1) What is the name of an cable that contains two electrical conductors ? A 2) What are the names of the two common conditions that degrade the signals on c opper-based cables? Crosstal and attenuation 3) Which topology requires the use of terminators? 4) Which of the following topologies is implemented only logically, not physical ly? Ring 5) How many wire pairs are actually used on a typical UTP Ethernet network? Two 6) What is the name of the process of building a frame around network layer info rmation? Data encapsulation 7) Which of the connectors on a network interface adapter transmits data in para llel? The System bus connector 8) Which two of the following hardware resources do network interface adapters a lways require? I/O port address and IRQ 9) What is the name of the process by which a network interface adapter determin es when it should transmit its data over the network? Media Access Control 10) Which bus type is preferred for a NIC that will be connected to a Fast Ether net network? PCI 11) A passive hub does not do which of the following? Transmit management information using SNMP 12) To connect two Ethernet hubs together, you must do which of the following? Connect the uplink port in one hub to a standard port on the other 13) Which term describes a port in a MAU that is not part of the ring ? Intelligent 14) A hub that functions as a repeater inhibits the effect of______? Attenuation 15) You can use which of the following to connect two Ethernet computers togethe r using UTP cable? All of the above 1) What is the name of the protocol that systems use to negotiate options during the PPP connection establishment procedure? LCP 2) What does an Ethernet system generate when it detects a collision? A jam signal 3) Which of the following is not a required component of a 10BaseT Ethernet netw ork? A hub 4) To achieve 100 Mbps speed over , 100BaseT4 Ethernet uses whic h of the following? All four wire pairs 5) In which of the following standards is defined? IEEE 802.3z 6) The Frame Check Sequence field in a data-link layer protocol header is used f or ______? Error Correction 7) List the hardware components that you have to replace when upgrading a ten-ye ar-old 10BaseT network to 100BaseTX? The components are NICs, hubs and cable (because a 10 year old network is most l ikely using Category 3 cable, and Category 5 is required for 100Base TX.) 8) How could you upgrade a ten-year-old 10BaseT network to without replacing the cables? Use 100Base T4 and hubs. 9) Which data-link layer protocol is preferred on a network with high levels of traffic, Ethernet or Token Ring? Why? Token Ring is preferable, because it can handle high traffic levels without dimi nished performance. Ethernet experiences more collisions as traffic increase, causing performance to degrade. 10) Which Fast Ethernet option is best suited for a connection be tween two campus buildings 200 meters apart? Why? 100BaseFX, because fiber optic cable is better suited to outdoor installations a nd because the Fast Ethernet UTP cable options are all restricted to cable segments no longer than 100 meters. 1) Which of the following ITU standards is the basis for NDS and Active Director y? X.500 2) Which types of network clients are included in Windows 2000 Professional? Client Service for NetWare (STP) cable and Client for Microsoft Networks 3) What is the Windows NT and Windows 2000 file system called that enables admin istrators to assign permissions to individual files? NTFS 4) Which of the following services on a Windows NT or Windows 2000 network is re sponsible for configuring TCP/IP clients? DHCP 5) Which of the following network operating systems is generally considered to b e the best application server platform? UNIX 6) What is a program called that runs in the background on a UNIX system? A daemon 7) Which of the following directory services uses multiword names for its domain s? Active Directory 8) What is splitting an NDS tree into pieces and storing those pieces on differe nt servers called? Partitioning 9) What is the Windows NT and Windows 2000 service that maintains a list of shar ed resources on the network called? Computer Browser 10) Which of the following is not a true statement? Containers are composed of objects. 1) Which layer of the OSI reference model is responsible for controlling access to the network medium? The data-link layer 2) On which type of network does each computer maintain its own permissions and security settings? A peer to peer network 3) A language that two computers "speak" while communicatin over a network is ca lled ______. A protocol 4) A series of LANs connected together by any means is called ______. An internetwork 5)What kind of network is often used to connect horizontal segments on a large e nterprise internetwork? A backbone 6) Which layer of the OSI model is responsible for translating different syntaxe s?The presentation layer 7) A network in which the medium carries only one signal is called ______.

Baseband 8) An example of full-duplex communications is ______. A telephone call 9) The address of a packet's final destination is specified in the ______layer. Network 10) TCP is an example of a ______layer protocol. Transport 11) Electrical voltages, light pulses, and infrared waves are all examples of ty pes of ______. Signals 12) A technology used to connect LANs at distant locations is called ______. A wide area network 13) The type of network in which data is split into discrete units that are tran smitted over the network individually is callled ______. A network 14) The process by which a receiving system sends messages instructing a sending system to slow down its transmission rate is called ______. Flow control 15) A protocol that uses a handshake to establish a connection before sending da ta is called ______. Connection oriented 1) Which of the following devices are you most likely to use to connect a LAN to the Internet? A router 2) Which of the following devices does not read the data-link layer protocol hea der in incoming packets? A hub (STP) cable 3) Suppose that you have a 10 MBPS Ethernet LAN that consists of 45 computers co nnected to three standard repeating hubs. Traffic levels are getting too high, causing excessive collisions and reduced performance. Which of the following cou rses of action is the most inexpensive way to reduce the overall traffic level o n the network? Install a transparent bridge between two of the hubs. 4) Using the same scenario as in question 3, which of the following courses of a ction would not increase the bandwidth available to each ? Split the network into three LANs and connect them using dedicated hardware rout ers. 5) The spanning tree algorithm is used to prevent which of the following network ing problems? Bridge loops 6) Source route bridging is associated with which of the following protocols? Token Ring 7) On a switched network, virtual LANs are used to create multiples of what? Broadcast domains 8) ICS enables a computer running Windows to function as what? A router 9) Which of the following processes requires manual intervention from a network administrator? Static routing 10) Which of the following devices does not have buffers to store data during pr ocessing? All of the above 1) What does the IP header's protocol field identify? The transport layer protocol that generated the information in the Data field 2) Which of the following IP header elements is never modified during the IP fra gmentation process? The Identification field 3) What does an IP address identify? A computer 4) In the IP header, the IPX equivalent to the TTL field is called what? Transport Control 5) Which of the following statements about IPX is untrue? IPX uses a checksum to verify the proper transmission of data. 6) How many bytes long is the information that IPX uses to identify the datagram 's destination computer on a particular network? 10 7) Specify which network layer protocol you would use on each of the following n etworks, and explain why. 1) A private internetwork with mixed Windows and NetWare systems IPX, because Ne tWare requires it 2)A two-node home Windows-based network with individual dial-up Internet connect ions NETBeui because it is easy to install and configure 3)A ten-node Windows-based network with a router connecting it to the Internet TCP/IP because it needs to connect to internet 8) Which IP header field makes the Traceroute utility possible? Time To Live 9) Which two protocols carried within IP datagrams operate at the transport laye r of the OSI model? TCP and UDP 10) Give two reasons why NetBEUI is not suitable for use on a large internetwork . It is not suitable because it lacks then network indentifiers needed to route pa ckets between networks and because it generates a large amount of broadcast traffic. 11) 12.Place the following phases of a NetBEUI Frame session in the proper order . dcbfae Name resolution LLC session establishment Session Initialize Session Confirm Session End 12) What is the maximum number of routers that an IPX datagram can pass through on the way to its destination? 16 13) Which of the following protocols is capable of providing connection-oriented service? NetBEUI What are the two basic network configurations? The two basic network configurations are peer-to-peer and server-based. A primary reason for implementing a network is to ______resources. share Name three key resources often shared on a network. There are many resources to be shared on a network; among them are printers, sca nners, applications, files, and network access to the World Wide Web. In a peer-to-peer network, each computer can act as a ______and a ______. server, client What is the function of a server in a server-based network? A server provides services and resources to the network. A peer-to-peer network is adequate if ______is not an issue. security Network professionals use the term ______to refer to the network's physical layout. topology The four basic topologies are the ______, ______, ______, and ______top ologies. bus, star, ring, and mesh In a bus topology, all the computers are connected in a series. To stop the sign als from bouncing, it is important that a ______be connected to each end of the cable. terminator In a ______topology all segments are connected to a centralized component cal led a ______. star, hub In a ______topology, a break anywhere in the cable will cause the entire netw ork to go down. bus The most reliable as well as the most expensive topology to install is the ______topology. mesh A ring topology passes a ______from one segment to another. In order for a co mputer to place data on the network, the computer must be in possession of the ______. token, token ======Coaxial cable consists of a core made of solid or stranded ______. wire conductor If the coaxial conducting core and wire mesh touch, the cable will experience a ______. short The core of coaxial cable is surrounded by an ______that sepa rates it from the wire mesh. insulating layer Thicknet cable is sometimes used as a ______to connect thinnet segments . BackboneThinnet cable can carry a signal for a distance of about 185 meters (607 feet) before the signal starts to suffer from ______. attenuation The electronic signals that make up the data are actually carried by the ______in a coaxial cable. core A flexible coaxial cable that is easily routed but that should not go into crawl spaces is ______. PVC Coaxial cable that contains special materials in its insulation and cable jacket is called ______cabling. plenum The most popular type of twisted-pair cable is ______(10BaseT). UTP UTP cable for data transmissions up to 10 Mbps is category ______. 