2. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiver
Correct Answer: can receive and send data simultaneously
3. Which of the following statements is correct for the use of packet switching?
Options
A. the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure
B. the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied
C. by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved.
Correct Answer: Associate multiple print devices with one printer
7. What does the transport protocol do?
Options
A. It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes the data to the application through the session layer interface.
B. It provides low-level access to the network adapters by providing data transmission support and some basic adapter management functions
C. It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services
D. It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session
Correct Answer: It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes the data to the application through the session layer interface.
8. Assume, you are the administrator of the TUNA domain. You need to allow Lisa from the BASS domain to administrate the TUNA domain while you are on vacation. A one-way trust relationship has been set up so that TUNA trusts BASS. Which group assignments would accomplish your needs?
Options
A. Create a global group in the TUNA domain called Tuna-Admins that contains the BASSWLisa user account. Add the Tuna-Admins group to the local Administrators group in TUNA
B. Create a local group in TUNA called Tuna-Admins that contains the BASSWLisa user account. Add the Tuna-Admins group to the global Domain Admins group in TUNA
C. Create a global group in BASS called Gbl-Admins that contains the Lisa user account. Add the BASS\Gbl-Admins group to the local Administrators group in TUNA
D. Create a local group in BASS called Loc-Admins that contains the Lisa user account. Create a global group in TUNA called Tuna-Admins that contains the BASSWLoc-Admins group. Add the Tuna-Admins group to the local Administrators group in TUNA
Correct Answer: Create a global group in BASS called Gbl-Admins that contains the Lisa user account. Add the BASS\Gbl-Admins group to the local Administrators group in TUNA
9. A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation?
Options
A. A master domain mode, with each engineer trusting the master domain and the data stored on the server
B. A single domain mode, with all data kept on the controller for the domain
C. A complete trust mode, with each engineer's computer trusting the other engineer's computers
D. A workgroup mode, with each engineer administering his or her own computer
Correct Answer: A workgroup mode, with each engineer administering his or her own computer
10. You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose?