Its not a hard test, you have to however apply yourself and get in the "hours" of studying..
Materials :- Transcenders (Good material, use them one week before the exam)
:- MS Press Networking Essentials 2nd Edition
:- This site.
The above is all you need.
LEARN THESE!!!
Somebody sent these to me two days before the exam I knew all the answers, you should too Good Luck Mark Greetings from the Caribbean!!
1,"Three computers and a printer in the same office are all connected
by a cable so that users can share the printer. Is this a LAN?","Yes","If
they are sharing the same media and can communicate with each other chances
are you have a LAN"
2,"Three computers in California and one in Kansas City all use Microsoft
Excel and Lotus CCMail is this a LAN?","No","Just because
one or two computers use the same applications doesn't mean they automatically
constitute a LAN."
3,"Over 100 stand-alone computers on the 5th floor of the Sears building
in Chicago all use Microsoft Word for word processing. Is this a LAN?","No","A
thousand computers can use the exact same type of program. This doesn't
necessarily make them a LAN"
4,"Over 200 computers on the 13th, 15th and 16th floor of a large office
building are cabled together to share files, printers and other resources.
Is this a LAN?","Yes","The primary purpose of a LAN
is to share information."
5,"In a peer-to-peer network, each computer can act as both a server
and a ""_____""","Client","Peer-to-peer
networks also means that each computer operator is also his or her own network
administrator."
6,"In a peer-to-peer network, there are no dedicated "" _____""","servers","In
Client-Server the Server handles request made to it by the front end client"
7,"Each user in a peer-to-peer network shares their resources in place.
For this reason, each user can be considered a systems ""_______""","Administrator","Peer-to-peer
is generally considered effective if you are dealing with 10 or fewer users/computers"
8,"Peer-to-peer network are adequate if""_____""
is not an issue","Security","Security is one of the
primary reasons to consider using a server based LAN. If security is ever
an issue it is wise to go with a server based network"
9,"The standard model for networks with more than 10 users involves
a ""_______________"" based network","Server","Peer-to-peer
should never be considered when security is an issue"
10,"A dedicated server is a computer not used as a ""_____""","Client","A
server should really never be used as a workstation. It's primary purpose
to spend it's full time handling network / client requests"
11,"The primary term for the design or arrangement of a network is
""_____""","Topology","There are
lots of different topologies but they all stem from three basic designs"
12,"All network designs stem from these three topologies","Bus,
Ring and Star","The Bus topology is often the easiest to set up
and requires the least amount of cabling."
13,"A ""_____"" boosts network signals","Repeater","The
further a signal travels the more it starts to degrade. Eventually without
a repeater it will become unrecognizable to the receiving computer"
14,"Which network topology is consider passive","Bus","None"
15,"A terminator is used to absorb and prevent ""_____""","Signal
Bounce","With out proper termination a signal will continue to
bounce along the media causing collision and network failure"
16,"Which type of network hub requires no electrical power to run?","Passive","Active
hubs require electricity"
17,"Hubs are used primarily in what type of network","Star",
18,"In a token ring each computer acts as a ""_____""
and boost the signal before sending it on.","repeater","None"
19,"Active hubs ""__________"" and ""
_______"" network signals","regenerate and retransmit","None"
20,"True or False: A ring topology is a passive topology","False","It
is active. Each computer does regenerate and retransmit the signal"
21,"True or False: A ring topology uses terminators","False","Terminators
are only used on with the BUS topology"
22,"True or False: In a star topology the entire network will crash
if the hub goes down.","True",
23,"Linking several bus networks together is called a ""_____""
"" _______""","Star Bus","None"
24,"In a star bus topology, there are several star topology networks
linked together with a linear bus ""_____""","Trunk","Generally
Thicknet or Fiber Optic are used as a backbone / trunk"
25,"The star bus sends data like the ""______""
topology does.","Bus",
26,"Star and Star Busses connect computers through a central ""_____""","Hub","Most
hubs are stackable. Meaning you can link one to the next. This allows you
to expand the number of nodes on your network"
27,"In client server, which part accesses shared data?","Client",
28,"In Client/Server the ""_____"" is responsible
for providing shared resources","Server",
29,"A peer-to-peer network can be considered a special kind of ""_____""
"" ______"" network","Client / Server","Because
each machine can share resources, it can act as a server to another clients
requests for a file or perhaps a printer"
30,"Cabling that connects computers together is usually called","Media",
31,"You would use a ""______"" to stop signal bounce","Terminator","Without
it the signal would start to bounce and bring down the network"
32,"A ______is used to boost signal strength","Repeater","Repeater
operate at the physical layer of the OSI model."
