• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/37

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

37 Cards in this Set

  • Front
  • Back
Which of the following network devices is similar to a bridge but contains more sophisticated addressing software and can make decisions about the best path to route a data transmission?
router
Which of the following devices is used to connect two network segments together to reduce network traffic by only allowing packets to pass that are intended for a node on the other segment?
bridge
Which of the following network devices is required to connect a network to a T-1 line?
CSU/DSU
Which of the following network devices is another name for a hub?
concentrator
Which of the following network devices is similar to a hub but with the following major difference: it makes a direct link between the transmitting device and receiving device, rather than rebroadcasting to every node?
switch
Which of the following network devices is a centralized connection point for network access in a star topology, that rebroadcasts every transmission to all other ports connected to it?
hub
Which of the following network devices combines the functionality of a router and a bridge into a single device?
brouter
In a bus topology: _________
Each end of the bus must be properly terminated
Which of the following topologies is the most common today?______
star
Nodes connected in s star topology:__________
Connect to a central hub
Which of the following IEEE 802 standards describes Ethernet?______
IEEE 802.3
Which of the following IEEE 802 standards describes Token Ring?_______
IEEE 802.5
Which of the following IEEE 802 standards describes wireless?_________
IEEE 802.11
On a Token Ring network, which computer will be selected as the active monitor?
The first station to come onto the network
What is the other hardware protocol that make use of a ring topology
FDDI
A segment on your network is still made up of token ring. If you want to attach it to your Ethernet network, what kind of device will you use?
bridge
Which of the following types of cables is going to use a BNC for a terminator?
coaxial
Ethernet is standard supervised by the _______ committee
802.3
Which committee is responsible for the 802 standard?
IEEE
Which of the following is the best solution if connecting only three computers together to form a small LAN?________
peer-to-peer
Which of the following is the best solution if connecting 100 computers together to form a corporate LAN?_________
server-based
Once the network is built, the term used to describe the structure of a network (as described in the two question above) is referred to as:___________
logical
The Directory Services model provides a secure and scalable but complex directory model that is not user friendly. In response to this which of the following was implemented? ______
LDAP
Microsoft s version of the Directory Services model is referred to as:_____
Answer
Active directory
Whenever the information or application a client on a client-server network needs is located in a different place on the network, the client must utilize a/an:______
Redirector
On an NT 4.0 based network, there can only be one______
Primary Domain Controller
In an NT 4.0 network, trusts are said to be_____
nontransitive
Susan is logging onto the Philadelphia domain in her corporation s network. She is actually a member of the New Orleans domain. She logs on successfully. The Philadelphia domain is acting as a _____
Trusting domain
Your network consists of several different domains. Each of these domains provides logon authentication services. Your network is an example of a
multiple master domain
Which of the following is an example of a client?
Outlook Express
Which of the following is an example of a server?
NT 4.0 Enterprise Edition
Microsoft NOSs generally store security information in the ______
SAM
Which NOS modeled itself after the Unix operating system?
Linux
If Judy is normally a member of EDNACOMP.COM and EDNACOMP.COM has a trust set up with DYNACORE.COM, what process allows her to log onto her EDNACOMP account from a DYNACORE location?
Pass through Authentication
On a client/server network users are very likely to be assigned_____
A unique set of credentials
In order to access a file across the network, Tammy must type in a separate password, even though she has already logged onto the network. Her regular password does not give her access. This file has been secured with_________
Answer
share level permissions
poop
poop