3 UTP cable for data transmissions up to 100 Mbps is category _____. 5 STP uses a foil wrap for ______. shielding STP is less susceptible to electrical ______and supports highe r transmission rates over longer distances than does UTP. interference Twisted-pair cabling uses ______telephone connectors to connect to a compute r. RJ-45 The RJ-45 connection houses _____ cable connections, whereas the RJ-11 houses on ly ____. 8, 4 Optical fibers carry ______data signals in the form of light pulses. digital Fiber-optic cable cannot be ______, and the data cannot be stolen. tapped Fiber-optic cable is better for very high-speed, high-capacity data transmission than ______cable because of the former's lack of attenuation and the purity of the signal it carries. copper Fiber-optic cable transmissions are not subject to electrical ______. interference systems use ______signaling over a single frequency. digital Each device on a ______network can transmit and receive at the s ame time.baseband systems use ______signaling and a range of frequencies. analog With ______transmission, the signal flow is unidirectional. broadband Wall-mounted ______connected to the wired LAN maintain and manage ra dio contact between portable devices and the cabled LAN. Broadband optical telepoint transmission is a type of ______network capa ble of handling high-quality multimedia requirements. infrared A component called a wireless ______offers an easy way to link buildin gs without using cable. bridge Spread-spectrum radio broadcasts signals over a range of ______. frequencies Point-to-point transmission involves wireless ______data transfer. serial In LANs, a sometimes called an ______broadcasts and receives signals to and from the surrounding computers. access point Wireless ______LANs use telephone carriers and public services to transmit and receive signals. mobile CDPD uses the same technology and some of the same systems as ______teleph ones. cellular Currently, the most widely used long-distance transmission method in the United States is ______. microwave The network interface card converts serial data from the computer into parallel data for transmission over the network cable. True False False. The reverse is true. The card converts parallel data to serial data. The 16-bit and 32-bit widths are currently the two most popular bus widths. True False True To help move data onto the network cable, the computer assigns all of its memory to the NIC. True False False. The computer can assign some of its memory to the card, but not all of it . Data is temporarily held in the NIC's transceiver, which acts as a buffer. True False False. Only RAM acts as a buffer. The transceiver transmits and receives data. Both sending and receiving NICs must agree on transmission speeds. True False TrueIn an 80386 computer, COM1 typically uses IRQ ____ and LPT1 typically uses I RQ _____. 4,7 IRQ lines are assigned different levels of ______so that the CPU can det ermine how important the request is. priority The recommended setting for a NIC is IRQ _____. 5 Every device on the computer must use a ______IRQ line. different or separate Each hardware device needs a default ______/______number. base I/O port Choosing the appropriate transceiver on a NIC that can use either an external or an on-board transceiver is usually done with ______. jumpers ISA was the standard bus until Compaq and other manufacturers developed the ______bus. EISA The ______bus functions as either a 16-bit or a 32-bit bus a nd can be driven independently by multiple bus master processors. Micro Channel Telephone wire uses an ______connector. RJ 11 Plug and Play refers to both a design philosophy and a set of personal-computer ______specifications. architecture ======Access methods prevent ______access to the cable. simultaneous With CSMA/CD, if there is data on the cable, no other computer may ______until the data has reached its destination and the cable is clear again. transmit CSMA/CD is known as a ______access method because computers on t he network compete for an opportunity to send data. contention With more traffic on a CSMA/CD network, ______tend to increase, slowin g the network down. collisions With the token-passing access method, only one computer at a time can use the to ken; therefore, there are no ______or ______.collisions, contention With the demand-priority access method, the ______manage network ac cess by doing round-robin searches for requests to send from all nodes. repeaters In the demand-priority access method, transmissions are not ______t o all other computers on the network. broadcast A token is a special type of ______that circulates around a cable r ing. packet With data masses divided into ______, individual transmissions occur mor e frequently so that every computer on the network has more opportunities to transmit and receive data. packets Packets may contain session-control codes, such as error correction, that indica te the need for a ______. retransmission A packet's components are grouped into three sections: ______, data, and trailer. header In a packet, the header usually contains an error-checking component called a CR C. True False False. The trailer contains this component. The structure of the packets is defined by the communication method, known as a protocol, used by the two computers. True False True Every network interface card sees all packets sent on its segment, but it interr upts the computer only if the packet's address matches its individual address. True False True The trailer of a packet contains the destination address. True False False. The header contains the destination address. Typically, Ethernet is a baseband architecture that uses a ______topology. bus Ethernet relies on the ______access method to regulate traffic on t he main cable segment. CSMA/CD The maximum length of a 10BaseT segment is ______meters. 100 The 10BaseT topology is an Ethernet network that uses ______cable to connect stations. unshielded twisted-pair (UTP) Typically, the hub of a 10BaseT network serves as a ______. multiport repeaterA thinnet network can combine as many as ______cable segm ents connected by four repeaters, but only three segments can have stations attached. five Because single-segment 10Base2 Ethernet limits would be too confining for a larg e business, ______can be used to join Ethernet segments and extend the network to a total length o f 925 meters (about 3035 feet). repeaters A 10Base5 topology is also referred to as ______. thicknet (or standard Ethernet) Fast Ethernet is another name for the ______topology. 100BaseX Ethernet can use several communication ______including TCP/IP. protocols The 100BaseTX topology runs on UTP Category _____ data-grade cable. 5 A 100BaseVG network is built on a ______topology with all computers attache d to a hub. star A Token is an implementation of IEEE standard ______. 802.5 In the IBM implementation of Token Ring, a star-wired ring, the actual physical ring of cable is in the ______. hub In a Token Ring frame the Access Control field indicates whether the frame is a ______frame or a ______frame. token, data When a frame reaches the destination computer, that computer copies the frame in to its ______. receive buffer is ______, meaning that a computer cannot force its way onto the network as it can in a CSMA/CD environment. deterministic When a frame returns to its sending computer, that computer ______the fra me and puts a new token back on the ring. removes Cables attach the individual clients and servers to the MSAU that works like oth er ______hubs. passive When an IBM Token Ring network is full, adding another ______can enlarge th e network. MSAUMSAUs were designed to sense when a ______fails and to disconnect from it. network interface card Each single Token Ring can accommodate ______computers using STP cable. 260 Most Token Ring networks use IBM Cabling System Type ____ UTP cabling. 3 LocalTalk uses ______as an access method in a bus or tree topology. CSMA/CA When a device attached to an AppleTalk network comes online, the device broadcas ts an ______to determine if any other device is using it. address A single LocalTalk network supports a maximum of ______devices. 32 Single LocalTalk networks can be joined together into one larger network through the use of ______. zones ArcNet uses a token-passing access method in a ______-______topology. star-bus An ArcNet token moves from one computer to the next according to the order in wh ich it is connected to the ______, regardless of how they are placed on the network environment . hub Each computer in an ArcNet network is connected by cable to a ______. hub ======A multitasking operating system can run as many tasks simultaneously as there ar e ______. processors The network operating system can take control of the processor without the task' s cooperation in a multitasking operating system that uses ______multitasking. preemptive The process of forwarding requests is carried out by a ______, which is also commonly referred to as a "shell" or a "requester." redirector Redirector activity originates in the ______computer when the user issue s a request for a network resource or service. client Redirectors can send requests to either computers or ______. peripheralsIn the past, network operating systems were ______that were loaded on top of a stand-alone operating system. applications 's NetWare operating system is a ______-based network. server An advantage of using NetWare is that it works well in a ______enviro nment. multivendor A Windows NT computer will not communicate with a NetWare network. True False False Banyan Vines is an NOS that runs on top of another operating system. True False True Your client is a small business, planning to install a small network for the off ice, which includes five computers, running Windows 95, and two printers. Security is not an issue because all emplo yees work on the same projects. Would you recommend upgrading to Windows NT? No Will a Windows 95 or 98 workstation always work on a NetWare network? No ======The OSI reference model divides network activity into ______layers. seven The purpose of each layer is to provide services to the next ______layer and shield the upper layer from the details of how the services are actually implemented. higher At each layer, the software adds some additional formatting or ______to the packet. addressing Each layer on one computer appears to communicate directly with the ______layer on another computer. same The top, or ______, layer handles general network access, flow cont rol, and error recovery. application At the sending computer, the ______layer translates data from a format sent down from the application layer. presentation The ______layer determines the route from the source to the destinati on computer. network The data-link layer is responsible for sending ______from the n etwork layer to the physical layer. data framesThe ______information in a data frame is used for frame ty pe, routing, and segmentation information. control The ______layer defines how the cable is attached to the NIC. physical Windows NT groups the seven OSI layers into three. The three NT layers are ______, ______, and ______. file system drivers, transport protocols, and NIC drivers. An ______provides the interface between the Windows NT applications and file system drivers layer. API A ______provides the interface between the Windows NT file system drivers la yer and the transport protocols. TDI An ______provides the interface between the Windows NT, the transport protoc ols layer, and the NIC drivers. NDIS The Project 802 specifications define the way ______access and transfer dat a over physical media. NICs The 802 project divided the ______- ______layer of the OSI reference m odel into two sublayers, the (LLC) layer and the Media Access Control (MAC) layer. data-link The ______sublayer communicates directly with the NIC and is responsible for delivering error-free data between two computers on the network. MAC The IEEE category ______covers LAN standards for Ethernet. 802.3 The IEEE category ______covers LAN standards for Token Ring. 802.5 A driver is ______that enables a computer to work with a device. software NICs work in the ______sublayer of the ______-______layer of the OS I model. MAC, data-link NDIS defines an interface for communication between the ______sublayer and the protocol drivers. MAC NDIS was jointly developed by ______and ______. Microsoft, 3Com ODI works just like NDIS but was developed by ______and ______for interfacing hardware to their protocols. Apple, Novell======A sending computer breaks the data into smaller sections, called ______, that the protocol can handle. packets Several protocols can work together in what is known as a protocol ______. stack A receiving computer copies the data from the packets to a ______for re assembly. buffer Protocols that support multipath LAN-to-LAN communications are known as ______protocols. routable The receiving computer passes the reassembled data to the ______i n a usable form. application To avoid conflicts or incomplete operations, protocols are ______in an orderly manner. layered The ______order indicates where the protocol sits in the protocol stac k. binding Three protocol types that map roughly to the OSI reference model are application , ______, and network. transport Application protocols work at the upper layer of the OSI reference model and pro vide ______between applications. data exchange A NIC-driver protocol resides in the ______( ______) sublayer of the OSI reference model. Media Access Control (MAC) Rules for communicating in a particular LAN environment such as Ethernet or Toke n Ring are called ______protocols. network To help the network administrator install a protocol after the initial system in stallation, a ______is included with the operating system. utility TCP/IP supports routing and is commonly used as an ______pr otocol. internetworking NetBIOS is an IBM session-layer LAN interface that acts as an ______interface to the network. application APPC (advanced program-to-program communication) is IBM's ______pr otocol. transport NetBEUI is not a good choice for large networks because it is not ______. routableX.25 is a protocol used for a ______- ______network. packet switching X.25 works in the ______, ______- ______, and ______layers of the OSI reference model. physical, data-link, and network AppleTalk is a proprietary designed for ______compute rs. Macintosh EtherTalk allows a Macintosh computer to communicate on an ______n etwork. Ethernet ======An external modem is a small box that is connected to the computer by a ______cable running from the computer's port to the modem's computer-cable connection. serial The modem at the ______end converts digital signals into analog signal s. sending Baud rate refers to the speed of oscillation of the ______on which a bit of data is carried. sound wave The bps can be greater than the ______rate. baud Asynchronous transmission occurs over ______. telephone lines The Microcom Network Protocol (MNP) is a standard for asynchronous ______- ______control. data-error In asynchronous communication, it is possible to double throughput by using ______without having to pay for a faster channel speed. compression Synchronous communication relies on a ______scheme coordinated between t wo devices. timing More advanced, complex repeaters can act as multiport ______to connect diffe rent types of media. hubs Repeaters do not have a ______function and so will pass along all d ata from one segment to the next. filtering A repeater takes a weak signal and ______it. regenerates A repeater