33,"Another name for the signal on a cable ring network","Token",
34,"The centralized point in network traffic is the _____","Hub","Most
hubs are active"
35,"True or False: A peer-to-peer network is excellent if security
is a big concern","False",
36,"True or False: Implementing a server based network might be a good
idea if the number of users or 10 or more","True","Once
you reach 10 or more users or whenever security becomes and issue, it's
a good idea to start using a server based network. That way you can control
resources and security"
37,"True or False: In networking you must always have a network operating
system","False","Several operating systems such as Windows
for Workgroups or Windows 95 have built in operating systems"
38,"True or False: More then one computer on a bus can send information
at the same time","False",
39,"The network ""_______"" is generally the person
responsible for the network","Administrator","After
install the network operating system the administrator is generally the
first person to log on."
40,"Good Idea or Bad: You want to manage resources and security on
the network so you install a dedicated server","Good",
41,"Coaxial cable consists of either solid or ""_____""
copper wire","Stranded","None"
42,"True or False: Copper wire is used in coaxial","True",
43,"True or False: If the coaxial conducting core and wire mesh touch,
the cable will short","True","Fire and water don't mix.
Neither do live wires and grounds"
44,"On coaxial the insulating layer separates the core from the ""_________""
"" ______""","wire mesh","None"
45,"Thicknet is often a backbone for ""____"" net","Thin",
46,"True or False: Thinnet is limited to 100 meters before attenuation
becomes a problem","False",
47,"The degeneration of signal strength is called","Attenuation","Attenuation
is caused when the cable length exceeds the recommended lengths as set forth
in the IEEE standards. Generally 100 meters for UTP/STP or 185 meters for
Thinnet or 500 meters for Thicknet"
48,"The ____carries the electronic signals in coaxial cable","Core","In
Coaxial the core is copper wire in Fiber Optic it's glass."
49,"True or False: Plenum cabling contains special material in it's
insulation and cable jackets","True",
50,"Good Ideal or Bad: PVC cable should be used in drop ceiling and
subflooring because it is easily routed","Bad","t also
gives off poisonous gas if it catches fire. You should you plenum grade
cabling in all crawl space"
51,"True or False: The ""U"" in UTP stands for
unified.","False: It stands for unshielded","None"
52,"The EIA/TIA has created a standard for wiring, there are basically
""How many"" categories","Five",
53,"True or false Category 4 UTP cable can carry data at 100Mbps","False","Category
4 is generally good for transmissions speeds upto 16 Mbps. It consists of
four twisted-pairs"
54,"True or False: Category 3 wire is good for data transmissions up
to 10 Mbps.","True",
55,"Category ""___"" cable is used for data transmissions
up to 16Mbps.","Four","None"
56,"Twisted-pair cable uses ""_____"" telephone
connectors to connect to a computer","RJ-45","While
RJ-45 is considered a telephone connector the more common type used is RJ-11"
57,"True or False: RJ-11 Connectors houses eight connections","False","RJ-11
houses 4 connections. It is RJ-45 that houses 8"
58,"True or False: RJ-45 connectors house less connections then RJ-11
because they are larger in size and use bigger cables","False","The
opposite is actually true. RJ-56 host more connections"
59,"True or False: Twisted pair cabling comes in various versions and
can support up to 96 ports and transmission speeds of 100 Mbps.","True","Category
5 is the only one certified for data transmissions up to 100 Mbps. It is
used with Fast Ethernet."
60,"STP is less susceptible to electrical ""_____""","Interference","It
is due to the shielding used to cancel out electrical noise"
61,"""_____"" wrap is used for insulation on STP","Foil","None"
62,"True or False: Jack couplers are snapped into patch panels and
wall plates","True","None"
63,"_____ ______cable carries digital data signals","Fiber
Optic","Ethernet and Token Ring carry analog signals"
64,"True or False: After 500 meters it is a good idea to use repeaters
with fiber-optic cabling","False","A repeater is using
to regenerate an analog signal."
