It’s not a hard test, you have to however apply yourself and get in the "hours" of studying..

 

Materials :- Transcenders (Good material, use them one week before the exam)

:- MS Press Networking Essentials 2nd Edition

:- This site.

The above is all you need.

 

LEARN THESE!!!

Somebody sent these to me two days before the exam I knew all the answers, you should too Good Luck Mark… Greetings from the Caribbean!!

 

1,"Three computers and a printer in the same office are all connected by a cable so that users can share the printer. Is this a LAN?","Yes","If they are sharing the same media and can communicate with each other chances are you have a LAN"
2,"Three computers in California and one in Kansas City all use Microsoft Excel and Lotus CCMail is this a LAN?","No","Just because one or two computers use the same applications doesn't mean they automatically constitute a LAN."
3,"Over 100 stand-alone computers on the 5th floor of the Sears building in Chicago all use Microsoft Word for word processing. Is this a LAN?","No","A thousand computers can use the exact same type of program. This doesn't necessarily make them a LAN"
4,"Over 200 computers on the 13th, 15th and 16th floor of a large office building are cabled together to share files, printers and other resources. Is this a LAN?","Yes","The primary purpose of a LAN is to share information."
5,"In a peer-to-peer network, each computer can act as both a server and a ""_____""","Client","Peer-to-peer networks also means that each computer operator is also his or her own network administrator."
6,"In a peer-to-peer network, there are no dedicated "" _____""","servers","In Client-Server the Server handles request made to it by the front end client"
7,"Each user in a peer-to-peer network shares their resources in place. For this reason, each user can be considered a systems ""_______""","Administrator","Peer-to-peer is generally considered effective if you are dealing with 10 or fewer users/computers"
8,"Peer-to-peer network are adequate if""_____"" is not an issue","Security","Security is one of the primary reasons to consider using a server based LAN. If security is ever an issue it is wise to go with a server based network"
9,"The standard model for networks with more than 10 users involves a ""_______________"" based network","Server","Peer-to-peer should never be considered when security is an issue"
10,"A dedicated server is a computer not used as a ""_____""","Client","A server should really never be used as a workstation. It's primary purpose to spend it's full time handling network / client requests"
11,"The primary term for the design or arrangement of a network is ""_____""","Topology","There are lots of different topologies but they all stem from three basic designs"
12,"All network designs stem from these three topologies","Bus, Ring and Star","The Bus topology is often the easiest to set up and requires the least amount of cabling."
13,"A ""_____"" boosts network signals","Repeater","The further a signal travels the more it starts to degrade. Eventually without a repeater it will become unrecognizable to the receiving computer"
14,"Which network topology is consider passive","Bus","None"
15,"A terminator is used to absorb and prevent ""_____""","Signal Bounce","With out proper termination a signal will continue to bounce along the media causing collision and network failure"
16,"Which type of network hub requires no electrical power to run?","Passive","Active hubs require electricity"
17,"Hubs are used primarily in what type of network","Star",
18,"In a token ring each computer acts as a ""_____"" and boost the signal before sending it on.","repeater","None"
19,"Active hubs ""__________"" and "" _______"" network signals","regenerate and retransmit","None"
20,"True or False: A ring topology is a passive topology","False","It is active. Each computer does regenerate and retransmit the signal"
21,"True or False: A ring topology uses terminators","False","Terminators are only used on with the BUS topology"
22,"True or False: In a star topology the entire network will crash if the hub goes down.","True",
23,"Linking several bus networks together is called a ""_____"" "" _______""","Star Bus","None"
24,"In a star bus topology, there are several star topology networks linked together with a linear bus ""_____""","Trunk","Generally Thicknet or Fiber Optic are used as a backbone / trunk"
25,"The star bus sends data like the ""______"" topology does.","Bus",
26,"Star and Star Busses connect computers through a central ""_____""","Hub","Most hubs are stackable. Meaning you can link one to the next. This allows you to expand the number of nodes on your network"
27,"In client server, which part accesses shared data?","Client",
28,"In Client/Server the ""_____"" is responsible for providing shared resources","Server",
29,"A peer-to-peer network can be considered a special kind of ""_____"" "" ______"" network","Client / Server","Because each machine can share resources, it can act as a server to another clients requests for a file or perhaps a printer"
30,"Cabling that connects computers together is usually called","Media",
31,"You would use a ""______"" to stop signal bounce","Terminator","Without it the signal would start to bounce and bring down the network"
32,"A ______is used to boost signal strength","Repeater","Repeater operate at the physical layer of the OSI model."
