Exam 8: Local Area Networks: Part II
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections79 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
Recently, business and home computer users have been victims of another type of intrusion from unscrupulous outsiders-spyware.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
In a(n) ____________________ operating system, multiple programs can be running at the same time.
Free
(Short Answer)
4.7/5
(31)
Correct Answer:
multitasking
The NetWare ____________________ in version 3 was a structure (similar to a database) that contains the usernames and passwords of network users and groups of users authorized to log in to that server.
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
bindery
NetWare ____ server gives any authorized client anywhere on the Internet the ability to print and use storage services.
(Multiple Choice)
4.9/5
(38)
____ software is the application or set of programs that stores Web pages and allows browsers from anywhere in the world to access those Web pages.
(Multiple Choice)
4.9/5
(40)
The primary goal of ____ software is to perform crash stalling, or to try to keep the operating system running long enough to perform a graceful exit.
(Multiple Choice)
4.8/5
(35)
The NT ____________________ was a container object that contained users, servers, printers, and other network resources.
(Short Answer)
4.9/5
(37)
On most network operating systems, the client workstation must be loaded with a substantial set of software. With ____, all a user needs on his or her client workstation is a Web browser.
(Multiple Choice)
4.9/5
(36)
A ____ license allows a software package to be installed on any and all workstations and servers at a given site.
(Multiple Choice)
4.8/5
(36)
Linux software cannot support e-mail servers, Web servers, FTP servers, file/print servers, firewalls, proxy servers, and Domain Name System (DNS) servers.
(True/False)
4.9/5
(30)
NetWare ____________________ (NDS) is a database that maintains information on and access to every resource on the network, including users, groups of users, printers, data sets, and servers.
(Short Answer)
4.7/5
(33)
____________________ can "listen" to traffic on a network and determine if invalid messages are being transmitted, report network problems such as malfunctioning NICs, and detect traffic congestion problems.
(Short Answer)
4.8/5
(49)
The wireless LAN standards call a single-cell wireless LAN a(n) _________________________.
(Essay)
4.8/5
(37)
____________________ software is designed to scan an IP address or range of IP addresses for any type of security weakness.
(Short Answer)
4.7/5
(38)
The ____ is essentially the interface device between the wireless user device and the wired local area network.
(Multiple Choice)
4.9/5
(36)
A(n) ______________________________ is a large, complex program that can manage the common resources on most local area networks.
(Essay)
4.8/5
(35)
Network operating systems are essential if the network is going to allow multiple users to share resources.
(True/False)
4.9/5
(42)
An interesting feature shared by all versions of NetWare is that the ____ is virtually invisible to the user.
(Multiple Choice)
4.7/5
(34)
Showing 1 - 20 of 113
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)