65,"Which type of cable would you use if you were worrying about the
line being tapped","Fiber-Optic",
66,"What are the two types of signal transmissions","Broadband
and Baseband",
67,"True or False: Repeaters are used to regenerate broadband transmissions","False",
68,"Baseband uses digital signals over a single ""_____""","Frequency",
69,"Broadband transmissions use ""______"" signals
and are carried over a range of frequencies.","Analog",
70,"Local, extended and mobile computing are 3 types of _____networks","Wireless",
71,"In wireless networks the ""____"" is sometimes
called the access point","Transceiver",
72,"Name 4 techniques for transmitting data on a wireless network","Infrared,
Laser, Narrow-band and Spread-Spectrum radio",
73,"True or False: Scatter infrared networks are effective over 100
feet because of signal bounce","False",
74,"True or False: Point-to-point transmission involves wireless serial
data transfer","True",
75,"True or False: Packet-Radio breaks down data into frames for transmission.","False",
76,"True or False: Transceivers manage radio contact between portable
devices and cabled LAN's","True",
77,"True or False: Microwave is the most widely used long-distance
transmission method in the United States","True",
78,"True or False: The purpose of a network card is to convert parallel
data to serial data for transmission.","True",
79,"True or False: All network cards are 16 bit","False",
80,"True or False: All network cards communicate at the same speed
when talking to each other","True",
81,"COM2 generally uses IRQ ""_____""","3",
82,"What is the default IRQ for most LPT 1 ports?","7",
83,"One IRQ is a used as a roll over for IRQ 2, Which is it?","9",
84,"Each hardware device on a computer will have a base ""______""
port","I/O",
85,"EISA is an improved 16 bit version of the ISA Bus","False.
EISA is based on a 32 bit bus",
86,"True or False: In most cases an 8 bit card will fit into a 16 bit
slot","True",
87,"Telephone wire uses an ""_____"" connector","RJ-11",
88,"True or False: Scatter infrared requires a direct line of sight.","False",
89,"The short space in buildings between the false ceiling and the
floor above it is called ""_____""","Plenum",
90,"There are 5 types of enhancements that generally can be done to
network cards to improve their performance. Name three of these","Direct
memory address ""DMA"" , Shared adapter memory, Shared
system memory, Bus mastering, RAM buffering",
91,"You add a new computer to a BUS based LAN, and the network quits
and none of the computers can talk to each other. What's the 1st thing to
check?","Termination",
92,"Workable or Not: You have 3 computers. They are each 125 meters
apart, you want to connect them all to a central hub. So you implement a
10baseT network with an active hub.","Not",
93,"There are ""_____"" layers in the OSI model","Seven",
94,"True or False: The purpose of each layer of the OSI is to provide
services to the next lower level?","False. It is to provide services
to the next higher level",
95,"True or False: The highest layer of the OSI is the presentation
layer, which is generally referred to as the application interface layer
""AIL""","False",
96,"True or False: The Transport layer ensures that packets are delivered
error free","True",
97,"The ""_____"" OSI layer provides synchronization
by placing checkpoints in the data stream","Session",
98,"True or False: The Transport layer deals with packets while the
Data Link layer deals with frames.","True",
99,"True or False: All Ethernet frames are 1516 bytes long","False",
100,"True or False: Each OSI layer thinks it is communicating directly
with the same layer in another computer. Even though the data is going through
several layers","True",
101,"True or False: In the OSI model the Physical layer communicates
directly with the Physical layer in another computer","True",
102,"IEEE 802.5 is the ""______""""_____""
specification","Token Ring",
103,"Category IEEE 802.3 is the generally referred to as ""______""","Ethernet",
104,"Which IEEE category do the newer 100base LAN fall under","802.12
Demand Priority Access LAN, 100BaseVG-AnyLAN",
105,"The 802 standards committee divided the Data Link Layer of the
OSI model into the ""_____"" and ""_____""
sublayers","LLC Logical Link Control and MAC media Access Control",
106,"True or false: A router operates at the physical layer of the
OSI model.","False",
107,"True or False: All device drivers are interchangeable provided
you connect them to the network card correctly.","False",
108,"Network adapter card drivers reside in the ""________""
sublayer of the Data Link layer of the OSI model","MAC Media Access
Control",
109,"A packet header contains these 4 parts","An alert signal,
Source Address, Destination Address and Clock information for synchronization",
110,"A cyclical redundancy check (CRC) is usually contained in a packets
""_______""","Trailer",
111,"Packet Creation begins at the ""________""
layer of the OSI model","Application",
112,"""_________"" are the rules and procedures
used for network communication","Protocols",
113,"When several protocols work together the form a protocol ""_____""","Stack",
114,"Protocols that support multipath LAN to LAN communication are
""_____"" protocols.","Routable",
115,"The ""_______"" order determines the order
in which the operating system runs a protocol.","Binding",
116,"Name at least 3 application protocols","APPC,FTAM,X.400,X.500,SMTP,FTP,SNMP,TELNET,Microsoft
SMB, AppleTalk & Apple Share, DAP",
117,"Name the 3 IEEE protocols at the Physical Layer","802.3
(Ethernet), 802.4 (token Passing) and 802.5 (Token Ring)",
118,"What is the most popular internetworking protocol?","TCP/IP",
119,"The 2 most popular cable access methods are Token passing and
""_______""","CSMA/CD Carrier-Sense Multiple
Access with Collision Detection",
120,"In ""______"" each computer signals its intent
to transmit before it actually transmits data","CSMA/CA Carrier-Sense
Multiple Access with Collision Avoidance",
121,"Access methods are used to avoid and prevent ""_____""
access to the cable","Simultaneous",
122,"In ""______, ______"" a special type of packet
circulates around a cable from computer to computer, When any computer wants
to send data across the network it must wait for a free packet or ""______""","Token
Ring, Token",
123,"""_______"" is when two computers are trying
to transmit at exactly the same time.","Contention",
124,"This type of access method is generally used by Ethernet to regulate
network traffic on a main cable segment.","CSMA/CD",
125,"This topology conforms to the IEEE 802.3 specification, transmits
at 10 Mbps at distances of up to 185 meters. It also uses BNC cabling components.","10Base2",
126,"A Thinnet network can combine as many as ""____""
cable segments","Five",
127,"It conforms to IEEE 802.3 specs and is called standard Ethernet","10Base5",
128,"""______"" provide communication between the
computer and the main LAN cables and are located in the vampire taps attached
to the cable","Transceivers",
129,"It is another name for Fast Ethernet","100BaseX",
130,"Developed by Hewlett-Packard it is voice grade technology transmitting
at 100Mbps","100VG-AnyLAN or 100BaseVGor VG or AnyLAN",
131,"""_______"" uses 2-pairCategory 5 UTP or STP","100BaseTX",
132,"100BaseFX uses 2-strand ""_______,_______""
cable","Fiber, Optic",
133,"The terminator resistance for both 10base2 and 10base5 is ""______""","50
ohms",
134,"True or False: The terminator resistance on a 10baseT network
should always equal 75 Ohms.","False, Terminators are not used
in a 10baseT/Star bus topology",
135,"Token Ring specifications are defined by the IEEE ""______""
specifications","802.5",
136,"In a Token Ring Data Frame a ""_______"",""_______""
Indicates the start of the frame","Start delimiter",
137,"In a Token Ring Data Frame the ""_______"",""_______""
Indicates the frame priority and whether it is a token or a data frame.","Access
control",
138,"In a Token Ring Data Frame the ""_______"",""_______"",""__________""
contains the CRC error-checking information","Frame Check Sequence",
139,"When a frame reaches it's destination it is copied into that computer's
""_______"",""_________""","receive
buffer",
140,"Token passing is considered ""______________""
because it cannot force its way unto the network as it can in a CSMA/CD
environment","Deterministic",
141,"Each MSAU-based network can support as many as ""____""
computers that use unshielded wire or up to ""_____""
computers that use shielded wire","72,260",
142,"MSAUS were designed to sense when a network adapter card fails
and ""______"" from it. allowing the token to continue
on.","Disconnect",
143,"According to IBM the maximum cabling distance from an MSAU to
a computer or files server using Type 3 cable is ""_______""","150
Feet",
144,"Type ""_____"" is the cabling system used
by most IBM Token Ring networks","3",
145,"Single LocalTalk networks can be joined together into one larger
network through the use of ""______""","Zones",
146,"Which access method does LocalTalk use in a bus or tree topology","CSMA/CA",
147,"The maximum number of devices on a single LocalTalk network is
""_______""","32",
148,"Original ArcNet had a transmission speed of ""________""","2.5
Mbps",
149,"This is the successor to ArcNet and supports data transmission
rates of 20 Mbps","ArcNet Plus",
150,"This technology actually predates the IEEE Project 802 standards
but loosely maps to the 802.4 specifications","ArcNet",
151,"The standard ArcNet packet contains up to ""_____""
bytes of data","508",
152,"A true multitasking operating system can run as many tasks as
there are ""________"" after that the computer must
time slice","Processors",
153,"The process of forwarding client computer requests is done by
a ""__________""","redirector",
154,"True or False: Redirector activity originates on the server when
a client makes and interrupt request","False.",
155,"True or False: Redirectors can send requests to computers not
peripherals. The client computer then subsequently issues a call to the
intended peripheral","False",
156,"In a Microsoft NT Server network the first server installed in
a domain is called a ""______"",""_____"",""______""
{PDC}","Primary Domain Controller",
157,"Name at least 2 Transport protocols","TCP, SPX, NWLink,
NetBEUI or ATP",
158,"Name at least 2 network protocols","IP, IPX, NWLINK,
NetBeui or DDP",
159,"A hard disk can be divided into areas called ""_____""","Partitions",
160,"True or False: All computers in the same domain share the same
unique IP address.","False",
161,"A subnet mask is used to mask a portion of the IP address so that
TCP/IP can distinguish the ""_______"" ID from the ""________""
ID","Network, Host",
162,"Microsoft Windows NT Server provides a service called the dynamic
host configuration protocol (DHCP). it is used to dynamically assign ""_____""
addresses","TCP/IP",
163,"""______"" are a series of bound paths from
the upper OSI layer network services and protocols to the lowest layer of
network adapter card device drivers","Bindings",
164,"True or False: A good way to improve performance is to change
the binding path order and put the faster protocol first in the binding
list.","True",
165,"The ""_____"" is the memory buffer in the
print server's RAM that holds the print job until the printer is ready","Spooler",
166,"True or False: In order for users to access a shared printer the
printer must have a network identification.","True",
167,"True or False: Users can never delete a print job that is not
theirs only a network administrator can do that.","False",
168,"True or False: An administrator can manage a printer from any
network computer","True",
169,"The ""_____"" is used to construct text and
graphics to create the page image","PDL",
170,"Although slower, ""_____"" is more powerful
than optical character recognition (OCR)","ICR Intelligent character
recognition",
171,"Most networks offer a way to gather many separate user accounts
into one type of account called a ""_____""","Group",
172,"The ""_________"" group is generally responsible
for overall network operations such as deleting and creating user account,
installing applications etc.","Administrators",
173,"A device that is causing a problem on a network, generally using
more CPU time then others is referred to as a ""_____""","Bottleneck","Most
network operating systems contain performance monitoring to pin point bottlenecks
and problems areas"
174,"On Windows NT Server ""_____"",""_____""
can be used to look at recorded and real time operations on a variety of
devices including Processors, Hard disks and memory","Performance
Monitor","Performance Monitors is a great way to record performance
data, send an alert to the systems administrator or to start 3rd party programs
to correct system errors"
175,"In an SNMP environment, programs called ""_____""
are loaded onto each managed device","Agents","Agents
monitor network traffic and behavior. They store data in the MIB management
information database"
176,"Microsoft uses ""_____"" to manage and administer
system wide applications","SMS Systems Management Server","SMS
can be used to collects hardware and software inventory information and
distributes and install software"
177,"Two different security models have developed for keeping data
and hardware safe they are generally referred to as ""_____-_____"",
""_______"" and ""_______"",""________""","Password-Protected
Shares and Access Permissions","Security policies and procedures
are often the hard and soul of a successful network"
178,"Under password-protected shares, each ""______""
""______"" is assigned a password","shared
resource","Often shared resources can be granted different types
of permissions such as read only or full"
179,"True or False: The password-protected share system allows anyone
with the correct password access to that particular resource","True","For
this reason password-protect is considered the less secure and simpler security
model."
180,"The process of tracking activity trails for functions is often
referred to as ""_____""","Auditing","Lots
of activities can be tracked such as log on/off attempt, opening and closing
files etc."
181,"True or False: Diskless Computers have no floppy or hard drives","True","Diskless
Computers need a special ROM boot chip"
182,"Scrambling data to make it unreading is called ""_____""","Encryption","The
base encryption systems are often hardware based and expensive"
183,"True or False: Preventing unauthorized access is the only way
to protect against viruses","False","Installing a good
virus protection program is also recommended"
184,"The simpliest and least expensive way to avoid data loss is to
schedule periodic ""_____""","Backups","It's
always a good Idea to keep a duplicate backup off site at a remote location"
185,"True or False: Backing up files only if they have changed since
the last time they were backed up is called an differential Backup","False","It
is called an incremental backup"
186,"True or False: During a differential backup all files are marked
as having been backed up.","False","It is actually the
oposite. Files are left unmarked"
187,"True or False: Placing a backup on an isolated ""_____""
can help relieve network traffic","True","None"
188,"True or False: The primary purpose of a UPS is to rebuild a harddrive
partition in case of hard drive failure","False","A
UPS is a power souce / Battery and allows safe shutdown of a workstation
/ Server"
189,"True or False: Standby UPS systems are more reliable then online
UPS's","False","None"
190,"""_____"",""_____"" refers
to protecting data by duplicating data and placing it on different partitions
or physical hard drives","Fault Tolerant","Fault tolerant
systems generally use Disk Stiping, Disk mirroring or Sector sparing for
data redundancy"
191,"Disk Striping uses ""_____"" Blocks of data
and spreads them equally amony all disks in an array","64K","There
is fault tolerance so any partition set fails and all data is lost"
192,"Duplicating a partition and moving it to a different physical
drive is called ""_____"",""_____""","Disk
Mirroring","Disk mirroring is like having continuous backup"
193,"What does RAID stand for?","Redundant Arrays of Inexpensive
Disks","There are basically 5 standard levels of RAID"
194,"When an operating system trys to remap bad sectors to good ones
it's called ""____"",""_____""","Sector
Sparing","Only SCSI devices can use sector sparing. ESDI or IDE
devices can not."
195,"Which utility is used in the Windows NT Server operating system
to impliment Fault Tolerance","Disk Administrator","Disk
Administrator is used for a varity of disk operations"
196,"A modem modulates digital signals into analog and ""____""
analog signals back into digital signals","Demodulates","Quit
using modems. I have a router and love it :0)"
197,"A modem's speed is measured in ""_____"" or
baud rate","Bps ""Bits per second""","The
newer modems are capable of 56K although that is under lab perfect conditions."
198,"""_____"" communication is not synchronized
and uses a start and stop bit to seperate character strings","Asynchronous","About
a fourth of the data in Async communication is traffic control and coordination"
199,"""_____"" communication relies on a timing
system between two devices","Synchronous","Synchronous
communication is much more reliable then Async"
200,"Windows NT offers remote access capablity as a service and it's
called.","Remote Access Service RAS","None"
201,"A phone line which is in constant use is often referred to as
a ""_____"" or dedicated line","Leased","None"
202,"Repeaters work at the ""_____"" layer of the
OSI model","Physical","a repeater regenerates a weak
network signal and passes it on"
203,"True or False: Repeaters are a good way to control broadcast storms
because they don't regenerate random noise","False","Repeater
don't filter or translate anything. They merely regenerate signals"
204,"True or False: Repeaters connect two segment of similar or dissimilar
media","True","Repeater pass all network signals in
both directions"
205,"This device works at the Data Link layer of the OSI model.","Bridges","Bridges
work with all protocols"
206,"True or False: Bridges build their routing tables based on the
address of computer that have transmitted data on the network","True","If
a bridge doesn't know the destination address it forwards the packet to
all of it's ports."