functions at the ______layer of the OSI reference model. physicalIf the volume of traffic from one or two computers or a single departmen t is flooding the network with data and slowing down the entire operation, a ______could isolate those comput ers or that department. bridge The bridge builds a routing table based on the ______addresses of com puters that have sent traffic through the bridge. source Bridges work at the OSI ______- ______layer and, specifically, the ______sublayer. data-link, Media Access Control Bridges are often used in large networks that have widely dispersed segments joi ned by ______. telephone lines Under spanning tree algorithm (STA), software can sense the existence of more th an one ______, determine which would be the most efficient, and then configure the bridge to use that one . route Bridges connect two segments and regenerate the signal at the ______lev el. packet Routers work at the ______layer of the OSI reference model. network Because they must perform complex functions on each packet, routers are ______than most bridges. slower Routers do not look at the destination node address; they look only at the ______address. network Unlike bridges, routers can accommodate multiple active ______between LAN segments and choose among them. paths The two major types of routers are ______and ______. static, dynamic A brouter will ______nonroutable protocols. bridge Most often, gateways are dedicated ______on a network. servers The gateway takes the data from one environment, strips it, and repackages it in the ______from the destination system. protocol stack Gateways are ______specific, which means that they are dedicated to a part icular type of transfer. taskWith the exception of ADSL, public telephone lines require users to ______make a connection for each communication session. manually The three factors an administrator must take into account when considering how b est to implement communication between two modems are ______, ______, and ______. throughput, distance, cost Leased lines provide ______connections that do not use a series of switches to complete the connection. dedicated A good remote-access option that offers stable lines for companies that are cons tantly communicating between networks is to use ______lines. leased (dedicated) The ______- _____ - ______allows a remote client to establish a secure connection to the corporate LAN over the Internet a nd RAS. Point-to-Point Tunneling Protocol Because the PSTN was designed primarily for voice, ______- _____ lines do no t have the consistent quality required for secure data communications. dial-up A dedicated line is ______and more ______than a dial-up conn ection. faster, reliable One advantage that dedicated lines offer over dial-up lines is that the service company implements ______to improve communication, thereby ensuring line quality. line conditioning Digital lines provide ______- ___ - ______synchronous communica tion. point-to-point Because DDS uses ______communication, it does not require modems. digital T1 uses a technology called ______in which several signals from d ifferent sources are collected into a component and fed into one cable for transmission. multiplexing T1 can accommodate 24 ______data transmissions over each two-wire pair. simultaneous Subscribers who do not need or cannot afford the bandwidth of an entire T1 line can subscribe to one or more T1 ______. channels With packet switching, the data is broken down into packets, and each packet is tagged with a ______and other information. destination address At the destination, the packets are ______into the original mess age.reassembled Two packets from the original data package can arrive out of sequence because th ey followed different ______to reach the same destination. paths Virtual circuits are composed of a series of ______connections betwee n the sending computer and the receiving computer. logical Because of its extensive ______, X.25 can appear to be slo w. error checking X.25 was originally developed for the ______environment. mainframe Frame-relay data travels from a network over a ______line to a data switch and into the frame-relay network. digital leased Frame-relay networks can also provide subscribers with ______as nee ded, which lets the customer make nearly any type of transmission. bandwidth Frame-relay networks are faster at performing basic ______- ______operations than are X.25 networks. packet-switching ATM is an advanced implementation of ______that provides high-speed data transmission rates. packet switching ATM transmits data in 53-byte ______rather than variable-length frames. cells ATM switches are multiport devices that can act as either ______to forwar d data from one computer to another within a network or ______to forward data at high speeds to remote networks. hubs, routers ATM uses switches as ______to permit several computers to put data on a network simultaneously. multiplexers ATM can be used with existing ______designed for other communications sy stems. media Basic Rate ISDN divides its available ______into three data channels. bandwidth FDDI is a specification that describes a high-speed (100 Mbps) token-ring LAN th at uses ______- ______media. fiber-opticFDDI can be used for ______networks to which other, low- capacity LANs can connect. backbone A computer on an FDDI network can transmit as many frames as it can produce with in a predetermined time before letting the ______go. token Traffic