Exam #2 possible questions:
Chapter 5
A serial backbone is the simplest kind of backbone.Answer: True
.All Ethernet networks, independent of their speed or frame type, use an access method called ____.
a. / CSMA / c. / CSAM/CDb. / CSMA/DC / d. / CSMA/CD
Answer:D
1000Base-SX has a maximum throughput of ____.
a. / 1 Gbps / c. / 100 Gbpsb. / 10 Gbps / d. / 1000 Gbps
Answer: A
In a(n) ______topology, every node on the network is connected through a central device, such as a hub, router, or switch.
Answer: Star
Because of its support for multiple Network layer protocols and because it uses fewer bytes as overhead, ______is the frame type most commonly used on contemporary Ethernet networks.
Answer: Ethernet_II
Chapter 6
Bridges are protocol independent. Answer: True
NICs contain a(n) ____, which transmits and receives data signals.
a. / keyboard port / c. / data transceiverb. / mouse port / d. / monitor
Answer:C
Repeaters operate in the ____ layer of the OSI model.
a. / Physical / c. / Transportb. / Network / d. / Session
Answer: A
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
a. / Static / c. / Best pathb. / Dynamic / d. / Link-state
Answer:A
A(n) ______NIC is integrated into the motherboard.
Answer: On-board
Chapter 13
Continuity testers can only be used to test copper cable. Answer: False
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.
a. / intensity / c. / scopeb. / background / d. / focus
Answer: C
A____ is a small electronic device that issues a signal on a wire pair.
a. / tone locator / c. / tone generatorb. / probe kit / d. / probe
Answer:C
A ____ can be used to intercept a telephone conversation.
a. / sniffer / c. / network monitorb. / protocol analyzer / d. / butt set
Answer: D
For documenting problems, some organizations use a software program known as a(n) ______(also informally known as help desk software).
Answer: Call tracking system
Chapter: Network Operating Systems (NOS)
The core of all UNIX and Linux systems is called the kernel. Answer: true
The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.
a. / virtual / c. / physicalb. / logical / d. / Hierarchical
Answer: C
A(n) ____ is a self-contained, well-defined task within a process.
a. / task / c. / activityb. / thread / d. / Job
Answer: B
Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.
a. / doc / c. / manb. / library / d. / Command
Answer: C
The most privileged user account on an NOS is the ______.
Answer: Administrator
Chapter: Directory Services
Directory Services is a way to store, manage, and access information about many different network objects. Answer: True
A flat directory services tree is the best design. Answer: False
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.
a. / shell / c. / accountb. / container / d. / directory
Answer: C
The directory containing information about objects in a domain resides on computers called ____ controllers.
a. / OU / c. / databaseb. / domain / d. / server
Answer: B
There are two general categories of eDirectory objects: container objects and _____ objects
a. / OU / c. / databaseb. / leaf / d. / tree
Answer: B
To keep the directory organized, a set of rules known as the ______is enforced
Answer: Directory Schema