Click on the single correct answer

1. Assume that a user must provide a user name and password to gain access to a network resource. Different levels of access privileges are assigned, depending on the user. Which kind of network security is this an example of?
Share-level security
Partial-access security
User-level security
Password security

2. Why does a high number of broadcast messages adversely affect overall network performance?
Each broadcast message rewuires an acknowledgement packet from every computer on the network
No computer on the network can transmit data until each broadcast message has been acknowledged by every computer on the network
Broadcast messages are automatically routed to every segment of a LAN
Every computer on the network must process each broadcast message

3. Which layers of the OSI model are managed by a network protocol such as Microsoft NetBEUI?
Network and transport
Physical and data link
Transport and session
Media access control and logical link control

4. Your company uses both Ethernet and token-ring LAN in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LAN's hat use different protocols?
Bridge
Router
Gateway
Repeater

5. What is the purpose of the token in a network that employs a media access control method on the IEEE 802.5 specification?
Token passing provides higher thoughput than CSMA/CD when using twisted-pai wiring.
The station that holds the token is allowed to transmit a message on the network
The station that holds the token has the highest priority on the network
A token contains information that is used to route messages between rings

6. Which limitation are NDIS and Novell ODI designed to overcome?
The need to dynamically bind a single protocol to multiple MAC drivers in order to support more than one network operating system
The need for proprietary network interface drivers for each network operating system and protocol
Monolithic protocols do not conform to the OSI model
Monolithic protocols cannot be loaded into the upper memory area

7. What does the MAC driver do?
It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes data to the application through the session layer interface.
It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions
It supports communication between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services
It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session

8. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and you have limited workspace. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?
Fiber-optic
Category 1 UTP
Category 3 UTP
Thicknet coaxial

9. What is the minimum category of UTP cable required to meet Ethernet 10BaseT standard?
Category 1
Category 2
Category 3
Category 5

10. What does the transport protocol do?
It defines how data should be presented to the next receiving layer, packages the data accordingly, ad then passes data to the application though the session layer interface.
It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions
It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services
It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session