33,"Another name for the signal on a cable ring network","Token",
34,"The centralized point in network traffic is the _____","Hub","Most hubs are active"
35,"True or False: A peer-to-peer network is excellent if security is a big concern","False",
36,"True or False: Implementing a server based network might be a good idea if the number of users or 10 or more","True","Once you reach 10 or more users or whenever security becomes and issue, it's a good idea to start using a server based network. That way you can control resources and security"
37,"True or False: In networking you must always have a network operating system","False","Several operating systems such as Windows for Workgroups or Windows 95 have built in operating systems"
38,"True or False: More then one computer on a bus can send information at the same time","False",
39,"The network ""_______"" is generally the person responsible for the network","Administrator","After install the network operating system the administrator is generally the first person to log on."
40,"Good Idea or Bad: You want to manage resources and security on the network so you install a dedicated server","Good",
41,"Coaxial cable consists of either solid or ""_____"" copper wire","Stranded","None"
42,"True or False: Copper wire is used in coaxial","True",
43,"True or False: If the coaxial conducting core and wire mesh touch, the cable will short","True","Fire and water don't mix. Neither do live wires and grounds"
44,"On coaxial the insulating layer separates the core from the ""_________"" "" ______""","wire mesh","None"
45,"Thicknet is often a backbone for ""____"" net","Thin",
46,"True or False: Thinnet is limited to 100 meters before attenuation becomes a problem","False",
47,"The degeneration of signal strength is called","Attenuation","Attenuation is caused when the cable length exceeds the recommended lengths as set forth in the IEEE standards. Generally 100 meters for UTP/STP or 185 meters for Thinnet or 500 meters for Thicknet"
48,"The ____carries the electronic signals in coaxial cable","Core","In Coaxial the core is copper wire in Fiber Optic it's glass."
49,"True or False: Plenum cabling contains special material in it's insulation and cable jackets","True",
50,"Good Ideal or Bad: PVC cable should be used in drop ceiling and subflooring because it is easily routed","Bad","t also gives off poisonous gas if it catches fire. You should you plenum grade cabling in all crawl space"
51,"True or False: The ""U"" in UTP stands for unified.","False: It stands for unshielded","None"
52,"The EIA/TIA has created a standard for wiring, there are basically ""How many"" categories","Five",
53,"True or false Category 4 UTP cable can carry data at 100Mbps","False","Category 4 is generally good for transmissions speeds upto 16 Mbps. It consists of four twisted-pairs"
54,"True or False: Category 3 wire is good for data transmissions up to 10 Mbps.","True",
55,"Category ""___"" cable is used for data transmissions up to 16Mbps.","Four","None"
56,"Twisted-pair cable uses ""_____"" telephone connectors to connect to a computer","RJ-45","While RJ-45 is considered a telephone connector the more common type used is RJ-11"
57,"True or False: RJ-11 Connectors houses eight connections","False","RJ-11 houses 4 connections. It is RJ-45 that houses 8"
58,"True or False: RJ-45 connectors house less connections then RJ-11 because they are larger in size and use bigger cables","False","The opposite is actually true. RJ-56 host more connections"
59,"True or False: Twisted pair cabling comes in various versions and can support up to 96 ports and transmission speeds of 100 Mbps.","True","Category 5 is the only one certified for data transmissions up to 100 Mbps. It is used with Fast Ethernet."
60,"STP is less susceptible to electrical ""_____""","Interference","It is due to the shielding used to cancel out electrical noise"
61,"""_____"" wrap is used for insulation on STP","Foil","None"
62,"True or False: Jack couplers are snapped into patch panels and wall plates","True","None"
63,"_____ ______cable carries digital data signals","Fiber Optic","Ethernet and Token Ring carry analog signals"
64,"True or False: After 500 meters it is a good idea to use repeaters with fiber-optic cabling","False","A repeater is using to regenerate an analog signal."