in an FDDI network consists of two similar streams flowing in opposite d irections around two counter-rotating ______. rings An advantage of the dual-ring topology is ______. redundancy To isolate serious failures in the ring, FDDI uses a system called ______in which a computer that detects a fault sends a signal onto the network. beaconing ======Using a peer-to-peer network implies that all computers on the network are ______. equal One drawback to using a peer-to-peer network is ______. limited performance On a server-based network, resources are ______. centralized Before beginning to design a new network, you must take an inventory to determin e what ______and ______you already have, as well as what you need to acquire. hardware, software Working with a drawing of the ______is the place to start when creatin g a map of the new network. facility Circle the letter of the best answer for each of the following sentences: A driver is: hardware. a peripheral device. a NIC. software. d. In the networking environment, a NIC driver is needed to: communicate with other NICs on a network. communicate between the NIC and the computer's operating system. communicate between the file server and the other computers on the network. communicate between different types of computers on a network. b. Select the correct statement about printer drivers. There is no universal printer driver that will ensure full functionality of all printers.Printers made by a specific printer manufacturer can always use the sam e printer driver and have full functionality. There is a specific printer driver designed for every model of printer that can ensure the full functionality of that model of printer on all operating systems. A laser-printer driver from one manufacturer will provide full functionality for all laser printers, regardless of the manufacturer. a. ======Two computers running the MS-DOS operating system can be connected and informati on can be shared. (Yes or No). Yes Connecting two computers with a communications cable is called ______- ______. Direct-cable connection Sharing on a peer-to-peer network takes place at the ______level. folder The first person to log on to a Windows NT network uses the ______account. administrator The user account contains information that defines a user to the network's ______system. security Most network account-management utilities offer an account ______feature with which an administrator can create a template user with certain characteristics and parameters that are common among multiple users. copying A Windows NT administrator can use a ______to configure and maintain a u ser's logon environment. profile Two key pieces of information that should be entered when creating a user accoun t are account name and ______. password The ______account is for people who do not have a valid user account but need temporary access to the network. Guest An administrator can create a ______account in order to simplify admini strative tasks when dealing with a large numbers of users. group A global group is used across an entire ______. domain Groups are used to give users ______to perform system tasks such as bac king up and restoring files. rights The network administrator assigns ______to groups to access resou rces, such as files, directories, and printers. permissionsAfter being deleted, a user can no longer use the network, because th e network ______database will contain record or description of the user. security ======The first consideration in keeping data safe is to ensure the security of the ne twork ______. hardware Another term for access permissions is ______- ______. user-level security Implementing password-protected shares involves assigning a password to each sha red ______. resource If a share is set up as ______- ______, users can look at the documen ts or copy them to their machines, but they cannot change the original documents. read-only Access permission security involves assigning certain ______on a user-b y-user basis. rights The most efficient way to assign permissions is through the use of ______. groups Through auditing, selected types of events are recorded in the ______of a server in order to track network activities by user accounts. security logs A data- ______utility scrambles data before it goes out onto the ne twork. encryption The Commercial COMSEC Endorsement Program (CCEP) authorizes manufacturers to inc orporate classified ______into the communication systems they sell. algorithms Diskless computers communicate with the server and log on through the use of a s pecial ROM boot chip installed on the computer ______. network interface card The two most important environmental conditions to monitor are ______and ______. temperature, humidity Proper ______is required to prevent a computer from overheating. ventilation The potential for ESD increases as the humidity ______. drops True or False: If network cables are installed in the walls and in the ceilings, they will be safe from all damage. FalseA ______atmosphere with high ______will most certainly destroy a ny computer equipment in a matter of days or months. corrosive, humidity The first line of defense against loss of data is usually a ______system. tape backup It is important to have a regular ______for backing up data. schedule Maintaining a ______of all backups is important for later file recovery. log When backing up across a network, network traffic can be reduced by placing the backup