Final Review - Final Review Multiple Choice Identify the...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Final Review Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. In early networks based on ____, computers sent data whenever they had data to send. a. polling c. demand priority b. switching d. contention ____ 2. When using the ____ channel access method, all computers have equal access to the media. a. CSMA/CA c. token passing b. CSMA/CD d. demand priority ____ 3. ____ is a channel access method used solely by the 100VG-AnyLAN 100 Mbps Ethernet standard (IEEE 802.12). a. Demand priority c. CSMA/CA b. Polling d. Switching ____ 4. The most widely accepted Ethernet standard today is 100BaseT, which is also called ____. a. raw Ethernet c. fast Ethernet b. legacy Ethernet d. EtherTalk ____ 5. ____ is the standard that’s usually in mind when discussing 100 Mbps Ethernet. a. 100BaseT c. 100BaseT4 b. 100BaseTX d. 100BaseFX ____ 6. The ____ frame type is sometimes called Ethernet raw. a. Ethernet 802.2 c. Ethernet SNAP b. Ethernet 802.3 d. Ethernet II ____ 7. One unique aspect of the token ring network architecture is its capability to isolate faults automatically by using a process called ____. a. beaconing c. switching b. polling d. contention ____ 8. In FDDI, devices called ____ can serve as a central connection point for buildings or sites in a campus setting. a. MSAUs c. intelligent hubs b. APs d. concentrators ____ 9. NetBIOS names can be no longer than ____ characters. a. 8 c. 15 b. 11 d. 256 ____ 10. Ending a NetBIOS name with a(n) ____ prevents that name from appearing in the NetBIOS browse list. a. $ c. * b. d. _ ____ 11. Most Linux versions include a directory service of sorts called ____. a. X.500 c. NIS
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
b. Active Directory d. eDirectory ____ 12. ____ is strictly a server NOS. a. Windows c. Linux b. BSD d. Novell NetWare ____ 13. A ____ simply hosts a service or resource and doesn’t participate in maintaining the directory and security database. a. member server c. DHCP server b. domain controller d. DNS server ____ 14. ____ systems are good for testing and learning purposes, but they can compromise security in networks that are in actual business use. a. Multiple-boot c. Multiple-partition, single-NOS b. Single-partition, single-NOS d. Fault-tolerant storage ____ 15. ____ systems are useful for separating data from OS files on large drives but increases the level of drive activity and can degrade the life of the drive more quickly. a. Multiple-boot c. Multiple-partition, single-NOS b. Single-partition, single-NOS d. Fault-tolerant storage ____ 16. ____ systems have the most secure NOS host drive configuration. a. Multiple-boot c. Multiple-partition, single-NOS b. Single-partition, single-NOS d. Fault-tolerant storage ____ 17. Some fault-tolerant features of a file system include backup copies of the file allocation table (FAT) and ____, in which file transactions are kept in a log so that incomplete or corrupt transactions can be undone if needed. a.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/08/2011 for the course COMPUTER CGS2100 taught by Professor Sanders during the Spring '09 term at Florida State College.

Page1 / 10

Final Review - Final Review Multiple Choice Identify the...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online