65,"Which type of cable would you use if you were worrying about the line being tapped","Fiber-Optic",
66,"What are the two types of signal transmissions","Broadband and Baseband",
67,"True or False: Repeaters are used to regenerate broadband transmissions","False",
68,"Baseband uses digital signals over a single ""_____""","Frequency",
69,"Broadband transmissions use ""______"" signals and are carried over a range of frequencies.","Analog",
70,"Local, extended and mobile computing are 3 types of _____networks","Wireless",
71,"In wireless networks the ""____"" is sometimes called the access point","Transceiver",
72,"Name 4 techniques for transmitting data on a wireless network","Infrared, Laser, Narrow-band and Spread-Spectrum radio",
73,"True or False: Scatter infrared networks are effective over 100 feet because of signal bounce","False",
74,"True or False: Point-to-point transmission involves wireless serial data transfer","True",
75,"True or False: Packet-Radio breaks down data into frames for transmission.","False",
76,"True or False: Transceivers manage radio contact between portable devices and cabled LAN's","True",
77,"True or False: Microwave is the most widely used long-distance transmission method in the United States","True",
78,"True or False: The purpose of a network card is to convert parallel data to serial data for transmission.","True",
79,"True or False: All network cards are 16 bit","False",
80,"True or False: All network cards communicate at the same speed when talking to each other","True",
81,"COM2 generally uses IRQ ""_____""","3",
82,"What is the default IRQ for most LPT 1 ports?","7",
83,"One IRQ is a used as a roll over for IRQ 2, Which is it?","9",
84,"Each hardware device on a computer will have a base ""______"" port","I/O",
85,"EISA is an improved 16 bit version of the ISA Bus","False. EISA is based on a 32 bit bus",
86,"True or False: In most cases an 8 bit card will fit into a 16 bit slot","True",
87,"Telephone wire uses an ""_____"" connector","RJ-11",
88,"True or False: Scatter infrared requires a direct line of sight.","False",
89,"The short space in buildings between the false ceiling and the floor above it is called ""_____""","Plenum",
90,"There are 5 types of enhancements that generally can be done to network cards to improve their performance. Name three of these","Direct memory address ""DMA"" , Shared adapter memory, Shared system memory, Bus mastering, RAM buffering",
91,"You add a new computer to a BUS based LAN, and the network quits and none of the computers can talk to each other. What's the 1st thing to check?","Termination",
92,"Workable or Not: You have 3 computers. They are each 125 meters apart, you want to connect them all to a central hub. So you implement a 10baseT network with an active hub.","Not",
93,"There are ""_____"" layers in the OSI model","Seven",
94,"True or False: The purpose of each layer of the OSI is to provide services to the next lower level?","False. It is to provide services to the next higher level",
95,"True or False: The highest layer of the OSI is the presentation layer, which is generally referred to as the application interface layer ""AIL""","False",
96,"True or False: The Transport layer ensures that packets are delivered error free","True",
97,"The ""_____"" OSI layer provides synchronization by placing checkpoints in the data stream","Session",
98,"True or False: The Transport layer deals with packets while the Data Link layer deals with frames.","True",
99,"True or False: All Ethernet frames are 1516 bytes long","False",
100,"True or False: Each OSI layer thinks it is communicating directly with the same layer in another computer. Even though the data is going through several layers","True",
101,"True or False: In the OSI model the Physical layer communicates directly with the Physical layer in another computer","True",
102,"IEEE 802.5 is the ""______""""_____"" specification","Token Ring",
103,"Category IEEE 802.3 is the generally referred to as ""______""","Ethernet",
104,"Which IEEE category do the newer 100base LAN fall under","802.12 Demand Priority Access LAN, 100BaseVG-AnyLAN",
105,"The 802 standards committee divided the Data Link Layer of the OSI model into the ""_____"" and ""_____"" sublayers","LLC Logical Link Control and MAC media Access Control",
106,"True or false: A router operates at the physical layer of the OSI model.","False",
107,"True or False: All device drivers are interchangeable provided you connect them to the network card correctly.","False",
108,"Network adapter card drivers reside in the ""________"" sublayer of the Data Link layer of the OSI model","MAC Media Access Control",
109,"A packet header contains these 4 parts","An alert signal, Source Address, Destination Address and Clock information for synchronization",
110,"A cyclical redundancy check (CRC) is usually contained in a packets ""_______""","Trailer",
111,"Packet Creation begins at the ""________"" layer of the OSI model","Application",
112,"""_________"" are the rules and procedures used for network communication","Protocols",
113,"When several protocols work together the form a protocol ""_____""","Stack",
114,"Protocols that support multipath LAN to LAN communication are ""_____"" protocols.","Routable",
115,"The ""_______"" order determines the order in which the operating system runs a protocol.","Binding",
116,"Name at least 3 application protocols","APPC,FTAM,X.400,X.500,SMTP,FTP,SNMP,TELNET,Microsoft SMB, AppleTalk & Apple Share, DAP",
117,"Name the 3 IEEE protocols at the Physical Layer","802.3 (Ethernet), 802.4 (token Passing) and 802.5 (Token Ring)",
118,"What is the most popular internetworking protocol?","TCP/IP",
119,"The 2 most popular cable access methods are Token passing and ""_______""","CSMA/CD Carrier-Sense Multiple Access with Collision Detection",
120,"In ""______"" each computer signals its intent to transmit before it actually transmits data","CSMA/CA Carrier-Sense Multiple Access with Collision Avoidance",
121,"Access methods are used to avoid and prevent ""_____"" access to the cable","Simultaneous",
122,"In ""______, ______"" a special type of packet circulates around a cable from computer to computer, When any computer wants to send data across the network it must wait for a free packet or ""______""","Token Ring, Token",
123,"""_______"" is when two computers are trying to transmit at exactly the same time.","Contention",
124,"This type of access method is generally used by Ethernet to regulate network traffic on a main cable segment.","CSMA/CD",
125,"This topology conforms to the IEEE 802.3 specification, transmits at 10 Mbps at distances of up to 185 meters. It also uses BNC cabling components.","10Base2",
126,"A Thinnet network can combine as many as ""____"" cable segments","Five",
127,"It conforms to IEEE 802.3 specs and is called standard Ethernet","10Base5",
128,"""______"" provide communication between the computer and the main LAN cables and are located in the vampire taps attached to the cable","Transceivers",
129,"It is another name for Fast Ethernet","100BaseX",
130,"Developed by Hewlett-Packard it is voice grade technology transmitting at 100Mbps","100VG-AnyLAN or 100BaseVGor VG or AnyLAN",
131,"""_______"" uses 2-pairCategory 5 UTP or STP","100BaseTX",
132,"100BaseFX uses 2-strand ""_______,_______"" cable","Fiber, Optic",
133,"The terminator resistance for both 10base2 and 10base5 is ""______""","50 ohms",
134,"True or False: The terminator resistance on a 10baseT network should always equal 75 Ohms.","False, Terminators are not used in a 10baseT/Star bus topology",
135,"Token Ring specifications are defined by the IEEE ""______"" specifications","802.5",
136,"In a Token Ring Data Frame a ""_______"",""_______"" Indicates the start of the frame","Start delimiter",
137,"In a Token Ring Data Frame the ""_______"",""_______"" Indicates the frame priority and whether it is a token or a data frame.","Access control",
138,"In a Token Ring Data Frame the ""_______"",""_______"",""__________"" contains the CRC error-checking information","Frame Check Sequence",
139,"When a frame reaches it's destination it is copied into that computer's ""_______"",""_________""","receive buffer",
140,"Token passing is considered ""______________"" because it cannot force its way unto the network as it can in a CSMA/CD environment","Deterministic",
141,"Each MSAU-based network can support as many as ""____"" computers that use unshielded wire or up to ""_____"" computers that use shielded wire","72,260",
142,"MSAUS were designed to sense when a network adapter card fails and ""______"" from it. allowing the token to continue on.","Disconnect",
143,"According to IBM the maximum cabling distance from an MSAU to a computer or files server using Type 3 cable is ""_______""","150 Feet",
144,"Type ""_____"" is the cabling system used by most IBM Token Ring networks","3",
145,"Single LocalTalk networks can be joined together into one larger network through the use of ""______""","Zones",
146,"Which access method does LocalTalk use in a bus or tree topology","CSMA/CA",
147,"The maximum number of devices on a single LocalTalk network is ""_______""","32",
148,"Original ArcNet had a transmission speed of ""________""","2.5 Mbps",
149,"This is the successor to ArcNet and supports data transmission rates of 20 Mbps","ArcNet Plus",