computer on an isolated ______. segment Fault-tolerant systems protect data by duplicating data or placing data in diffe rent ______sources. physical RAID level 0, called ______, divides data into 64K blocks and spreads it equally in a fixed rate and order among all disks in an array. disk striping Level 0 disk striping does not offer data ______. protection Disk ______duplicates a partition and moves the duplication onto an other physical disk so that there are always two copies of the data. mirroring Duplexing is intended to protect against disk ______failures, as w ell as media failures. controller Writing complete blocks of data to each disk in the array is known as disk ______. striping In Windows NT Server, the ______program is used to c onfigure Windows NT Server fault tolerance. Disk Administrator In RAID level 10, data that is contained on a physical drive in one array is ______on a drive in the second array. mirrored "Clustering" is the term applied to a group of ______systems worki ng together as a single system. independent ======When network users want to print data on a shared network printer, the data is s ent to a ______that feeds the data to the printer. serverEach network print job must be ______away from a computer's loc al printer port and onto the network cable. redirected The memory buffer in the print server's RAM that holds the print job until the p rinter is ready is called a ______. spooler In order for users to access a shared printer, they must have a way to ______the printer. identify The printer uses the ______to construct text and graphics to create the page image. PDL Managing users who access printing over a includes assigning ______, as with any other shared network resource. permissions One task an administrator can accomplish from a remote location is to ______print jobs in the queue. reorder Most current network operating systems allow an administrator to manage a networ k printer with a ______- ______. print-sharing utility A good fax server service allows an administrator to ______incoming f axes and to ______the appropriate one to the proper person. monitor, route Fax-server enhancements that allow users to send faxes from ______, ______, and ______are available. databases, spreadsheets, e-mail ======Monitoring and documenting the network when it is in good working order provide a ______against which unusual network performance can be compared. baseline A network ______is a tool that captures and filters data packets and an alyzes network activity. monitor ______and ______are utilities that are used to test the network con nections by sending a packet to a remote host and monitoring its return. ping, tracert During monitoring of network performance, ______can indicate areas of poor performance that can benefit from upgrading. bottlenecksMany network vendors provide a ______software to aid in the monitoring and improvement of network performance. total system management After creating a baseline for a network's performance, you will need to maintain a performance ______to aid with future troubleshooting. history To improve the performance of a network, an administrator can upgrade ______, ______, ______and ______. servers, , NICs, media When working on electronic components, be careful to prevent ______that will do damage to the components. static electrical charges Installing a new NIC is the same as installing any ______card. expansion Upgrading routers, brouters, repeaters, and bridges is best carried out by a ______. trained technician The final step in any network upgrade is to ______the upgrade. confirm The best tool to use to confirm hardware changes to a network is the ______u tility. ping How long the network can afford to be ______is in important factor in orga nizing and timing a move. down ======To isolate a network problem, the engineer can divide the network into ______. segments A TDR sends ______-like pulses along a cable looking for any kind of a br eak, short, or imperfection that might affect network performance. sonar Protocol analyzers look inside the ______to determine the cause of a pr oblem. packet Advanced cable testers will tell you if a particular cable or ______is causing problems. NIC One reason it is important to monitor network performance is to provide essentia l information for ______detection. bottleneck Windows NT Server Performance Monitor helps a network administrator view operati ons in both ______time and ______time.real, recorded In an SNMP environment, programs called ______monitor network traffic. agents A ______monitor is a tool that is used to track network performanc e. performance Windows NT Performance Monitor has the ability to send an ______to the ne twork manager when there is a problem. alert Windows NT Server Network Monitor gives the administrator the ability to ______and ______network data streams to and from the server. capture, analyze The best source of information for Microsoft products is ______. TechNet Other useful sources of information for network troubleshooting include ______, ______, and ______. BBSs, User Groups, periodicals ______is used to perform simple file transfers on the Internet. FTP ______is an Internet sta ndard protocol defined for distribution, inquiry, retrieval, and posting of news articles. Network News Transfer Protocol You can use ______to act as a remote terminal to an Internet host. Telnet In addition to URLs, every computer on the Internet has a unique ______address. IP