logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you use to maximize the number of available hosts?


  • Options
  • A. 192
  • B. 224
  • C. 240
  • D. 248
  • E. 252

  • Correct Answer
  • 240 


  • Networking problems


    Search Results


    • 1. Communication circuits that transmit data in both directions but not at the same time are operating in

    • Options
    • A. a simplex mode
    • B. a half-duplex mode
    • C. a full-duplex mode
    • D. an asynchronous mode
    • E. None of the above
    • Discuss
    • 2. Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?

    • Options
    • A. one bit or any odd number of bits inverted in a block of data during transmission
    • B. two bits or any even number of bits inverted in a block during transmission
    • C. one bit or any odd number of bits inverted in a byte during transmission
    • D. two bits or any even number of bits inverted in a byte during transmission
    • E. None of the above
    • Discuss
    • 3. Networks where end user workstations are tied to LAN servers to share resources and application processing.

    • Options
    • A. Internetworked enterprise
    • B. Information super highway
    • C. Business applications of telecommunications
    • D. Client/Server networks
    • Discuss
    • 4. If the client receives an address from a DHCP server, what is the only information available in the Network Properties dialog box?

    • Options
    • A. The IP address
    • B. The subnet address
    • C. That the client is receiving its address from DHCP
    • D. The default gateway
    • E. None of the above
    • Discuss
    • 5. Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server?

    • Options
    • A. RDP
    • B. RARP
    • C. RIP
    • D. X.25
    • E. None of the above
    • Discuss
    • 6. Which of the following TCP/IP protocol is used for transferring files from one machine to another?

    • Options
    • A. RARP
    • B. ARP
    • C. TCP
    • D. FTP
    • E. None of the above
    • Discuss
    • 7. In OSI network architecture, the dialogue control and token management are responsibilities of

    • Options
    • A. session layer
    • B. network layer
    • C. transport layer
    • D. data link layer
    • E. None of the above
    • Discuss
    • 8. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols

    • Options
    • A. True
    • B. False.
    • Discuss
    • 9. You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do?

    • Options
    • A. Start the Replication service on Kim's Windows for Workgroups computer
    • B. Relocate Kim's home directory to her Windows for Workgroups computer
    • C. Map a drive on Kim's Windows for Workgroups computer to her home directory on the server
    • D. You cannot do this. Home directories can be accessed only by Windows NT computers
    • Discuss
    • 10. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

    • Options
    • A. True
    • B. False
    • Discuss


    Comments

    There are no comments.

Enter a new Comment