Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
37 Cards in this Set
- Front
- Back
Which of the following network devices is similar to a bridge but contains more sophisticated addressing software and can make decisions about the best path to route a data transmission?
|
router
|
|
Which of the following devices is used to connect two network segments together to reduce network traffic by only allowing packets to pass that are intended for a node on the other segment?
|
bridge
|
|
Which of the following network devices is required to connect a network to a T-1 line?
|
CSU/DSU
|
|
Which of the following network devices is another name for a hub?
|
concentrator
|
|
Which of the following network devices is similar to a hub but with the following major difference: it makes a direct link between the transmitting device and receiving device, rather than rebroadcasting to every node?
|
switch
|
|
Which of the following network devices is a centralized connection point for network access in a star topology, that rebroadcasts every transmission to all other ports connected to it?
|
hub
|
|
Which of the following network devices combines the functionality of a router and a bridge into a single device?
|
brouter
|
|
In a bus topology: _________
|
Each end of the bus must be properly terminated
|
|
Which of the following topologies is the most common today?______
|
star
|
|
Nodes connected in s star topology:__________
|
Connect to a central hub
|
|
Which of the following IEEE 802 standards describes Ethernet?______
|
IEEE 802.3
|
|
Which of the following IEEE 802 standards describes Token Ring?_______
|
IEEE 802.5
|
|
Which of the following IEEE 802 standards describes wireless?_________
|
IEEE 802.11
|
|
On a Token Ring network, which computer will be selected as the active monitor?
|
The first station to come onto the network
|
|
What is the other hardware protocol that make use of a ring topology
|
FDDI
|
|
A segment on your network is still made up of token ring. If you want to attach it to your Ethernet network, what kind of device will you use?
|
bridge
|
|
Which of the following types of cables is going to use a BNC for a terminator?
|
coaxial
|
|
Ethernet is standard supervised by the _______ committee
|
802.3
|
|
Which committee is responsible for the 802 standard?
|
IEEE
|
|
Which of the following is the best solution if connecting only three computers together to form a small LAN?________
|
peer-to-peer
|
|
Which of the following is the best solution if connecting 100 computers together to form a corporate LAN?_________
|
server-based
|
|
Once the network is built, the term used to describe the structure of a network (as described in the two question above) is referred to as:___________
|
logical
|
|
The Directory Services model provides a secure and scalable but complex directory model that is not user friendly. In response to this which of the following was implemented? ______
|
LDAP
|
|
Microsoft s version of the Directory Services model is referred to as:_____
Answer |
Active directory
|
|
Whenever the information or application a client on a client-server network needs is located in a different place on the network, the client must utilize a/an:______
|
Redirector
|
|
On an NT 4.0 based network, there can only be one______
|
Primary Domain Controller
|
|
In an NT 4.0 network, trusts are said to be_____
|
nontransitive
|
|
Susan is logging onto the Philadelphia domain in her corporation s network. She is actually a member of the New Orleans domain. She logs on successfully. The Philadelphia domain is acting as a _____
|
Trusting domain
|
|
Your network consists of several different domains. Each of these domains provides logon authentication services. Your network is an example of a
|
multiple master domain
|
|
Which of the following is an example of a client?
|
Outlook Express
|
|
Which of the following is an example of a server?
|
NT 4.0 Enterprise Edition
|
|
Microsoft NOSs generally store security information in the ______
|
SAM
|
|
Which NOS modeled itself after the Unix operating system?
|
Linux
|
|
If Judy is normally a member of EDNACOMP.COM and EDNACOMP.COM has a trust set up with DYNACORE.COM, what process allows her to log onto her EDNACOMP account from a DYNACORE location?
|
Pass through Authentication
|
|
On a client/server network users are very likely to be assigned_____
|
A unique set of credentials
|
|
In order to access a file across the network, Tammy must type in a separate password, even though she has already logged onto the network. Her regular password does not give her access. This file has been secured with_________
Answer |
share level permissions
|
|
poop
|
poop
|