150,"This technology actually predates the IEEE Project 802 standards but loosely maps to the 802.4 specifications","ArcNet",
151,"The standard ArcNet packet contains up to ""_____"" bytes of data","508",
152,"A true multitasking operating system can run as many tasks as there are ""________"" after that the computer must time slice","Processors",
153,"The process of forwarding client computer requests is done by a ""__________""","redirector",
154,"True or False: Redirector activity originates on the server when a client makes and interrupt request","False.",
155,"True or False: Redirectors can send requests to computers not peripherals. The client computer then subsequently issues a call to the intended peripheral","False",
156,"In a Microsoft NT Server network the first server installed in a domain is called a ""______"",""_____"",""______"" {PDC}","Primary Domain Controller",
157,"Name at least 2 Transport protocols","TCP, SPX, NWLink, NetBEUI or ATP",
158,"Name at least 2 network protocols","IP, IPX, NWLINK, NetBeui or DDP",
159,"A hard disk can be divided into areas called ""_____""","Partitions",
160,"True or False: All computers in the same domain share the same unique IP address.","False",
161,"A subnet mask is used to mask a portion of the IP address so that TCP/IP can distinguish the ""_______"" ID from the ""________"" ID","Network, Host",
162,"Microsoft Windows NT Server provides a service called the dynamic host configuration protocol (DHCP). it is used to dynamically assign ""_____"" addresses","TCP/IP",
163,"""______"" are a series of bound paths from the upper OSI layer network services and protocols to the lowest layer of network adapter card device drivers","Bindings",
164,"True or False: A good way to improve performance is to change the binding path order and put the faster protocol first in the binding list.","True",
165,"The ""_____"" is the memory buffer in the print server's RAM that holds the print job until the printer is ready","Spooler",
166,"True or False: In order for users to access a shared printer the printer must have a network identification.","True",
167,"True or False: Users can never delete a print job that is not theirs only a network administrator can do that.","False",
168,"True or False: An administrator can manage a printer from any network computer","True",
169,"The ""_____"" is used to construct text and graphics to create the page image","PDL",
170,"Although slower, ""_____"" is more powerful than optical character recognition (OCR)","ICR Intelligent character recognition",
171,"Most networks offer a way to gather many separate user accounts into one type of account called a ""_____""","Group",
172,"The ""_________"" group is generally responsible for overall network operations such as deleting and creating user account, installing applications etc.","Administrators",
173,"A device that is causing a problem on a network, generally using more CPU time then others is referred to as a ""_____""","Bottleneck","Most network operating systems contain performance monitoring to pin point bottlenecks and problems areas"
174,"On Windows NT Server ""_____"",""_____"" can be used to look at recorded and real time operations on a variety of devices including Processors, Hard disks and memory","Performance Monitor","Performance Monitors is a great way to record performance data, send an alert to the systems administrator or to start 3rd party programs to correct system errors"
175,"In an SNMP environment, programs called ""_____"" are loaded onto each managed device","Agents","Agents monitor network traffic and behavior. They store data in the MIB management information database"
176,"Microsoft uses ""_____"" to manage and administer system wide applications","SMS Systems Management Server","SMS can be used to collects hardware and software inventory information and distributes and install software"
177,"Two different security models have developed for keeping data and hardware safe they are generally referred to as ""_____-_____"", ""_______"" and ""_______"",""________""","Password-Protected Shares and Access Permissions","Security policies and procedures are often the hard and soul of a successful network"
178,"Under password-protected shares, each ""______"" ""______"" is assigned a password","shared resource","Often shared resources can be granted different types of permissions such as read only or full"
179,"True or False: The password-protected share system allows anyone with the correct password access to that particular resource","True","For this reason password-protect is considered the less secure and simpler security model."
