logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • In OSI network architecture, the dialogue control and token management are responsibilities of


  • Options
  • A. session layer
  • B. network layer
  • C. transport layer
  • D. data link layer
  • E. None of the above

  • Correct Answer
  • session layer 


  • Networking problems


    Search Results


    • 1. Which of the following TCP/IP protocol is used for transferring files from one machine to another?

    • Options
    • A. RARP
    • B. ARP
    • C. TCP
    • D. FTP
    • E. None of the above
    • Discuss
    • 2. With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you use to maximize the number of available hosts?

    • Options
    • A. 192
    • B. 224
    • C. 240
    • D. 248
    • E. 252
    • Discuss
    • 3. Communication circuits that transmit data in both directions but not at the same time are operating in

    • Options
    • A. a simplex mode
    • B. a half-duplex mode
    • C. a full-duplex mode
    • D. an asynchronous mode
    • E. None of the above
    • Discuss
    • 4. Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?

    • Options
    • A. one bit or any odd number of bits inverted in a block of data during transmission
    • B. two bits or any even number of bits inverted in a block during transmission
    • C. one bit or any odd number of bits inverted in a byte during transmission
    • D. two bits or any even number of bits inverted in a byte during transmission
    • E. None of the above
    • Discuss
    • 5. Networks where end user workstations are tied to LAN servers to share resources and application processing.

    • Options
    • A. Internetworked enterprise
    • B. Information super highway
    • C. Business applications of telecommunications
    • D. Client/Server networks
    • Discuss
    • 6. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols

    • Options
    • A. True
    • B. False.
    • Discuss
    • 7. You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do?

    • Options
    • A. Start the Replication service on Kim's Windows for Workgroups computer
    • B. Relocate Kim's home directory to her Windows for Workgroups computer
    • C. Map a drive on Kim's Windows for Workgroups computer to her home directory on the server
    • D. You cannot do this. Home directories can be accessed only by Windows NT computers
    • Discuss
    • 8. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

    • Options
    • A. True
    • B. False
    • Discuss
    • 9. What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?

    • Options
    • A. Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used
    • B. The station that holds the token is allowed to transmit a message on the network
    • C. The station that hold the token has the highest priority on the network
    • D. A token contains information that is used to route messages between rings
    • E. None of the above
    • Discuss
    • 10. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?

    • Options
    • A. Make JohnY a member of the DESIGN Domain Guests group
    • B. Make JohnY a member of the DESIGN Domain Users group
    • C. Do nothing. JohnY can access the printer now
    • D. JohnY cannot access the printer with this configuration
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment