You have implemented a network where hosts are assigned specific roles, such as for file sharing and rpinting. Other hosts access those resources but do not host services of their own. What type of network do you have? |
C Client/Server |
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? |
B Peer-to-Peer |
Which of the following topologies connects each network device to a central hub? |
D Star |
You have a small network that uses a hub to connect multiple devices. What physical topology is used? |
D Star |
In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device? |
B Ring |
You have been asked to implement a network infrastructure that will accomadate failed connections. Whcih of the following network topologies provides redundancy for a failed link? |
A Mesh |
You have a network that uses a logical rinf topology. How do messages travel through the network? |
A Messages travel from one device tot he next until they reach the destination. |
Which of the following topologies connects all devioces to a trunk cable? |
B Bus |
What device is used to create a physical star topology? |
D Switch |
You have a network that uses a logical bus topology. How do messages travel through the network. |
C Messages are broadcast to all devices connected to the network. |
You want to implement a fault tolerant topology as you interconnect routers on your wide area netowrk. Which of the following would meet your needs? |
C Mesh |
Which of the following topologies connects each device to a neighboring device? |
C Ring |
You have implemented an ad-hoc wireless network that doesnt employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical topology has been implemented in this type of network? |
E Mesh |
What protocol sends email to a mail server? |
B SMTP |
You have a large TCP/IP network and want to keep hosts real time clocks syncronized. What protocol should you use? |
A NTP |
Your company has just acquired another comapany in the same city. You are given the task of integrating the two email systems so that messages can be exchanged between the email servers. However, each network uses an email package froma different vendor. |
B SMTP |
Which protocol is used on the world wide web to transmit web pages to web browsers? |
B HTTP |
You want to transfer a file from a Unix server to a windows 2000 computer. Which of the following utilities could you use to do this? Select all that apply. |
FTP TFTP |
You want to allow your users to download files form a server runing the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability? |
C FTP |
Which of the following protocols stores email on the mail server and gives a choice to download mail or keep it on the server? |
D IMAP4 |
Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server? |
A POP3 |
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? |
C ICMP |
You are asked to recommend an email retieval protocol for a company’s sales team. The sales team needs to access email from various locations and possibly different computers. the sales team does not want to worry about transferring email messages or files back and forth between these computers. |
F IMAP Internet Message Access Protocol |
The data link layer of the OSI model is compromised of two sublayers. Waht are they? |
C MAC E LLC |
In the OSI model, which of the following functions are performed at the Application layer? Select all that apply. |
C Enabling communication between network clients and services D Integration of network functionality into the host operating system |
Which three of the following functions are performed by the OSI Transport layer? |
A Reliable message delivery F End-to-end flow control G Data segmentation and reassembly |
You are an application developer and are writing a program to exchange video files through TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability? |
E TCP |
Which of the following are functions of the MAC sublayer? Select two. |
B Defining a unique hardware address for each device on the network C Letting devices on the network have access to the LAN |
In the OSI model, what is the primary function of the Network Layer? |
B Routes messages between networks |
The UDP tansport protocol provides which of the following features? select all that apply. |
B Connectionless datagram services C Low overhead |
Whcih OSI model layer is responsible for guaranteeing reliable message delivery? |
C Transport |
Which of the following functions are performed at the Physical layer of the OSI model? |
B Movement of data across network cables |
What is the basic purpose of the OSI Physical Layer? |
C Coordinates rules for transmitting bits. |
Which of the following tasks is associated with the Session layer? |
D Connection establishment |
Which two of the following are included as part of Data Link layer specifications? |
B Identifying physical network devices. D Controlling how messgaes are propagated through the network. |
In the OSI model, which of the following functions are performed at the Presentation layer? select two. |
B Specify data format C Encrypt and compress |
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes? |
C TCP |
Network Pro Ch 1
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price