180,"The process of tracking activity trails for functions is often referred to as ""_____""","Auditing","Lots of activities can be tracked such as log on/off attempt, opening and closing files etc."
181,"True or False: Diskless Computers have no floppy or hard drives","True","Diskless Computers need a special ROM boot chip"
182,"Scrambling data to make it unreading is called ""_____""","Encryption","The base encryption systems are often hardware based and expensive"
183,"True or False: Preventing unauthorized access is the only way to protect against viruses","False","Installing a good virus protection program is also recommended"
184,"The simpliest and least expensive way to avoid data loss is to schedule periodic ""_____""","Backups","It's always a good Idea to keep a duplicate backup off site at a remote location"
185,"True or False: Backing up files only if they have changed since the last time they were backed up is called an differential Backup","False","It is called an incremental backup"
186,"True or False: During a differential backup all files are marked as having been backed up.","False","It is actually the oposite. Files are left unmarked"
187,"True or False: Placing a backup on an isolated ""_____"" can help relieve network traffic","True","None"
188,"True or False: The primary purpose of a UPS is to rebuild a harddrive partition in case of hard drive failure","False","A UPS is a power souce / Battery and allows safe shutdown of a workstation / Server"
189,"True or False: Standby UPS systems are more reliable then online UPS's","False","None"
190,"""_____"",""_____"" refers to protecting data by duplicating data and placing it on different partitions or physical hard drives","Fault Tolerant","Fault tolerant systems generally use Disk Stiping, Disk mirroring or Sector sparing for data redundancy"
191,"Disk Striping uses ""_____"" Blocks of data and spreads them equally amony all disks in an array","64K","There is fault tolerance so any partition set fails and all data is lost"
192,"Duplicating a partition and moving it to a different physical drive is called ""_____"",""_____""","Disk Mirroring","Disk mirroring is like having continuous backup"
193,"What does RAID stand for?","Redundant Arrays of Inexpensive Disks","There are basically 5 standard levels of RAID"
194,"When an operating system trys to remap bad sectors to good ones it's called ""____"",""_____""","Sector Sparing","Only SCSI devices can use sector sparing. ESDI or IDE devices can not."
195,"Which utility is used in the Windows NT Server operating system to impliment Fault Tolerance","Disk Administrator","Disk Administrator is used for a varity of disk operations"
196,"A modem modulates digital signals into analog and ""____"" analog signals back into digital signals","Demodulates","Quit using modems. I have a router and love it :0)"
197,"A modem's speed is measured in ""_____"" or baud rate","Bps ""Bits per second""","The newer modems are capable of 56K although that is under lab perfect conditions."
198,"""_____"" communication is not synchronized and uses a start and stop bit to seperate character strings","Asynchronous","About a fourth of the data in Async communication is traffic control and coordination"
199,"""_____"" communication relies on a timing system between two devices","Synchronous","Synchronous communication is much more reliable then Async"
200,"Windows NT offers remote access capablity as a service and it's called.","Remote Access Service RAS","None"
201,"A phone line which is in constant use is often referred to as a ""_____"" or dedicated line","Leased","None"
202,"Repeaters work at the ""_____"" layer of the OSI model","Physical","a repeater regenerates a weak network signal and passes it on"
203,"True or False: Repeaters are a good way to control broadcast storms because they don't regenerate random noise","False","Repeater don't filter or translate anything. They merely regenerate signals"
204,"True or False: Repeaters connect two segment of similar or dissimilar media","True","Repeater pass all network signals in both directions"
205,"This device works at the Data Link layer of the OSI model.","Bridges","Bridges work with all protocols"
206,"True or False: Bridges build their routing tables based on the address of computer that have transmitted data on the network","True","If a bridge doesn't know the destination address it forwards the packet to all of it's ports."