207,"True or False: Because repeaters regenerate signals they are a
great device to segment network traffic","False","Bridge
are used to segment network traffic"
208,"Which device is considered more intelligent because it works at
a higher level of the OSI model Bridges or Repeaters?","Bridges","Bridge
are less expensive then routers and should be considered before a router."
209,"Bridges work at the Data Link Layer of the OSI model or more specifically
the ""_____"",""____"",""____""
layer","Media Access Control","None"
210,"True or False: A router will select the best route for the data
based on cost and available paths","True","The router
table is used to determine the path"
211,"True or False: Routers will route all protocols that is what makes
them Ideal for segmenting network traffic","False","There
are several protocols that routers can't route"
212,"""_____"",""_____"" are
two protocols that routers can't route","LAT and NetBeui","DECnet,
IP,IPX, OSI, XNS and DDP are several of the protocols that routers can work
with"
213,"True or False: Routers can never accommodate multiple protocols
such as IPX and XNS on the same network","False","Several
types of routers can support mulitble protocols are are designed to do so."
214,"There are 2 major types of routers they are ""_____"",""_____""","Static
and Dynamic","Dynamic routers are the more sophisticated of the
two"
215,"True or False: All routers look at a packets media access control
sublayer address and forwards the packet if it recognizes it.","False","None"
216,"True or False Routers work at the Network layer of the OSI model","True","None"
217,"This device combines a router and bridge and combines the best
qualities of each","Brouter","Brouters can route the
protocols that routers can't because it also act as a bridge."
218,"This strips off one protocol stack and repackages it in the stack
from the destination network","Gateways","Gateways are
task specific and generally do only one type of transfer"
219,"The most common use for a gateway is to connect a personal computer
with a ""_____""","mainframe","None"
220,"The most common types of transmission technologies used for WAN
links are Analog, Digital and ""_____"",""_______""","Packet
Switching","Analog is generally telephone lines, Digital are generally
leased ISDN or T1"
221,"True or False: In packet switching, all packets are routed along
the same paths to insure delievery?","False","The opposite
is really true each packet may take different paths it is the computer at
the recieveing end that reassembles the original message"
222,"A series of logical connections between two computers are called
""_____"",""_____"" in packet-switching
networks","Virtual Circuits","Virtual circuits are considered
temporary as long as the conversation is going or permanent as long as two
computers are up, running and communicating with each other"
223,"Frame relay uses perminent virtual network to transmit ""_______"",""______""
frames at the Data Link Layer","Variable Length","Frame
relay is an advanced technology that strippes away many of X.25's error
checking. It works on a more secure and reliable fiber optic toplogy"
224,"""_____"",""______"",""_______""
is generally regarded as the fastest implimentation of the packet switching
communication methods","Asynchronous Transfer Mode ""ATM""","Generally
ATM can accommodate all forms of communication including imaging and CD-quality
Audio"
225,"ISDN is a digital connection that supports ""_____""
B channels and ""_____"" D channel","""Two""
and ""One""","Get an ISDN connection to the
web if you can. It's a lot nicer then crusing around at 33,6"
226,"""_____"",""_____"",""_____"",""_______""
is a dual ring high speed token passing topology operating at 100 Mbps","Fiber
Distributed Data Interface ""FDDI""","FDDI
provides some redunancy due to the fact that if one ring fails the other
can take over."
227,"In a token passing network ""_____"" is when
one computer detects a fault and starts sending a signal over the network.","Beaconing","Beaconing
isolates serious failures in the ring and allows them to be located."
228,"When trouble shooting a network it is always good to have a ""_______""
of collected data and performance records.","Baseline","Various
tools and network monitoring devices can be used to establish a baseline
of normal network operating perameters."
229,"True or False: Digital Volt Meters (DMV) test media by sending
sonar like pulses along it to determine where line breaks are.","False","That
is done by Time-Domain Reflectometers (TDRS) a DMV checks the amount of
voltage passing through a resistance."
230,"True or False: Most advanced cable testing devices work at the
physical layer of the network were most of the problems occure.","False","Although
they can return some line information. Advanced testers generally work by
examining frame counts, excess collsions, congestion and beaconing problems"
231,"""______"",""______""
are the tools most often used to to monitor and interact with a network","Protocol
Analyzers","None needed, if your going to work extensively on
networks and get serious about them in general you'll end up using or owning
one."