Exam #2 possible questions:

Chapter 5

A serial backbone is the simplest kind of backbone.Answer: True

.All Ethernet networks, independent of their speed or frame type, use an access method called ____.

a. / CSMA / c. / CSAM/CD
b. / CSMA/DC / d. / CSMA/CD

Answer:D

1000Base-SX has a maximum throughput of ____.

a. / 1 Gbps / c. / 100 Gbps
b. / 10 Gbps / d. / 1000 Gbps

Answer: A

In a(n) ______topology, every node on the network is connected through a central device, such as a hub, router, or switch.

Answer: Star

Because of its support for multiple Network layer protocols and because it uses fewer bytes as overhead, ______is the frame type most commonly used on contemporary Ethernet networks.

Answer: Ethernet_II

Chapter 6

Bridges are protocol independent. Answer: True

NICs contain a(n) ____, which transmits and receives data signals.

a. / keyboard port / c. / data transceiver
b. / mouse port / d. / monitor

Answer:C

Repeaters operate in the ____ layer of the OSI model.

a. / Physical / c. / Transport
b. / Network / d. / Session

Answer: A

____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.

a. / Static / c. / Best path
b. / Dynamic / d. / Link-state

Answer:A

A(n) ______NIC is integrated into the motherboard.

Answer: On-board

Chapter 13

Continuity testers can only be used to test copper cable. Answer: False

An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.

a. / intensity / c. / scope
b. / background / d. / focus

Answer: C

A____ is a small electronic device that issues a signal on a wire pair.

a. / tone locator / c. / tone generator
b. / probe kit / d. / probe

Answer:C

A ____ can be used to intercept a telephone conversation.

a. / sniffer / c. / network monitor
b. / protocol analyzer / d. / butt set

Answer: D

For documenting problems, some organizations use a software program known as a(n) ______(also informally known as help desk software).

Answer: Call tracking system

Chapter: Network Operating Systems (NOS)

The core of all UNIX and Linux systems is called the kernel. Answer: true

The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.

a. / virtual / c. / physical
b. / logical / d. / Hierarchical
Answer: C

A(n) ____ is a self-contained, well-defined task within a process.

a. / task / c. / activity
b. / thread / d. / Job
Answer: B

Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.

a. / doc / c. / man
b. / library / d. / Command
Answer: C

The most privileged user account on an NOS is the ______.

Answer: Administrator

Chapter: Directory Services

Directory Services is a way to store, manage, and access information about many different network objects. Answer: True

A flat directory services tree is the best design. Answer: False

A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.

a. / shell / c. / account
b. / container / d. / directory

Answer: C

The directory containing information about objects in a domain resides on computers called ____ controllers.

a. / OU / c. / database
b. / domain / d. / server

Answer: B

There are two general categories of eDirectory objects: container objects and _____ objects

a. / OU / c. / database
b. / leaf / d. / tree

Answer: B

To keep the directory organized, a set of rules known as the ______is enforced

Answer: Directory Schema