207,"True or False: Because repeaters regenerate signals they are a great device to segment network traffic","False","Bridge are used to segment network traffic"
208,"Which device is considered more intelligent because it works at a higher level of the OSI model Bridges or Repeaters?","Bridges","Bridge are less expensive then routers and should be considered before a router."
209,"Bridges work at the Data Link Layer of the OSI model or more specifically the ""_____"",""____"",""____"" layer","Media Access Control","None"
210,"True or False: A router will select the best route for the data based on cost and available paths","True","The router table is used to determine the path"
211,"True or False: Routers will route all protocols that is what makes them Ideal for segmenting network traffic","False","There are several protocols that routers can't route"
212,"""_____"",""_____"" are two protocols that routers can't route","LAT and NetBeui","DECnet, IP,IPX, OSI, XNS and DDP are several of the protocols that routers can work with"
213,"True or False: Routers can never accommodate multiple protocols such as IPX and XNS on the same network","False","Several types of routers can support mulitble protocols are are designed to do so."
214,"There are 2 major types of routers they are ""_____"",""_____""","Static and Dynamic","Dynamic routers are the more sophisticated of the two"
215,"True or False: All routers look at a packets media access control sublayer address and forwards the packet if it recognizes it.","False","None"
216,"True or False Routers work at the Network layer of the OSI model","True","None"
217,"This device combines a router and bridge and combines the best qualities of each","Brouter","Brouters can route the protocols that routers can't because it also act as a bridge."
218,"This strips off one protocol stack and repackages it in the stack from the destination network","Gateways","Gateways are task specific and generally do only one type of transfer"
219,"The most common use for a gateway is to connect a personal computer with a ""_____""","mainframe","None"
220,"The most common types of transmission technologies used for WAN links are Analog, Digital and ""_____"",""_______""","Packet Switching","Analog is generally telephone lines, Digital are generally leased ISDN or T1"
221,"True or False: In packet switching, all packets are routed along the same paths to insure delievery?","False","The opposite is really true each packet may take different paths it is the computer at the recieveing end that reassembles the original message"
222,"A series of logical connections between two computers are called ""_____"",""_____"" in packet-switching networks","Virtual Circuits","Virtual circuits are considered temporary as long as the conversation is going or permanent as long as two computers are up, running and communicating with each other"
223,"Frame relay uses perminent virtual network to transmit ""_______"",""______"" frames at the Data Link Layer","Variable Length","Frame relay is an advanced technology that strippes away many of X.25's error checking. It works on a more secure and reliable fiber optic toplogy"
224,"""_____"",""______"",""_______"" is generally regarded as the fastest implimentation of the packet switching communication methods","Asynchronous Transfer Mode ""ATM""","Generally ATM can accommodate all forms of communication including imaging and CD-quality Audio"
225,"ISDN is a digital connection that supports ""_____"" B channels and ""_____"" D channel","""Two"" and ""One""","Get an ISDN connection to the web if you can. It's a lot nicer then crusing around at 33,6"
226,"""_____"",""_____"",""_____"",""_______"" is a dual ring high speed token passing topology operating at 100 Mbps","Fiber Distributed Data Interface ""FDDI""","FDDI provides some redunancy due to the fact that if one ring fails the other can take over."
227,"In a token passing network ""_____"" is when one computer detects a fault and starts sending a signal over the network.","Beaconing","Beaconing isolates serious failures in the ring and allows them to be located."
228,"When trouble shooting a network it is always good to have a ""_______"" of collected data and performance records.","Baseline","Various tools and network monitoring devices can be used to establish a baseline of normal network operating perameters."
229,"True or False: Digital Volt Meters (DMV) test media by sending sonar like pulses along it to determine where line breaks are.","False","That is done by Time-Domain Reflectometers (TDRS) a DMV checks the amount of voltage passing through a resistance."
230,"True or False: Most advanced cable testing devices work at the physical layer of the network were most of the problems occure.","False","Although they can return some line information. Advanced testers generally work by examining frame counts, excess collsions, congestion and beaconing problems"
231,"""______"",""______"" are the tools most often used to to monitor and interact with a network","Protocol Analyzers","None needed, if your going to work extensively on networks and get serious about them in general you'll end up using or owning one."