet
b. has a 20 byte header
c....
IP:
IP:
a. performs packetizing functions
b. does not have a header
c. is currently in use with only one packet form or structure
d. performs routing...
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
a. IP addresses
b. sequence numbers
c. port...
TCP/IP:
TCP/IP:
a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet
b. performs packetizing, as well...
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
a. ARPANET
b. IBM
c. Hewlett-Packard
d. University of Minnesota
e....
______ is the dominant network protocol today.
______ is the dominant network protocol today.
a. SDLC
b. SNA
c. IPX/SPX
d. TCP/IP
e. X.25
Answer:...
_______ is not an important function of the transport layer.
_______ is not an important function of the transport layer.
a. end-to-end delivery of the message
b. taking messages from the application layer
c....
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link Answer: B
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
a. physical
b. transport
c....
Subscribe to:
Posts (Atom)