Exam 9: Network Organization Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Round robin is an inefficient technique when there are many nodes transmitting over long periods of time.

(True/False)
5.0/5
(35)

Typically, a host at one site, called the client, has resources that a host at another site, called the server, wants to use.

(True/False)
4.9/5
(43)

The maximum circumference for a MAN is ____.

(Multiple Choice)
4.9/5
(46)

A WLAN typically poses security vulnerabilities because of its open architecture and the inherent difficulty of keeping out unauthorized intruders.

(True/False)
4.9/5
(43)

In the address someone@icarus.lis.pitt.edu, the host name in this address is ____.

(Multiple Choice)
4.9/5
(32)

When using RIP, the path ____ is chosen.

(Multiple Choice)
4.8/5
(41)

When using a ring topology, a ____ can be used to connect to another network.

(Multiple Choice)
4.9/5
(39)

In the OSI model, Layer ____ provides the interface to users and is responsible for formatting user data before passing it to the lower layers for transmission to a remote host.

(Multiple Choice)
4.8/5
(41)

The ____ is the most vulnerable to security breaches.

(Multiple Choice)
4.9/5
(39)

Star topology permits easy routing.

(True/False)
4.8/5
(33)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)